Beruflich Dokumente
Kultur Dokumente
Abstract
This document describes the software features for the HP A Series products and guides you through the
software configuration procedures. These configuration guides also provide configuration examples to
help you apply software features to different network scenarios.
This documentation is intended for network planners, field technical support and servicing engineers, and
network administrators working with the HP A Series products.
iii
Creating a VLAN and its VLAN interface ··········································································································· 58
Configuring VLAN member ports ························································································································ 59
Configuring parameters for a VLAN interface ··································································································· 59
Configuration guidelines ··············································································································································· 61
iv
Displaying client statistics ··································································································································· 138
Setting rate limiting ············································································································································· 139
Wireless QoS configuration example························································································································ 140
CAC service configuration example ················································································································· 140
Static rate limiting configuration example ········································································································ 142
Dynamic rate limiting configuration example ·································································································· 143
v
Enabling application control ······························································································································ 191
Application control configuration example ··············································································································· 192
vi
Configuration guidelines ············································································································································· 255
vii
Configuration guidelines ············································································································································· 344
viii
Retrieving and displaying a CRL ······················································································································· 422
PKI configuration examples········································································································································· 423
Configuring a PKI entity to request a certificate from a CA (method I) ························································· 423
Configuring a PKI entity to request a certificate from a CA (method II) ························································ 427
Applying RSA digital signature in IKE negotiation ·························································································· 432
Configuration guidelines ············································································································································· 438
ix
Configuring a RADIUS user································································································································ 473
WiNet configuration example ···································································································································· 474
WiNet establishment configuration example ··································································································· 474
WiNet-based RADIUS authentication configuration example ········································································ 480
x
Configuring call services of a local number ············································································································· 520
Configuring call forwarding, call waiting, call hold, call transfer, and three-party conference ················ 520
Configuring other voice functions ······················································································································ 522
Configuring call services of a call route ···················································································································· 524
Call services configuration examples ························································································································ 525
Configuring call waiting ····································································································································· 525
Configuring call forwarding ······························································································································· 526
Configuring call transfer ····································································································································· 528
Configuring hunt group ······································································································································ 529
Configuring three-party conference ··················································································································· 532
Configuring silent monitor and barge in service ····························································································· 534
Configuring advanced settings for local numbers and call routes ······································································ 541
Coding parameters ············································································································································· 541
Other parameters ················································································································································ 545
Configuring advanced settings for a local number ·································································································· 545
Configuring coding parameters for a local number ························································································ 545
Configuring other parameters for a local number ··························································································· 547
Configuring advanced settings for a call route ········································································································ 548
Configuring coding parameters for a call route ······························································································ 548
Configuring other parameters for a call route ································································································· 549
Advanced settings configuration example ················································································································ 550
Configuring out-of-band DTMF transmission mode for SIP ············································································· 550
xii
Configuring VE1 line ·········································································································································· 643
Configuring VT1 line ··········································································································································· 648
Configuring BSV line··········································································································································· 651
Displaying ISDN link state ·································································································································· 656
E1 and T1 voice configuration example ··················································································································· 657
Configuring E1 voice DSS1 signaling ·············································································································· 657
xiii
Configure a service node ··································································································································· 714
Configuring access number management ················································································································· 715
Configuring an access number ·························································································································· 715
Configuring advanced settings for an access number ···················································································· 716
IVR configuration examples ········································································································································ 717
Configure a secondary call on a call node (match the terminator of numbers) ··········································· 717
Configure a secondary call on a call node (match the number length) ························································ 721
Configure a secondary call on a call node (match a number) ······································································ 724
Configure an extension secondary call on a call node ·················································································· 726
Configuring a jump node ··································································································································· 728
Configure an immediate secondary call on a service node ··········································································· 730
Configure a secondary call on a service node ································································································ 732
Configure a call node, jump node, and service node ···················································································· 734
Customizing IVR services············································································································································· 740
Creating a menu·················································································································································· 741
Binding an access number ································································································································· 747
Customizing IVR services ···································································································································· 747
Custom IVR service configuration examples ····································································································· 749
xiv
Web overview
The device provides web-based configuration interfaces for visual device management and maintenance.
Figure 1 Web-based network management operating environment
1
NOTE:
• The PC in Figure 1 is the one where you configure the device, but it is not necessarily the web-based network
management terminal. The web-based network management terminal is a PC (or another terminal) used to log in
to the web interface, and it must be reachable by the device.
• After logging in to the web interface, you can create a new user and configure the IP address of the interface
connecting the user to the device.
• If you click the verification code displayed on the web login page, you can get a new verification code.
• Up to 24 users can concurrently log in to the device through the web interface.
NOTE:
Closing the browser does not automatically log out a logged-in user.
2
Figure 3 Initial page of the web interface
• Navigation area—Organizes the web function menus in the form of a navigation tree, where you
can select function menus as needed. The result is displayed in the body area.
3
• Title area—On the left, displays the path of the current configuration interface in the navigation
area. On the right, provides the Save button to quickly save the current configuration, the Help
button to display the web related help, and the Logout button to log out of the web interface.
• Body area—The area where you can configure and display a function.
User level
Web user levels, ranging from low to high, are visitor, monitor, configure, and management.
• Visitor—Users of this level can perform the ping and trace route operations, but cannot access the
device data or configure the device.
• Monitor—Users of this level can access the device data but cannot configure the device.
• Configure—Users of this level can access data from the device and configure the device, but they
cannot upgrade the host software, add/delete/modify users, or back up/restore the application file.
• Management—Users of this level can perform all operations for the device.
4
Function menu Description User level
View configuration information
Monitor
VLAN Interface Setup of a VLAN interface.
5
Function menu Description User level
Enable DMZ host on an
Configure
interface.
6
Function menu Description User level
View the configuration
Monitor
information of redirection.
Redirection Add, modify, or remove the
redirection configuration on an Configure
interface.
7
Function menu Description User level
Configure an advanced rule
Advanced Config Configure
for an IPv4 ACL.
8
Function menu Description User level
A-MSR50) Configure SNMP. Configure
9
Function menu Description User level
10
Function menu Description User level
Start or stop ARP scanning. Configure
11
Function menu Description User level
Save the current configuration
to the configuration file to be Configure
used at the next startup.
Save
Save the current configuration
Manageme
as the factory default
nt
configuration.
Manageme
Create User Create a user.
Users nt
Manageme
Modify User Modify user account.
nt
Manageme
Remove User Remove a user.
nt
12
Function menu Description User level
View current system time and
Monitor
System Time System Time its configurations.
13
Function menu Description User level
View local number
Monitor
configuration information.
Local Number
Create, set, and delete a local
Configure
number.
14
Function menu Description User level
Management Enable the SIP trunk function. Configure
15
Function menu Description User level
Configure processing methods
Configure
customization configuration.
16
Common web interface elements
Common buttons and icons
Table 2 Common buttons and icons
Adds an item.
17
Figure 4 Content display by pages
Searching function
The web interface provides basic and advanced search functions, which display entries matching the
specified search criteria.
• Basic search—As shown in Figure 4, enter the keyword in the text box above the list, select a search
item from the dropdown list, and click the Search button to display the entries that match your
criteria. Figure 5 shows an example of searching for entries with VLAN ID equal to 2.
Figure 5 Basic search function example
• Advanced search—As shown in Figure 4, you can click the Advanced Search link to open the
advanced search page illustrated in Figure 6. Specify the search criteria, and click Apply to display
the entries that match your criteria.
18
Figure 6 Advanced search
Take the ARP table shown in Figure 4 as an example. To search for the ARP entries with interface Ethernet
0/4, and IP address range from 192.168.1.50 to 192.168.1.59, follow these steps:
1. Click the Advanced Search link, specify the search criteria on the advanced search page as shown
in Figure 7, and click Apply. The ARP entries with interface Ethernet 0/4 are displayed.
Figure 7 Advanced search function example (I)
2. Click the Advanced Search link, specify the search criteria on the advanced search page as shown
in Figure 8, and click Apply. The ARP entries with interface Ethernet 0/4 and IP address range from
192.168.1.50 to 192.168.1.59 are displayed, as shown in Figure 9.
Figure 8 Advanced searching function example (II)
19
Figure 9 Advanced searching function example (III)
Sorting function
The web interface provides you with a basic sorting function to sort entries by column.
Basic sorting function: On a list page, click the blue heading item of each column to sort the entries based
on the heading item you selected. After you click, the heading item is displayed with an arrow beside it,
as shown in Figure 10. The upward arrow indicates ascending order, and the downward arrow indicates
descending order.
Figure 10 Basic sorting function example (based on IP address in descending order)
20
Managing web-based NM through CLI
Enabling or disabling web-based NM
Table 3 Enable/disable the web-based NM service
Task Command
Enable the web-based NM service. ip http enable
Task Command
Display currently logged in users. display web users
Configuration guidelines
• The web-based configuration interface supports the following:
Operating systems: Windows XP, Windows 2000, Windows Server 2003 Enterprise Edition,
Windows Server 2003 Standard Edition, Windows Vista, Linux and MAC OS.
Browsers: Microsoft Internet Explorer 6.0 SP2 and later, Mozilla Firefox 3.0 and later, and
Google Chrome 2.0.174.0 and later.
• The web-based configuration interface does not support the Back, Next, Refresh buttons provided by
the browser. Using these buttons may result in abnormal display of webpages.
• The Windows firewall limits the number of TCP connections. When you use IE to log in to the web
interface, you may be unable to open the web interface. To avoid this problem, turn off the
Windows firewall before logging in.
• If the software version of the device changes, clear the cache data on the browser before logging in
to the device through the web interface. Otherwise, the webpage content may not be displayed
correctly.
• You can display at most 20,000 entries that support content display by pages.
21
Analysis
• If you use Microsoft Internet Explorer, you can access the web interface only when the following
functions are enabled: Run ActiveX controls and plug-ins, script ActiveX controls marked safe for
scripting, and active scripting.
• If you use Mozilla Firefox, you can access the web interface only when JavaScript is enabled.
3. Click Custom Level, and the Security Settings dialog box appears.
4. Enable these functions: Run ActiveX controls and plug-ins, Script ActiveX controls marked safe for
scripting, and Active scripting. See Figure 12.
22
Figure 12 Internet Explorer Setting (II)
23
Configuring Firefox web browser settings
1. Open the Firefox web browser, and select Tools > Options.
2. Click the Content tab, select Enable JavaScript, and click OK. See Figure 13.
Figure 13 Firefox web browser setting
24
Configuring device information
NOTE:
The Device Info page contains five parts, which correspond to the five tabs below the figure on the page
(except the Service Information and Recent System Logs tabs). When you point to a part of the figure, the
system prompts you for the tab of the corresponding information, and you can jump to the tab by clicking
this part.
25
Figure 14 Device information
26
Select the refresh mode in Refresh Period.
• If you select a specific period, the system automatically refreshes the Device Info page.
• If you select Manual, click Refresh to refresh the page.
Device information
Table 5 Field description
Field Description
Device Model Device name
Device ID Device ID
Field Description
Interface Interface name
Network-Side Connection
Connection state at the network side of the interface
State
Uplink Rate (Kbits/Second) Average rate of outgoing data for the last 300 seconds
Downlink Rate
Average rate of incoming data for the last 300 seconds
(Kbits/Second)
27
3G wireless card state
To display detailed information about the 3G wireless card state, click the More link in the 3G Wireless
Card State area. This displays information about the 3G modem, UIM card, and 3G network.
Figure 15 3G wireless card state
Field Description
3G Modem Information Connection state of the 3G network.
28
Field Description
State of the UIM card:
• Absent.
• Being initialized.
• Fault.
• Destructed.
UIM Card State
• PIN code protection is disabled.
• PIN code protection is enabled. Enter the PIN code for authentication.
• PIN code protection is enabled, and the PIN code has passed the
authentication.
• The PIN code has been blocked. Enter the PUK code to unblock it.
IMSI IMSI of the UIM card.
LAN information
Table 8 Field description
Field Description
Interface Interface name
WLAN information
Table 9 Field description
Field Description
SSID (WLAN Name) Name of the WLAN service
29
Service information
Table 10 Field description
Field Description
Service Name of the service
Field Description
Time Time when system logs were generated
• To change the URL address of the card, click of the target card, as shown in Figure 16. Enter the
URL address in the box (see Figure 17) and click to apply the configuration or click to cancel
the modification.
• Set the URL address of the card, and then connect the card to the LAN to which the administrator
belongs. On the page shown in Figure 16, click Manage. A page linked to the specified URL
address appears where you can log in to the web interface of this card to manage it.
Figure 17 Change card URL address
30
Configuring web interface basic services
You can configure the following basic services on the web interface:
• Setting WAN interface parameters
• Setting LAN interface parameters
• Setting WLAN interface parameters
This document guides you through quick configuration of basic services of routers, including configuring
WAN, LAN, and WLAN interface parameters.
NOTE:
• For more information about WAN interfaces, see "Configuring WAN interfaces."
• For more information about LAN interfaces, see "Configuring VLAN."
• For more information about WLAN interfaces, see "Configuring wireless services."
31
The page for configuring WAN interface parameters varies with the interface type. You are allowed to
set Ethernet, SA, ADSL/G.SHDSL, CE1/PR1, and CT1/PR1 interface parameters.
Ethernet interface
Figure 19 Set Ethernet interface parameters
Item Description
WAN Interface Select the Ethernet interface to configure.
Connect Mode: Auto Select Auto connect mode to automatically obtain an IP address.
Specify the MAC address of the Ethernet interface in either of the two ways:
• Use the MAC address of the device—Use the default MAC address of the
MAC Address Ethernet interface, which is displayed in brackets.
• Use a customized MAC address—Assign a MAC address to the Ethernet
interface.
Item Description
WAN Interface Select the Ethernet interface to configure.
32
Item Description
Specify a DNS server IP address for the interface. DNS server 1 is used before
DNS1 DNS server 2.
To configure the global DNS server on the page you enter, select Advanced >
DNS Setup > DNS Configuration. The global DNS server is queried prior to the
DNS servers of the interfaces. In other words, the DNS query is sent to the global
DNS2
DNS server first. If the query fails, the DNS query is sent to the next DNS server
until the query succeeds.
Specify the MAC address of the Ethernet interface in either of the two ways:
• Use the MAC address of the device—Use the default MAC address of the
MAC Address Ethernet interface, which is displayed in brackets.
• Use the customized MAC address—Assign a MAC address to the Ethernet
interface.
Item Description
WAN Interface Select the Ethernet interface to configure.
Specify the MAC address of the Ethernet interface in either of the two ways:
• Use the MAC address of the device—Use the default MAC address of the
MAC Address Ethernet interface, which is displayed in brackets.
• Use the customized MAC address—Assign a MAC address to the Ethernet
interface.
33
SA interface
Figure 20 Set SA parameters
Item Description
WAN Interface Select the SA interface to configure.
ADSL/G.SHDSL interface
Figure 21 Set ADSL/G.SHDSL parameters
34
Table 16 Configuration of ADSL/G.SHDSL interface parameters (in IPoA mode)
Item Description
WAN Interface Select the ADSL/G.SHDSL interface to configure.
Item Description
WAN Interface Select the ADSL/G.SHDSL interface to configure.
Item Description
WAN Interface Select the ADSL/G.SHDSL interface to configure.
Item Description
WAN Interface Select the ADSL/G.SHDSL interface to configure.
35
Item Description
Password Specify the password for identity authentication.
CE1/PR1 interface
The CE1/PR1 interface works in two modes: E1 mode and CE1 mode.
1. In E1 mode:
Figure 22 Set CE1/PR1 interface parameters (in E1 mode)
Item Description
WAN Interface Select the CE1/PR1 interface to configure.
2. In CE1 mode:
36
Figure 23 Set CE1/PR1 interface parameters (in CE1 mode)
Item Description
WAN Interface Select the CE1/PR1 interface to configure.
37
CT1/PR1 interface
Figure 24 Set CT1/PR1 parameters
Item Description
WAN Interface Select the CT1/PR1 interface to configure.
38
Figure 25 Set LAN parameters
Item Description
Displays the ID of the VLAN interface to configure.
IMPORTANT:
VLAN Interface
By default, the VLAN interface on the device that has the smallest number is displayed. If no
VLAN interface is available on the device, the system automatically creates an interface
numbered 1 and displays it.
IP Address
Specify the IP address and a subnet mask for the VLAN interface.
Subnet Mask
Start IP Address Specify the IP address range for dynamic allocation in an extended address pool.
IMPORTANT:
If the extended address pool is configured on an interface, when a DHCP client's request
End IP Address arrives at the interface, the server assigns an IP address from this extended address pool
only. Therefore, the client cannot obtain an IP address if no IP address is available in the
extended address pool.
Specify a gateway IP address in the DHCP address pool for DHCP clients.
Gateway IP When accessing a server or host that is not in its network segment, a DHCP client
Address needs the gateway to forward data for it. When you specify a gateway IP address in
the address pool, the DHCP server sends an IP address and the gateway IP address to
a requesting client.
39
Item Description
Specify a DNS server IP address in the DHCP address pool for DHCP clients. DNS
DNS Server 1 server 1 is used before DNS server 2.
To allow DHCP clients to access the Internet through domain names, the DHCP server
sends an IP address and a DNS server IP address to clients.
DNS Server 2
Item Description
WLAN Setting Select whether to make WLAN settings.
Network Name
Specify a wireless network name.
(SSID)
40
Item Description
Select whether to enable data encryption.
Enable Encrypt With data encryption enabled, data transmission between wireless client and wireless
device can be securely encrypted.
Encrypt Act Select an encryption mode for the wireless network: WEP40 or WEP104.
Key Seed You can either use a key seed to generate keys or type keys manually. Then, you can
choose one of the configured keys.
Key 1 • When you select WEP40 and ASCII, the generated or input key is a 5-character
string.
Key 2 • When you select WEP40 and HEX, the generated or input key is a 10-digit
hexadecimal number.
• When you select WEP104 and ASCII, the generated or input key is a 13-character
Key 3
string.
• When you select WEP104 and HEX, the generated or input key is a 26-digit
Key 4 hexadecimal number.
41
Figure 27 Check the basic service configuration
This page shows the configurations that you have made through the previous steps. Check the
configurations, and click Finish to validate them. To make any modification, click Back to go to previous
pages and edit the settings.
The page also provides an option Save Current Configuration to save the configurations to the
configuration file (either a .cfg file or an .xml file) to be used at the next startup of the device. If this option
is selected, the configurations you make persist through a device reboot.
42
Configuring WAN interfaces
The WAN interfaces that can be configured on the web interface include Ethernet interfaces, SA
interfaces, ADSL/G.SHDSL interfaces, CE1/PRI interfaces, and CT1/PRI interfaces.
Click the icon corresponding to an Ethernet interface to display the page for configuring that Ethernet
interface, as shown in Figure 29.
43
Figure 29 Configure an Ethernet interface
Item Description
WAN Interface Displays the name of the Ethernet interface to configure.
44
Table 26 Configuration (manual mode)
Item Description
WAN Interface Displays the name of the Ethernet interface to configure.
Select Manual as the connection mode. In this mode, you must assign an IP
Connect Mode: Manual
address and subnet mask for the interface manually.
Gateway IP Address Configure the next hop for the static route.
DNS1 Assign an IP address to the DNS servers. DNS1 has a higher precedence than
DNS2.
To configure a global DNS server, select Advanced > DNS Setup > DNS
Configuration from the navigation tree. The global DNS server has a higher
DNS2
precedence than all DNS servers configured on the interfaces. An interface first
sends a query request to the global DNS server. If it fails to receive a response, it
sends query requests to the DNS servers configured on the interfaces one by one.
Item Description
WAN Interface Displays the name of the Ethernet interface to configure.
45
Item Description
Password Configure the password for authentication.
Configuring an SA interface
The synchronous/asynchronous serial (SA) interface supports PPP connection mode.
PPP is a link layer protocol that carries packets over point-to-point links. It provides user authentication
and allows for easy extension while supporting synchronous/asynchronous communication.
PPP contains a set of protocols, including an LCP, an NCP, and authentication protocols such as PAP and
CHAP. Among these protocols:
• LCP is responsible for establishing, tearing down, and monitoring data links.
• NCP negotiates the packet format and type of data links.
• PAP and CHAP provide network security.
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to display the WAN interface
configuration page. Click the icon corresponding to the SA interface you want to configure to display
the SA interface configuration page, as shown in Figure 30.
46
Figure 30 Configure an SA interface
Table 28 Configuration
Item Description
WAN Interface Displays the name of the interface to configure.
IPoA
IPoA enables IP packets to traverse an ATM network. In an IPoA implementation, ATM provides the data
link layer for the IP hosts on the same network to communicate with one another, and IP packets must be
adapted to traverse the ATM network.
47
IPoA makes full use of the advantages of ATM, including high speed point-to-point connections (which
help improve the bandwidth performance of an IP network), excellent network performance, and
complete, mature QoS services.
IPoEoA
IPoEoA adopts a three-layer architecture, with IP encapsulation at the uppermost layer, IPoE in the middle,
and IPoEoA at the bottom.
IPoEoA is suitable where Ethernet packets are forwarded through an ATM interface, for example, when a
network device forwards traffic from an Ethernet across an ATM PVC to a network access server.
PPPoA
PPPoA enables ATM to carry PPP protocol packets. With PPPoA, PPP packets' are encapsulated in ATM
cells. In this case, ATM can be viewed as the carrier of PPP packets. Because the communication process
of PPPoA is managed by PPP, PPPoA inherits the flexibility and comprehensive applications of PPP.
PPPoEoA
PPPoEoA enables ATM to carry PPPoE protocol packets. With PPPoEoA, Ethernet packets are
encapsulated in ATM cells, through which you can use a PVC to simulate all the functions of Ethernet. To
allow ATM to carry Ethernet frames, the interface management module provides the VE interface. The VE
interface has Ethernet characteristics and can be dynamically created through configuration commands.
The following is the protocol stack adopted by the VE interface.
• ATM PVC at the bottom layer
• Ethernet at the link layer
• Protocols the same as those for a common Ethernet interface at the network layer and upper layers
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to display the WAN interface
configuration page. Click the icon corresponding to the ADSL/G.SHDSL interface you want to
configure to display the ADSL/G.SHDSL interface configuration page, as shown in Figure 31.
48
Figure 31 Configure an ADSL/G.SHDSL interface
Item Description
WAN Interface Displays the name of the ADSL/G.SHDSL interface to configure.
Item Description
WAN Interface Displays the name of the ADSL/G.SHDSL interface to configure.
49
Item Description
Display and set the interface status:
• Connected—The current interface is up and connected. Click the Disable
button to shut down the interface.
Interface Status • Not connected—The current interface is up but not connected. Click the
Disable button to shut down the interface.
• Administratively Down—The current interface is shut down by a network
administrator. Click the Enable button to bring up the interface.
Item Description
WAN Interface Displays the name of the ADSL/G.SHDSL interface to configure.
Item Description
WAN Interface Displays the name of the ADSL/G.SHDSL interface to configure.
50
Item Description
Connect Mode: PPPoEoA Select PPPoEoA as the connection mode.
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to display the WAN interface
configuration page. Click the icon corresponding to the CE1/PRI interface to configure to display the
CE1/PRI interface configuration page. The appearance and features of this page vary with the operating
mode of the CE1/PRI interface.
51
Configuring a CE1/PRI interface in E1 mode
Figure 32 Configure a CE1/PRI interface in E1 mode
Item Description
WAN Interface Displays the name of the CE1/PRI interface to configure.
52
Configuring a CE1/PRI interface in CE1 mode
Figure 33 Configure a CE1/PRI interface in CE1 mode
Item Description
WAN Interface Displays the name of the CE1/PRI interface to configure.
53
Configuring a CT1/PRI interface
The CT1/PRI interface supports PPP connection mode. For details about PPP, see "Configuring an SA
interface."
When it is working as a CT1 interface, all timeslots (numbered 1 to 24) can be randomly divided into
groups. Each of these groups can form one channel set for which the system automatically creates an
interface that is logically equivalent to a synchronous serial interface. This interface supports link layer
protocols such as PPP, HDLC, FR, LAPB, and X.25, and network protocols such as IP and IPX.
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to display the WAN interface
configuration page. Click the icon corresponding to the CT1/PRI interface to configure to display the
CT1/PRI interface configuration page, as shown in Figure 34.
Figure 34 Configure a CT1/PRI interface
Table 35 Configuration
Item Description
WAN Interface Displays the name of the CT1/PRI interface to configure.
54
Item Description
Work Mode: CT1 Select CT1 as the word mode.
55
Figure 35 Statistics of an interface
56
Configuring VLAN
You can configure the following port-based VLAN and VLAN interface functions through the web
interface:
• Create or delete VLANs.
• Add/remove member ports to/from a VLAN.
• Create or delete VLAN interfaces.
• Configure VLAN interface parameters.
Ethernet is a network technology based on the CSMA/CD mechanism. Because the medium is shared,
collisions and excessive broadcasts are common on Ethernet networks. To address the issue, VLAN was
introduced to break a LAN down into separate VLANs. VLANs are isolated from each other at Layer 2. A
VLAN is a bridging domain, and all broadcast traffic is contained within it.
For hosts of different VLANs to communicate, you must use a router or Layer 3 switch to perform Layer 3
forwarding. To achieve this, VLAN interfaces are used. VLAN interfaces are virtual interfaces used for
Layer 3 communication between different VLANs. They do not exist as physical entities on devices. For
each VLAN, you can create one VLAN interface. You can configure VLAN interfaces to forward traffic at
the network layer.
NOTE:
For more information about VLANs and VLAN interfaces, see HP A-MSR Router Series Layer 2—LAN
Switching Configuration Guide.
Task Remarks
Creating a VLAN and its VLAN interface Required
Task Remarks
Creating a VLAN and its
Required.
VLAN interface
57
Task Remarks
Optional.
Configure an IP address and MAC address for a VLAN interface. Select whether
to enable the DHCP server function for a VLAN interface. If you enable it,
Configuring parameters
configure related parameters.
for a VLAN interface
You can also configure the DHCP server function in Advanced > DHCP Setup. For
more information, see "Configuring DHCP." This chapter only describes the DHCP
server configuration in the LAN Setup module.
Table 38 Configuration
Item Description
VLAN Create And Remove Set the operation type to Create or Remove.
Enter the ID of the VLAN (or VLAN interface) to be created or removed. You
VLAN IDs
can create or remove multiple VLANs at a time.
Create VLAN Interface You can create a VLAN interface when a VLAN is created.
58
Item Description
Only Remove VLAN
You can remove the VLAN interface of a VLAN without removing the VLAN.
Interface
Item Description
VLAN ID Select the ID of the VLAN to assign ports to or remove ports from.
Remove Click Remove to remove the selected ports from the VLAN.
59
Figure 37 VLAN Interface Setup page
Table 40 Configuration
Item Description
VLAN ID Select the ID of the VLAN interface to configure.
IP Address
Set the VLAN interface's IP address and subnet mask.
Subnet Mask
60
Item Description
Set the MAC address of the VLAN interface:
• Use the MAC address of the device—Use the default MAC address of the VLAN
interface, which is displayed in brackets.
MAC Address
• Use the customized MAC address—Manually set the MAC address of the VLAN
interface. When this option is selected, you must enter a MAC address in the
field below.
Set an extended DHCP address pool used for dynamic IP address allocation. The IP
address range is defined by a start IP address and an end IP address.
NOTE:
Start IP Address
If an extended address pool is configured on the port that receives the DHCP request
End IP Address packet, the server allocates an IP address from the extended address pool to the client,
regardless of whether a common address pool (static binding or dynamic allocation) is
also configured on the port. If no IP address is available in the pool, the server is not able
to allocate an IP address to the client.
Set the gateway IP address allocated to the DHCP clients from the DHCP address
pool.
Gateway IP Address When DHCP clients access servers or hosts on other network segments, their data is
forwarded through the gateway. After specifying a gateway IP address, the server
sends the gateway IP address to the clients along with the IP addresses allocated to
them.
Assign an IP address from the address pool for the DNS server allocated to the
DHCP clients on the local network segment. DNS Server 1 has a higher preference
DNS Server 1 than DNS Server 2.
DNS Server 2 To enable DHCP clients to access hosts on the Internet by domain names, the DHCP
server should specify the local DNS server's IP address when assigning IP addresses
to these DHCP clients.
Set the IP addresses that are not to be auto assigned in the DHCP address pool.
An IP address that is already assigned (gateway IP address or FTP server IP address
for example) should not be assigned to another client. Otherwise, IP address
Reserved IP Address
conflicts occur.
When you specify an IP address configured in a static binding as not to be auto
assigned, this address can still be assigned to the client in the static binding.
Configuration guidelines
When you configure VLANs, follow these guidelines:
• As the default VLAN, VLAN 1 cannot be created or manually removed.
• You cannot manually create or remove VLANs reserved for special purposes.
• You cannot directly remove protocol-reserved VLANs, voice VLANs, management VLANs, or
dynamically learned VLANs. To remove them, you must first remove relevant configurations.
61
Configuring wireless services
The device allows you to perform the following configurations in the web interface:
• Configuring wireless access service
• Displaying wireless access service
• Configuring data transmit rates
• Displaying radio
• Configuring the blacklist and whitelist functions
• Configuring user isolation
• Configuring wireless QoS
• Setting a district code
With these configurations, you can build an integrated, stable, secure, effective wireless network.
WLAN is popular nowadays. Compared with wired LANs, WLANs are easier and cheaper to implement
because several APs can provide wireless access for an entire building or area. A WLAN does not
necessarily mean that everything is wireless. The servers and backbones still reside on wired networks.
WLANs mainly provide the following services:
• Authentication and encryption to secure wireless access
• Wireless access and mobility to free users from the restrictions of wires and cables
Task Remarks
Required.
Wireless service configuration Allows you to create a wireless service and
configure its attributes.
Optional.
Configuring radio Allows you configure radio rates to adjust the
capabilities of wireless devices.
Optional.
Configuring WLAN security Allows you to control client access to enhance
wireless security.
Optional.
Configuring WLAN QoS Allows you to configure WLAN QoS to make full
use of wireless resources.
62
Task Remarks
Optional.
Configuring advanced WLAN Allows you to configure district codes as needed to
meet country-specific regulations.
Click Add to display the page for creating a wireless access service.
Figure 39 Create a wireless service
63
Table 42 Configuration
Item Description
Radio ID: 1 or 2. The actual value range depends on
Radio Unit
your device model.
Table 43 Configuration
Item Description
Wireless Service Display the selected SSID.
64
Item Description
Set the default VLAN of a port.
Default VLAN By default, the default VLAN of all ports is VLAN 1. After you set
the new default VLAN, VLAN 1 is the ID of the VLAN whose
packets are to be sent untagged.
Table 44 Configuration
Item Description
Maximum number of clients of an SSID to be associated with the
same radio of the AP.
NOTE:
Client Max Users
When the number of clients of an SSID to be associated with the
same radio of the AP reaches the maximum, the SSID is
automatically hidden.
65
Item Description
web interface management right of online clients
• Disable—Disables the web interface management right of
Management Right online clients.
• Enable—Enables the web interface management right of
online clients.
Item Description
Authentication Type For the clear type wireless service, you can select Open-System only.
66
Item Description
• mac-authentication—Performs MAC address authentication on users.
• mac-else-userlogin-secure—This mode is the combination of the
mac-authentication and userlogin-secure modes, with MAC
authentication having a higher priority. Upon receiving a non-802.1X
frame, a port in this mode performs only MAC authentication. Upon
receiving an 802.1X frame, the port performs MAC authentication. If
MAC authentication fails, the port then performs 802.1X
authentication.
• mac-else-userlogin-secure-ext—This mode is similar to the
mac-else-userlogin-secure mode, except that it supports multiple
802.1X and MAC authentication users on the port.
• userlogin-secure—In this mode, port-based 802.1X authentication is
performed for users. Multiple 802.1X authenticated users can access
the port, but only one user can be online.
• userlogin-secure-or-mac—This mode is the combination of the
userlogin-secure and mac-authentication modes, with 802.1X
authentication having a higher priority. For a wireless user, 802.1X
authentication is performed first. If 802.1X authentication fails, MAC
authentication is performed.
• userlogin-secure-or-mac-ext—This mode is similar to the
userlogin-secure-or-mac mode, except that it supports multiple 802.1X
Port Mode and MAC authentication users on the port.
• userlogin-secure-ext—In this mode, a port performs 802.1X
authentication on users in macbased mode and supports multiple
802.1X users.
NOTE:
There are multiple security modes. To remember them easily, follow these
rules to understand part of the port security modes:
• userLogin indicates port-based 802.1X authentication.
• mac indicates MAC address authentication.
• The authentication mode before Else is used preferentially. If the
authentication fails, the authentication after Else may be used,
depending on the protocol type of the packets to be authenticated.
• The authentication mode before Or and the one after Or have the
same priority. The device determines the authentication mode
according to the protocol type of the packets to be authenticated. For
wireless users, the 802.1X authentication mode is used preferentially.
• userLogin together with Secure indicates MAC-based 802.1X
authentication.
• A security mode with Ext allows multiple 802.1X users to pass the
authentication. A security mode without Ext allows only one 802.1X
user to pass the authentication.
67
Figure 42 MAC authentication configuration
Table 46 Configuration
Item Description
mac-authentication—MAC-based authentication is
Port Mode
performed on access users.
2. Configure userlogin-secure/userlogin-secure-ext.
68
Figure 43 userlogin-secure/userlogin-secure-ext port security configuration page (userlogin-secure is used
for example)
Table 47 Configuration
Item Description
• userlogin-secure—Perform port-based 802.1X
authentication for access users. In this mode, multiple
802.1X authenticated users can access the port, but only
Port Mode one user can be online.
• userlogin-secure-ext—Perform MAC-based 802.1X
authentication for access users. In this mode, the port
supports multiple 802.1X users.
69
Item Description
• Enable—Enable the online user handshake function so that
the device can periodically send handshake messages to a
Handshake user to check whether the user is online. By default, the
function is enabled.
• Disable—Disable the online user handshake function.
• Enable—Enable the multicast trigger function of 802.1X to
send multicast trigger messages to the clients periodically for
initiating authentication. By default, the multicast trigger
function is enabled.
• Disable—Disable the 802.1X multicast trigger function.
70
Table 48 Configuration
Item Description
• mac-else-userlogin-secure—This mode is the
combination of the mac-authentication and
userlogin-secure modes, with MAC authentication
having a higher priority. Upon receiving a
non-802.1X frame, a port in this mode performs
only MAC authentication. Upon receiving an
802.1X frame, the port performs MAC
authentication. If MAC authentication fails, the
port performs 802.1X authentication.
• mac-else-userlogin-secure-ext—This mode is
similar to the mac-else-userlogin-secure mode,
except that it supports multiple 802.1X and MAC
Port Mode authentication users on the port.
• userlogin-secure-or-mac—This mode is the
combination of the userlogin-secure and
mac-authentication modes, with 802.1X
authentication having a higher priority. For a
wireless user, 802.1X authentication is
performed first. If 802.1X authentication fails,
MAC authentication is performed.
• userlogin-secure-or-mac-ext—This mode is
similar to the userlogin-secure-or-mac mode,
except that it supports multiple 802.1X and MAC
authentication users on the port.
71
Item Description
• Enable—Enable the online user handshake
function so that the device can periodically send
handshake messages to a user to check whether
Handshake the user is online. By default, the function is
enabled.
• Disable—Disable the online user handshake
function.
• Enable—Enable the multicast trigger function of
802.1X to send multicast trigger messages to the
clients periodically for initiating authentication.
By default, the multicast trigger function is
enabled.
• Disable—Disable the 802.1X multicast trigger
function.
72
Figure 45 Crypto type wireless service
See Table 43 for the basic configuration of crypto type wireless service.
Table 49 Configuration
Item Description
Maximum number of clients of an SSID to be
associated with the same radio of the AP.
NOTE:
Client Max Users
When the number of clients of an SSID to be associated
with the same radio of the AP reaches the maximum,
the SSID is automatically hidden.
Set the PTK lifetime. A PTK is generated through a
PTK Life Time
four-way handshake.
73
Item Description
Set the TKIP countermeasure time.
By default, the TKIP countermeasure time is 0
seconds (the TKIP countermeasure policy is
disabled).
If the TKIP countermeasure time is set to a value other
than 0, the TKIP countermeasure policy is enabled.
MIC is designed to avoid hacker tampering. It uses
the Michael algorithm and is extremely secure.
TKIP CM Time
When failures occur to MIC, the data may have
been tampered with, and the system may be under
attack. In this case, TKIP enables the countermeasure
policy to prevent hackers from attacking. With the
countermeasure policy enabled, if more than two
MIC failures occur within the specified time, the TKIP
disassociates all connected wireless clients, and no
new associations are allowed within the TKIP
countermeasure time.
74
Figure 47 Security settings for the crypto type wireless service
Table 50 Configuration
Item Description
Link authentication method:
• Open-System—No authentication. With this authentication
mode enabled, all clients pass authentication.
Authentication Type
• Shared-Key—The two parties need to have the same shared
key configured for this authentication mode. You can select
this option only when WEP encryption mode is used.
• Open-System and Shared-Key—It indicates that you can select
both open-system and shared-key authentication.
Encryption
• wep40—Indicates the WEP40 key option.
WEP • wep104—Indicates the WEP104 key option.
• wep128—Indicates the WEP128 key option.
75
Item Description
Configure the key index:
• 1—Key index 1.
• 2—Key index 2.
• 3—Key index 3.
Key ID
• 4—Key index 4.
There are 4 static keys in WEP. The key index can be 1, 2, 3 or
4. The key corresponding to the specified key index is used for
encrypting and decrypting broadcast and multicast frames.
Key length.
• For wep40, the key is a string of 5 alphanumeric characters
or a 10-digit hexadecimal number.
Key Length • For wep104, the key is a string of 13 alphanumeric
characters or a 26-digit hexadecimal number.
• For wep128, the key is a string of 16 alphanumeric
characters or a 32-digit hexadecimal number.
76
Figure 48 mac and psk port security configuration page
Table 51 Configuration
Item Description
mac and psk—MAC-based authentication must be
performed on access users first. If MAC-based
authentication succeeds, an access user has to use the
Port Mode
pre-configured PSK to negotiate with the device.
Access to the port is allowed only after the negotiation
succeeds.
77
2. Configure psk.
Figure 49 psk port security configuration page
Table 52 Configuration
Item Description
psk—An access user must use the PSK that is
pre-configured to negotiate with the device. The
Port Mode
access to the port is allowed only after the negotiation
succeeds.
3. Configure userlogin-secure-ext.
Perform the configurations as shown in "Configure userlogin-secure/userlogin-secure-ext."
78
Security parameter dependencies
In a clear-type wireless service or crypto-type wireless service, the security parameter dependencies are
described in Table 53.
Table 53 Security parameter dependencies
WEP
Service Authentication Encryption
Security IE encryption Port mode
type mode type
/key ID
mac-authentication
mac-else-userlogin-secure
mac-else-userlogin-secure-ext
Clear Open-System Unavailable Unavailable Unavailable userlogin-secure
userlogin-secure-ext
userlogin-secure-or-mac
userlogin-secure-or-mac-ext
WEP
encryption is mac and psk
available
Selected Required psk
The key ID
can be 1, 2, userlogin-secure-ext
3, or 4
Open-System
WEP
encryption is
required
Unselected Unavailable mac-authentication
The key ID
can be 1, 2,
3 or 4
WEP
encryption is
required
Crypto Shared-Key Unavailable Unavailable mac-authentication
The key ID
can be 1, 2,
3 or 4
WEP
encryption is mac and psk
required
Selected Required psk
The key ID
can be 2, 3 userlogin-secure-ext
Open-System or 4
and Shared-Key WEP
encryption is
required
Unselected Unavailable mac-authentication
The key ID
can be 1, 2,
3 or 4
79
Displaying wireless access service information
Displaying wireless service information
Select Interface Setup > Wireless > Summary from the navigation tree and click the name of the specified
wireless service to view the detailed information, statistics, or connection history.
Field Description
Service Template Number Current service template number.
80
Figure 51 Display detailed information of wireless service (crypto type)
Field Description
Service Template Number Current service template number.
81
Displaying statistics of wireless service
Figure 52 Display wireless service statistics
82
Figure 54 Display client
Field Description
Field Description
MAC address MAC address of the client.
83
Field Description
State State of the client, such as running.
Time for which the client has been associated with the
Up Time
device.
Field Description
Refresh Refresh the current page.
84
Field Description
Reset Statistic Delete all items in the list, or clear all statistics.
Field Description
AP Name Name of the associated access point.
85
Field Description
Discarded Frames Number of discarded frames.
Field Description
• Rate number for a non-802.11n client.
No./MCS
• MCS value for an 802.11n client.
Rate(Mbps) Rate at which the radio interface sends wireless ping frames.
TxCnt Number of wireless ping frames that the radio interface sent.
RxCnt Number of wireless ping frames that the radio interface received from the client.
Received signal strength indication. This value indicates the client signal strength
RSSI
detected by the AP.
86
Wireless access configuration examples
Wireless service configuration example
Network requirements
As shown in Figure 57, enable the wireless function on the device to enable the client to access the
internal network resources at any time. The device provides plain-text wireless access service with SSID
service1. 802.11g is adopted.
Figure 57 Network diagram
Configuration procedure
1. Configure a wireless service.
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and then click Add to display
the page for creating a wireless service.
Figure 58 Create a wireless service
87
Figure 59 Enable the wireless service
Configuration guidelines
Follow these guidelines when you configure a wireless service:
• Select a correct district code.
• Make sure that the radio unit is enabled.
88
Figure 61 Network diagram
SSID:research
VLAN:2 Client:0040-96b3-8a77
IP network
Router
SSID:office
VLAN:3
Client:0014-6c8a-43ff
Configuration procedure
1. Configure a wireless service named research.
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Create to display the
page for creating a wireless service.
a. Configure the name of the wireless service as research.
b. Select the wireless service type crypto.
c. Click Apply.
# After the wireless service is created, the system is automatically navigated to the wireless service page,
where you can perform the VLAN settings (before this operation, select Network > VLAN and create
VLAN 2 first).
Figure 62 Set the VLANs
NOTE:
For PSK-related configuration, see "PSK authentication configuration example." You can strictly follow
the configuration example to configure the PSK configuration.
89
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Create to display the
page for creating a wireless service.
a. Configure the wireless service name as office.
b. Select the wireless service type clear.
c. Click Apply.
# After the wireless service is created, the system is automatically navigated to the wireless service page,
where you can configure the VLANs (first select Network > VLAN from the navigation tree, and create
VLAN 3).
Figure 63 Set the VLANs
Configuration procedure
1. Configure a wireless service.
# Create a wireless service.
90
Select Interface Setup > Wireless > Access Service from the navigation tree, and then click Add to display
the page for creating a wireless service.
Figure 65 Create a wireless service
91
3. Enable the wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree to display the page for
enabling a wireless service.
Figure 67 Enable the wireless service
92
Figure 68 Configure the client
The client has the same pre-shared PSK key as the AP, so the client can associate with the AP.
93
Figure 69 The client is associated with the AP
Configuration procedure
1. Configure a wireless service.
# Create a wireless service.
94
Select Interface Setup > Wireless > Access Service from the navigation tree, and then click Add to display
the page for creating a wireless service.
Figure 71 Create a wireless service
95
d. Click Apply.
3. Enable the wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree to display the page for
enabling a wireless service.
Figure 73 Enable the wireless service
a. Add a local user in the MAC Address box. 00-14-6c-8a-43-ff is used in this example.
b. Click Add.
5. Enable 802.11g radio (By default, 802.11g radio is enabled. Therefore, this step is optional. )
Select Interface Setup > Wireless > Radio from the navigation tree to display the Radio page. Make sure
that 802.11g is enabled.
6. Configure the client.
Launch the client, and refresh the network list. Select the configured service in Choose a wireless network
(mac-auth, in this example), and click Connect. If the MAC address of the client is in the MAC address list,
the client can pass MAC authentication and access the wireless network.
96
Figure 75 Configure the client
97
• The IP address of the device is 10.18.1.1. On the device, configure the shared key for
communication with the RADIUS server as expert, and configure the device to remove the domain
name of a username before sending it to the RADIUS server.
Figure 76 Network diagram
RADIUS server
10.18.1.88
10.18.1.1
IP network SSID:mac-auth
Switch Router
Client
Configuration procedure
1. Configure wireless service.
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and then click Create to
display the page for creating a wireless service.
Figure 77 Create a wireless service
98
Figure 78 Security setup
99
Log in to the iMC management platform. Select the Service tab, and select User Access Manager > Access
Device Management from the navigation tree to display the access device configuration page. Click Add
on the page to display the configuration page shown in Figure 80:
a. Enter the shared key 12345678. Keep the default values for other parameters.
b. Select or manually add the access device with the IP address 10.18.1.1.
# Add a service.
Select the Service tab, and select User Access Manager > Service Configuration from the navigation tree to
display the page for adding a service. Then click Add on the page to display the following configuration
page. Set the service name to mac, and keep the default values for other parameters.
Figure 81 Add service
# Add an account.
Select the User tab, and then select User > All Access Users from the navigation tree to display the user
page. Then, click Add on the page to display the page as shown in Figure 82.
a. Enter username 00-14-6c-8a-43-ff.
b. Set the account name and password both to 00-14-6c-8a-43-ff.
c. Select the service mac.
100
Figure 82 Add account
101
Figure 83 Network diagram
Configuration procedure
1. Configure wireless service.
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and then click Add to display
the page for creating a wireless service.
Figure 84 Create a wireless service
102
Figure 85 Security setup
103
Figure 86 Add access device
# Add a service.
Select the Service tab, and then select User Access Manager > Service Configuration from the navigation
tree to display the Add Service Configuration page. Then click Add on the page to display the following
configuration page.
a. Set the service name to dot1x.
b. Set the Certificate Type to EAP-PEAP AuthN and the Certificate Sub Type to MS-CHAPV2 AuthN.
# Add an account.
Select the User tab, and then select User > All Access Users from the navigation tree to display the user
page. Then, click Add on the page to display the page shown in Figure 88.
a. Enter username user.
b. Set the account name to user and password to dot1x.
c. Select the service dot1x.
104
Figure 88 Add account
Double click the icon at the bottom right corner of your desktop. The Wireless Network Connection
Status window appears. Click the Properties button in the General tab. The Wireless Network Connection
Properties window appears. In the Wireless Networks tab, select wireless network with the SSID dot1x,
and then click Properties. The dot1x Properties window appears. Then, in the Authentication tab, select
Protected EAP (PEAP) from the EAP type list, and click Properties. In the window that appears, clear
Validate server certificate, and click Configure. In the dialog box that appears, clear Automatically use my
Windows logon name and password (and domain if any). The configuration procedure is as shown
in Figure 89 through Figure 91.
105
Figure 89 Configure the wireless card (I)
106
Figure 90 Configure the wireless card (II)
107
Figure 91 Configure the wireless card (III)
108
Configuration procedure
1. Configure a wireless service.
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and then click Add to display
the page for creating a wireless service.
Figure 93 Create a wireless service
109
802.11n clients can access the wireless network. If Client 802.11n Only is configured, only
001e-c144-473a can access the wireless network.
Configuration guidelines
When you configure 802.11n, follow these guidelines:
• Select Interface Setup > Wireless > Radio from the navigation tree, select the radio unit to configure,
and click the corresponding icon to display the radio configuration page. On that page, you
can modify the 802.11n-related parameters, including Bandwidth Mode, A-MSDU, A-MPDU, Short
GI, and Client 802.11n Only (permitting only 802.11n users to access the wireless network).
• Make sure that 802.11n(2.4GHZ) is enabled.
• Select Interface Setup > Wireless > Radio from the navigation tree to modify the 802.11n rate.
110
Configuring client mode
In client mode, a router accesses the wireless network as a client. Multiple hosts or printers in the wired
network can access the wireless network through the router.
Figure 95 Client mode
111
NOTE:
• Support for radio mode types depends on your device model.
• You cannot enable an access service or WDS service on a radio interface with the client mode enabled.
• To modify the radio mode, select Radio > Radio from the navigation tree, click the icon of the target radio, and
change the radio mode using the Radio Mode option.
• If the 802.11(2.4GHz) client mode is used, the client can scan 802.11(2.4GHz) wireless services.
With the client mode enabled, you can check the existing wireless services in the wireless service list.
Figure 97 Check the wireless service list
112
• Shared key
• RSN + PSK
Table 61 Configuration
Item Description
Specify the network authentication mode:
• Open System—Open system authentication (no
authentication).
AuthMode • Shared Key—Shared key authentication, which requires the
client and the device to be configured with the same shared
key.
• RSN+PSK—PSK authentication.
Set the data encryption mode:
• Clear—No encryption.
CipherSuite
• WEP—WEP encryption.
• TKIP/CCMP—TKIP/CCMP encryption.
Password Configure the WEP key.
There are four static keys in WEP. Their key indexes are 1, 2, 3,
KeyID and 4. The key corresponding to the specified key index is used
for encrypting and decrypting frames.
2. Method II:
You can also enter a wireless service to specify the wireless service to be connected on the page that is
displayed after clicking the Connect icon of the wireless service.
Figure 99 Associate the specified wireless service
Enter the specified wireless service in the Wireless Service Name field, and click Connect. Then the dialog
box in Figure 98 appears. Set the options on the dialog box according to the specified wireless service
type.
Displaying statistics
Select Interface Setup > Wireless Service > Client Mode from the navigation tree, and click Statistic
Information to display the page shown in Figure 100.
113
Figure 100 Display statistics
Internet
Gateway
AP
PSK PSK
Client Client
PSK
Router
PC Printer Client
114
Configuration procedure
1. Enable the client mode.
Select Interface Setup > Wireless Service > Client Mode from the navigation tree, and click Connect Setup
to display the page shown in Figure 102.
Figure 102 Enable the client mode
Select the option corresponding to 802.11g, and click Enable. With the client mode enabled, you can
check the existing wireless services in the wireless service list.
Figure 103 Check the wireless service list
115
b. Specify the CipherSuite as CCMP/AES.
c. Set the Password to that on the AP, 12345678.
d. Click Apply.
• You can see that the client with MAC address 0014-6c8a-43ff and the router with MAC address
000f-e2333-5510 have been successfully associated with the AP.
• The wired devices on the right (such as printers and PCs) can access the wireless network through
the router.
Configuration guidelines
As shown in Figure 106, if the router uses two radio interfaces at the same time, the client connecting to
radio 2 can access the AP through the router.
Figure 106 Network diagram
116
Configuring radios
802.11b/g/n operates in 2.4 GHz band. Each band can be divided into multiple channels for wireless
communication. You can configure and adjust the channels to achieve optimal performance.
To configure a radio, select Interface Setup > Wireless > Radio from the navigation tree to display the
Radio page, select the AP you want, and then click the icon to display the page for AP radio setup
page.
Figure 107 Radio setup
Table 62 Configuration
Item Description
Radio Unit Display the selected radios.
Specify the working channel of the radio, which varies with radio types and
country codes.
auto—The working channel is automatically selected. If you select this mode,
Channel the AP checks the channel quality in the WLAN network and selects the
channel of the best quality as its working channel.
If you modify the working channel configuration, the transmit power is
automatically adjusted.
802.11n The option is available only when the device supports 802.11n.
117
Item Description
802.11n can bond two adjacent 20-MHz channels together to form a
40-MHz channel. During data forwarding, the two 20-MHz channels can
work separately with one acting as the primary channel and the other acting
as the secondary channel, or they can work together as a 40-MHz channel.
This provides a simple way of doubling the data rate.
By default, the channel bandwidth of the 802.11n radio (2.4GHz) is 20
MHz.
bandwidth mode
NOTE:
• If the channel bandwidth of the radio is set to 40 MHz, a 40 MHz
channel is used as the working channel. If no 40 MHz channel is
available, a 20 MHz channel is used. For the specifications, see IEEE
P802.11n D2.00.
• If you modify the bandwidth mode configuration, the transmit power is
automatically adjusted.
118
Figure 108 Radio setup (advanced setup)
Table 63 Configuration
Item Description
Preamble is a pattern of bits at the beginning of a frame so that the receiver
can sync up and be ready for the real data. There are two different kinds of
preambles:
• Short preamble—A short preamble improves network performance.
Preamble
Therefore, this option is always selected.
• Long preamble—A long preamble ensures compatibility between access
point and some legacy client devices. Therefore, you can select this
option to make legacy client devices support short preamble.
After the ANI function is enabled, the device automatically adjusts the noise
immunity level according to the surrounding signal environment to eliminate
ANI RF interference.
• Enable—Enables ANI.
• Disable—Disables ANI.
Client Max Count Maximum number of clients that can be associated with one radio.
119
Item Description
Interval for sending beacon frames. Beacon frames are transmitted at a
Beacon Interval regular interval to allow mobile clients to join the network. Beacon frames
are used for a client to identify nearby APs or network control devices.
RTS threshold length. If a frame is larger than this value, the RTS mechanism
is used.
RTS is used to avoid data collisions in a WLAN.
A smaller RTS threshold causes RTS packets to be sent more often, consuming
more available bandwidth. However, the more often RTS packets are sent,
RTS Threshold the quicker the system can recover from interference or collisions.
In a high-density WLAN, you can decrease the RTS threshold by a rational
value to reduce collisions in the network.
NOTE:
The RTS mechanism occupies bandwidth. Therefore, this mechanism applies only
to data frames larger than the RTS threshold.
Number of beacon intervals between DTIM transmissions. The device sends
DTIM Period
buffered broadcast/multicast frames when the DTIM counter reaches 0.
Number of retransmission attempts for unicast frames larger than the RTS
Long Retry Threshold
threshold.
Number of retransmission attempts for unicast frames smaller than the RTS
Short Retry Threshold
threshold if no acknowledgment is received for it.
Interval for which a frame received by a device can stay in the buffer
Max Receive Duration
memory.
120
Configuring data transmit rates
Configuring 802.11b/802.11g rates
Select Interface Setup > Wireless > Radio from the navigation tree, and then click the Rate tab to display
the page shown in Figure 109.
Figure 109 Set 802.11a/802.11b/802.11g rates
Table 64 Configuration
Item Description
Configure rates (in Mbps) for 802.11b.
By default:
• Mandatory rates—1 and 2.
802.11b • Supported rates—5.5 and 11.
• Multicast rate—Automatically selected from the mandatory rates. The
transmission rate of multicasts in a BSS is selected from the mandatory
rates supported by all clients.
121
Configuring 802.11n MCS
Configuration of mandatory and supported 802.11n rates is achieved by specifying the maximum MCS
index.
Select Interface Setup > Wireless > Radio from the navigation tree, and then click the Rate tab to display
the page shown in Figure 110.
Figure 110 Set 802.11n rate
Table 65 Configuration
Item Description
Set the maximum MCS index for 802.11n mandatory rates.
NOTE:
Mandatory Maximum MCS
If you select the client dot11n-only option, you must configure the mandatory
maximum MCS.
Set the multicast MCS for 802.11n.
The multicast MCS is adopted only when all clients use 802.11n. If a
non-802.11n client exists, multicast traffic is transmitted at a mandatory MCS
data rate.
Multicast MCS
NOTE:
When the multicast MCS takes effect, the corresponding data rates defined for
20 MHz are adopted regardless of whether the 802.11n radio operates in 40
MHz mode or in 20 MHz mode.
Supported Maximum MCS Set the maximum MCS index for 802.11n supported rates.
NOTE:
For more information about MCS, see HP A-MSR Router Series WLAN Configuration Guide.
122
Displaying radio
Displaying wireless services bound to a radio
Select Interface Setup > Wireless > Summary from the navigation tree, and then click the Radio tab. Click
the specified radio unit, and then click the Wireless Service tab to view the wireless services bound to the
radio.
Figure 111 Display wireless services bound to the radio
NOTE:
The Noise Floor item in the table indicates various random electromagnetic waves during the wireless
communication. For the environment with a high noise floor, you can improve the SNR by increasing the
transmit power or by reducing the noise floor.
123
Figure 112 Display detailed radio information
Field Description
WLAN-Radio1/0 current state: UP State of the radio interface.
Sent out: 2 authentication frames, 2 association Number of authentication and association frames
frames sent.
124
Field Description
Input packet statistics of the interface:
• Number of packets, number of bytes
Input : 70686 packets, 6528920 bytes • Number of unicast packets, number of bytes of
: 255 unicasts, 34440 bytes unicast packets
: 70461 multicasts/broadcasts, 6494480 bytes • Number of multicasts/broadcast packets, number
of bytes of multicasts/broadcast packets
: 0 fragmented
• Number of fragmented packets
: 414 discarded, 26629 bytes
• Number of discarded packets, number of
: 0 duplicates, 3785 FCS errors discarded bytes
: 0 decryption errors • Number of duplicate frames, number of FCS
errors
• Number of encryption errors
Output packet statistics of the interface:
• Number of packets, number of bytes
Output: 3436 packets, 492500 bytes • Number of unicast packets, number of bytes of
: 3116 unicasts, 449506 bytes unicast packets
: 320 multicasts/broadcasts, 42994 bytes • Number of multicasts/broadcast packets, number
of bytes of multicasts/broadcast packets
: 0 fragmented
• Number of fragmented packets
: 948 discarded, 100690 bytes
• Number of discarded packets, number of
: 0 failed RTS, 1331 failed ACK discarded bytes
: 4394 transmit retries, 1107 multiple transmit • Number of failed RTS packets, number of failed
retries ACK packets
• Number of retransmitted frames, number of
transmission retries
125
Configuring WLAN security
When it comes to security, a WLAN is inherently weaker than a wired LAN because all wireless devices
use the air as the transmission media. This means that the data transmitted by one device can be received
by any other device within the coverage of the WLAN. To enhance WLAN security, you can use
whitelists, blacklists, and user isolation to control user access and behavior.
126
Figure 113 Dynamic blacklist configuration page
Table 67 Configuration
Item Description
• Enable—Enables dynamic blacklist.
• Disable—Disables dynamic blacklist.
Dynamic Blacklist NOTE:
Before enabling the dynamic blacklist function, select the Flood Attack Detect option
in the WIDS Setup page.
Configure the lifetime of the entries in the blacklist. When the lifetime of an entry
Lifetime
expires, the entry is removed from the blacklist.
NOTE:
These attacks can be detected through a dynamic blacklist: Assoc-Flood, Reassoc-Flood, Disassoc-Flood,
ProbeReq-Flood, Action-Flood, Auth-Flood, Deauth-Flood and NullData-Flood.
127
Configuring static blacklist
On the blacklist configuration page shown in Figure 113, click the Static tab to display the static blacklist
configuration page shown in Figure 114. Click Add Static to display the static blacklist configuration
page.
Figure 114 Static blacklist configuration
Table 68 Configuration
Item Description
MAC Address If you select this option, add a MAC address to the static blacklist.
Select Current Connect If you select this option, the table below it lists the current existing clients. Select
Client the options of the clients to add their MAC addresses to the static blacklist.
Configuring whitelist
Select Interface Setup > Wireless > Security from the navigation tree, and then click the Whitelist tab.
Click Add to display the whitelist configuration page.
Figure 115 Whitelist configuration
128
Table 69 Configuration
Item Description
MAC Address If you select this option, add a MAC address to the whitelist.
Select Current Connect If you select this option, the table below it lists the current existing clients. Select
Client the checkboxes for the clients to add their MAC addresses to the whitelist.
User isolation
If a device has the user isolation feature enabled, clients associated with it are isolated at Layer 2.
As shown in Figure 116, after user isolation is enabled on the device, no clients can ping each other or
learn each other's MAC or IP addresses, because they cannot exchange Layer 2 packets.
Figure 116 Network diagram
129
Configuring user isolation
Select Interface Setup > Wireless > Security from the navigation tree, and then click the User Isolate tab to
display the page shown in Figure 117.
Figure 117 User isolation configuration
Item Description
• Enable—Enables user isolation on the AP to isolate the clients associated with
it at Layer 2.
User Isolate
• Disable—Disables the user isolation.
By default, wireless user isolation is disabled.
130
Configuring WLAN QoS
An 802.11 network offers wireless access based on the CSMA/CA channel contention. All clients
accessing the WLAN have equal channel contention opportunities, and all applications carried on the
WLAN use the same channel contention parameters. A live WLAN, however, is required to provide
differentiated access services to address diversified requirements of applications for bandwidth, delay,
and jitter.
To provide applications with QoS services, IEEE developed 802.11e for the 802.11-based WLAN
architecture.
While IEEE 802.11e was being standardized, Wi-Fi Alliance defined the WMM standard to allow QoS
provision devices of different vendors to interoperate. WMM makes a WLAN network capable of
providing QoS services.
NOTE:
For introduction to the WLAN QoS terminology and the WMM protocol, see HP A-MSR Router Series
WLAN Configuration Guide.
Select the radio unit to configure, and click Enable. By default, wireless QoS is enabled.
NOTE:
The WMM protocol is the foundation of the 802.11n protocol. Therefore, when the radio works in
802.11n (2.4 GHz) radio mode, you must enable WMM. Otherwise, the associated 802.11n clients may
fail to communicate.
131
Setting the SVP service
Select Interface Setup > Wireless > Wireless QoS from the navigation tree on the left of the interface, and
then select QoS Service to display the page for displaying wireless QoS.
Figure 119 Wireless QoS
Find the radio you want in the AP list, and then click the icon in the Operation column to display the
page for setting SVP mapping.
Figure 120 Set the SVP mapping AC
Table 71 Configuration
Item Description
Radio Display the selected radio.
Select the SVP Mapping option, and then select the mapping AC to be used
by the SVP service:
• AC-VO
SVP Mapping
• AC-VI
• AC-BE
• AC-BK
NOTE:
SVP mapping applies only to non-WMM client access.
132
Setting CAC admission policy
Select Interface Setup > Wireless > Wireless QoS from the navigation tree on the left of the interface, and
then click the QoS Service tab. Click the corresponding icon of the radio you want in the Operation
column to display the page for setting CAC admission policy.
Figure 121 Set CAC admission policy
Table 72 Configuration
Item Description
Users-based admission policy (maximum number of clients allowed to be
connected). A client is counted only once, even if it is using both AC-VO and
Client Number AC-VI.
By default, the users-based admission policy applies, with the maximum
number of users being 20.
133
Table 73 Configuration
Item Description
Radio Display the selected radio.
If you select the No ACK checkbox, the No ACK policy is used by the device.
No ACK
By default, the normal ACK policy is used by the device.
AC-BE 0 3 4 6
AC-VI 94 1 3 4
AC-VO 47 1 2 3
NOTE:
• ECWmin cannot be greater than ECWmax.
• On a device operating in 802.11b radio mode, HP recommends that you set the TXOP-Limit to 0, 0, 188, and 102
for AC-BK, AC-BE, AC-VI, and AC-VO, respectively.
134
Table 75 Configuration
Item Description
Radio Display the selected radio.
AC-BE 0 3 4 10
AC-VI 94 2 3 4
AC-VO 47 2 2 3
NOTE:
• ECWmin cannot be greater than ECWmax.
• If all clients operate in 802.11b radio mode, HP recommends that you set TXOPLimit to 188 and 102 for AC-VI and
AC-VO, respectively.
• If some clients operate in 802.11b radio mode and some clients operate in 802.11g radio mode in the network, the
TXOPLimit parameters in Table 76 are recommended.
• Once you enable CAC for an AC, it is enabled automatically for all ACs with higher priority. For example, if you
enable CAC for AC-VI, CAC is also enabled for AC-VO. However, enabling CAC for AC-VO does not enable CAC
for AC-VI.
135
Display radio statistics
Select Interface Setup > Wireless > Wireless QoS from the navigation tree, and then click the Radio
Statistics tab to display the page that displays radio statistics. Click a radio to see its details.
Figure 124 Display radio statistics
Field Description
Radio interface WLAN radio interface.
Radio chip max AIFSN Maximum AIFSN allowed by the radio chip.
Radio chip max ECWmin Maximum ECWmin allowed by the radio chip.
Radio chip max TXOPLimit Maximum TXOPLimit allowed by the radio chip.
Radio chip max ECWmax Maximum ECWmax allowed by the radio chip.
136
Field Description
Number of requests rejected due to invalid delay
Calls rejected due to invalid delaybound
bound.
ECWmin ––
ECWmax ––
AIFSN ––
TXOPLimit ––
137
Displaying client statistics
Select Interface Setup > Wireless > Wireless QoS from the navigation tree, and then click the Client
Statistics tab to display the page that displays client statistics. Click a client name to see its details.
Figure 125 Display client statistics
Field Description
MAC address MAC address of the client.
SSID SSID.
QoS mode:
QoS Mode • WMM—Indicates that the client is a QoS client.
• None—Indicates that the client is a non-QoS client.
Max SP length Maximum service period.
AC Access category.
Assoc State APSD attribute of the four ACs when a client accesses the AP.
138
Field Description
Discard packets Number of dropped packets.
Table 79 Configuration
Item Description
Wireless Service Display an existing wireless service.
• Inbound—From clients to the device.
• Outbound—From the device to clients.
Direction
• Both—Includes inbound (from clients to the device) and outbound
(from the device to clients).
139
Item Description
Set the rate of the clients:
• If you select the static mode, static rate is displayed, and the rate is
Rate the bandwidth of each client.
• If you select the dynamic mode, share rate is displayed, and the
rate is the total bandwidth of all clients.
Configuration procedure
1. Configure the access service.
For related configurations, see "Wireless access configuration examples." You can strictly follow the steps
in the related configuration example to configure the wireless service.
2. Configure wireless QoS.
# Select Interface Setup > Wireless > Wireless QoS from the navigation tree, and then click the QoS
Service tab to display the page shown in Figure 128. Make sure that WMM is enabled.
Figure 128 Wireless QoS configuration page
# Select the radio unit to configure in the list, and then click the corresponding icon in the Operation
column to display the page for configuring wireless QoS. In the Client EDCA list, select the priority type
(AC_VO is used in this example) to be modified, and then click the corresponding icon in the
Operation column to display the page for setting client EDCA parameters.
140
Figure 129 Enable CAC
141
Static rate limiting configuration example
Network requirements
As shown in Figure 131, two clients access the WLAN through a SSID named service1. Limit the
maximum bandwidth per client to 128 kbps on the device.
Figure 131 Network diagram
Configuration procedure
1. Configure the access service.
For the configuration procedure, see "Wireless access configuration examples." You can strictly follow
the related configuration example to configure the wireless service.
2. Configure static rate limiting.
Select Interface Setup > Wireless > Wireless QoS from the navigation tree, click Client Rate Limit, and then
click Add to display the page for configuring rate limit settings for clients.
Figure 132 Configure static rate limiting
142
Verifying the configuration
• Client 1 and Client 2 access the WLAN through an SSID named service1.
• Check that traffic from Client 1 is rate limited to around 128 kbps and so is traffic from Client 2.
Configuration procedure
1. Configure the wireless service.
For the configuration procedure, see "Wireless access configuration examples." You can strictly follow
the related configuration example to configure the wireless service.
2. Configure dynamic rate limiting.
Select Interface Setup > Wireless > Wireless QoS from the navigation tree, click Client Rate Limit, and then
click Add to display the page for configuring rate limit settings for clients.
Figure 134 Configure dynamic rate limiting
143
d. Enter 8000 in the share rate field.
e. Click Apply.
144
Configuring advanced WLAN settings
District code
Radio frequencies for countries and regions vary based on country regulations. A district code determines
characteristics such as frequency range, channel, and transmit power level. Configure the valid country
code or area code for a WLAN device to meet the specific country regulations.
Item Description
Select a district code.
District Code Configure the valid district code for a WLAN device to
meet the country regulations.
NOTE:
• If the list is not available, the setting is preconfigured to meet the requirements of the target market and is locked. It
cannot be changed.
• Support for district code depends on your device model.
145
Configuring a channel busy test
Select Interface Setup > Wireless Service > Advanced > Channel Busy Test from the navigation tree to
display the channel busy test configuration page.
Figure 136 Channel busy test configuration page
Click the icon of a target AP to display the channel busy testing page, as shown in Figure 137.
Figure 137 Test busy rate of channels
146
Table 81 Configuration
Item Description
Radio Unit Display the radio unit, which takes the value of 1 or 2.
147
Configuring 3G management
You can connect a router to a 3G modem through the USB interface on the main board of the router.
After it is connected to an external UIM card, the 3G modem can access a wireless network and carry out
3G wireless communications.
The router supports 3G modems provided by different vendors. As a peripheral, the 3G modem is not a
part of the router. However, you can maintain and manage the 3G modem through the web interface of
the router.
Table 82, Table 83, and Table 84 describe the 3G modem information, UIM card information, and 3G
network information, respectively.
148
Table 82 3G modem information
Item Description
State of the 3G modem:
• Normal—A 3G modem is connected to the router.
3G Modem State
• Absent or unrecognized modem—No 3G modem is connected to the router,
or the modem cannot be recognized.
Item Description
State of the UIM card:
• Absent.
• Being initialized.
• Fault.
UIM Card
• Destructed.
State
• PIN code protection is disabled.
• PIN code protection is enabled. Enter the PIN code for authentication.
• PIN code protection is enabled, and the PIN code has passed the authentication.
• The PIN code has been blocked. Enter the PUK code to unblock it.
Item Description
Mobile Network 3G network where the UIM card resides
149
Managing the pin code
NOTE:
• If the PIN code is entered incorrectly a number of times that exceeds the maximum attempts allowed by the device,
the PIN code is blocked. To unblock the PIN code, you must enter the correct PUK code.
• If the PUK code is entered incorrectly a number of times that exceeds the maximum attempts allowed by the device,
the UIM card is destructed. Be cautious when entering the PUK code.
Select 3G > PIN Code Management from the navigation tree to display the PIN code management page.
The PIN code allows you to perform different operations, depending on the UIM card status.
When the PIN code protection is disabled for the UIM card
Figure 140 shows the PIN code management page in the situation where the PIN code protection for the
UIM card is disabled. To enable the PIN code protection, enter the PIN code correctly, and then click
Apply. A pin code comprises four to eight figures.
Figure 140 PIN code management page II
150
When the UIM card has passed the PIN code authentication
Figure 142 shows the PIN code management page in the situation where the UIM card has passed the
PIN code authentication. You can perform the following operations:
• In the Disable PIN Code Protection field, enter the PIN code correctly, and then click Apply to disable
the PIN code protection for the UIM card.
• In the PIN Code Modification field, enter the current PIN code correctly and the new PIN code twice,
and then click Apply to modify the current PIN code.
Figure 142 PIN code management page IV
When the PUK code must be entered to unblock the PIN code of the UIM card
Figure 143 shows the PIN code management page in the situation where the PIN code of the UIM card
has been locked and the PUK code must be entered. To unblock the PIN code of the UIM card and set a
new PIN code, enter the PUK code correctly and the new PIN code twice, and then click Apply.
Figure 143 PIN code management page V
151
Configuring NAT
NOTE:
For more information about NAT, see HP A-MSR Router Series Layer 3—IP Services Configuration Guide.
Required.
Configuring an internal server You can configure an internal server by mapping a public IP
address and port number to the private IP address and port
number of the internal server.
Optional.
Enabling application layer protocol
Enable NAT to check specified application layer protocols.
check
By default, all application layer protocols are checked by NAT.
Optional.
Configuring connection limit
Limit the number of connections from a source IP address.
152
Figure 144 Dynamic NAT Configuration
Table 85 Configuration
Item Description
Interface Specify an interface on which to enable the NAT policy.
Specify the start and the end IP addresses for the NAT address pool.
The start IP address must be lower than the end IP address. If the end IP address and
the start IP address are the same, you are specifying only one IP address.
Start IP Address NOTE:
End IP Address • Only one translation mode can be selected for the same address pool.
• NAT address pools used by some device models cannot be those used by other
address translation policies, IP addresses of interfaces with Easy IP enabled, or
external IP addresses of internal servers.
153
Configuring a DMZ host
1. Create a DMZ host.
Select NAT Configuration > NAT Configuration from the navigation tree, and then click the DMZ HOST tab
to display the page shown in Figure 145.
Figure 145 Create a DMZ host
Table 86 Configuration
Item Description
Host IP Address Specify the internal IP address in a one-to-one static NAT mapping.
Global IP Address Specify the external IP address in a one-to-one static NAT mapping.
154
Figure 146 Enable the DMZ host on interfaces
155
Figure 147 Internal server configuration page
Table 87 Configuration
Item Description
Interface Specify an interface on which the NAT policy is to be enabled.
156
Enabling application layer protocol check
Select NAT Configuration > NAT Configuration from the navigation tree, and then click the ALG tab to
display the application layer protocol check configuration page shown in Figure 148.
Figure 148 Application layer protocol check
Table 88 Configuration
Item Description
Enable/disable checking the specified application layer protocols, including DNS, FTP,
Protocol Type
PPTP, NBT, ILS, H.323, and SIP.
Table 89 Configuration
Item Description
Enable connection limit Enable/disable connection limit.
Set the maximum number of connections that can be initiated from a source IP
Max Connections
address.
157
NAT configuration examples
Private hosts to access public network configuration example
Network requirements
As shown in Figure 150, a company has three public IP addresses ranging from 202.38.1.1/24 to
202.38.1.2/24, and the internal network address is 10.110.0.0/16. Specifically, the company has the
following requirements:
• The internal users can access the Internet by using public addresses 202.38.1.2 and 202.38.1.3.
• Configure the upper limit of connections as 1000 based on the source IP address.
Figure 150 Network diagram
Configuration procedure
1. Configure the IP address of each interface. (Details not shown)
# Configure dynamic NAT on Ethernet 0/2.
• Select NAT Configuration > NAT Configuration to display the dynamic NAT configuration page
shown in Figure 151.
158
Figure 151 Configure dynamic NAT
159
Internal server configuration example
Network requirements
A company provides one FTP server and two web servers for external users to access. The internal
network address is 10.110.0.0/16. The internal network address for the FTP server is 10.110.10.3/16,
and that for web server 1 is 0.110.10.1/16. For web server 2, it is 10.110.10.2/16. The company has
three public IP addresses ranging from 202.38.1.1/24 to 202.38.1.3/24. Specifically, the company
has the following requirements:
• External hosts can access the company internal servers.
• 202.38.1.1 is used as the public IP address for the internal servers, and port number 8080 is used
for web server 2.
Figure 153 Network diagram
10.110.10.1/16 10.110.10.2/16
Web server 1 Web server 2
Eth0/1 Eth0/2
10.110.10.10/16 202.38.1.1/24
Internet
Router Host
FTP server
10.110.10.3/16
Configuration procedure
# Configure the FTP server.
• Select NAT Configuration > NAT Configuration from the navigation tree, and then click the Internal
Server tab to display the internal server configuration page shown in Figure 154.
160
Figure 154 Configure the FTP server
161
Figure 155 Configure web server 1
162
Figure 156 Configure web server 2
163
Configuring access control
Access control allows you to control access to the Internet from the LAN by setting the time range, IP
addresses of computers in the LAN, port range, and protocol type. All data packets matching these
criteria are denied access to the Internet.
Up to 10 access control policies can be configured, and they are matched in ascending order of
sequence number. The comparison stops immediately after one match is found.
NOTE:
• The 10 access control policies correspond to ACL 3980 through 3989, respectively, in ascending order of sequence
number. Modifying these ACLs may impact the corresponding access control policies.
• Access control is effective only in the outgoing direction of WAN interfaces.
164
Table 90 Configuration
Item Description
Set the time range of a day for the rule to IMPORTANT:
Begin-End Time take effect. The start time must be earlier
than the end time. Set both types of time ranges, or set neither
of them. To set neither of them, make sure
the Begin-End Time is 00:00 - 00:00 and
Select the days of a week for the rule to that no days of a week are selected. Setting
Week
take effect. neither of them means that the rule takes
effect all the time.
Specify to control accesses based on the protocol used for data transmission.
Protocol These options are available: TCP, UDP, and IP.
For information about which services use which protocols, see Table 91.
Configure the IP address range of computers. To control a single IP address, enter the
Source IP Address
address in the two fields.
FTP TCP 21
Telnet TCP 23
TFTP UDP 69
web TCP 80
165
Figure 158 Network diagram
Internet
Eth0/1
Router
Configuration procedure
# Configure an access control policy to prohibit Host A to Host C from accessing the Internet during work
time.
• Select Security Setup > Access from the navigation tree, and then perform the configurations shown
in Figure 159.
Figure 159 Configure an access control policy
166
Configuring URL filtering
The URL filtering function allows you to deny access to certain Internet webpages from the LAN by setting
keywords and URL addresses.
NOTE:
The URL filtering function applies only to the outbound direction of WAN interfaces.
167
Figure 161 URL filtering configuration page
Table 92 Configuration
Item Description
Set the URL addresses to be filtered. NOTE:
URL
You can enter a regular expression.
The URL and keyword are in OR relation.
Set the keywords to be filtered. You When both are configured, the system
Keyword
can enter a regular expression. generates two URL filtering conditions.
If the Import filter list file checkbox is selected, you can import filtering rules from a
Import file.
filter list File Name Specify the name and path of the file in the local host from which you obtain the
file file.
For a description of the content format of filter list files, see Figure 161.
168
URL filtering configuration example
Network requirements
As shown in Figure 162, internal users access the Internet through Router. Configure the URL filtering
function to disallow access of all internal users to Internet website www.webflt.com.
Figure 162 Network diagram
Internet
Eth0/1
Router
Configuration procedure
# Configure the URL filtering function.
• Select Security Setup > URL Filter from the navigation tree. Click Add and then perform the following
configurations, as shown in Figure 163.
169
Figure 163 Configure the URL filtering function
a. Select the URL checkbox, and then enter www.webflt.com in the URL field.
b. Click Apply.
170
Configuring MAC address filtering
MAC address filtering is used to match MAC addresses of hosts accessing the network through the device
and to deny or permit hosts with matched MAC addresses to access the network through the device.
NOTE:
MAC address filtering applies only to the outgoing direction of Layer 3 Ethernet interfaces and dialer
interfaces.
Item Description
Select a MAC address filtering type:
• Disable MAC address filtering
• Permit access to the Internet—Enables MAC address filtering to permit only the
hosts whose MAC addresses are on the MAC address list below to access the
network through the device.
filtering type
• Deny access to the Internet—Enables MAC address filtering to deny the hosts
whose MAC addresses are on the MAC address list below from accessing the
network through the device.
A MAC address list is displayed in the lower part of the page after you select Permit
access to the Internet or Deny access to the Internet.
171
Configuring the MAC addresses to be filtered
Select Security Setup > MAC Address Filtering from the navigation tree to display the MAC address
filtering configuration page shown in Figure 164. Select Permit access to the Internet or Deny access to the
Internet, and the permitted or denied MAC addresses are listed in the lower part of the page, as shown
in Figure 165. Click Add to display the Add MAC Address page, as shown in Figure 166.
Figure 165 MAC address filtering (permit access to the Internet)
172
Table 94 Configuration
Item Description
Use the customized MAC address Enter the MAC addresses to be filtered, or select them from the learned
Use the learned MAC addresses MAC addresses list.
NOTE:
If you select Permit access to the Internet or Deny access to the Internet as the filtering type, the selected
filtering type takes effect as long as you add the MAC addresses for this type, regardless of whether you
click Apply at the filtering type configuration area on the MAC Address Filtering page.
Internet
Eth0/1
Router
000d-88f8-0dd7 000d-88f7-b8d6
192.168.1.17 192.168.1.18
Configuration procedure
# Configure the MAC address filtering function.
• Select Security Setup > MAC Address Filtering from the navigation tree, and then perform the
following configurations, as shown in Figure 168.
173
Figure 168 Select MAC address filtering type
174
Configuring attack protection
Complete the following tasks to configure attack protection functions in the web interface:
• Enable the blacklist function.
• Add a blacklist entry manually.
• View blacklist entries.
• Configure intrusion detection.
Attack protection is an important network security feature. It can determine whether received packets are
attack packets according to the packet contents and behaviors and, if detecting an attack, take measures
to deal with the attack. Protection measures include logging the event, dropping packets, updating the
session status, and blacklisting the source IP address.
Blacklist function
The blacklist function is an attack protection measure that filters packets by source IP address. Compared
with ACL packet filtering, blacklist filtering is simpler in matching packets and can, therefore, filter
packets at a high speed. Blacklist filtering is very effective in filtering packets from certain IP addresses.
One outstanding benefit of the blacklist function is that it allows the device to add and delete blacklist
entries dynamically. This is done by working in conjunction with the scanning attack protection function.
When the device detects a scanning attack according to the packet behavior, it adds the IP address of
the attacker to the blacklist, so packets from the IP address are filtered. Blacklist entries added
dynamically are aged in a specified period of time.
The blacklist function also allows you to add and delete blacklist entries manually. Blacklist entries added
manually can be permanent blacklist entries or non-permanent blacklist entries. A permanent entry always
exists in the blacklist unless you delete it manually. You can configure the aging time of a non-permanent
entry. After the timer expires, the device automatically deletes the blacklist entry, allowing packets from
the corresponding IP address to pass.
175
Table 95 Types of single-packet attacks
A Fraggle attacker sends large amounts of UDP echo packets (with the UDP port
number of 7) or Chargen packets (with the UDP port number of 19) to a subnet
Fraggle
broadcast address. This causes a large quantity of responses in the network, using
up the network bandwidth of the subnet or crashing the target host.
A LAND attacker forges large amounts of TCP SYN packets with both the source
address and destination address being the IP address of the target, causing the
LAND target to send SYN ACK messages to itself and establish half-open connections as a
result. In this way, the attacker may deplete the half-open connection resources of
the target, making it unable to work normally.
A WinNuke attacker sends OOB data packets to the NetBIOS port (139) of a target
running a Windows system. The pointer fields of these attack packets are
WinNuke overlapped, resulting in NetBIOS fragment overlaps. This causes the target host that
has established TCP connections with other hosts to crash when it processes these
NetBIOS fragments.
Different operating systems process abnormal TCP flags differently. The attacker
sends TCP packets with abnormal TCP flags to the target host to probe its operating
TCP Flag
system. If the operating system cannot process such packets properly, the host
crashes down.
Upon receiving an ICMP unreachable packet, some systems conclude that the
destination is unreachable and drop all subsequent packets destined for the
ICMP Unreachable
destination. By sending ICMP unreachable packets, an attacker can cut off the
connection between the target host and the network.
The Tracert program usually sends UDP packets with a large destination port
number and an increasing TTL (starting from 1). The TTL of a packet is decreased by
1 when the packet passes each router. Upon receiving a packet with a TTL of 0, a
Tracert
router sends an ICMP time exceeded message back to the source IP address of the
packet. A Tracert attacker exploits the Tracert program to figure out the network
topology.
A Smurf attacker sends ICMP echo requests to the broadcast address of the target
network. As a result, all hosts on the target network reply to the requests, causing
Smurf
network congestion and causing hosts on the target network to be unable to provide
services.
A Source Route attacker probes the network structure through the Source Route
Source Route
option in IP packets.
A Route Record attacker probes the network structure through the Record Route
Route Record
option in IP packets.
For some hosts and devices, large ICMP packets cause memory allocation errors
Large ICMP and crash down the protocol stack. An attacker can make a target crash down by
sending large ICMP packets to it.
The single-packet attack protection function takes effect only on incoming packets. It analyzes the
characteristics of incoming packets to determine whether the packets are offensive and, if they are
offensive, logs the events and discards the packets. For example, if the length of an ICMP packet reaches
176
or exceeds 4000 bytes, the device considers the packet a large ICMP attack packet, outputs a warning
log, and discards the packet.
177
Configuring the blacklist function
Recommended configuration procedure
Step Remarks
Required.
Enabling the blacklist function
By default, the blacklist function is disabled.
Required.
Use either approach.
You can add blacklist entries manually or enable the blacklist
Adding blacklist entries
function globally, configure the scanning attack protection function,
Configuring the scanning
and enable the blacklist function for scanning attack protection to
attack protection function to
allow the device to add the IP addresses of detected scanning
add blacklist entries
attackers to the blacklist automatically. For configuration of scanning
automatically
attack protection, see "Configuring intrusion detection."
Adding a blacklist entry
By default, no blacklist entry exists.
manually
NOTE:
Modifying an automatically added entry changes the type of the entry to
Manual.
178
Adding a blacklist entry manually
On the blacklist page shown in Figure 170, click Add to configure a blacklist entry, as shown in Figure
171.
Figure 171 Add a blacklist entry
Table 96 Configuration
Item Description
Specify the IP address to be added to the blacklist. This IP address cannot be a
IP Address broadcast address, a class D address, a class E address, 127.0.0.0/8, or
255.0.0.0/8.
Configure the entry as a non-permanent entry, and specify the hold time of the
Hold Time
blacklist entry.
Field Description
IP Address IP address of the blacklist entry.
The way in which the blacklist entry was added, Manual or Automatic.
• Manual—The entry was added manually or has been modified after being
added automatically.
Add Method • Automatic—The entry was added automatically by the scanning attack
protection function.
NOTE:
Modifying an automatically added entry changes the type of the entry to Manual.
Start Time The time when the blacklist entry was added.
Hold Time Duration for which the blacklist entry is held in the blacklist.
Dropped Count Number of packets matching the blacklist entry and dropped by the device.
179
Configuring intrusion detection
On the A-MSR900/20-1X series routers
Select Security Setup > Attack Defend > Intrusion Detection from the navigation tree to display the
intrusion detection configuration page, as shown in Figure 172. Select the Enable attack defense policy
checkbox, and then select the specific attack protection functions to be enabled. Click Apply to finish the
configuration.
Figure 172 Intrusion detection configuration page
180
Figure 173 Intrusion detection policy list
181
Attack protection configuration examples
Attack protection configuration example for the
A-MSR900/20-1X series routers
Network requirements
As shown in Figure 175, internal users Host A, Host B, and Host C access the Internet through Router. The
network security requirements are as follows:
• Router always drops packets from Host D, an attacker.
• Router denies packets from Host C for 50 minutes for temporary access control of Host C.
• Router provides scanning attack protection and automatically adds detected attackers to the
blacklist.
• Router provides Land attack protection and Smurf attack protection.
Figure 175 Network diagram
Configuration procedure
# Configure IP addresses for the interfaces. (Details not shown)
# Enable the blacklist function.
• Select Security Setup > Attack Defend > Blacklist from the navigation tree, and then perform the
following configurations, as shown in Figure 176.
182
Figure 176 Enable the blacklist function
183
Figure 178 Add a blacklist entry for Host C
184
Figure 179 Configure intrusion detection
185
• Router always drops packets from Host D, an attacker.
• Router denies packets from Host C for 50 minutes for temporary access control of Host C.
• Router provides scanning attack protection and automatically adds detected attackers to the blacklist
on interface Ethernet 0/2, the interface connecting the Internet.
• Router provides Land attack protection and Smurf attack protection on Ethernet 0/2.
Figure 180 Network diagram
Configuration procedure
# Configure IP addresses for the interfaces. (Details not shown)
# Enable the blacklist function.
• Select Security Setup > Attack Defend > Blacklist from the navigation tree, and then perform the
following configurations, as shown in Figure 181.
Figure 181 Enable the blacklist function
186
Figure 182 Add a blacklist entry for Host D
187
Figure 184 Configure intrusion detection
188
Configuring application control
Complete the following tasks to configure application control in the web interface:
• Load applications.
• Configure a custom application.
• Enable application control.
Application control allows you to control which applications and protocols users can access on the
Internet by specifying the destination IP address, protocol, operation type, and port. Application control
can be based on a group of users or all users in a LAN. This chapter describes the application control
based on all users. For application control based on user group, see "Configuring SIP server group
management."
NOTE:
The application control function applies only to the outbound direction of WAN interfaces.
Required.
Enabling application control Enable application control for specified applications or protocols
globally.
Loading applications
Select Security Setup > Application Control from the navigation tree, and then click the Load Application
tab to display the page for loading applications shown in Figure 185.
• To load an application control file from the device, select From Device, select the application control
file, and then click Apply.
• To load an application control file from the local host to the device, select From Local, click Browse
to find the file, and then click Apply.
189
After the file is loaded to the device successfully, all the loaded applications are displayed in the lower
part of the page.
Figure 185 Load applications
190
Figure 187 Add a custom application
Table 98 Configuration
Item Description
Application Name Specify the name for the custom application.
Specify the protocol to be used for transferring packets, including TCP, UDP, and
Protocol
All. All means all IP-carried protocols.
191
Figure 188 Application Control
Internet
Eth0/1
Router
Configuration procedure
# Load the application control file. (Assume that signature file p2p_default.mtd, which can prevent users
from using MSN, is stored on the device).
• Select Security Setup > Application Control from the navigation tree, and then click the Load
Application tab and perform the following configurations, as shown in Figure 190.
192
Figure 190 Load the application signature file
a. Select the From Device option, and then select file p2p_default.
b. Click Apply. Figure 191 shows the loaded applications.
193
Figure 192 Configure application control
194
Configuring webpage redirection
With webpage redirection configured on an interface, a user accessing a webpage through the interface
for the first time is forcibly led to a specified webpage (the web access request of the user is redirected to
the specified URL). After that, the user can access network resources normally. If the user sends a web
access request after a specified time interval, the specified webpage is displayed again.
This feature applies to scenarios where a hotel or carrier wants to periodically push an advertisement
webpage to users.
NOTE:
Webpage redirection is ineffective on the interface with the portal function enabled. Do not configure both
functions on an interface.
195
Table 99 describes the redirection URL configuration.
Table 99 Configuration
Item Description
Interface Select an interface on which to enable webpage redirection.
Enter the address of the webpage to be displayed (the URL to which the web access
Redirection URL
request is redirected). For example, http://192.0.0.1.
196
Configuring routes
The term "router" in this document refers to both routers and Layer 3 switches.
This chapter mainly describes IPv4 route configuration.
You can perform the following route configurations through the web interface:
• Creating a static route
• Displaying the active route table
Upon receiving a packet, a router determines the optimal route based on the destination address and
forwards the packet to the next router in the path. When the packet reaches the last router, it then
forwards the packet to the destination host.
Routing provides the path information that guides the forwarding of packets.
A router selects optimal routes from the routing table and sends them to the FIB table to guide packet
forwarding. Each router maintains a routing table and a FIB table.
You can manually configure routes. Such routes are called "static routes."
NOTE:
For more information about the routing table and static routes, see HP A-MSR Router Series Layer 3—IP
Routing Configuration Guide.
Route configuration
Creating an IPv4 static route
Select Advanced > Route Setup from the navigation tree, and then click the Create tab to display the static
route configuration page, as shown in Figure 195.
197
Figure 195 Static route configuration page
Item Description
Enter the destination IP address of the static route, in
Destination IP Address
dotted decimal notation.
198
Item Description
Select the outgoing interface of the static route.
Interface If you select Null 0, the destination IP address is
unreachable.
Field Description
Destination IP Address Destination IP address of the route.
199
IPv4 static route configuration example
Network requirements
The routers' interfaces and the hosts' IP addresses and masks are shown in Figure 197. Configure static
routes on the routers for any two hosts to communicate with each other.
Figure 197 Network diagram
Configuration considerations
1. Configure a default route with Router B as the next hop on Router A.
2. On Router B, configure one static route with Router A as the next hop and the other with Router C as
the next hop.
3. Configure a default route with Router B as the next hop on Router C.
Configuration procedure
1. Configure the IP addresses of the interfaces. (Details not shown)
2. Configure static routes on the routers.
# Configure a default route on Router A.
• Select Advanced > Route Setup from the navigation tree of Router A, and then click the Create tab to
perform the following settings on the page shown in Figure 198.
a. Enter 0.0.0.0 for Destination IP Address.
b. Enter 0 for Mask.
c. Enter 1.1.4.2 for Next Hop.
d. Click Apply.
200
Figure 198 Configure a default route on Router A
The newly created static route is listed in the lower part of the page.
# Configure two static routes on Router B.
a. Select Advanced > Route Setup from the navigation tree of Router B, and then click the Create
tab to perform the following settings on the page shown in Figure 198.
b. Enter 1.1.2.0 for Destination IP Address.
c. Enter 24 for Mask.
d. Enter 1.1.4.1 for Next Hop.
e. Click Apply.
f. Enter 1.1.3.0 for Destination IP Address.
g. Enter 24 for Mask.
h. Enter 1.1.5.6 for Next Hop.
i. Click Apply.
The newly created static route is listed in the lower part of the page.
# Configure a default route on Router C.
a. Select Advanced > Route Setup from the navigation tree or Router C, and then click the Create
tab to perform the following settings on the page shown in Figure 198.
b. Enter 0.0.0.0 for Destination IP Address.
c. Enter 0 for Mask.
d. Enter 1.1.5.5 for Next Hop.
e. Click Apply.
The newly created static route is listed in the lower part of the page.
3. Configure the IP addresses and default gateways of hosts.
As shown in Figure 197, configure the IP addresses of the hosts, and configure the default gateways of
Host A, B, and C as 1.1.2.3, 1.1.6.1, and 1.1.3.1, respectively. The detailed configuration steps are not
shown.
201
Verifying the configuration
# Display the active route table.
From the navigation trees of Router A, Router B, and Router C, select Advanced > Route Setup to display
the Summary tab. Verify that the newly created static routes are displayed in the active route table.
# Ping Host A from Host B (assuming both hosts run Windows XP).
C:\Documents and Settings\Administrator>ping 1.1.2.2
Trace complete.
Configuration guidelines
When you configure a static route, follow these guidelines:
1. If you do not specify the preference when you configure a static route, the default preference is
used. Reconfiguration of the default preference applies only to newly created static routes. The web
interface does not support configuration of the default preference.
2. When you configure a static route, the static route does not take effect if you specify the next hop
address first and then configure it as the IP address of a local interface, such as an Ethernet interface
and VLAN interface.
3. When specifying the output interface:
If Null 0 or a loopback interface is specified as the output interface, there is no need to configure
the next hop.
If a point-to-point interface is specified as the output interface, you do not need to specify the
next hop, and there is no need to change the configuration after the peer address has changed.
For example, a PPP interface obtains the peer's IP address through PPP negotiation. Therefore,
you only need to specify it as the output interface.
202
If the output interface is an NBMA or P2MP interface (which supports point-to-multipoint
networks), the IP address-to-link layer address mapping must be established. HP recommends
specifying the next hop when you configure it as the output interface.
If you want to specify a broadcast interface (such as an Ethernet interface, virtual template, or
VLAN interface) as the output interface (which can have multiple next hops), you must specify the
next hop at the same time.
203
Configuring user-based load sharing
Item Description
Interface Name of the interface for which to configure user-based load sharing.
Status of
Set whether to enable user-based load sharing on the interface.
user-based-sharing
Bandwidth The load ratio of each interface is calculated based on the bandwidth of each
interface. For example, if the bandwidth of Ethernet 0/0 is set to 200 kbps and that
of Ethernet 0/1 is set to 100 kbps, the load ratio is 2:1.
204
Configuring traffic ordering
You can do the following to configure traffic ordering on the web interface:
• Setting the traffic ordering interval
• Specifying the traffic ordering mode
• Displaying internal interface traffic ordering statistics
• Displaying external interface traffic ordering statistics
When multiple packet flows (classified by their source addresses) are received or sent by a device, you
can configure IP traffic ordering on the device to collect statistics of the flows in the inbound/outbound
direction and then rank the statistics. The network administrator can use the traffic ordering statistics to
analyze the network usage for network management.
An interface can be specified as an external or internal interface to collect traffic statistics:
• An internal interface collects both inbound and outbound traffic statistics, including total traffic
statistics, total inbound/outbound traffic statistics, inbound/outbound TCP packet statistics,
inbound/outbound UDP packet statistics, and inbound/outbound ICMP packet statistics.
• An external interface collects only the total inbound traffic statistics.
Required.
Specify an interface as an internal or external interface to
Specifying the traffic ordering mode
collect traffic statistics.
By default, an interface does not collect traffic statistics.
205
Setting the traffic ordering interval
Select Advanced > Traffic Ordering from the navigation tree to display the default configuration page
shown in Figure 201. You can set the interval for collecting traffic statistics in the lower part of the page.
Figure 201 Traffic ordering configuration page
206
Figure 202 Internal interface traffic ordering statistics page
207
Configuring DNS
NOTE:
For more information about DNS, see HP A-MSR Router Series Layer 3—IP Services Configuration Guide.
Step Remarks
Required.
Enabling dynamic domain name resolution Enable dynamic domain name resolution.
Disabled by default.
Required.
Specifying a DNS server Not specified by default.
You can specify up to six DNS servers.
Optional.
A suffix is used when the name to be resolved is
incomplete. The system can supply the missing part.
For example, a user can configure com as the suffix
for aabbcc.com. The user only has to enter aabbcc to
Configuring a domain name suffix
obtain the IP address of aabbcc.com because the
system adds the suffix and delimiter before passing
the name to the DNS server.
Not configured by default.
You can configure up to 10 DNS suffixes.
208
Step Remarks
Optional.
Clear the dynamic IPv4 domain name cache.
The DNS client stores latest mappings between
domain names and IP addresses in the dynamic
Clearing the dynamic domain name cache
domain name cache. The DNS client searches the
cache for a repeated query rather than sending a
request to the DNS server. The mappings are aged
out from the cache after a certain time. You can also
manually clear the cache.
Step Remarks
Required.
Enabling DNS proxy Enable DNS proxy on the device.
Disabled by default.
Required.
Specifying a DNS server Not specified by default.
You can specify up to six DNS servers.
209
Enabling dynamic domain name resolution
Select Advanced > DNS Setup > DNS Configuration from the navigation tree to display the configuration
page shown in Figure 204.
Select Enable for Dynamic DNS and click Apply.
Figure 204 Dynamic domain name resolution configuration
210
Figure 205 Add a DNS server address
Item Description
DNS Server IP Address Enter the IP address of a DNS server.
Item Description
DNS Domain Name Suffix Configure a domain name suffix.
211
Figure 207 Network diagram
Router B
DNS client 4.1.1.1/24
DNS server
2.1.1.1/24
Router A
DNS proxy
2.1.1.2/24 1.1.1.1/24
IP network
3.1.1.1/24
host.com
Host
NOTE:
• Before performing the following configuration, make sure that the device and the host are routable to each other
and that the IP addresses of the interfaces are configured as shown in Figure 207.
• This configuration may vary with different DNS servers. The following configuration is performed on a PC running
Windows Server 2000.
Configuration procedure
1. Configure the DNS server.
# Enter the DNS server configuration page.
Select Start > Programs > Administrative Tools > DNS.
# Create zone com.
As shown in Figure 208, right click Forward Lookup Zones, select New zone, and then follow the
instructions to create a new zone named com.
Figure 208 Create a zone
212
# Create a mapping between the host name and the IP address.
Figure 209 Add a host
213
In Figure 209, right click zone com and then select New host to display the dialog box shown in Figure
210. Enter host name host and IP address 3.1.1.1.
Figure 210 Add a mapping between domain name and IP address
214
• Click Add IP to display the page shown in Figure 212.
Figure 212 Specify a DNS server address
215
Figure 214 Specify the DNS server address
216
Configuring DDNS
Although DNS allows you to access nodes in networks using their domain names, it provides only the
static mappings between domain names and IP addresses. When you use the domain name to access a
node whose IP address has changed, your access fails because DNS leads you to the IP address that is
no longer where the node resides.
DDNS can dynamically update the mappings between domain names and IP addresses for DNS servers
to direct you to the latest IP address corresponding to a domain name.
Figure 216 DDNS networking application
As shown in Figure 216, DDNS works on the client-server model comprising the DDNS client and the
DDNS server.
• DDNS client—A device that has to update the mapping between the domain name and the IP
address dynamically. An Internet user usually uses the domain name to access an application layer
server such as an HTTP and FTP server. When its IP address changes, the application layer server
runs as a DDNS client that sends a request to the DDNS server for updating the mapping between
the domain name and the IP address.
• DDNS server—Informs the DNS server of latest mappings. When receiving the mapping update
request from a DDNS client, the DDNS server tells the DNS server to re-map between the domain
name and IP address of the DDNS client. Therefore, Internet users can use the same domain name to
access the DDNS client even if the IP address of the DDNS client has changed.
NOTE:
• The DDNS update process does not have a unified standard and depends on the DDNS server that the DDNS client
contacts. The well-known DDNS service providers include www.3322.org, www.oray.cn (also known as the
"PeanutHull server"), and www.dyndns.com.
• With the DDNS client configured, a device can dynamically update the latest mapping between its domain name
and IP address on the DNS server through a DDNS server at www.3322.org or www.oray.cn, for example.
217
Configuration prerequisites
• Visit the website of a DDNS service provider, register an account, and apply for a domain name for
the DDNS client.
• Specify the primary IP address of the interface, and make sure that the DDNS server and the
interface can reach each other.
• Configure static or dynamic domain name resolution to translate the domain name of the DDNS
server into its IP address.
Configuration procedure
Select Advanced > DNS Setup > DDNS Configuration from the navigation tree to display the DDNS page
shown in Figure 217. Click Add to configure a DDNS entry, as shown in Figure 217.
Figure 217 DDNS configuration page
Item Description
Domain Name Specify the DDNS entry name, which is the only identifier of the DDNS entry.
Server Server Provider Select the DDNS server provider: 3322.org or PeanutHull.
218
Item Description
Settings Specify the server name of the DDNS server for domain name resolution.
NOTE:
After the server provider is selected, the DDNS server name appears
automatically. For example, if the server provider is 3322.org, the server name is
Server Name
members.3322.org; if the server provider is PeanutHull, the server name is
phservice2.oray.net. HP recommends that you do not change the server name of
server provider 3322.org, but you can use the server name, such as
phservice2.oray.net, phddns60.oray.net, client.oray.net, or ph031.orat.net for
server provider PeanutHull.
Specify the interval for sending DDNS update requests after DDNS update is
enabled.
NOTE:
• A DDNS update request is immediately initiated when the primary IP
Interval address of the interface changes or when the link state of the interface
changes from down to up, regardless of whether the interval is reached.
• If you specify the interval as 0, your device does not periodically initiate
any DDNS update request, but it will initiate a DDNS update request when
the primary IP address of the interface is changed or when the link state of
the interface changes from down to up.
Account Username Specify the username used for logging in to the DDNS server.
Settings Password Specify the password used for logging in to the DDNS server.
219
Figure 219 Network diagram
NOTE:
Before configuring DDNS on Router, register at http://www.3322.org/ (username Steven and
password nevets in this example), add Router's host name-to-IP address mapping to the DNS server, and
make sure that the devices are reachable to each other.
Configuration procedure
# Enable dynamic domain name resolution and set the IP address of the DNS server to 1.1.1.1. (Details
not shown)
# Configure DDNS.
• Select Advanced > DNS Setup > DDNS Configuration from the navigation tree, and then click Add to
display the page shown in Figure 220.
Figure 220 Configure DDNS
220
d. Enter nevets for Password.
e. Select Ethernet0/1 from the Associated Interface list.
f. Enter whatever.3322.org for FQDN.
g. Click Apply.
After the preceding configuration is completed, Router notifies the DNS server of its new domain
name-to-IP address mapping through the DDNS server provided by www.3322.org whenever its IP
address changes. Therefore, Router can always provide web service at whatever.3322.org.
221
Configuring DHCP
A DHCP client can obtain an IP address and other configuration parameters from a DHCP server on
another subnet via a DHCP relay agent, as shown in Figure 222.
Figure 222 A typical DCHP relay agent application
DHCP client DHCP client
IP network
222
NOTE:
For more information about DHCP, see HP A-MSR Router Series Layer 3—IP Services Configuration
Guide.
Step Remarks
Required.
Enabling DHCP Enable DHCP globally.
Disabled by default.
Optional.
For detailed configuration, see "Configuring DHCP interface
setup."
Enabled by default.
Configuring the DHCP server on an
interface NOTE:
The DHCP server configuration is supported only on a Layer 3 Ethernet
interface (or subinterface), virtual Ethernet interface, VLAN interface,
Layer 3 aggregate interface, serial interface, ATM interface,
MP-group interface, or loopback interface.
Optional.
Exclude IP addresses from automatic allocation in the DHCP
address pool.
To avoid address conflicts, the DHCP server excludes IP addresses
Configuring IP addresses excluded from used by the gateway or FTP server from dynamic allocation.
dynamic allocation By default, all IP addresses in the address pool, except the IP
address of the DHCP server, can be assigned automatically.
NOTE:
If a static bound IP address is excluded from automatic allocation, it is
still assignable to the bound user.
223
Configuring the DHCP relay agent
Recommended configuration procedure
Step Remarks
Required.
Enabling DHCP Enable DHCP globally.
Disabled by default.
Required.
To improve reliability, you can specify several DHCP servers as a
Configuring a DHCP server group group on the DHCP relay agent and correlate a relay agent
interface with the server group. When the interface receives DHCP
requests from clients, the relay agent forwards them to all DHCP
servers of the group.
Required.
For the detailed configuration, see "Configuring DHCP interface
setup."
By default, the interface works as a DHCP server.
NOTE:
Configure the DHCP relay agent on
• The DHCP relay agent configuration is supported only on a
the current interface and correlate it
Layer 3 Ethernet interface (or subinterface), virtual Ethernet
with the DHCP server group.
interface, VLAN interface, Layer 3 aggregate interface, or serial
interface.
• If the DHCP relay agent is enabled on an Ethernet subinterface,
a packet received from a client on this interface must contain a
VLAN tag, and the VLAN tag must be consistent with the VLAN
ID of the subinterface. Otherwise, the packet is discarded.
Step Remarks
Required.
For detailed configuration, see "Configuring DHCP
interface setup."
By default, the interface does not obtain an IP address
through DHCP.
Configure the DHCP client on an interface
NOTE:
The DHCP client configuration is supported only on a Layer 3
interface (or subinterface), VLAN interface, or Layer 3
aggregate interface. You cannot configure an interface of an
aggregation group as a DHCP client.
224
Enabling DHCP
Select Advanced > DHCP Setup from the navigation tree to display the default DHCP Enable page shown
in Figure 223.
Figure 223 DHCP Enable
Item Description
DHCP Enable or disable DHCP globally.
Item Description
Interface Select an interface to configure.
225
Item Description
Correlate the relay agent interface with a DHCP server group.
DHCP server group You can correlate a DHCP server group with multiple interfaces and make
sure that you already added DHCP server groups for selection.
226
Figure 225 Static address pool setup for the DHCP server
Item Description
Pool Name Name of the static DHCP address pool.
Address Allocation
Specify the static address allocation mode for the DHCP address pool.
Mode: Static Binding
IP address and its subnet mask of the static binding. A natural mask is adopted if
IP Address no subnet mask is specified.
NOTE:
Subnet Mask It cannot be the IP address of the DHCP server interface. Otherwise, IP address conflicts
may occur, and the client cannot obtain the IP address.
227
Item Description
MAC Address A client's MAC address of the static binding.
Gateway IP Address DHCP clients that want to access hosts outside the local subnet need a gateway to
forward data. After specifying a gateway in the address pool, the DHCP server
assigns the gateway address along with an IP address to a client.
Standby DNS Server Specify a standby DNS server for the DHCP client.
228
Figure 226 Dynamic address pool setup for the DHCP server
Item Description
Pool Name Name of the dynamic DHCP address pool.
229
Item Description
Make sure that the IP address is on the same network segment as the IP address
Subnet Mask of the DHCP server interface or the DHCP relay agent interface to avoid wrong
IP address allocation.
Primary DNS Server In order for clients to access the Internet using a domain name, the DHCP
server assigns the specified DNS server address along with an IP address to
a client.
Standby DNS Server Specify a standby DNS server for the DHCP client.
230
Figure 227 IP address excluded from dynamic allocation setup
Item Description
Start IP Address Specify the lowest IP address excluded from dynamic allocation.
End IP Address The end IP address must not be lower than the start IP address. A higher end IP
address and a lower start IP address specify an IP address range. Two identical IP
addresses specify a single IP address.
231
Figure 228 DHCP server group setup
Item Description
DHCP server group ID.
Group ID
You can create up to 20 DHCP server groups.
Specifies the DHCP server IP addresses for the DHCP server group.
Server IP Address The IP address of a DHCP server cannot be on the same network segment as that of
the DHCP relay agent interface. Otherwise, DHCP clients may fail to obtain IP
addresses.
232
DHCP configuration example without DHCP relay agent
Network requirements
• The DHCP server (Router A) assigns IP addresses to clients on subnet 10.1.1.0/24, which is
subnetted into 10.1.1.0/25 and 10.1.1.128/25.
• The IP addresses of Ethernet 0/1 and Ethernet 0/2 on Router A are 10.1.1.1/25 and
10.1.1.129/25, respectively.
• In subnet 10.1.1.0/25, the lease is ten days and twelve hours, the domain name suffix is
aabbcc.com, the DNS server address is 10.1.1.2/25, and the gateway address is
10.1.1.126/25.
• In subnet 10.1.1.128/25, the lease is five days, the domain name suffix is aabbcc.com, the DNS
server address is 10.1.1.2/25, and the gateway address is 10.1.1.254/25.
• Subnets 10.1.1.0/25 and 10.1.1.128/25 have the same domain name suffix and DNS server
address. Therefore, the domain name suffix and DNS server address need to be configured only for
subnet 10.1.1.0/24. Subnet 10.1.1.0/25 and 10.1.1.128/25 can inherit the configuration of
subnet 10.1.1.0/24.
• Router B (DHCP client) obtains a static IP address, DNS server address, and gateway address from
Router A (DHCP server).
Figure 229 Network diagram
Client
Client 10.1.1.4/25 Client Client
Eth0/1 Eth0/2
10.1.1.1/25 10.1.1.129/25
Router B
DNS server Client Client Client
10.1.1.2/25
Configuration procedure
1. Configure the DHCP server (Router A).
# Specify IP addresses for interfaces. (Details not shown)
# Enable DHCP.
• Select Advanced > DHCP Setup from the navigation tree of Router A to display the default DHCP
Enable page and perform the following operations, as shown in Figure 230.
233
Figure 230 Enable DHCP
# Enable the DHCP server on interface Ethernet 0/1. By default, the DHCP server is enabled on interface
Ethernet 0/1. (Details not shown)
# Configure a DHCP static address pool, and bind IP address 10.1.1.5 to Router B.
• Click the DHCP Interface Setup tab and perform the following operations, as shown in Figure 231.
234
Figure 231 DHCP static address pool configuration
235
Figure 232 DHCP address pool 0 configuration
# Configure DHCP address pool 1 (including the address range, lease duration, and gateway address).
236
Figure 233 DHCP address pool 1 configuration
# Configure DHCP address pool 2 (including the address range, lease duration, and gateway IP
address).
237
Figure 234 DHCP address pool 2 configuration
# Exclude IP addresses from dynamic allocation (DNS server and gateway addresses).
• Expand the Forbidden IP Addresses node and perform the following operations, as shown in Figure
235.
238
Figure 235 Exclude IP addresses from dynamic allocation
239
Figure 236 Enable the DHCP client on interface Ethernet 0/1
240
Figure 237 Network diagram
Configuration procedure
1. Configure the DHCP relay agent (Router A).
# Specify IP addresses for interfaces. (Details not shown)
# Enable DHCP.
• Select Advanced > DHCP Setup from the navigation tree of Router A to display the default DHCP
Enable tab and perform the following operations, as shown in Figure 238.
Figure 238 DHCP enable
241
Figure 239 DHCP server group creating
242
# Specify addresses for interfaces. (Details not shown)
# Enable DHCP.
• Select Advanced > DHCP Setup from the navigation tree of Router B to display the default DHCP
Enable tab, as shown in Figure 241.
Figure 241 Enable DHCP
# Enable the DHCP server on interface Ethernet 0/1. By default, the DHCP server is enabled on Ethernet
0/1. (Details not shown)
# Configure a dynamic DHCP address pool.
• Click the DHCP Interface Setup tab and perform the following operations, as shown in Figure 242.
243
Figure 242 Dynamic DHCP address pool configuration
# Exclude IP addresses from dynamic allocation (DNS server and gateway addresses).
• Expand the Forbidden IP Addresses node, as shown in Figure 243.
244
Figure 243 IP address excluded from dynamic allocation configuration
245
Figure 244 Enable the DHCP client on interface Ethernet 0/1
Configuration guidelines
1. If multiple VLAN interfaces sharing one MAC address request IP addresses using DHCP, the DHCP
server cannot be a Windows 2000 server or a Windows 2003 server.
2. To remove a DHCP server group that is associated with multiple interfaces, first cancel the
associations.
246
Configuring ACL
Ethernet frame Layer 2 header fields, such as source and destination MAC
4000 to 4999
header ACLs addresses, 802.1p priority, and link layer protocol type
NOTE:
For more information about IPv4 ACL, see HP A-MSR Router Series ACL and QoS Configuration Guide.
Configuring an ACL
Configuration task list
Table 113 IPv4 ACL configuration task list
Task Remarks
Required.
Creating an IPv4 ACL The category of the created ACL depends on the ACL
number that you specify.
247
Task Remarks
Configuring a rule for a basic IPv4 ACL Required.
Configuring a rule for an advanced IPv4 ACL Complete one of these tasks according to the ACL
category.
Configuring a rule for an Ethernet frame header ACL
Item Description
Set the number of the IPv4 ACL, which ranges from
2000 to 2999.
NOTE:
ACL Number You can create only basic ACLs (numbered from 2000
to 2999) in the web interface. However, the web
interface can display the advanced ACLs and Ethernet
frame header ACLs, and you can configure rules for
these ACLs.
248
Item Description
Set the match order of the ACL. The following match
orders are available:
• Config—Packets are compared against ACL rules
in the ascending ACL rule ID order.
Match Order
• Auto—Packets are compared against ACL rules
in the depth-first match order, which ensures that
any subset of a rule is always matched before the
rule.
249
Table 115 Configuration
Item Description
Select the basic IPv4 ACL for which you want to
ACL configure rules.
ACLs available for selection are basic IPv4 ACLs.
Check Logging A log entry contains the ACL rule number, action on
the matched packets, protocol that IP carries,
source/destination address, source/destination port
number, and number of matched packets.
250
Figure 247 The page for configuring an advanced IPv4 ACL
251
Table 116 Configuration
Item Description
Select the advanced IPv4 ACL for which you want to
configure rules.
You can create advanced IPv4 ACLs only in the CLI. For
more information, see HP A-MSR Router Series ACL and
ACL QoS Configuration Guide. In addition, the system
automatically generates advanced IPv4 ACLs when you
configure advanced bandwidth limit and advanced
bandwidth guarantee. For more information, see
"Configuring QoS."
Source IP Address Select the Source IP Address option and enter a source
IPv4 address and source wildcard, in dotted decimal
Source Wildcard notation.
IP Address Filter
Destination IP Address Select the Source IP Address option and enter a source IP
address and source wildcard, in dotted decimal
Destination Wildcard notation.
252
Item Description
If you select Other from the ICMP Message dropdown list,
you must enter values in the ICMP Type and ICMP Code
ICMP Code
fields. Otherwise, the two fields take the default values,
which cannot be changed.
Select this option to make the rule match packets used for
establishing and maintaining TCP connections.
These items are available only when you select 6 TCP
TCP Connection Established
from the Protocol dropdown list.
A rule with this item configured matches TCP connection
packets with the ACK or RST flag.
Time Range Select the time range during which the rule takes effect.
253
Figure 248 The page for configuring a rule for an Ethernet frame header ACL
Item Description
Select the Ethernet frame header IPv4 ACL for which you want to configure
rules.
ACL You can create Ethernet frame header IPv4 ACLs only in the CLI. For more
information, see HP A-MSR Router Series ACL and QoS Configuration
Guide.
Select the Rule ID option, and enter a number for the rule.
If you do not specify the rule number, the system assigns one
automatically.
Rule ID
NOTE:
If the rule number you specify already exists, the following operations modify
the configuration of the rule.
Select the action to be performed for IPv4 packets matching the rule.
Action • Permit—Allows matched packets to pass.
• Deny—Drops matched packets.
254
Item Description
Destination MAC
Address Select the Destination MAC Address option, and enter a destination MAC
address and wildcard.
Destination Mask
LSAP Type Select the LSAP Type option, and specify the DSAP and SSAP fields in the
LLC encapsulation by configuring the following items:
• LSAP Type—Indicates the frame encapsulation format.
LSAP Mask • LSAP Mask—Indicates the LSAP wildcard.
Type Filter
Select the Protocol Type option, and specify the link layer protocol type by
Protocol Type
configuring the following items:
• Protocol Type—Indicates the frame type. It corresponds to the
type-code field of Ethernet_II and Ethernet_SNAP frames.
Protocol Mask
• Protocol Mask—Indicates the wildcard.
Time Range Select the time range during which the rule takes effect.
Configuration guidelines
When you configure an ACL, follow these guidelines:
1. You cannot create a rule with, or modify a rule to have, the same permit/deny statement as an
existing rule in the ACL.
2. You can only modify the existing rules of an ACL that uses the match order of config. When
modifying a rule of such an ACL, you may choose to change just some of the settings, in which case
the other settings remain the same.
255
Configuring QoS
256
Advanced queue
Subnet limit
Subnet limit enables you to regulate the specification of traffic entering or leaving a device based on
source/destination IP address. Packets conforming to the specification can pass through, and packets
exceeding the specification are dropped. In this way, the network resources are protected.
Advanced limit
Similar to subnet limit, advanced limit also implements traffic policing at the IP layer. They differ in that:
• Advanced limit can classify traffic based on time range, packet precedence, protocol type, and port
number, and it can provide more granular services.
• In addition to permitting traffic conforming to the specification to pass through, advanced limit can
also set IP precedence, DSCP value, and 802.1p priority for packets as required.
NOTE:
For more information about IP precedence, DSCP values, and 802.1p priority, see "Appendix packet
priorities."
257
Advanced queue
Advanced queue offers the following functions:
• Interface bandwidth limit—Uses token buckets for traffic control and limits the rate of transmitting
packets (including critical packets) on an interface. When limiting the rate of all packets on an
interface, interface bandwidth limit is a better approach than subnet limit and advanced limit. This is
because, working at the IP layer, the latter two functions do not take effect on packets not processed
by the IP layer.
• Bandwidth guarantee—When congestion occurs on a port, CBQ classifies packets into different
classes according to user-defined match criteria and assigns these classes to their queues. Before
assigning packets to a queue, CBQ performs bandwidth restriction check. When being dequeued,
packets are scheduled by WFQ.
Advanced queue applies only to outgoing packets of interfaces.
Configuring QoS
Configuring subnet limit
Select Advance > QoS Setup > Subnet Limit from the navigation tree to display the page shown in Figure
249. Click Add to display the Subnet Limit Setting page, as shown in Figure 250.
Figure 249 Subnet limit
258
Figure 250 Subnet limit setting
Item Description
Start Address
Set the address range of the subnet where rate limit is to be performed.
End Address
259
Configuring advanced limit
Select Advance > QoS Setup > Advanced Limit from the navigation tree to display the page shown
in Figure 251. Click Add to display the Advanced Limit Setting page, as shown in Figure 252.
Figure 251 Advanced limit
260
Figure 252 Advanced limit setting
261
Table 119 Configuration
Item Description
Description Configure a description for the advanced limit policy for management.
Inbound Interface Define a rule to match packets received on the specified interface.
Set the time range when the advanced limit policy takes effect. The begin-end time
Time Range
and days of the week are required to set.
Custom Type Define a rule to match packets based on self-defined protocol types.
Source Port You should select the transport layer protocol type and set the source service port
262
Item Description
Destination Port range and destination service port range.
Item Description
Interface Name Select the interface to configure.
263
Item Description
Set the average traffic rate allowed for the interface.
HP recommends that you configure the interface
bandwidth to be smaller than the actual available
bandwidth of a physical interface or logical link.
NOTE:
If you have specified the interface bandwidth, the
maximum interface bandwidth used for bandwidth
check when CBQ queues packets is 1,000,000 kbps. If
you have not specified the interface bandwidth, the
maximum interface bandwidth varies by interface type
according to these rules:
Interface Bandwidth • If the interface is a physical one, the actual baud
rate or rate applies.
• If the interface is T1/E1, MFR, or any other type
of logical serial interface formed by timeslots or
multiple links, the total bandwidth of all member
channels/links applies.
• If the interface is a template interface, such as a
VT interface, dialer interface, BRI interface, or PRI
interface, 1,000,000 kbps applies.
• If the interface is a virtual interface of any other
type (for example, a tunnel interface), 0 kbps
applies.
264
Figure 254 Create a bandwidth guarantee policy
265
Table 121 Configuration
Item Description
Configure a description for the bandwidth guarantee
Description
policy for management.
266
Item Description
Define a rule to match packets based on their DSCP
values.
You can configure up to eight DSCP values for a
bandwidth guarantee policy. The relationship
DSCP between the DSCP values is OR. If the same DSCP
value is specified multiple times, the system considers
them as one. After each configuration, the defined
DSCP values are displayed in ascending order
automatically.
267
Figure 255 Network diagram
Router
Eth1/1
Internet
Eth1/2
……
Host A Host Z
2.1.1.1/8 2.1.1.100/8
Configuration procedure
# Configure the bandwidth limit settings for the network segment.
• Select Advance > QoS Setup > Subnet Limit from the navigation tree, click Add on the displayed
page, and perform the following configurations as shown in Figure 256.
Figure 256 Configure subnet limit
268
Advanced queue configuration example
Network requirements
As shown in Figure 257, the data traffic from Router C is classified into three classes based on DSCP
fields of IP packets.
Configure advanced queue to perform the following actions:
• Perform AF for traffic with the DSCP fields AF11 and AF22 (DSCP values 10 and 18), and set the
minimum bandwidth to 40 kbps.
• Perform EF for traffic with the DSCP field EF (DSCP value 46), and set the maximum bandwidth to
240 kbps.
Before performing the configuration, make sure of the following:
• The route from Router C to Router D through Router A and Router B is reachable.
• The DSCP fields have been set for the traffic before the traffic enters Router A.
Figure 257 Network diagram
Configuration procedure
1. Configure Router A.
# Perform AF for traffic with DSCP fields AF11 and AF21.
• Select Advance > QoS Setup > Advanced Queue from the navigation tree, click Add on the
displayed page, and perform the following configurations shown in Figure 258.
269
Figure 258 Configure assured forwarding
270
• Select Advance > QoS Setup > Advanced Queue from the navigation tree, click Add on the
displayed page, and perform the following configurations shown in Figure 259.
Figure 259 Configure expedited forwarding
271
Appendix packet priorities
IP precedence and DSCP values
Figure 260 DS field and ToS bytes
As shown in Figure 260, the ToS field of the IP header contains eight bits. The first three bits (0 to 2)
represent IP precedence from 0 to 7, and the subsequent four bits (3 to 6) represent a ToS value from 0 to
15. According to RFC 2474, the ToS field of the IP header is redefined as the DS field, where a DSCP
value is represented by the first six bits (0 to 5) and is in the range 0 to 63. The remaining two bits (6 and
7) are reserved.
Table 122 Description of IP precedence
1 001 priority
2 010 immediate
3 011 flash
4 100 flash-override
5 101 critical
6 110 internet
7 111 network
In a network in the Diff-Serve model, traffic is assigned into the following classes, and packets are
processed according to their DSCP values.
• EF class—The switch forwards the packets of this class without considering whether the link is shared
by other traffic. The class is suitable for preferential services requiring low delay, low packet loss,
low jitter, and high bandwidth.
• AF class—This class is divided into four subclasses (AF 1 to AF 4), each containing three drop
priorities for more granular classification. The QoS level of the AF class is lower than that of the EF
class.
• CS class—This class is derived from the IP ToS field and includes eight subclasses.
• BE class—This class is a special CS class that does not provide any assurance. AF traffic exceeding
the limit is degraded to the BE class. All IP network traffic belongs to this class by default.
272
Table 123 Description of DSCP values
10 001010 af11
12 001100 af12
14 001110 af13
18 010010 af21
20 010100 af22
22 010110 af23
26 011010 af31
28 011100 af32
30 011110 af33
34 100010 af41
36 100100 af42
38 100110 af43
8 001000 cs1
16 010000 cs2
24 011000 cs3
32 100000 cs4
40 101000 cs5
48 110000 cs6
56 111000 cs7
0 000000 be(default)
802.1p priority
802.1p priority lies in the Layer 2 packet header and applies to situations where Layer 3 header analysis
is not needed and QoS must be assured at Layer 2.
Figure 261 An Ethernet frame with an 802.1q tag header
As shown in Figure 261, the 4-byte 802.1q tag header consists of the tag protocol identifier (TPID, two
bytes in length), whose value is 0x8100, and the tag control information (TCI, two bytes in length). Figure
262 shows the format of the 802.1q tag header.
273
Figure 262 801.1q tag header
1 001 background
2 010 spare
3 011 excellent-effort
4 100 controlled-load
5 101 video
6 110 voice
7 111 network-management
The priority in the 802.1q tag header is called "802.1p priority" because its use is defined in IEEE
802.1p.
274
Configuring SNMP
Task Remarks
Required.
The SNMP agent function is disabled by default.
Enabling the SNMP agent function
IMPORTANT:
If SNMP the agent function is disabled, all SNMP
agent-related configurations are removed.
275
Task Remarks
Optional.
Configuring an SNMP view After creating SNMP views, you can specify an
SNMP view for an SNMP group to limit the MIB
objects that can be accessed by the SNMP group.
Optional.
Allows you to configure that the agent can send
SNMP traps to the NMS and configure information
Configuring SNMP trap function
about the target host of the SNMP traps.
By default, an agent is allowed to send SNMP traps
to the NMS.
Configuring SNMPv3
Table 126 SNMPv3 configuration task list
Task Remarks
Required.
The SNMP agent function is disabled by default.
Enabling the SNMP agent function
IMPORTANT:
If the SNMP agent function is disabled, all SNMP
agent-related configurations are removed.
Optional.
Configuring an SNMP view After creating SNMP views, you can specify an SNMP
view for an SNMP group to limit the MIB objects that
can be accessed by the SNMP group.
Required.
After creating an SNMP group, you can add SNMP
Configuring an SNMP group users to the group when creating the users. Therefore,
you can realize centralized management of users in
the group through the management of the group.
Required.
Configuring an SNMP user Before creating an SNMP user, create the SNMP
group to which the user belongs.
Optional.
Allows you to configure that the agent can send SNMP
traps to the NMS and configure information about the
Configuring SNMP trap function
target host of the SNMP traps.
By default, an agent is allowed to send SNMP traps to
the NMS.
276
Enabling the SNMP agent function
Select Advanced > SNMP from the navigation tree to display the SNMP configuration page shown
in Figure 263. On the upper part of the page, you can select to enable or disable the SNMP agent
function and configure parameters such as SNMP version. On the lower part of the page, you can view
the SNMP statistics, which help you understand the running status of the SNMP after your configuration.
Figure 263 Set up
277
Table 127 Configuration
Item Description
SNMP Specify to enable or disable the SNMP agent function.
Local Engine ID The validity of a user after it is created depends on the engine ID of the SNMP agent.
If the engine ID when the user is created is not identical to the current engine ID, the
user is invalid.
Maximum Packet
Configure the maximum size of an SNMP packet that the agent can receive/send.
Size
Set a character string to describe the contact information for system maintenance.
Contact If the device is faulty, the maintainer can contact the manufacturer according to the
contact information of the device.
Location Set a character string to describe the physical location of the device.
Return to "SNMPv1 or SNMPv2c configuration task list" or "SNMPv3 configuration task list."
278
Figure 265 Create an SNMP view (1)
Table 128 describes the configuration for creating an SNMP view. After configuring the parameters of a
rule, click Add to add the rule to the list box in the lower part of the page. After configuring all rules, click
Apply to create an SNMP view. The view is not created if you click Cancel.
Table 128 Configuration
Item Description
View Name Set the SNMP view name.
Set the MIB subtree OID (such as 1.4.5.3.1) or name (such as system).
MIB Subtree OID MIB subtree OID identifies the position of a node in the MIB tree, and it
can uniquely identify a MIB subtree.
Click the icon corresponding to the specified view on the page, as shown in Figure 264. The Add rule
for the view ViewDefault window appears, as shown in Figure 267. After configuring the parameters,
279
click Apply to add the rule for the view. Table 128 describes the configuration for creating an SNMP
view.
Figure 267 Add rules to an SNMP view
NOTE:
You can also click the icon corresponding to the specified view on the page shown in Figure 264, and
then you can display the page to modify the view.
Return to "SNMPv1 or SNMPv2c configuration task list" or "SNMPv3 configuration task list."
280
Figure 269 Create an SNMP Community
Item Description
Community Name Set the SNMP community name.
281
Figure 270 SNMP group
Item Description
Group Name Set the SNMP group name.
282
Item Description
Select the notify view of the SNMP group (the view that can send trap messages).
Notify View
If no notify view is configured, the agent does not send traps to the NMS.
Associate a basic ACL with the group to restrict the source IP address of SNMP
packets. You can configure to allow or prohibit SNMP packets with a specific source
ACL
IP address in order to restrict the intercommunication between the NMS and the
agent.
283
Figure 273 Create an SNMP user
Item Description
User Name Set the SNMP user name.
Group Name
• When the security level is Auth/NoPriv, you can select an
SNMP group with no authentication/no privacy or
authentication without privacy.
• When the security level is Auth/Priv, you can select an SNMP
group of any security level.
Authentication Password Set the authentication password when the security level is
284
Item Description
Auth/NoPriv or Auth/Priv.
Confirm Authentication Password The confirm authentication password must be the same as the
authentication password.
Privacy Password Set the privacy password when the security level is Auth/Priv.
The confirm privacy password must be the same as the privacy
Confirm Privacy Password
password.
285
Figure 275 Add a target host of SNMP traps
Item Description
Destination IP Address Select the IP address type: IPv4/domain name, or IPv6, and then
enter the corresponding IP address in the field according to the IP
address type.
286
Item Description
Set the authentication and privacy mode for SNMP traps when the
security model is selected as v3. The available security levels are:
no authentication no privacy, authentication but no privacy, and
Security Level authentication and privacy.
If you select v1 or v2c in the Security Model list, the Security Level
can only be no authentication no privacy, and it cannot be
modified.
Return to "SNMPv1 or SNMPv2c configuration task list" or "SNMPv3 configuration task list."
Return to "SNMPv1 or SNMPv2c configuration task list" or "SNMPv3 configuration task list."
287
SNMP configuration example
SNMPv1 or SNMPv2c configuration example
Network requirements
As shown in Figure 277, the NMS at 1.1.1.2/24 uses SNMPv1 or SNMPv2c to manage the SNMP
agent at 1.1.1.1/24, and the agent automatically sends traps to report events to the NMS.
Figure 277 Network diagram
288
Figure 278 Enable SNMP
289
Figure 279 Configure SNMP community named public
290
# Enable Agent to send SNMP traps.
• Click the Trap tab, and perform the following configurations, as shown in Figure 281.
Figure 281 Enable Agent to send SNMP traps
291
c. Enter the security username public.
d. Select v1 from the Security Model list. (This configuration must be the same as that running on the
NMS. Otherwise, the NMS cannot receive any traps.)
e. Click Apply.
Agent NMS
1.1.1.1/24 1.1.1.2/24
292
Figure 284 Enable SNMP
293
Figure 285 Set the name of the view to be created
294
Figure 287 Configuration progress dialog box
295
• Click the User tab, and then click Add. Perform the following configurations, as shown in Figure
289.
Figure 289 Configure an SNMP user
296
Figure 290 Add target hosts of SNMP traps
297
e. Click Apply.
298
Configuring bridging
Through the web interface, you can configure the following transparent bridging functions:
• Enabling a bridge set
• Adding an interface to a bridge set
A bridge is a store-and-forward device that connects and transfers traffic between LAN segments at the
data-link layer. In some small-sized networks, especially those with dispersed distribution of users, the use
of bridges can reduce the network maintenance costs, without requiring the end users to perform special
configurations on the devices.
In applications, the following major kinds of bridging technologies apply: transparent bridging, SRB,
translational bridging, and SR/TLB. The devices support only transparent bridging.
Transparent bridging bridges LAN segments of the same physical media type, primarily in Ethernet
environments. A transparent bridging device keeps a bridge table, which contains mappings between
destination MAC addresses and outbound interfaces.
NOTE:
For more information about transparent bridging, see HP A-MSR Router Series Layer 2—WAN
Configuration Guide.
Configuring bridging
Configuration task list
Table 133 Basic bridging configuration task list
Task Remarks
Required.
Enabling a bridge set
No bridge set is enabled by default.
299
Figure 292 Global config
Item Remarks
Bridge Group id Set the ID of the bridge set to enable.
300
Figure 293 Configure interface
Item Remarks
Interface Select the interface to configure.
Bridge Group Set the ID of the bridge set to add the interface to.
301
Figure 294 Network diagram
Configuration procedure
1. Configure Router A.
# Enable bridge set 2.
• Select Advanced > Bridge from the navigation tree to display the Global config page. Perform
configurations on the page, as shown in Figure 295.
Figure 295 Enable bridge set 2
302
Figure 296 Assign Ethernet 1/1 to bridge set 2 and enable VLAN transparency
303
c. Select Enable from the VLAN Transmit list.
d. Click Apply.
2. Configure Router B.
Configure Router A in the same way that you configured Router B.
304
Configuring user groups
You can define the hosts to be managed in the LAN as users and then add them to a user group, so that
you can perform access control, application control, bandwidth control, and packet filtering on a per user
group basis.
• Access control—Allows you to deny access from hosts during specific time ranges. All data packets
matching these criteria are denied access to the Internet.
• Application control—Allows you to restrict access to a specific application or protocol (such as
Telnet, DNS, SIP, HTTP, and so on) in the Internet from users in a user group. You can perform
application control based on a user group or all users. For more information about application
control, see "Configuring application control."
• Bandwidth control—Allows you to control the bandwidth consumption based on user group. It
evaluates traffic with token buckets and drops the unqualified packets, controlling bandwidth
utilization.
• Packet filtering—Allows you to filter packets that match specific criteria, such as the protocol,
destination IP address, source port, and destination port on a per user group basis.
Task Remarks
Required.
Configuring a user group
By default, no user groups are configured.
Required.
Configuring a user Add users to the user group.
By default, a user group has no users.
Optional.
If a WAN interface is added or a non-WAN interface becomes a
WAN interface after the user or user group is configured,
Synchronizing user group
synchronize the user group configuration to the WAN interface.
configuration for WAN interfaces
NOTE:
Make sure that at least one user group is in the system before
synchronization.
305
Configuring a user group
Select Advanced > Security > Usergroup from the navigation tree. The group configuration page appears,
as shown in Figure 298.
Figure 298 User group configuration
Item Description
Set the name of the group to be added.
User Group Name The group name is a character string beginning with letters. The string cannot
contain a question mark (?) or a space.
Configuring a user
Select Advanced > Security > Usergroup from the navigation tree, and then click the User tab to display
the page for configuring users, as shown Figure 299.
306
Figure 299 User configuration
Item Description
Please select a user group Select the group to add users to.
307
Figure 300 Access control configuration
Item Description
Select a user group for access control.
Please select a user group When there is more than one user group, the option all is available. Selecting
all means that the access control configuration applies to all user groups.
Days
Set the time range in which access to the Internet is denied.
Time
308
Figure 301 Application control
Item Description
Select a user group for application control.
Please select a user
group When there is more than one user group, the option all is available. Selecting all
means that the application control configuration applies to all user groups.
309
Figure 302 Bandwidth control configuration
Item Description
Set the user group for bandwidth control configuration.
Please select a user
group When there is more than one user group, the option all is available. Selecting all
means that the bandwidth control configuration applies to all user groups.
Set the CBS. CBS is the capacity of the token bucket (the maximum traffic size that is
permitted in each burst).
The CBS value must be greater than the maximum packet size.
CBS
NOTE:
By default, the CBS is the number of bytes transmitted in 500 ms at the rate of CIR. If the
number exceeds the value range, the allowed maximum or minimum value is adopted.
310
Figure 303 Packet filtering configuration
Item Description
Select a user group that the packet filtering is to be applied to.
Please select a user group When there is more than one user group, the option all is available.
Selecting all means that the packet filtering configuration applies to all user
groups.
Destination IP Address
Set the destination IP address and wildcard mask.
Destination Wildcard
311
Item Description
be configurable.
Port • If you select NotCheck as the operator, port numbers are not checked,
and no ports need to be specified.
• If you select Range as the operator, specify both start and end ports to
define a port range.
ToPort
• If you select another option as the operator, only a start port must be
specified.
312
Figure 305 Network diagram
Manager
Host A Host B
IP: 192.168.1.11/24 IP: 192.168.1.12/24
MAC: 0015-e9ac-2def
Eth1/0
192.168.1.1/24 Eth1/0
Internet
Router
Host C Host D
192.168.1.13/24 192.168.1.14/24
Configuration procedure
# Create user groups staff (for common users) and manager (for the Manager).
• Select Advanced > Security > Usergroup to display the group configuration page. Perform the
configurations shown in Figure 306.
Figure 306 Create user groups staff and manager
313
Figure 307 Add users to user group staff
314
• After the configuration process is complete, click Close.
Figure 309 Add users to user group manager
315
Figure 310 Configure access control for user group staff
316
Figure 311 Load the application control file
317
Figure 313 Configure bandwidth control to user groups staff and manager
318
Figure 314 Configure packet filtering for user group staff
319
Configuring MSTP
320
Table 143 Description of designated bridges and designated ports
As shown in Figure 315, AP1 and AP2, BP1 and BP2, and CP1 and CP2 are ports on Device A, Device
B, and Device C, respectively.
• If Device A forwards BPDUs to Device B through AP1, the designated bridge for Device B is Device
A, and the designated port of Device B is port AP1 on Device A.
• Two devices are connected to the LAN: Device B and Device C. If Device B forwards BPDUs to the
LAN, the designated bridge for the LAN is Device B, and the designated port for the LAN is the port
BP2 on Device B.
Figure 315 A schematic diagram of designated bridges and designated ports
NOTE:
All ports on the root bridge are designated ports.
Path cost
Path cost is a reference value used for link selection in STP. By calculating path costs, STP selects relatively
robust links and blocks redundant links, and finally prunes the network into a loop-free tree.
321
• Designated port ID—Designated port priority plus port name.
• Message age—Age of the configuration BPDU while it propagates in the network.
• Max age—Maximum age of the configuration BPDU that can be maintained on a device.
• Hello time—Configuration BPDU interval.
• Forward delay—The delay used by STP bridges to transit the state of the root and designated ports
to forwarding.
NOTE:
For simplicity, the descriptions and examples in this document involve only the following fields in the
configuration BPDUs:
• Root bridge ID (represented by device priority)
• Root path cost (related to the rate of the link connecting the port)
• Designated bridge ID (represented by device priority)
• Designated port ID (represented by port name)
Step Actions
Upon receiving a configuration BPDU on a port, the device performs the following:
• If the received configuration BPDU has a lower priority than that of the configuration
BPDU generated by the port, the device discards the received configuration BPDU and
1 does not process the configuration BPDU of this port.
• If the received configuration BPDU has a higher priority than that of the configuration
BPDU generated by the port, the device replaces the content of the configuration BPDU
generated by the port with the content of the received configuration BPDU.
The device compares the configuration BPDUs of all ports and selects the optimum
2
configuration BPDU.
NOTE:
Configuration BPDU comparison uses the following principles:
• The configuration BPDU that has the lowest root bridge ID has the highest priority.
• If all configuration BPDUs have the same root bridge ID, their root path costs are compared. For example, the root
path cost in a configuration BPDU plus the path cost of a receiving port is S. The configuration BPDU with the
smallest S value has the highest priority.
• If all configuration BPDUs have the same S value, their designated bridge IDs, designated port IDs, and the IDs of
the receiving ports are compared in sequence. The configuration BPDU containing a smaller ID wins out.
322
Initially, each STP-enabled device on the network assumes itself to be the root bridge, with the root bridge
ID being its own device ID. By exchanging configuration BPDUs, the devices compare their root bridge
IDs to elect the device with the smallest root bridge ID as the root bridge.
• Selection of the root port and designated ports on a non-root device
Table 145 Selection of the root port and designated ports
Step Description
A non-root device regards the port on which it received the optimum configuration BPDU
1
as the root port.
Based on the configuration BPDU and the path cost of the root port, the device calculates a
designated port configuration BPDU for each of the rest ports.
• The root bridge ID is replaced with that of the configuration BPDU of the root port.
2 • The root path cost is replaced with that of the configuration BPDU of the root port plus
the path cost of the root port.
• The designated bridge ID is replaced with the ID of this device.
• The designated port ID is replaced with the ID of this port.
The device compares the calculated configuration BPDU with the configuration BPDU on
the port of which the port role is to be defined, and acts depending on the comparison
result:
• If the calculated configuration BPDU is superior, the device considers this port as the
3 designated port, and it replaces the configuration BPDU on the port with the calculated
configuration BPDU, which will be sent out periodically.
• If the configuration BPDU on the port is superior, the device blocks this port without
updating its configuration BPDU. The blocked port can receive BPDUs but cannot send
BPDUs or forward data.
NOTE:
When the network topology is stable, only the root port and designated ports forward traffic. Other ports
are all in the blocked state; they receive BPDUs but do not forward BPDUs or user traffic.
A tree-shape topology forms upon successful election of the root bridge, the root port on each non-root
bridge, and the designated ports.
The following is an example of how the STP algorithm works. As shown in Figure 316, the priority of
Device A is 0, the priority of Device B is 1, the priority of Device C is 2, and the path costs of these links
are 5, 10, and 4, respectively.
323
Figure 316 Network diagram for the STP algorithm
324
BPDU of port after
Device Comparison process
comparison
• Port BP1 receives the configuration BPDU of Device A {0, 0,
0, AP1}. Device B finds that the received configuration BPDU
is superior to the configuration BPDU of the local port {1, 0,
1, BP1} and updates the configuration BPDU of BP1.
BP1: {0, 0, 0, AP1}
• Port BP2 receives the configuration BPDU of Device C {2, 0,
BP2: {1, 0, 1, BP2}
2, CP2}. Device B finds that the configuration BPDU of the
local port {1, 0, 1, BP2} is superior to the received
configuration BPDU and discards the received configuration
BPDU.
• Device B compares the configuration BPDUs of all its ports
and determines that the configuration BPDU of BP1 is the
Device B
optimum configuration BPDU. Then, it uses BP1 as the root
port, the configuration BPDUs of which are not changed.
• Based on the configuration BPDU of BP1 and the path cost of Root port BP1:
the root port (5), Device B calculates a designated port
{0, 0, 0, AP1}
configuration BPDU for BP2 {0, 5, 1, BP2}.
Designated port BP2:
• Device B compares the calculated configuration BPDU {0, 5,
1, BP2} with the configuration BPDU of BP2. If the calculated {0, 5, 1, BP2}
BPDU is superior, BP2 acts as the designated port, and the
configuration BPDU on this port is replaced with the
calculated configuration BPDU, which will be sent out
periodically.
• Port CP1 receives the configuration BPDU of Device A {0, 0,
0, AP2}. Device C finds that the received configuration BPDU
is superior to the configuration BPDU of the local port {2, 0,
2, CP1} and updates the configuration BPDU of CP1.
CP1: {0, 0, 0, AP2}
• Port CP2 receives the configuration BPDU of port BP2 of
CP2: {1, 0, 1, BP2}
Device B {1, 0, 1, BP2} before the configuration BPDU is
updated. Device C finds that the received configuration BPDU
is superior to the configuration BPDU of the local port {2, 0,
2, CP2} and updates the configuration BPDU of CP2.
After comparison:
• The configuration BPDU of CP1 is elected as the optimum
configuration BPDU, so CP1 is identified as the root port, the Root port CP1:
Device C configuration BPDUs of which are not changed. {0, 0, 0, AP2}
• Device C compares the calculated designated port
Designated port CP2:
configuration BPDU {0, 10, 2, CP2} with the configuration
BPDU of CP2, and CP2 becomes the designated port, and the {0, 10, 2, CP2}
configuration BPDU of this port is replaced with the calculated
configuration BPDU.
• Then, port CP2 receives the updated configuration BPDU of
Device B {0, 5, 1, BP2}. Because the received configuration
BPDU is superior to its own configuration BPDU, Device C
CP1: {0, 0, 0, AP2}
launches a BPDU update process.
CP2: {0, 5, 1, BP2}
• At the same time, port CP1 receives periodic configuration
BPDUs from Device A. Device C does not launch an update
process after comparison.
325
BPDU of port after
Device Comparison process
comparison
After comparison:
• Because the root path cost of CP2 (9) (root path cost of the
BPDU (5) plus path cost corresponding to CP2 (4)) is smaller
than the root path cost of CP1 (10) (root path cost of the BPDU
(0) + path cost corresponding to CP2 (10)), the BPDU of CP2
Blocked port CP2:
is elected as the optimum BPDU, and CP2 is elected as the
root port, the messages of which are not changed. {0, 0, 0, AP2}
• After comparison between the configuration BPDU of CP1 Root port CP2:
and the calculated designated port configuration BPDU, port {0, 5, 1, BP2}
CP1 is blocked, with the configuration BPDU of the port
unchanged, and the port does not receive data from Device A
until a spanning tree calculation process is triggered by a new
event (for example, the link from Device B to Device C going
down).
After the comparison processes described in Table 147, a spanning tree with Device A as the root bridge
is established, as shown in Figure 317.
Figure 317 The final calculated spanning tree
NOTE:
The spanning tree calculation process in this example is only a simplified process.
326
• If a path becomes faulty, the root port on this path no longer receives new configuration BPDUs, and
the old configuration BPDUs are discarded due to timeout. The device generates configuration
BPDUs with itself as the root. This triggers a new spanning tree calculation process to establish a
new path to restore the network connectivity.
However, the newly calculated configuration BPDU is not propagated throughout the network
immediately, so the old root ports and designated ports that have not detected the topology change
continue forwarding data along the old path. If the new root ports and designated ports begin to forward
data as soon as they are elected, a temporary loop may occur.
STP timers
STP calculation involves the following timers: forward delay, hello time, and max age.
• Forward delay is the delay time for device state transition.
A path failure can cause spanning tree re-calculation to adapt the spanning tree structure to the change.
However, the resulting new configuration BPDU cannot propagate throughout the network immediately. If
the newly elected root ports and designated ports start to forward data right away, a temporary loop is
likely to occur.
For this reason, as a mechanism for state transition in STP, the newly elected root ports or designated
ports require twice the forward delay time before transiting to the forwarding state to make sure that the
new configuration BPDU has propagated throughout the network.
• Hello time—The time interval at which a device sends hello packets to the surrounding devices to
make sure that the paths are fault-free.
• Max age—Parameter used to determine whether a configuration BPDU held by the device has
expired. A configuration BPDU beyond the max age is discarded.
Introduction to RSTP
Developed based on the 802.1w standard of IEEE, RSTP is an optimized version of STP. It achieves rapid
network convergence by allowing a newly elected root port or designated port to enter the forwarding
state much quicker under certain conditions than in STP.
NOTE:
• In RSTP, a newly elected root port can enter the forwarding state rapidly if this condition is met: the old root port on
the device has stopped forwarding data, and the upstream designated port has started forwarding data.
• In RSTP, a newly elected designated port can enter the forwarding state rapidly if this condition is met: the
designated port is an edge port or a port connected to a point-to-point link. If the designated port is an edge port,
it can enter the forwarding state directly. If the designated port is connected to a point-to-point link, it can enter the
forwarding state immediately after the device undergoes handshake with the downstream device and receives a
response.
Introduction to MSTP
Why MSTP
STP and RSTP limitations
STP does not support rapid state transition of ports. A newly elected root port or designated port must
wait twice the forward delay time before transiting to the forwarding state, even if it is a port on a
point-to-point link or an edge port, which directly connects to a user terminal rather than to another device
or to a shared LAN segment.
327
Although RSTP supports rapid network convergence, it has the same drawback as STP: all bridges within
a LAN share the same spanning tree, so redundant links cannot be blocked based on VLAN, and the
packets of all VLANs are forwarded along the same spanning tree.
Features of MSTP
Developed based on IEEE 802.1s, MSTP overcomes the limitations of STP and RSTP. In addition to the
support for rapid network convergence, it also allows data flows of different VLANs to be forwarded
along separate paths, providing a better load sharing mechanism for redundant links.
MSTP includes the following features:
• MSTP supports mapping VLANs to MSTIs by means of a VLAN-to-instance mapping table. MSTP can
reduce communication overheads and resource usage by mapping multiple VLANs to one MSTI.
• MSTP divides a switched network into multiple regions, each containing multiple spanning trees that
are independent of one another.
• MSTP prunes a loop network into a loop-free tree, avoiding proliferation and endless cycling of
packets in a loop network. In addition, it provides multiple redundant paths for data forwarding,
supporting load balancing of VLAN data.
• MSTP is compatible with STP and RSTP.
328
Assume that all devices in Figure 318 are running MSTP. This section explains some basic concepts of
MSTP.
MST region
An MST region consists of multiple devices in a switched network and the network segments among them.
These devices have the following characteristics:
• All are MSTP-enabled.
• They have the same region name.
• They have the same VLAN-to-instance mapping configuration.
• They have the same MSTP revision level configuration.
• They are physically linked with one another.
For example, all devices in region A0 in Figure 318 have the same MST region configuration.
• They have the same region name.
• They have the same VLAN-to-instance mapping configuration (VLAN 1 is mapped to MSTI 1, VLAN
2 to MSTI 2, and the rest to the common and internal spanning tree (CIST or MSTI 0)).
• They have the same MSTP revision level (not shown in the figure).
Multiple MST regions can exist in a switched network. You can assign multiple devices to the same MST
region.
VLAN-to-instance mapping table
As an attribute of an MST region, the VLAN-to-instance mapping table describes the mapping
relationships between VLANs and MSTIs. In Figure 318, for example, the VLAN-to-instance mapping
table of region A0 is: VLAN 1 is mapped to MSTI 1, VLAN 2 to MSTI 2, and the rest to CIST. MSTP
achieves load balancing by means of the VLAN-to-instance mapping table.
IST
An IST is a spanning tree that runs in an MST region.
ISTs in all MST regions and the CST jointly constitute the CIST of the entire network. An IST is a section of
the CIST in an MST region.
In Figure 318, for example, the CIST has a section in each MST region, and this section is the IST in the
respective MST region.
CST
The CST is a single spanning tree that connects all MST regions in a switched network. If you regard each
MST region as a device, the CST is a spanning tree calculated by these devices through STP or RSTP.
CSTs are indicated by red lines in Figure 318.
CIST
Jointly constituted by ISTs and the CST, the CIST is a single spanning tree that connects all devices in a
switched network.
In Figure 318, for example, the ISTs in all MST regions plus the inter-region CST constitute the CIST of the
entire network.
MSTI
Multiple spanning trees can be generated in an MST region through MSTP, each spanning tree being
independent of the others. Each spanning tree is referred to as an "MSTI."
329
In Figure 318, for example, multiple MSTIs can exist in each MST region, each MSTI corresponding to
the specified VLANs.
Regional root bridge
The root bridge of the IST or an MSTI within an MST region is the regional root bridge of the IST or the
MSTI. Based on the topology, different spanning trees in an MST region may have different regional
roots.
For example, in region D0 in Figure 318, the regional root of MSTI 1 is device B, and that of MSTI 2 is
device C.
Common root bridge
The common root bridge is the root bridge of the CIST.
In Figure 318, for example, the common root bridge is a device in region A0.
Boundary port
A boundary port is a port that connects an MST region to another MST region, or to a single
spanning-tree region running STP, or to a single spanning-tree region running RSTP. It is at the boundary
of an MST region.
During MSTP calculation, the role of a boundary port in an MSTI must be consistent with its role in the
CIST. But this is not true with master ports. A master port on MSTIs is a root port on the CIST. For example,
in Figure 318, if a device in region A0 is interconnected to the first port of a device in region D0 and the
common root bridge of the entire switched network is located in region A0, the first port of that device in
region D0 is the boundary port of region D0.
Roles of ports
MSTP calculation involves the following port roles: root port, designated port, master port, boundary port,
alternate port, and backup port.
• Root port—A port responsible for forwarding data to the root bridge.
• Designated port—A port responsible for forwarding data to the downstream network segment or
device.
• Master port—A port on the shortest path from the current region to the common root bridge,
connecting the MST region to the common root bridge. If the region is seen as a node, the master
port is the root port of the region on the CST. The master port is a root port on IST/CIST and still a
master port on the other MSTIs.
• Alternate port—The standby port for the root port and the master port. When the root port or master
port is blocked, the alternate port becomes the new root port or master port.
• Backup port—The backup port of a designated port. When the designated port is blocked, the
backup port becomes a new designated port and starts forwarding data without delay. A loop
occurs when two ports of the same MSTP device are interconnected. The device blocks either of the
two ports, and the backup port is the port that is blocked.
A port can play different roles in different MSTIs.
330
Figure 319 Port roles
In Figure 319, devices A, B, C, and D constitute an MST region. Port 1 and port 2 of device A are
connected to the common root bridge. Port 5 and port 6 of device C form a loop. Port 3 and port 4 of
Device D are connected downstream to the other MST regions.
Port states
In MSTP, a port may be in one of the following states:
• Forwarding—The port learns MAC addresses and forwards user traffic.
• Learning—The port learns MAC addresses but does not forward user traffic.
• Discarding—The port does not learn MAC addresses or forward user traffic.
NOTE:
A port can have different port states in different MSTIs.
A port state is not exclusively associated with a port role. Table 148 lists the port states supported by
each port role. ("√" indicates that the port state is available for the corresponding port role, and "—"
indicates that the port state is not available for the corresponding port role.)
Table 148 Ports states supported by different port roles
Port role
Learning √ √ √ — —
331
Port role
332
• IEEE 802.1s, Multiple Spanning Tree Protocol
Configuring MSTP
Configuration task list
Before configuring MSTP, determine the role of each device in each MSTI: root bridge or leaf node. In
each MSTI, only one device acts as the root bridge, and all others act as leaf nodes.
Table 149 MSTP configuration task list
Task Remarks
Optional.
Configure the MST region-related parameters and VLAN-to-instance
Configuring an MSTP region mappings.
By default, the MST region-related parameters adopt the default values,
and all VLANs in an MST region are mapped to MSTI 0.
Required.
Enable MSTP globally, and configure MSTP parameters.
Configuring MSTP globally
By default, MSTP is globally disabled, and all MSTP parameters adopt the
default values.
Optional.
Enable MSTP on a port, and configure MSTP parameters.
Configuring MSTP on a port
By default, MSTP is enabled on ports, and all MSTP parameters adopt the
default values.
Click Modify to display the MSTP region configuration page, as shown in Figure 321.
333
Figure 321 Modify an MST region
Item Description
MST region name.
Region Name
The MST region name is the bridge MAC address of the device by default.
Instance ID
Manually add VLAN-to-instance mappings. Click Apply to add a
Manual VLAN ID
VLAN-to-instance mapping entry to the list.
Apply
Set the modulo value based on which 4094 VLANs are automatically
mapped to the corresponding MSTIs.
With the modulo value set, each VLAN is mapped to the MSTI whose ID is
Modulo (VLAN ID–1) %modulo + 1, where (VLAN ID-1) %modulo is the modulo
operation for (VLAN ID–1). If the modulo value is 15, for example, VLAN
1 is mapped to MSTI 1, VLAN 2 to MSTI 2, VLAN 15 to MSTI 15, VLAN
16 to MSTI 1, and so on.
Validate the VLAN-to- instance mappings, the region name, and the
Activate
revision level.
334
Figure 322 Configure MSTP globally
Item Description
Enable or disable STP globally:
• Enable—Enable STP globally.
Enable STP Globally
• Disable—Disable STP globally.
Other MSTP configurations take effect only after you enable STP globally.
335
Item Description
Set the STP operating mode:
• STP mode—All ports of the device send out STP BPDUs.
• RSTP mode—All ports of the device send out RSTP BPDUs. If the device detects
that it is connected to a legacy STP device, the port connecting to the legacy
Mode
STP device automatically migrates to STP-compatible mode.
• MSTP—All ports of the device send out MSTP BPDUs. If the device detects that
it is connected to a legacy STP device, the port connecting to the legacy STP
device automatically migrates to STP-compatible mode.
Set the maximum number of hops in an MST region to restrict the region size.
Max Hops
The setting can take effect only when it is configured on the regional root bridge.
Specify the standard for path cost calculation. It can be Legacy, IEEE
Path Cost Standard
802.1D-1998, or IEEE 802.1T.
Set the delay for the root and designated ports to transit
to the forwarding state. TIP:
336
Item Description
Set the maximum length of time a configuration BPDU be configured
can be held by the device. together with the
timers.
If the max age time setting is too small, the network
devices frequently launches spanning tree calculations
Max Age and may take network congestion as a link failure. If the
max age setting is too large, the network may fail to
timely detect link failures and fail to timely launch
spanning tree calculations, reducing the auto-sensing
capability of the network. HP recommends that you use
the default setting.
Bridge Set the bridge priority of the device, which is one of the factors determining
Priority whether the device can be elected as the root bridge.
Set the maximum number of immediate forwarding address entry flushes the
TC Protection Threshold device can perform within a certain period of time after receiving the first
TC-BPDU.
337
Click the icon corresponding to a port to display the MSTP Port Configuration page of the port, as
shown in Figure 324.
Figure 324 MSTP configuration of a port (2)
Item Description
Port Number Select the port to configure.
338
Item Description
In a switched network, if a port on an MSTP device connects to an STP device,
this port automatically migrates to the STP-compatible mode. However, after the
STP device is removed, whether the port on the MSTP device can migrate
automatically to the MSTP mode depends on which of the following parameters is
mCheck selected:
• Enable—Performs mCheck. The port automatically migrates back to the MSTP
mode.
• Disable—Does not perform mCheck. The port does not automatically migrate
back to the MSTP mode.
Path Cost Select to calculate the path cost automatically or set the path cost manually.
339
Configure MSTP so that packets of different VLANs are forwarded along different instances: packets of
VLAN 10 along MSTI 1, those of VLAN 30 along MSTI 3, those of VLAN 40 along MSTI 4, and those of
VLAN 20 along MSTI 0.
VLAN 10 and VLAN 30 are terminated on the distribution layer routers, and VLAN 40 is terminated on
the access layer routers, so the root bridges of MSTI 1 and MSTI 3 are Router A and Router B,
respectively, and the root bridge of MSTI 4 is Router C.
Figure 325 Network diagram
N 1 0/1
Eth it: VL
Per
0
0, 2
Eth
0/1
m
LA
AN
:V
mit
20,
E th
0/1
Per
30
Eth
0/1
NOTE:
"Permit:" next to a link in the figure is followed by the VLANs whose packets are permitted to pass this link.
Configuration procedure
1. Configure VLANs and VLAN member ports. (Details not shown)
Create VLAN 10, VLAN 20, and VLAN 30 on Router A and Router B, respectively. Create VLAN 10,
VLAN 20, and VLAN 40 on Router C. Create VLAN 20, VLAN 30, and VLAN 40 on Router D. Configure
the ports on these routers as hybrid ports, and assign them to related VLANs. Configure the security zones
to which the combinations of these ports and their permitted VLANs belong.
2. Configure Router A.
# Create an MST region named example, map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3,
and MSTI 4, respectively, and configure the revision level of the MST region as 0.
• Log in to Router A. Select Advanced > MSTP > Region from the navigation tree, click Modify, and
perform the following configurations on the page shown in Figure 326.
340
Figure 326 Configure an MST region on Router A
# Enable MSTP globally, and configure the current device as the root bridge of MSTI 1.
• Select Advanced > MSTP > Global from the navigation tree, and perform the following
configurations on the page shown in Figure 327.
341
Figure 327 Configure global MSTP parameters on Router A
342
# Create an MST region named example, map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3,
and MSTI 4, respectively, and configure the revision level of the MST region as 0. (The procedure here is
the same as that of configuring an MST region on Router A.)
# Enable MSTP globally, and configure the current device as the root bridge of MSTI 4.
a. Select Advanced > MSTP > Global from the navigation tree, and perform the following
configurations on the page similar to that shown in Figure 327.
b. Select Enable in the Enable STP Globally list.
c. Select MSTP in the Mode list.
d. Select the Instance checkbox.
e. Set the Instance ID field to 4.
f. Set the Root Type field to Primary.
g. Click Apply to submit the settings.
5. Configure Router D.
# Create an MST region named example, map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3,
and MSTI 4, respectively, and configure the revision level of the MST region as 0. (The procedure here is
the same as that of configuring an MST region on Router A.)
# Enable MSTP globally.
a. Select Advanced > MSTP > Global from the navigation tree, and perform the following
configurations on the page similar to that shown in Figure 327.
b. Select Enable in the Enable STP Globally list.
c. Select MSTP in the Mode list.
d. Click Apply to submit the settings.
343
3 Ethernet0/1 DESI FORWARDING NONE
3 Ethernet0/3 DESI FORWARDING NONE
Based on the above information, you can draw the MSTI corresponding to each VLAN, as shown
in Figure 328.
Figure 328 MSTIs corresponding to different VLANs
Configuration guidelines
Follow these guidelines when you configure MSTP:
344
1. Two or more MSTP-enabled devices belong to the same MST region only if they are configured with
the same format selector (0 by default, not configurable), MST region name, VLAN-to-instance
mapping entries in the MST region, and MST region revision level, and they are interconnected
through physical links.
2. After specifying the current device as the root bridge or a secondary root bridge, you cannot
change the priority of the device.
3. If two or more devices with the same bridge priority have been designated to be root bridges of the
same spanning tree instance, MSTP selects the device with the lowest MAC address as the root
bridge.
4. The values of forward delay, hello time, and max age are interdependent. Inappropriate settings of
these values may cause network flapping. HP recommends that you set the network diameter and let
the device automatically set an optimal hello time, forward delay, and max age. The settings of hello
time, forward delay and max age must meet the following formulas:
2 × (forward delay – 1 second) ƒ max age
Max age ƒ 2 × (hello time + 1 second)
5. If the device is not enabled with BPDU guard, when an edge port receives a BPDU from another
port, it transits into a non-edge port. To restore its port role as an edge port, restart the port.
6. Configure ports that are directly connected to terminals as edge ports, and enable BPDU guard for
them. In this way, these ports can rapidly transit to the forwarding state, and network security can be
ensured.
345
Configuring RADIUS
NOTE:
For more information about RADIUS and AAA, see HP A-MSR Router Series Security Configuration
Guide.
346
Figure 330 RADIUS scheme configuration page
Item Description
Scheme Name Enter a name for the RADIUS scheme.
Configure the common parameters for the RADIUS scheme, including the server
type, username format, and shared keys for authentication and accounting
Common Configuration
packets. For more information about common configuration, see "Common
configuration."
Common configuration
Click the expand button before Advanced in the Common Configuration area to expand the advanced
configuration area, as shown in Figure 331.
347
Figure 331 Common configuration
Item Description
Select the type of the RADIUS servers supported by the device:
• Standard—Configures the RADIUS client to communicate with the RADIUS
server by using the standard RADIUS protocol and packet format defined in
Server Type RFC 2865/2866 or later.
• Extended—Configures the RADIUS client to communicate with the RADIUS
server (usually an iMC server) by using the proprietary RADIUS protocol and
packet format.
348
Item Description
Select the format of usernames to be sent to the RADIUS server, including Original
format, With domain name, and Without domain name.
A username is generally in the format of userid@isp-name, of which isp-name is
Username Format used by the device to determine the ISP domain to which a user belongs. If a
RADIUS server (such as a RADIUS server of some early version) does not accept a
username that contains an ISP domain name, you can configure the device to
remove the domain name of a username before sending it to the RADIUS server.
Set the shared key for authenticating RADIUS authentication packets and that for
Authentication Key
authenticating RADIUS accounting packets.
Confirm Authentication The RADIUS client and the RADIUS server use MD5 to encrypt RADIUS packets
Key and use the shared key to authenticate the packets exchanged between them. The
client and the server receive and respond to packets from each other only if their
shared keys are the same.
Accounting Key
NOTE:
The shared keys configured in the common configuration part are used only when no
Confirm Accounting Key
corresponding shared keys are configured in the RADIUS server configuration part.
Set the time to wait before the device restores an unreachable RADIUS server to
active state.
If the primary server is unreachable due to temporary interruption on the network
interface or the busy server, you can set the quiet time to 0 so that authentication
Quiet Time and accounting requests for other users are still sent to the primary server for
processing. When the quiet time is 0, if the server being used is unreachable, the
device keeps the server in active state, and sends the request to the next server in
active state. In this way, subsequent authentication or accounting requests may
still be sent to the server.
Set the interval for sending real-time accounting information to the RADIUS
accounting server. The interval must be a multiple of 3.
Realtime Accounting Different real-time accounting intervals impose different performance requirements
Interval on the NAS and the RADIUS server. A shorter interval helps achieve higher
accounting precision but requires higher performance. Use a longer interval when
a large number of users (1000 or more) exist. For more information about the
recommended real-time accounting intervals, see "Configuration guidelines."
349
Item Description
Realtime Accounting
Set the maximum number of attempts for sending a real-time accounting request.
Attempts
Specify the unit for data flows sent to the RADIUS server: byte, kilo-byte,
Unit for Data Flows
mega-byte, or giga-byte.
Specify the unit for data packets sent to the RADIUS server: one-packet,
Unit for Packets
kilo-packet, mega-packet, or giga-packet.
VPN This setting is effective to all RADIUS authentication servers and accounting
servers configured in the RADIUS scheme, but the VPN individually specified for a
RADIUS authentication or accounting server takes priority.
Security Policy Server Specify the IP address of the security policy server.
Specify the source IP address for the device to use in RADIUS packets sent to the
RADIUS server.
RADIUS Packet Source
IP HP recommends that you use a loopback interface address instead of a physical
interface address as the source IP address, so that when the physical interface is
down, the response packets from the server can still reach the device.
Buffer stop-accounting
packets Enable or disable buffering of stop-accounting requests for which no responses
are received, and set the maximum number of attempts for sending
Stop-Accounting stop-accounting requests
Attempts
Send accounting-on Enable or disable the accounting-on feature, and set the interval and the
packets maximum number of attempts for sending accounting-on packets
Accounting-On Interval The accounting-on feature enables a device to send accounting-on packets to
RADIUS servers after it reboots, making the servers forcedly log out users who
logged in through the device before the reboot.
350
Figure 332 RADIUS server configuration
Item Description
Select the type of the RADIUS server to configure. Possible values include primary
Server Type authentication server, primary accounting server, secondary authentication server,
and secondary accounting server.
Key Specify the shared key for communication with the RADIUS server.
If no shared key is specified here, the shared key specified in the common
Confirm Key configuration part is used.
351
Figure 333 Network diagram
NOTE:
The example below assumes that the RADIUS server runs iMC (iMC PLAT 5.0 and iMC UAM 5.0).
Configuration procedure
1. Configure the RADIUS server.
When the RADIUS server runs iMC:
# Add an access device.
Log in to the iMC management platform, click the Service tab, and select User Service Manager > Access
Device from the navigation tree to display the Access Device page. Then, click Add to display the Add
Access Device page, and perform the following configurations, as shown in Figure 334:
a. Set the shared keys for authentication and accounting packets to expert.
b. Specify the ports for authentication and accounting as 1812 and 1813, respectively.
c. Select Device Management Service as the service type.
d. Select HP as the access device type.
e. Select the access device from the device list, or manually add the device with the IP address of
10.1.1.2.
f. Click OK to finish the operation.
NOTE:
The IP address of the access device specified above must be the same as the source IP address of the
RADIUS packets sent from the device, which is the IP address of the outbound interface for RADIUS packets
(the default), or the IP address specified with the nas-ip or radius nas-ip command.
352
Figure 334 Add an access device
NOTE:
The IP address range of the hosts to be managed must contain the IP address of the access device added.
353
Figure 335 Add a user for device management
354
Figure 336 RADIUS authentication server configuration page
355
Figure 338 RADIUS scheme configuration page
# Configure the AAA methods for domain bbb. Because RADIUS authorization information is sent by the
RADIUS server to the RADIUS client in the authentication response message, be sure to reference the
same scheme for authentication and authorization.
[Router] domain bbb
[Router-isp-bbb] authentication login radius-scheme system
[Router-isp-bbb] authorization login radius-scheme system
[Router-isp-bbb] accounting login radius-scheme system
[Router-isp-bbb] quit
# You can achieve the same result by configuring default AAA methods for all types of users in domain
bbb. (You can use either approach as needed.)
[Router] domain bbb
[Router-isp-bbb] authentication default radius-scheme system
[Router-isp-bbb] authorization default radius-scheme system
[Rfm
Verification
After the configuration, the Telnet user should be able to telnet to the router and use the configured
account (username hello@bbb and password abc) to enter the user interface of the router and access all
commands of level 0 through level 3.
356
Configuration guidelines
When you configure the RADIUS client, note the following guidelines:
1. Accounting for FTP users is not supported.
2. If you remove the accounting server used for online users, the router cannot send real-time
accounting requests and stop-accounting messages for the users to the server, and the
stop-accounting messages are not buffered locally.
3. The status of RADIUS servers—blocked or active—determines which servers the device
communicates with or turns to when the current servers are not available. In practice, you can
specify one primary RADIUS server and multiple secondary RADIUS servers, with the secondary
servers that function as backup of the primary servers. Generally, the device chooses servers based
on these rules:
When the primary server is in active state, the device communicates with the primary server. If
the primary server fails, the device changes the state of the primary server to blocked, starts a
quiet timer for the server, and turns to a secondary server in active state (a secondary server
configured earlier has a higher priority). If the secondary server is unreachable, the device
changes the state of the secondary server to blocked, starts a quiet timer for the server, and
continues to check the next secondary server in active state. This search process continues until
the device finds an available secondary server or has checked all secondary servers in active
state. If the quiet timer of a server expires or an authentication or accounting response is
received from the server, the status of the server changes back to active automatically, but the
device does not check the server again during the authentication or accounting process. If no
server is found reachable during one search process, the device considers the authentication or
accounting attempt a failure.
Once the accounting process of a user starts, the device keeps sending the user's real-time
accounting requests and stop-accounting requests to the same accounting server. If you remove
the accounting server, real-time accounting requests and stop-accounting requests for the user
can no longer be delivered to the server.
If you remove an authentication or accounting server in use, the communication of the device
with the server soon times out, and the device looks for a server in active state from scratch. It
checks the primary server (if any) first and then the secondary servers in the order they are
configured.
When the primary server and secondary servers are all in the blocked state, the device
communicates with the primary server. If the primary server is available, its statues changes to
active. Otherwise, its status remains as blocked.
If one server is in the active state but all others are in the blocked state, the device only tries to
communicate with the server in the active state, even if the server is unavailable.
After receiving an authentication/accounting response from a server, the device changes the
status of the server identified by the source IP address of the response to active if the current
status of the server is blocked.
357
4. Table 157 lists the recommended real-time accounting intervals.
Table 157 Recommended real-time accounting intervals
100 to 499 6
500 to 999 12
358
Configuring login control
The login control feature allows you to control web or Telnet logins of specified users based on IP address
and login type.
To configure login control:
From the navigation tree, select Advanced > Access to display the login control configuration page. The
upper part of the page allows you to configure login control rules, and the lower part displays existing
login control rules. You can also delete the rules.
Figure 339 Login control configuration
Item Description
Login Type Select the login type to be restricted: Telnet, web, or both.
IMPORTANT:
• Exclude the management IP segment from login control. Otherwise, you cannot
Wildcard log in to the device.
• Do not set the wildcard to 255.255.255.255. Otherwise, no users can log in to
the device.
359
Login control configuration example
Network requirements
As shown in Figure 340, configure login control rules so that Host A cannot telnet to Router, and Host B
cannot access Router through the web.
Figure 340 Network diagram
Configuration procedure
# Configure a login control rule so that Host A cannot telnet to Router.
• Select Advanced > Access from the navigation tree to display the page for configuring login control
rules. Perform the configurations shown in Figure 341.
Figure 341 Configure a login control rule so that Host A cannot telnet to Router
360
e. Click OK. A configuration progress dialog box appears, as shown in Figure 342.
f. After completing the settings, click Close.
Figure 342 Configuration progress dialog box
# Configure a login control rule so that Host B cannot access Router through the web.
• Select Advanced > Access from the navigation tree to display the page for configuring login control
rules.
Figure 343 Configure a login control rule so that Host B cannot access Router through the web
361
Configuring ARP
NOTE:
For more information about ARP, see HP A-MSR Router Series Layer 3—IP Services Configuration Guide.
Gratuitous ARP
Gratuitous ARP packets
In a gratuitous ARP packet, the sender IP address and the target IP address are the IP address of the
sending device. The sender MAC address is the MAC address of the sending device. The target MAC
address is the broadcast address ff:ff:ff:ff:ff:ff.
A device sends a gratuitous ARP packet for either of the following purposes:
• To determine whether its IP address is already used by another device. If the IP address is already
used, the device is informed of the conflict by an ARP reply.
• To inform other devices of the change of its MAC address.
362
Figure 344 ARP Table configuration page
Item Description
IP Address Enter an IP address for the static ARP entry.
MAC Address Enter a MAC address for the static ARP entry.
Enter a VLAN ID and specify a port for the static ARP entry.
VLAN ID
NOTE:
The VLAN ID must be the ID of the VLAN that has already been created, and the port
Advanced must belong to the VLAN. The corresponding VLAN interface must have been
Port
Options created.
VPN
Enter the name of the VPN instance to which the static ARP entry belongs.
Instance
363
• To remove specific ARP entries, select the checkboxes for target ARP entries, and click Del Selected.
• To remove all static and dynamic ARP entries, click Delete Static and Dynamic.
• To remove all static ARP entries, click Delete Static.
• To remove all dynamic ARP entries, click Delete Dynamic.
• To disable all listed interfaces from learning dynamic ARP entries, click Disable all.
• To disable specific interfaces from learning dynamic ARP entries, select target interfaces and click
Disable selected.
• To allow all listed interfaces to learn dynamic ARP entries, click Enable all.
• To allow specific interfaces to learn dynamic ARP entries, select target interfaces and click Enable
selected.
• Click the icon of an interface to display the configuration page as shown in Figure 347, and
specify the maximum number of dynamic ARP entries that this interface can learn. If you enter 0, the
interface is disabled from learning dynamic ARP entries.
364
Figure 347 Modify an interface
NOTE:
If you enable an interface to learn dynamic ARP entries on the dynamic entry management page, the
number of dynamic ARP entries that the interface can learn restores the default.
Item Description
Disable learning of ARP entries according to
Disable gratuitous ARP packets learning function
gratuitous ARP packets.
365
Figure 349 Network diagram
Configuration procedure
# Create VLAN 10 and VLAN-interface 10.
• Select Interface Setup > LAN Interface Setup from the navigation tree to display the default VLAN
Setup page. Perform the following configurations, as shown in Figure 350.
Figure 350 Create VLAN 10 and VLAN-interface10
366
Figure 351 Add Ethernet 0/1 to VLAN 10
a. As shown in Figure 351, on the VLAN Setup page, select 10 in the VLAN Config field.
b. Select Ethernet0/1 from the list.
c. Click Add. A configuration progress dialog box is displayed, as shown in Figure 352.
d. After the configuration process is complete, click Close.
367
Figure 353 Configure the IP address of VLAN-interface 10
368
Figure 354 Create a static ARP entry
369
Figure 355 Display information about static ARP entries page
370
Configuring ARP attack protection
You can do the following to configure ARP attack defense on the web interface:
• Configure periodic sending of gratuitous ARP packets
• Configure ARP automatic scanning
• Configure fixed ARP
Although ARP is easy to implement, it provides no security mechanism and is prone to network attacks.
ARP attacks and viruses threaten LAN security. The router can provide the following features to detect and
prevent such attacks.
371
Figure 356 Send Gratuitous ARP configuration page
Item Description
Select one or more interfaces on which gratuitous ARP packets will be sent out
periodically, and set the interval at which gratuitous ARP packets are sent.
To enable an interface to send out gratuitous ARP packets periodically, select the
interface from the Standby Interface list box, and click <<. To disable an interface
from periodic sending of gratuitous ARP packets, select the interface from the Sending
Interface list box, and click >>.
NOTE:
• You can enable periodic sending of gratuitous ARP packets on a maximum of
1024 interfaces.
Sending Interface
• This feature takes effect only when the link of the enabled interface goes up and
an IP address has been assigned to the interface.
• If you change the interval for sending gratuitous ARP packets, the configuration is
effective at the next sending interval.
• The frequency of sending gratuitous ARP packets may be much lower than is
expected if this function is enabled on multiple interfaces, or if each interface is
configured with multiple secondary IP addresses, or if a small sending interval is
configured in the preceding cases.
• Do not configure this feature on an interface belonging to a VRRP group.
372
Figure 357 ARP Scan configuration page
Item Description
Interface Specify the interface on which to perform ARP automatic scanning.
After the preceding configuration is complete, click Scan to start an ARP automatic scan. To stop an
ongoing scan, click Interrupt. After the scanning is complete, a prompt Scanning is complete appears.
You can view the generated dynamic ARP entries by selecting Advanced > ARP Anti-Attack > Fixed ARP
from the navigation tree.
373
Configuring fixed ARP
NOTE:
• The static ARP entries changed from dynamic ARP entries have the same attributes as the static ARP entries manually
configured.
• The number of static ARP entries changed from dynamic ARP entries is restricted by the number of static ARP entries
that the device supports. As a result, the device may fail to change all dynamic ARP entries into static ARP entries.
• Suppose that the number of dynamic ARP entries is D and that of the existing static ARP entries is S. When the
dynamic ARP entries are changed into static, new dynamic ARP entries may be created (suppose the number is M)
and some of the dynamic ARP entries may be aged out (suppose the number is N). After the process is complete,
the number of static ARP entries is D + S + M – N.
Select Advanced > ARP Anti-Attack > Fix from the navigation tree to display the page shown in Figure
358. The page displays all dynamic ARP entries and static ARP entries (including those manually
configured and changed by the fixed ARP feature).
Figure 358 Fixed ARP configuration page
• To change all dynamic ARP entries into static, click Fix All. This operation does not affect existing
static ARP entries.
• To remove all static ARP entries, click Del All Fixed. This operation does not affect dynamic ARP
entries.
• To change a specific dynamic ARP entry into a static ARP entry, select the ARP entry, and click Fix.
This operation does not take effect if you select a static ARP entry.
• To remove a specific static ARP entry, select the ARP entry, and click Del Fixed. This operation does
not take effect if you select a dynamic ARP entry.
374
Configuring IPsec VPN
You can perform the following IPsec VPN configurations in the web interface:
• Configuring an IPsec connection
• Displaying IPsec VPN monitoring information
IPsec is a security framework defined by the IETF for securing IP communications. It is a Layer 3 VPN
technology that transmits data in a secure tunnel established between two endpoints.
IPsec provides the following security services in insecure network environments:
• Confidentiality—The sender encrypts packets before transmitting them over the Internet, protecting
the packets from being eavesdropped en route.
• Data integrity—The receiver verifies the packets received from the sender to make sure they are not
tampered with during transmission.
• Data origin authentication—The receiver verifies the authenticity of the sender.
• Anti-replay—The receiver examines packets and drops outdated and duplicate packets.
IPsec delivers these benefits:
• Reduced key negotiation overheads and simplified maintenance by supporting the IKE protocol. IKE
provides automatic key negotiation and automatic IPsec SA setup and maintenance.
• Good compatibility. You can apply IPsec to all IP-based application systems and services without
modifying them.
• Encryption on a per-packet rather than per-flow basis. Per-packet encryption allows for flexibility and
greatly enhances IP security.
IKE is built on a framework defined by ISAKMP. It provides automatic key negotiation and SA
establishment services for IPsec, dramatically simplifying the application, management, configuration and
maintenance of IPsec.
Instead of transmitting keys directly across a network, IKE peers transmit keying materials between them
and calculate shared keys. Even if a third party captures all exchanged data for calculating the keys, it
cannot calculate the keys.
NOTE:
For more information about IPsec and IKE, see HP A-MSR Router Series Security Configuration Guide.
Task Remarks
Configuring an IPsec connection Required.
375
Task Remarks
Optional.
Displays configuration and status information of IPsec connections and
Displaying IPsec VPN monitoring
information of IPsec tunnels.
information
Allows you to delete tunnels that are set up with configuration of an
IPsec connection and delete all ISAKMP SAs of all IPsec connections.
2. Click Add.
3. Configure basic parameters, as described in Table 164.
376
Figure 360 Add an IPsec connection
Item Description
IPsec Connection
Enter a name for the IPsec connection.
Name
377
Item Description
Enter the IP address of the local gateway.
By default, it is the primary IP address of the interface where the IPsec connection is
set up.
Local Gateway NOTE:
Address
Configure this item when you want to specify a special address (a loopback interface
address, for example) for the local gateway. The name or IP address of the remote
gateway is required for an initiator so that the initiator can find the remote peer in
negotiation.
378
Item Description
• To make sure that SAs can be set up, configure the source address/wildcard
on one peer as the destination address/wildcard on the other, and the
destination address/wildcard on one peer as the source address/wildcard on
the other. If you do not configure the parameters this way, SAs can be set up
Destination only when the IP addresses configured on one peer are subsets of those
Address/Wildcard configured on the other and the peer with the narrower address range initiates
SA negotiation.
• If the data range is designated by the remote gateway, the local peer cannot
initiate a negotiation.
Enable or disable IPsec RRI. When enabling IPsec RRI, you can specify a next hop
and change the preference of the static routes.
After an outbound IPsec SA is created, IPsec RRI automatically creates a static route
to the peer private network. You do not have to manually configure the static route.
NOTE:
Reverse Route Injection • If you enable IPsec RRI and do not configure the static route, the SA negotiation must
be initiated by the remote gateway.
• IPsec RRI creates static routes when IPsec SAs are set up and deletes the static routes
when the IPsec SAs are deleted.
• To view the static routes created by IPsec RRI, select Advanced > Route Setup
[Summary] from the navigation tree.
Specify a next hop for the static routes.
Next Hop If you do not specify any next hop, the remote tunnel endpoint's address learned
during IPsec SA negotiation is used.
379
Figure 361 Advanced configuration
Item Description
Phase 1
380
Item Description
Select the encryption algorithm to be used in IKE negotiation:
• DES-CBC—Uses the DES algorithm in CBC mode and 56-bit key
• 3DES-CBC—Uses the 3DES algorithm in CBC mode and 168-bit key.
Encryption Algorithm
• AES-128—Uses the AES algorithm in CBC mode and 128-bit key.
• AES-192—Uses the AES algorithm in CBC mode and 192-bit key.
• AES-256—Uses the AES algorithm in CBC mode and 256-bit key.
Phase 2
Select the authentication algorithm for ESP when you select ESP or AH-ESP for
Security Protocol.
ESP Authentication
You can select MD5 or SHA1, or select NULL so that ESP performs no authentication.
Algorithm
The ESP authentication algorithm and ESP encryption algorithm cannot be null at the
same time.
381
Item Description
Select the encryption algorithm for ESP when you select ESP or AH-ESP for Security
Protocol:
• 3DES—Uses the 3DES algorithm and 168-bit key for encryption.
• DES—Uses the DES algorithm and 56-bit key for encryption.
• AES128—Uses the AES algorithm and 128-bit key for encryption.
• AES192—Uses the AES algorithm and 192-bit key for encryption.
ESP Encryption • AES256—Uses the AES algorithm and 256-bit key for encryption.
Algorithm • NULL—Performs no encryption.
NOTE:
• Higher security means more complex implementation and lower speed. DES is enough
to meet general requirements. Use 3DES when high confidentiality and security are
required.
• The ESP authentication algorithm and ESP encryption algorithm cannot be null at the
same time.
Select the IP packet encapsulation mode:
Encapsulation Mode • Tunnel—Uses the tunnel mode.
• Transport—Uses the transport mode.
Enable and configure the PFS feature or disable the feature:
• None—Disables PFS.
• Diffie-Hellman Group1—Enables PFS and uses the 768-bit Diffie-Hellman group.
• Diffie-Hellman Group2—Enables PFS and uses the 1024-bit Diffie-Hellman
group.
• Diffie-Hellman Group5—Enables PFS and uses the 1536-bit Diffie-Hellman
group.
PFS • Diffie-Hellman Group14—Enables PFS and uses the 2048-bit Diffie-Hellman
group.
NOTE:
• DH Group14, DH Group5, DH Group2, and DH Group1 are in the descending order
of security and calculation time.
• When IPsec uses an IPsec connection with PFS configured to initiate negotiation, an
additional key exchange is performed in phase 2 for higher security.
• Two peers must use the same Diffie-Hellman group. Otherwise, negotiation fails.
Enter the IPsec SA lifetime: time-based or traffic-based.
SA Lifetime When negotiating to set up IPsec SAs, IKE uses the smaller one between the lifetime
set locally and the lifetime proposed by the peer.
DPD Query Enter the interval after which DPD is triggered if no IPsec protected packets is
Triggering Interval received from the peer.
382
Item Description
DPD Packet
Enter the interval after which DPD packet retransmission occurs if no DPD response is
Retransmission
received.
Interval
Field Description
Status of an IPsec connection:
• Connected
Connection Status
• Disconnected
• Unconfigured—The IPsec connection is disabled.
383
Field Description
The most recent error, if any:
• ERROR_NONE—No error occurred.
• ERROR_QM_FSM_ERROR—State machine error.
• ERROR_PHASEI_FAIL—Error occurred in phase 1.
• ERROR_PHASEI_PROPOSAL_UNMATCHED—No matching security proposal in
phase 1.
Last Connection Error
• ERROR_PHASEII_PROPOSAL_UNMATCHED—No matching security proposal in
phase 2.
• ERROR_NAT_TRAVERSAL_ERROR—NAT traversal error.
• ERROR_PHASEII_FAIL—Error occurred in phase 2.
• ERROR_INVALID_SPI—SPI error.
• ERROR_UNKNOWN—Unknown error.
Field Description
Characteristics of the IPsec protected traffic, including the source
Characteristics of Traffic address/wildcard, destination address/wildcard, protocol, source port, and
destination port.
SPI The inbound and outbound SPIs and the security protocols used.
Configuring Router A
# Assign IP addresses to the interfaces. (Details not shown)
# Configure an IPsec connection.
384
Select VPN > IPsec VPN from the navigation tree, and then click Add. The IPsec connection configuration
page appears, as shown in Figure 364.
Figure 364 Add an IPsec connection
Configuring Router B
# Assign IP addresses to the interfaces. (Details not shown)
# Configure a static route to Host A.
Select Advanced > Route Setup from the navigation tree, and then click the Create tab.
385
Figure 365 Configure a static route to Host A
Configuration guidelines
When you configure IPsec, follow these guidelines:
386
• Typically, IKE uses UDP port 500 for communication, and AH and ESP use the protocol numbers 51
and 50, respectively. Make sure that flows of these protocols are not denied on the interfaces with
IKE or IPsec configured.
• If you enable both IPsec and QoS on an interface, traffic of an IPsec SA may be put into different
queues by QoS, causing some packets to be sent out of order. As IPsec performs anti-replay
operation, packets outside the anti-replay window in the inbound direction may be discarded,
resulting in packet loss. When using IPsec together with QoS, make sure that the classification of
traffic in IPsec is the same as the classification of traffic in QoS.
387
Configuring L2TP
You can enable L2TP, configure an L2TP group, and display L2TP tunnel information in the web interface
of the LNS.
A VPDN is a VPN that utilizes the dial-up function of public networks such as ISDN or PSTN networks to
provide access services for enterprises, small ISPs, and telecommuters. VPDN provides an economical
and effective, point-to-point way for remote users to connect to their private LANs.
The VPDN technology uses a tunneling protocol to build secure VPNs across public networks for
enterprises. Branches away from the headquarters and staff on business trips can remotely access the
Intranet resources in the headquarters through a virtual tunnel over public networks, while other users on
the public networks cannot.
There are primarily three VPDN tunneling protocols:
• PPTP
• L2F
• L2TP
L2TP is the most widely-used VPDN tunneling protocol. Figure 366 shows a typical VPDN built by using
L2TP.
Figure 366 VPDN built by using L2TP
A VPDN built by using L2TP comprises three components: remote system, LAC, and LNS.
Remote system
A remote system is usually a remote user's host or a remote branch's routing device that has to access the
VPDN network.
LAC
An LAC is a device that has PPP and L2TP capabilities. An LAC is usually a NAS located at a local ISP,
which provides access services mainly for PPP users.
An LAC is an endpoint of an L2TP tunnel and lies between an LNS and a remote system. It encapsulates
packets received from a remote system using L2TP and then sends the resulting packets to the LNS. It
388
de-encapsulates packets received from the LNS and then sends the resulting packets to the intended
remote system.
Between an LAC and a remote system is a local connection or a PPP link. Usually, a PPP link is used in a
VPDN application.
LNS
An LNS functions as both the L2TP server and the PPP end system. It is usually an edge device on an
enterprise network.
An LNS is the other endpoint of an L2TP tunnel and is a peer to the LAC. It is the logical termination point
of a PPP session tunneled by the LAC. The L2TP extends the termination point of a PPP session from a NAS
to an LNS, logically.
NOTE:
For more information about L2TP, see HP A-MSR Router Series Layer 2—WAN Configuration Guide.
Configuring L2TP
Recommended configuration procedure
Step Remarks
Required.
Enabling L2TP
By default, L2TP is disabled.
Required.
Create a L2TP group, and configure L2TP group related
Adding an L2TP group
parameters.
By default, no L2TP group exists.
Optional.
Displaying L2TP tunnel information
View the L2TP tunnel information.
Enabling L2TP
Select VPN > L2TP > L2TP Config from the navigation tree to display the L2TP configuration page, as
shown in Figure 367. On the upper part of the page, you can enable or disable L2TP.
389
Figure 367 L2TP configuration page
Item Description
Enable L2TP Specify whether to enable L2TP globally.
390
Table 169 Configuration for adding an L2TP group
Item Description
L2TP Group Name Specify the name of the L2TP group.
Select the authentication method for PPP users on the local end.
Authentication
Method You can select PAP or CHAP. If you do not select an
authentication method, no authentication is performed.
Specify the ISP domain for PPP user authentication. You can:
• Click Add to display the page for adding an ISP domain, as
shown in Figure 369. See Table 170 for configuration
details.
• Select an ISP domain and click Modify to display the ISP
domain modification page. See Table 170 for configuration
PPP details.
Authentication • Select an ISP domain and click Delete to delete the ISP
Configuration domain.
ISP Domain NOTE:
• If you specify an ISP domain, the specified domain is used for
authentication, and IP addresses must be assigned from the
address pool configured in the specified domain. See the
description of the User Address parameter for details.
• If you do not specify any ISP domain, the system checks
whether domain information is carried in a username. If it is,
the domain is used for authentication (if the domain does not
exist, the authentication fails). Otherwise, the default domain
(system by default) is used for authentication.
PPP Address PPP Server IP/Mask Specify the IP address and mask of the local end.
391
Item Description
Specify the address pool for assigning IP addresses to users on
the peer end, or assign an IP address to a user directly.
If you have specified an ISP domain in PPP authentication
configuration, the address pools in the ISP domain are listed in
the User Address list. You can:
• Click Add to add an address pool, as shown in Figure 370.
User Address
See Table 171 for configuration details.
• Select an address pool and click Modify to display the
address pool modification page. See Table 171 for
configuration details.
• Select an address pool and click Delete to delete the address
pool.
Flow Control The L2TP tunnel flow control function is for control of data packets
in transmission. The flow control function helps in buffering and
adjusting the received out-of-order data packets.
392
Item Description
Configure user authentication on an LNS.
An LNS may be configured to authenticate a user who has
passed authentication on the LAC to increase security. In this
case, an L2TP tunnel can be set up only when both of the
Mandatory CHAP authentications succeed. An LNS can authenticate users in three
ways: mandatory CHAP authentication, LCP re-negotiation, and
proxy authentication.
• Mandatory CHAP authentication—With mandatory CHAP
authentication configured, a VPN user who depends on a
NAS to initiate tunneling requests is authenticated twice:
once when accessing the NAS and once on the LNS by using
CHAP.
• LCP re-negotiation—For a PPP user who depends on a NAS
to initiate tunneling requests, the user first performs PPP
negotiation with the NAS. If the negotiation succeeds, the
NAS initiates an L2TP tunneling request and sends the user
authentication information to the LNS. The LNS then
determines whether the user is valid according to the user
authentication information received. Under some
circumstances (when authentication and accounting are
required on the LNS for example), another round of LCP
negotiation is required between the LNS and the user. In this
case, the user authentication information from the NAS is
neglected.
• Proxy authentication—If neither LCP re-negotiation nor
mandatory CHAP authentication is configured, an LNS
performs proxy authentication of users. In this case, the LAC
sends to the LNS all authentication information from users as
well as the authentication mode configured on the LAC itself.
NOTE:
Mandatory LCP • Among these three authentication methods, LCP
re-negotiation has the highest priority. If both LCP
re-negotiation and mandatory CHAP authentication are
configured, the LNS uses LCP re-negotiation and the PPP
authentication method configured in the L2TP group.
• With LCP re-negotiation, if no PPP authentication method is
configured in the L2TP group, the LNS does not
re-authenticate users. It assigns public addresses to the PPP
users immediately. In other words, the users are
authenticated only once at the LAC end.
• Some PPP clients may not support re-authentication, in which
case, LNS side CHAP authentication fails.
• When the LNS uses proxy authentication and the user
authentication information received from the LAC is valid: if
the authentication method configured in the L2TP group is
PAP, the proxy authentication succeeds and a session can be
established for the user. If the authentication method
configured in the L2TP group is CHAP but that configured on
the LAC is PAP, the proxy authentication fails, and no session
can be set up. This is because the level of CHAP
authentication, which is required by the LNS, is higher than
that of PAP authentication, which the LAC provides.
393
Figure 369 Add an ISP domain
Item Description
ISP Domain Specify the name of the ISP domain.
394
Item Description
Specify whether to use local authorization as the backup authorization
Backup method. This item is available only when you select HWTACACS or
RADIUS as the primary authorization method.
Specify the maximum number of users the ISP domain can accommodate. If
you do not specify the maximum number, the system does not limit the
number of users of the ISP domain.
Max. Number of Users
Because users may compete for resources, setting a proper limit on the
number of users of an ISP domain helps guarantee performance for the
users of the ISP domain.
Item Description
ISP Domain Select the ISP domain for the IP address pool to be created.
395
Item Description
Specify the number of the IP address pool.
IP Address Pool Number If you set the IP address pool number to 1, the name of the IP address pool
is pool1.
Start IP Specify the start IP address and end IP address of the IP address pool.
The number of addresses between the start IP address and end IP address
End IP must not exceed 1024. If you specify only the start IP address, the IP
address pool contains only one IP address (the start IP address).
Item Description
Local Tunnel ID Local ID of the tunnel
Configuration procedure
1. Configure the VPN user.
Assign an IP address (2.1.1.1, in this example) to the user host, configure a route to ensure the
reachability of the LNS (1.1.2.2), and create a virtual private network connection using the Windows
operating system, or install L2TP client software such as WinVPN Client and connect to the Internet in
dial-up mode. Then, perform the following configurations (the configuration order may vary with the client
software):
a. Specify the VPN username as vpdnuser and the password as Hello.
b. Set the Internet interface address of the security gateway as the IP address of the LNS. In this
example, the Ethernet interface on the LNS, the interface for the tunnel, has an IP address of
1.1.2.2.
c. Modify the connection attributes, setting the protocol to L2TP, the encryption attribute to
customized and the authentication mode to CHAP.
2. Configure the LNS.
# Configure IP addresses for interfaces. (Details not shown)
# Configure a route to ensure the reachability of the user host.
# Create a local user named vpdnuser, and set the password to Hello and the service type to PPP.
a. Select System Management > Users from the navigation tree, and then click the Create User tab
and perform the configurations shown in Figure 373.
397
Figure 373 Add a local user
# Enable L2TP.
• Select VPN > L2TP > L2TP Config from the navigation tree, and then perform the configurations
shown in Figure 374.
Figure 374 Enable L2TP
398
b. Enter the L2TP group name test.
c. Enter the peer tunnel name vpdnuser.
d. Enter the local tunnel name LNS.
e. Select Disable for Tunnel Authentication.
f. Select CHAP as the PPP authentication method.
g. Select ISP domain system (the default ISP domain).
h. Click the Modify button of the ISP domain to perform the configurations shown in Figure 375.
399
d. Enter the end IP address 192.168.0.100.
e. Click Apply to finish the IP address pool configuration and return to the L2TP group configuration
page.
f. Select pool1 from the User Address list.
g. Select Enable from the Assign Address Forcibly list. Figure 377 shows the L2TP group
configuration page after the above configurations.
h. Click Apply.
400
Figure 378 L2TP tunnel information
401
Configuring GRE
You can configure GRE over IPv4 tunnels in the web interface.
GRE is a protocol designed for encapsulating and carrying the packets of one network layer protocol (for
example, IP or IPX) over another network layer protocol (for example, IP). GRE is a tunneling technology
and serves as a Layer 3 tunneling protocol.
A GRE tunnel is a virtual point-to-point connection for transferring encapsulated packets. Packets are
encapsulated at one end of the tunnel and de-encapsulated at the other end. Figure 379 depicts the
encapsulation and de-encapsulation processes.
Figure 379 X protocol networks interconnected through the GRE tunnel
NOTE:
For more information about GRE, see HP A-MSR Router Series Layer 3—IP Services Configuration Guide.
Optional.
Each end of the tunnel must have a route (static or dynamic) through the
Configuring a route through the
tunnel to the other end, so that GRE encapsulated packets can be
tunnel
forwarded normally.
For more configuration information, see "Configuring routes."
402
Figure 380 GRE tunnel configuration page
Item Description
Tunnel Interface Specify the number of the tunnel interface.
403
Item Description
Specify the key for the GRE tunnel interface. This configuration is to prevent the
tunnel ends from servicing or receiving packets from other places.
GRE Key
NOTE:
The two ends of a tunnel must have the same key or have no key at the same time.
GRE Packet Checksum Enable or disable the GRE packet checksum function.
Keepalive Interval Specify the interval between sending the keepalive packets and the maximum
number of transmission attempts.
Number of Retries These two configuration items are available when you select Enable for the GRE
keepalive function.
NOTE:
Before performing the configuration, make sure that Router A and Router B are reachable to each other.
Configuration procedure
1. Configure Router A.
# Configure an IPv4 address for interface Ethernet 0/0.
Select Interface Setup > WAN Interface Setup from the navigation tree of Router A. Click the icon of
interface Ethernet 0/0, and then perform the configurations shown in Figure 383:
404
Figure 383 Configure interface Ethernet 0/0
# Configure an IP address for interface Ethernet 0/1, the physical interface of the tunnel.
Click the icon of interface Ethernet 0/1, and then perform the configurations shown in Figure 384.
405
Figure 384 Configure interface Ethernet 0/1
406
Figure 385 Set up a GRE tunnel
407
2. Configure Router B.
# Configure an IPv4 address for interface Ethernet 0/0.
Select Interface Setup > WAN Interface Setup from the navigation tree. Click the icon of interface
Ethernet 0/0, and then perform the configurations shown in Figure 387.
Figure 387 Configure interface Ethernet 0/0
# Configure an IP address for interface Ethernet 0/1, the physical interface of the tunnel.
Click the icon of interface Ethernet 0/1, and then perform the configurations shown in Figure 388.
408
Figure 388 Configure interface Ethernet 0/1
409
a. Enter 0 in the Tunnel Interface field.
b. Enter IP address/mask 10.1.2.2/24.
c. Enter the source end IP address 2.2.2.2, the IP address of Ethernet 0/1.
d. Enter the destination end IP address 1.1.1.1, the IP address Ethernet 0/1 on Router A.
e. Click Apply.
410
Figure 391 Verify the configuration
411
Configuring certificate management
You can do the following to configure certificate management on the web interface:
• Creating a PKI entity
• Creating a PKI domain
• Generating an RSA key pair
• Destroying the RSA key pair
• Retrieving and displaying a certificate
• Requesting a local certificate
• Retrieving and displaying a CRL
PKI is a general security infrastructure for providing information security through public key technologies,
and it is the most widely applied encryption mechanism. HP's PKI system provides certificate management
for IPsec, SSL, and WAPI.
PKI, also called "asymmetric key infrastructure," uses a key pair to encrypt and decrypt data. The key
pair consists of a private key and a public key. The private key must be kept secret, but the public key
must be distributed. Data encrypted by one of the two keys can only be decrypted by the other.
A key problem of PKI is how to manage the public keys. PKI employs the digital certificate mechanism to
solve this problem. The digital certificate mechanism binds public keys to their owners, helping to
distribute public keys in large networks securely.
With digital certificates, the PKI system provides network communication and e-commerce with security
services such as user authentication, data non-repudiation, data confidentiality, and data integrity.
The PKI technology can satisfy the security requirements of online transactions. As an infrastructure, PKI
has a wide range of applications. Here are some application examples:
• VPN—A VPN is a private data communication network built on the public communication
infrastructure. A VPN can leverage network layer security protocols (for instance, IPsec) in
conjunction with PKI-based encryption and digital signature technologies to achieve confidentiality.
• Secure email—Emails require confidentiality, integrity, authentication, and non-repudiation. PKI can
address these needs. The secure email protocol that is developing rapidly is S/MIME, which is
based on PKI and allows for transfer of encrypted mails with signature.
• web security—For web security, two peers can establish an SSL connection first for transparent and
secure communications at the application layer. With PKI, SSL enables encrypted communications
between a browser and a server. Both the communication parties can verify the identity of each
other through digital certificates.
PKI operation
In a PKI-enabled network, an entity can request a local certificate from the CA, and the device can check
the validity of certificate. This is how it works:
1. An entity submits a certificate request to the CA.
2. The RA verifies the identity of the entity and then sends the identity information and the public key
with a digital signature to the CA.
412
3. The CA verifies the digital signature, approves the application, and issues a certificate.
4. The RA receives the certificate from the CA, sends it to the LDAP server to provide directory
navigation service, and notifies the entity that the certificate is successfully issued.
5. The entity retrieves the certificate. With the certificate, the entity can communicate with other entities
safely through encryption and digital signature.
6. The entity makes a request to the CA when it must revoke its certificate. The CA approves the
request, updates the CRLs, and publishes the CRLs on the LDAP server.
Configuring PKI
Configuration task list
The system supports the following PKI certificate request modes:
• Manual—In manual mode, you must retrieve a CA certificate, generate a local RSA key pair, and
submit a local certificate request for an entity.
• Auto—In auto mode, an entity automatically requests a certificate through SCEP (a dedicated
protocol for an entity to communicate with a CA) when it has no local certificate or when the present
certificate is about to expire.
You can specify the PKI certificate request mode for a PKI domain. Different PKI certificate request modes
require different configurations.
Task Remarks
Required.
Create a PKI entity, and configure the identity information.
A certificate is the binding of a public key and the identity information of an entity,
Creating a PKI entity where the identity information is identified by an entity DN. A CA identifies a
certificate applicant by entity.
The identity settings of an entity must be compliant with the CA certificate issue
policy. Otherwise, the certificate request might be rejected.
Required.
Create a PKI domain, setting the certificate request mode to Manual.
Creating a PKI Before requesting a PKI certificate, an entity must be configured with some enrollment
domain information, which is referred to as a "PKI domain."
A PKI domain is intended only for convenience of reference by other applications like
IKE and SSL, and it has only local significance.
413
Task Remarks
Required.
Generate a local RSA key pair.
By default, no local RSA key pair exists.
Generating an RSA Generating an RSA key pair is an important step in certificate request. The key pair
key pair includes a public key and a private key. The private key is kept by the user, and the
public key is transferred to the CA along with some other information.
NOTE:
If a local certificate already exists, you must remove the certificate before generating a
new key pair to keep the consistency between the key pair and the local certificate.
Required.
Certificate retrieval serves the following purposes:
• Locally stores the certificates associated with the local security domain for
improved query efficiency and reduced query count.
Retrieving the CA • Prepares for certificate verification.
certificate
NOTE:
If a local CA certificate already exists, you cannot perform the CA certificate retrieval
operation. This avoids possible mismatch between certificates and registration
information resulting from relevant changes. To retrieve the CA certificate, first remove the
CA certificate and local certificate.
Required.
When requesting a certificate, an entity introduces itself to the CA by providing its
identity information and public key, which are the major components of the
certificate.
A certificate request can be submitted to a CA in online mode or offline mode.
Requesting a local
• In online mode, if the request is granted, the local certificate is retrieved to the
local system automatically.
certificate
• In offline mode, you must retrieve the local certificate by an out-of-band method.
NOTE:
If a local certificate already exists, you cannot perform the local certificate retrieval
operation. This avoids possible mismatch between the local certificate and registration
information resulting from relevant changes. To retrieve a new local certificate, first
remove the CA certificate and local certificate.
Optional.
Destroying the RSA Destroy the existing RSA key pair and the corresponding local certificate.
key pair If the certificate to be retrieved contains an RSA key pair, you must destroy the
existing RSA key pair. Otherwise, the retrieving operation fails.
Optional.
Retrieving and Retrieve an existing certificate and display its contents.
displaying a NOTE:
certificate
Before retrieving a local certificate in online mode, be sure to complete LDAP server
configuration.
414
Requesting a certificate automatically
Table 175 Configuration task list for requesting a certificate automatically
Task Remarks
Required.
Create a PKI entity, and configure the identity information.
A certificate is the binding of a public key and the identity information of an entity,
Creating a PKI entity where the identity information is identified by an entity DN. A CA identifies a
certificate applicant by entity.
The identity settings of an entity must be compliant to the CA certificate issue policy.
Otherwise, the certificate request might be rejected.
Required.
Create a PKI domain, setting the certificate request mode to Auto.
Creating a PKI Before requesting a PKI certificate, an entity must be configured with some enrollment
domain information, which is referred to as a "PKI domain."
A PKI domain is intended only for convenience of reference by other applications like
IKE and SSL, and it has only local significance.
Optional.
Destroying the RSA Destroy the existing RSA key pair and the corresponding local certificate.
key pair If the certificate to be retrieved contains an RSA key pair, you must destroy the
existing RSA key pair. Otherwise, the retrieving operation fails.
Optional.
Retrieve an existing certificate and display its contents.
NOTE:
Retrieving and • Before retrieving a local certificate in online mode, be sure to complete LDAP
displaying a server configuration.
certificate
• If a PKI domain already has a CA certificate, you cannot retrieve another CA
certificate for it. This restriction avoids inconsistency between the certificate and
registration information due to related configuration changes. To retrieve a new
CA certificate, delete the existing CA certificate and local certificate first.
415
Figure 393 Create a PKI entity
Item Description
Entity Name Enter the name for the PKI entity.
Country/Region
Enter the country or region code for the entity.
Code
416
Figure 394 PKI domains
Item Description
Domain Name Enter the name for the PKI domain.
417
Item Description
Select the authority for certificate request:
• CA—Indicates that the entity requests a certificate from a CA.
• RA—Indicates that the entity requests a certificate from an RA.
Generally, an independent RA is in charge of certificate request management. It
Institution
receives the registration request from an entity, checks its qualification, and determines
whether to ask the CA to sign a digital certificate. The RA only checks the application
qualification of an entity; it does not issue any certificate. Sometimes, the registration
management function is provided by the CA, in which case no independent RA is
required. HP recommends that you deploy an independent RA.
Request Mode Select the online certificate request mode: auto or manual.
Password Encrypt Enter the password for certificate revocation and specify whether to display the
Password password in cipher text when the certificate request mode is set to Auto.
Fingerprint Hash After receiving the root certificate of the CA, an entity must verify the fingerprint of the
root certificate (the hash value of the root certificate content). This hash value is unique
to every certificate. If the fingerprint of the root certificate does not match the one
configured for the PKI domain, the entity rejects the root certificate.
• If you specify MD5 as the hash algorithm, enter an MD5 fingerprint. The fingerprint
must a string of 32 characters in hexadecimal notation.
• If you specify SHA1 as the hash algorithm, enter an SHA1 fingerprint. The
fingerprint must a string of 40 characters in hexadecimal notation.
• If you do not specify the fingerprint hash, do not enter any fingerprint. The entity
Fingerprint does not verify the CA root certificate, and you yourself must make sure that the CA
server is trusted.
NOTE:
The fingerprint must be configured if you specify the certificate request mode as Auto. If you
specify the certificate request mode as Manual, you can leave the fingerprint settings null. If
you do not configure the fingerprint, the entity does not verify the CA root certificate, and
you yourself must make sure that the CA server is trusted.
Set the polling interval and attempt limit for querying the certificate request status.
Polling Count
After an entity makes a certificate request, the CA might need a long period of time if it
verifies the certificate request in manual mode. During this period, the applicant must
Polling Interval query the status of the request periodically to get the certificate as soon as possible
after the certificate is signed.
418
Item Description
Enable CRL Select this checkbox to specify that CRL checking is required during certificate
Checking verification.
Enter the CRL update period (the interval at which the PKI entity downloads the latest
CRLs).
This item is available when the Enable CRL Checking checkbox is selected.
CRL Update Period
By default, the CRL update period depends on the next update field in the CRL file.
The manually configured CRL update period takes precedent over that specified in the
CRL file.
419
Table 178 Configuration for generating an RSA key pair
Item Description
Key Length Enter the length of the RSA keys.
Item Description
Domain Name Select the PKI domain for the certificate.
420
Item Description
Enable Offline Select this checkbox to retrieve a certificate in offline mode (by an out-of-band method
Mode such as FTP, disk, or email), and then import the certificate into the local PKI system.
Get File From Specify the path and name of the certificate file.
Device • If the certificate file is saved on the device, select Get File From Device and then
specify the path of the file on the device.
Get File From PC • If the certificate file is saved on a local PC, Select Get File From PC and then specify
the path to the file, and select the partition of the device for saving the file.
Enter the password for protecting the private key, which was specified when the
Password
certificate was exported.
After retrieving a certificate, you can click View Cert corresponding to the certificate from the PKI
certificates list to display the contents of the certificate, as shown in Figure 400.
Figure 400 Display certificate information
421
Figure 401 Request a certificate
Item Description
Domain Name Select the PKI domain for the certificate.
Select this option to request a certificate in offline mode (by an out-of-band method such
as FTP, disk, or email).
Enable Offline If you cannot request a certificate from the CA through the SCEP protocol, you can
Mode enable the offline mode. In this case, after clicking Apply, the offline certificate request
information page appears, as shown in Figure 402. Submit the information to the CA
to request a local certificate.
422
b. Then, click View CRL for the domain to display the contents of the CRL.
423
Figure 405 Network diagram
Configuration procedure
1. Configure the CA server.
# Install the CA server component.
From the start menu, select Control Panel > Add or Remove Programs, and then select Add/Remove
Windows Components. In the dialog box that appears, select Certificate Services and click Next to begin
the installation.
# Install the SCEP add-on.
Because a CA server running Windows 2003 server operating system does not support SCEP by default,
be sure to install the SCEP add-on to provide the router with automatic certificate registration and retrieval.
After the add-on is installed, a prompt dialog box appears, displaying the URL of the registration server
configured on the router.
# Modify the certificate service properties.
From the start menu, select Control Panel > Administrative Tools > Certificate Authority. If the CA server
and SCEP add-on have been installed successfully, there should be two certificates issued by the CA to
the RA. Right-click CA server and select Properties from the shortcut menu, and select the Policy Module
tab in the CA server Properties dialog box. Select the option of Follow the settings in the certificate
template, if applicable. Otherwise, automatically issue the certificate. Then click OK.
# Modify the IIS attributes.
From the start menu, select Control Panel > Administrative Tools > Internet Information Services (IIS)
Manager and then select web Sites from the navigation tree. Right-click Default web Site and select
Properties. Then select the Home Directory tab. Specify the path for certificate service in the Local path
field. To avoid conflicts with existing services, change the TCP port number to an unused one on the web
Site tab.
After the configuration, you must also make sure that the system clock of the router and that of the CA are
synchronized, so that the router can request certificate correctly.
2. Configure the router.
# Create a PKI entity.
• Select Certificate Management > Entity from the navigation tree, and then click Add to perform the
configurations shown in Figure 406.
424
Figure 406 Add a PKI entity
425
f. Select Manual as the certificate request mode.
g. Click Apply. When the system displays the following message, click OK to confirm:
Fingerprint of the root certificate not specified. No root certificate validation will occur. Continue?
# Generate an RSA key pair.
• Select Certificate Management > Certificate from the navigation tree, and then click Create Key to
perform the configurations shown in Figure 408.
Figure 408 Generate an RSA key pair
426
c. Click Apply.
# Request a local certificate.
• Select Certificate Management > Certificate from the navigation tree, and then click Request Cert to
perform the configurations shown in Figure 410.
Figure 410 Request a certificate
427
Configuration procedure
1. Configure the CA server.
# Create a CA server named myca.
In this example, configure the basic attributes of Nickname and Subject DN on the CA server first:
• Nickname—Name of the trusted CA
• Subject DN—DN information of the CA, including the CN
• OU
• O
• C
The other attributes might use the default values.
# Configure extended attributes.
After configuring the basic attributes, perform configuration on the Jurisdiction Configuration page of the
CA server. This includes selecting the proper extension profiles, enabling the SCEP autovetting function,
and adding the IP address list for SCEP autovetting.
# Configure the CRL publishing behavior.
After completing the configuration, perform CRL related configurations.
In this example, select the local CRL publishing mode of HTTP, and set the HTTP URL to
http://4.4.4.133:447/myca.crl.
After the configuration, make sure that the system clock of the router is synchronous to that of the CA, so
that the router can request certificates and retrieve CRLs properly.
2. Configure the router.
# Create a PKI entity.
• Select Certificate Management > Entity from the navigation tree, and then click Add to perform the
configurations shown in Figure 412.
Figure 412 Add a PKI entity
428
c. Click Apply.
# Create a PKI domain.
• Select Certificate Management > Domain from the navigation tree, and then click Add to perform the
configurations shown in Figure 413.
Figure 413 Add a PKI domain
429
Figure 414 Generate an RSA key pair
430
Figure 416 Request a certificate
431
Applying RSA digital signature in IKE negotiation
Network requirements
• An IPsec tunnel is set up between Router A and Router B to secure the traffic between Host A on
subnet 10.1.1.0/24 and Host B on subnet 11.1.1.0/24.
• Router A and Router B use IKE for IPsec tunnel negotiation and RSA digital signature of a PKI
certificate system for identity authentication.
• As shown in Figure 418, Router A and Router B use different CAs. They might also use the same CA
as required.
Figure 418 Diagram for applying RSA digital signature in IKE negotiation
Configuration procedure
1. Configure Router A.
# Create a PKI entity.
• Select Certificate Management > Entity from the navigation tree, and then click Add to perform the
configurations shown in Figure 419.
432
Figure 419 Add a PKI entity
# Create a PKI domain. (The RA URL given here is just an example. Configure the RA URL as required.)
• Select Certificate Management > Domain from the navigation tree, and then click Add to perform the
configurations shown in Figure 420.
Figure 420 Add a PKI domain
433
d. Select RA as the authority for certificate request.
e. Enter http://1.1.1.100/certsrv/mscep/mscep.dll as the URL for certificate request. (The RA URL
given here is just an example. Configure the RA URL as required.)
f. Enter 1.1.1.102 as the IP address of the LDAP server, 389 as the port number, and select 2 as
the version number.
g. Select Manual as the certificate request mode.
h. Click the expansion button before Advanced Configuration to display the advanced
configuration items.
i. Select the Enable CRL Checking checkbox.
j. Enter ldap://1.1.1.102 as the URL for CRLs.
k. Click Apply. When the system displays the following message, click OK to confirm:
Fingerprint of the root certificate not specified. No root certificate validation will occur. Continue?
# Generate an RSA key pair.
• Select Certificate Management > Certificate from the navigation tree, and then click Create Key to
perform the configurations shown in Figure 421.
Figure 421 Generate an RSA key pair
434
Figure 422 Retrieve the CA certificate
435
Figure 424 Add an IPsec connection
436
a. Enter 1 as the PKI domain name.
b. Enter CA2 as the CA identifier.
c. Select en as the local entity.
d. Select RA as the authority for certificate request.
e. Enter http://2.1.1.100/certsrv/mscep/mscep.dll as the URL for certificate request. (The RA URL
given here is just an example. Configure the RA URL as required.)
f. Enter 2.1.1.102 as the IP address of the LDAP server, 389 as the port number, and select 2 as
the version number.
g. Select Manual as the certificate request mode.
h. Click the expansion button before Advanced Configuration to display the advanced
configuration items.
i. Select the Enable CRL Checking checkbox.
j. Enter ldap://2.1.1.102 as the URL for CRLs.
k. Click Apply. When the system displays the following message, click OK to confirm:
Fingerprint of the root certificate not specified. No root certificate validation will occur. Continue?
# Generate an RSA key pair.
a. Select Certificate Management > Certificate from the navigation tree, and then click Create Key.
b. Click Apply to generate an RSA key pair.
437
Configuration guidelines
When you configure PKI, note the following guidelines:
1. Make sure the clocks of entities and the CA are synchronous. Otherwise, the validity period of
certificates are abnormal.
2. The Windows 2000 CA server has some restrictions on the data length of a certificate request. If the
PKI entity identity information in a certificate request goes beyond a certain limit, the server does not
respond to the certificate request.
3. The SCEP plug-in is required when you use the Windows Server as the CA. In this case, specify RA
as the authority for certificate request when configuring the PKI domain.
4. The SCEP plug-in is not required when you use the RSA Keon software as the CA. In this case,
specify CA as the authority for certificate request when configuring the PKI domain.
438
Configuring system management
Configuration management
Save configuration
The save configuration module provides the following functions:
• Saving the current configuration to the configuration file to be used at the next startup (including the
.cfg and .xml files).
• Saving the current configuration as the factory default configuration, and the name of the
configuration file is init.cfg.
NOTE:
• Besides the following methods, the web management interface allows you to click the button on the right of
the title area to fast save the configuration.
• Saving the configuration takes a period of time.
• The system does not support the operation of saving configuration of two or more consecutive users. If such a case
occurs, the system prompts the latter users to try later.
• When you save the current configuration on a distributed device, the SMB does not save the .xml configuration file.
To ensure the synchronization between the AMB and the SMB, copy this file to the SMB.
Select System Management > Configuration from the navigation tree to display the save configuration
page.
439
Figure 425 Save configuration page
• To save the current configuration to the configuration file to be used at the next startup, click Save
Current Settings.
• To save the current configuration to both the configuration file to be used at the next startup and the
factory default configuration file, click Save As Factory-Default Settings.
Initialize configuration
Initializing clears the current configuration file and then restarts the device with the factory default
configuration.
Select System Management > Configuration from the navigation tree, and then click the Initialize tab to
display the initialize configuration page.
Figure 426 Initialize
Backing up configuration
Configuration file backup allows you to do the following:
• View the configuration file for next startup (including .cfg and .xml files).
• Back up the configuration file for next startup (including .cfg and .xml files) to the PC of the current
user.
440
Select System > Maintenance > Backup from the navigation tree, and click Backup to display the
configuration file backup configuration page.
Figure 427 Configuration file backup page
• When you click the upper Backup button, a file download dialog box appears. You can select to
view the .cfg file or to save the file locally.
• When you click the lower Backup button, a file download dialog box appears. You can select to
view the .xml file or to save the file locally.
Restoring configuration
Configuration restoration allows you to do the following:
• Upload the .cfg file on the host of the current user to the device for the next startup.
• Upload the .xml file on the host of the current user to the device for the next startup, and delete the
previous .xml configuration file that was used for the next startup.
Select System > Maintenance > Restore from the navigation tree, and click Restore to display the restoring
configuration file page.
Figure 428 Restoring configuration file page
• When you click the upper Browse button, the file upload dialog box appears. You can select the
.cfg file to be uploaded, and then click Apply.
• When you click the lower Browse button, the file upload dialog box appears. You can select the
.xml file to be uploaded, and then click Apply.
441
Backing up and restoring device files through the USB port
The files needed in device running, such as startup files and configuration files, are stored in the storage
medium of the device. To facilitate management of the files on the device, the device provides the fast
backup and restoration function.
• Fast backup—Allows you to back up files on the device to the destination device through a USB port.
• Fast restoration—Allows you to transfer files from the device where the files are backed up to the
local device through a USB port. The system also allows you to choose whether to specify the startup
file or configuration file to be restored as the main startup file or configuration file of the device.
NOTE:
The storage medium of a device has many types, such as flash cards, CF cards, and so on. The storage
medium type used by the device depends on the device model.
Select System Management > Configuration from the navigation tree, and then click the Backup and
Restore tab to display the fast backup and restoration page.
Figure 429 Back up and restore device files through the USB port
• In the Device File(s) area, select the files to be backed up, and then click Backup to back up the
selected files to the destination device.
• In the USB File(s) area, select the files to be restored, and click Restore to transfer the selected files to
the device through the USB port.
442
NOTE:
You can restore multiple files at once, but only one startup file or configuration file can be included in
these files for restoration.
Rebooting device
Before rebooting the device, save the configuration. Otherwise, all unsaved configurations are lost after
reboot. After the device reboots, re-log in to the web interface.
Select System Management > Reboot from the navigation tree to display the device reboot configuration
page. Click Apply to reboot the device.
Figure 430 Device reboot page
You can choose to check whether the current configuration has been saved to the configuration file to be
used at the next startup as needed.
• If you select the Check whether the current configuration is saved in the next startup configuration file
option, the system checks the configuration before rebooting the device. If the check succeeds, the
system reboots the device. If the check fails, the system displays a dialog box to tell you that the
current configuration and the saved configuration are inconsistent, and it does not reboot the
device. In this case, you must save the current configuration manually before you can reboot the
device.
• If you do not select the option, the system reboots the device directly.
Service management
The service management module provides these types of services: FTP, Telnet, SSH, SFTP, HTTP, and
HTTPS. You can enable or disable the services as needed. In this way, the performance and security of
the system can be enhanced, and secure management of the device can be achieved.
The service management module also provides the function to modify HTTP and HTTPS port numbers, and
the function to associate the FTP, HTTP, or HTTPS service with an ACL, reducing attacks of illegal users of
these services.
FTP service
FTP is an application layer protocol for sharing files between a server and client over a TCP/IP network.
443
Telnet service
The Telnet protocol is an application layer protocol that provides remote login and virtual terminal
functions on the network.
SSH service
SSH offers an approach to securely logging in to a remote device. Through encryption and strong
authentication, it protects devices against attacks such as IP spoofing and plain text password
interception.
SFTP service
SFTP is a new feature in SSH2.0. SFTP uses the SSH connection to provide secure data transfer. The
device can serve as the SFTP server, allowing a remote user to log in to the SFTP server for secure file
management and transfer. The device can also serve as an SFTP client, enabling a user to log in from the
device to a remote device for secure file transfer.
HTTP service
HTTP is used for transferring webpage information across the Internet. It is an application-layer protocol in
the TCP/IP protocol suite.
You can log in to the device by using the HTTP protocol with HTTP service enabled, accessing and
controlling the device with web-based network management.
HTTPS service
HTTPS refers to the HTTP protocol that supports the SSL protocol.
The SSL protocol of HTTPS enhances the security of the device in the following ways:
• Uses the SSL protocol to ensure that legal clients can access the device securely and to prohibit
illegal clients.
• Encrypts the data exchanged between the HTTPS client and the device to ensure data security and
integrity, realizing the security management of the device.
• Defines certificate attribute-based access control policy for the device to control the access right of
the client, to further avoid attacks from illegal clients.
444
Figure 431 Service management
Item Description
Enable FTP Specify whether to enable the FTP service.
service The FTP service is disabled by default.
FTP Associate the FTP service with an ACL. Only the clients that pass the ACL
filtering are permitted to use the FTP service.
ACL
You can view this configuration item by clicking the expanding button in
front of FTP.
445
Item Description
Set the port number for HTTPS service.
You can view this configuration item by clicking the expanding button in
front of HTTPS.
Port Number
NOTE:
When you modify a port, make sure that the port is not used by other
services.
Associate the HTTPS service with an ACL. Only the clients that pass the
ACL filtering are permitted to use the HTTPS service.
ACL
You can view this configuration item by clicking the expand button in
front of HTTPS.
Set the local certificate for the HTTPS service. What is displayed in the list
is the theme of the certificate.
Certificate You can configure the available certificates by selecting Certificate
Management from the navigation tree. For more information, see
"Configuring certificate management."
User management
The user management module provides these functions:
• Creates a local user, and sets the password, access level, and service type for the user.
• Sets the super password for switching the current web user access level to the management level.
• Switches the current web user access level to the management level.
Creating a user
Select System Management > Users from the navigation tree, and then click the Create User tab to display
the page for creating local users.
Figure 432 Create a user
446
Table 182 Configuration
Item Description
Username Set the username for a user.
Set the access level for a user. Users of different levels can perform different
operations. Ranging from low to high, web user levels are as follows:
• Visitor—Users of this level can use the network diagnostic tools ping and trace
route. They can neither access the device data nor configure the device.
• Monitor—Users of this level can only access the device data but cannot configure
Access Level the device.
• Configure—Users of this level can access data from the device and configure the
device, but they cannot upgrade the host software, add/delete users, modify users,
or back up/restore the application file.
• Management—Users of this level can perform any operations for the device.
Only the web, FTP, and Telnet users support the access level setting.
Enter the same password again. Otherwise, the system prompts that the two passwords
Confirm Password
are not consistent when you apply the configuration.
Set the service type, including web, FTP, Telnet, and PPP services. You must select at
Service
least one of them.
447
Table 183 Configuration
Item Description
Set the operation type:
Create/Remove • Create—Configure or modify the super password.
• Remove—Remove the current super password.
Password Set the password for a user to switch to the management level.
Enter the same password again. Otherwise, the system prompts that the two passwords
Confirm Password
are not consistent when you apply the configuration.
System time
You must configure a correct system time so that the device can work with other devices properly.
The device supports setting system time through manual configuration and automatic synchronization of
NTP server time.
An administrator cannot keep time synchronized among all devices within a network by changing the
system clock on each device because this is a huge amount of workload and cannot guarantee the clock
precision. NTP, however, allows quick clock synchronization within the entire network and ensures a high
clock precision.
Defined in RFC 1305, NTP synchronizes timekeeping among distributed time servers and clients. NTP
runs over UDP, using UDP port 123.
The purpose of using NTP is to keep consistent timekeeping among all clock-dependent devices within the
network so that the devices can provide diverse applications based on the consistent time.
448
Setting the system time
Select System Management > System Time from the navigation tree, and the System Time tab is displayed.
On the upper part of the interface, the current system time is displayed. On the lower part of the interface,
you can set the system time.
Figure 435 System time configuration page
Item Description
NTP Server 1 Enable clock automatic synchronization with an NTP server. You can
specify two NTP servers by entering their IP addresses. NTP Server 1 is the
primary server and NTP Server 2 is the secondary server.
NOTE:
Automatic
Synchronizat With automatic synchronization configured, the device periodically
ion NTP Server 2 synchronizes its time with the NTP server. If the synchronization fails, the
system uses the manually configured time. After the synchronization recovers,
the system uses the synchronized time.
The IP address of an NTP server is a host address and cannot be a
broadcast or a multicast address, or the IP address of the local clock.
449
Figure 436 Calendar page
TR-069 configuration
TR-069 protocol is a technology specification initiated and developed by the 'DSL Forum. It defines the
general frame, message format, management method, and data model for the management and
configuration of home network devices in the next-generation network.
TR-069 is mainly applied to DSL access networks. In a DSL access network, user devices are large in
number and deployed separately usually in the customer premise. Therefore, device management and
maintenance is hard to perform. TR-069 is designed to solve the problem by the idea of remote central
management of CPE through an ACS.
450
TR-069 network framework
Figure 438 Network diagram
Auto-configuration
When a CPE logs in to an ACS, the ACS can automatically apply some configurations to the CPE to
perform auto configuration of the CPE. Auto-configurable parameters supported by the device include
(but are not confined to) the following:
• Configuration file (ConfigFile)
• ACS address (URL)
451
• ACS username (Username)
• ACS password (Password)
• Inform message auto sending flag (PeriodicInformEnable)
• Inform message auto sending interval (PeriodicInformInterval)
• Inform message auto sending time (PeriodicInformTime)
• CPE username (ConnectionRequestUsername)
• CPE password (ConnectionRequestPassword)
TR-069 configuration
The TR-069 parameters of CPE can be configured automatically through ACS remote management. It can
also be configured manually through web, which is described in detail in this section.
Select System Management > TR-069 from the navigation tree to display the TR-069 configuration page.
452
Figure 439 TR-069 configuration page
Item Description
Enable or disable TR-069.
TR-069
TR-069 configurations can take effect only after you enable TR-069.
URL Configure the URL used by a CPE to initiate a connection to the ACS.
Username Configure the username used by a CPE to initiate a connection to the ACS.
ACS Configure the password used by a CPE to initiate a connection to the ACS.
Password You can specify a username without a password that is used in the authentication.
If so, the configuration on the ACS and that on the CPE must be the same.
Configure the username used by the CPE to authenticate the connection sent from
Username
the ACS.
Configure the password used by the CPE to authenticate the connection sent from
the ACS.
Password
You can specify a username without a password that is used in the authentication.
CPE If so, the configuration on the ACS and that on the CPE must be the same.
Sending
Enable or disable CPE's periodical sending of Inform messages.
Inform
Set the CPE connection interface. The CPE sends inform packets carrying the IP
CPE Interface address of this interface to make the ACS establish a connection with the CPE
using this IP address.
Configuration guidelines
• TR-069 configuration through ACS is of higher priority than that through web. You cannot use a
configuration mode to modify parameters configured through a configuration mode with a higher
priority.
453
• To remove the configuration of a parameter, select the checkbox for the parameter, clear the value
that was entered, and then click Apply.
Upgrading software
NOTE:
Software upgrade takes some time. During software upgrade, do not perform any operation on the web
interface. Otherwise, software upgrade may be interrupted.
Select System Management > Software Upgrade from the navigation tree to display the software upgrade
configuration page.
Figure 440 Software upgrade configuration page
Item Description
Specify the filename of the local application file, which must be suffixed with
File the .app or .bin extension.
The filename is main.bin when the file is saved on the device.
Reboot after the Specify whether to reboot the device to make the upgraded software take effect
upgrading finished after the application file is uploaded.
454
A boot file, also known as the "system software" or "device software," is an application file used to boot
the device. A main boot file is used to boot a device, and a backup boot file is used to boot a device only
when the main boot file is unavailable.
Upgrading software
NOTE:
Software upgrade takes some time. During software upgrade, do not perform any operation on the web
interface. Otherwise, software upgrade may be interrupted.
Select System Management > Software Upgrade from the navigation tree to display the software upgrade
configuration page.
Figure 441 Software upgrade configuration page
Item Description
Specify the filename of the local application file, which must be suffixed with
File
the .app or .bin extension.
Specify the type of the boot file for the next boot:
File Type • Main
• Backup
Specify whether to overwrite the file with the same name.
If a file with same name
already exists, overwrite If you do not select the option, when a file with the same name exists, the system
it without any prompt displays the message "The file has existed," and you cannot perform the upgrade
operation.
Reboot after the Specify whether to reboot the device to make the upgraded software take effect
upgrading finished after the application file is uploaded.
455
Configuring SNMP lite
456
Figure 442 SNMP configuration page
Item Description
Enable or disable the SNMP agent.
SNMP
When you disable the SNMP agent, all SNMP agent settings are removed.
Select the SNMP version run by the system.
SNMP Version
Set the same SNMP version as on the NMS.
Contact Information Enter contact information for the device.
457
Item Description
Set the privacy password when the SNMP version is selected as SNMPv3.
Set the same privacy password on the NMS.
Privacy Password
The privacy protocol on the agent is DES56. Set DES56 as the privacy protocol
on the NMS.
When the SNMP version is SNMPv1 & v2, set the read-only password with
Read Password which the NMS can perform only read operations to the agent.
Set the same read password on the NMS.
When the SNMP version is SNMPv1 & v2, set the read-and-write password with
Read & Write Password which the NMS can perform both read and write operations to the agent.
Set the same read-and-write password on the NMS.
When the SNMP version is SNMPv1 & v2, set the authentication password with
which the agent can send traps to the NMS. The trap password must be the
Trap Password same with either the read password or the read-and-write password.
The trap password defaults to the security username and is not configurable
when the SNMP version is SNMPv3.
Trap Target Host Set the IP address of the target host of SNMP traps.
Agent NMS
1.1.1.1/24 1.1.1.2/24
Configuration procedure
1. Configure the SNMP agent.
a. Select System Management > SNMP from the navigation tree, and configure SNMP as shown
in Figure 444.
458
Figure 444 Configure the SNMP agent
NOTE:
The SNMP settings on the NMS and the agent must match.
Set the same SNMP version, read password, and read-and-write password as on the SNMP agent.
Configuration verification
• Check that the NMS and the SNMP agent can set up SNMP sessions and that the NMS can query
and set MIB variables on the SNMP agent.
• Execute the shutdown and undo shutdown commands on an idle interface on the SNMP agent, and
check that the NMS can receive linkUp and linkDown traps.
459
The NMS and the SNMP agent perform authentication when they set up an SNMP session and encrypt
SNMP packets between them. The authentication key is authkey, and the privacy key is prikey.
Figure 445 Network diagram
Agent NMS
1.1.1.1/24 1.1.1.2/24
460
Configuring the SNMP NMS
The configuration on the NMS must be consistent with that on the agent. Otherwise, you cannot perform
corresponding operations.
SNMPv3 adopts a security mechanism of authentication and privacy. Configure security username,
authentication protocol, authentication password, privacy protocol, privacy password, and so on.
Also, configure the aging time and retry times. After the above configurations, you can configure the
device as needed through the NMS. For more information about NMS configuration, see the manual
provided for NMS.
461
Configuring syslog
System logs contain a large amount of network and device information, including running status and
configuration changes. System logs are an important way for network administrators to monitor network
and device running status. With system log information, network administrators can find network or
security problems and take corresponding actions against them.
The system supports these information output destinations: the console, monitor terminal (terminal of users
logged in through the AUX, VTY, or TTY user interface), log buffer, log host, and web interface.
Displaying syslogs
The web interface provides rich search and sorting functions, and you can easily view system logs
through the web interface. Select Other > Syslog from the navigation tree to display the syslog display
page, as shown in Figure 447.
Figure 447 Syslog display page
462
TIP:
To clear all system logs in the log cache of the web interface, click Reset.
To refresh the system logs displayed on the webpage, click Refresh.
To make the syslog display page refresh automatically, set the refresh interval on the syslog configuration page. For
more information, see "Setting buffer capacity and refresh interval."
Field Description
Time/Date Displays the time/date when system logs are generated.
Displays the severity level of system logs. System logs are classified into eight
levels by severity. The severity levels in descending order are emergency, alert,
critical, error, warning, notification, informational, and debugging.
• Emergency—The system is unavailable.
• Alert—Information that depends prompt reaction.
Level • Critical—Critical information.
• Error—Error information.
• Warning—Warnings.
• Notification—Normal information that must be noticed.
• Informational—Informational information to be recorded.
• Debugging—Information generated during the debugging.
463
Figure 448 Loghost configuration page
Item Description
IPv4/Domain
Set the IPv4 address or domain name of the loghost.
Loghost IP/Domain
IPv6
Set the IPv6 address of the loghost.
Loghost IP
464
Figure 449 Log setup
Item Description
Buffer Capacity Set the number of logs that can be stored in the log buffer of the web interface.
Set the refresh interval of the log information displayed on the web interface:
• Manual—You must click Refresh to refresh the web interface when displaying
Refresh Interval log information.
• Automatic—You can select to refresh the web interface every 1 minute, 5
minutes, or 10 minutes.
465
Configuring diagnostic tools
Trace route
By using the trace route command, you can display the Layer 3 devices involved in delivering a packet
from source to destination. This function is useful for identification of failed nodes in the event of a
network failure.
A trace route operation involves the following steps:
1. The source device sends a packet with a TTL value of 1 to the destination device.
2. The first hop (the Layer 3 device that first receives the packet) responds with a TTL-expired ICMP
message to the source. In this way, the source device can obtain the address of the first Layer 3
device.
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop responds with a TTL-expired ICMP message, which gives the source device the
address of the second Layer 3 device.
5. The above process continues until the ultimate destination device is reached. In this way, the source
device can trace the addresses of all Layer 3 devices involved to get to the destination device.
You can trace a route to an IP address or a host name. If the host name cannot be resolved, prompt
information is displayed on the source device.
Ping
You can use the ping function to check whether a device with a specified address is reachable, and to
examine network connectivity.
A successful execution of the ping command involves the following steps:
1. The source device sends an ICMP echo request (ECHO-REQUEST) to the destination device.
2. The destination device responds by sending an ICMP echo reply (ECHO-REPLY) to the source device
after receiving the ICMP echo request.
3. The source device displays related statistics after receiving the reply.
Output of the ping command is as follows:
• You can use the ping command to ping an IP address or a host name. If the host name is unknown,
the prompt information is displayed on the source device.
• If the source device does not receive an ICMP echo reply within the timeout time, it displays the
prompt information and the statistics during the ping operation. If the source device receives an
ICMP echo reply within the timeout time, it displays the number of bytes of the echo reply, the
message sequence numberTTL, response time, and statistics during the ping operation.
Statistics during the ping operation include number of packets sent, number of echo reply messages
received, percentage of messages not received, and the minimum, average, and maximum response
time.
466
Tools operations
Trace route operation
NOTE:
• The trace route function of the web interface does not support IPv6 addresses.
• Before executing a trace route operation, execute the ip ttl-expires enable command on the intermediate device to
enable the sending of ICMP timeout packets, and execute the ip unreachables enable command on the destination
device to enable the sending of ICMP destination unreachable packets.
Log in to the web interface, and then select Other > Diagnostic Tools from the navigation tree to display
the trace route configuration page, as shown in Figure 450.
Figure 450 Trace route configuration page
Enter the destination IP address or host name, and click Start to execute the trace route command. You
see the result in the Summary box.
Ping operation
NOTE:
The ping function of the web interface does not support IPv6 addresses.
Select Other > Diagnostic Tools from the navigation tree, and then click the Ping tab to display the ping
configuration page, as shown in Figure 451.
467
Figure 451 Ping configuration page
Enter the destination IP address or host name, and click Start to execute the ping command. You see the
result in the Summary box.
468
Configuring WiNet
As networks expand, more access devices are deployed at network edges. To manage these devices is a
tedious and complicated job. In addition, although IP address resources become insufficient, a large
number of public IP addresses are required as each device must be configured with an IP address. WiNet
technology helps you manage a large number of scattered network devices centrally.
WiNet has the following benefits:
• Saving public IP addresses.
• Integration—WiNet is integrated in network devices as a function, and requires no special network
management device.
• Easy to deploy—To build a WiNet, you only need to select a management device and complete
simple configurations through webpages on the management device.
• Low cost—No additional software is needed.
• User-friendly interface—WiNet provides the web interface for interaction, which facilitates
operations and management and requires no special network management staff.
• Plug-and-play—Based on an HP proprietary technology, WiNet displays the device in the network
topology once it is connected to the network through an Ethernet interface, and it allows you to
perform corresponding operations.
• Easy and quick deployment of security authentication—WiNet allows you to configure a RADIUS
server on an administrator device through simple web configuration and to configure interfaces of
member devices for security authentication through the administrator device.
According to the status and functions, devices are classified into three roles in WiNet:
• Administrator—Refers to the device serving as the WiNet management device. In a WiNet, only the
administrator is configured with a public IP address. You must specify only one administrator in each
WiNet to configure, manage, and monitor other devices. The administrator collects information to
discover and add candidates.
• Member—Refers to a device managed by the administrator in the WiNet.
• Candidate—Refers to a WiNet-capable device that has not yet been added to the WiNet. However,
the topology information of the candidate is already collected by the administrator.
Figure 452 Network diagram
469
Configuring WiNet
Enabling WiNet
To build a WiNet, configure a candidate as the administrator, and configure WiNet on it.
Select WiNet from the navigation tree. When WiNet is disabled, an Only the WiNet administrator
supports the function dialog box appears. Click OK to display the Setup page, as shown in Figure 453.
You can build or close WiNet on the page.
Figure 453 WiNet setup page
Item Description
WiNet Name Enter a WiNet name.
Enter a management VLAN ID in the WiNet. You can enter an existing static
VLAN only.
The management VLAN is used by WiNet packets for communication. It
actually defines the WiNet management range and delivers the following
functions:
• Isolates WiNet management packets from other packets, so that security
Management VLAN
is enhanced.
• Enables internal communication between the administrator, members, and
candidates.
WiNet management requires that the management VLAN traffic be permitted
on the administrator's ports (including cascade ports, if any) connected to
members, candidates, and the external network.
IP Pool (Administrator IP) Enter an IP address, and select a network mask for the administrator. After
that, each WiNet member is assigned an IP address on the same subnet as
Mask of IP Pool the administrator.
NOTE:
After a WiNet is built, you cannot configure items on the Setup page, and the Build WiNet button changes
to Close WiNet. To delete the WiNet, click the Close WiNet button.
470
Setting the background image for the WiNet topology diagram
The WiNet topology diagram is displayed in the WiNet Management page and uses a white background
by default. You can customize the background image by uploading a .jpg or .bmp image (which is less
than 0.5 MB).
Select WiNet from the navigation tree, and then click the Setup tab to display the configuration page, as
shown in Figure 453.
To customize the background image, click Browse, locate the image you want to use, and then click
Upload.
To remove the customized background image, click Clear.
Managing WiNet
To manage WiNet members, make sure the port that connects your host to the administrator permits
packets of the management VLAN. Select WiNet from the navigation tree to display the default WiNet
Management page, as shown in Figure 454.
Figure 454 WiNet management page
471
2. Click Collect Topology. After that, the administrator starts to collect topology information. In addition
to manual topology collection, the system automatically collects topology information every minute.
3. Click Network Snapshot to save the current WiNet topology as the baseline topology. The baseline
topology is used to show changes in network topology at different time points.
4. Click Initialize Topology to clear the stored baseline topology and cookies.
5. Click Open AuthN Center to configure a RADIUS server for security authentication on the
administrator device. Then this button changes to Close AuthN Center, and you can click the button
to remove the RADIUS server.
6. Drag the icon of a specific device in the WiNet topology, and place it to a position as needed. If the
browser is configured to accept cookies, the latest position information of each device is stored after
you click Network Snapshot.
7. Double-click a device on the WiNet topology map to show details about the device, including the
hostname, MAC address, device model, IP address, version, number of hops, and WiNet
information, as shown in Figure 455.
Figure 455 Device details
8. View the WiNet topology information, including the role of each device and connection status
between devices. The connection status can be:
Normal link—Indicates a connection existing in the baseline topology and the current topology.
New link—Indicates a connection not existing in the baseline topology but in the current
topology.
Blocked loops—Indicate connections blocked by STP. If a normal link is blocked, it is displayed
as a black broken line. If a new link is blocked, it is displayed as a blue broken line.
Down link—Indicates a connection existing in the baseline topology but not in the current
topology.
9. Click a device in the topology diagram to view its panel diagram. You can manage the device as
follows:
NOTE:
Only A-MSR30 routers installed with MIM-FSW modules, A-MSR30-11E routers, and A-MSR30-11F
routers support displaying of the device panel, device renaming, and Layer 2 Portal authentication on
interfaces.
a. Click Rename Device and enter a new system name for the device, as shown in Figure 456.
472
Figure 456 Rename a device
b. Select one or multiple Layer 2 Ethernet interfaces on the panel diagram of the device, and click
Port Guard to enable Layer 2 Portal authentication on the interfaces.
NOTE:
You cannot enable Layer 2 Portal authentication on an interface that connects the management device to
a member/candidate device, connects the management device to an external network, or connects the
administrator to the management device.
c. If a member is selected, click Manage Device to log in to the webpage of the member. You can
configure and manage the member through the webpage. The username and password are
required before you can log in to the member. If the current user and password are consistent
with those of the member, you can directly log in to the member.
d. If a member is selected, click Initialize to restore the configuration to factory defaults and restart
the member.
e. If a member is selected, click Reboot to restart the member.
473
Figure 458 Add a user
Item Description
Username Enter the name of the user.
474
• The administrator is connected to the external network through Ethernet 0/1 and is connected to the
members through Ethernet 0/2 and Ethernet 0/3, respectively.
• The WiNet management VLAN is VLAN 10.
• The network interface of the administrator is VLAN-interface 10 with IP address 163.172.55.1/24.
Figure 459 Network diagram
Configuration procedure
1. Configure Device A and Device C.
# Configure Ethernet 0/1 on each device to permit VLAN 10 traffic. (Details not shown)
2. Configure Device B.
# Create VLAN 10 and VLAN-interface 10.
• Select Interface Setup > LAN Interface Setup from the navigation tree to display the default VLAN
Setup page, as shown in Figure 460.
475
Figure 460 Create VLAN 10 and VLAN-interface 10
# Assign Ethernet 0/1, Ethernet 0/2, and Ethernet 0/3 to VLAN 10.
Figure 461 Assign interfaces to VLAN 10
476
a. On the VLAN Setup page, select 10 in the VLAN Config field, as shown in Figure 461.
b. Select Ethernet0/1, Ethernet0/2, and Ethernet0/3 from the list.
c. Click Add. The configuration progress dialog box appears, as shown in Figure 462.
Figure 462 Configuration progress dialog box
477
Figure 463 Specify an IP address for VLAN-interface 10
# Enable WiNet.
• Select WiNet from the navigation tree. When WiNet is disabled, an Only the WiNet administrator
supports the function dialog box appears. Click OK to display the Setup page, as shown in Figure
464.
478
Figure 464 Enable WiNet
Verification
After the preceding configuration is complete, log in to Device B via Ethernet 0/1, and select WiNet from
the navigation tree to display the WiNet Management page. You can view a WiNet topology diagram
comprising an administrator (Device B) and two members (Device A and Device C) and manage the
devices, as shown in Figure 465.
479
Figure 465 WiNet topology diagram
480
Figure 466 Network diagram
Configuration procedure
1. Establish a WiNet.
See "WiNet establishment configuration example" for detailed configuration.
2. Configure WiNet-based RADIUS authentication.
# Specify a RADIUS user.
• Log in to Device B through Ethernet 0/1. Select WiNet from the navigation tree on Device B, click
the User Management tab, and then click Add to display the page shown in Figure 467.
Figure 467 Configure WiNet-based RADIUS authentication
481
Figure 468 Set up a RADIUS server
482
Figure 469 Enable Layer 2 Portal authentication on Ethernet 0/2 of Device A
483
Configuring VoIP basic service
The configuration wizard guides you to establish a basic call and to configure local numbers and
connection properties.
Selecting a country
In the wizard homepage, click Start to display the country selection page, as shown in Figure 471.
Figure 471 Country selection page
484
Table 194 Configuration item
Item Description
Call Progress Tone
Configure the device to play the call progress tones of a specified country or region.
Country Mode
Item Description
Line FXS voice subscriber lines
485
Figure 473 Connection property configuration page
Item Description
Main Registrar Address Address of the main registrar. It can be an IP address or a domain name.
Backup Registrar Address Address of the backup registrar. It can be an IP address or a domain name.
Proxy Server Address Address of the proxy server. It can be an IP address or a domain name.
486
Local number and call route overview
The local number and call route parts contain basic settings, fax and modem, call services, and advanced
settings pages.
Basic settings
To implement a basic voice call, complete local number and call route configurations.
• Local number configuration includes setting a local telephone number and authentication
information used for registration.
• Call route configuration includes setting a destination telephone number and call route type. You
can select either SIP routing or trunk routing as the call route type. SIP routing includes proxy server
mode, IP routing mode, and server group binding mode.
For more information about basic settings of local number and call route, see "Configuring ."
Call services
Call services contains various new functions on the basis of voice basic call to meet the application
requirements of VoIP users.
For more information about call services configuration, see "Configuring call services."
Some call services require the involvement of a voice server. For the configuration of the voice server, see
"Configuring call connections."
Advanced settings
The advanced settings include the following parts:
• Coding parameters—This part includes the configuration of codec priorities and packet assembly
intervals. The voice codec affects the voice bandwidth and voice quality, and you must select a
proper codec according to the actual network. The packet assembly interval depends on the
network bandwidth and network architecture and affects codec delay time.
• Others—This part includes the configuration of number selection priority, dial prefix, called number
sending mode, DTMF transmission mode, DSCP field value, and so on.
487
Configuring local number and call route
Local number
Local number configuration includes setting a local telephone number and authentication information
used for registration.
Call route
Call route configuration includes setting a destination telephone number and call route type. The call
route type can be either SIP routing or trunk routing.
SIP routing
SIP routing includes proxy server mode, IP routing mode, and server group binding mode. If you select IP
routing, the called parties can be found through static IP addresses or domain names. The network
diagram for IP routing mode is shown in Figure 474.
Figure 474 Network diagram for IP routing
Proxy server mode and server group binding mode need the SIP server to complete routing, as shown
in Figure 475.
Figure 475 Network diagram for proxy server/server group binding modes
SIP server
IP network
Router A Router B
Trunk routing
You can connect devices to the PBX on the PSTN network through FXO, E&M, VE1, VT1, and BSV trunk
lines. Among them, VE1 and VT1 trunk routing enables the device to provide more voice communication
channels, greatly increasing device utilization and broadening the service range.
488
See "Configuring trunk mode calling" for the configuration example of using the trunk routing as the call
route type.
Basic settings
Configuring a local number
Select Voice Management > Local Number from the navigation tree, and see "Configuring trunk mode
calling." Click Add to display the page for creating a local number, as shown in Figure 476.
Figure 476 Local number configuration page
Item Description
Number ID Local number ID (1 to 9999).
This list displays all FXS voice subscriber lines. Select a voice subscriber line to be
Bound Line
bound with the local number.
489
Item Description
Realm name used for handshake authentication between the registrar and SIP UA.
NOTE:
Realm Name If a realm name is configured on the SIP UA, make sure that it is the same as that
configured on the registrar. Otherwise, the SIP UA fails the authentication due to
mismatch. If no realm name is configured on a SIP UA, the SIP UA performs no realm
name match and considers that the realm name configured on the registrar is trusted.
Status Enable or disable the local number.
NOTE:
• If it is necessary to configure authentication information for a local number, the same authentication information is
recommended for the same telephone number.
• In the case of authentication, you cannot modify the authentication information after the register function is enabled
because this operation may result in registration update failures.
490
Table 198 Configuration
Item Description
Call Route ID Enter a call route ID (10000 to 19999).
Destination
Enter the called telephone number.
Number
491
Configuration examples of local number and call
route
Configuring direct calling for SIP UAs through the SIP protocol
(configuring static IP address)
Network requirements
As shown in Figure 478, Router A and Router B can directly call each other as SIP UAs using the SIP
protocol (configuring static IP addresses).
Figure 478 Network diagram
Eth2/1 Eth2/1
Router A 192.168.2.1/24 Internet 192.168.2.2/24
Router B
Telephone A Telephone B
1111 2222
Configuring Router A
# Create a local number.
Select Voice Management > Local Number from the navigation tree, and then click Add to display the
page for creating a local number.
Figure 479 Create local number 1111
492
a. Enter 1 for Number ID.
b. Enter 1111 for Number.
c. Select subscriber-line 8/0 from the Bound Line list.
d. Enter Telephone A for Description.
e. Click Apply.
Configuring Router B
Select Voice Management > Local Number from the navigation tree, and then click Add to display the
page for creating a local number.
Figure 481 Create local number 2222
493
a. Enter 1 for Number ID.
b. Enter 2222 for Number.
c. Select subscriber-line 8/0 from the Bound Line list.
d. Enter Telephone B for Description.
e. Click Apply.
494
a. Enter 10000 for Call Route ID.
b. Enter 1111 for Destination Number.
c. Select IP Routing for SIP Routing, and enter 192.168.2.1 for Destination Address.
d. Click Apply.
Configuring direct calling for SIP UAs through the SIP protocol
(configuring domain name)
Network requirements
As shown in Figure 483, acting as SIP UAs, Router A and Router B can first query destination addresses
through a DNS server and then make calls using the SIP protocol.
Figure 483 Network diagram
495
NOTE:
Before performing the following configurations, configure domain name resolution. For more information
about DNS, see "Configuring DNS."
Configuring Router A
# Create a local number.
Select Voice Management > Local Number from the navigation tree, and then click Add to display the
page for creating a local number.
Figure 484 Create local number 1111
496
Select Voice Management > Call Route from the navigation tree, and then click Add to display the page
for creating a call route.
Figure 485 Create call route 2222
Configuring Router B
Select Voice Management > Local Number from the navigation tree, and then click Add to display the
page for creating a local number.
Figure 486 Create local number 2222
497
a. Enter 1 for Number ID.
b. Enter 2222 for Number.
c. Select subscriber-line 8/0 from the Bound Line list.
d. Enter Telephone B for Description.
e. Click Apply.
498
a. Enter 10000 for Call Route ID.
b. Enter 1111 for Destination Number.
c. Select IP Routing for SIP Routing, and enter 192.168.2.1 for Destination Address.
d. Click Apply.
499
Eth2/1 Eth2/1
Router A 192.168.2.1/24 Internet 192.168.2.2/24
Router B
Configuring Router A
# Create a local number.
Select Voice Management > Local Number from the navigation tree, and then click Add to display the
page for creating a local number.
Figure 489 Create local number 1111
500
a. Enter 10000 for Call Route ID.
b. Enter 2222 for Destination Number.
c. Select SIP Routing for Call Route Type.
d. Select Proxy Server for SIP Routing.
e. Click Apply.
501
a. Select Enable for Register State.
b. Enter 192.168.2.3 for Main Registrar Address.
c. Enter Router A for Username and abc for Password.
d. In the Proxy Server area, enter 192.168.2.3 for Server Address.
e. Click Apply.
Configuring Router B
Select Voice Management > Local Number from the navigation tree, and then click Add to display the
page for creating a local number.
Figure 492 Create local number 2222
502
a. Enter 1 for Number ID.
b. Enter 2222 for Number.
c. Select subscriber-line 8/0 from the Bound Line list.
d. Enter Telephone B for Description.
e. Click Apply.
503
a. Enter 10000 for Call Route ID.
b. Enter 1111 for Destination Number.
c. Select SIP for Call Route Type.
d. Select Proxy Server for SIP Routing.
e. Click Apply.
504
a. Select Enable for Register State.
b. Enter 192.168.2.3 for Main Registrar Address.
c. In the Proxy Server area, enter 192.168.2.3 for Server Address.
d. Enter Router A for Username and abc for Password.
e. Click Apply.
505
Configuring trunk mode calling
Network requirements
As shown in Figure 495, Router A and Router B are connected through an FXO trunk line. It is required
that Telephone 1111 can call Telephone 2222.
Figure 495 Network diagram
Configuring Router A
# Create a local number.
Select Voice Management > Local Number from the navigation tree, and then click Add to display the
page for creating a local number.
Figure 496 Create local number 1111
506
a. Enter 10000 for Call Route ID.
b. Enter 2222 for Destination Number.
c. Select Trunk for Call Route Type.
d. Select subscriber-line 1/0 from the Trunk Route Line list.
e. Click Apply.
507
a. Select Send All Digits of a Called Number for Called Number Sending Mode.
b. Click Apply.
Configuring Router B
Select Voice Management > Local Number from the navigation tree, and then click Add to display the
page for creating a local number.
Figure 499 Create local number 2222
508
Verifying the confiugration
• Telephone 1111 can call telephone 2222 over the trunk line.
• Select Voice Management > States and Statistics > Call Statistics from the navigation tree to display
the Active Call Summary page, which displays the statistics of ongoing calls.
509
Configuring fax and modem
FoIP
Traditional fax machines transmit and receive faxes over PSTN. As time passes, fax has gained wide
applications owing to its advantages such as various information, high transmission speed, and simple
operations. By far, G3 fax machines are dominant in the fax communications. A G3 fax machine adopts
the signal digitizing technology. Image signals are digitized and compressed internally, then converted
into analog signals through a modem, and finally transmitted into the PSTN switch through common
subscriber lines.
FoIP is for sending and receiving faxes over the Internet. Devices can provide the FoIP function after the
FoIP feature is added on the basis of the VoIP function. Because FoIP is the Internet-based fax service, it
costs users less to send national and international faxes.
The network diagram for FoIP is similar to that for VoIP. You just replace the IP phone with a fax machine
to implement the fax function. As long as you can use IP phones, you can use the fax function. Therefore,
the fax function is very simple. The following figure illustrates an FoIP system structure.
Figure 500 FoIP system structure
510
Fax flow
In FoIP, the call setup, handshake, rate training, packet transfer, and call release are always realtime.
From the perspective of users, FoIP has no difference from faxing over PSTN.
Signals that a G3 fax machine receives and sends are modulated analog signals. Therefore, the router
processes fax signals in a different way than it processes telephone signals. The router must perform A/D
or D/A conversion for fax signals (the router demodulates analog signals from PSTN into digital signals
or modulates digital signals from the IP network into analog signals), but it does not need to compress fax
signals.
A real-time fax process consists of five phases:
1. Fax call setup phase—This phase is similar to the process of a telephone call setup. The difference is
that the fax tones identifying the sending/receiving terminals are included.
2. Prior-messaging phase—During this phase, fax faculty negotiation and training are performed.
3. Messaging phase—During this phase, fax packets are transmitted in accordance with the T.4
procedure, and packet transmission is controlled (including packets synchronization, error detection
and correction, and line monitoring).
4. Post-messaging phase—During this phase, control operations such as packet authentication,
messaging completion, and multi-page continuous transmission are performed.
5. Fax call release phase—During this phase, the fax call is released.
Pass-through fax
The fax pass-through technology was developed primarily for the purpose of compressing and
transmitting T.30 fax packets that cannot be demodulated through packet switched networks. With this
technology, the devices on two sides can directly communicate over a transparent IP link, and the voice
gateways do not distinguish fax calls from voice calls. After detecting a fax tone in an established VoIP
call, the voice gateway checks whether the voice codec protocol is G.711. If it is not, the voice gateway
switches the codec to G.711. Then fax data is transmitted as voice data in the pass-through mode.
In the pass-through mode, fax information is in the format of uncompressed G.711 codes and is
encapsulated in RTP packets between gateways, and a fixed bandwidth of 64 Kbps is occupied.
Although the packet redundancy mechanism can reduce the packet loss ratio, the pass-through mode is
subject to factors such as packet loss ratio, jitter, and delay. Therefore, it is necessary to ensure
synchronization of the clocks on both sides. Fax pass-through is called VBD by ITU-T. Fax or modem
signals are transmitted over a voice channel using a proper coding method. The only codecs supported
are G.711 A-law and G.711 μ-law. In addition, when the fax pass-through function is enabled, the VAD
function must be disabled to avoid fax failures.
You can implement the fax pass-through function on the voice gateway in either of the following ways:
• Configure the fax to work in the pass-through mode on both sides.
511
• Negotiate the codec as G.711 and disable fax forwarding. Then, disable the VAD function to avoid
fax failures. This method is used for the voice gateway to interwork with other devices in the
pass-through mode.
Item Description
• Enable—The fax parameters can be configured only when the fax function
Fax Function is enabled.
• Disable
512
Item Description
Configure the protocol used for fax communication with other devices:
• T.38—With this protocol, a fax connection can be set up quickly.
• Standard T.38—Supports SIP.
513
Item Description
Specify the fax training mode:
• Local—Indicates that the gateways participate in the rate training between
fax terminals. In the local training mode, rate training is performed
between fax terminals and gateways, and then the receiving gateway
sends the training result of the receiving fax terminal to the transmitting
Fax Training Mode
gateway. The transmitting gateway finalizes the packet transmission rate
by comparing the received training result with its own training result.
• Point-to-Point—Indicates that the gateways do not participate in the rate
training between two fax terminals. In this mode, rate training is performed
between two fax terminals and is transparent to the gateways.
Usually, the default transmit energy level of the gateway carrier is acceptable.
If the fax cannot be set up yet on the premise that other configurations are
Transmit Energy Level of a correct, you can attempt to adjust the transmit energy level of the gateway
Gateway Carrier carrier (transmit energy level attenuation). A greater level indicates greater
energy. A smaller level indicates greater attenuation.
By default, the transmit energy level of the gateway carrier is –15 dBm.
514
Item Description
As defined in ITU-T, the ECM is required for a half-duplex and fax message
transmission using the half-duplex and half-modulation system of ITU-T V.34
protocol. The G3 fax terminals working in full-duplex mode are required to
support half-duplex mode (ECM).
The fax machines using ECM can correct errors, provide the ARQ function, and
transmit fax packets in the format of HDLC frames. The fax machines using
non-ECM cannot correct errors, and they transmit fax packets in the format of
binary strings.
ECM Fax
• Enable—Enable ECM for fax.
• Disable—Disable ECM for fax.
By default, ECM is disabled.
ECM can be adopted only if fax machines on both sides support ECM and the
gateways are configured with ECM.
You must enable ECM mode for the local numbers and call routes
corresponding to the fax sender and receiver in the ECM mode.
The CNG fax switchover is mainly used to implement the fax mailbox service
through communication with the VCX. When the local fax machine A
originates a fax call to the peer fax machine B, if B is busy or is unattended, A
can send the originated fax to the fax mailbox of the VCX. With CNG fax
CNG Fax Switchover switchover enabled, the voice gateway can switch to the fax mode once it
Function receives a CNG from A.
• Enable
• Disable
The function is disabled by default.
Configure the codec type and switching mode for SIP Modem pass-through
function:
• Standard G.711 A-law—Adopt G.711 A-law as the codec type and use
Re-Invite switching for SIP Modem pass-through.
Codec Type and Switching
• Standard G.711 μ-law—Adopt G.711 μ-law as the codec type and use
Mode for SIP Modem
Re-Invite switching for SIP Modem pass-through.
Pass-through
• NTE Compatible G.711 A-law—Adopt G.711 A-law as the codec type and
use NTE-compatible switching for SIP Modem pass-through.
• NTE Compatible G.711 μ-law—Adopt G.711 μ-law as the codec type and
use NTE-compatible switching for SIP Modem pass-through.
Configure the value of NTE payload type for the NTE-compatible switching
mode.
This option is configurable only when NTE Compatible G.711 A-law or NTE
NTE Payload Type Field
Compatible G.711 μ-law is selected from the Codec Type and Switching Mode
for SIP Modem Pass-through list.
By default, the value of the NTE payload type is 100.
515
Figure 502 Call route Fax and Modem configuration page
For call route fax and modem configuration items, see Table 199 for details.
516
Configuring call services
More and more VoIP-based services are demanded as voice application environments expand. On the
basis of basic calls, new features are implemented to meet different application requirements of VoIP
subscribers.
Call waiting
When subscriber C calls subscriber A who is already engaged in a call with subscriber B, the call is not
rejected if call waiting is enabled. Just like a normal call, subscriber C hears ringback tones, while
subscriber A hears call waiting tones as a reminder that a call is waiting on the line.
Subscriber A can answer the new call by pressing the flash hook or by hanging up to end the call with
subscriber B. In the former case, subscriber B is held. In the latter case, subscriber A is immediately
alerted and can pick up the phone to answer the call originated by subscriber C (the waiting call).
Call hold
If subscriber A in a conversation with subscriber B presses the flash hook, the media session of subscriber
B is temporarily cut through and is held (in the silent state or listening to the waiting tones). The system
plays silent tones or dial tones to subscriber A, depending on the configuration. (The system first plays
dial tones and waits for the subscriber to dial. If the subscriber fails to dial within a period of time, the
system stops playing dial tones and the line stays on hold.). Subscriber A can resume the call with
subscriber B by pressing the flash hook again.
After pressing the flash hook, subscriber A hears dial tones and can initiate a new call. The setup flow for
the new call is completely the same as the one for ordinary calls.
Call forwarding
After receiving a session request, the called party cannot answer the call for some reason. In this case,
the called party notifies in a response the calling party of the forwarded-to number so that the calling
party can re-initiate a session request to the new destination. This is call forwarding.
The system supports these types of call forwarding:
• Call forwarding unconditional—With this feature enabled on a voice subscriber line, incoming calls
are forwarded to the predetermined destination, no matter whether the voice subscriber line is
available.
• Call forwarding busy—With this feature enabled on a voice subscriber line, an incoming call is
forwarded to the predetermined destination when the voice subscriber line is busy.
• Call forwarding no reply—With this feature enabled on a voice subscriber line, an incoming call is
forwarded to the predetermined destination when the voice subscriber line is not answered within a
period of time, which is configured by specifying Max Duration of Playing Ringback Tones on the
FXS, FXS, or E&M line configuration page. It defaults to 60 seconds.
• Call forwarding unavailable—With this feature enabled on a voice subscriber line, an incoming call
is forwarded to the predetermined destination when the voice subscriber line is shut down.
517
Call transfer
Subscriber A (originator) and subscriber B (recipient) are in a conversation. Subscriber A presses the
flash hook and the call is put on hold. Subscriber A dials another number to originate a call to subscriber
C (final recipient). After Subscriber A hangs up, the call between subscriber B and subscriber C is
established. This is call transfer.
To perfect the call transfer feature, the device supports the call recovery function after the call transfer fails.
If subscriber C in the above example is in a conversation with another subscriber and cannot establish a
conversation with subscriber B, the call between subscriber A and subscriber B is recovered.
Call backup
After initiating a call to the called party, the calling party is unable to receive a response. In this case, if
there is another link (PSTN link or VoIP link) to the called party, the calling party re-initiates a call to the
called party over the new route. This is call backup.
The system supports these types of call backup:
• A PSTN link or VoIP link backs up a PSTN link.
• A PSTN link backs up a VoIP link.
Hunt group
Multiple voice subscriber lines are configured with the same called number to form a hunt group. If the
voice subscriber line with the first priority is unavailable when a call setup request to the called party is
received, the call is still established through another voice subscriber line in the hunt group.
Call barring
Call barring includes incoming call barring and outgoing call barring.
Incoming call barring usually refers to the DND service. When incoming call barring is enabled on a
voice subscribe line, calls originated to the attached phone fail.
When outgoing call barring is enabled on a voice subscriber line, calls originated from the attached
phone fail, too.
Three-party conference
When subscriber A has a call with subscriber B and holds a call with subscriber C, A can make C join
the current conversation to implement a three-party conference.
During a three-party conference, a passive participant can initiate a new call to create another
conversation. In this way, conference chaining is implemented, and each conference initiator serves as a
conference bridge.
518
Silent monitor and barge in services
"Silent monitor service" allows a supervisor to monitor active calls without being heard.
"Barge in service" allows a supervisor to participate in a monitored call to implement three-party
conference. For example, suppose subscribers A and B are in a conversation and subscriber C is the
supervisor. If C wants to join the conversation, it sends a request to A. If A permits it, the three-party
conference can be held. In this example, C is the active participant of the conference, A is the voice mixer,
and B is the original participant of the conversation.
Silent monitor and barge in services can be considered as the extensions of three-party conference. To
distinguish them from traditional three-party conference, these two services are called three-party
conference in active participation mode.
519
• O if the terminating private branch exchange (PBX) fails to obtain the calling number (for example,
the originating PBX end does not send it)
A message in MDMF contains the following information:
• Date and time when the voice call occurs (MM DD hh:mm)
• Calling number and calling name if CID is enabled on the device
• Two Ps for the calling number and the calling name if CID is disabled on the device
• O if the terminating PBX fails to obtain the calling number (for example, the originating PBX end
does not send it)
• O if the terminating PBX fails to obtain the calling name (for example, the originating PBX end does
not send it)
The FXS voice subscriber line sends the calling identity information to the called telephone. The calling
identity information is sent to the called telephone through FSK modulation between first and second rings.
Therefore, the called user must pick up the telephone after the second ring to make sure that the calling
identity information is sent and received correctly. Otherwise, the calling identity information may fail to
be displayed.
520
Figure 503 Call services configuration page
Item Description
The Forwarded-to Number for Call Forwarding no Reply—Enter the forwarded-to
number for call forwarding no reply.
The Forwarded-to Number for Call Forwarding Busy—Enter the forwarded-to number
for call forwarding busy.
Call Forwarding
Call Forwarding Unconditional—Enter the forwarded-to number for forwarding
unconditional.
The Forwarded-to Number for Call Forwarding Unavailable—Enter the forwarded-to
number for call forwarding unavailable.
After call waiting is enabled, you can configure the following parameters according to
your needs:
• Number of Call Waiting Tone Play Times
• Number of Tones Played at One Time
Call Waiting
• Interval for Playing Call Waiting Tones
By default, two call waiting tones are played once, and if the value of Number of Tones
in a Call Waiting Tone is greater than 1, the Interval for Playing Call Waiting Tones is 15
seconds.
Three-Party The three-party conference function depends on the call hold function. Therefore,
Conference enable the call hold function before configuring three-party conference.
521
Item Description
Monitor and Barge
Enable or disable the silent-monitor and barge in services.
In
Item Description
Set the calling name, a string of case-sensitive characters including numbers 0 through
9, letters A through Z or a through z, underlines (_), hyphens (-),dots (.), exclamation
point (!), percent sign (%), asterisk (*), plus sign (+), grave accent (`), single quotation
mark (‘), and tilde (~).
Calling Name
By default, no calling name is configured.
The calling name in the calling identity information can only be transmitted in MDMF
format. Therefore, if the calling information delivery is enabled, select the Complex
Delivery option in the Calling Information Delivery area.
522
Item Description
Configure the format of calling information:
• Complex Delivery—Calling identity information is transmitted in complex format.
• Simple Delivery—Calling identity information is transmitted in simple format.
Calling Information
• Do Not Deliver—Do not deliver the Calling identity information.
Delivery
By default, the complex delivery is adopted.
If the remote end supports one format only, you must use the same message format at
the local end.
• Enable
Call Identity
• Disable
Delivery
The calling identity is delivered by default.
• Enable
Incoming Call
• Disable
Barring
By default, incoming call barring is disabled.
Password for
Set a password to lock your telephone when you do not want others to use your
Outgoing Call
telephone.
Barring
• Enable
Feature Service • Disable
By default, feature service is disabled.
• Enable
• Disable
By default, the hunt group function is disabled.
Hunt Group
NOTE:
To use the hunt group feature, select the Enable option of all local numbers involved in this
service.
• Enable
• Disable
By default, MWI is disabled.
Message Waiting After MWI is enabled, you can configure the Duration of Playing the Message Waiting
Indicator Tone parameter according to your needs.
NOTE:
Generally, the voice gateway sends a SUBSCRIBE to the server, receives a NOTIFY from the
server if the subscription is successful, and obtains the status of the voice mailbox
afterwards.
Configure the PLAR function. The number is the E.164 telephone number of the
Hotline Numbers
terminating end.
Enable calling party control and set the on-hook delay time of the called party. If the
On-hook Delay delay time is set to 0, this indicates that the call party control is disabled.
Time of the Called
Party By default, calling party control is disabled (the on-hook delay of the called party is set
to 0).
Processing Priority
When the Line is Specify the processing sequence of services when the line is busy.
Busy
523
Configuring call services of a call route
Select Voice Management > Call Route from the navigation tree, and then click the icon of the call
route to be configured to display the call route call services configuration page shown in Figure 505.
NOTE:
• After completing the trunk configuration of a call route, you can configure the call services of the call route. The SIP
call route does not support call services configuration.
• Support for options provided on the call services page of a call route depends on the selected trunk route line. Only
the FXO trunks support the Calling Number Delivery and Calling Identity Delivery functions.
Item Description
After call waiting is enabled, you can configure the following parameters according to
your needs:
• Number of Call Waiting Tone Play Times
• Number of Tones Played at One Time
Call Waiting
• Interval for Playing Call Waiting Tones
By default, the number of call waiting tone play times is one, and the number of call
wait tones played at one time is 2, and if the value of Number of Tones Played at One
Time is greater than 1, the Interval for Playing Call Waiting Tones is 15 seconds.
• Enable
Incoming Call
• Disable
Barring
By default, incoming call barring is disabled.
Password for
Set a password to lock your telephone when you do not want others to use your
Outgoing Call
telephone.
Barring
524
Item Description
• Enable
• Disable
By default, hunt group function is disabled.
Hunt Group
NOTE:
To use the hunt group feature, select the Enable option of all call routes involved in this
service.
Configure the PLAR function. The number is an E.164 telephone number of the
Hotline Numbers
terminating end.
Eth1/2 Eth1/1
1000 10.1.1.2/24 20.1.1.1/24 3000
Telephone A Telephone C
2000
Telephone B
NOTE:
Before performing the following configuration, make sure that Router A, Router B, and Router C are
reachable to each other.
525
a. Select Enable for Call Waiting.
b. Click Apply.
526
Router A Router B Router C
Eth1/1 Eth1/1
10.1.1.1/24 20.1.1.2/24
Eth1/2 Eth1/1
1000 10.1.1.2/24 20.1.1.1/24 3000
Telephone A Telephone C
2000
Telephone B
NOTE:
Before performing the following configuration, make sure that Router A, Router B, and Router C are
reachable to each other.
a. Enter 3000 for the forwarded-to number for Call Forwarding Busy.
b. Click Apply.
527
Verifying the configuration
Place a call from Telephone A to Telephone B. Router B forwards the call to Telephone C when Telephone
B is busy. Finally, Telephone A and Telephone C start a conversation
Eth1/2 Eth1/1
1000 10.1.1.2/24 20.1.1.1/24 3000
Telephone A Telephone C
2000
Telephone B
NOTE:
Before performing the following configuration, make sure that Router A, Router B, and Router C are
reachable to each other.
528
a. Select Enable for Call Hold.
b. Select Enable for Call Transfer.
c. Click Apply.
529
Eth1/1
10.1.1.2/24
Router B 2000
Telephone B
1000
Telephone A1 Eth1/1
10.1.1.1/24
Eth1/2
20.1.1.1/24
Router A
1000 Eth1/1
Telephone A2 20.1.1.2/24
Router C 3000
Telephone C
NOTE:
Before performing the following configuration, make sure that Router A, Router B, and Router C are
routable to each other.
530
a. Select 4 from the Number Selection Priority list.
b. Click Apply.
531
a. Select Enable for Hunt Group.
b. Click Apply.
Perform the same configuration for the local number 1000 of Telephone A2. (Details not shown)
532
Router A Router B Router C
Eth1/0 Eth1/0
10.1.1.1/24 20.1.1.2/24
Eth1/0 Eth1/1
1000 10.1.1.2/24 20.1.1.1/24 3000
Telephone A Telephone C
2000
Telephone B
NOTE:
Before performing the following configuration, make sure that Router A, Router B, and Router C are
routable to each other.
533
Select Voice Management > Local Number from the navigation tree, and then click the icon of local
number 2000 in the local number list to display the call services configuration page.
Figure 517 Configure call hold
534
Figure 518 Network diagram
535
Figure 520 Silent monitor and barge in feature configuration page (I)
Click Assign External Phones to specify that number 3000 has the authority to monitor number 1000.
After this configuration, the page shown in Figure 521 appears.
Figure 521 Silent monitor and barge in feature configuration page (II)
After the above configuration, Telephone C with the number 3000 can monitor and barge in the
conversations of Telephone A with the number 1000.
Configuring Router A
# Configure a local number and call routes.
• Configure a local number—Specify the local number ID as 1000 and the number as 1000, and bind
the number to line line 1/0 on the local number configuration page.
• Configure the call route to Router B—Specify the call route ID as 10000, the destination number as
3000, and the call route type as SIP, and use a SIP proxy server to complete calls on the call route
configuration page.
• Configure the call route to Router C—Specify the call route ID as 10001, the destination number as
3000, and the call route type as SIP, and use a proxy server to complete calls on the call route
configuration page.
• Configure SIP registration—Enable register function of the server on the connection properties
configuration page. Select Voice Management > Call Connection > SIP Connection from the
navigation tree to display the connection properties configuration page, and configure the IP
addresses of both the main registrar and the proxy server as 100.1.1.101.
# Enable the feature service and the silent-monitor and barge-in function.
536
Select Voice Management > Local Number from the navigation tree, and then click the icon of local
number 1000 to display the call services page shown in Figure 522.
Figure 522 Enable the feature service and the silent monitor and barge in function
537
Configuring Router B
# Configure a local number and call routes.
• Configure a local number—Specify the local number ID as 2000 and the number as 2000, and bind
the number to line line 1/0 on the local number configuration page.
• Configure the call route to Router A—Specify the call route ID as 10000, the destination number as
1000, and the call route type as SIP, and use a SIP proxy server to complete calls on the call route
configuration page.
• Configure the call route to Router C—Specify the call route ID as 10001, the destination number as
3000, and the call route type as SIP, and use a proxy server to complete calls on the call route
configuration page.
• Configure SIP registration—Enable register function of the server on the connection properties
configuration page. Select Voice Management > Call Connection > SIP Connection from the
navigation tree to display the connection properties configuration page, then configure the IP
addresses of both the main registrar and the proxy server as 100.1.1.101.
Configuring Router C
# Configure a local number and call routes.
• Configure a local number—Specify the local number ID as 3000 and the number as 3000, and bind
the number to line line 1/0 on the local number configuration page.
• Configure the call route to Router A—Specify the call route ID as 10000, the destination number as
1000, and the call route type as SIP, and use a SIP proxy server to complete calls on the call route
configuration page.
• Configure the call route to Router B—Specify the call route ID as 10001, the destination number as
2000, and the call route type as SIP, and use a proxy server to complete calls on the call route
configuration page.
• Configure SIP registration—Enable register function of the server on the connection properties
configuration page. Select Voice Management > Call Connection > SIP Connection from the
navigation tree to display the connection properties configuration page, then configure the IP
addresses of both the main registrar and the proxy server as 100.1.1.101.
# Configure the DTMF transmission mode as NTE out-of-band transmission.
Select Voice Management > Call Route from the navigation tree, and then click the icon of call route
1000 to display the advanced settings page shown in Figure 523.
538
Figure 523 Configure DTMF transmission mode
539
b. Click Apply.
540
Configuring advanced settings for local numbers
and call routes
Coding parameters
The configuration of coding parameters includes specifying codec priorities and packet assembly
intervals.
The codecs include: g711alaw, g711ulaw, g723r53, g723r63, g726r16, g726r24, g726r32,
g726r40, g729a, g729br8, and g729r8.
Following are the characteristics of different codecs:
• g711alaw and g711ulaw provide high-quality voice transmission, while requiring greater
bandwidth.
• g723r53 and g723r63 provide silence suppression technology and comfortable noise. The
relatively higher speed output is based on multi-pulse multi-quantitative level technology and
provides relatively higher voice quality. The relatively lower speed output is based on the
Algebraic-Code-Excited Linear-Prediction technology and provides greater flexibility for application.
• The voice quality provided by g729r8 and g729a is similar to the ADPCM of 32 kbps, having the
quality of a toll. It also features low bandwidth, lesser event delay, and medium processing
complexity. Therefore, it has a wide field of application.
Table 203 Relationship between algorithms and bandwidth
Actual network bandwidth is related to packet assembly interval and network structure. The longer the
packet assembly interval is, the closer the network bandwidth is to the media stream bandwidth. More
headers consume more bandwidth. A longer packet assembly interval results in a longer fixed coding
latency.
The following tables show the relevant packet assembly parameters without IPHC, including packet
assembly interval, bytes coded in a time unit, and network bandwidth. You can choose a suitable codec
algorithm according to idle and busy status of the line and network situations more conveniently.
541
Table 204 G.711 algorithm (A-law and μ-law)
Packet
Packet Network Network
Bytes coded length Packet length Coding
assembly bandwidth bandwidt
in a time unit (IP) (IP+PPP) (bytes) latency
interval (IP) h (IP+PPP)
(bytes)
100.8
10 ms 80 120 96 kbps 126 10 ms
kbps
G.711 algorithm (A-law and μ-law): media stream bandwidth 64 kbps, minimum packet assembly interval 10
ms.
G.723 r63 algorithm: media stream bandwidth 6.3 kbps, minimum packet assembly interval 30 ms.
G.723 r53 algorithm: media stream bandwidth 5.3 kbps, minimum packet assembly interval 30 ms.
542
Table 207 G.726 r16 algorithm
G.726 r16 algorithm: media stream bandwidth 16 kbps, minimum packet assembly interval 10 ms.
G.726 r24 algorithm: media stream bandwidth 24 kbps, minimum packet assembly interval 10 ms.
543
Packet Bytes coded Packet Network Network
Packet length Coding
assembly in a time length (IP) bandwidth bandwidth
(IP+PPP) (bytes) latency
interval unit (bytes) (IP) (IP+PPP)
50 ms 200 240 38.4 kbps 246 39.4 kbps 50 ms
G.726 r32 algorithm: media stream bandwidth 32 kbps, minimum packet assembly interval 10 ms.
G.726 r40 algorithm: media stream bandwidth 40 kbps, minimum packet assembly interval 10 ms.
G.729 algorithm: media stream bandwidth 8 kbps, minimum packet assembly interval 10 ms.
544
NOTE:
• The packet assembly interval is the duration to encapsulate information into a voice packet.
• Bytes coded in a time unit = packet assembly interval × media stream bandwidth.
• Packet length (IP) = IP header + RTP header + UDP header + voice information length = 20+12+8+data.
• Packet length (IP+PPP) = PPP header + IP header + RTP header + UDP header + voice information length =
6+20+12+8+data.
• Network bandwidth = Bandwidth of the media stream × packet length/bytes coded in a time unit.
Because IPHC compression is affected significantly by network stability, it cannot achieve high efficiency
unless the line is of high quality, the network is very stable, and packet loss does not occur or seldom
occurs. When the network is unstable, IPHC efficiency drops drastically. With best IPHC performance, the
IP (RTP) header can be compressed to 2 bytes. If the PPP header is compressed at the same time, a great
deal of media stream bandwidth can be saved. The following table shows the best IPHC compression
efficiency of codec algorithms with a packet assembly interval of 30 milliseconds.
Table 212 Compression efficiency of IPHC+PPP header
Other parameters
Other parameters are some optional parameters, such as number selection priority, dial prefix, called
number sending mode, and DTMF transmission mode. For descriptions of these parameters, see
"Configuring other parameters for a local number" and "Configuring other parameters for a call route."
545
Figure 525 Configure coding parameters of the local number
Item Description
Specify a codec Specify the codecs and their priority levels:
Codec with the First
with the first • g711alaw—G.711 A-law codec (defining the pulse
Priority
priority. code modulation technology), requiring a bandwidth of
Specify a codec 64 kbps, usually adopted in Europe.
Codec with the Second
with the second • g711ulaw—G.711μ-law codec, requiring a bandwidth
Priority
priority. of 64 kbps, usually adopted in North America and
Specify a codec Japan.
Codec with the Third • g723r53—G.723.1 Annex A codec, requiring a
with the third
Priority bandwidth of 5.3 kbps.
priority.
• g723r63—G.723.1 Annex A codec, requiring a
bandwidth of 6.3 kbps.
• g726r16—G.726 Annex A codec. It uses the ADPCM
technology, requiring a bandwidth of 16 kbps.
• g726r24—G.726 Annex A codec. It uses ADPCM,
requiring a bandwidth of 24 kbps.
• g726r32—G.726 Annex A codec. It uses ADPCM,
requiring a bandwidth of 32 kbps.
Specify a codec
Codec with the Lowest • g726r40—G.726 Annex A codec. It uses ADPCM,
with the lowest
Priority requiring a bandwidth of 40 kbps.
priority.
• g729a—G.729 Annex A codec (a simplified version of
G.729), requiring a bandwidth of 8 kbps.
• g729br8—G.729 Annex B (the voice compression
technology using conjugate algebraic-code-excited
linear-prediction), requiring a bandwidth of 8 kbps.
• g729r8—G.729 (the voice compression technology
using conjugate algebraic-code-excited
linear-prediction), requiring a bandwidth of 8 kbps.
546
Item Description
Packet Assembly Interval of
Packet assembly interval for g726r16 codec.
G726r16
NOTE:
Two communication parties can communicate normally only if they share some identical
coding/decoding algorithms. If the codec algorithm between two connected devices is inconsistent, or if
the two devices share no common coding/decoding algorithms, the calling fails.
Item Description
Set the priority of the local number. The smaller the value, the higher the
Number Selection Priority
priority.
Configure a dial prefix for the local number. For a trunk type call route,
Dial Prefix
the dial prefix is added to the called number to be sent out.
547
Item Description
Send a
Truncated
Send a truncated called number.
Called
Number
Send All
Called Number Digits of a
Send all digits of a called number.
Sending Mode Called
Number
Send
Send a certain number of digits (that are extracted from the end of a
Certain
number) of a called number. The specified value should be not greater
Number of
than the total number of digits of the called number.
Digits
In-band
Specify the in-band SIP DTMF transmission mode.
Transmission
DTMF
Out-of-band
Transmission Specify the out-of-band SIP DTMF transmission mode.
Transmission
Mode
Adopt DTMF NTE transmission mode. When you adopt this transmission
RFC2833
mode, you can configure the payload type field in RTP packets.
Set the DSCP value in the ToS field in the IP packets that carry the RTP
Pre-defined
DSCP Field Value stream.
548
Figure 527 Configure coding parameters of the call route
For coding parameters configuration items of the call route, see Table 214.
For the configuration items of other parameters of the call route, see Table 214 and Table 215.
Table 215 Configuration
Item Description
Set the priority of the call route. The smaller the value, the higher the
Call Route Selection Priority
priority.
549
Item Description
• Enable
The Local End Plays Ringback
• Disable
Tone
By default, the remote end instead of the local end plays ringback tones.
550
a. Select Out-of-band Transmission for DTMF Transmission Mode.
b. Click Apply.
# Configure out-of-band DTMF transmission mode on Router B for the local number.
Select Voice Management > Local Number from the navigation tree, find local number 2222 in the list,
and then click its icon to display the advanced settings page.
Figure 531 Configure out-of-band DTMF transmission mode
551
Configuring SIP-to-SIP call settings
Item Description
Enable or disable codec transparent transmission.
If the SIP trunk device does not support the codecs supported by the
calling and called parties, you can enable codec transparent transmission
so that the SIP trunk device transparently transmits codec capability sets
between the two parties to complete codec negotiation.
By default, codec transparent transmission is disabled, and the SIP trunk
Codec Transparent
device participates in media negotiation between two parties.
NOTE:
This option takes effect only for public-to-private call routes. To enable this
function for private-to-public call routes, perform the configuration in Voice
Management > SIP Trunk Management > Call Route. For relation
configuration information, see "Configuring SIP trunk."
552
Configuring dial plans
More requirements on dial plans arise with the wide application of VoIP. A dial plan should be flexible,
reasonable, and operable, and should be able to help a voice gateway to manage numbers in a unified
way, making number management more convenient and reasonable.
The dial plan process on the calling side differs from that on the called side. The following discusses these
two dial plan processes.
Local lines
PSTN
Processing sequence
on calling side
Number substitution
Line
Line
Number substitution
Global
Global
Select a Number
Local substitution
local
number/call
number or Local number
route
call route /call route
1. The voice gateway on the calling side replaces the calling and called numbers according to the
number substitution rule on the receiving line.
2. The voice gateway performs global number substitution.
3. The gateway selects proper numbers based on the local number or call route selection priority rules
and replaces the calling and called numbers.
4. The gateway initiates a call to the called side and sends the calling and called numbers.
553
On the called side
Figure 534 shows the dial plan operation process on the called side.
Figure 534 Flow chart for dial plan operation process on the called side
1. After receiving a voice call (the called number), the voice gateway on the called side performs
global calling/called number substitution.
2. The voice gateway on the called side selects proper local numbers or call routes based on the local
number or call route selection priority rules. (Number substitution may also be involved during the
local number or call route selection.) If the called party is a local number, the gateway directly
connects the line. If the called party is a PSTN subscriber, the gateway initiates a call and sends the
calling and called numbers to the PSTN. The PBX in the PSTN connects the call.
Regular expression
You frequently use some regular expressions when you configure number substitution rules. Regular
expressions are a powerful and flexible tool for pattern matching and substitution. They are not restricted
to a language or system and have been widely accepted.
When using a regular expression, construct a matching pattern according to certain rules, and then
compare the matching pattern with the target object. The simplest regular expressions do not contain any
meta-character. For example, you can specify a regular expression hello, which only matches the string
hello.
To help you construct matching patterns flexibly, regular expressions support some special characters,
called meta-characters, which define the way other characters appear in the target object.
Table 217 Meta-characters
Meta-character Meaning
0-9 Digits 0 through 9.
554
Meta-character Meaning
# and * Each indicates a valid digit.
Wildcard, which can match any valid digit. For example, 555…. can match any
.
number beginning with 555 and ending in four additional characters.
Hyphen (connecting element), used to connect two numbers (the smaller comes
-
before the larger) to indicate a range of numbers, for example, 1-9 inclusive.
Delimits a range for matching. It can be used together with signs such as !, %, and +.
[]
For example, [235-9] indicates one number of 2, 3, and 5 through 9.
Indicates a sub-expression. For example, (086) indicates the character string 086. It
() is usually used together with signs such as !, %, and +. For example, (086)!010 can
match two character strings 010 and 086010.
A control character, indicating that the sub-expression before it appears once or does
! not appear. For example, (010)!12345678 can match 12345678 and
01012345678.
A control character, indicating that the sub-expression before it appears one or more
times. However, if a calling number starts with the plus sign, the sign itself does not
have special meanings and only indicates that the following is an effective number
+
and the whole number is E.164-compliant. For example, 9876(54)+ can match
987654, 98765454, 9876545454, and so on, and +110022 is an
E.164-compliant number.
NOTE:
• The sub-expression (one digit or digit string) before a control character such as !, +, and % can appear the number
of times indicated by the control character. For example, (100)+ can match 100, 100100, 100100100, and so on.
After any number of them are matched, the match is considered an exact match. In the longest match mode, the
voice gateway ignores subsequent digits dialed by the subscriber after an exact match. (For the situation where the
gateway must wait for subscribers to continue dialing after an exact match, refer to the T mode.)
• The characters (\) and (|) are mainly used in regular expressions and cannot be used as common characters. The
character (\) is an escape character. If you want a control character to represent itself, add the escape character (\)
before it. For example, (\+) represents the character (+) itself because (+) is a control character in regular
expressions. The character (|) means that the current character (string) is the character (string) on either the left or
the right. For example, 0860108888|T means that the current character string is either 0860108888 or T.
• T mode: If the character T is in the number set in a local number or call route, it means that the voice gateway should
wait for more digits until the number exceeds the maximum length or the dial timer expires.
• If a number starts with the plus sign (+), note the following when you use it on a trunk: The E&M, R2, and LGS
signaling uses DTMF, and because the plus sign (+) does not have a corresponding audio, the number cannot be
transmitted to the called side successfully. While the DSS1 signaling uses ISDN, the above problem does not exist.
Therefore, you should avoid using a number that cannot be identified by the signaling itself. Otherwise, the call
fails.
555
Introduction to dial plan functions
Number match
Dial terminator
In areas where variable-length numbers are used, you can specify a character as the dial terminator so
that the voice gateway can dial out the number before the dialing interval expires. The dial terminator
identifies the end of a dialing process, and a call connection is established based on the received digits
when the dial terminator is received. The voice gateway does not wait for further digits, even if the
longest match mode has been globally configured.
Maximum number of local numbers or call routes found before a search process stops
This function enables you to define the maximum number of qualified local numbers or call routes to be
found before a search process stops. Even if the number of local numbers or call routes meeting call
requirements is greater than the defined maximum number, the system matches against the local numbers
or call routes that are found in the search according to the configured maximum number.
556
Entity type selection priority rules
You can configure the priorities for different types of entities. When multiple local numbers or call routes
are qualified for a call connection, the system selects a suitable local number or call route whose entity
type has the highest priority.
Call control
Call authority control
To configure call authority control, you can assign subscriber numbers to a number group, and then bind
the group, which has authorities configured, to a local number or call route.
When a subscriber originates a call that matches the local number or call route that has bound with a
number group, the system compares the calling number with each number in the number group. If a
match is found, the calling is permitted. Otherwise, the system finds the next matching local number or
call route until the calling is permitted or denied. For related configuration of this function, see
"Configuring a number group."
Maximum-call-connection set
You can limit the total call connections for local numbers or call routes according to the network scale to
control communication traffic. You can bind a local number or call route to a maximum-call-connection set.
After that, the number of call connections of the local number or call route is restricted.
Number substitution
A number substitution rule list defines some number substitution methods. It can be used wherever number
substitution is necessary. There is no limitation on where and how many times it is used. Therefore, a
number substitution rule list may be bound globally and bound to different local numbers/call routes and
lines.
The characteristics of global calling/called number substitution or calling/called number substitution on
local numbers/call routes and lines are as follows:
• Global number substitution—The voice gateway substitutes calling and called numbers of all
incoming and outgoing calls according to the number substitution rules configured in dial program
557
view. Multiple number substitution rule lists can be bound for global calling and called number
substitution of incoming and outgoing calls. If there is no match in the first number substitution rule
list, the voice gateway matches against other number substitution rule lists.
• Number substitution on local numbers or call routes—The voice gateway substitutes the calling and
called numbers based on the number substitution rule lists bound to local numbers or call routes.
• Number substitution on a specific line—The voice gateway substitutes the calling and called numbers
of incoming calls based on the number substitution rules configured on the receiving line.
Item Description
Configure a special character as the dial terminator for length-variable telephone
numbers.
If you set the argument character to # or *, and if the first character of the
Dial Terminator configured local number or call route is the same as the argument character (# or
*), the device takes this first character as a common number rather than a dial
terminator.
By default, no dial terminator is configured.
558
Item Description
• Service first
Number Match Policy
• Number first
Select Based on Voice Select the Enable option. The sequence of the voice entities in the Selection
Entity Type Sequence list determines the match order, and you can click the Up and Down
buttons to move a voice entity.
First Rule in the Match • Exact match—The more digits of a digit string are matched from left to right,
Order the higher the precision is. The system stops using the rule once a digit cannot
be matched uniquely.
Second Rule in the Match
• Priority—Number priorities are divided into 11 levels numbered from 0 to
Order
10. The smaller the value is, the higher the priority is. That means level 0 has
the highest priority.
• Random selection—The system selects at random a number from a set of
qualified numbers. After the random selection rule is applied, there is no
number selection conflict. The random selection rule can only serve as a rule
with the lowest priority or serve as a unique rule separately.
Third Rule in the Match • Longest idle time—The longer the voice entity is idle, the higher the priority is.
Order You can select one to three rules to form a sequence. The voice gateway first
selects a number according to the first rule. If the voice gateway fails to decide
which number should be selected according to the first rule, it applies the second
rule, and so on.
By default, the match order of rules for the number selection is exact match->
priority-> random selection.
559
Figure 536 Number group page
Click Add to display the number group configuration page shown in Figure 537.
Figure 537 Number group configuration page
Item Description
Group ID ID of the number group.
Numbers in the
Group Enter subscriber numbers to be added into the group in the field. You can add a
number by clicking Add.
Add
560
Figure 538 Local number binding page
Item Description
• Permit the calls from the number group
Binding Mode
• Deny the calls from the number group
Select the checkbox in front of the ID column, and then click Apply to complete local number binding.
NOTE:
A local number can be bound to multiple number groups in the same binding mode (a local number can
either permit or deny the calls from bound number groups).
NOTE:
A call route can be bound to multiple number groups in the same binding mode (a call route can either
permit or deny the calls from bound number groups).
561
Figure 539 Max-call-connection set page
Click Add to display the Max-Call-Connection Set Configuration page shown in Figure 540.
Figure 540 Max-call-connection set configuration page
Item Description
Connection Set ID ID of the max-call-connection set
Select the checkbox in front of the ID column, and then click Apply to complete local number binding.
3. Bind call routes to a max-call-connection set.
Click Not Bound in the Call Routes Bound column to display the call route binding page.
The configuration of call route binding is similar to that of local number binding, so it is not shown here.
4. Bind IVR numbers to a max-call-connection set.
562
Click Not Bound in the IVR Numbers Bound column to display the IVR number binding page.
The configuration of IVR number binding is similar to that of local number binding, so it is not shown here.
563
Table 222 Configuration
Item Description
Number Substitution
ID of the number substitution rule list.
Rule List ID
• End-Only—Reserves the digits to which all ending dots (.) in the input number
correspond.
• Left-to-Right—Reserves from left to right the digits to which the dots in the input
number correspond.
• Right-to-Left—Reserves from right to left the digits to which the dots in the input
number correspond.
Dot Match Rule
By default, the dot match rule is End-Only.
The dots here are virtual match digits. Virtual match digits refer to those matching the
variable part such as ., +, %, !, and [] in a regular expression. For example, when
1255 is matched with the regular expression 1[234]55, the virtual match digit is 2,
when matched with the regular expression 125+, the virtual match digit is 5, and
matched with the regular expression 1..5, the virtual match digits are 25.
Output Numbering Input and output numbering plans involved number substitution.
Plan
Set the preferred number substitution rule of the current number substitution rule list.
In a voice call, the system first uses the preferred number substitution rule for number
substitution. If this rule fails to be applied or is not configured, the system tries to
Applied First (only apply all other rules in order until one or none of them is applied.
one rule can be
applied first) During a number substitution process, there may be multiple rules, but only one of
them can be set as the preferred one. Moreover, the latest configuration overwrites
the previous one.
By default, this function is disabled.
2. Bind a number substitution list to global, local numbers, call routes, or lines.
564
Click Not Bound in the Global Binding, Local Numbers Bound, Call Routes Bound, or Bound Line column to
display the corresponding binding page. The configurations of these bindings are similar to those of local
number binding in call control, so they are not shown here.
0
1/
S
FX
FX
S
1/
1
Configuration procedure
1. Shortest number match:
• Configure Router A.
# Add a local number: specify the number ID as 1000, the number as 10001234$, and the bound line
as line 1/0 on the local number configuration page.
# Add a call route: specify the call route ID as 2000, the destination number as 20001234$, and the
destination address as 1.1.1.2 on the call route configuration page.
# Add a call route: specify the call route ID as 2001, the destination number as 200012341234$, and
the destination address as 1.1.1.2 on the call route configuration page.
• Configure Router B.
# Add a local number: specify the number ID as 2000, the number as 20001234$, and the bound line
as 1/0 on the local number configuration page.
# Add a local number: specify the number ID as 2001, the number as 200012341234$, and the bound
line as 1/1 on the local number configuration page.
When you dial number 20001234 at Telephone A, the number 20001234 matches call route 2000,
and Telephone B is alerted because the device adopts the shortest match mode by default.
2. Longest number match:
565
# Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree to
display the number match configuration page shown in Figure 545.
Figure 545 Number match mode configuration page
After you dial number 20001234 at Telephone A and wait for some time (during this period, you can
continue dialing), the dialed number 20001234 matches call route 2000, and Telephone B is alerted.
If you continue to dial 1234 during that period, the dialed number 200012341234 matches call route
2001, and Telephone C is alerted.
3. Dial terminator:
# Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree to
display the dial terminator configuration page shown in Figure 546.
Figure 546 Dial terminator configuration page
566
b. Click Apply.
After you dial 20001234# at Telephone A, the number immediately matches call route 2000, and
Telephone B is alerted.
Configuring Router A
# Add a local number: specify the number ID as 1000, the number as 10001234$, and the bound line
as 1/0 on the local number configuration page.
# Add a call route: specify the call route ID as 2000, the destination number as 20001234$, and the
destination address as 1.1.1.2 on the call route configuration page.
# Configure call route selection priority.
Select Voice Management > Call Route from the navigation tree to display the call route list page. Find the
call route with the ID of 2000 in the list, and then click its corresponding icon to display the advanced
setting page.
Figure 548 Call route selection priority configuration page
567
# Add a call route: specify the call route ID as 2001, the destination number as 2000123.$, and the
destination address as 1.1.1.2 on the call route configuration page.
Select Voice Management > Call Route from the navigation tree to display the call route list page. Find the
call route with the ID of 2001 in the list, and then click its corresponding icon to display the advanced
setting page.
Figure 549 Cal route selection priority configuration page
# Add a call route: specify the call route ID as 2002, the destination number as 2000....$, and the
destination address as 1.1.1.2 on the call route configuration page.
Configuring Router B
# Add a local number: specify the number ID as 2000, the number as 20001234$, and the bound line
as 1/0 on the local number configuration page.
Configuring the match order of number selection rules: the first rule is exact match, the second rule is
priority, and the third rule is random selection
Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree to
display the page for configuring the match order of number selection rules, as shown in Figure 550.
568
Figure 550 Match order of number selection rules configuration page
a. Select Exact Match from the First Rule in the Match Order list.
b. Select Priority from the Second Rule in the Match Order list.
c. Select Random Selection from the Third Rule in the Match Order list.
d. Click Apply.
After you dial number 20001234 at Telephone A, the number matches call route 2000.
Configuring the match order of number selection rules as follows: the first rule is priority, the second rule is
exact match, and the third rule is random selection
Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree to
display the page for configuring the match order of number selection rules.
Figure 551 Match order of number selection rules configuration page
a. Select Priority from the First Rule in the Match Order list.
b. Select Exact Match from the Second Rule in the Match Order list.
c. Select Random Selection from the Third Rule in the Match Order list.
569
d. Click Apply.
After you dial number 20001234 at Telephone A, the number matches call route 2002.
a. Select Random Selection from the First Rule in the Match Order list.
b. Click Apply.
After you dial number 20001234 at Telephone A, the number matches call route 2000, 2001, or 2002
at random.
Configuring Router A
Select Voice Management > Digital Link Management from the navigation tree to display the digital link
list page. Find the digital link VE1 5/0 in the list, and then click its corresponding icon to display the
E1 parameters configuration page.
570
Figure 554 E1 parameters configuration page
# Add a local number: specify the number ID as 1000, the number as 10001234$, and the bound line
as 1/0 on the local number configuration page.
# Add a call route: specify the call route ID as 1001, the destination number as 20001234$, and the
trunk route line as 5/0:15 on the call route configuration page. In addition, select the Send All Digits of a
Called Number option in the Called Number Sending Mode area when you configure the advanced
settings of this call route.
# Add a call route: specify the call route ID as 2000, the destination number as 20001234$, and the
destination address as 1.1.1.2 on the call route configuration page.
571
Configuring Router B
Select Voice Management > Digital Link Management from the navigation tree to display the digital link
list page. Find the digital link VE1 5/0 in the list, and then click its corresponding icon to display the
E1 parameters configuration page.
Figure 555 E1 parameters configuration page
# Add a local number: specify the number ID as 2000, the number as 20001234$, and the bound line
as 1/0 on the local number configuration page.
572
Figure 556 Entity type selection priority rule configuration page (I)
a. Configure the order of the voice entities in the Selection Sequence list: the first is VOIP, the
second is POTS, the third is VoFR, and the last is IVR.
b. Click Apply.
After you dial 20001234 at Telephone A, the number matches call route 2000 (VoIP entity).
a. Configure the order of the voice entities in the Selection Sequence list: the first is POTS , the
second is VOIP, the third is VoFR, and the last is IVR.
b. Click Apply.
After you dial 20001234 at Telephone A, the number matches call route 1001 (POTS entity).
573
Configuring call authority control
Network requirements
As shown in Figure 558, Router A, Router B, and Router C are located at place A, place B, and place C,
respectively, and they are all connected to the SIP server to allow subscribers to make SIP calls. When
VoIP links fail for some reason, PSTN links that provide backup for VoIP links can be automatically
brought up. It is required that subscribers whose telephone numbers beginning with 1100 at place A can
originate calls to place B while subscribers whose telephone number beginning with 1200 can originate
calls to both place B and place C.
Figure 558 Network diagram
Place A Place B
110000
Router B
2100
1100..
PBX
110099 Router A
2200
IP PSTN’s
central office
120000 PBX
Router C
1200.. 3100
PSTN’s
central office
120099 PBX
SIP server
3200
PSTN’s
Place C
central office
Configuring Router A
# Configure two number groups.
Configure Router A. Select Voice Management > Dial Plan > Call Authority Control from the navigation
tree, and then click Add to display the number group configuration page.
Figure 559 Number group configuration page
574
a. Enter 1 for Group ID.
b. Enter 1100.. for Numbers in the Group.
c. Click Add to add numbers into the group.
d. Click Apply.
Display the number group configuration page again to add another number group:
a. Enter 2 for Group ID.
b. Enter 1200.. for Numbers in the Group.
c. Click Add to add numbers into the group.
d. Click Apply.
# Add a call route for place B: specify the call route ID as 2000, the destination number as 2..., and use
a proxy server for SIP routing on the call route configuration page.
# Crete a call route for place C: specify the call route ID as 3000, the destination number as 3..., and
use a proxy server for SIP routing on the call route configuration page.
# Add a call route for place B: specify the call route ID as 2100, the destination number as 2…, and
trunk route line as 5/0:15 on the call route configuration page. In addition, select the Send All Digits of a
Called Number option in the Called Number Sending Mode area when you configure the advanced
settings of this call route.
# Add a call route 3… for place C: specify the call route ID as 3100, the destination number as 3..., and
the trunk route line as 5/1:15 on the call route configuration page. In addition, select the Send All Digits
of a Called Number option in the Called Number Sending Mode area when you configure the advanced
settings of this call route.
# Bind a call route to number group 1 to allow subscribers whose telephone numbers beginning with
1100 at place A to originate calls to place B.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree to display the page
shown in Figure 560.
Figure 560 Binding call route configuration page (I)
Click Not Bound in the Call Routes Bound column to display the call route binding page of number group
1.
575
Figure 561 Call route binding page (I)
a. Select Permit the calls from the number group for Binding Mode.
b. Select the checkbox for call route 2100.
c. Click Apply.
# Bind a call route to the number group 2 to allow subscribers whose telephone number beginning with
1200 to originate calls to both place B and place C.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree to display the page
shown in Figure 562.
Figure 562 Binding call route configuration page (II)
Click Not Bound in the Call Routes Bound column to display the call route binding page of number group
2.
576
Figure 563 Call route binding page (II)
a. Select Permit the calls from the number group for Binding Mode.
b. Select the checkboxes for call routes 2100 and 3100.
c. Click Apply.
Configuring Router B
# Add a call route: specify the call route ID as 2100, the destination number as 2…, and the trunk route
line as 1/0:15 on the call route configuration page. In addition, select the Send All Digits of a Called
Number option in the Called Number Sending Mode area when you configure the advanced settings of
this call route.
Configuring Router C
# Add a call route: specify its call route ID as 3100, the destination number as 3..., and the trunk route
line as 1/0:15 on the call route configuration page. In addition, select the Send All Digits of a Called
Number option in the Called Number Sending Mode area when you configure the advanced settings of
this call route.
577
Figure 564 Network diagram
Configuration considerations
The PBX (calling side) at place B changes the called number to an intermediate number.
The PBX (called side) at place A changes the received intermediate number to a local number before
initiating the call.
NOTE:
The following configuration supports dial plan–based calls from place B to place A only.
Configuring Router B
# Set the IP address of the Ethernet interface to 2.2.2.2.
# Add a call route for place A: specify the call route ID as 10, the destination number as 010…., the call
route type as SIP, the SIP routing as IP routing, and the destination address as 1.1.1.1 on the call route
configuration page.
# Add a call route: specify the call route ID as 100, the destination number as ...., and the trunk route line
as 1/0 on the call route configuration page. In addition, select the Send All Digits of a Called Number
option in the Called Number Sending Mode area when you configure the advanced settings of this call
route. Also, select the Enable option in the Hunt Group area when you configure the call services of this
call route.
# Add a call route: specify the call route ID as 101, the destination number as ...., and the trunk route
line as 1/1 on the call route configuration page. In addition, select the Send All Digits of a Called Number
option in the Called Number Sending Mode area when you configure the advanced settings of this call
route. Also, select the Enable option in the Hunt Group area when you configure the call services of this
call route.
# Add a number substitution rule list for called numbers of outgoing calls.
Select Voice Management > Dial Plan > Number Substitution from the navigation tree, and then click Add
to display the number substitution configuration page.
578
Figure 565 Number substitution configuration page (I)
579
Figure 566 Number substitution configuration page (II)
• Select Apply Call Routing Binding Rule to Called Numbers for Binding Mode.
• Select call route 10.
• Click Apply.
# Enter the call route binding page of number substitution list 21102.
580
Figure 568 Call routing binding page of number substitution list 21102
a. Select Apply Call Routing Binding Rule to Calling Numbers for Binding Mode.
b. Select call route 10.
c. Click Apply.
Configuring Router A
# Set the IP address of the Ethernet interface to 1.1.1.1.
# Add a call route: specify the call route ID as 1010, the destination number as …., and the trunk route
line as FXO line 1/0 on the call route configuration page. In addition, select the Send All Digits of a Called
Number option in the Called Number Sending Mode area when you configure the advanced settings of
this call route. Also, select the Enable option in the Hunt Group area when you configure the call services
of this call route.
# Add a call route: specify the call route ID as 2010, the destination number as ...., and the trunk route
line as FXO line 1/1 on the call route configuration page. In addition, select the Send All Digits of a Called
Number option in the Called Number Sending Mode area when you configure the advanced settings of
this call route. Also, select the Enable option in the Hunt Group area when you configure the call services
of this call route.
# Add number substitution rule list 101 for called numbers of incoming calls.
Select Voice Management > Dial Plan > Number Substitution from the navigation tree, and then click Add
to display the number substitution configuration page.
581
Figure 569 Number substitution configuration page (III)
582
Figure 570 Number substitution configuration page (IV)
583
Figure 572 Global binding page of number substitution list 102
584
Configuring call connections
Introduction to SIP
SIP is an application layer control protocol that can establish, modify, and terminate multimedia sessions
such as IP phone calls, multimedia sessions, and multimedia conferences. It is the core component in the
multimedia data and control architecture of the IETF (RFC 3261).
SIP is responsible for signaling control in IP networks and communication with soft switch platforms,
intending to build a next generation value-added service platform to deliver better value-added services to
telecom carriers, banks, and financial organizations.
SIP is used for initiating sessions. It sets up and terminates a multimedia session involving a group of
participants and dynamically adjusts and modifies session characteristics such as required session
bandwidth, media type (voice, video, or data), media encoding/decoding format, and multicast/unicast.
SIP is based on text encoding and constructed by taking HTTP, a quite mature protocol, as a model. Easy
to extend and implement, it is suitable for implementing Internet-based multimedia conference systems.
Terminology
Multimedia session
According to RFC2327, a multimedia session is a set of multimedia senders and receivers and the data
streams flowing from senders to receivers. A multimedia conference is an example of a multimedia
session.
A session is identified by a set of username, session ID, network type, address type, and address.
User agent
A UA, or a SIP endpoint, is a SIP-enabled multimedia session endpoint. Usually, a SIP-enabled router
serves as a SIP UA.
There are two types of UAs: UAC and UAS. To make a call, a SIP endpoint must process the SIP request
as a UAS and initiate the SIP request as a UAC.
A UAC is a device that initiates a session request. It can be a calling SIP endpoint or a proxy server
forwarding a request to a called endpoint, for example.
A UAS is a device that generates a response to a SIP request. It can be a called SIP endpoint or a proxy
server receiving a request from a calling endpoint, for example.
Proxy server
A proxy server is a device that forwards session requests to a called UA on behalf of a calling UA (a SIP
endpoint) and responds to the calling UA on behalf of the called UA.
When the proxy server receives a request from a calling UA, it checks for the called UA location and for
the call policies of the calling UA and called UA. If the called UA location information is available, and if
the calling UA is allowed to make the call, the proxy server forwards the request to the called UA.
Redirect server
A redirect server sends a new connection address to a requesting client.
585
For example, when receiving a request from a calling UA, the redirect server searches for the location
information of the called UA and returns the location information to the UA. The location can be that of
the called UA or another proxy server, to which the UA can initiate the session request again. The
subsequent procedure is the same as that for calling a called UA directly or for calling a proxy server.
Location server
A location server is a device that provides UA information to proxy and redirect servers. It retains UA
information received by a registrar. The location server and registrar can be located on the same server
as two logical components or on different devices.
Registrar
A registrar receives UAs' registrations. The registration information (for example, the local telephone
number) is usually stored on the location server for future retrieval. The location server and the registrar
are both logical components and are usually co-located.
Features
SIP delivers the following features:
• Open standards—It can accommodate new functions, products, and services introduced by different
service providers.
• Flexible configuration—It accommodates a wide range of dialup, wire, and wireless devices, allows
highly flexible configurations, and can work with other systems.
• Scalable system—The system allows expansion as enterprises grow.
• Support to remote users—With SIP, an enterprise network can extend to all its users, wherever they
are.
• Consistent communication method—Management becomes easier as the result of consistency in
dialup mode and system access method used by branches, SOHOs, and traveling personnel.
586
• Quick launch—The system can be updated quickly to accommodate new branches and personnel,
as well as changes resulting from job rotation or relocation.
• Easy to install and maintain—Even non-professional individuals can install and maintain SIP systems.
SIP messages
SIP messages, which fall into the categories of SIP request messages and SIP response messages, are
encoded in text mode.
SIP request messages include INVITE, ACK, OPTIONS, BYE, CANCEL, and REGISTER. RFC 3261 defines
the request messages:
• INVITE—Used to invite a user to join a call.
• ACK—Used to acknowledge the response to a request.
• OPTIONS—Used to query for the capabilities.
• BYE—Used to release an established call.
• CANCEL—Used to give up a call attempt.
• REGISTER—Used to register with the SIP registrar.
SIP response messages, used to respond to SIP requests, indicate the status of a call or registration:
succeeded or failed. Response messages are distinguished by status codes. Each status code is a 3-digit
integer, where the first digit defines the class of a response, and the last two digits describe the response
message in more detail.
Table 223 Status codes of response messages
200 – 299 The request is successfully received, understood, and accepted. Success
300 – 399 A further action must be taken to process the request. Redirection
400 – 499 The request contains bad syntax and cannot be processed. Client error
500 – 599 The request cannot be processed due to UAS or server error. Server error
600 – 699 The request cannot be processed by any UAS or server. Global error
SIP fundamentals
Registration
In a complete SIP system, all SIP endpoints working as UAs should register with SIP registrars, providing
information such as location, session capabilities, and call policy.
Normally, a SIP UA sends its registrar a REGISTER request at startup or in response to an administrative
registration operation, carrying all the information that must be recorded. Upon receipt of the request, the
registrar sends back a response notifying receipt of the request and a 200 OK (SUCCESS) message if the
registration is accepted. See the following figure.
Figure 573 Message exchange for a UA to register with a Registrar
587
Call setup
SIP operates in the Client/Server mode and sets up calls through communication between UA and proxy
server.
Figure 574 Network diagram for call setup involving a proxy server
In the above figure, Telephone A wants to call Telephone B, and Router A and Router B work as SIP
endpoints (UAs).
The procedure for connecting a call from Telephone A to Telephone B is as follows:
1. Telephone A sends the number of Telephone B.
2. Upon receipt of the call, Router A sends a session request (INVITE) to the proxy server.
3. The proxy server consults its database for information corresponding to the number of Telephone B.
If such information is available, it forwards the request to Router B.
4. Router B, after receiving the request, responds to the proxy server and makes Telephone B ring if
Telephone B is available.
5. The proxy server forwards the response to Router A. The response discussed here includes two
provisional response messages (100 Trying and 180 Ringing) and one success response (200 OK).
Figure 575 illustrates the complete call setup procedure.
Figure 575 Call setup procedures involving a proxy server
588
Calling side Proxy Server Called side
INVITE
100 Trying
INVITE
100 Trying
180 Ringing
180 Ringing
200 OK
200 OK
RTP/RTCP
BYE
BYE
200 for BYE
200 for BYE
This is a simplified scenario where only one proxy server is involved and no registrar is present. A
complex scenario, however, may involve multiple proxy servers and registrars.
Call redirection
When a SIP redirect server receives a session request, it sends back a response indicating the address of
the called SIP endpoint instead of forwarding the request. The calling and called endpoints can send
requests and responses to each other directly. See Figure 576.
Figure 576 Call redirection procedure for UAs
589
This is a common application. Fundamentally, a redirect server can respond with the address of a proxy
server as well. The subsequent call procedures are the same as the call procedures involving proxy
servers.
SIP security
Signaling encryption
TLS runs over TCP and provides a complete set of authentication and encryption solutions for application
layer protocols. When establishing a TLS connection, both sides need to authenticate each other by using
their own digital certificates and can communicate with each other only after passing authentication. SIP
590
messages are encrypted during SIP over TLS transmissions to prevent data from being sniffed and to
increase the security of voice communications.
When SRTP is used to encrypt RTP/RTCP packets, the encryption engine, if enabled, encrypts and
authenticates RTP/RTCP packets. If the encryption engine is disabled, the CPU encrypts and authenticates
RTP/RTCP packets. For more information about the encryption engine, see HP A-MSR Router Series
Security Configuration Guide.
NOTE:
SRTP is available only for SIP calls. SIP trunk devices do not support SRTP. For information about SIP trunk,
see "Configuring SIP trunk management."
TLS-SRTP combinations
TLS protects control signaling, and SRTP encrypts and authenticates voice media flows. You can use them
separately or together. The following table shows four combinations of TLS and SRTP.
591
Table 225 TLS-SRTP combinations
592
Configuring SIP connections
Item Description
• Enable—Select to enable the SIP registrar.
Registrar State
• Disable—Select to disable the SIP registrar.
593
Item Description
• UDP—Applies the UDP transport layer protocol when the device registers to
the main registrar.
• TCP—Applies the TCP transport layer protocol when the device registers to
Main Registrar Transport the main registrar.
Layer Protocol
• TLS—Applies the TLS transport layer protocol when the device registers to the
main registrar.
By default, the UDP protocol is applied.
• SIP—Specifies the SIP scheme as the URL scheme when the device registers to
the main registrar.
Main Registrar URL
• SIPS—Specifies the SIPS scheme as the URL scheme when the device registers
Scheme
to the main registrar.
By default, the SIP scheme is applied.
Backup Registrar
IP address or domain name of the backup registrar.
Address
Authentication
Information Field for Authentication information field used for handshake authentication between the
Handshake registrar and the SIP UA.
Authentication
594
Configuring proxy server
Select Voice Management > Call Connection > SIP Connection from the navigation tree to display the
proxy server configuration page shown in Figure 578.
Figure 578 Proxy server configuration page
Item Description
Select the checkbox, and select a server group from the list as the proxy server.
You can add a server group on the page that can be accessed by selecting Voice
Use Server Group
Management > Call Connection > SIP Server Group Management from the
navigation tree.
• UDP—Applies the UDP transport layer protocol when the device initiates a
call.
Transport Layer Protocol • TCP—Applies the TCP transport layer protocol when the device initiates a
for SIP Calls call.
• TLS—Applies the TLS transport layer protocol when the device initiates a call.
By default, the UDP protocol is applied.
• SIP—Specifies the SIP scheme as the URL scheme.
URL Scheme • SIPS—Specifies the SIPS scheme as the URL scheme.
By default, the SIP scheme is applied.
595
Configuring source address binding
Introduction to SIP support for source IP address binding
With this function, you can specify a source IP address for SIP signaling or media streams that go out of
the gateway. SIP support for source IP address binding is implemented by binding a static IP address or
the primary IP address of an interface.
• Static IPv4 address binding—The source IP address specified for SIP calls is the bound IP address.
• Source address interface binding—In a large network, an interface obtains its IP address from a
DHCP or PPPoE server. In this scenario, you can use this function to configure an interface as the
source of SIP signaling and media streams to avoid manual IP address configuration, facilitating
network management.
Source IP address binding is supported on the Layer 3 Ethernet interface, GigabitEthernet interface, or
dialer interface.
NOTE:
For information about DHCP, see HP A-MSR Router Series Layer 3—IP Services Configuration Guide.
Item Description
Configure media stream binding mode or disable media stream binding:
Media Stream Binding • None—Disables media stream binding.
Mode • IPv4 Address Binding—Binds the media stream to a static IPv4 address.
• Interface Binding—Binds the media stream to an interface.
IPv4 Address Bound with If IPv4 Address Binding is selected as the media stream binding mode, enter the
the Media Stream IPv4 address to be bound in this field.
If Interface Binding is selected as the media stream binding mode, specify the
Interface Bound with the
interface to be bound from the list. Only the Layer 3 Ethernet interface, GE
Media Stream
interface, and dialer interface are supported.
596
Item Description
Configure the signaling stream binding mode or disable signaling stream
binding:
Signaling Stream Binding
• None—Disables signaling stream binding.
Mode
• IPv4 Address Binding—Binds the signaling stream to an IPv4 address.
• Interface Binding—Binds the signaling stream to an interface.
IPv4 Address Bound with If IPv4 Address Binding is selected as the signaling stream binding mode, enter
the Signaling Stream the IPv4 address to be bound in this field.
If Interface Binding is selected as the signaling stream binding mode, specify the
Interface Bound with the
interface to be bound from the list. Only Layer 3 Ethernet interfaces, GE
Signaling Stream
interfaces, and dialer interfaces are supported.
Table 229 Application of the source address binding settings in different states
The bound hot-swappable interface have The source IP address binding settings are cancelled and are
been disconnected restored the next time the interface is connected.
The physical layer or link layer of the The source IP address binding settings never take effect, and
corresponding interface is down the gateway automatically gets an IP address to send packets.
597
Table 230 Configuration
Item Description
• UDP—Specifies UDP as the transport layer protocol for incoming SIP calls
and enables UDP listening port 5060.
• TCP—Specifies TCP as the transport layer protocol for incoming SIP calls and
enables TCP listening port 5060.
• TLS—Specifies TLS as the transport layer protocol for incoming SIP calls and
enables TLS listening port 5061. If you select this option, you must select a
certificate from the Certificate list.
SIP Listening Transport By default, both the UDP and TCP listening ports are enabled, and the TLS
Layer Protocol listening port is disabled.
Configure this item in either of the following scenarios:
• If the device is the call receiver, enable the listening port of the transport layer
protocol used by the incoming calls.
• If TCP or TLS is selected as the transport layer protocol when the device
initiates a call, you must specify it as the SIP listening transport layer protocol
in this item. Otherwise, no register request can be initiated.
Resetting the setting for this item deletes the currently established connections.
Item Description
• RTP—Specifies RTP as the media flow protocol for SIP calls.
• SRTP—Specifies SRTP as the media flow protocol for SIP calls.
By default, the RTP protocol is applied.
When both the RTP and SRTP protocols are specified as the media flow protocols
Media Protocol for SIP calls:
• If the device is the call initiator, both two media flow protocols are carried in
the INVITE message for the receiver to select.
• If the device is the call receiver, the SRTP protocol is first used for media flow
negotiation. If the negotiation fails, the RTP protocol is used.
598
Figure 582 Caller identity and privacy configuration page
Item Description
• None—Neither the P-Preferred-Identity header Caller ID presentation can be
field nor the P-Asserted-Identity header field is disabled by adding the
added. P-Preferred-Identity,
• P-Assented-Identity—Adds the P-Asserted-Identity P-Asserted-Identity, or
header field. The Privacy header field indicates Remote-Party-ID header field.
whether caller identity presentation is enabled, • When the
Caller Identity and the P-Asserted-Identity header field contains P-Preferred-Identity or
Presentation the caller's number. P-Asserted-Identity header
Restriction Mode • P-Preferred-Identity—Adds the P-Preferred-Identity field is added, the Privacy
header field. The Privacy header field indicates header field is added.
whether caller identity presentation is enabled, When the Privacy header
and the P-Asserted-Identity header field contains field is set to none, caller
the caller's number. identity presentation is
allowed. When the Privacy
The default setting is None (caller identity
header field is set to id,
presentation is enabled).
caller identity presentation is
restricted.
• Remote-Party-ID header
field: privacy=off indicates
caller identity presentation
and privacy=full indicates
caller identity screening. The
calling information can be
• Enable—Adds the Remote-Party-ID header field. transparently transmitted by
Add the • Disable—Removes the Remote-Party-ID header adding the Remote-Party-ID
Remote-Party-ID field. header field.
Header Field By default, the Remote-Party-ID header field is not The Remote-Party-ID header field
added. can be used together with the
P-Preferred-Identity header field
or P-Asserted-Identity header
field. If so, the Remote-Party-ID
header field takes precedence
over the P-Preferred-Identity
header field or the
P-Asserted-Identity header field.
599
resources of the server. To solve this problem, RFC 4082 defines a session timer mechanism for SIP
sessions: the UA sends periodic re-INVITE or UPDATE requests (referred to as "session refresh requests")
to notify the proxy server about the current state of the session. The interval for sending session refresh
requests is determined through the negotiation of both sides.
The following new header fields are added to the session refresh requests:
• Session-Expires—Conveys the maximum session duration. If no refresh request is received during
this time, the session is considered ended.
• Min-SE—Conveys the minimum session duration, which is used to avoid frequent refresh requests
from occupying network bandwidth.
Item Description
• Enable—Enables SIP session refresh.
• Disable—Disables SIP session refresh.
SIP Session Refresh
You can configure Session Expiration and Min Session Refresh Interval only after
the SIP session refresh function is enabled.
Configuring compatibility
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and then click the
Session Properties tab to display the compatibility configuration page shown in Figure 584.
600
Figure 584 Compatibility configuration page
Item Description
The devices of some vendors do not strictly follow the SIP protocol. To interoperate with such devices,
configure the SIP compatibility options.
• Enable—Configures the device to use the address (IP address or DNS
domain name) in the To header field as the address in the From header field
Use the address in the To when sending a SIP request.
header field as the
• Disable—Does not use the address in the To header field as the address in
address in the From
the From header field. The From header field contains the source address,
header field
and the To header field contains the destination address.
By default, the SIP compatibility function is disabled.
601
Item Description
UAC Product Version Product version of the UAC.
Item Description
Set the interval for the local number or SIP trunk account to re-register with the
Re-registration Interval
registrar after a registration failure.
Set the registration expiration time. A local number or an SIP trunk account
Registration Expiration
expires after it has registered with the registrar for a specified period of time,
Time
which is the registration expiration interval.
Registration Percentage To ensure the validity of registration information of a local number or an SIP trunk
602
Item Description
account on the registrar, the local number or SIP trunk account must re-register
with the registrar at a specified time before the registration expiration interval is
reached. You can set the registration percentage or lead time before registration
to set the time when the local number or SIP trunk account re-registers with the
registrar.
• When the time, which is registration expiration interval multiplied by
expiration percentage, is reached, the local number or SIP trunk account
Lead Time Before re-registers with the registrar.
Registration • When the time, which is registration expiration interval minus lead time
before expiration, is reached, the local number or SIP trunk account
re-registers with the registrar.
You can configure both timers. In this case, the actual re-registration time is
decided by the timer that expires first. In other words, the local number or SIP
trunk account tries to re-register with the registrar when any one of the two timers
expires.
• Parking—The SIP trunk device sends the OPTIONS or REGISTER message to
the current server. When the current server is not available, the SIP trunk
device selects the member server with the second highest priority in the SIP
server group as the current server even if the original current server recovers.
Before the parking mode is applied, set OPTIONS or REGISTER as the
keep-alive mode on the page that can be accessed by selecting Voice
Management > Call Connection > SIP Server Group Management from the
navigation tree.
• Homing—The SIP trunk device sends the OPTIONS messages to both the
current server and the member server with the second highest priority in the
Redundancy Mode
SIP server group. When the current server is not available, the SIP trunk
device selects the member server with the second highest priority as the
current server. Once the original current server recovers or a server with a
higher priority than the current server is available in the SIP server group, the
SIP trunk device selects the original current server or the server with the
highest priority as the current server. Before the homing mode is applied, set
OPTIONS as the keep-alive mode on the page that can be accessed by
selecting Voice Management > Call Connection > SIP Server Group
Management from the navigation tree.
By default, parking mode is applied.
• Enable—Configures the Contact header fields of the REGISTER messages to
contain the dt parameter. This option is used when the device communicates
Carry VCX with a VCX device.
Authentication • Disable—Configures the Contact header fields of the REGISTER messages not
Information to contain the dt parameter.
By default, the Contact header fields of the REGISTER messages do not contain
the dt parameter.
603
Item Description
Fuzzy telephone number registration refers to the use of a wildcard (including the
dot (.) and the character T), rather than a standard E.164 number in the match
template of a POTS entity.
After enabling fuzzy telephone number registration, the voice gateway (router)
retains dots and substitutes asterisks (*) for Ts when sending REGISTER
messages.
Fuzzy Telephone
Number Registration • Enable—Enables fuzzy telephone number registration.
• Disable—Disables fuzzy telephone number registration.
By default, the function is disabled.
NOTE:
To use the fuzzy telephone number registration function, make sure that the registrar
and the location server also support the function.
604
Table 236 Configuration
Item Description
• UDP—Specifies UDP as the transport layer protocol to be used during the
subscription.
• TCP—Specifies TCP as the transport layer protocol to be used during the
Transport Layer Protocol subscription.
• TLS—Specifies TLS as the transport layer protocol to be used during the
subscription.
By default, UDP is adopted.
• SIP—Specifies SIP as the URL scheme to be used during subscription.
URL Scheme • SIPS—Specifies SIPS as the URL scheme to be used during subscription.
By default, SIP is adopted.
Server Address The voice mailbox server address: an IP address or a domain name.
NOTE:
Generally, the voice gateway sends a SUBSCRIBE to the server, and it receives a NOTIFY from the server
if the subscription is successful. It obtains the status of the voice mailbox afterwards.
605
Figure 587 Configure signaling security
Item Description
TCP Connection Sets the aging time for TCP connections. If the idle time of an established TCP
Aging Time connection reaches the specified aging time, the connection is closed.
TLS Connection Sets the aging time for TLS connections. If the idle time of an established TLS
Aging Time connection reaches the specified aging time, the connection is closed.
606
Figure 588 PSTN release cause code mapping configuration page
You can enter the SIP status code into the corresponding SIP Status Code (400-699) field. Because the
PSTN release cause code 16 corresponds to a SIP request message, instead of a SIP status code, you can
configure no SIP status code for 16. You can click Load Default Value to restore the default mappings
between PSTN release cause codes and SIP status codes.
607
Figure 589 SIP status code mapping configuration page
You can select the values in the PSTN Release Cause Code fields. You can also click Load Default Value to
restore the default mappings between PSTN release cause codes and SIP status codes.
608
Configuring basic voice calls
# Configure a local number and the call route to Router B.
• Configure a local number: specify the local number ID as 1111 and the number as 1111, and bind
the number to line line 1/0 on the local number configuration page.
• Configure the call route to Router B: specify the call route ID as 2222, the destination number as
2222, the call route type as SIP, the SIP routing as IP routing, and the destination address as
192.168.2.2 on the call route configuration page.
609
Figure 592 Configure caller identity presentation restriction mode
610
Configuring TCP to carry outgoing SIP calls
Network requirements
Two routers, Router A and Router B, work as SIP UAs. SIP calls between the two parties are carried over
TCP.
Figure 595 Network diagram
# Specify TCP as the transport layer protocol for incoming SIP calls. (Optional, because the TCP listening
port is enabled by default.)
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and then click the
Session Properties tab to display the transport layer protocol configuration page shown in Figure 597.
Figure 597 Specify listening transport layer protocol
611
b. Click Apply.
NOTE:
• The CA server runs RSA Keon in this configuration example.
• To make sure that the certificate on the device can be used, be sure that the device system time falls within the
validity time of the certificate.
612
Figure 599 Specify transport layer protocol for outgoing calls
# Specify TLS as the transport layer protocol for incoming SIP calls.
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and then click the
Session Properties tab to display the transport layer protocol configuration page shown in Figure 600.
Figure 600 Specify listening transport layer protocol
613
Configuring SIP server group management
A SIP server group is used to manage the registrar and call servers. A SIP server group can be configured
with up to five member servers. An index represents the priority of a member server in the SIP server
group. The smaller the index value, the higher the priority. The currently used SIP server is called the
current server. Each server in the SIP server group can be the current server, but there is only one current
server at a time.
Item Description
Server Group ID ID of the SIP server group.
614
Item Description
The name of a SIP server group identifies the SIP server group. The domain name
of the carrier server is usually used as the name of a SIP server group. If the name
of a SIP server group is not configured, the host name specified on the account
Server Group Name management page (which can be accessed by selecting Voice Management >
SIP Trunk Management > Account Management from the navigation tree) is used
to identify the group, if any. Otherwise, the IP address or domain name of the
current server in the SIP server group is used to identify the group.
The keep-alive function is used to detect whether the SIP servers in a SIP server
group are reachable. The SIP trunk device selects the current server according to
the detect result and the redundancy mode. If the keep-alive function is disabled,
the current server is always the one with the highest priority in the SIP server
group.
• Disabled—Disable the keep-alive function.
Keep-Alive Mode
• Options—The SIP trunk device periodically sends OPTIONS messages to
detect the servers. If the SIP trunk device receives response message 408 or
5XX (excluding 502, 504, 505, and 513) from a SIP server after sending an
OPTIONS message, it considers the SIP server unreachable.
• Register—The REGISTER message can be used to detect the SIP servers. If the
SIP trunk device receives response message 408 or 5XX (excluding 502,
504, 505, and 513) from a SIP server after sending a REGISTER message, it
considers the SIP server unreachable.
Interval for Sending Set the interval for sending OPTIONS messages to the SIP servers when the
OPTIONS Messages keep-alive mode is set to Options.
Set server ID. A SIP server group can be configured with up to five member
Server ID servers. An index represents the priority of a member server in the SIP server
group. The smaller the index value, the higher the priority.
• UDP—Specify UDP as the transport layer protocol for the connection between
the SIP trunk device and the SIP server.
• TCP—Specify TCP as the transport layer protocol for the connection between
Transport Layer Protocol the SIP trunk device and the SIP server.
• TLS—Specify TLS as the transport layer protocol for the connection between
the SIP trunk device and the SIP server.
By default, the UDP protocol is adopted.
615
Item Description
• SIP—Specify the SIP scheme as the URL scheme.
URL Scheme • SIPS—Specify the SIPS scheme as the URL scheme.
By default, the SIP URL scheme is adopted.
NOTE:
For more configuration examples of SIP server groups, see "Configuring SIP trunk management."
616
Configuring SIP trunk
Background
As shown in Figure 602, on a typical telephone network, internal calls of the enterprise are made through
the internal PBX, and external calls are placed over a PSTN trunk.
Figure 602 Typical telephone network
With the development of IP technology, many enterprises have deployed SIP-based IP-PBX networks, as
shown in Figure 603. Internal calls of the enterprise are made by using the SIP protocol, and external
calls are still placed over a PSTN trunk. The problem is that the enterprises have to maintain both the SIP
network and PSTN trunk, which increases the difficulty of network management.
Figure 603 SIP+PSTN network
SIP
PSTN trunk
PSTN
Router IP-PBX Router
As more enterprise IP-PBX networks run SIP and more ITSPs use SIP to provide basic voice communication
structures, enterprises urgently need a technology that uses SIP to connect the enterprise IP-PBX network to
the ITSP to realize an all IP-based network. This technology is called "SIP trunk." A typical SIP trunk
network is shown in Figure 604.
The SIP trunk function can be embedded into the voice gateway or the firewall deployed at the edge of
an enterprise private network. The device providing the SIP trunk function is called the "SIP trunk device"
or the "SIP trunk gateway."
617
Figure 604 All IP-based network
SIP server
Features
SIP trunk has the following features:
1. Only one secure and QoS-guaranteed SIP trunk link is required between a SIP trunk device and the
ITSP. The SIP trunk link can carry multiple concurrent calls, and the carrier only authenticates the link
instead of each SIP call carried on this link.
2. The internal calls of the enterprise are placed by the enterprise IP-PBX. The outbound calls of the
enterprise are forwarded by the SIP trunk device to the ITSP and are finally routed to the PSTN by
the device in the ITSP. Enterprises do not need to maintain the PSTN trunk, thereby saving the costs
of hardware and maintenance.
3. By setting destination addresses, the enterprise can select to connect to multiple ITSPs, to make full
use of the ITSPs all over the world and to save call costs.
4. With the SIP trunk device deployed, the entire network can use the SIP protocol to better support IP
communication services, such as voice, conference, and instant messaging.
5. A SIP trunk device differs from a SIP proxy server. The SIP trunk device initiates a new call request to
the ITSP on behalf of the user after receiving a call request from the user, and both the user and the
ITSP communicate only with the SIP trunk device. During the forwarding process, the SIP trunk device
forwards both signaling messages and RTP media messages.
Typical applications
The SIP trunk device is deployed between the enterprise IP-PBX and the ITSP. All internal calls are placed
by the enterprise IP-PBX. All outbound calls are forwarded by the SIP trunk device to the ITSP through the
SIP trunk link. Figure 605 shows a typical SIP trunk network.
618
Figure 605 SIP trunk network diagram
ITSP
Enterprise
IP SIP server
SIP trunk
Router IP-PBX SIP trunk device
SIP server
Task Remarks
Enabling the SIP trunk function Required
Configuring a SIP
server group Enabling the real-time switching, Required if there are multiple servers
keep-alive, and redundancy functions in a SIP server group
619
Task Remarks
Configuring advanced settings of the call
Optional
route of a SIP trunk account
Item Description
Enable the SIP trunk function before you can use other SIP trunk functions. HP
recommends that you do not use a device enabled with the SIP trunk function as
a SIP UA.
SIP Trunk Function • Enable
• Disable
By default, the SIP trunk function is disabled.
620
Configuring a SIP trunk account
Configuring a SIP trunk account
A SIP trunk account contains information allocated to users by the carrier, including authentication
username, authentication password, host name, host user name, and the associated SIP server group.
Select Voice Management > SIP Trunk Management > Account Management from the navigation tree, and
then click Add. The following page appears.
Figure 607 Configure a SIP trunk account
Item Description
Account ID Enter a SIP trunk account ID.
Select the SIP server group used by the SIP trunk account for registration. SIP server
SIP Server Group groups can be configured in Voice Management > Call Connection > SIP Server Group
for Registration Management.
By default, a SIP trunk account has no SIP server group specified for registration.
Set the registration aging time. If you do not configure this item, the system uses the
Registration
registration aging time configured in Voice Management > Call Connection > SIP
Aging Time
Connection.
Host Username Enter the host username allocated by the ITSP to the SIP trunk account.
Host Name Enter the host name allocated by the ITSP to the SIP trunk account.
621
Item Description
• Enable
• Disable
By default, the SIP trunk account is enabled.
Account Status
Disabling a SIP trunk account that is already involved in a connection does not delete
the connection. In other words, the disable configuration takes effect on the next call that
uses this account.
• Enable
• Disable
Registration
By default, the registration function of the SIP trunk account is disabled.
Function
To perform registration, provide the host username or associate the account with a SIP
server group.
Authentication
Enter the authentication username for the SIP trunk account.
Username
Authentication
Enter the authentication password for the SIP trunk account.
Password
622
Figure 608 Configure a call route
Item Description
Call Route ID Enter a call route ID.
Bound Account Select a SIP trunk account to be bound to the voice entity.
Use a SIP proxy server to complete calling. If you select this option,
Proxy
configure the proxy server beforehand in Voice Management > Call
Server
Connection > SIP Connection.
Destinati
on
Address Enter the destination address and port number of the called
party.
Port
Number
623
Item Description
Bind to Select a server group. You can create a SIP server group in
Server
server Voice Management > Call Connection > SIP Server
Group
group Management.
Enable
Status
Disable
Item Description
You can control call route selection by configuring the prefix of source host name, prefix of destination host
name, or the source IP address as the call match rules. If you select several call match rules, only the calls that
match all rules are permitted.
624
Item Description
• Specify the prefix of a source host name as a call match rule. The specified
source host name prefix is used to match against the source host names of calls.
If the INVITE message received by the SIP trunk device carries the
Remote-Party-ID header, the source host name is abstracted from this header
field. If the INVITE message received by the SIP trunk device carries the Privacy
header, the source host name is abstracted from the P-Asserted-Identity or
Match a Source Host P-Preferred-Identity header field. If the INVITE message received by the SIP trunk
Name Prefix device does not carry any of the above mentioned three header fields, the host
name in the From header field of the INVITE message is used as the source host
name.
• The prefix of a source host name consists of 1 to 31 characters, which are not
case-sensitive and can include letters, digits, underlines (_), hyphens (-), asterisk
(*), and dots (.). An asterisk represents a character string of any length. For
example, t*m can match the source host names tom, tim, and so on.
• Specify the prefix of a destination host name as a call match rule. The specified
destination host name prefix is used to match against the destination host
names of calls. The host name in the To header field of an INVITE message
received by the SIP trunk device is used as the destination host name.
Match a Destination
• The prefix of a destination host name consists of 1 to 31 characters, which are
Host Name Prefix
not case-sensitive and can include letters, digits, underlines (_), hyphens (-),
asterisk (*), and dots (.). An asterisk represents a character string of any length,
for example, b*y can match the destination host names boy, boundary, and so
on.
Server
Specify the index of a SIP server group as a call match rule.
Group
Item Description
Enable or disable codec transparent transmission.
If the SIP trunk device does not support the codecs supported by the
calling and called parties, you can enable codec transparent transmission
so that the SIP trunk device transparently transmits codec capability sets
between the two parties to complete codec negotiation.
By default, codec transparent transmission is disabled, and the SIP trunk
Codec Transparent
device participates in media negotiation between two parties.
NOTE:
This option takes effect only for private-to-public call routes. To enable this
function for public-to-private call routes, perform the configuration in Voice
Management > Call Route. For relation configuration information, see
"Configuring the local number and call route."
626
SIP trunk configuration examples
Configuring a SIP server group with only one member server
Network requirements
The enterprise private network has a SIP trunk device. Router A is a private network device, and Router B
is a public network device. Configure a SIP server group with only one member server so that all calls
between the enterprise private network and public network are made through the SIP trunk device.
Figure 611 Network diagram
Configuring Router A
# Configure a local call number.
Select Voice Management > Local Number from the navigation tree, and then click Add.
627
Figure 612 Configure a local number
628
d. Enter 1.1.1.2 for Destination Address.
e. Click Apply.
# Create SIP server group 1. Add a SIP server into the server group: the ID and the IPv4 address of the
server are 1 and 10.1.1.2, respectively.
Select Voice Management > Call Connection > SIP Server Group Management from the navigation tree,
and then click Add.
629
Figure 615 Configure server group
# Create SIP trunk account 1 with the host user name 2000, and associate the account with SIP server
group 1.
Select Voice Management > SIP Trunk Management > Account Management from the navigation tree, and
then click Add.
630
Figure 616 Configure a SIP trunk account
# Configure the call route for the outbound calls from private network user 2000 to public network user
1000 by binding SIP server group 1 to the VoIP voice entity.
Select Voice Management > SIP Trunk Management > Call Route from the navigation tree, and then click
Add.
631
Figure 617 Configure a call route for the SIP trunk account
632
a. Enter 10000 for Call Route ID.
b. Enter 2000 for Destination Number.
c. Select IP Routing for SIP Route Type.
d. Enter 1.1.1.1 for Destination Address.
e. Click Apply.
Configuring Router B
# Configure a local call number.
Select Voice Management > Local Number from the navigation tree, and then click Add.
Figure 619 Configure a local number
633
Figure 620 Configure a call route
# Configure the IPv4 address of the registrar as 10.1.1.2, and enable the registrar.
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and then click the
Connection Properties tab.
Figure 621 Configure connection properties
634
Configuring a SIP server group with multiple member servers
Network requirements
The enterprise private network has a SIP trunk device. Router A is a private network device, and Router B
is a public network device. Configure a SIP server group with multiple member servers so that all calls
between the enterprise private network and public network are made through the SIP trunk device. The
carrier is required to provide multiple servers to ensure call reliability.
Figure 622 Network diagram
ITSP-A
SIP server
10.1.1.3/24
1.1.1.1/24 1.1.1.2/24
2.1.1.1/24 2.1.1.2/24
IP
SIP trunk Router B
1000
2000 Router A SIP trunk device
SIP server
10.1.1.2/24
Configuration procedure
# Enable the SIP trunk function. (Details not shown)
# Create SIP server group 1. Add two SIP servers into the server group: the IP addresses are 10.1.1.2
and 10.1.1.3, and the server with the address 10.1.1.2 has a higher priority. Enable the real-time
switching function of SIP server group 1. Set the keep-alive mode for SIP server group 1 to Options.
Select Voice Management > Call Connection > SIP Server Group Management from the navigation tree,
and then click Add.
635
Figure 623 Configure server group
636
Figure 624 advanced settings
Other configurations on the SIP trunk device and on other devices are the same as those described in
"Configuring a SIP server group with only one member server."
637
Figure 625 Network diagram
Configuration procedure
# Configurations on the SIP trunk device and on other devices are the same as those described in
"Configuring Router A" and "Configuring Router B."
# Configure Router A2: Configure a local number 2001 and a call route to Router B. For the
configuration procedure, see "Configuring Router A."
# Configure Router B: Configure a call route to Router A2. For the configuration procedure, see
"Configuring Router B."
# Configure the SIP trunk device: Select Voice Management > Call Route from the navigation tree, and
then click Add to configure the call route for calls from the number 1000 to 2001. Enter 3.3.3.1 (the IP
address of the interface on Router A2) as the Destination Number.
# Configure call match rules on the SIP trunk device: specify that calls with source IP address 1.1.1.1 are
permitted.
Select Voice Management > SIP Trunk Management > Call Route from the navigation tree, and then click
the icon of the call route to be configured to display the advanced settings configuration page.
638
Figure 626 Advanced settings
639
Configuring data link management
Introduction to E1 and T1
PDH includes two major communications systems: ITU-T E1 system and ANSI T1 system. The E1 system is
dominant in Europe and some non-European countries. The T1 system is dominant in the USA, Canada,
and Japan.
E1 and T1 use the same sampling frequency (8 kHz), PCM frame length (125 μs), bits per code (8 bits)
and timeslot bit rate (64 kbps). They differ in these aspects:
• E1 adopts A law coding/decoding of 13-segment but T1 adopts μ law coding/decoding of
15-segment.
• Each PCM primary frame of E1 contains 32 timeslots but that of T1 contains 24 timeslots. Each PCM
primary frame of E1 contains 256 bits but that of T1 contains 193 bits. Therefore, E1 provides
2.048 Mbps bandwidth, and T1 provides 1.544 Mbps bandwidth.
E1/T1 voice transmission allows a router to provide more channels of voice communication, greatly
improving router utilization and broadening service range.
E1 and T1 interfaces
E1 interface
An E1 interface is logically divided into TSs with TS16 being a signaling channel.
On E1 interfaces, you may create PRI groups or TS sets.
640
You may use an E1 interface as an ISDN PRI or CE1 interface as follows:
1. As an ISDN PRI interface, the E1 interface adopts DSS1 or QSIG signaling. Because TS0 is used to
transfer synchronization information and TS16 is used as a D channel to transfer signaling, you may
arbitrarily bind any timeslots other than TS0 and TS16 as a logical interface, which is equivalent to
an ISDN PRI interface.
2. As a CE1 interface with a signaling channel, the E1 interface can adopt R2 signaling, digital E&M
signaling, or digital LGS signaling.
• When R2 signaling is adopted, every 32 timeslots form a primary frame (PCM30, for example),
where TS0 is used for frame synchronization, TS16 for digital line signaling, and the other 30
timeslots for voice transmission. Every 16 primary frames form one multiframe. In each multiframe,
TS0 in even primary frames conveys FAS, and TS0 in odd primary frames conveys NFAS about link
status information. NFAS provides control signaling for primary rate multiplexing. In the first primary
frame, frame 0, the high-order four bits in TS16 convey MFAS, and the lower-order four bits convey
NMFAS. TS16 in each of other 15 primary frames conveys line status information for two timeslots.
For example, TS16 in frame 1 conveys the digital line signaling status of TS1 and TS17, while that
in frame 2 conveys the digital line signaling status of TS2 and TS18, and so on.
• When digital E&M signaling is adopted, the E1 interface functions as a digital E&M interface. On
the interface, timeslot division and functions are the same as those with R2 signaling.
• When digital LGS signaling is adopted, the E1 interface functions as a digital FXO or FXS interface.
On the interface, timeslot division and functions are the same as those with R2 signaling.
NOTE:
• After you create a TS set and configure signaling on an E1 voice interface card, the system can automatically create
the voice subscriber line for the TS set.
• After TSs of an E1 interface are bound to form a PRI group, the system automatically generates the corresponding
voice subscriber line.
• The web interface supports only the PRI trunk signaling.
T1 interface
A T1 interface can be physically divided into 24 timeslots numbered TS1 through TS24.
You may use a T1 interface as an ISDN PRI interface. The interface adopts DSS1 or QSIG signaling. On
the interface, except for TS24 used as D channel for signaling, you may arbitrarily bundle other timeslots
into an interface logically equivalent to an ISDN PRI interface.
In addition to DSS1 and QSIG signaling, T1 interfaces support R2 signaling, digital E&M signaling, and
LGS signaling. Configured with digital E&M signaling, a T1 interface is used as a digital E&M interface;
with digital LGS signaling, a digital FXO or FXS interface.
NOTE:
• Like E1 voice interface cards, T1 voice interface cards also have the features of voice subscriber lines.
• The web interface supports only the PRI trunk signaling.
Features of E1 and T1
E1 and T1 are characterized by the following:
• Signaling modes
641
• Fax function
• Protocols and standards
Signaling modes
E1/T1 interfaces support these types of signaling:
• DSS1/QSIG user signaling, adopted on the D channel between ISDN user and network interface
(UNI). It comprises a data link layer protocol and a Layer 3 protocol used for basic call control.
• ITU-T R2 signaling, which falls into the categories of digital line signaling and interregister signaling.
Digital line signaling is transmitted in TS16 (ABCD bits) of E1 trunk. It conveys status information
about E1 trunks to describe whether the trunks are occupied, released, or blocked. Interregister
signaling conveys information about address, language, and discriminating digits for internal calls,
echo suppressor, caller properties, and callee properties in multi-frequency compelled approach
(forward and backward) in each timeslot.
• Digital E&M signaling, similar to R2 signaling. It transmits E (recEive) and M (transMit) call control
signals similar to analog E&M signaling in TS16, alignment signals in TS0, and voice signals in
other timeslots. In digital E&M signaling, when an E1 trunk detects and sends connection signaling,
it looks at the signal in TS16. Digital E&M signaling provides three start modes (immediate, wink,
and delay) to adapt to different devices for more reliable connection.
• Digital LGS. Digital loop start signaling is used between telephones and switches to identify the
off-hook/on-hook state, while ground-start signaling is used between switches. They differ in that the
two parties in conversation must check grounding state before closing the line in the ground-start
approach.
Fax function
The fax function is available on E1/T1 voice interfaces to set up fax channels and transmit/receive fax
data.
Line coding
HDB3, AMI B8ZS, AMI
format
642
Configuring digital link management
You can click the link of a digital link name to display the page that displays the link state. For details, see
"Displaying ISDN link state."
Item Description
Physical Parameters Configuration
Bound Timeslot
Specify the timeslots to be bundled.
Number
• CRC4—Perform CRC.
Frame Check Mode
• NO_CRC4—Do not perform CRC.
• HDB—The line coding format is HDB3.
Line Coding
• AM—The line coding format is AMI.
643
Item Description
• Internal—Set the internal crystal oscillator TDM clock as the TDM clock source
on the E1 interface. After that, the E1 interface obtains clock from the crystal
oscillator on the main board. If it fails to do that, the interface obtains clock
from the crystal oscillator on its E1 card. Because SIC cards are not available
with crystal oscillator clocks, E1 interfaces on SIC cards can only obtain clock
from the main board. The internal clock source is also referred to as "master
clock mode" in some features.
• Line—Set the line TDM clock as the TDM clock source on the E1 interface. After
that, the E1 interface obtains clock from the remote device through the line. The
line clock source is also referred to as "slave clock mode" in some features.
• Line primary—Set the E1 interface to preferably use the line TDM clock as the
TDM clock source. After that, the E1 interface always attempts to use the line
TDM clock prior to any other clock sources.
By default, the TDM clock source for an E1 interface is the internal clock.
When digital voice E1 interfaces perform TDM timeslot interchange, it is important
TDM Clock Source for them to achieve clock synchronization to prevent frame slips and bit errors.
Depending on your configurations on E1 interfaces at the CLI, the system adopts
different clocking approaches. When there is a subcard VCPM on the main board,
the clock distribution principle is as follows:
• If the line keyword is specified for all interfaces, the clock on the interface with
the lowest number is adopted. In case the interface goes down, the clock on the
interface with the second lowest number is adopted.
• If line primary is specified for interface X and line or internal is specified for
other interfaces, the clock on interface X is adopted.
• If line is specified for interface X and internal is specified for other interfaces,
the clock on interface X is adopted.
• Normally, you cannot set the clock source for all interfaces in a system as
internal to prevent frame slips and bit errors. You can do this, however, if the
remote E1 interfaces adopt the line clock source.
When there is no VCPM on the main board, the configuration of each MIM/FIC is
independent, but only one interface can be set as line primary.
• Enable—Enable the E1 interface.
Status
• Disable—Disable the E1 interface.
If you select the PRI Trunk Signaling option, the page shown in Figure 629 appears.
644
Figure 629 E1 parameters configuration page (II)
NOTE:
You are not allowed to configure the following parameters on an ISDN interface if there is still a call on it:
ISDN Overlap-Sending, Switch to ACTIVE State Without Receiving a Connect-Ack Message, Carry High
Layer Compatibility Information, Carry Low Layer Compatibility Information, or ISDN Call Reference
Length. These parameters can take effect only if they are configured when there is no call on the interface.
Alternatively, you can manually disable the ISDN interface, configure the parameters, and then enable the
interface again. The operations, however, lead to the disconnection of calls existing on the interface.
Item Description
ISDN Parameters Configuration
645
Item Description
ISDN working mode to be set: network side mode or user side mode.
ISDN Working Mode
By default, an ISDN interface operates in user side mode.
ISDN Overlap-Sending • Enable—Set the ISDN interface to send the called number in overlap
mode. In this mode, the digits of each called number are sent
separately, and the maximum number of the digits sent each time can be
set.
Max Number of Digits that • Disable—Set the ISDN interface to send the called number in full-sending
Can Be Sent Each Time mode. In this mode, all digits of each called number are collected and
sent at a time.
By default, the ISDN interface sends the called number in full-sending mode.
• Enable—Enable the ISDN interface to convert received Progress
Progress-to-Alerting messages into Alerting messages.
Conversion • Disable—Disable the progress-to-alerting conversion function.
This option takes effect only on messages received on an ISDN interface.
646
Item Description
• Enable for outgoing direction—Configure the ISDN protocol to switch to
the ACTIVE state after receiving a Connect message without having to
send a Connect-Ack message.
• Enable for incoming direction—Configure the ISDN protocol to switch to
the ACTIVE state to start Connect and voice service communications
after sending a Connect message without having to wait for a
Connect-Ack message.
• Enable for bidirectional directions—Configure the ISDN protocol to
switch to the ACTIVE state after receiving or sending a Connect message
without having to wait for or send a Connect-Ack message.
• Disable (default)—Configure the ISDN protocol not to ignore the
Connect-Ack messages. The ISDN protocol must wait for the
Connect-Ack message in response to the Connect message before it can
switch to the ACTIVE state to start data and voice service
communications.
Switch to ACTIVE State
Without Receiving or Sending By default, in the event that the device is communicating with an ISDN
a Connect-Ack Message switch:
• The ISDN protocol must wait for the Connect-Ack message in response
to the Connect message before it can switch to the ACTIVE state to start
data and voice service communications.
• After the ISDN protocol receives a Connect message, it must send a
Connect-Ack message in response.
NOTE:
• In the event that the device is communicating with an ISDN switch, its
settings must be the same as those on the switch.
• You are not allowed to configure this list on an ISDN interface if there is
still a call on it. Configuration of this list can take effect only if it is
configured when there is no call on the interface. Alternatively, you can
manually disable the interface, configure this list, and then enable the
interface. The operations, however, lead to the disconnection of the calls
existing on the interface.
• Enable—Configure ISDN to carry the HLC information element in Setup
messages when placing voice calls.
Carry High Layer • Disable—Disable ISDN from carrying the HLC information element in the
Compatibility Information Setup messages when placing voice calls.
By default, the HLC information element is carried in Setup messages when
ISDN places voice calls.
• Enable—Configure ISDN to carry the LLC information element in Setup
messages when placing voice calls.
Carry Low Layer Compatibility • Disable—Disable ISDN from carrying the LLC information element in the
Information Setup messages when placing voice calls.
By default, the LLC information element is carried in Setup messages when
ISDN places voice calls.
647
Item Description
• Enable for outgoing direction—Configure the ISDN protocol to send
Setup messages without the Sending-Complete Information Element
when placing a call.
• Enable for incoming direction—Configure the ISDN protocol to ignore
the Sending-Complete Information Element in Setup messages when
receiving a call.
• Enable for bidirectional directions—Configure the ISDN protocol to
Ignore the Sending-Complete ignore the Sending-Complete Information Element in Setup messages
Information Element in Setup when receiving a call and to send Setup messages without the
Messages Sending-Complete Information Element when placing a call.
• Disable (default)—Configure ISDN not to ignore the Sending-Complete
Information Element in Setup messages. During data exchange between
the device and an ISDN switch, for an incoming call, if a Setup message
does not contain the Sending-Complete Information Element, the number
is not received completely. For an outgoing call, a Setup message
containing the Sending-Complete Information Element indicates that the
number is sent completely.
ISDN Sliding Window Size Set the sliding window size on an ISDN BRI interface.
ISDN T302 Timer Duration Configure the duration of the ISDN protocol Layer 3 timer T302.
Set the length of the call reference used when a call is placed on an ISDN
interface.
The call reference is equal to the sequence number that the protocol assigns
to each call. It is one or two bytes in length and can be used cyclically.
ISDN Call Reference Length When the device receives a call from a remote device, it can automatically
identify the length of the call reference. However, some devices on the
network do not have this capability. In the event that the device is required
to place calls to such a device connected to it, you must configure the device
to use the same call reference length configured on the connected device.
648
Figure 630 T1 parameters configuration page (I)
Item Description
Physical Parameters Configuration
Bound Timeslot
Specify the timeslots to be bundled.
Number
• ESF—Perform ESF.
Frame Check Mode
• SF—Perform SF.
• B8ZS—The line coding format is B8ZS.
Line Coding
• AMI—The line coding format is AMI.
649
Item Description
• Internal—Set the internal crystal oscillator TDM clock as the TDM clock source
on the T1 interface. After that, the T1 interface obtains clock from the crystal
oscillator on the main board. If it fails to do that, the interface obtains clock
from the crystal oscillator on its T1 card. Because SIC cards are not available
with crystal oscillator clocks, T1 interfaces on SIC cards can only obtain clock
from the main board. The internal clock source is also referred to as "master
clock mode" in some features.
• Line—Set the line TDM clock as the TDM clock source on the T1 interface. After
that, the T1 interface obtains clock from the remote device through the line. The
line clock source is also referred to as "slave clock mode" in some features.
• Line primary—Set the T1 interface to preferably use the line TDM clock as the
TDM clock source. After that, the T1 interface always attempts to use the line
TDM clock prior to any other clock sources.
By default, the TDM clock source for a T1 interface is the internal clock.
When digital voice T1 interfaces perform TDM timeslot interchange, it is important
TDM Clock Source for them to achieve clock synchronization to prevent frame slips and bit errors.
Depending on your configurations on T1 interfaces at the CLI, the system adopts
different clocking approaches. When there is a subcard VCPM on the main board,
the clock distribution principle is as follows:
• If the line keyword is specified for all interfaces, the clock on the interface with
the lowest number is adopted. In case the interface goes down, the clock on the
interface with the next second number is adopted.
• If line primary is specified for interface X and line or internal is specified for
other interfaces, the clock on interface X is adopted.
• If line is specified for interface X and internal is specified for other interfaces,
the clock on interface X is adopted.
• Normally, you cannot set the clock source for all interfaces in a system as
internal to prevent frame slips and bit errors. You can do this, however, if the
remote T1 interfaces adopt the line clock source.
When there is no VCPM on the main board, the configuration of each MIM/FIC is
independent, but only one interface can be set as line primary.
• Enable—Enable the T1 interface.
Status
• Disable—Disable the T1 interface.
If you select the PRI Trunk Signaling option, the page shown in Figure 631 appears.
650
Figure 631 T1 parameters configuration page (II)
ISDN protocol types supported by VT1 are DSS1, ATT, ANSI, ETSI, NTT, QSIG, NI2, and 5ESS. Table
247 describes the ISDN parameters configuration items.
651
Figure 632 BSV parameters configuration page
Item Description
Set the ISDN protocol to be run on an ISDN interface, including DSS1,
ISDN Protocol Type ANSI, NI, NTT, and ETSI.
By default, an ISDN interface runs DSS1.
ISDN working mode to be set: network side mode or user side mode.
ISDN Working Mode
By default, an ISDN interface operates in user side mode.
652
Item Description
Configure local ISDN B channel management:
• Disable—Local ISDN B channel management is disabled and is in the
charge of ISDN switch.
• Common management—The device operates in local B channel
management mode to select available B channels for calls. However, the
ISDN switch still has a higher priority in B channel selection. If a locally
selected B channel is different from that selected by the ISDN switch, the
one indicated by the ISDN switch is used for communication.
• Forced management—The device operates in forced local B channel
management mode. In this mode, the device indicates in the Channel ID
information element of a call Setup message that the local B channel is
ISDN Timeslot Management
mandatory and unchangeable. If the ISDN switch indicates a B channel
different from the local one, the call fails.
By default, the local ISDN B channel management is not enabled but is in
the charge of ISDN switch.
It is very important to put appropriate control on the B channels used for
calls in process, especially in PRI mode. Proper channel management can
improve call efficiency and reduce call loss. Normally, the centralized B
channel management provided by exchanges can work well. For this
reason, HP recommends that you adopt the management function provided
by exchanges in most cases, despite the fact that the ISDN module can
provide the channel management function as well.
ISDN Overlap-Sending • Enable—Set the ISDN interface to send the called number in overlap
mode. In this mode, the digits of each called number are sent
separately, and the maximum number of the digits sent each time can be
set.
Max Number of Digits that • Disable—Set the ISDN interface to send the called number in full-sending
Can Be sent Each Time mode. In this mode, all digits of each called number are collected and
sent at a time.
By default, the ISDN interface sends the called number in full-sending mode.
• Enable—Enable the ISDN interface to convert received Progress
Progress-to-Alerting messages into Alerting messages.
Conversion • Disable—Disable the progress-to-alerting conversion function.
This option takes effect only on messages received on an ISDN interface.
653
Item Description
• Enable for outgoing direction—Configure the ISDN protocol to switch to
the ACTIVE state after receiving a Connect message without having to
send a Connect-Ack message.
• Enable for incoming direction—Configure the ISDN protocol to switch to
the ACTIVE state to start Connect and voice service communications
after sending a Connect message without having to wait for a
Connect-Ack message.
• Enable for bidirectional directions—Configure the ISDN protocol to
switch to the ACTIVE state after receiving or sending a Connect message
without having to wait for or send a Connect-Ack message.
• Disable (default)—Configure the ISDN protocol not to ignore the
Connect-Ack messages. The ISDN protocol must wait for the
Connect-Ack message in response to the Connect message before it can
switch to the ACTIVE state to start data and voice service
communications.
Switch to ACTIVE State
Without Receiving a By default, in the event that the device is communicating with an ISDN
Connect-Ack Message switch:
• The ISDN protocol must wait for the Connect-Ack message in response
to the Connect message before it can switch to the ACTIVE state to start
data and voice service communications.
• After the ISDN protocol receives a Connect message, it must send a
Connect-Ack message in response.
NOTE:
• In the event that the device is communicating with an ISDN switch, its
settings must be the same as those on the switch.
• You are not allowed to configure this list on an ISDN interface if there is
still a call on it. Configuration of this list can take effect only if it is
configured when there is no call on the interface. Alternatively, you can
manually disable the interface, configure this list, and then enable the
interface. The operations, however, lead to the disconnection of the call
existing on the interface.
• Enable—Configure ISDN to carry the HLC information element in Setup
messages when placing voice calls.
Carry High Layer • Disable—Disable ISDN from carrying the HLC information element in the
Compatibility Information Setup messages when placing voice calls.
By default, the HLC information element is carried in Setup messages when
ISDN places voice calls.
• Enable—Configure ISDN to carry the LLC information element in Setup
messages when placing voice calls.
Carry Low Layer Compatibility • Disable—Disable ISDN from carrying the LLC information element in the
Information Setup messages when placing voice calls.
By default, LLC information element is carried in Setup messages when ISND
places voice calls.
654
Item Description
• Enable for outgoing direction—Configure the ISDN protocol to send
Setup messages without the Sending-Complete Information Element
when placing a call.
• Enable for incoming direction—Configure the ISDN protocol to ignore
the Sending-Complete Information Element in Setup messages when
receiving a call.
• Enable for bidirectional directions—Configure the ISDN protocol to
ignore the Sending-Complete Information Element in Setup messages
when receiving a call and to send Setup messages without the
Ignore the Sending-Complete
Sending-Complete Information Element when placing a call.
Information Element in Setup
Messages • Disable (default)—Configure the ISDN not to ignore the
Sending-Complete Information Element in Setup messages. When the
data exchange is performed between the device and an ISDN switch,
for an incoming call, the device checks the received Setup messages for
the Sending-Complete Information Element to determine whether or not
the number is received completely. If a Setup message does contain the
Sending-Complete Information Element, the number is not received
completely. For outgoing calls, a Setup message containing the
Sending-Complete Information Element indicates that the number is sent
completely.
Configure the Q.921 permanent link function:
• Enable—The BRI interface sets up a data link connection automatically
and maintains the connection even when no calls are received from the
network layer. If the two-tei mode is also enabled on the interface, two
Q.921 Permanent Link such connections are present.
• Disable—Disable the Q.921 permanent link function on the BRI
interface.
This parameter is available only when the User Side Mode option in the
ISDN Working Mode area is selected.
• Enable—Each call on the BRI interface uses a different EI.
ISDN two-tei • Disable—All calls on all B channels on the BRI interface use one TEI
value.
• Point-to-Multipoint—A BRI interface operating on the network side can
have multiple end devices attached to it.
ISDN Link Mode
• Point-to-Point—Configure the BRI interface operates in point-to-point
mode.
• Enable—Specify an ISDN BRI interface to be in the permanent active
state at the physical layer.
BSV Permanent Active State at • Disable—The BRI interfaces operating on the network side are not in the
the Physical Layer permanent active state at the physical layer.
This parameter is available only when the Network Side Mode option in the
ISDN Working Mode area is selected.
• Enable—Enable remote powering on an ISDN BRI interface.
• Disable—Disable remote powering on an ISDN BRI interface.
BSV Remote Powering
This parameter is available only when the Network Side Mode option in the
ISDN Working Mode area is selected.
ISDN Sliding Window Size Set the sliding window size on an ISDN BRI interface.
655
Item Description
ISDN T302 Timer Duration Configure the duration of the ISDN protocol Layer 3 timer T302.
Set length of the call reference used when a call is placed on an ISDN
interface.
The call reference is equal to the sequence number that the protocol assigns
to each call. It is one or two bytes in length and can be used cyclically.
ISDN Call Reference Length When the device receives a call from a remote device, it can automatically
identify the length of the call reference. However, some devices on the
network do not have this capability. In the event that the device is required
to place calls to such a device connected to it, you must configure the device
to use the same call reference length configured on the connected device.
• Enable—Enable the BSV interface.
Status
• Disable—Disable the BSV interface.
656
E1 and T1 voice configuration example
Configuring E1 voice DSS1 signaling
Network requirements
As shown in Figure 634, Telephones in City A and City B communicate with each other through Router A
and Router B over an IP network.
• Router A is connected to a PBX through an E1 voice subscriber line and to the telephone at
0101003 through an FXS voice subscriber line.
• Router B is connected only to a PBX through an E1 voice subscriber line.
The two routers communicate with their respective PBX by exchanging DSS1 user signaling through an
ISDN interface. The one-stage dialing mode is configured on the two routers.
Figure 634 Network diagram
Router A Router B
Eth2/1 Eth2/1
FXS: line 3/0 1.1.1.1/24 2.2.2.2/24
WAN
010-1003 Line 1/1:15 Line 1/1:15
E1 E1
010-1001 0755-2001
PBX PBX
010-1002 0755-2002
Configure Router A
# Configure an ISDN PRI group.
Select Voice Management > Digital Link Management from the navigation tree, and then click the icon
of E1 1/1 to display the E1 parameters configuration page.
Figure 635 E1 parameters configuration page
657
a. Select the PRI Trunk Signaling option. For other options, use the default settings.
b. Click Apply.
Configure Router B
# Configure an ISDN PRI group.
Select Voice Management > Digital Link Management from the navigation tree, and then click the icon
of E1 1/1 to display the E1 parameters configuration page.
Figure 636 E1 parameters configuration page
a. Select the PRI Trunk Signaling option. For other options, use the default settings.
b. Click Apply.
659
Configuring line management
660
• Delay start—In this mode, the caller first picks up the phone to seize the trunk line, and the called
side (such as the peer PBX) also enters the off-hook state in response to the off-hook action of the
caller. The called side (PBX) is in the off-hook state until it is ready for receiving the address
information. After it is ready, it enters the on-hook state, and this interval is the so-called "dial
delay." The calling side sends the address information, and the called side (PBX) connects the call to
the callee. The two parties can then begin the communication.
Figure 638 Delay start mode
• Wink start—In this mode, the caller first picks up the phone to seize the trunk line, and the called
side (such as the peer PBX) is in the on-hook state until receiving a connection signal from the calling
side. Then, the called side sends a wink signal to make an acknowledgement and enter the ready
state. Upon receiving the wink signal, the calling side begins to send the address information, and
the called side connects the call to the callee. The two parties can then begin the communication.
Figure 639 Wink start mode
661
One-to-one binding between FXS and FXO voice subscriber
lines
The one-to-one binding between FXS voice subscriber lines and FXO voice subscriber lines enhances the
reliability of voice solutions. For industry-specific users, highly reliable communication over FXS voice
subscriber lines is required. Dedicated FXO voice subscriber lines can be used for communication over
PSTN when the IP network is unavailable. The one-to-one binding between FXS voice subscriber lines and
FXO voice subscriber lines can meet this requirement.
The one-to-one binding between FXS voice subscriber lines and FXO voice subscriber lines provides the
following functions:
• Dedicated FXO voice subscriber lines—The dedicated FXO voice subscriber lines can be used only
for the bound FXS voice subscriber lines. PSTN-originated calls received over dedicated FXO voice
subscriber lines are directly connected to the bound FXS voice subscriber lines.
• Consistent state between bound FXS and FXO voice subscriber lines—The on-hook/off-hook state of
the bound FXS and FXO voice subscriber lines is consistent. If an FXO subscriber line receives a
PSTN-originated call when the corresponding FXS voice subscriber line goes off-hook, the calling
party hears busy tones.
662
Adjusting echo cancellation parameters
Table 251 Adjust echo cancellation parameters
A user hears his/her voice Enlarge the control factor of Too high a control factor leads to audio
when speaking. mixed proportion of noises. discontinuity.
663
Figure 641 FXS line configuration page
Item Description
Basic Configurations
Max Interval between Maximum interval in seconds between off-hook and dialing the first digit.
Off-hook and Dialing the First Upon the expiration of the timer, the user is prompted to hang up, and the
Digit call is terminated.
664
Item Description
• Enable
Status
• Disable
Advanced Settings
Lower Limit for Hookflash The time range for the duration of an on-hook condition that is detected as a
Detection hookflash. An on-hook condition is considered to be a hookflash if it lasts for
Upper Limit for Hookflash a period that falls within the hookflash duration range (the period is longer
Detection than the lower limit and shorter than the upper limit).
665
Configuring an FXO voice subscriber line
Select Voice Management > Line Management from the navigation tree, and then click the icon of the
FXO line to be configured to display the FXO line configuration page shown in Figure 642.
Figure 642 FXO line configuration page
Item Description
Basic Configurations
666
Item Description
Maximum interval for the user to dial the next digit.
Max Interval for This timer restarts each time the user dials a digit and works in this way until all
Dialing the Next Digit digits of the number are dialed. If the timer expires before the dialing is completed,
the user is prompted to hang up, and the call is terminated.
Max Interval between Maximum interval in seconds between off-hook and dialing the first digit
Off-hook and Dialing Upon the expiration of the timer, the user is prompted to hang up and the call is
the First Digit terminated.
Max Duration of
Playing Ringback Maximum duration in seconds of playing ringback tones.
Tones
• Enable
Status
• Disable
Advanced Settings
• Delay off-hook—In this mode, configure a dedicated line number, which the
system uses to connect the call to the callee automatically. The communication
can be performed over the FXO subscriber line only after the callee picks up
Off-hook Mode the telephone.
• Immediate off-hook—In this mode, when a call arrives, the FXO interface goes
off-hook immediately, and then the caller performs the second stage dialing.
Bind an FXS voice subscriber line to the FXO voice subscriber line. This list is
available only when you select the Delay Off-hook option in the Off-hook Mode
area.
Binding FXS Line To keep the consistent off-hook/on-hook state between the bound FXS and FXO
lines, the specified FXS line must be the one to which the dedicated line number
points. In addition, only the bound FXS line is allowed to originate calls to the FXO
line by restricting incoming calls.
• Delay Ring
• Immediate Ring
Ring Mode You can select the Delay Ring option to quicken ringing synchronization between
the FXO voice subscriber line and its bound FXS voice subscriber line. However,
for the telephone supporting calling identification display, the calling number is
displayed after the second ringing tone.
In some countries, PBXs do not play busy tones, or the busy tones played by them
only last for a short period of time. When noise is present on a transmission link,
the configuration of silence threshold and silence duration for automatic on-hook
cannot solve the problem where the resource of the FXO interface cannot be
released. In this case, you can specify the duration before a forced on-hook to
Duration before a
solve the problem.
Forced On-hook
No duration is configured by default.
NOTE:
After the duration before a forced on-hook is configured, the call is automatically
disconnected when the duration expires, even if the call is currently going on.
Configure the dial delay time.
Dial Delay Time
By default, the dial delay is 1 second.
667
Item Description
Set the silence threshold. Silence detection-based automatic
If the amplitude of voice signals from the on-hook prevents the situation
switch is smaller than this value, the system where the resource of the FXO
VAD Threshold regards the voice signals as silence. interface cannot be released due
Normally, the signal amplitude on the links to busy tone detection failure when
without traffic ranges from 2 to 5. the busy tone parameters provided
by the connected PBX are special.
By default, the silence threshold is 20.
When the signal values of two
successive sampling points are less
Set the silence duration for automatic than the silence detection
on-hook. threshold, the system considers
that the line goes into the silent
On-hook Duration for Upon expiration of this duration, the system
state. If the line stays in the silent
VAD performs on-hook automatically.
state longer than the silence
By default, the silence duration for automatic duration for automatic on-hook,
on-hook is 7,200 seconds (2 hours). the system automatically
disconnects the call.
668
Item Description
You can use this function to generate some comfortable background noise to
replace the toneless intervals during a conversation. If no comfortable noise is
generated, the toneless intervals make both parties in conversation feel
Comfortable Noise uncomfortable.
Function • Enable
• Disable
By default, the comfortable noise function is enabled.
669
Figure 643 E&M line configuration page
Item Description
Basic Configurations
Cable Type When you configure the cable type, make sure that the cable type
is the same as that of the peer device. Otherwise, only
unidirectional voice service is available.
The configuration is applied to all E&M interfaces of the card.
670
Item Description
Types 1, 2, 3, and 5 are the four signal types (types I, II, III, and V)
of the analog E&M subscriber line.
When you configure the signal type, make sure that the signal type
Signal Type
is the same as that of the peer device.
The configuration is applied to all analog E&M lines in the
corresponding slot.
Max Duration the System Waits for the Maximum duration for the system to wait for the first digit of a
First Digit number.
Delay Time
before the
Calling Party
Immediate Delay time before the calling party sends DTMF signals in the
Sends DTMF
Start immediate start mode.
Signals in
Immediate Start
Mode
Delay Signal
Duration in Delay Delay signal duration in the delay start mode.
Start Mode
Delay Delay Time
Start before the Called
Start Delay time from when the called party detects a seizure signal to
Party Sends a
Mode when it sends a delay signal in the delay start mode.
Delay Signal in
Delay Start Mode
Delay Time
before the Called
Delay time from when the called party receives a seizure signal to
Party Sends a
when it sends a wink signal in the wink start mode.
Wink Signal in
Wink Wink Start Mode
Start Duration of a
Wink Signal
Time duration in which the called party sends wink signals in the
Send by the
wink start mode.
Called Party in
Wink Start Mode
671
Item Description
Max Time the
Calling Party
The maximum amount of time the calling party waits for a wink
Waits for a Wink
signal after sending a seizure signal in the wink start mode.
Signal in Wink
Start Mode
Configure the output gain of the SLIC chip. The bottom layer tunes
SLIC Chip Output Gain the signal gain through the SLIC chip.
By default, the output gain of the SLIC chip is 0.8 dB.
NOTE:
ISDN lines include BSV interfaces (for information about the BSV interface, see "Configuring data link
management") and ISDN lines generated by binding timeslots of digital E1 interfaces or T1 interfaces into
PRI sets. For the latter, before configuring the ISDN line, perform the following configuration: select Voice
Management > Line Management from the navigation tree, and then click the icon of the line to be
configured to display the corresponding parameters configuration page. In the Working Mode area,
select the PRI Trunk Signaling option to create the ISDN line.
672
Figure 644 ISDN line configuration page
Item Description
Description Description of the ISDN line.
You can use this function to generate some comfortable background noise to
replace the toneless intervals during a conversation. If no comfortable noise
is generated, the toneless intervals make both parties in conversation feel
uncomfortable.
Comfortable Noise Function
• Enable
• Disable
By default, the comfortable noise function is enabled.
673
Item Description
Configure a companding law used for quantizing signals.
• A-law, used in China, Europe, Africa, and South America.
Companding Law • μ-law, used in USA.
NOTE:
A BRI interface does not support this configuration item.
Set the DTMF detection sensitivity level:
• Low—In this mode, the reliability is high, but DTMF tones may fail to be
DTMF Detection Sensitivity
detected.
Level
• High—In this mode, the reliability is low, and detection errors may
occur.
• Enable
Status
• Disable
Configuring Router A
# Create a call route and local number.
• Configure a call route in the call route configuration page: The call route ID is 10000, the
destination number is 0755...., and the destination address is 2.2.2.2.
• Create a local number in the local number configuration page: The number ID is 1001, the number
is 0101001, and the bound line is 1/0.
674
Configuring Router B
# Create call routes.
• Create a call route in the call route configuration page: The call route ID is 10000, the destination
number is 010….., and the destination address is 1.1.1.1.
• Create a call route in the call route configuration page: The call route ID is 10001, the destination
number is 07552001, the call route type is Trunk, and the trunk route line is 1/0. In addition, select
the Send All Digits of a Called Number option in the Called Number Sending Mode area when you
configure the advanced settings of this call route.
# Configure the hotline number.
Select Voice Management > Call Route from the navigation tree, and then click the icon of call route
10001 to display the call services configuration page.
Figure 646 Hotline number configuration page
675
• Usually, Telephone A makes calls to Telephone B over the IP network. In the situation where the IP
network is unavailable, Router A sends calls from Telephone A through the bound FXO interface to
Telephone B over PSTN.
Figure 647 Network diagram
Configuration considerations
• Configure one-to-one binding between FXS and FXO voice subscriber lines.
• When the IP network is available, the VoIP entity is preferably used to make calls over the IP
network.
• When the IP network is unavailable, the POTS entity is used to make calls through the bound FXO
voice subscriber line over the PSTN.
NOTE:
• Router A and Router B are routable to each other.
• The configuration of interface IP addresses is not shown here.
Configuring Router A
# Configure a local number and two call routes.
• Configure a call route in the call route configuration page: The call route ID is 10000, the
destination number is 210…., and the destination address is 192.168.0.76.
• Configure a local number in the local number configuration page: The number ID is 0101001, the
number is 0101001, and the bound line is 3/0.
• Configure the backup call route 10001 for the FXO line in the call route configuration page: The
destination address is .T, call route type is Trunk, and the trunk route line is 4/0. In addition, select
the Send All Digits of a Called Number option in the Called Number Sending Mode area when you
configure the advanced settings of this call route.
# Configure call authority control.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree, and then click
Add to display the permitted call number group configuration page.
676
Figure 648 Permitted call number group configuration page
a. Select the Permit the calls from the number group option.
b. Select call route 10001.
c. Click Apply.
# Configure the hotline number.
Select Voice Management > Call Route from the navigation tree, and then click the icon of call route
10001 to display the call services configuration page.
677
Figure 650 Hotline number configuration page
678
Select Voice Management > Dial Plan > Number Match from the navigation tree to display the number
match configuration page.
Figure 652 Entity type selection sequence configuration page
Configuring Router B
# Configure a local number and two call routes.
• Configure a call route in the call route configuration page: The call route ID is 10000, the
destination number is 010…., and the destination address is 192.168.0.71.
• Configure a local number in the local number configuration page: The number ID is 2101002, the
number ID is 2101002, and the bound line is 3/0.
• Configure the backup call route 10001 for the FXO line in the call route configuration page: The
destination address is .T, call route type is Trunk, and the trunk route line is 4/0. In addition, select
the Send All Digits of a Called Number option in the Called Number Sending Mode area when you
configure the advanced settings of this call route.
# Configure call authority control.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree, and then click
Add to display the permitted call number group configuration page.
679
Figure 653 Permitted call number group configuration page
a. Select the Permit the calls from the number group option.
b. Select call route 10001.
c. Click Apply.
# Configure the hotline number.
Select Voice Management > Call Route from the navigation tree, and then click the icon of call route
10001 to display the call services configuration page.
680
Figure 655 Hotline number configuration page
681
Select Voice Management > Dial Plan > Number Match from the navigation tree to display the number
match configuration page.
Figure 657 Entity type selection sequence configuration page
682
Configuring SIP local survival
IP phones have been deployed throughout the headquarters and branches of many enterprises and
organizations. Typically, a voice server is deployed at the headquarters to control calls originated by IP
phones at branches.
The local survival feature enables the voice router at a branch to automatically detect the reachability to
the headquarter voice server and to process calls originated by attached IP phones when the
headquarters voice server is unreachable. The headquarters voice server takes over call services from the
branch voice router when the failure is removed.
Figure 658 shows a typical network diagram for the local survival feature.
Figure 658 Network diagram for the local survival feature
683
Configuring SIP local survival
Service configuration
Select Voice Management > SIP Local Survival > Service Configuration from the navigation tree to display
the page shown in Figure 659.
Figure 659 Configure service
Item Description
• Enable—Enables the local SIP server.
Server Running State • Disable—Disables the local SIP server.
By default, the local SIP server is disabled.
Port Bound to the Server Enter the port number of the local SIP server.
684
Item Description
• Alone—The local SIP server in alone mode acts as a small voice server.
• Alive—The local SIP server in alive mode supports the local survival feature.
When the communication with the remote server fails, the local SIP server
accepts registrations and calls. When the communication resumes, the
Server Operation Mode
remote server accepts registrations and calls again, and the local SIP server
rejects registrations and calls. In the alive mode, Options messages are
periodically sent to the remote server.
By default, the local SIP server operates in alone mode.
Remote Server Port Enter the port number of the remote SIP server.
User management
Select Voice Management > SIP Local Survival > User Management from the navigation tree, and then
click Add to display the page shown in Figure 660.
Figure 660 Configure user
Item Description
User ID Enter the ID of a user to be registered.
685
Trusted nodes
Select Voice Management > SIP Local Survival > Trusted Nodes from the navigation tree to display the
page shown in Figure 661.
Figure 661 Configure a trusted node
Item Description
Enter the IP address of the trusted A trusted node can directly originate
node. calls without being authenticated by
IP address the local SIP server. You do not need to
By default, no trusted node is
configured. configure user information for the
number of the trusted node.
Up to eight trusted nodes can be
Enter the port number of the trusted configured. Whether a trusted node is
Port
node. reachable is determined by its IP
address rather than its port number.
Call-out route
The local SIP server uses a static routing table to forward outgoing calls. If the called number of a call
matches a static route, the local SIP server forwards the call to the specified destination. The called
number does not need to register on the local SIP server. For example, as an external number, 5552000
does not need to register on the local SIP server. Configure a static route entry with the area prefix of 333
and called number of 5552000 on the local SIP server. Upon receiving a call from local number 1000 to
external number 5552000, the local SIP server adds the area prefix 333 to the calling number and
forwards the call to the destination specified in the static route entry.
Select Voice Management > SIP Local Survival > Call-Out Route from the navigation tree, and then click
Add to display the page shown in Figure 662.
686
Figure 662 Configure a call-out route
Item Description
ID Enter the ID of the call-out route.
Destination Enter the destination number prefix and length. Suppose the destination number prefix is
Number Prefix 4100, and the number length is 6. This configuration matches destination numbers that
are 6 digits long and start with 4100.
Number length A dot can be used after a number to represent a character. This configuration does not
support other characters.
Destination IP
address Enter the destination IP address and port number.
Port Number
Area Prefix Enter the area prefix added before the calling numbers of outgoing calls.
Area prefix
When the local SIP server is connected to the extranet, external users can originate calls to internal users
registered with the local SIP server. For calls from external users to internal users, the local SIP server
removes the configured area prefix from each called number to convert it to an internal short number. For
example, if an external user dials number 01050009999, the local SIP server checks whether any area
prefix matches the called number. If the area prefix 0105000 is available, the local SIP server removes
the prefix 0105000 from the called number and sends the call to 9999.
Select Voice Management > SIP Local Survival > Area Prefix from the navigation tree to display the page
shown in Figure 663.
Figure 663 Configure a call-in number prefix
• Enter the call-in number prefix, and then click Add a Prefix.
687
Up to eight call-in number prefixes can be configured. The local SIP server adopts longest match to deal
with a called number.
Item Description
Rule Set ID Enter the ID of the call rule set.
Rule
688
Figure 665 Apply the call rule set
Item Description
Rule Set ID Displays the call rule set ID.
• Enable—Applies the call rule set to all registered users.
Applied Globally • Disable—Specifies that the call rule set does not apply to any registered
users.
• In the Available register users field, select registered users, and click << to
add them to Register users bound to the rule set.
Register users bound to
• In the Register users bound to the rule set field, select registered users, and
the rule set
click >> to unbind them.
Users in the Available register users field are added in "User management."
689
Figure 666 Network diagram
Configuring Router C
# Configure the router to operate in the alone mode.
Select Voice Management > SIP Local Survival > Service Configuration from the navigation tree to display
the following page.
Figure 667 Configure alone mode
690
Figure 668 Configure a user
Configuring Router A
• Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, the bound line is line2/0, the user name is 1000, and the password is 1000.
• Configure a call route to Router B in the call route configuration page: The ID is 5000, the
destination number is 5000, the routing type is SIP, and the SIP routing method is proxy server.
• Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar's IP address as 2.1.1.2.
Configuring Router B
• Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, the bound line is line2/0, the user name is 5000, and the password is 5000.
• Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1000, the routing type is SIP, and the SIP routing method is proxy server.
• Configure SIP registration in the connection properties configuration page: Enable registration, and
configure the main registrar's IP address as 2.1.1.2.
691
Configuring local SIP server to operate in alive mode
Network requirements
Router A and Router B carry out call services through the remote voice server VCX. Configure the local SIP
server on Router A to operate in alive mode, so that calls can be originated or received through Router A
when the VCX fails. When the VCX recovers, it takes over call services again.
Figure 669 Network diagram
Configuring Router A
# Configure the IP address of Ethernet 1/1 as 1.1.1.2 and the IP address of the sub interface as 2.1.1.2.
(Details not shown)
# Configure the local SIP server to operate in alive mode.
Select Voice Management > SIP Local Survival > Service Configuration from the navigation tree to display
the following page.
Figure 670 Configure alive mode
692
d. Enter 3.1.1.1 for Remote Server IP Address.
e. Click Apply.
Configuring Router A
• Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, and the bound line is line2/0.
• Configure a call route to Router B in the call route configuration page: The ID is 5000, the
destination number is 5000, the routing type is SIP, and the SIP routing method is proxy server.
• Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar's IP address as 3.1.1.2 and the backup registrar's IP address as
2.1.1.2.
Configuring Router B
• Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, and the bound line is line2/0.
• Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1000, the routing type is SIP, and the SIP routing method is proxy server.
• Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar's IP address as 3.1.1.2 and the backup registrar's IP address as
2.1.1.2.
693
• When the VCX recovers, Router A disables the local SIP server, and the phones register with the
VCX again.
1000 5000
Eth1/1 Eth1/1 Eth1/2 Eth1/1
1.1.1.1/24 1.1.1.2/24 2.1.1.2/24 2.1.1.1/24
1111 5555
694
b. Enter 2.1.1.2 for IP Address Bound to the Server.
c. Select Alone for Server Operation Mode.
d. Click Apply.
# Configure users with phone numbers 1111, 5000, and 5555 in the same way.
# Configure call rule set 0.
Select Voice Management > SIP Local Survival > Call Authority Control from the navigation tree, and then
click Add to display the following page.
695
Figure 675 Configure call rule set 0
696
Figure 676 Apply call rule set 0
697
a. Enter 2 for Rule Set ID.
b. Add a rule, as shown in Figure 677.
c. Click Apply.
# Apply call rule set 2.
Select Voice Management > SIP Local Survival > Call Authority Control from the navigation tree, and then
click the icon of call rule set 2 to display the following page.
Figure 678 Apply call rule set 2
a. Click 5000 in Available register users, and then click << to add it to Register users bound to the
rule set.
b. Click Apply.
Configuring Router A
• Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, the bound line is line2/0, the user name is 1000, and the password is 1000.
• Configure a local number in the local number configuration page: The ID is 1111, the number is
1111, the bound line is line2/1, the user name is 1111, and the password is 1111.
• Configure a call route to Router B in the call route configuration page: The ID is 5000, the
destination number is 5…, the routing type is SIP, and the SIP routing method is proxy server.
• Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar's IP address as 2.1.1.2.
698
Configuring Router B
• Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, the bound line is line2/0, the user name is 5000, and the password is 5000.
• Configure a local number in the local number configuration page: The ID is 5555, the number is
5555, the bound line is line2/1, the user name is 5555, and the password is 5555.
• Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1…, the routing type is SIP, and the SIP routing method is proxy server.
• Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar's IP address as 2.1.1.2.
699
Figure 680 Configure alone mode
700
Figure 682 Configure an area prefix
Configuring Router A
• Configure a local number in the local number configuration page: The ID is 55661000, the number
is 55661000, and the bound line is line2/0.
• Configure a call route to Router B in the call route configuration page: The ID is 88995000, the
destination number is 88995000, the routing type is SIP, and the destination address is 2.1.1.2.
Configuring Router B
• Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, the bound line is line2/0, the user name is 5000, and the password is 5000.
• Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar's IP address as 2.1.1.2.
701
Verifying the configuration
• Select Voice Management > States and Statistics > Local Survival Service States from the navigation
tree. You can see that number 5000 has been registered with the local SIP server on Router C.
• Place a call from phone 55661000 to phone 88995000. The local SIP server on Router C removes
the area prefix 8899 from the called number and alerts internal phone 5000. Pick up phone 5000.
The call is established.
702
c. Select Alone for Server Operation Mode.
d. Click Apply.
703
Configuring Router A
• Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, the bound line is line2/0, the user name is 1000, and the password is 1000.
• Configure a call route to Router B in the call route configuration page: The ID is 55665000, the
destination number is 55665000, the routing type is SIP, and the routing method is proxy server.
Configuring Router B
• Configure a local number in the local number configuration page: The ID is 55665000, the number
is 55665000, and the bound line is line2/0.
• Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1000, the routing type is SIP, and the routing method is proxy server.
• Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar's IP address as 2.1.1.2.
704
Configuring IVR
IVR is extensively used in voice communications. You can use the IVR system to customize interactive
operations and humanize other services. If a subscriber dials an IVR access number, the IVR system plays
the prerecorded voice prompts to direct the subscriber about how to proceed (for example, to dial a
number).
Advantages
A conventional interactive voice system uses fixed audio files and operations. IVR enables you to
customize your own interactive system by adding, modifying, and removing audio files. IVR has the
following advantages.
Various codecs
The IVR system supports four codecs for voice prompts: G.711alaw, G.711ulaw, G.723r5, and
G.729r8. The converter provided by HP can transcode among these four codecs. Each kind of codec has
its advantages and disadvantages: G.711alaw and G.711ulaw provide high quality of voice, while
requiring greater memory space. G.723r53 and G.729r8 provide relatively low quality of voice, while
requiring less memory space.
Customizable process
You can customize the interactive process easily. For example, configure custom IVR access numbers,
voice prompts, and combinations of keys and voice prompts.
705
Successive jumping
The IVR process can realize successive jumping at most eight times from node to node.
Configuring IVR
Uploading media resource files
Select Voice Management > IVR Services > Media Resources Management from the navigation tree to
display the following page.
Figure 688 Media file list
You can click to save the media resource file to a specified directory.
706
Click Add. The following page appears.
Figure 689 Configure media resource
Item Description
Media Resource ID Set a media resource ID.
Rename Media
Enter a name for the media resource file.
Resource
Upload Media Resource Upload media resource files for g729r8, g711alaw, g711ulaw, and g723r53.
707
Figure 690 Global key policy
Item Description
Input Error Processing Method
Select a voice prompt file. You can configure voice prompt files in Voice
Voice Prompts
Management > IVR Services > Media Resources Management.
708
Item Description
Select a voice prompt file. You can configure voice prompt files in Voice
Voice Prompts
Management > IVR Services > Media Resources Management.
709
Figure 691 Configure a call node
Item Description
Node ID Enter a node ID.
710
Item Description
• Enable
• Disable
Disabled by default.
Input Method
• Terminate the call
• Jump to a specified node
Input Error Processing
• Return to the previous node
Method
By default, the node uses the input error processing method configured in the
global key policy.
Specify the node to which the subscriber is directed when the number of input
Specify A Node
errors reaches the maximum.
Select a voice prompt file. Voice prompt files can be configured in Voice
Voice Prompts
Management > IVR Services > Media Resources Management.
Specify the node to which the subscriber is directed when the number of input
Specify A Node
timeouts reaches the maximum.
Select a voice prompt file. You can configure voice prompt files in Voice
Voice Prompts
Management > IVR Services > Media Resources Management.
711
Item Description
Play Count Number of play times.
Secondary-Call
• Match the terminator of the numbers
• Match the length of the numbers
Number Match Mode • Match the local number and route
At least, either the number match mode or the extension secondary call must be
configured.
Extension Secondary-Call
Extension Number Associate the extension number with the corresponding number. You can click
Add a Rule to configure a rule for executing the secondary call.
Corresponding Number
By default, no extension secondary call is configured.
712
Figure 692 Configure a jump node
713
Table 265 Configuration
Item Description
Node ID Enter a node ID.
714
Table 266 Configuration
Item Description
Node ID Enter a node ID.
Item Description
Number ID Enter a number ID (30000 to 39999).
715
Item Description
Number Enter the access number.
Bind a node in the list to the access number. You can configure the nodes in
Bind to Menu
Voice Management > IVR Services > Advanced Settings.
For information about advanced settings, see "Configuring advanced settings for local numbers and call
routes."
716
IVR configuration examples
Configure a secondary call on a call node (match the terminator
of numbers)
Network requirements
As shown in Figure 696, configure an IVR access number and call node functions on Router B to meet the
following requirements.
• After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file welcome.wav.
• The subscriber dials 50# at Telephone A to originate a secondary call, and then Telephone B1 rings.
• If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
• If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
Figure 696 Network diagram
Configuring Router A
# Configure a local number and call route.
• Configure a local number in the local number configuration page: The number ID is 100; the
number is 100; the bound line is line 1/0.
• Configure a route to Router B in the call route configuration page: The route ID is 300; the
destination number is 300; the SIP routing method is IP routing; the destination IP address is
1.1.1.2; the DTMF transmission mode is out-of-band.
Configuring Router B
# Configure local numbers in the local number configuration page.
• Local number 500: The number ID is 500; the number is 500; the bound line is line 1/0.
• Local number 50: The number ID is 50; the number is 50; the bound line is line 1/1.
# Upload g729r8 media resource files.
Select Voice Management > IVR Services > Media Resources Management from the navigation tree to
display the following page.
717
Figure 697 Upload a media resource file
Use the same method to upload the other g729r8 media resource files: timeout, input_error, and bye.
# Configure global error and timeout processing methods to achieve the following purposes:
• If no number is dialed at Telephone A within the timeout time, Router B plays audio file timeout.wav.
If the number of timeouts reaches four, Router B terminates the call.
• If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav. If the number of input errors reaches three, Router B terminates the call.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, and then click the
Global Key Policy tab.
718
Figure 698 Configure the global key policy
a. Select Enable for Play Voice Prompts for Input Errors, and select input_error from the Voice
Prompts list.
b. Enter 4 for Max Count of Input Timeouts and 5 for Timeout Time.
c. Select Enable for Play Voice Prompts for Input Timeout.
d. Select timeout from the Voice Prompts list.
e. Click Apply.
719
Figure 699 Configure a call node
720
Figure 700 Configure an access number
721
Figure 701 Network diagram
Configuring Router A
See "Configuring Router A."
Configuring Router B
# Configure the call node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, click the Configure
Call Node tab, and then click Add to display the following page.
722
Figure 702 Configure the call node
723
Configure a secondary call on a call node (match a number)
Network requirements
As shown in Figure 703, configure an IVR access number and call node functions on Router B to meet the
following requirements:
• After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file welcome.wav. Configure number match so that when the subscriber dials 50, Telephone B1
rings.
• If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
• If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
Figure 703 Network diagram
Configuring Router A
See "Configuring Router A."
Configuring Router B
# Configure a call node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, click the Configure
Call Node tab, and then click Add to display the following page.
724
Figure 704 Configure a call node
725
Configure an extension secondary call on a call node
Network requirements
As shown in Figure 705, configure an IVR access number and call node functions on Router B to meet the
following requirements:
• After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file welcome.wav. Then the subscriber dials 0, and Router B makes an extension secondary call so
that Telephone B rings.
• If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
• If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
Figure 705 Network diagram
Configuring Router A
See "Configuring Router A."
Configuring Router B
# Configure a call node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, click the Configure
Call Node tab, and then click Add to display the following page.
726
Figure 706 Configure a call node
727
e. Select 500 for Corresponding Number.
f. Click Apply.
For other settings, see "Configuring Router B."
Configuring Router A
See "Configuring Router A."
Configuring Router B
# Configure a jump node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, click the Configure
Jump Node tab, and then click Add to display the following page.
728
Figure 708 Configure a jump node
729
a. Enter 10 for Node ID.
b. Enter play-welcome for Description.
c. Select Enable for Play Voice Prompts, and select welcome from the Voice Prompts list.
d. Select Terminate the call for Key#.
e. Click Apply.
Configuring Router A
See "Configuring Router A."
Configuring Router B
# Configure a service node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, click the Configure
Service Node tab, and then click Add to display the following page.
730
Figure 710 Configure a service node
731
Figure 711 Configure an access number
732
Configuring Router A
See "Configuring Router A."
Configuring Router B
# Configure a service node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, click the Configure
Service Node tab, and then click Add to display the following page.
Figure 713 Configure a service node
733
Figure 714 Configure an access number
734
Figure 715 Network diagram
Configuring Router A
See "Configuring Router A."
Configuring Router B
# Configure a local number in the local number configuration page.
The number ID is 500; the number is 500; the bound line is line 1/0.
# Upload a g729r8 media resource file.
Select Voice Management > IVR Services > Media Resources Management from the navigation tree to
display the following page.
Figure 716 Upload a g729r8 media resource file
Use the same method to upload the other g729r8 media resource files: timeout, input_error, and bye.
# Configure global error and timeout processing methods to achieve the following purposes:
• If no number is dialed at Telephone A within the timeout time, Router B plays audio file timeout.wav.
If the number of timeouts reaches four, Router B terminates the call.
735
• If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav. If the number of input errors reaches three, Router B terminates the call.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, and then click the
Global Key Policy tab.
Figure 717 Configure the global key policy
a. Select Enable for Play Voice Prompts for Input Errors, and select input_error from the Voice
Prompts list.
b. Enter 4 for Max Count of Input Timeouts and 5 for Timeout Time.
c. Select Enable for Play Voice Prompts for Input Timeout.
d. Select timeout from the Voice Prompts list.
e. Click Apply.
736
Figure 718 Configure a call node
737
e. Select call from the Voice Prompts list.
f. Enter 1 for Extension Number.
g. Enter 500 for Corresponding Number.
h. Click Add a Rule.
i. Click Apply.
# Configure a service node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, click the Configure
Service Node tab, and then click Add to display the following page.
Figure 719 Configure a service node
738
Figure 720 Configure a jump node
739
b. Enter play-welcome for Description.
c. Select Enable for both Play Voice Prompts and Mandatory Play.
d. Select welcome from the Voice Prompts list.
e. Select Jump to a specified node from the Key* list, and reject-all from its Specify a node list.
f. Select Jump to a specified node from the Key# list, and play-all from its Specify a node list.
g. Click Apply.
740
Creating a menu
Select Voice Management > IVR Services > Processing Methods Customization from the navigation tree,
and then click Add to create a menu. The following describes settings for different types of menus,
including jump, terminate the call, enter the next menu, return to the previous menu, dial immediately,
and secondary call.
Item Description
Menu Node ID Enter a menu ID.
741
Item Description
Select Jump.
Menu Type
By default, Jump is selected.
742
Figure 723 Configure a Terminate the call menu
Item Description
Menu Node ID Enter a menu ID.
Item Description
Menu Node ID Enter a menu ID.
743
Item Description
Play Voice Prompts Select an audio file.
When the User Enters
the Menu No audio file is selected by default.
Item Description
Menu Node ID Enter a menu ID.
744
Table 272 Configuration
Item Description
Menu Node ID Enter a menu ID.
745
Table 273 Configuration
Item Description
Menu Node ID Enter a menu ID.
Select Secondary-call.
Menu Type
By default, Jump is selected.
Select an audio file. Voice prompt files can be configured in Voice Management >
Input Error Prompts
IVR Services > Media Resources Management.
Select an audio file. Voice prompt files can be configured in Voice Management >
Timeout Prompts
IVR Services > Media Resources Management.
Match Number
Enter the number terminator.
Terminator
Extension number Enter an extension number and the corresponding number, and then click Add to
associate them.
Corresponding number
By default, no extension secondary call is configured.
746
Binding an access number
After configuring a menu, click Next to display the following page.
Figure 728 Bind an access number
Select the checkbox for the target access number, and click Apply.
NOTE:
To perform any operation to the previous page, you must first close the Customize IVR Services page.
Otherwise, errors occur.
747
Figure 729 Customize IVR services
Add a submenu
Select Add A New Node from the Jump to submenu list of Key 0. Click OK in the dialog box that appears
to display the following page.
Figure 730 Add a submenu
You can configure the type of the new menu as jump, terminate the call, enter the next menu, return to the
previous menu, dial immediately, or secondary-call. For information about the menu configuration, see
"Creating a menu."
748
NOTE:
If new settings are made on the page, first click Apply to save them before you select Add a new menu.
Otherwise, the new settings may be lost.
Delete a menu
Enter the Customize IVR Services page, click the target menu, and click Delete the menu. Click OK in the
dialog box that appears.
NOTE:
• If you delete a menu that is referenced by another menu, the operation deletes the reference relation in the menu but
not the menu.
• If you delete a menu that is referenced within itself, the delete operation deletes both the reference relation and the
menu.
749
If the user dials 1, the system plays the audio file that introduces product D.
If the user dials 2, the system plays the audio file that introduces product E.
If the user dials 3, the system plays the audio file that introduces product F.
If the user dials *, the system returns the previous menu.
Configuration procedure
1. Upload media resource files.
# Upload a media resource file.
Select Voice Management > IVR Services > Media Resources Management from the navigation tree to
display the following page.
Figure 731 Configure media resource
Use the same method to upload other g729r8 media resource files. You can see these uploaded files in
Voice Management > IVR Services > Media Resources Management, as shown in Figure 732.
750
Figure 732 Media file list
751
# Create a menu.
Select Voice Management > IVR Services > Processing Methods Customization from the navigation tree,
and then click Add to create a menu.
Figure 734 Configure a menu
Select the checkbox for the access number 30000, and then click Apply.
3. Configure the voice menu system.
# Enter the Customize IVR Services page.
Select Voice Management > IVR Services > Processing Methods Customization from the navigation tree to
display the page shown in Figure 736. Click the icon of the menu to display the Customize IVR
Services page shown in Figure 737.
752
Figure 736 Menu list
# Add submenus for the marketing and sales department, telecom product sales department, and
government product sales department.
Select the voice menu system of Company A from the navigation tree to display the following page.
753
Figure 738 Voice menu system of Company A
a. Select Add A New Node from the Jump to submenu list of key 0.
b. Click OK in the dialog box that appears to display the following page.
Figure 739 Create a submenu for the marketing and sales department
Configure submenus for the telecom product department and government product department as shown
in Figure 740 and Figure 741.
754
Figure 740 Add a submenu for the telecom product sales department
Figure 741 Add a submenu for the government product sales department
755
Figure 743 Marketing and sales department submenu
a. Select Jump from the Operation list, and Add A New Node from the Jump to submenu list for key
0.
b. Click OK in the dialog box that appears to display the following page.
Use the same method to add submenus for the major financial customer department, carrier customer
department, and SMB department.
756
Figure 745 Marketing and sales department submenu
a. Select Return to the previous node from the Operation list of key *.
b. Click Apply.
After the configuration, the marketing and sales department submenu is as shown in Figure 745.
5. Configure the telecom product sales department submenu.
Select Telecom Product Sales Dept from the navigation tree.
Figure 746 Telecom product sales department submenu
757
a. Select Jump from the Operation list, and Attendant from the Jump to submenu list of key 0.
b. Select Jump from the Operation list, and Add A New Node from the Jump to submenu list of key
1.
c. Click OK in the dialog box that appears to display the following page.
Figure 747 Add a submenu
Use the same method to add submenus for introductions to Products B and C. After that, return to the
Customize IVR Services page.
Figure 748 Telecom product sales department submenu
a. Select Return to the previous node from the Operation list of key *.
b. Click Apply.
758
After the configuration, the telecom product sales department submenu is as shown in Figure 748.
6. Configure the government product sales department submenu.
Select Government Product Sales Dept from the navigation tree. Configure the submenu, as shown
in Figure 749. The configuration procedure is identical with the configuration of the telecom product sales
department submenu.
Figure 749 Government product sales department submenu
After all configurations, the Customize IVR Services page is as shown in Figure 749.
759
Advanced IVR configuration
Global configuration
Select Voice Management > Advanced Configuration > Global Configuration from the navigation tree to
display the global configuration page shown in Figure 750.
Figure 750 Global configuration page
Item Description
• Silent—The calling party does not play any tones to the called party during call
hold.
Tone Playing Mode for • Playing music—The calling party plays the specified tones to the called party
Call Hold
during call hold.
By default, the tone playing mode is the silent mode.
Select the media resource if you select the Playing Music option. You can upload
Media Resource media resource files in Voice Management > IVR Services > Media Resources
Management.
Configure the device to play the call progress tones of a specified country or
Call Progress Tones region.
Country Mode
By default, the call progress tones of China are specified.
760
Item Description
Backup rule:
• Strict—One of the following conditions triggers strict call backup:
The device does not receive any reply from the peer after sending out a call
request.
The device fails to initiate a call to the IP network side.
Backup Rule
The device fails to register on the voice server.
• Loose—Loose call backup is triggered if any of the abovementioned conditions
occur or if the following condition occurs:
The device receives a reject reply (with a number from 3xx to 6xx except
300, 301, 302, 305, 401, 407, and 422) after sending a call request.
Specifies the time duration in seconds for switching from the current VoIP link to
Call Backup Switch
another VoIP link or a PSTN link (the call backup switching time) in case of a VoIP
Time
call failure.
Batch configuration
Local number
Creating numbers in batch
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree. Then
click the Create Numbers in Batch link in the Local Number area to display the page for creating numbers
in batch, as shown in Figure 751.
761
Figure 751 Creating numbers in batch
Item Description
Specify the start number. Then a serial of consecutive numbers starting with the start
number are bound to the selected voice subscriber lines. For example, if you specify
Start Number
the start number as 3000 and select lines 3/0 and line 3/1, line 3/0 is bound to
number 3000, and line 3/1 is bound to number 3001.
You can set the register username and password in one of the following ways:
• Username and Password are the Same as Number
Register Mode • No Username and No Password
• Username and Password are Specified Uniformly—If you select this option, set the
username and password.
762
Figure 752 Local number Fax and Modem configuration page
Item Description
Configure the protocol used for fax communication with other devices:
• T.38—Use T.38 fax protocol. With this protocol, a fax connection can be set up
quickly.
• Standard T.38—Use the standard T38 protocol of SIP. The fax negotiation mode
depends on the protocol used (SIP).
Fax Protocol Configure the fax pass-through mode:
• G.711 A-law
• G.711 μ-law
The pass-through mode is subject to such factors as packet loss, jitter, and delay, so
the clocks on both communication sides must be kept synchronized. Only G.711
A-law and G.711 μ−law are supported, and the VAD function should be disabled.
763
Item Description
The calling tone (CNG) fax switchover is used to implement the fax mailbox service
through communication with the VCX. When the local fax machine A originates a fax
call to the peer fax machine B, if B is busy or is unattended, A can send the fax call to
the fax mailbox of the VCX. With CNG fax switchover enabled, the voice gateway
CNG Fax
can switch to the fax mode once it receives a CNG from A.
Switchover Function
• Enable
• Disable
The function is disabled by default.
Configure the codec type and switching mode for SIP Modem pass-through function:
• Standard G.711 A-law—Adopt the G.711 A-law codec type and Re-Invite
switching mode.
Codec Type and
• Standard G.711 μ-law—Adopt the G.711 μ-law codec type and Re-Invite
Switching mode for
switching mode.
SIP Modem
Pass-through • NTE Compatible G.711 A-law—Adopt the G.711 A-law codec type and
NTE-compatible switching mode.
• NTE Compatible G.711 μ-law—Adopt the G.711 μ-law codec type and
NTE-compatible switching mode.
Configure the value of NTE payload type for the NTE-compatible switching mode.
This option is configurable only when NTE Compatible G.711 A-law or NTE
NET Payload Type
Compatible G.711 μ-law is selected in the Codec Type and Switching Mode for SIP
Field
Modem Pass-through list.
By default, the value of the NTE payload type is 100.
Select the checkboxes for specific local numbers, and then click the Apply to Selected
Select the Number(s) Number(s) button to apply the above fax and modem settings to the selected local
numbers.
Call services
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree. Then
click the Call Services link in the Local Number area to display the local number call services configuration
page, as shown in Figure 753.
764
Figure 753 Call services configuration page
Item Description
Configure call forwarding:
• Enable
• Disable
By default, call forwarding is disabled.
After a call forwarding function is enabled, you can enter the corresponding
forwarded-to number:
Call Forwarding • The Forwarded-to Number for Call Forwarding no Reply—Enter the forwarded-to
number.
• The Forwarded-to Number for Call Forwarding Busy—Enter the forwarded-to
number.
• The Forwarding Unconditional—Enter the forwarded-to number.
• The Forwarded-to Number for Call Forwarding Unavailable—Enter the
forwarded-to number.
765
Item Description
Configure call hold:
• Enable
• Disable
By default, call hold is disabled.
Call Hold After call hold is enabled, you can set the Max Time Length the Held Party Can Wait
parameter as needed.
NOTE:
The Max Time Length the Held Party Can Wait is only applied to the held party of a call
(the receiver of call hold).
Configure call transfer:
• Enable
• Disable
Call Transfer By default, call transfer is disabled.
Call hold must be enabled before you can configure call transfer.
After call transfer is enabled, you can set the Call Transfer Start Delay parameter as
needed.
766
Item Description
Configure MWI:
• Enable
• Disable
Message Waiting By default, MWI is disabled.
Indicator
NOTE:
Generally, the voice gateway sends a SUBSCRIBE to the server, and it receives a NOTIFY
from the server if the subscription is successful. It obtains the status of the voice mailbox
afterwards.
Processing Priority
When the Line is Specify the processing sequence of services when the line is busy.
Busy
Select the checkboxes for the local numbers you want, and then click the Apply to
Select the Number(s) Selected Number(s) button to apply the above call services settings to the selected
local numbers.
Advanced settings
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree. Then
click the Advanced Settings link in the Local Number area to display the local number advanced settings
page, as shown in Figure 754.
Figure 754 Local number advanced settings page
767
Table 278 Configuration
Item Description
Codec with the First Priority
Codecs and Codec with the Second Priority
Priorities Codec with the Third Priority
Codec with the Lowest Priority
Number Selection
Set the priority of the local number. The smaller the value, the higher the priority.
Priority
Configure a dial prefix for the local number. For a trunk type call route, the dial prefix
is added to the called number to be sent out.
Dial Prefix • Enable
• Disable—Remove the configured dial prefix.
If you enable the function, enter the dial prefix.
The VAD discriminates between silence and speech on a voice connection according
to their energies. VAD reduces the bandwidth requirements of a voice connection by
not generating traffic during periods of silence in an active voice connection. Speech
signals are generated and transmitted only when an active voice segment is detected.
VAD Researches show that VAD can save the transmission bandwidth by 50%.
• Enable
• Disable
By default, VAD is disabled.
Select the checkboxes for the local numbers you want, and then click the Apply to
Select the Number(s) Selected Number(s) button to apply the above advanced settings to the selected local
numbers.
Call route
Fax and modem
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree. Then
click the Fax and Modem link in the Call Route area to display the call route fax and modem configuration
page, as shown in Figure 755.
768
Figure 755 Call route Fax and Modem configuration page
Item Description
Specify the protocol used for fax communication with other devices:
• T.38—Use T.38 fax protocol. With this protocol, a fax connection can be set up
quickly.
• Standard T.38—Use the standard T38 protocol of SIP. The fax negotiation mode
depends on the protocol used (SIP).
Fax Protocol Configure the fax pass-through mode:
• G.711 A-law
• G.711 μ-law
The pass-through mode is subject to such factors as packet loss, jitter, and delay, so
the clocks on both communication sides must be kept synchronized. Only G.711
A-law and G.711 μ−law are supported, and the VAD function should be disabled.
769
Item Description
The calling tone (CNG) fax switchover is used to implement the fax mailbox service
through communication with the VCX. When the local fax machine A originates a fax
call to the peer fax machine B, if B is busy or is unattended, A can send fax call to the
fax mailbox of the VCX. With CNG fax switchover enabled, the voice gateway can
CNG Fax
switch to the fax mode once it receives a CNG from A.
Switchover Function
• Enable
• Disable
The function is disabled by default.
Configure the codec type and switching mode for SIP Modem pass-through function:
• Standard G.711 A-law—Adopt the G.711 A-law codec type and Re-Invite
switching mode.
Codec Type and
• Standard G.711 μ-law—Adopt the G.711 μ-law codec type and Re-Invite
Switching mode for
switching mode.
SIP Modem
Pass-through • NTE Compatible G.711 A-law—Adopt the G.711 A-law codec type and
NTE-compatible switching mode.
• NTE Compatible G.711 μ-law—Adopt the G.711 μ-law codec type and
NTE-compatible switching mode.
Configure the value of the NTE payload type for the NTE-compatible switching mode.
This option is configurable only when NTE Compatible G.711 A-law or NTE
NET Payload Type
Compatible G.711 μ-law is selected in the Codec Type and Switching Mode for SIP
Field
Modem Pass-through list.
By default, the value of the NTE payload type is 100.
Select the checkboxes for call routes, and then click the Apply to Selected Route(s)
Select the Route(s)
button to apply the above fax and modem settings to the selected call routes.
Advanced settings
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree. Then
click the Advanced Settings link in the Call Route area to display the call route advanced settings page, as
shown in Figure 756.
770
Figure 756 Call route advanced settings page
Item Description
Codec with the First Priority
Codecs and Codec with the Second Priority
Priorities Codec with the Third Priority
Codec with the Lowest Priority
Route Selection
Set the priority of the call route. The smaller the value, the higher the priority.
Priority
The VAD discriminates between silence and speech on a voice connection according
to their energies. VAD reduces the bandwidth requirements of a voice connection by
not generating traffic during periods of silence in an active voice connection. Speech
signals are generated and transmitted only when an active voice segment is detected.
VAD Researches show that VAD can save the transmission bandwidth by 50%.
• Enable
• Disable
By default, VAD is disabled.
Select the checkboxes for the call routes you want, and then click the Apply to
Select the Route(s) Selected Route(s) button to apply the above advanced settings to the selected call
routes.
771
Line management
FXS line configuration
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree. Then
click the FXS Line Configuration link in the Line Management area to display the FXS line configuration
page, as shown in Figure 757.
Figure 757 FXS line configuration page
Item Description
Max Interval Maximum interval in seconds between off-hook and dialing the first digit.
between Off-hook
and Dialing the First Upon the expiration of the timer, the user is prompted to hang up, and the call is
Digit terminated.
772
Item Description
Set the DTMF detection sensitivity level:
• Low—In this mode, the reliability is high, but DTMF tones may fail to be detected.
DTMF Detection
• Medium—In this mode, the reliability is medium. If you select this option, you can
specify the Frequency Tolerance of Medium DTMF Detection Sensitivity Level. The
Sensitivity Level
greater the value, the higher the probability of false detection. Support for this
option varies with installed cards.
• High—In this mode, the reliability is low, and detection errors may occur.
Select the checkboxes for the lines you want, and then click the Apply to Selected
Select the Line(s)
Line(s) button to apply the above settings to the selected FXS lines.
Item Description
773
Item Description
Max Interval Maximum interval in seconds between off-hook and dialing the first digit.
between Off-hook
and Dialing the First Upon the expiration of the timer, the user is prompted to hang up, and the call is
Digit terminated.
774
Table 283 Configuration
Item Description
Select the checkboxes for the lines you want, and then click the Apply to Selected
Select the Line(s)
Line(s) button to apply the above settings to the selected E&M lines.
Item Description
When the voice signals on the line
Input Gain on the
attenuate to a relatively great extent, IMPORTANT:
Voice Interface
increase the voice input gain.
Gain adjustment may lead to call failures.
When a relatively small voice signal HP recommends that you do not adjust the
Output Gain on the power is needed on the output line, gain. If necessary, do it with the guidance
Voice Interface increase the voice output attenuation of technical personnel.
value.
Select the checkboxes for the lines you want, and then click the Apply to Selected
Select the Line(s)
Line(s) button to apply the above settings to the selected ISDN lines.
775
SIP local survival services
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree. Then
click the Create Users in Batches link in the SIP Local Survival Services area to display the page shown
in Figure 761.
Figure 761 Create users in batches
Item Description
Specify the telephone number of the For example, if you specify the start
Start Number
first user to be registered. number as 2000 and set the register
user quantity to 5, the device
automatically generates five registered
Register User Quantity Number of users to be registered. users with telephone numbers from
2000 to 2004.
Authentication
Enter the name of the user for authentication.
Username
Authentication
Enter the password of the user for authentication.
Password
776
Displaying states and statistics
Field Description
Name Voice subscriber line name.
777
Field Description
• Physical Down—The voice subscriber line is physically down (possibly
because no physical link is present or the link has failed).
Subscriber Line Status • UP—The voice subscriber line is administratively down.
• Shutdown—The voice subscriber line is both administratively and physically
up.
778
Figure 764 ISDN line details
779
Displaying active call summary
Select Voice Management > States and Statistics > Call Statistics from the navigation tree. The Active Call
Summary page appears.
Figure 766 Active call summary page
Field Description
Call type.
Type
Only Speech and Fax are supported.
Call status:
• Unknown—The call status is unknown.
• Connecting—A connection attempt (outgoing call) is being
Status made.
• Connected—A connection attempt (incoming call) is being
made.
• Active—The call is active.
780
Figure 767 History call summary page
Field Description
Connection ID Call connection ID, automatically generated by the system
781
Field Description
Remote Port Port number of the called party
Connection state:
• Idle
Connection State
• Connecting
• Established
Field Description
Number Registered phone number.
Remaining aging time of a number (the remaining time before the next
Remaining Aging Time (Sec)
registration).
782
Field Description
Status of the number:
• offline—Not registered
• online—Registered
Status • login—Being registered
• logout—Being deregistered
• dnsin—DNS query is being performed before registration.
• dnsout—DNS query is being performed before deregistration.
Field Description
Number Phone number.
Remaining aging time of the subscription (the remaining time before the
Remaining Aging Time (Sec)
next subscription).
Subscription status:
• offline—Not subscribed.
Status • online—Subscribed.
• login—The subscription is being proposed.
• logout—The subscription is being canceled.
783
Figure 772 Local survival service states
Field Description
• Alone
Server Operation Mode
• Alive
• Enabled
Server Status
• Disabled
User ID User ID.
Field Description
Aging Time Aging time.
784
Field Description
Registration status of the SIP trunk account:
• Disabled—Not in use.
• Offline—Not registered.
• Online—Registered.
Status
• Login—Being registered.
• Logout—Being deregistered.
• Dnsin—DNS query is being performed before registration.
• Dnsout—DNS query is being performed before deregistration.
This page displays the configuration information of server groups. For information about how to configure
server groups, see "Configuring SIP server group management."
785
Figure 775 IVR call states
Field Description
Corresponding Access Number IVR access number corresponding to the called number.
Current state:
• Idle—The node is idle.
State • Playing a media file
• Waiting for input—The node is waiting for the input of the subscriber.
• Calling—The node is calling a number.
Field Description
Play Count Play times of the media file.
• Playing
Play State
• Not playing
• PSTN—The called party is from PSTN.
Play Type
• IP—IP address of the peer media.
786
Support and other resources
Contacting HP
For worldwide technical support information, see the HP support website:
http://www.hp.com/support
Before contacting HP, collect the following information:
• Product model names and numbers
• Technical support registration number (if applicable)
• Product serial numbers
• Error messages
• Operating system type and revision level
• Detailed questions
Subscription service
HP recommends that you register your product at the Subscriber's Choice for Business website:
http://www.hp.com/go/wwalerts
After registering, you will receive email notification of product enhancements, new driver versions,
firmware updates, and other product resources.
Related information
Documents
To find related documents, browse to the Manuals page of the HP Business Support Center website:
http://www.hp.com/support/manuals
• For related documentation, navigate to the Networking section, and select a networking category.
• For a complete list of acronyms and their definitions, see HP A-Series Acronyms.
Websites
• HP.com http://www.hp.com
• HP Networking http://www.hp.com/go/networking
• HP manuals http://www.hp.com/support/manuals
• HP download drivers and software http://www.hp.com/support/downloads
• HP software depot http://www.software.hp.com
787
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[] Square brackets enclose syntax choices (keywords or arguments) that are optional.
Braces enclose a set of required syntax choices separated by vertical bars, from which
{ x | y | ... }
you select one.
Square brackets enclose a set of optional syntax choices separated by vertical bars,
[ x | y | ... ]
from which you select one or none.
The argument or keyword and argument combination before the ampersand (&) sign
&<1-n>
can be entered 1 to n times.
GUI conventions
Convention Description
Window names, button names, field names, and menu items are in bold text. For
Boldface
example, the New User window appears; click OK.
> Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Symbols
Convention Description
An alert that calls attention to important information that if not understood or followed
WARNING can result in personal injury.
An alert that calls attention to important information that if not understood or followed
CAUTION can result in data loss, data corruption, or damage to hardware or software.
788
Network topology icons
789
Index
account adjusting
configuring call route advanced settings for SIP echo adjustment function, 662
trunk account (SIP trunk), 624 echo cancellation parameters (line management),
663
790
echo duration (line management), 662 configuring gratuitous ARP, 365
ADSL/G.SHDSL configuring static ARP, 365
configuring interface (WAN), 47 creating static entry, 363
advanced limit (QoS), 257 displaying entries, 362
advanced queue (QoS), 258 enabling learning of dynamic ARP entries, 364
agent gratuitous ARP, 362
enabling SNMP agent function, 277 removing entries, 363
A-MSR20/30/50 series ARP attack protection
software upgrade (system management), 454 configuration, 371
upgrading software (system management), 455 configuring ARP automatic scanning, 372
A-MSR900/A-MSR20-1X series configuring fixed ARP (ARP attack protection), 374
software upgrade (system management), 439, 454 configuring periodic sending of gratuitous ARP
packets, 371
upgrading software (system management), 454
attack protection
analog voice subscriber lines
adding blacklist entry manually, 179
displaying detailed information (line states), 778
blacklist function, 175
appendix
configuration, 175
packet priorities (QoS), 272
configuring, 182
application
configuring blacklist function, 178
configuring application control for user group, 308
configuring detection, 180
enabling application layer protocol check (NAT),
157 configuring for A-MSR20/30/50 series routers,
185
typical applications (SIP trunk), 618
configuring for A-MSR900/20-1X series routers,
application control
182
configuration, 189
enabling blacklist function, 178
configuring, 189, 192
intrusion detection function, 175
configuring custom application, 190
viewing blacklist entries (attack protection), 179
configuring for user group, 308
authenticating
enabling, 191
configuring local MAC authentication, 94
loading applications, 189
configuring PSK authentication, 90
applying
configuring remote 802.1x authentication, 101
RSA digital signature in IKE negotiation (certificate
configuring remote MAC authentication, 97
management), 432
configuring WiNet-based RADIUS authentication,
area prefix
480
configuring (SIP local survival), 687
background
ARP
SIP trunk, 617
configuration, 362
791
background image introduction to BSV interface (data link
management), 642
setting background image for WiNet topology
diagram, 471 buffer capacity
backing up setting (syslog), 464
configuration (system management), 440 CAC
device files through USB port (system management), configuring CAC service (WLAN Qos), 140
442
setting CAC admission policy (WLAN QoS), 133
bandwidth control
cache
configuring for user group, 309
clearing dynamic domain name cache (DNS), 210
barge in service (call service), 519
call authority control
binding
configuring, 574
access number (IVR), 747
call backup (call service), 518
configuring source address binding (SIP
call barring (call service), 518
connection), 596
call connection
one-to-one binding between FXS and FXO voice
subscriber lines (line management), 662 configuration, 585
enabling blacklist function (attack protection), 178 SIP signaling encryption, 590
function (attack protection), 175 SIP support for transport layer protocols, 590
configuring caller ID blocking (SIP connection), support for SIP extensions, 592
608 call control (dial plan), 557
bridging call forwarding (call service), 517
adding interface to bridge set, 300 call hold (call service), 517
configuration, 299 call release
configuring, 299, 301 configuring call release cause code mapping (SIP
enabling bridge set, 299 connection), 606
792
advanced settings, 487 configuring call service, 525
basic settings, 487, 489 configuring call service of call route, 524
call services, 487 configuring call service of local number, 520
coding parameter, 541 configuring call transfer, 520, 528
configuration, 488 configuring call waiting, 520, 525
configuration (advanced settings), 541 configuring hunt group, 529
configuring (voice management), 490, 492 configuring silent monitor service, 534
configuring advanced settings, 548, 550 configuring three-party conference, 520, 532
configuring call route for inbound calls (SIP trunk), door opening control, 519
626
hunt group, 518
configuring call route for outbound calls (SIP trunk),
message waiting indication, 518
622
silent monitor service, 519
configuring call route for SIP trunk account (SIP
trunk), 622 support for SIP voice service of the VCX, 520
configuring call forwarding, 520, 526 applying RSA digital signature in IKE negotiation,
432
configuring call hold, 520
793
configuration, 412 setting EDCA parameters for wireless clients
(WLAN QoS), 134
configuring PKI, 413, 423
client mode
configuring PKI entity to request certificate from CA
(method I), 423 configuration (wireless service), 111
configuring PKI entity to request certificate from CA configuration guidelines, 116
(method II), 427
code
creating PKI domain, 416
configuring call release cause code mapping (SIP
creating PKI entity, 415 connection), 606
destroying RSA key pair, 420 configuring PSTN call release cause code mapping
(SIP connection), 606
displaying certificate, 420
configuring SIP status code mapping (SIP
displaying CRL, 422
connection), 607
generating RSA key pair, 419
district code (WLAN), 145
PKI operation, 412
managing pin code (3G management), 150
requesting local certificate, 421
setting district code (WLAN), 145
retrieving certificate, 420
codecs
retrieving CRL, 422
IVR, 705
channel
coding parameter
channel busy test (WLAN), 145
call route, 541
checking
local number, 541
enabling application layer protocol check (NAT),
community
157
configuring SNMP community, 280
CID
conference
CID on FXO voice subscriber line (call service),
520 three-party conference (call service), 518
CID on FXS voice subscriber line (call service), 519 configuring
clear type 802.11b/802.11g rates (radio), 121
configuring clear type wireless service, 64 802.11n, 108
clearing 802.11n MCS (radio), 122
dynamic domain name cache (DNS), 210 access control, 165
client access number (IVR), 715
configuring client-initiated VPN (L2TP), 396 access number advanced settings (IVR), 716
configuring DHCP client, 224 access number management (IVR), 715
displaying client information (wireless service), 82 access service-based VLAN, 88
displaying client mode statistics (wireless service), ACL, 247
113
ADSL/G.SHDSL interface (WAN), 47
displaying statistics (WLAN QoS), 138
advanced limit (QoS), 260
enabling client mode (wireless service), 111
794
advanced queue (QoS), 263, 269 call route for outbound calls (SIP trunk), 622
advanced settings (SIP connection), 602 call route for SIP trunk account (SIP trunk), 622
application control, 189, 192 call route modem parameters for SIP trunk account
(SIP trunk), 624
area prefix (SIP local survival), 687, 699
call route parameters (fax), 515
ARP automatic scanning (ARP attack protection),
372 call route parameters (modem), 515
attack protection, 182 call service, 525
attack protection for A-MSR20/30/50 series call service of call route, 524
routers, 185
call service of local number, 520
attack protection for A-MSR900/20-1X series
call transfer, 528
routers, 182
call transfer (call service), 520
barge in service (call service), 534
call waiting, 525
basic SIP calling features (SIP connection), 608
call waiting (call service), 520
blacklist function (attack protection), 178
caller ID blocking (SIP connection), 608
blacklist function (WLAN security), 126
caller identity (SIP connection), 598
bridging, 299, 301
caller privacy (SIP connection), 598
BSV line (data link management), 651
call-out route (SIP local survival), 686, 702
CAC service (WLAN QoS), 140
CE1/PRI interface (WAN), 51
call authority control, 574
channel busy test (WLAN), 146
call authority control (SIP local survival), 688, 694
clear type wireless service, 64
call control (dial plan), 559
client mode (wireless service), 114
call forwarding, 526
client-initiated VPN (L2TP), 396
call forwarding (call service), 520
codec tranparent transmission (SIP trunk), 626
call hold (call service), 520
codec transparent transmission (SIP-to-SIP call
call match rules (SIP trunk), 637
settings), 552
call node (IVR), 709
coding parameters for call route, 548
call node, jump node, and service node (IVR), 734
coding parameters for local number, 545
call release cause code mapping (SIP connection),
compatibility (SIP connection), 600
606
connection limit (NAT), 157
call route (advanced settings), 548, 550
connection properties (SIP connection), 593
call route (batch configuration) (IVR), 768
connection properties (VoIP), 485
call route (voice management), 490, 492
crypto type wireless service, 72
call route advanced settings for SIP trunk account
(SIP trunk), 624 CT1/PRI interface (WAN), 54
call route fax parameters for SIP trunk account (SIP custom application (application control), 190
trunk), 624 data transmit rates (radio), 121
call route for inbound calls (SIP trunk), 626 DDNS, 218, 219
795
DHCP, 232 hunt group (call service), 529
DHCP client, 224 immediate secondary call on a service node (IVR),
730
DHCP interface setup, 225
internal server (NAT), 155, 160
DHCP relay agent, 224, 240
IP addresses excluded from dynamic allocation
DHCP server, 223
(DHCP), 230
DHCP server group, 231
IPsec connection (IPsec VPN), 376
DHCP without relay agent, 233
IPsec VPN, 375, 384
dial plan, 558, 565
IPv4 static route, 200
digital link management (data link management),
ISDN line (line management), 672
643
IVR, 706, 717
direct calling for SIP UAs through SIP protocol
(configuring domain name) (voice management), IVR nodes, 709
495
jump node (IVR), 712, 728
direct calling for SIP UAs through SIP protocol
L2TP, 389, 396
(configuring static IP address) (voice
management), 492 line management, 663, 674
DMZ host (NAT), 154 line management (batch configuration) (IVR), 772
dynamic address pool for DHCP server, 228 local number (batch configuration) (IVR), 761
dynamic blacklist (WLAN security), 126 local number (voice management), 489, 492
dynamic domain name resolution (DNS), 208 local number parameters (fax), 512
dynamic rate limiting (WLAN QoS), 143 local numbers (VoIP), 485
E&M subscriber line (line management), 669 local SIP server to operate in alive mode (SIP local
survival), 692
entity type selection priority rules (dial plan), 570
local SIP server to operate in alone mode (SIP local
Ethernet interface (WAN), 43
survival), 689
extension secondary call on a call node (IVR), 726
login control, 360
fax, 512
MAC address filtering, 173
finishing configuration wizard (VoIP), 486
MAC address filtering type, 171
fixed ARP (ARP attack protection), 374
MAC addresses to be filtered, 172
FXO voice subscriber line (line management), 666,
match order of number selection rules (dial plan),
674
567
FXS voice subscriber line (line management), 663
media security (SIP connection), 598
global key policy (IVR), 707
modem, 512
gratuitous ARP, 365
MSTP, 333, 339
GRE over IPv4 tunnel, 402, 404
MSTP globally, 334
796
MSTP on port, 337 secondary call on a call node (match number
length) (IVR), 721
MSTP region, 333
secondary call on a call node (match number) (IVR),
NAT, 158
724
number match (dial plan), 558
secondary call on a call node (match terminator of
number match mode (dial plan), 565 numbers) (IVR), 717
number substitution (dial plan), 563, 577 secondary call on a service node (IVR), 732
out-of-band DTMF transmission mode for SIP (call service (SIP local survival), 684
route), 550
service management (system management), 444
parameters for call route (other than coding
service node (IVR), 714
parameter), 549
session properties (SIP connection), 595
parameters for local number (other than coding
parameter), 547 signaling security (SIP connection), 605
parameters for VLAN interface, 59 silent monitor service (call service), 534
periodic sending of gratuitous ARP packets (ARP SIP connection, 608
attack protection), 371
SIP listening (SIP connection), 597
PKI (certificate management), 413, 423
SIP local survival, 684, 689
PKI entity to request certificate from CA (method I)
SIP local survival services (batch configuration)
(certificate management), 423
(IVR), 776
PKI entity to request certificate from CA (method II)
SIP server group, 614
(certificate management), 427
SIP server group (SIP trunk), 620
private hosts to access public network (NAT), 158
SIP server group with multiple member servers (SIP
proxy server (SIP connection), 595
trunk), 635
proxy server involved calling for SIP UAs (voice
SIP server group with only one member server (SIP
management), 499
trunk), 627
PSK authentication, 90
SIP session refresh (SIP connection), 599
PSTN call release cause code mapping (SIP
SIP status code mapping (SIP connection), 607
connection), 606
SIP trunk, 619, 627
QoS, 258, 267
SIP trunk account, 621
RADIUS, 351
SNMP, 288
RADIUS scheme, 346
SNMP agent, 275
RADIUS user (WiNet), 473
SNMP agent (SNMP lite), 456
registrar (SIP connection), 593
SNMP community, 280
registration parameters (SIP connection), 602
SNMP group, 281
remote 802.1x authentication, 101
SNMP lite, 458
remote MAC authentication, 97
SNMP trap function, 285
route, 197
SNMP user, 283
rule for Ethernet frame header ACL, 253
SNMP view, 278
SA interface (WAN), 46
797
SNMPv1, 288 voice mailbox server (SIP connection), 604
SNMPv1 (SNMP lite), 458 VT1 line (data link management), 648
SNMPv2c, 288 whitelist (WLAN security), 128
SNMPv2c (SNMP lite), 458 whitelist function (WLAN security), 126
SNMPv3, 292 WiNet, 470, 474
SNMPv3 (SNMP lite), 459 WiNet establishment, 474
source address binding (SIP connection), 596 WiNet-based RADIUS authentication, 480
SRTP for SIP calls (SIP connection), 610 wireless access, 87
starting basic configuration wizard (web interface), wireless access service, 63
31
wireless QoS (WLAN QoS), 131, 140
static address pool for DHCP server, 226
wireless service, 87
static ARP, 365
connecting
static blacklist (WLAN security), 128
configuring connection limit (NAT), 157
static rate limiting (WLAN QoS), 142
configuring connection properties (VoIP), 485
subnet limit (QoS), 258, 267
configuring IPsec connection (IPsec VPN), 376
synchronizing user group configuration for WAN
displaying broadband connection information, 27
interfaces, 312
wireless service (client mode), 112
TCP to carry outgoing SIP calls (SIP connection),
611 contacting HP, 787
TLS to carry outgoing SIP calls (SIP connection), displaying by pages (web interface), 17
612 controlling
TR-069 (system management), 450, 452 calling party control (call service), 519
trunk mode calling (voice management), 506 configuring call authority control, 574
trusted nodes (SIP local survival), 686 door opening control (call service), 519
URL filtering, 169 creating
user, 306 GRE tunnel, 402
user (SIP local survival), 685 IPv4 ACL, 248
user group, 306, 312 IPv4 static route, 197
user isolation (WLAN security), 130 menu (IVR), 741
user-based load sharing, 204 PKI domain (certificate management), 416
VE1 line (data link management), 643 PKI entity (certificate management), 415
VLAN, 57 rule for advanced IPv4 ACL, 250
VLAN interface, 57 rule for basic IPv4 ACL, 249
VLAN member port, 59 static ARP entry, 363
voice functions (call service), 522 user (system management), 446
798
VLAN, 58 intrusion detection function (attack protection), 175
VLAN interface, 58 device
wireless access service, 63 rebooting (system management), 443
crypto type device information
configuring crypto type wireless service, 72 broadband connection, 27
CT1/PRI configuration, 25
configuring interface (WAN), 54 displaying, 25
customizing displaying 3G wireless card state, 28
services (IVR), 740, 747, 749 displaying detailed information, 27
data link management displaying LAN information, 29
configuration, 640 displaying recent system logs, 30
configuring BSV line, 651 displaying service information, 30
configuring E1, 657 displaying WLAN information, 29
configuring E1 voice DSS1 signaling, 657 DHCP
configuring T1, 657 configuration, 222
configuring VE1 line, 643 configuring, 232
configuring VT1 line, 648 configuring client, 224
displaying ISDN link state, 656 configuring DHCP server group, 231
E1 features, 641 configuring dynamic address pool for DHCP server,
228
E1 interface, 640
configuring interface setup, 225
E1 voice functions, 640
configuring IP addresses excluded from dynamic
introduction to BSV interface, 642
allocation, 230
introduction to E1, 640
configuring relay agent, 224, 240
introduction to T1, 640
configuring server, 223
T1 features, 641
configuring static address pool for DHCP server,
T1 interface, 640 226
T1 voice functions, 640 configuring without relay agent, 233
DDNS enabling, 225
configuration, 217 DHCP relay agent
configuring, 218, 219 configuration guidelines, 246
destroying diagnostic tools
RSA key pair (certificate management), 420 configuration, 466
detecting ping, 466
configuring intrusion detection (attack protection), ping operation, 467
180
tools operations, 467
799
trace route, 466 active call summary (call statistics), 780
trace route operation, 467 active route table, 199
dial plan ARP entries, 362
call control, 557 broadband connection information, 27
configuration, 553 call statistics, 779
configuring, 558, 565 certificate (certificate management), 420
configuring call control, 559 client information (wireless service), 82
configuring entity type selection priority rules, 570 client mode statistics (wireless service), 113
configuring match order of number selection rules, client statistics (WLAN QoS), 138
567
configuration wizard homepage (VoIP), 484
configuring number match, 558
content by pages (web interface), 17
configuring number match mode, 565
CRL (certificate management), 422
configuring number substitution, 563, 577
detailed device information, 27
functions, 556
detailed information (radio), 123
number match, 556
detailed information about analog voice subscriber
number substitution, 557 lines (line states), 778
process, 553 detailed information about digital voice subscriber
lines (line states), 778
regular expression, 554
device information, 25
digital link management
external interface traffic ordering statistics, 207
configuring (data link management), 643
history call summary (call statistics), 780
digital signature
internal interface traffic ordering statistics, 206
applying RSA digital signature in IKE negotiation
(certificate management), 432 IPsec VPN monitoring information, 383
digital voice subscriber lines ISDN link state (data link management), 656
displaying detailed information (line states), 778 IVR call states, 785
direct calling IVR information, 785
configuring for SIP UAs through SIP protocol IVR play states, 786
(configuring domain name) (voice management),
L2TP tunnel information, 396
495
LAN information, 29
configuring for SIP UAs through SIP protocol
(configuring static IP address) (voice line states, 777
management), 492 local survival service states, 783
disabling number register status (SIP UA states), 782
web-based NM, 21 number subscription status (SIP UA states), 783
displaying radio information, 123
3G information (3G management), 148 radio statistics (WLAN QoS), 136
3G wireless card state information, 28 recent system logs, 30
800
RF ping information (wireless service), 86 domain name
server group information, 785 configuring domain name suffix (DNS), 211
service information, 30 door
SIP trunk account states, 784 door opening control (call service), 519
SIP UA states, 781 DTMF
SNMP packet statistics, 287 configuring out-of-band DTMF transmission mode
for SIP (call route), 550
states, 777
duration
statistics, 777
adjusting echo duration (line management), 662
syslog, 462
E&M
TCP connection information (SIP UA states), 781
configuring E&M subscriber line (line management),
TLS connection information (SIP UA states), 782
669
wireless access service information, 80
E&M subscriber line (line management), 660
wireless service information, 80
E1
wireless services bound to a radio, 123
configuring (data link management), 657
WLAN information, 29
configuring voice DSS1 signaling (data link
district management), 657
district code (WLAN), 145 features (data link management), 641
setting district code (WLAN), 145 interface (data link management), 640
DMZ introduction (data link management), 640
configuring DMZ host (NAT), 154 voice functions (data link management), 640
DNS echo
clearing dynamic domain name cache, 210 adjusting echo cancellation parameters (line
configuration, 208 management), 663
configuring domain name resolution, 211 adjusting echo duration (line management), 662
configuring domain name suffix, 211 enabling echo cancellation nonlinear function (line
management), 663
configuring dynamic domain name resolution, 208
echo adjustment function (line management), 662
enabling DNS proxy, 209, 210
EDCA
enabling dynamic domain name resolution, 210
setting EDCA parameters for wireless clients
specifying server, 210 (WLAN QoS), 134
documentation setting radio EDCA parameters for APs (WLAN
conventions used, 788 QoS), 133
configuring PKI domain (certificate management), application layer protocol check (NAT), 157
416 blacklist function (attack protection), 178
801
bridge set, 299 call route, 487
client mode (wireless service), 111 configuration, 510
DHCP, 225 configuring, 512
DNS proxy, 209, 210 configuring call route fax parameters for SIP trunk
account (SIP trunk), 624
dynamic domain name resolution (DNS), 210
configuring call route parameters, 515
echo cancellation nonlinear function (line
management), 663 configuring local number parameters, 512
L2TP, 389 flow, 511
learning of dynamic ARP entries, 364 FoIP, 510
SIP trunk function, 620 local number, 487
SNMP agent function, 277 methods, 511
web-based NM, 21 features
WiNet, 470 SIP (call connection), 586
wireless QoS (WLAN QoS), 131 SIP trunk, 618
entity filtering
configuring entity type selection priority rules (dial configuring MAC address filtering, 173
plan), 570
configuring MAC address filtering type, 171
configuring PKI entity (certificate management),
configuring MAC addresses to be filtered, 172
415
finishing
configuring PKI entity to request certificate from CA
(method I) (certificate management), 423 configuration wizard (VoIP), 486
Ethernet function
configuring rule for Ethernet frame header ACL, configuring SNMP trap function, 285
253 configuring voice functions (call service), 522
extension dial plan, 556
support for SIP extensions (call connection), 592 echo adjustment function (line management), 662
fax
802
enabling echo cancellation nonlinear function (line configuring bandwidth control for user group, 309
management), 663
configuring packet filtering for user group, 310
enabling SNMP agent function, 277
configuring SNMP group, 281
intrusion detection (attack protection), 175
configuring user group, 306, 312
SIP (call connection), 586
hunt group (call service), 518
SIP Modem pass-through function, 512
history call summary
TR-069 basic functions (system management), 451
displaying (call statistics), 780
fundamentals
host
SIP (call connection), 587
configuring DMZ host (NAT), 154
FXO
configuring private hosts to access public network
configuring FXO voice subscriber line (line (NAT), 158
management), 666, 674
HP
configuring one-to-one binding between FXS and
customer support and resources, 787
FXO (line management), 675
document conventions, 788
FXO voice subscriber line (line management), 660
documents and manuals, 787
one-to-one binding between FXS and FXO voice
subscriber lines (line management), 662 icons used, 788
CID on FXO voice subscriber line (call service), support contact information, 787
520 symbols used, 788
CID on FXS voice subscriber line (call service), 519 websites, 787
configuring FXS voice subscriber line (line hunt group (call service), 518
management), 663
icons, 788
configuring one-to-one binding between FXS and
FXO (line management), 675 identy
FXS voice subscriber line (line management), 660 configuring caller identity (SIP connection), 598
803
displaying IPsec VPN monitoring information, 383 creating IPv4 ACL, 248
displaying L2TP tunnel information, 396 creating IPv4 static route, 197
displaying wireless access service information, 80 creating rule for advanced IPv4 ACL, 250
displaying wireless service information, 80 creating rule for basic IPv4 ACL, 249
viewing general information of an interface (WAN), IPv4 static route
55
configuration guidelines, 202
initializing
ISDN
configuration (system management), 440
configuring ISDN line (line management), 672
initiating
displaying ISDN link state (data link management),
configuring client-initiated VPN (L2TP), 396 656
integrating isolating
service management, 30 user isolation (WLAN security), 129
interface IVR
adding interface to bridge set, 300 advantages, 705
displaying external interface traffic ordering batch configuration, 761
statistics, 207
binding access number, 747
displaying internal interface traffic ordering
codecs, 705
statistics, 206
configuration, 705
introduction to BSV interface (data link
management), 642 configuration (advanced), 760
804
configuring nodes, 709 enabling, 389
configuring secondary call on a call node (match LAN
number length), 721
displaying information, 29
configuring secondary call on a call node (match
setting interface parameters (web interface), 38
number), 724
layer
configuring secondary call on a call node (match
terminator of numbers), 717 enabling application layer protocol check (NAT),
157
configuring secondary call on a service node, 732
level
configuring service node, 714
setting super password for switching to
configuring SIP local survival services (batch
management level, 447
configuration), 776
switching user access level to management level,
creating menu, 741
448
customizable process, 705
limiting
customizable voice prompts, 705
configuring connection limit (NAT), 157
customizing services, 740, 747, 749
configuring dynamic rate limiting (WLAN QoS),
error processing methods, 706 143
flexible node configuration, 705 configuring static rate limiting (WLAN QoS), 142
global configuration, 760 setting rate limiting (WLAN QoS), 139
successive jumping, 706 line
timeout processing methods, 706 CID on FXO voice subscriber line (call service),
520
types of secondary calls, 706
CID on FXS voice subscriber line (call service), 519
uploading media resource files, 706
line management
IVR call states
adjusting echo cancellation parameters, 663
displaying, 785
adjusting echo duration, 662
IVR information
configuration, 660
displaying, 785
configuring, 663, 674
IVR play states
configuring E&M subscriber line, 669
displaying, 786
configuring FXO voice subscriber line, 666, 674
jumping
configuring FXS voice subscriber line, 663
successive (IVR), 706
configuring ISDN line, 672
L2TP
configuring one-to-one binding between FXS and
adding L2TP group, 390
FXO, 675
configuration, 388
E&M subscriber line, 660
configuring, 389, 396
echo adjustment function, 662
configuring client-initiated VPN, 396
enabling echo cancellation nonlinear function, 663
displaying L2TP tunnel information, 396
FXO voice subscriber line, 660
805
FXS voice subscriber line, 660 web interface, 1
one-to-one binding between FXS and FXO voice logging out
subscriber lines, 662
web interface, 2
line states
loghost
displaying, 777
setting (syslog), 463
listening
login control
configuring SIP listening (SIP connection), 597
configuration, 359
loading
configuring, 360
applications (application control), 189
MAC
local
configuring local MAC authentication, 94
configuring call service of local number, 520
configuring remote MAC authentication, 97
configuring local number (voice management),
MAC address filtering
489
configuration, 171
requesting local certificate (certificate
management), 421 configuring, 173
806
media introduction, 327
configuring media security (SIP connection), 598 protocol, 332
menu standard, 332
creating (IVR), 741 NAT
message configuration, 152
message waiting indication (call service), 518 configuring, 158
SIP (call connection), 587 configuring connection limit, 157
message waiting indication (call service), 518 configuring DMZ host, 154
method configuring dynamic NAT, 152
fax, 511 configuring internal server, 155, 160
mode configuring private hosts to access public network,
158
configuring out-of-band DTMF transmission mode
for SIP (call route), 550 enabling application layer protocol check, 157
configuring trunk mode calling (voice negotiating
management), 506
applying RSA digital signature in IKE negotiation
specifying traffic ordering mode, 206 (certificate management), 432
modem network
call route, 487 configuring private hosts to access public network
(NAT), 158
configuration, 510
TR-069 network framework (system management),
configuring, 512
451
configuring call route modem parameters for SIP
network management
trunk account (SIP trunk), 624
disabling web-based NM, 21
configuring call route parameters, 515
enabling web-based NM, 21
configuring local number parameters, 512
integrated service management, 30
local number, 487
introduction to web-based functions, 4
SIP Modem pass-through function, 512
managing web-based NM through CLI, 21
monitoring
web-based, 1
displaying IPsec VPN monitoring information, 383
node
silent monitor service (call service), 519
flexible node configuration (IVR), 705
MSTP
number
configuration, 320
configuring call service of local number, 520
configuration guidelines, 344
configuring match order of number selection rules
configuring, 333, 339
(dial plan), 567
configuring globally, 334
number match (dial plan), 556
configuring MSTP region, 333
number register status
configuring on port, 337
displaying (SIP UA states), 782
807
number subscription status pin
displaying (SIP UA states), 783 managing pin code (3G management), 150
number substitution (dial plan), 557 ping, 466
order operation (diagnostic tools), 467
configuring match order of number selection rules PKI
(dial plan), 567
configuration guidelines, 438
outbound call
configuring (certificate management), 413, 423
configuring call route for outbound calls (SIP trunk),
configuring PKI entity to request certificate from CA
622
(method I) (certificate management), 423
overview
configuring PKI entity to request certificate from CA
call route, 487 (method II) (certificate management), 427
local number, 487 creating PKI domain (certificate management), 416
web-based network management, 1 creating PKI entity (certificate management), 415
packet operation, 412
appendix packet priorities (QoS), 272 port
configuring packet filtering for user group, 310 backing up device files through USB port (system
management), 442
displaying SNMP packet statistics, 287
configuring MSTP on port, 337
parameter
configuring VLAN member port, 59
adjusting echo cancellation parameters (line
management), 663 restoring device files through USB port (system
management), 442
coding parameter (call route), 541
priority
coding parameter (local number), 541
configuring entity type selection priority rules (dial
configuring call route fax parameters for SIP trunk
plan), 570
account (SIP trunk), 624
privacy
configuring call route modem parameters for SIP
trunk account (SIP trunk), 624 configuring caller privacy (SIP connection), 598
configuring parameters for VLAN interface, 59 procedure
configuring registration parameters (SIP adding blacklist entry manually (attack protection),
connection), 602 179
optional parameters (call route), 545 adding interface to bridge set, 300
optional parameters (local number), 545 adding L2TP group, 390
party applying RSA digital signature in IKE negotiation
(certificate management), 432
calling party control (call service), 519
backing up device files through USB port (system
three-party conference (call service), 518
management), 442
password
binding access number (IVR), 747
setting super password for switching to
clearing dynamic domain name cache (DNS), 210
management level, 447
configuring 802.11b/802.11g rates (radio), 121
808
configuring 802.11n, 108 configuring call authority control (SIP local survival),
688, 694
configuring 802.11n MCS (radio), 122
configuring call control (dial plan), 559
configuring access control, 165
configuring call forwarding, 526
configuring access control for user group, 307
configuring call forwarding (call service), 520
configuring access number (IVR), 715
configuring call hold (call service), 520
configuring access number advanced settings (IVR),
716 configuring call match rules (SIP trunk), 637
configuring access number management (IVR), configuring call node (IVR), 709
715
configuring call node, jump node, and service
configuring access service-based VLAN, 88 node (IVR), 734
configuring ACL, 247 configuring call release cause code mapping (SIP
connection), 606
configuring ADSL/G.SHDSL interface (WAN), 47
configuring call route (advanced settings), 548,
configuring advanced limit (QoS), 260
550
configuring advanced queue (QoS), 263, 269
configuring call route (batch configuration) (IVR),
configuring advanced settings (SIP connection), 768
602
configuring call route (voice management), 490,
configuring application control, 189, 192 492
configuring application control for user group, 308 configuring call route advanced settings for SIP
configuring area prefix (SIP local survival), 687, trunk account (SIP trunk), 624
699 configuring call route fax parameters for SIP trunk
configuring ARP automatic scanning (ARP attack account (SIP trunk), 624
protection), 372 configuring call route for inbound calls (SIP trunk),
configuring attack protection, 182 626
configuring attack protection for A-MSR20/30/50 configuring call route for outbound calls (SIP trunk),
series routers, 185 622
configuring attack protection for A-MSR900/20-1X configuring call route for SIP trunk account (SIP
series routers, 182 trunk), 622
configuring bandwidth control for user group, 309 configuring call route modem parameters for SIP
trunk account (SIP trunk), 624
configuring barge in service (call service), 534
configuring call route parameters (fax), 515
configuring basic SIP calling features (SIP
connection), 608 configuring call route parameters (modem), 515
809
configuring caller ID blocking (SIP connection), configuring digital link management (data link
608 management), 643
configuring caller identity (SIP connection), 598 configuring direct calling for SIP UAs through SIP
protocol (configuring domain name) (voice
configuring caller privacy (SIP connection), 598
management), 495
configuring call-out route (SIP local survival), 686,
configuring direct calling for SIP UAs through SIP
702
protocol (configuring static IP address) (voice
configuring CE1/PRI interface (WAN), 51 management), 492
configuring channel busy test (WLAN), 146 configuring DMZ host (NAT), 154
configuring clear type wireless service, 64 configuring domain name resolution (DNS), 211
configuring client mode (wireless service), 114 configuring domain name suffix (DNS), 211
configuring client-initiated VPN (L2TP), 396 configuring dynamic address pool for DHCP server,
configuring codec tranparent transmission (SIP 228
trunk), 626 configuring dynamic blacklist (WLAN security),
configuring codec tranparent transmission 126
(SIP-to-SIP call settings), 552 configuring dynamic domain name resolution
configuring coding parameters for call route, 548 (DNS), 208
configuring coding parameters for local number, configuring dynamic NAT, 152
545 configuring dynamic rate limiting (WLAN QoS),
configuring compatibility (SIP connection), 600 143
configuring connection limit (NAT), 157 configuring E&M subscriber line (line management),
669
configuring connection properties (SIP connection),
593 configuring E1 (data link management), 657
configuring connection properties (VoIP), 485 configuring E1 voice DSS1 signaling (data link
management), 657
configuring crypto type wireless service, 72
configuring entity type selection priority rules (dial
configuring CT1/PRI interface (WAN), 54 plan), 570
configuring custom application (application configuring Ethernet interface (WAN), 43
control), 190
configuring extension secondary call on a call
configuring data transmit rates (radio), 121 node (IVR), 726
configuring DDNS, 218, 219 configuring fax, 512
configuring DHCP, 232 configuring fixed ARP (ARP attack protection), 374
configuring DHCP client, 224 configuring FXO voice subscriber line (line
configuring DHCP interface setup, 225 management), 666, 674
configuring DHCP relay agent, 224, 240 configuring FXS voice subscriber line (line
management), 663
configuring DHCP server, 223
configuring global key policy (IVR), 707
configuring DHCP server group, 231
configuring gratuitous ARP, 365
configuring DHCP without relay agent, 233
configuring GRE over IPv4 tunnel, 402, 404
configuring dial plan, 558, 565
configuring hunt group (call service), 529
810
configuring immediate secondary call on a service configuring media security (SIP connection), 598
node (IVR), 730
configuring modem, 512
configuring internal server (NAT), 155, 160
configuring MSTP, 333, 339
configuring intrusion detection (attack protection),
configuring MSTP globally, 334
180
configuring MSTP on port, 337
configuring IP addresses excluded from dynamic
allocation (DHCP), 230 configuring MSTP region, 333
configuring IPsec VPN, 375, 384 configuring number match (dial plan), 558
configuring IPv4 static route, 200 configuring number match mode (dial plan), 565
configuring ISDN line (line management), 672 configuring number substitution (dial plan), 563,
577
configuring IVR, 706, 717
configuring one-to-one binding between FXS and
configuring IVR nodes, 709
FXO (line management), 675
configuring jump node (IVR), 712, 728
configuring out-of-band DTMF transmission mode
configuring L2TP, 389, 396 for SIP (call route), 550
configuring line management, 663, 674 configuring packet filtering for user group, 310
configuring line management (batch configuration) configuring parameters for call route (other than
(IVR), 772 coding parameter), 549
configuring local MAC authentication, 94 configuring parameters for local number (other
than coding parameter), 547
configuring local number (advanced settings), 545
configuring parameters for VLAN interface, 59
configuring local number (batch configuration)
(IVR), 761 configuring periodic sending of gratuitous ARP
packets (ARP attack protection), 371
configuring local number (voice management),
489, 492 configuring PKI (certificate management), 413,
423
configuring local number parameters (fax), 512
configuring PKI domain (certificate management),
configuring local number parameters (modem),
416
512
configuring PKI entity (certificate management),
configuring local numbers (VoIP), 485
415
configuring local SIP server to operate in alive
configuring PKI entity to request certificate from CA
mode (SIP local survival), 692
(method I) (certificate management), 423
configuring local SIP server to operate in alone
configuring PKI entity to request certificate from CA
mode (SIP local survival), 689
(method II) (certificate management), 427
configuring login control, 360
configuring private hosts to access public network
configuring MAC address filtering, 173 (NAT), 158
configuring MAC address filtering type, 171 configuring proxy server (SIP connection), 595
configuring MAC addresses to be filtered, 172 configuring proxy server involved calling for SIP
configuring match order of number selection rules UAs (voice management), 499
(dial plan), 567 configuring PSK authentication, 90
811
configuring PSTN call release cause code mapping configuring SIP server group (SIP trunk), 620
(SIP connection), 606
configuring SIP server group with multiple member
configuring QoS, 258, 267 servers (SIP trunk), 635
configuring RADIUS, 351 configuring SIP server group with only one member
server (SIP trunk), 627
configuring RADIUS scheme, 346
configuring SIP session refresh (SIP connection),
configuring RADIUS user (WiNet), 473
599
configuring registrar (SIP connection), 593
configuring SIP status code mapping (SIP
configuring registration parameters (SIP connection), 607
connection), 602
configuring SIP trunk, 619, 627
configuring remote 802.1x authentication, 101
configuring SIP trunk account, 621
configuring remote MAC authentication, 97
configuring SNMP, 288
configuring route, 197
configuring SNMP agent, 275
configuring rule for Ethernet frame header ACL,
configuring SNMP agent (SNMP lite), 456
253
configuring SNMP community, 280
configuring SA interface (WAN), 46
configuring SNMP group, 281
configuring secondary call on a call node (match
number length) (IVR), 721 configuring SNMP lite, 458
configuring secondary call on a call node (match configuring SNMP trap function, 285
number) (IVR), 724
configuring SNMP user, 283
configuring secondary call on a call node (match
configuring SNMP view, 278
terminator of numbers) (IVR), 717
configuring SNMPv1, 288
configuring secondary call on a service node (IVR),
732 configuring SNMPv1 (SNMP lite), 458
812
configuring TCP to carry outgoing SIP calls (SIP creating IPv4 ACL, 248
connection), 611
creating IPv4 static route, 197
configuring three-party conference (call service),
creating menu (IVR), 741
520, 532
creating rule for advanced IPv4 ACL, 250
configuring TLS to carry outgoing SIP calls (SIP
connection), 612 creating rule for basic IPv4 ACL, 249
configuring TR-069 (system management), 452 creating static ARP entry, 363
configuring trunk mode calling (voice creating user (system management), 446
management), 506 creating VLAN, 58
configuring trusted nodes (SIP local survival), 686 creating VLAN interface, 58
configuring URL filtering, 169 creating wireless access service, 63
configuring user, 306 destroying RSA key pair (certificate management),
configuring user (SIP local survival), 685 420
configuring user isolation (WLAN security), 130 displaying 3G wireless card state information, 28
configuring user-based load sharing, 204 displaying active call summary (call statistics), 780
configuring VE1 line (data link management), 643 displaying active route table, 199
configuring voice functions (call service), 522 displaying certificate (certificate management),
420
configuring voice mailbox server (SIP connection),
604 displaying client information (wireless service), 82
configuring VT1 line (data link management), 648 displaying client mode statistics (wireless service),
113
configuring whitelist (WLAN security), 128
displaying client statistics (WLAN QoS), 138
configuring whitelist function (WLAN security), 126
displaying configuration wizard homepage (VoIP),
configuring WiNet, 470, 474
484
configuring WiNet establishment, 474
displaying CRL (certificate management), 422
configuring WiNet-based RADIUS authentication,
displaying detailed device information, 27
480
displaying detailed information about analog voice
configuring wireless access, 87
subscriber lines (line states), 778
configuring wireless access service, 63
displaying detailed information about digital voice
configuring wireless QoS (WLAN Qos), 140 subscriber lines (line states), 778
configuring wireless QoS (WLAN QoS), 131 displaying device information, 25
configuring wireless service, 87 displaying external interface traffic ordering
statistics, 207
connecting wireless service (client mode), 112
displaying history call summary (call statistics), 780
creating GRE tunnel, 402
813
displaying internal interface traffic ordering enabling bridge set, 299
statistics, 206
enabling DHCP, 225
displaying IPsec VPN monitoring information, 383
enabling DNS proxy, 209, 210
displaying ISDN link state (data link management),
enabling dynamic domain name resolution (DNS),
656
210
displaying IVR call states, 785
enabling L2TP, 389
displaying IVR information, 785
enabling learning of dynamic ARP entries, 364
displaying IVR play states, 786
enabling SIP trunk function, 620
displaying L2TP tunnel information, 396
enabling SNMP agent function, 277
displaying LAN information, 29
enabling WiNet, 470
displaying line states, 777
enabling wireless QoS (WLAN QoS), 131
displaying local survival service states, 783
finishing configuration wizard (VoIP), 486
displaying number register status (SIP UA states),
generating RSA key pair (certificate management),
782
419
displaying number subscription status (SIP UA
loading applications (application control), 189
states), 783
logging in to web interface, 1
displaying radio statistics (WLAN QoS), 136
logging out of the web interface, 2
displaying recent system logs, 30
managing pin code (3G management), 150
displaying RF ping information (wireless service),
86 managing service (system management), 443
displaying server group information, 785 managing users (system management), 446
displaying SIP trunk account states, 784 rebooting device (system management), 443
displaying wireless service information, 80 setting background image for WiNet topology
diagram, 471
displaying wireless services bound to a radio, 123
setting buffer capacity (syslog), 464
displaying WLAN information, 29
setting CAC admission policy (WLAN QoS), 133
enabling application control, 191
setting EDCA parameters for wireless clients
enabling application layer protocol check (NAT),
(WLAN QoS), 134
157
enabling blacklist function (attack protection), 178
814
setting LAN interface parameters (web interface), viewing blacklist entries (attack protection), 179
38
viewing general information of an interface (WAN),
setting loghost (syslog), 463 55
setting radio EDCA parameters for APs (WLAN process
QoS), 133
customizable (IVR), 705
setting rate limiting (WLAN QoS), 139
dial plan, 553
setting refresh interval (syslog), 464
property
setting super password for switching to
configuring connection properties (VoIP), 485
management level, 447
configuring session properties (SIP connection),
setting SVP service (WLAN QoS), 132
595
setting traffic ordering interval, 206
protocol
setting WAN interface parameters (web interface),
configuring direct calling for SIP UAs through SIP
31
protocol (configuring domain name) (voice
setting WAN interface parameters for management), 495
ADSL/G.SHDSL (web interface), 34
configuring direct calling for SIP UAs through SIP
setting WAN interface parameters for CE1/PR1 protocol (configuring static IP address) (voice
(web interface), 36 management), 492
setting WAN interface parameters for CT1/PR1 enabling application layer protocol check (NAT),
(web interface), 38 157
setting WAN interface parameters for Ethernet FoIP (fax), 510
(web interface), 32
MSTP, 332
setting WAN interface parameters for SA (web
SIP support for transport layer protocols (call
interface), 34
connection), 590
setting WLAN interface parameters (web interface),
SIP trunk, 619
40
proxy
specifying DNS server, 210
configuring proxy server (SIP connection), 595
specifying traffic ordering mode, 206
configuring proxy server involved calling for SIP
starting basic configuration wizard (web interface),
UAs (voice management), 499
31
enabling DNS proxy, 209, 210
switching user access level to management level,
448 PSK
815
configuration, 256 device (system management), 443
configuring, 258, 267 refresh
configuring advanced limit, 260 configuring SIP session refresh (SIP connection),
599
configuring advanced queue, 263, 269
refresh interval
configuring subnet limit, 258, 267
setting (syslog), 464
configuring wireless QoS (WLAN QoS), 131
registering
enabling wireless QoS (WLAN QoS), 131
configuring registration parameters (SIP
subnet limit, 257
connection), 602
queue
regular expression (dial plan), 554
advanced queue (QoS), 258
relay agent
radio
configuring DHCP relay agent, 224
configuration, 117
removing
configuring 802.11b/802.11g rates, 121
ARP entries, 363
configuring 802.11n MCS, 122
requesting
configuring data transmit rates, 121
local certificate (certificate management), 421
displaying detailed information, 123
restoring
displaying information, 123
configuration (system management), 441
displaying statistics (WLAN QoS), 136
device files through USB port (system management),
displaying wireless services bound to a radio, 123 442
setting radio EDCA parameters for APs (WLAN retrieving
QoS), 133
certificate (certificate management), 420
RADIUS
CRL (certificate management), 422
configuration, 346
RF ping
configuring, 351
displaying RF ping information (wireless service),
configuring RADIUS user (WiNet), 473 86
configuring scheme, 346 route
configuring WiNet-based RADIUS authentication, configuration, 197
480
configuring, 197
RADIUS client
configuring call route (voice management), 490
configuration guidelines, 357
configuring call service of a call route, 524
rate
configuring IPv4 static route, 200
configuring dynamic rate limiting (WLAN QoS),
creating IPv4 static route, 197
143
displaying active route table, 199
configuring static rate limiting (WLAN QoS), 142
RSA
setting rate limiting (WLAN QoS), 139
applying RSA digital signature in IKE negotiation
rebooting
(certificate management), 432
816
destroying key pair (certificate management), 420 configuring match order of number selection rules
(dial plan), 567
generating key pair (certificate management), 419
country (VoIP), 484
RSTP
sending
introduction, 327
configuring periodic sending of gratuitous ARP
rule
packets (ARP attack protection), 371
configuring call match rules (SIP trunk), 637
server
configuring entity type selection priority rules (dial
configuring DHCP server, 223
plan), 570
configuring DHCP server group, 231
configuring match order of number selection rules
(dial plan), 567 configuring internal server (NAT), 155, 160
configuring rule for Ethernet frame header ACL, configuring proxy server (SIP connection), 595
253
configuring proxy server involved calling for SIP
creating rule for advanced IPv4 ACL, 250 UAs (voice management), 499
creating rule for basic IPv4 ACL, 249 configuring voice mailbox server (SIP connection),
604
SA
specifying DNS server, 210
configuring interface (WAN), 46
server group information
saving
displaying, 785
configuration (system management), 439
service
scanning
configuring (SIP local survival), 684
configuring ARP automatic scanning (ARP attack
protection), 372 configuring CAC service (WLAN Qos), 140
scheme customizing (IVR), 740, 747, 749
configuring RADIUS scheme, 346 displaying information, 30
searching displaying wireless access service information, 80
web interface, 18 displaying wireless service information, 80
security integrated management, 30
configuring media security (SIP connection), 598 support for SIP voice service of the VCX (call
service), 520
configuring signaling security (SIP connection),
605 validating basic services configuration (web
interface), 41
SIP (call connection), 590
session
SIP media flow encryption (call connection), 591
configuring session properties (SIP connection),
SIP signaling encryption (call connection), 590
595
SIP TLS-SRTP combinations (call connection), 591
configuring SIP session refresh (SIP connection),
selecting 599
configuring entity type selection priority rules (dial setting
plan), 570
background image for WiNet topology diagram,
471
817
buffer capacity (syslog), 464 configuring direct calling for SIP UAs through SIP
protocol (configuring static IP address) (voice
CAC admission policy (WLAN QoS), 133
management), 492
district code (WLAN), 145
configuring out-of-band DTMF transmission mode
EDCA parameters for wireless clients (WLAN QoS), for SIP (call route), 550
134
configuring proxy server involved calling for SIP
LAN interface parameters (web interface), 38 UAs (voice management), 499
loghost (syslog), 463 features (call connection), 586
radio EDCA parameters for APs (WLAN QoS), functions (call connection), 586
133
fundamentals (call connection), 587
rate limiting (WLAN QoS), 139
media flow encryption (call connection), 591
refresh interval (syslog), 464
messages (call connection), 587
super password for switching to management level,
security (call connection), 590
447
signaling encryption (call connection), 590
SVP service (WLAN QoS), 132
SIP Modem pass-through function, 512
system time (system management), 449
support for SIP extensions (call connection), 592
system time zone (system management), 450
support for SIP voice service of the VCX (call
traffic ordering interval, 206
service), 520
WAN interface parameters (web interface), 31
support for transport layer protocols (call
WAN interface parameters for ADSL/G.SHDSL connection), 590
(web interface), 34
terminology (call connection), 585
WAN interface parameters for CE1/PR1 (web
TLS-SRTP combinations (call connection), 591
interface), 36
SIP (call connection), 585
WAN interface parameters for CT1/PR1 (web
interface), 38 SIP connection
WAN interface parameters for Ethernet (web configuration, 593
interface), 32
configuring, 608
WAN interface parameters for SA (web interface),
configuring advanced settings, 602
34
configuring basic SIP calling features, 608
WLAN interface parameters (web interface), 40
configuring call release cause code mapping, 606
signaling
configuring caller ID blocking, 608
configuring E1 voice DSS1 signaling (data link
management), 657 configuring caller identity, 598
818
configuring PSTN call release cause code mapping, configuring call route advanced settings for SIP
606 trunk account, 624
configuring registrar, 593 configuring call route fax parameters for SIP trunk
account, 624
configuring registration parameters, 602
configuring call route for inbound calls, 626
configuring session properties, 595
configuring call route for outbound calls, 622
configuring signaling security, 605
configuring call route for SIP trunk account, 622
configuring SIP listening, 597
configuring call route modem parameters for SIP
configuring SIP session refresh, 599
trunk account, 624
configuring SIP status code mapping, 607
configuring codec transparent transmission, 626
configuring source address binding, 596
configuring SIP server group, 620
configuring SRTP for SIP calls, 610
configuring SIP server group with multiple member
configuring TCP to carry outgoing SIP calls, 611 servers, 635
configuring TLS to carry outgoing SIP calls, 612 configuring SIP server group with only one member
configuring voice mailbox server, 604 server, 627
configuring local SIP server to operate in alive SIP trunk account states
mode, 692 displaying, 784
configuring local SIP server to operate in alone SIP UA states
mode, 689
displaying, 781
configuring service, 684
SIP-to-SIP call settings
configuring trusted nodes, 686
configuration, 552
configuring user, 685
configuring codec transparent transmission, 552
SIP server group management
SNMP
configuration, 614
configuration, 275
configuring SIP server group, 614
configuring, 288
SIP trunk
configuring community, 280
background, 617
configuring group, 281
configuration, 617
configuring SNMP agent, 275
configuring, 619, 627
configuring SNMPv1, 288
configuring call match rules, 637
configuring SNMPv2c, 288
configuring SNMPv3, 292
819
configuring trap function, 285 displaying, 777
configuring user, 283 displaying client statistics (WLAN QoS), 138
configuring view, 278 displaying external interface traffic ordering
statistics, 207
displaying SNMP packet statistics, 287
displaying internal interface traffic ordering
enabling SNMP agent function, 277
statistics, 206
SNMP lite
displaying radio statistics (WLAN QoS), 136
configuration, 456
displaying SNMP packet statistics, 287
configuring, 458
viewing statistics of an interface (WAN), 55
configuring SNMP agent, 456
status
configuring SNMPv1, 458
configuring SIP status code mapping (SIP
configuring SNMPv2c, 458 connection), 607
configuring SNMPv3, 459 subnet limit (QoS), 257
software upgrade subscriber
A-MSR20/30/50 series (system management), CID on FXO voice subscriber line (call service),
454 520
A-MSR900/A-MSR20-1X series (system CID on FXS voice subscriber line (call service), 519
management), 454
configuring E&M subscriber line (line management),
sorting 669
web interface, 20 configuring FXO voice subscriber line (line
source management), 666, 674
configuring source address binding (SIP configuring FXS voice subscriber line (line
connection), 596 management), 663
DNS server, 210 FXO voice subscriber line (line management), 660
traffic ordering mode, 206 FXS voice subscriber line (line management), 660
820
setting super password for switching to software upgrade for A-MSR900/A-MSR20-1X
management level, 447 series, 454
user access level to management level, 448 switching user access level to management level,
448
symbols, 788
system time, 448
synchronizing
TR-069 basic functions, 451
user group configuration for WAN interfaces, 312
TR-069 network framework, 451
syslog
upgrading software for A-MSR20/30/50 series,
configuration, 462
455
displaying, 462
upgrading software for A-MSR900/A-MSR20-1X
setting buffer capacity, 464 series, 454
setting loghost, 463 system time
setting refresh interval, 464 setting (system management), 449
system system time (system management), 448
displaying recent system logs, 30 system time zone
system management setting (system management), 450
backing up configuration, 440 T1
backing up device files through USB port, 442 configuring (data link management), 657
configuration, 439 features (data link management), 641
configuration management, 439 interface (data link management), 640
configuring service management, 444 introduction (data link management), 640
configuring TR-069, 450, 452 voice functions (data link management), 640
creating user, 446 TCP
initialize configuration, 440 configuring TCP to carry outgoing SIP calls (SIP
managing service, 443 connection), 611
restoring device files through USB port, 442 channel busy test (WLAN), 145
821
tools operations (diagnostic tools), 467 upgrading
topology software for A-MSR20/30/50 series (system
management), 455
setting background image for WiNet topology
diagram, 471 software for A-MSR900/A-MSR20-1X series
(system management), 454
TR-069
uploading
basic functions (system management), 451
media resource files (IVR), 706
configuring (system management), 450
URL filtering
network framework (system management), 451
configuration, 167
TR-069 configuration
configuring, 169
configuration guidelines, 453
USB
trace route, 466
backing up device files through USB port (system
operation (diagnostic tools), 467
management), 442
traffic ordering
restoring device files through USB port (system
configuration, 205 management), 442
displaying external interface traffic ordering user
statistics, 207
configuring, 306
displaying internal interface traffic ordering
configuring (SIP local survival), 685
statistics, 206
configuring access control for user group, 307
setting interval, 206
configuring application control for user group, 308
specifying mode, 206
configuring bandwidth control for user group, 309
transmitting
configuring packet filtering for user group, 310
configuring out-of-band DTMF transmission mode
for SIP (call route), 550 configuring RADIUS user (WiNet), 473
trap configuring SNMP user, 283
configuring SNMP trap function, 285 configuring user group, 306, 312
troubleshooting managing current web user, 21
failure to access device through web interface, 21 switching user access level to management level,
448
web browser, 21
user isolation (WLAN security), 129
trunk
web user level, 4
configuring trunk mode calling (voice
management), 506 user group
trusted nodes configuration, 305
configuring (SIP local survival), 686 configuring, 306, 312
tunnel configuring access control, 307
configuring GRE over IPv4 tunnel, 402, 404 configuring application control, 308
creating GRE tunnel, 402 configuring bandwidth control, 309
displaying L2TP tunnel information, 396 configuring packet filtering, 310
822
synchronizing configuration for WAN interfaces, FXO voice subscriber line (line management), 660
312
FXS voice subscriber line (line management), 660
user-based load sharing
one-to-one binding between FXS and FXO voice
configuration, 204 subscriber lines (line management), 662
validating support for SIP voice service of the VCX (call
service), 520
basic services configuration (web interface), 41
voice management
VCX
basic settings, 489
support for SIP voice service of the VCX (call
service), 520 configuration, 488
VE1 configuring call route, 490
configuring VE1 line (data link management), 643 configuring direct calling for SIP UAs through SIP
protocol (configuring domain name), 495
viewing
configuring direct calling for SIP UAs through SIP
blacklist entries (attack protection), 179
protocol (configuring static IP address), 492
general information and statistics of an interface
configuring local number, 489
(WAN), 55
configuring proxy server involved calling for SIP
VLAN
UAs, 499
configuration, 57
configuring trunk mode calling, 506
configuration guidelines, 61
VoIP
configuring, 57
basic service configuration, 484
configuring access service-based VLAN, 88
basic service setup, 484
configuring interface parameters, 59
configuration (basic service), 484
configuring member port, 59
configuring connection properties, 485
creating, 58
configuring local numbers, 485
voice
displaying configuration wizard homepage, 484
CID on FXO voice subscriber line (call service),
finishing configuration wizard, 486
520
selecting country, 484
CID on FXS voice subscriber line (call service), 519
VT1
codecs (IVR), 705
configuring VT1 line (data link management), 648
configuring E1 voice DSS1 signaling (data link
management), 657 waiting
configuring FXO voice subscriber line (line message waiting indication (call service), 518
management), 666, 674
WAN
configuring FXS voice subscriber line (line
configuring ADSL/G.SHDSL interface, 47
management), 663
configuring CE1/PRI interface, 51
configuring voice functions (call service), 522
configuring CT1/PRI interface, 54
configuring voice mailbox server (SIP connection),
604 configuring Ethernet interface, 43
823
setting interface parameters (web interface), 31 setting WLAN interface parameters, 40
setting interface parameters for ADSL/G.SHDSL sorting function, 20
(web interface), 34
starting basic configuration wizard, 31
setting interface parameters for CE1/PR1 (web
troubleshooting web browser, 21
interface), 36
user level, 4
setting interface parameters for CT1/PR1 (web
interface), 38 validating basic services configuration, 41
setting WAN interface parameters for CE1/PR1, configuring clear type wireless service, 64
36 configuring client mode, 114
setting WAN interface parameters for CT1/PR1, configuring crypto type wireless service, 72
38
configuring wireless access service, 63
setting WAN interface parameters for Ethernet, 32
connecting (client mode), 112
setting WAN interface parameters for SA, 34
creating wireless access service, 63
824
displaying client information, 82 advanced configuration, 145
displaying client mode statistics, 113 channel busy test, 145
displaying information, 80 configuring channel busy test, 146
displaying RF ping information, 86 displaying information, 29
displaying wireless access service information, 80 district code, 145
displaying wireless services bound to a radio, 123 setting district code, 145
enabling client mode, 111 setting interface parameters (web interface), 40
security parameter dependencies (clear type WLAN QoS
wireless service), 79
configuration, 131
security parameter dependencies (crypto type
configuring CAC service, 140
wireless service), 79
configuring wireless QoS, 131, 140
wizard
enabling wireless QoS, 131
setting LAN interface parameters (web interface),
38 setting CAC admission policy, 133
setting WAN interface parameters (web interface), setting EDCA parameters for wireless clients, 134
31 setting radio EDCA parameters for APs, 133
setting WAN interface parameters for setting SVP service, 132
ADSL/G.SHDSL (web interface), 34
WLAN security
setting WAN interface parameters for CE1/PR1
(web interface), 36 blacklist, 126
starting basic configuration wizard (web interface), configuring whitelist function, 126
31 user isolation, 129
WLAN whitelist, 126
825