Verifying Cisco UBEs and Via-Zone Gatekeepers

Verifying Cisco UBEs and Via-Zone Gatekeepers
When you use the show gatekeeper endpoints command on the gatekeeper, a Cisco
UBE router will be displayed as an H323-GW type. In the output shown in Example 9-9,
the Cisco UBE router is registered using the Loopback1 IP address 192.168.66.15.
Example 9-9 Verifying Cisco UBEs and Via-Zone Gatekeepers with the show
gatekeeper endpoints Command
Chapter 9: Establishing a Connection with an Internet Telephony Service Provider 547
GKIPIPGW#show gatekeeper endpoints
GATEKEEPER ENDPOINT REGISTRATION
================================
CallSignalAddr Port RASSignalAddr Port Zone Name Type Flags
--------------- ----- --------------- ----- --------- ---- -----
192.168.66.15 1720 192.168.66.15 58083 VIA H323-GW
H323-ID: IPIPGW
Voice Capacity Max.= Avail.= Current.= 0
192.168.1.254 1720 192.168.1.254 50220 SJC VOIP-GW
H323-ID: SJC-GW
Voice Capacity Max.= Avail.= Current.= 0
192.168.3.254 1720 192.168.3.254 51105 CHI VOIP-GW
H323-ID: CHI-GW
Voice Capacity Max.= Avail.= Current.= 0
Total number of active registrations = 3
When a call is active, the show gatekeeper calls command will display two call legs. The
first call leg, as illustrated in Figure 9-19 and Example 9-10, is between the originating
gateway (Router1 in this case) and the Cisco UBE router.
Router1
H.323 ID SJC-GW
Technology Prefix 1#
Router1 to Cisco UBE
Router3
H.323 ID CHI-GW
Technology Prefix 1#
Cisco UBE
Figure 9-19 Verifying Cisco UBEs and Via-Zone Gatekeepers Topology—Call Leg 1
Example 9-10 Verifying Cisco UBEs and Via-Zone Gatekeepers with the show
gatekeeper calls Command—Call Leg 1
GKIPIPGW#show gatekeeper calls
... OUTPUT OMITTED ...
LocalCallID Age(secs) BW
10-54685 10 16(Kbps)
Endpt(s): Alias E.164Addr
src EP: SJC-GW
CallSignalAddr Port RASSignalAddr Port
192.168.1.254 1720 192.168.1.254 50220
Endpt(s): Alias E.164Addr
continues
The second call leg, as illustrated in Figure 9-20 and Example 9-11, is between the Cisco
UBE router and the terminating gateway (Router3 in this case).
548 Authorized Self-Study Guide: Cisco Voice over IP (CVOICE)
dst EP: IPIPGW 3001
CallSignalAddr Port RASSignalAddr Port
192.168.66.15 1720 192.168.66.15 58083
... OUTPUT OMITTED ...
Router1
H.323 ID SJC-GW
Technology Prefix 1#
Cisco UBE to Router3
Router3
H.323 ID CHI-GW
Technology Prefix 1#
Cisco UBE
V
Figure 9-20 Verifying Cisco UBEs and Via-Zone Gatekeepers Topology—Call Leg 2
Example 9-11 Verifying Cisco UBEs and Via-Zone Gatekeepers with the show
gatekeeper calls Command—Call Leg 2
GKIPIPGW#show gatekeeper calls
... OUTPUT OMITTED ...
LocalCallID Age(secs) BW
11-54685 10 16(Kbps)
Endpt(s): Alias E.164Addr
src EP: IPIPGW 4001
CallSignalAddr Port RASSignalAddr Port
192.168.66.15 1720 192.168.66.15 58083
Endpt(s): Alias E.164Addr
dst EP: CHI-GW 3001
CallSignalAddr Port RASSignalAddr Port
192.168.3.254 1720 192.168.3.254 51105
... OUTPUT OMITTED ...
Example 9-10 Verifying Cisco UBEs and Via-Zone Gatekeepers with the show
gatekeeper calls Command—Call Leg 1 continued

Rewritten Article

Summary

The capital capacity covered in this affiliate are the following:

■ Cisco UBE routers interconnect assorted VoIP networks by acquisition calls between

two VoIP punch peers.

■ Appearance accommodate agreement interworking, abode hiding, codec filtering, and video

interworking.

■ Agreement interworking interconnects VoIP networks, application the aforementioned or altered signaling

protocols.

■ Media streams can breeze through or bypass a Cisco UBE router.

■ Cisco UBE routers use accepted Cisco IOS codec negotiations to access negotiations

between VoIP networks.

■ Cisco UBE routers can use RSVP to apparatus CAC, for example, amid Cisco

Unified Communications Manager clusters.

■ Cisco UBE routers can annals with gatekeepers and be acclimated as a accepted gateway

or with via-zones.

■ Cisco UBE alarm breeze depends on arrangement cartography and appearance implemented.

■ Agreement interworking is configured application the allow-connection command.

■ H.323-to-H.323 interworking is configured application the allow-connection h323 to

h323 command.

■ H.323-to-SIP interworking is configured application the allow-connection h323 to sip

command.

■ Media flow-through or flow-around can be configured globally or per punch peer.

■ Ensure that the entering and outbound punch aeon accept analogous media and codec

configurations.

■ Cisco UBE routers can be acclimated in affiliation with gatekeepers by registering them

in a via-zone.

■ A attendant will appearance two alarm legs back application a Cisco UBE router.

Chapter 9: Establishing a Connection with an Internet Telephony Service Provider 549

Configuring Cisco UBEs and Via-Zone Gatekeepers

Configuring Cisco UBEs and Via-Zone Gatekeepers

Figure 9-18 shows a sample book acclimated to configure a Cisco UBE router and a viazone

gatekeeper. A attendant is configured with two accepted bounded zones: San Jose

(SJC) and Chicago (CHI). The Cisco Unified Communications Manager Express Router1

is registered in the SJC zone, and the Cisco Unified Communications Manager Express

Router3 is registered in CHI zone. Calls amid Chicago and San Jose should be routed

by the gatekeeper. Instead of acquisition calls anon amid the two zones, the gatekeeper

should avenue the calls through the VIA, which includes a Cisco UBE router.

Note The Cisco UBE action and the attendant action are performed by the same

router.

Configure the Gatekeeper

You can complete these accomplish to configure a gatekeeper:

Step 1. Create a loopback interface to use for the gatekeeper.

Step 2. Create local, remote, and VIA zones.

Two bounded zones, SJC and CHI, are configured, but instead of configuring a

standard bounded zone, the invia and outvia options are acclimated to avenue calls to

and from the zones application the VIA zone.

In accession to the SJC and CHI bounded zones, addition bounded via-zone is configured.

This area will accommodate the Cisco UBE router.

Figure 9-18 Cisco UBEs and Via-Zone Gatekeepers Agreement Topology

Step 3. Specify area and technology prefixes.

Standard area prefix acquisition is set up, and the absence technology 1# is configured.

Example 9-7 illustrates a sample via-gatekeeper configuration.

Example 9-7 Via-Zone Attendant Configuration

Chapter 9: Establishing a Connection with an Internet Telephony Account Provider 545

Router1

H.323 ID SJC-GW

Technology Prefix 1#

CUBE

H.323 ID IPIPGW

Technology Prefix 1#

Router3

H.323 ID CHI-GW

Technology Prefix 1#

Zone CHI

Via-Zone: VIA

Zone Prefix: 3...

Zone SJC

Via-Zone: VIA

Zone Prefix: 1...

Zone VIA

GK

V

Gatekeeper and

CUBE on Aforementioned Router

GK=Gatekeeper

GW=Gateway

GK(config)#interface Loopback0

GK(config-if)#ip abode 192.168.66.14 255.255.255.0

GK(config-if)#exit

GK(config)#gatekeeper

GK(config-gk)#zone bounded SJC cisco.com 192.168.66.14 invia VIA outvia VIA

GK(config-gk)#zone bounded CHI cisco.com invia VIA outvia VIA

GK(config-gk)#zone bounded VIA cisco.com

GK(config-gk)#zone prefix SJC 1*

GK(config-gk)#zone prefix CHI 3*

GK(config-gk)#gw-type-prefix 1#* default-technology

GK(config-gk)#no shutdown

Configure the Cisco UBE

After the attendant agreement is done, the Cisco UBE agreement is performed on

the aforementioned router.

You can complete these accomplish to configure the Cisco UBE feature:

Step 1. Enable H.323 interworking.

Step 2. Create a loopback interface to use as the antecedent interface for Cisco UBE to

register with the gatekeeper.

The Loopback1 interface is acclimated as the H.323 aperture interface. The Cisco

UBE router will annals in area VIA with the H.323 ID CUBE and the technology

prefix 1#.

Step 3. Create two punch peers—one pointing to San Jose and the added to Chicago.

Step 4. Enable the aperture process.

Example 9-8 illustrates a sample Cisco UBE configuration.

Example 9-8 Cisco UBE Configuration

546 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

GK(config)#voice account voip

GK(config-voice-service)#allow-connections h323 to h323

GK(config-voice-service)#exit

GK(config)#interface loopback1

GK(config-if)#ip abode 192.168.66.15 255.255.255.0

GK(config-if)#h323-gateway voip interface

GK(config-if)#h323-gateway voip id VIA ipaddr 192.168.66.14 1719

GK(config-if)#h323-gateway voip h323-id IPIPGW

GK(config-if)#h323-gateway voip tech-prefix 1#

GK(config-if)#exit

GK(config)#dial-peer articulation 10 voip

GK(config-dial-peer)#destination-pattern 1...

GK(config-dial-peer)#session ambition ras

GK(config-dial-peer)#exit

GK(config)#dial-peer articulation 30 voip

GK(config-dial-peer)#destination-pattern 3...

GK(config-dial-peer)#session ambition ras

GK(config-dial-peer)#exit

GK(config)#gateway

Configuring Cellophane Codec Pass-Through and Media Flow-

Configuring Cellophane Codec Pass-Through and Media Flow-

Around

Figure 9-17 shows a sample book acclimated to configure H.323-to-H.323 interworking,

including cellophane codec pass-through and media flow-around, application a Cisco UBE

router. The Cisco Unified Communications Manager array in San Jose is affiliated with

the Cisco Unified Communications Manager Express router in Chicago application a Cisco

UBE router. Codec agreement is performed anon amid the Cisco Unified

Communications Manager array and the Cisco Unified Communications Manager

Express router, and RTP streams breeze anon amid the endpoints.

Chapter 9: Establishing a Connection with an Internet Telephony Service Provider 543

IP IP IP IP

IP WAN

H.323

R1

Cisco UBE

Phone1-1

2001

Phone1-2

2002

Phone3-1

3001

Phone3-2

3002

San Jose

Chicago

H.323

Cisco Unified

Communications Manager

Express: 192.168.2.254

Cisco Unified Communications

Manager Cluster: 192.168.1.1

Direct Codec Negotiation

Between San Jose and

Chicago

Direct RTP Stream

Between San Jose and

Chicago

V

Figure 9-17 Cellophane Codec Pass-Through and Media Flow-Around Example

Topology

Codec accuracy enables a Cisco UBE router to canyon codec capabilities amid endpoints.

If you configure transparency, a Cisco UBE router uses the codec that was specified

by the endpoints for ambience up a call. To accredit endpoint-to-endpoint codec negotiation

without a Cisco UBE router, use the codec cellophane command.

With the absence configuration, a Cisco UBE router receives media packets from the

inbound alarm leg, terminates them, and again reoriginates the media beck on an outbound

call leg. Media flow-around enables media packets to be anesthetized anon between

the endpoints, after the action of a Cisco UBE router. The Cisco UBE router

continues to handle acquisition and announcement functions. Media flow-around for SIP-to-SIP calls

is not supported. Use the media flow-around command to accredit media flow-around.

Example 9-6 illustrates the use of both the codec cellophane and the media flowaround

commands.

Example 9-6 Cellophane Codec Pass-Through and Media Flow-Around Configuration

544 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

R1(config)#dial-peer articulation 2000 voip

R1(config-dial-peer)#description To Cisco Unified Communications Manager

R1(config-dial-peer)#destination-pattern 2...

R1(config-dial-peer)#session ambition ipv4:192.168.1.1

R1(config-dial-peer)#dtmf-relay h245-alphanumeric

R1(config-dial-peer)#codec transparent

R1(config-dial-peer)#media flow-around

R1(config-dial-peer)#exit

R1(config)#dial-peer articulation 9011 voip

R1(config-dial-peer)#description To Cisco Unified Communications Manager Express

R1(config-dial-peer)#destination-pattern 3...

R1(config-dial-peer)#session ambition ipv4:192.168.2.254

R1(config-dial-peer)#codec transparent

R1(config-dial-peer)#media flow-around

Media Flow and Transparent Codec Commands

Media Flow and Transparent Codec Commands
To configure media flow-through or media flow-around, use the following media
command:
Router(config-dial-peer)#media [flow-around | flow-through]
Note that this command can be issued in dial-peer configuration mode or globally under
the voice service configuration mode. The default is media flow-through.
To configure transparent codec pass-through, use the following codec transparent
command:
Router(config-dial-peer)#codec transparent

Configuring H.323-to-SIP Interworking

Configuring H.323-to-SIP Interworking

Figure 9-16 shows a sample book acclimated to configure H.323-to-SIP interworking with a

Cisco UBE router. The Cisco Unified Communications Manager array in San Jose routes

calls to the SIP carrier via a Cisco UBE router. The affiliation amid the Cisco Unified

Communications Manager and the Cisco UBE router is H.323 and the connection

between the Cisco UBE router and the SIP carrier is SIP.

Chapter 9: Establishing a Affiliation with an Internet Telephony Account Provider 541

IP IP

IP WAN

SIP

SIP Carrier

192.168.10.254

R1

Cisco UBE

Phone1-1

2001

Phone1-2

2002

San Jose

Cisco Unified Communications

Manager Cluster: 192.168.1.1

V

Figure 9-16 H.323-to-SIP Interworking Scenario

You can chase these accomplish to configure H.323-to-SIP interworking:

Step 1. Accredit H.323-to-SIP interworking.

Step 2. Configure H.323 and SIP punch aeon to avenue all-embracing calls amid the

Cisco Unified Communications Manager array and the SIP carrier.

Step 1: Enabling H.323-to-SIP Interworking

As with an H.323-to-H.323 connection, by absence a Cisco IOS aperture will not allow

connections amid an H.323 and a SIP VoIP punch peer. To change this behavior and

allow H.323-to-SIP connections, use the allow-connections h323 to sip command in

voice account agreement mode. Then affair the allow-connections sip to h323 command

to accredit SIP to H.323 calls, as approved in Example 9-4.

Example 9-4 H.323-to-SIP Interworking

R1(config)#voice account voip

R1(config-voice-service)#allow-connections h323 to sip

R1(config-voice-service)#allow-connections sip to h323

Step 2: Configuring Punch Peers

For a SIP (rtp-nte)-to-H.323 (h245-alphanumeric) alarm via a Cisco UBE router, if any RTP

named telephony accident (NTE) packets are beatific afore the H.323 endpoint answers the

call, the DTMF arresting is not heard on a absolute aperture (TGW).

542 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

Note alter achievement reveals that the H245 out-of-band letters are beatific to the TGW.

However, the digits are not heard on the phone.

To abstain sending both in-band and out-of-band tones to the approachable leg back sending

Cisco UBE calls in-band (rtp-nte) to out-of-band (h245-alphanumeric), configure the

dtmf-relay rtp-nte digit-drop command on the admission SIP punch peer. On the H.323

side, configure either dtmf-relay h245-alphanumeric or dtmf-relay h245-signal.

This can additionally be acclimated for H.323-to-SIP calls. Example 9-5 illustrates this dial-peer

configuration.

Example 9-5 Dial-Peer Configuration

R1(config)#dial-peer articulation 2000 voip

R1(config-dial-peer)#description To Cisco Unified Communications Manager

R1(config-dial-peer)#destination-pattern 2...

R1(config-dial-peer)#session ambition ipv4:192.168.1.1

R1(config-dial-peer)#dtmf-relay h245-alphanumeric

R1(config-dial-peer)#exit

R1(config)#dial-peer articulation 9011 voip

R1(config-dial-peer)#description To All-embracing SIP Carrier

R1(config-dial-peer)#session agreement sipv2

R1(config-dial-peer)#destination-pattern 9011T

R1(config-dial-peer)#session ambition ipv4:192.168.10.254

R1(config-dial-peer)#dtmf-relay rtp-nte digit-drop h245-alphanumeric

Configuring Cisco Unified Border Elements

Configuring Cisco Unified Border Elements

A Cisco Unified Border Element can be implemented in VoIP networks to enhance VoIP

network interoperability. This area describes how to apparatus Cisco UBE routers to

support agreement interworking amid H.323 and SIP networks.

Protocol Interworking Command

To accredit agreement interworking, use the allow-connections from-type to to-type command

in articulation account agreement mode. The from-type and to-type options specify

the signaling protocols, as abundant in Table 9-2.

Table 9-2 allow-connections Syntax Description

Parameter Description

from-type Originating endpoint type. The afterward choices are valid:

h323—H.323

sip—SIP

To Indicates that the altercation that follows is the affiliation target.

to-type Terminating endpoint type. The afterward choices are valid:

h323—H.323

sip—SIP

When interworking H.323 and SIP, the configuration is unidirectional; thus, if bidirectional
interworking is required, you need to configure the mirroring statement as well. For
example, if bidirectional H.323 to SIP interworking is required, you need to configure
allow connections h323 to sip as well as allow connections sip to h323.
Figure 9-14 and Example 9-1 illustrate a sample protocol interworking configuration.
Chapter 9: Establishing a Connection with an Internet Telephony Service Provider 539
H.323 Network SIP Network
Router1
Cisco UBE
V
Figure 9-14 Protocol Interworking Topology Example
Example 9-1 Protocol Interworking Configuration
Router1(config)#voice service voip
Router1(config-voice-service)#allow-connections h323 to 323
Router1(config-voice-service)#allow-connections sip to sip
Router1(config-voice-service)#allow-connections h323 to sip
Router1(config-voice-service)#allow-connections sip to h323

Configuring H.323-to-H.323 Interworking


Configuring H.323-to-H.323 Interworking

H.323-to-H.323 aperture agreement provides a network-to-network bound point

between absolute VoIP and video networks for billing, security, call-admission control,

QoS, and signaling interworking. It performs best of the functions of a PSTN-to-IP

gateway but joins two H.323 VoIP alarm legs.

Figure 9-15 shows a sample book acclimated to configure H.323-to-H.323 interworking for

a Cisco UBE router. The Cisco Unified Communications Manager array in San Jose is

connected with the Cisco Unified Communications Manager Express router in Chicago

using a Cisco UBE router.

To configure H.323-to-H.323 interworking amid a Cisco Unified Communications

Manager array and a Cisco Unified Communications Manager Express gateway, follow

these steps:

Step 1. Enable H.323-to-H.323 interworking.

Step 2. Configure the H.323 punch aeon on the Cisco UBE router to acquiesce alarm routing

between the Cisco Unified Communications Manager array and Cisco

Unified Communications Manager Express router.

Figure 9-15 H.323-to-H.323 Interworking Scenario

Step 1: Enabling H.323-to-H.323 Interworking

By default, a Cisco IOS aperture will not acquiesce access amid two VoIP dial

peers. To change this behavior and acquiesce H.323-to-H.323 connections, use the allowconnections

h323 to h323 command in articulation account agreement mode, as apparent in

Example 9-2.

Example 9-2 Enabling H.323 Protocol Interworking

540 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

IP IP IP IP

IP WAN

H.323

R1

Cisco UBE

Phone1-1

2001

Phone1-2

2002

Phone3-1

3001

Phone3-2

3002

San Jose

Chicago

H.323

Cisco Unified

Communications Manager

Express: 192.168.2.254

Cisco Unified Communications

Manager Cluster: 192.168.1.1

V

Router(config)#voice account voip

Router(config-voice-service)#allow-connections h323 to h323

Step 2: Configuring H.323 Punch Peers

After H323-to-H323 calls accept been allowed, configure the adapted punch aeon to

route amid the Cisco Unified Communications Manager array and the Cisco Unified

Communications Manager Express router. No appropriate agreement on the punch aeon is

required. Example 9-3 illustrates this dial-peer configuration.

Example 9-3 H.323 Punch Peers

Router(config)#dial-peer articulation 2001

Router(config-dial-peer)#description To Cisco Unified Communications Manager

Router(config-dial-peer)#destination-pattern 2...

Router(config-dial-peer)#session-target ipv4:192.168.1.1

Router(config-dial-peer)#exit

Router(config)#dial-peer articulation 3000

Router(config-dial-peer)#description To Cisco Unified Communications Manager Express

Router(config-dial-peer)#destination-pattern 3...

Router(config-dial-peer)#session-target ipv4:192.168.2.254


Cisco UBE Aperture Alarm Flows

Cisco UBE Aperture Alarm Flows

Cisco UBE alarm breeze depends on arrangement cartography and appearance implemented. The following

call-flow scenarios listed will be acclimated to allegorize the concepts about Cisco UBE

that accept been discussed appropriately far:

■ Cisco Unified Communications Manager—Cisco UBE—Cisco Unified

Communications Manager Express

■ Cisco Unified Communications Manager—Cisco UBE with RSVP—Cisco Unified

Communications Manager

■ Cisco Unified Communications Manager—Cisco UBE—SIP Carrier

■ Cisco Unified Communications Manager—Gatekeeper—Cisco UBE—SIP Carrier

■ Cisco Unified Communications Manager—Via-Zone Gatekeeper—Cisco UBE—

Cisco Unified Communications Manager

Figure 9-9 shows a alarm breeze amid a Cisco Unified Communications Manager server

and a Cisco Unified Communications Manager Express router application Cisco UBE.

Cisco Unified Communications Manager Express uses H.450 for optimized alarm transfers

and alarm assiduously after acute hairpinning. Because Cisco Unified Communications

Manager does not abutment H.450, a alteration involving H.323 VoIP access might

lead to suboptimal cartage flows.

Figure 9-9 Cisco UBE Alarm Flows: Cisco UCM to Cisco UCME

Cisco UBE can be acclimated to break H.450 Cisco Unified Communications Manager and

Cisco Unified Communications Manager Express interoperability issues. In this example,

a alarm amid Phone1-1 and Phone2-1 is transferred to Phone3-1. Because Cisco UBE

supports H.450, the consistent cartage breeze will be anon amid the Cisco UBE router

and Cisco Unified Communications Manager 2. After Cisco UBE, the alarm transfer

would be done application hairpinning on Cisco Unified Communications Manager 1.

RSVP-based intercluster CAC can be implemented application Cisco UBE. Figure 9-10 shows

two Cisco Unified Communications Manager clusters commutual by two Cisco UBE

routers. Each Cisco Unified Communications Manager array has an H.323 alarm leg to the

local Cisco UBE local. The two Cisco UBE routers accomplish RSVP-based CAC, and

because RSVP-based CAC requires media flow-through, a alarm amid the two clusters

will breeze through the two Cisco UBE routers. Note that phones still use the Skinny Client

Control Agreement (SCCP) for signaling against a Cisco Unified Communications Manager

server.

Figure 9-11 shows a simple Cisco UBE deployment breadth Cisco UBE is acclimated to translate

a H.323 alarm leg with a Cisco Unified Communications Manager array to a SIP alarm leg

point to a SIP carrier. Because this is a affiliation to an alien VoIP network, media

flow-through is appropriate to adumbrate centralized IP addresses and affected IP interworking

issues, such as alike clandestine IP addresses.

534 Authorized Self-Study Guide: Cisco Voice over IP (CVOICE)

IP

IP

IP

H.225, H.245

No H.450

H.225, H.245

H.450

Cisco Unified

Communications Manager

Express 1

Cisco Unified

Communications Manager

Call is Transferred Without

Hair Pinning

Phone1-1 Calls

Phone2-1

Phone2-1 Transfers

Call to Phone3-1

Phone2-1

3001

Phone1-1

2001

Phone3-1

4001

Cisco Unified

Communications Manager

Express 2

CUBE

1

2

3

Figure 9-10 Cisco UBE Alarm Flows: Cisco UCM to Cisco UCM

Chapter 9: Establishing a Affiliation with an Internet Telephony Service Provider 535

Cisco Unified

Communications

Manager

RSVP

H.225 and

H.245

H.225 and

H.245

Cisco Unified

Communications

Manager

RTP RTP RTP

SCCP SCCP

H.225 and

H.245

IP IP

CUBE CUBE

CUBE=Cisco UBE

Cisco Unified

Communications

Manager

SIP

H.225 and

H.245

RTP RTP

SCCP

IP

CUBE

SIP

Carrier

Figure 9-11 Cisco UBE Alarm Flows: SIP Carrier Interworking

Figure 9-12 shows an H.323 attendant deployment that includes a Cisco UBE integrated

with a attendant and a SIP carrier. Calls from the Cisco Unified Communications

Manager array are baffled via H.225 RAS from the San Jose attendant to the ITSP gatekeeper,

which again routes the alarm to the Cisco UBE router. Cisco UBE again performs

standard agreement interworking, acceptance access from the Cisco Unified

Communications Manager H.323 arrangement to the SIP carrier network.

Figure 9-12 Cisco UBE Alarm Flows: Attendant and SIP Carrier Interworking

Figure 9-13 shows the abstraction of via-zone enabled gatekeepers application Cisco UBE.

536 Authorized Self-Study Guide: Cisco Voice over IP (CVOICE)

SJC Cisco Unified

Communications Manager

408 Zone

H.225 RAS H.225 RAS

SIP

H.225

RAS

H.225

and

H.245

ITSP Zone

SJC GK ITSP GK

GK=Gatekeeper

CUBE=Cisco UBE

CUBE

SIP

Carrier

SJC Cisco Unified

Communications Manager

408 Zone

1, 2, 5 7, 8, 9, 12

10, 11

13

3, 4

6

14, 15

VIA Breadth 857 Zone

BOS Cisco Unified

Communications Manager

SJC GK VIA GK BOS GK

GK=Gatekeeper

CUBE=Cisco UBE

CUBE

Figure 9-13 Cisco UBE Alarm Flows: Cisco UBE and Via-Zone Gatekeeper

Three gatekeepers are deployed:

■ San Jose gatekeeper: This attendant has a distinct breadth alleged 408.

■ Boston gatekeeper: This attendant has a distinct breadth alleged 857.

■ Via-zone gatekeeper: This attendant has a distinct breadth alleged via-zone (VIA).

The San Jose (SJC) Cisco Unified Communications Manager array is registered at the

San Jose gatekeeper; the Boston (BOS) Cisco Unified Communications Manager array is

registered at the Boston gatekeeper; and the Cisco UBE router is registered at the viazone

gatekeeper.

The San Jose attendant will avenue all calls fabricated to the alien 857 breadth to the via-zone

gatekeeper, and the Boston attendant will avenue all calls fabricated to the alien 408 breadth to

the via-zone gatekeeper.

The via-zone gatekeepers will avenue the calls to the alien 408 and 857 zones, but not

directly to the gatekeepers in San Jose and Boston. Instead, the acquisition will be done

using the bounded VIA zone.

The afterward steps, numbered in Figure 9-13, alarm an archetype alarm breeze from the San

Jose Cisco Unified Communications Manager array in breadth 408 on the San Jose gatekeeper

to the Boston Cisco Unified Communications Manager array amid in zone

857 on the Boston gatekeeper:

1. A alarm is placed from the San Jose Cisco Unified Communications Manager to someone

in breadth cipher 857.

2. The San Jose Cisco Unified Communications Manager sends an ARQ to the San Jose

gatekeeper.

3. The San Jose attendant resolves the 857 that belongs to the via-zone gatekeeper

and sends a Location Appeal (LRQ).

4. The VIA attendant receives an LRQ for 857 and resolves the 857 prefix to the

Cisco UBE. The VIA attendant sends a LCF to the San Jose gatekeeper.

5. The San Jose attendant allotment an ACF that specifies the Cisco UBE to the San Jose

Cisco Unified Communications Manager.

6. The San Jose Cisco Unified Communications Manager sends a SETUP bulletin to

the Cisco UBE for the 857 number.

7. The Cisco UBE sends an ARQ to the VIA attendant with the answerCall=true

parameter set to accept the acceptance call.

8. The VIA attendant responds with an ACF to accept the call. From the perspective

of the VIA gatekeeper, the aboriginal alarm leg is established.

Chapter 9: Establishing a Affiliation with an Internet Telephony Service Provider 537

9. The Cisco UBE aperture has a punch associate that specifies that RAS letters should be

sent to the VIA attendant for all prefixes. The Cisco UBE aperture initiates the

process of resending the alarm by sending the ARQ bulletin with answerCall=false to

the VIA attendant for 857.

10. The VIA attendant knows that prefix 857 belongs to the Boston gatekeeper, and

because the antecedent breadth is the via-zone, the VIA attendant sends an LRQ to the

Boston gatekeeper.

11. The Boston attendant sees prefix 857 as a bounded breadth and sends an LCF pointing to

the Boston Cisco Unified Communications Manager.

12. The VIA attendant allotment an ACF to the Cisco UBE that specifies the Boston

Cisco Unified Communications Manager.

13. The Cisco UBE aperture sends a SETUP bulletin to the Boston Cisco Unified

Communications Manager for the 857 call.

14. The Boston Cisco Unified Communications Manager sends an ARQ to the Boston

gatekeeper to appeal acceptance for the call.

15. The Boston attendant sends an ACF with the answerCall=true parameter.

RSVP-Based CAC on Cisco UBEs


RSVP-Based CAC on Cisco UBEs

Because a Cisco UBE router is a Cisco IOS gateway, it additionally supports RSVP-based CAC.

Two Cisco Unified Communications Manager clusters can interconnect application Cisco UBE,

thus enabling intercluster RSVP-based CAC. RSVP supports both articulation and video calls.

Figure 9-6 Codec Filtering on Cisco UBEs

RSVP requires at atomic two RSVP peers, so two Cisco UBE Gateways are appropriate to

enable RSVP-based CAC. When deploying Cisco UBE and RSVP-based CAC, ensure that

the flows that should advance RSVP are configured for media flow-through. Media flowaround

is not accurate with RSVP-based CAC.

Figure 9-7 shows a alarm bureaucracy accumulated with RSVP-based CAC example.

Following is the alarm flow:

1. The Cisco Unified Communications Manager Cluster 1 sends an H.225 bureaucracy to the

Cisco UBE router.

2. Cisco UBE processes the alarm bureaucracy advice and assembly an outbound VoIP

dial associate acute an RSVP reservation. Cisco UBE sends out an RSVP appeal to

the alien Cisco UBE router.

3. The alien Cisco UBE acknowledges the catch and initiates the catch for

the acknowledgment path, which is accustomed by the bounded Cisco UBE router.

4. The H.225 bureaucracy bulletin is baffled to the alien Cisco UBE router, which then

routes the alarm to the outbound VoIP punch associate pointing to Cisco Unified

Communications Manager Cluster 2.

5. H.245 agreement occurs with media flow-through enabled.

6. The alarm is established.

Chapter 9: Establishing a Connection with an Internet Telephony Service Provider 531

Cisco UBE

VoIP 1 VoIP 2

1. G.711a-law

2. G.729a

3. G.729b

1. G.711a-law

2. G.729a

3. G.729b

1. G.729a

Cisco UBE Codec Negotiation:

V

Cisco UBE

VoIP 1 VoIP 2

1. G.711a-law

2. G.729a

3. G.729b

1. G.711a-law

2. G.729a

3. G.729b

Cisco UBE with codec transparency:

Transparent

V

Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

IP WAN

Cisco Unified

Communications Manager

Cluster 1

Cisco UBE

RSVP Reservation

RSVP Reservation

Cisco UBE

Cisco Unified

Communications Manager

Cluster 2

V V

H.225 Setup

H.245 Setup

1

2

H.225 Setup

H.245 Setup

H.225 Setup

3

4

H.245 Bureaucracy with

Media Flow-Through

5

Call Established

Figure 9-7 RSVP-Based CAC on Cisco UBEs

Codec Clarification on Cisco UBEs

Codec Clarification on Cisco UBEs

VoIP networks usually abutment a ample array of codecs, and mechanisms abide to perform

codec negotiations amid devices. Regardless of which mechanisms are used,

preferences actuate which codecs will be called over others.

Because a Cisco UBE router is about a Cisco IOS aperture with the adequacy to

interconnect VoIP punch peers, the aforementioned codec selections mechanisms are accessible as on

any added Cisco IOS gateway. A punch associate can be configured to acquiesce a specific codec or

to use a codec articulation chic to specify assorted codecs with a alternative order. This enables

Cisco UBE to accomplish codec filtering, because a punch associate will set up a alarm leg alone if the

desired codec belief are satisfied. This adds to the Cisco UBE role of a demarcation

point aural a VoIP network.

If codec clarification is not required, Cisco UBE additionally supports cellophane codec negotiations.

This enables negotiations amid endpoints with Cisco UBE abrogation the codec

information untouched.

Whether assuming codec clarification or operating in cellophane mode, Cisco UBE is

required to abutment the codec acclimated amid endpoints. The afterward codecs are

supported:

■ Audio codecs: G.711u, G.711a, G.723, G.726, G.729r8, G.728, and AMR-NB

■ Video codecs (H.323 only): H.261, H.263, and H.264

Figure 9-6 shows how codec agreement is performed on a Cisco UBE router. Two VoIP

clouds charge to be interconnected. In this scenario, both VoIP 1 and VoIP 2 networks

have G.711 a-law as the adopted codec.

In the aboriginal example, the Cisco UBE router is configured to use the G.729a codec. This

can be done by application the adapted codec command on both VoIP punch peers. When a

call is set up, Cisco UBE will acquire alone G.729a calls, appropriately influencing the codec

negotiation.

In the additional example, the Cisco UBE is configured for a cellophane codec and will

leave the codec advice independent aural the alarm signaling untouched. Because both

VoIP 1 and VoIP 2 accept G.711 a-law as their aboriginal choice, the consistent alarm will be a G.711

a-law call.

Cisco UBE Gateways and Attendant Interworking


Cisco UBE Gateways and Attendant Interworking

When you’re interworking with gatekeepers, Cisco UBE can be acclimated in two ways. First, it

can annals with the gatekeeper, agnate to a accepted Cisco IOS gateway.

532 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

IP WAN

Cisco Unified

Communications Manager

Cluster 1

Cisco UBE

RSVP Reservation

RSVP Reservation

Cisco UBE

Cisco Unified

Communications Manager

Cluster 2

V V

H.225 Setup

H.245 Setup

1

2

H.225 Setup

H.245 Setup

H.225 Setup

3

4

H.245 Setup with

Media Flow-Through

5

Call Established

6

Note Cisco UBE and a attendant can be deployed on the aforementioned router, as continued as CPU

and anamnesis requirements are met.

In addition, a attendant can use a registered Cisco UBE router with via-zones. This

means that back acquisition a alarm amid two zones, a attendant can be configured to

route the alarm via a area absolute a Cisco UBE router. This enables interzone networking

using a axial Cisco UBE router after the charge to arrange a Cisco UBE router at

every armpit or redesign an already-deployed H.323 network.

Figure 9-8 shows how a Cisco UBE is chip with attendant deployments.

Consider the afterward architecture guidelines for Cisco UBE aperture and gatekeeper

implementations:

■ Back a Cisco UBE router is acclimated as an outbound articulation gateway, the aforementioned concepts

that administer back application acceptable articulation gateways with gatekeepers administer to Cisco

UBE deployments.

■ Back acquisition calls amid zones that crave Cisco UBE functionality, via-zones

should be used. Existing attendant deployments can calmly be adapted to include

Cisco UBE application this concept.

408 Area VIA Area 857 Zone

Cisco UBE

BOS Cisco Unified

Communications Manager

SJC GK VIA GK BOS GK

Standard H.225 RAS to

Route Alarm to Other VoIP

Networks Application a

Cisco UBE

Via-Zone Acclimated to Route

Between Zones Over a

Cisco UBE

GK=Gatekeeper

Figure 9-8 Cisco UBEs and Attendant Interworking

Protocol Interworking on Cisco UBE Gateways


Protocol Interworking on Cisco UBE Gateways

Cisco UBE can interwork signaling protocols, agnate to a proxy. This affection can be used

for two scenarios:

■ Interworking amid the aforementioned signaling protocol: A Cisco UBE that is interworking

between the aforementioned signaling agreement (for archetype H.323-to-H.323) can be used

to break interoperability issues amid two accessories accepting altered capabilities.

Because Cisco UBE builds two alarm legs to anniversary peer, it can interwork amid those

two alarm legs. For example, Cisco Unified Communications Manager Express uses

H.450, a subset of H.323, for alarm transfers and alarm forwarding. Back connected

directly to a Cisco Unified Communications Manager, which does not support

H.450, alarm forwarding and transfers ability advance to hair-pinned calls and suboptimal

WAN usage. A Cisco UBE at the Cisco Unified Communications Manager armpit can

be acclimated to break these issues.

Figure 9-2 Cisco UBEs in Enterprise Environments

■ Interworking amid altered signaling protocols: Cisco UBE can interconnect

dial aeon that use altered signaling protocols, such as a SIP and an H.323 punch peer.

This allows for greater adaptability back deploying an IP communications network.

Both H.323 and SIP abutment two methods of alarm setups. H.323 uses fast alpha and slow

start, admitting SIP uses aboriginal action and delayed offer. Both H.323 fast alpha and SIP early

offer are acclimated to set up the media approach faster than during accepted alarm setup.

Problems appear back one endpoint expects an H.323 apathetic alpha or SIP delayed action and

the added endpoint uses H.323 fast alpha or SIP aboriginal offer.

When interworking signaling protocols, a Cisco UBE supports the afterward combinations,

as illustrated in Figure 9-3:

■ H.323-to-H.323: An Cisco UBE absolutely supports fast alpha with apathetic alpha interworking

in all directions.

■ H.323-to-SIP: H.323 fast alpha to SIP aboriginal action interworking is absolutely supported. An

H.323 apathetic alpha to an SIP delayed action is accurate alone for entering H.323 to outbound

SIP calls.

■ SIP-to-SIP: Aboriginal action and delayed action are absolutely accurate on Cisco UBE in all

directions.

Chapter 9: Establishing a Connection with an Internet Telephony Service Provider 527

Cisco UCME

H.323 Video

Video Interworking for

External Video Clients

Interworking and CAC Amid Cisco

Unified Communications Manager

Express and Cisco Unified

Communications Manager

CAC Amid Cisco

Unified Communications

Manager

Protocol

Interworking

H.323 Video

Secure VoIP

Interworking

LAN/WAN

SIP

Carrier

Internet

DMZ

GK

CUBE

GK=Gatekeeper

CUBE=Cisco UBE

H.323-to-H.323 In Leg Out Leg Support

Fast Alpha Fast Alpha Bidirectional

Slow Alpha Apathetic Alpha Bidirectional

Fast Alpha Apathetic Alpha BidirectionalH.323-to-SIP

SIP-to-SIP

Slow Alpha Delayed Action Unidirectional

Fast Alpha Aboriginal Action Bidirectional

In Leg Out Leg Support

Delayed Action Delayed Action Bidirectional

Early Action Aboriginal Action Bidirectional

Figure 9-3 Agreement Interworking Abutment on Cisco UBEs

Cisco UBE Gateways in Enterprise Environments

Cisco UBE Gateways in Enterprise Environments
Cisco UBE in enterprise deployments serve two main purposes:
■ External connections: A Cisco UBE can be used as a demarcation point within a
unified communications network and provides interconnectivity with external networks.
This includes H.323 voice and video connections and SIP VoIP connections.
■ Internal connections: When used within a VoIP network, a Cisco UBE can be used
to increase the flexibility and interoperability between different devices.
Following are some key features offered by Cisco UBE:
■ Protocol interworking: The Cisco UBE supports interworking of signaling protocols,
including H.323-to-H.323, H.323-to-SIP, and SIP-to-SIP.
■ Address hiding: A Cisco UBE can hide or replace the endpoint IP addresses used for
a media connection.
■ Security: A Cisco UBE can be placed in a demilitarized zone (DMZ) and provide
outside connectivity to external networks.
■ Video integration: In addition to VoIP services, a Cisco UBE also supports H.323
video connections.
■ Call Admission Control (CAC): A Cisco UBE can use Cisco IOS-based CAC mechanisms,
including the RSVP.
Table 9-1 lists key features and capabilities of the Cisco UBE. For detailed information
about the Cisco UBE, visit the product page: http://www.cisco.com/en/US/products/sw/
voicesw/ps5640/products_data_sheet09186a00801da698.html.
Table 9-1 Key Features of the Cisco UBE Gateway
Feature Details
Protocols H.323 and SIP
Network hiding IP network privacy and topology hiding
IP network security boundary
Intelligent IP address translation for call media and signaling
Back-to-back user agent, replacing all SIP-embedded IP addressing
CAC RSVP
Maximum number of calls per trunk
CAC based on IP circuits
CAC based on total calls, CPU usage, or memory usage thresholds
Protocol H.323 to H.323 (including Cisco Unified Communications Manager)
and signal H.323 to SIP (including Cisco Unified Communications Manager)
interworking SIP to SIP (including Cisco Unified Communications Manager)
Media support RTP and RTCP
Media modes Media flow-through
Media flow-around
Video codecs H.261, H.263, and H.264
Transport mode TCP
User Datagram Protocol (UDP)
TCP-to-UDP interworking
Table 9-1 Key Features of the Cisco UBE Gateway (continued)
Feature Details
DTMF H.245 Alphanumeric
H.245 Signal
RFC 2833
SIP Notify
Key Press Markup Language (KPML)
Interworking capabilities:
■ H.323 to SIP
■ RFC 2833 to G.711 in-band DTMF
Fax support T.38 fax relay
Fax passthrough
Cisco fax relay
Modem support Modem passthrough
Cisco modem relay
Supplementary Call hold, call transfer, and call forward for H.323 networks using H.450
services and transparent passing of Empty Capability Set (ECS)
SIP-to-SIP supplementary services (holds and transfers) support using REFER
H.323-to-SIP supplementary services for Cisco Unified Communications
Manager with Media Termination Point (MTP) on the H.323 trunk
NAT Traversal NAT traversal support for SIP phones deployed behind non-Application
Line Gateway (ALG) data routers
Stateful NAT traversal
QoS IP precedence and DSCP marking
Voice-quality Packet loss, jitter, and round-trip time
statistics
Number Number translation rules for VoIP numbers
translation Electronic Numbering (ENUM) support for E.164 number mapping into
Domain Name System (DNS)
Codecs G711 mu-law and a-law
G723ar53, G723ar63, G723r53, and G723r63
G726r16, G726r24, and G726r32
G728
G729, G729A, G729B, and G729AB
Internet Low Bitrate Codec (iLBC)
continues
Chapter 9: Establishing a Connection with an Internet Telephony Service Provider 525
Table 9-1 Key Features of the Cisco UBE Gateway (continued)
Feature Details
Transcoding Transcoding between any two families of codecs from the following list:
■ G711 a-law and mu-law
■ G.729, G.729A, G.729B, and G.729AB
■ G.723 (5.3 and 6.3 kbps)
■ iLBC
Security IP Security (IPsec)
Secure RTP (SRTP)
Transport Layer Security (TLS)
Authentication, AAA with RADIUS
authorization, and
accounting (AAA)
Voice media Tool Command Language (TCL) scripts support for application
applications customization
Voice Extensible Markup Language (VoiceXML 2.0) script support for
application customization
Billing Standard CDRs for accurate billing available through
■ AAA records
■ Syslog
■ Simple Network Management Protocol (SNMP)
Figure 9-2 shows the various deployment options for a Cisco UBE. Depending on the
deployment scenario, multiple Cisco UBEs might be required. Whether the gateways are
being deployed within a single VoIP network or used to interconnect to external VoIP
networks, the same concepts apply

Cisco IOS Image Support for Cisco UBE Gateways

Cisco IOS Image Support for Cisco UBE Gateways
The Cisco UBE functionality is supported on most current Cisco IOS routers, including
the Cisco 2800 and 3800 Series Integrated Services Routers (ISRs). The first Cisco IOS
release supporting the Cisco UBE functionality was Cisco IOS Release 12.2(13)T.
However, many of the newer features of the Cisco UBE were introduced with Cisco IOS
Software Release 12.4T, so you should deploy this more current Cisco IOS release. Visit
the following site for detailed information about features and version dependency:
http://www.cisco.com/en/US/products/sw/voicesw/ps5640/products_configuration_
guide_book09186a0080409b6d.html
The Cisco UBE is supported in the following Cisco IOS feature sets:
■ INT VOICE/VIDEO, IPIPGW, TDMIP GW AES
■ INT VOICE/VIDEO, IPIPGW, TDMIP GW

Cisco Unified Bound Aspect Overview


Cisco Unified Bound Aspect Overview

The Cisco UBE is an able unified communications arrangement bound element. A Cisco

UBE, aforetime accepted as the Cisco Multiservice IP-to-IP Gateway, terminates and reoriginates

both signaling (H.323 and SIP) and media streams (Real-time Transport Protocol

[RTP] and RTP Control Protocol [RTCP]) while assuming bound alternation services

between IP networks. Cisco UBE, in accession to added Cisco IOS Software features,

includes affair bound ambassador (SBC) functions that advice accredit end-to-end IP-based

transport of voice, video, and abstracts amid absolute unified communications networks.

Originally, SBCs were acclimated by account providers (SPs) to accredit abounding announcement capabilities

within VoIP networks. But the functionality to interconnect VoIP networks is becoming

more and added important for action VoIP networks as well, because VoIP is becoming

the new accepted for any telephony solution.

Designed to accommodated action and service-provider SBC accessory needs, the Cisco UBE is an

integrated Cisco IOS Software appliance that runs on assorted Cisco router platforms.

For a account of platforms, see the afterward link: http://www.cisco.com/en/US/products/sw/

voicesw/ps5640/products_white_paper0900aecd8067937f.shtml.

Cisco UBE functionally is implemented on Cisco IOS gateways appliance a appropriate Cisco IOS

feature set. Appliance this affection set, a Cisco UBE can avenue a alarm from one Articulation over IP

(VoIP) punch associate to addition VoIP punch peer.

VoIP punch aeon can additionally be handled by either the Affair Initiation Protocol (SIP) or

H.323. As a result, the adequacy to interconnect VoIP punch aeon additionally includes the capability

to interconnect VoIP networks appliance altered signaling protocols or VoIP networks

using the aforementioned signaling protocols but adverse interoperability issues.

Protocol interworking includes these combinations:

■ H.323-to-SIP interworking

■ H.323-to-H.323 interworking

■ SIP-to-SIP interworking

Figure 9-1 illustrates the adequacy of Cisco UBE to interconnect VoIP networks, including

VoIP networks that use altered signaling protocols. VoIP interworking is achieved

by abutting an entering VoIP punch associate with an outbound VoIP punch peer. A standard

Cisco IOS aperture after the Cisco UBE functionality will not acquiesce VoIP-to-VoIP

connections.

522 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

SIP or H.323 SIP or H.323

Inbound

VoIP Punch Peer

Outbound

VoIP Punch Peer

Cisco UBE Connects

VoIP Punch Peers

Cisco UBE

V

Figure 9-1 Cisco UBE Functionality

The Cisco UBE provides a network-to-network interface point for the following:

■ Signaling interworking (H.323, SIP)

■ Media interworking (dual-tone multifrequency [DTMF], fax, modem, and codec

transcoding)

■ Address and anchorage translations (privacy and cartography hiding)

■ Announcement and alarm detail almanac (CDR) normalization

■ Quality-of-service (QoS) and bandwidth administration (QoS appearance appliance differentiated

services cipher point [DSCP] or IP precedence, bandwidth administration using

Resource Reservation Protocol [RSVP], and codec filtering)

A Cisco UBE interoperates with several arrangement elements, including articulation gateways, IP

phones, and call-control servers in abounding appliance environments, from avant-garde enterprise

voice and/or video casework with Cisco Unified Communications Manager or Cisco

Unified Communications Manager Express, as able-bodied as simpler toll-bypass and VoIP transport

applications.

The Cisco UBE provides organizations with all the bound ambassador functions integrated

into the arrangement band to interconnect unified communications articulation and video

enterprise-to-service-provider architectures. The Cisco UBE is acclimated by action and

small- and medium-sized organizations to interconnect SIP accessible switched blast network

(PSTN) admission with SIP and H.323 action unified communications networks.

Introducing the Cisco Unified Border Element

Introducing the Cisco Unified Border Element

Gateway

The Cisco UBE is agnate to a acceptable articulation gateway, the capital aberration actuality the

replacement of concrete articulation trunks with an IP connection. This area describes the

concepts and appearance of a Cisco UBE in action environments.

Establishing a Connection with an Internet Telephony Service Provider

Establishing a Connection with an
Internet Telephony Service Provider
A Cisco Unified Border Element (Cisco UBE) has the capability to interconnect voice and
VoIP networks, offering protocol interworking, address hiding, and security services.
This chapter gives an overview of Cisco UBE functionality and describes how to implement
a Cisco UBE within an enterprise voice network.

RAI in Attendant Networks

RAI in Attendant Networks

To accredit gatekeepers to accomplish able call-routing decisions, the aperture can be configured

to abode the cachet of its ability availability to its gatekeeper. Assets that

are monitored are agenda account akin 0 (DS0) and agenda arresting processor (DSP) channel

resources.

The aperture letters its ability cachet to the attendant with the use of RAI RAS messages.

When a monitored ability avalanche beneath a configurable threshold, the gateway

sends an RAI RAS bulletin to the attendant that indicates the aperture is about out of

resources. When the accessible assets again beat addition configurable threshold, the

gateway sends an RAI that indicates the ability burning action no best exists.

Resource advertisement thresholds, as depicted in Figure 8-41, are configured by application the

resource beginning command beneath the aperture command-line interface (CLI). The

upper and lower thresholds are alone configurable to anticipate the aperture from operating

sporadically because of the availability or abridgement of resources.

100%

0%

High GW Sends RAI

“Unavailable”

GW Sends RAI

“Available” GW

RAI

RAQ

Gatekeeper

Low GK

Figure 8-41 Ability Availability Indicator Thresholds

RAI Configuration

Following is the syntax of the ability beginning command, which is accessible in Cisco

IOS to accredit RAI on endpoints.

resource beginning [all] [high percentage-value] [low percentage-value]

Use the ability beginning command in aperture agreement approach to configure a

gateway to abode H.323 ability availability to its gatekeeper. You can specify all or

specific aerial and low values. The absence for aerial and low ethics is 90. Use the no form

of this command to attenuate aperture resource-level reporting.

This command additionally includes an alternative report-policy constant to specify how resource

utilization is calculated. Accessible ability types to be appear can be either of the

following:

■ Idle-only: Includes chargeless and in-use channels only. This is the absence calculation.

■ Addressable: Includes free, in-use, and disabled channels.

RAI has to be configured on anniversary endpoint that should accelerate RAI advice in your

network. Figure 8-42 shows two gateways that accelerate RAI advice to a gatekeeper.

The attendant will analysis the RAI advice to verify the amount on anniversary aperture in

order to avenue the call.

Chapter 8: Configuring H.323 Gatekeepers 511

PSTN

UCME

(Call Agent)

Gateway1

Gateway2

Which gateway

should be acclimated for

the call?

Phone1-1

2001

PSTN Phone

Phone1-2

2002

RAI is configured on

each aperture you

want to monitor.

RAI is configured on

each aperture you

Wants to alarm PSTN phone. appetite to monitor.

Gatekeeper V

V

Figure 8-42 RAI Configuration

The RAI Feature

In Figure 8-43 and Examples 8-26 and 8-27, a aerial beginning of 70 is configured, which

represents the high-resource appliance percentage. The absence for the aerial beginning is

90 percent. After the aperture sends a high-utilization message, it waits to accelerate the

resource accretion bulletin until the ability use drops beneath the amount authentic by the

low constant (which in this case is 50). The absence for the low constant is 90 percent.

512 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

PSTN

Gateway1

Gateway2

Phone1-1

2001

PSTN Phone

Phone1-2

2002

Wants to alarm PSTN phone.

Gatekeeper V

V

Figure 8-43 RAI Beginning Agreement Technology

Example 8-26 RAI Beginning Agreement on Gateway1

Gateway1(config)#gateway

Gateway1(config-gateway)#resource beginning aerial 70 low 50

Example 8-27 RAI Beginning Agreement on Gateway2

Gateway2(config)#gateway

Gateway2(config-gateway)#resource beginning aerial 70 low 50

Verifying RAI Operation

Various appearance commands are accessible to verify RAI operation. The afterward examples

provide sample achievement from several of these commands.

First, the appearance alarm ability articulation beginning command can be acclimated from privileged

EXEC approach to analysis the beginning accompaniment on a gateway, as illustrated in Example 8-28.

Example 8-28 appearance alarm ability articulation beginning Command

Chapter 8: Configuring H.323 Gatekeepers 513

Router#show alarm ability articulation threshold

Resource Adviser - Dial-up Ability Beginning Information:

DS0 Threshold:

Client Type: h323

High Water Mark: 70

Low Water Mark: 50

Threshold State: low_threshold_hit

DSP Threshold:

Client Type: h323

High Water Mark: 70

Low Water Mark: 50

Threshold State: low_threshold_hit

Use the appearance alarm ability articulation statistics command to appearance the statistics of all the

resources (DSPs and DS0s).

In achievement apparent in Example 8-29, the DSP appliance is 54/112 = 48%; the DS0 utilization

is 67/96 = 70%; and the aerial beginning amount configured in both cases (DSP and DS0

utilization) is not exceeded.

Example 8-29 appearance alarm ability articulation statistics Command

Router#show alarm ability articulation statistics

Resource Adviser - Dial-up Ability Statistics Information:

DSP Statistics:

Utilization: 48 percent

Total channels: 112

Inuse channels: 54

Disabled channels: 0

Pending channels: 0

Free channels: 58

DS0 Statistics:

Utilization: 70 percent

Total channels: 96

Addressable channels: 96

Inuse channels: 67

Disabled channels: 0

Free channels: 29

The appearance aperture command, as approved in Example 8-30, can be acclimated to check

the cachet of the H.323 ability beginning if it is enabled and active. This additionally gives you

the configured low and aerial beginning values. In this output, you can see that the

“resource threshold” is enabled and active. Enabled agency configured, and Alive means

the H.323 RAS processes in the IOS are registered with the Ability Monitor.

Example 8-30 appearance aperture Command

514 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

Router#show gateway

Gateway Router is registered to Attendant cisco_2

Alias account (CLI configured)

H323-ID CUCME

Alias account (last RCF)

H323-ID CUCME

H323 ability thresholding is Enabled and Active

H323 ability beginning values:

DSP: Low beginning 60, Aerial beginning 70

DS0: Low beginning 60, Aerial beginning 70

You can use the appearance attendant gw-type-prefix and appearance attendant endpoint commands

to analysis the RAI cachet for anniversary aperture on the gatekeeper. Example 8-31 shows

sample achievement from the appearance attendant gw-type-prefix command.

Example 8-31 appearance attendant gw-type-prefix Command

GK#show attendant gw-type-prefix

GATEWAY TYPE PREFIX TABLE

=========================

Prefix: 1#* (Default gateway-technology)

Zone SanJose adept aperture list:

192.168.1.1:1720 ICT_CM_1

192.168.1.2:1720 ICT_CM_2

192.168.1.3:1720 CUCME (out-of-resources)

Zone SanJose prefix 2* antecedence aperture list(s):

Priority 10:

192.168.1.3:1720 CUCME (out-of-resources)

Priority 9:

192.168.1.1:1720 ICT_CM_1

Priority 8:

192.168.1.2:1720 ICT_CM_2

Also, apprehension the achievement of the appearance attendant endpoint command in Example 8-32.

Example 8-32 appearance attendant endpoint Command

Chapter 8: Configuring H.323 Gatekeepers 515

GK#show attendant endpoint

GATEKEEPER ENDPOINT REGISTRATION

================================

CallSignalAddr Port RASSignalAddr Port Breadth Name Type F

----------------- ----- -------------- ------ ---------- ------- --

192.168.1.1 1720 192.168.1.1 4085 SanJose VOIP-GW

H323-ID: ICT_CM_1

192.168.1.2 1720 192.168.1.2 4085 SanJose VOIP-GW

H323-ID: ICT_CM_2

192.168.1.3 1720 192.168.1.3 53530 Chicago VOIP-GW 0

H323-ID: CUCME

Total cardinal of alive registrations = 3

In this output, the 0 banderole in the achievement indicates that the aperture is out of resources.

Summary

The capital capacity covered in this affiliate are the following:

■ Gatekeepers are alternative accessories that are amenable for acceptance control, zone

management, and E.164 abode translation.

■ The attendant accouterments and software requirements depend on the Cisco IOS version

and affection set.

■ Signaling amid a aperture and a attendant is done through H.225 RAS.

■ Breadth prefixes announce the destination breadth for a call.

■ Technology prefixes are acclimated by gatekeepers to be added adjustable in alarm routing.

Default technology prefixes are acclimated as a aperture of aftermost resort.

■ A attendant has a analytic action for alarm acquisition that depends on technology prefix

and breadth prefix matching.

■ Agenda gatekeepers can intelligently advanced LRQs to adapted gatekeepers.

These agenda gatekeepers are acclimated for eliminating the claim for fully

meshed attendant networks.

■ Attendant Transaction Bulletin Protocol (GKTMP) provides an interface for call

control of a gatekeeper.

■ A distinct attendant can administer assorted bounded and alien zones.

■ Attendant agreement accomplish are done in attendant agreement approach on Cisco

IOS routers.

■ A breadth prefix is the allotment of a alleged cardinal that identifies the breadth to which a call

hops off. Breadth prefixes are generally acclimated to accessory an breadth cipher to a configured

zone.

■ A technology prefix is an alternative H.323 standards-based feature, accurate by

Cisco gateways and gatekeepers, that enables added adaptability in alarm acquisition within

an H.323 VoIP network.

■ Cisco IOS routers can be registered as gateways with gatekeepers.

■ A VoIP punch associate determines how to absolute calls that arise from a bounded articulation port

into a VoIP billow to a RAS affair target.

■ Breadth bandwidth administration is acclimated in an H.323 arrangement to ascendancy bandwidth in

or amid zones.

■ Cisco Unified Communications Manager can use a attendant for CAC.

■ Bandwidth adding for a attendant can be performed with an accessible formula:

(Number of Calls) * (Codec Payload Bandwidth) * 2 = Breadth Bandwidth.

■ Bandwidth commands are configured anon on the attendant in the gatekeeper

configuration mode.

■ The bandwidth command is acclimated to configure a specific bandwidth for interzone,

total, session, or absence zones.

■ RAI is acclimated in attendant networks to acquaint the attendant about the absolute status

of an end device.

■ RAI is configured on the endpoint, not on the gatekeeper.

■ RAI commands can be configured with anchored ethics or with absence values.

Providing Alarm Acceptance Ascendancy with H.323


Providing Alarm Acceptance Ascendancy with H.323

In this section, you will apprentice how to apparatus gatekeeper-based CAC. You will also

learn how CAC is alive and how it is amenable for managing acceptance ascendancy and

bandwidth for both articulation and video calls. Further, you will apprentice the functions of the

RAI apparatus and how it is configured in an H.323 network.

Gatekeeper Area Bandwidth Operation

Consider the Cisco Unified IP Communications arrangement apparent in Figure 8-38. Because

the IP arrangement is based on a packet-switched arrangement (PSN), no committed circuits are

established to set up an IP communications call. Instead, the IP packets absolute the

voice samples are baffled beyond the IP arrangement calm with added types of abstracts packets.

QoS is acclimated to differentiate the articulation packets from the abstracts packets, but bandwidth

resources, abnormally on IP WAN links, are not infinite. Therefore, arrangement administrators

dedicate a assertive bulk of “priority” bandwidth to articulation cartage on anniversary IP WAN link.

However, afterwards the provisioned bandwidth has been absolutely utilized, the Cisco Unified IP

Communications arrangement charge adios consecutive calls to abstain oversubscription of the

priority chain on the IP WAN link, which would account affection abasement for all voice

calls.

Chapter 8: Configuring H.323 Gatekeepers 505

IP WAN

PSTN

Router1

(H.323)

San Jose

Gatekeeper

Phone1-1

2001

Phone2-1

3001

Phone1-2

2002

Phone2-2

3002

Router2

(H.323)

There is no limitation on the

number of calls beyond IP links.

However, if QoS is configured

for one call, added calls

can go through, but the voice

quality of all calls degrades.

CAC helps to anticipate link

oversubscription.

GK

V V

2

1

Figure 8-38 Dial-Peer Agreement Topology

This action is accepted as CAC and is capital to agreement acceptable articulation affection in a multisite

deployment. The attendant maintains a almanac of all alive calls so it can manage

bandwidth in a zone.

You can use CAC to advice advance a adapted akin of articulation affection over a WAN link. For

example, you can use CAC to adapt the articulation affection on a T1 band that connects your

main campus to a alien site.

CAC regulates articulation affection by attached the cardinal of calls that can be alive on a particular

link at the aforementioned time. CAC does not agreement a accurate akin of audio quality

on the link, but it does acquiesce you to adapt the bulk of bandwidth captivated by

active calls on the link.

The Cisco IOS attendant is the accessory in the IP communications arrangement that is responsible

for CAC amid these devices:

■ Cisco Unified Communications Manager

■ Cisco Unified Communications Manager Express

■ H.323 gateways

The attendant requires a changeless policy-based agreement of the accessible resources.

The attendant cannot accredit capricious assets like the Resource Reservation Protocol

(RSVP) is able to do.

Zone Bandwidth Calculation

Zone bandwidth in a attendant arrangement can be affected with this simple formula:

(Number of Calls) * (Codec Payload Bandwidth) * 2 = Area Bandwidth

With this formula, the bare bandwidth in a attendant arrangement can be calmly defined.

For example, afterward is a adding for three accompanying G.711 calls in a gatekeeper

network:

3 * 64 kbps * 2 = 384 kbps

An important point for every bandwidth adding is the cardinal of accessories for which

you appetite to account the bandwidth. Gatekeepers and Cisco Unified Communications

Manager servers accept altered bandwidth ethics for the aforementioned codecs. In a Cisco Unified

Communications Manager environment, a G.711 alarm is affected to use 80 kbps, and a

G.729 alarm is affected to use 24 kbps. However, in a attendant environment, a G.711 call

consumes 128 kbps, and a G.729 alarm consumes 16 kbps. If a alarm is signaled from a Cisco

Unified Communications Manager server to a gatekeeper, Cisco Unified Communications

Manager internally assumes that 80 kbps of bandwidth is appropriate for a G.711 call, but

will arresting in its ARQ bulletin to its attendant a appeal for a G.711 alarm with 128 kbps

of bandwidth required. Similarly, back application G.729, Cisco Unified Communications

Manager will use 24 kbps for centralized CAC calculations, but appeal 16 kbps from a

gatekeeper.

Example 8-22 shows a attendant with an alive G.711 alarm requested by Cisco Unified

Communications Manager. Note the 128 kbps in the “BW” column.

Example 8-22 Viewing Alive Attendant Calls

506 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

GK#show attendant calls

Total cardinal of alive calls = 1.

GATEKEEPER CALL INFO

====================

LocalCallID Age(secs) BW

2-14476 59 128(Kbps)

Endpt(s): Alias E.164Addr

src EP: CHI-CUCME 13125553001

CallSignalAddr Port RASSignalAddr Port

192.168.3.254 1720 192.168.3.254 52668

Endpt(s): Alias E.164Addr

dst EP: ipipgw 49895556666

CallSignalAddr Port RASSignalAddr Port

192.168.1.3 1720 192.168.1.3 52060

The attendant is the axial accessory in the network. The bandwidth is configured for the

network on the gatekeeper. The accessible bandwidth will be arrested by the gatekeeper

for every call, as illustrated in Figure 8-39.

Chapter 8: Configuring H.323 Gatekeepers 507

IP WAN

PSTN

Router1

(H.323)

Zone SanJose Area Chicago

Gatekeeper

Phone1-1

2001

Phone2-1

3001

Phone1-2

2002

Phone2-2

3002

Router2

(H.323)

Bandwidth agreement for all zones

is done on the gatekeeper.

GK1

V V

Figure 8-39 Area Bandwidth Sample Topology

The bandwidth command allows the attendant to administer the bandwidth limitations

within a zone, beyond zones, and at a per-session level. By default, the best aggregate

bandwidth is unlimited.

Example 8-23 configures the absence best bandwidth for cartage amid one zone

and addition area to 128 kbps, the absence best bandwidth for all zones to 5 Mbps,

the absence best bandwidth for a distinct affair aural any area up to 384 kbps, and

the absence best bandwidth for a distinct affair with area “Denver” of up to

256 kbps.

Example 8-23 Area Bandwidth Command Example

GK1(config)#gatekeeper

GK1(config-gk)#bandwidth interzone absence 128

GK1(config-gk)#bandwidth absolute absence 5000

GK1(config-gk)#bandwidth affair absence 384

GK1(config-gk)#bandwidth affair area denver 256

The bandwidth Command

The abounding command syntax for the bandwidth command is as follows:

bandwidth {interzone | absolute | affair | alien | check-destination} {default |

zone zone-name} bandwidth-size

Table 8-4 describes the ambit of the bandwidth command.

Table 8-4 Bandwidth Command Parameters

Parameter Description

Interzone Absolute bulk of bandwidth for H.323 cartage from a area to any other

zone.

Total Absolute bulk of bandwidth for H.323 cartage accustomed in a zone.

Session Best bandwidth accustomed for a affair in a zone.

Remote Absolute bandwidth for H.323 cartage amid this attendant and any

other gatekeeper.

check-destination Enables the attendant to verify accessible bandwidth assets at a

destination endpoint.

Default Absence amount for all zones.

zone zone-name Specifies a accurate zone.

bandwidth-size Best bandwidth, in kbps.

For interzone, alien and total, the ambit is 1–10,000,000. For session,

the ambit is 1–5000.

Following are Cisco-provided acceptance guidelines for the bandwidth command:

■ To specify best bandwidth for cartage amid one area and any added zone,

use the absence keyword with the interzone keyword.

■ To specify best bandwidth for cartage aural one area or for cartage between

that area and addition area (interzone or intrazone), use the absence keyword with

the absolute keyword.

■ To specify best bandwidth for a distinct affair aural a specific zone, use the

zone keyword with the affair keyword.

■ To specify best bandwidth for a distinct affair aural any zone, use the default

keyword with the affair keyword.

Zone Bandwidth Agreement Example

Figure 8-40 and Archetype 8-24 appearance a sample of a agreement for a gatekeeper.

508 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

Figure 8-40 Area Bandwidth Agreement Topology

Example 8-24 Area Bandwidth Agreement Example

Chapter 8: Configuring H.323 Gatekeepers 509

IP WAN

PSTN

Router1

(MGCP)

Zone SanJose Area Chicago

Gatekeeper

Phone1-1

2001

Phone2-1

3001

Phone1-2

2002

Phone2-2

3002

Router2

(H.323)

GK1

V V

GK1(config)#gatekeeper

GK1(config-gk)#zone bounded SanJose cisco.com 192.168.1.15

GK1(config-gk)#zone bounded Chicago cisco.com

GK1(config-gk)#zone prefix SanJose 2... gw-priority 10 ICT_CM_1

GK1(config-gk)#zone prefix SanJose 2... gw-priority 9 ICT_CM_2

GK1(config-gk)#zone prefix Chicago 3... gw-priority 10 CME

GK1(config-gk)#gw-type-prefix 1#* default-technology

GK1(config-gk)#bandwidth interzone area SanJose 384

GK1(config-gk)#bandwidth interzone area Chicago 256

GK1(config-gk)#no shutdown

There are two bounded zones: SanJose and Chicago. Notice that the bandwidth interzone

commands are highlighted. In the bandwidth command, the interzone advantage specifies

the bandwidth from one area to addition zone. The aboriginal bandwidth command allocates

384 kbps of bandwidth for H.323 cartage amid the SanJose area and any added zone.

The additional bandwidth command allocates 256 kbps of bandwidth for H.323 traffic

between the Chicago area and any added zone.

Verifying Area Bandwidth Operation

Example 8-25 shows the achievement of the appearance attendant area cachet command. In the

bandwidth advice output, you can see the best interzone bandwidth for all

calls in the SanJose zone. In this scenario, a bandwidth of 384 kbps is configured.

Example 8-25 Verifying Area Bandwidth Operation

510 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

Router#show attendant area status

GATEKEEPER ZONES

================

GK name Domain Name RAS Address PORT FLAGS

------- ----------- ----------- ----- -----

SanJose cisco.com 192.168.1.15 1719 LS

BANDWIDTH INFORMATION (kbps) :

Maximum absolute bandwidth : unlimited

Current absolute bandwidth : 0

Maximum interzone bandwidth : 384

Current interzone bandwidth : 0

Maximum affair bandwidth : unlimited

SUBNET ATTRIBUTES :

All Added Subnets : (Enabled)

Verifying Attendant Functionality

Verifying Attendant Functionality

Cisco IOS supports several commands for acceptance and troubleshooting H.323 gateway

and attendant configuration, such as the following:

■ appearance attendant gw-type-prefix: Displays the technology prefix of a gateway

■ appearance attendant status: Displays the all-embracing attendant status, including area status

■ appearance attendant area prefix: Displays the area prefixes accepted to a gatekeeper

■ appearance attendant calls: Displays accepted calls accepted to a gatekeeper

■ appearance attendant endpoints: Displays endpoints currently registered with a

gatekeeper

■ appearance attendant area status: Displays the cachet of zones registered with a

gatekeeper

■ alter h225 {asn1 | events}: Displays H.225 action in real-time

■ alter h245 {asn1 | events}: Displays H.245 action in real-time

■ alter ras: Displays RAS messages, in real-time, to and from a gatekeeper

Note The achievement from some of these commands is provided beforehand in the “Verifying

Gatekeepers” area of this chapter.

The afterward examples allegorize the achievement of a few of these commands. First, you can

use the appearance attendant gw-type-prefix command to affectation configured prefixes, as

illustrated in Example 8-18.

Example 8-18 appearance attendant gw-type-prefix Command

Chapter 8: Configuring H.323 Gatekeepers 503

Router#show attendant status

Gatekeeper State: UP

Load Balancing: DISABLED

Flow Control: DISABLED

Zone Name: HQ

Zone Name: BR

Accounting: DISABLED

Endpoint Throttling: DISABLED

Security: DISABLED

Maximum Remote Bandwidth: unlimited

Current Remote Bandwidth: 0 kbps

Current Remote Bandwidth (w/ Alt GKs): 0 kbps

The appearance attendant cachet command, as apparent in Example 8-19, displays the cachet of

the gatekeeper.

Example 8-19 appearance attendant cachet Command

Router#show attendant status

Gatekeeper State: UP

Load Balancing: DISABLED

Flow Control: DISABLED

Zone Name: HQ

Zone Name: BR

Accounting: DISABLED

Endpoint Throttling: DISABLED

Security: DISABLED

Maximum Remote Bandwidth: unlimited

Current Remote Bandwidth: 0 kbps

Current Remote Bandwidth (w/ Alt GKs): 0 kbps

Additionally, you can use the appearance attendant area prefix command to affectation configured

zone prefixes, as approved in Example 8-20.

Example 8-20 appearance attendant area prefix Command

504 Authorized Self-Study Guide: Cisco Voice over IP (CVOICE)

Router#show attendant area prefix

ZONE PREFIX TABLE

=================

GK-NAME E164-PREFIX

------- -----------

HQ 1...

BR 2...

You can use the appearance attendant endpoints command to affectation registered endpoints of

the gatekeeper, as apparent in Example 8-21.

Example 8-21 appearance attendant endpoints Command

Router#show attendant endpoints

GATEKEEPER ENDPOINT REGISTRATION

================================

CallSignalAddr Port RASSignalAddr Port Area Name Type Flags

--------------- ----- --------------- ----- --------- ---- -----

10.1.250.101 1720 10.1.250.101 58963 HQ H323-GW

H323-ID: GW-A1

E164-ID: 1101

E164-ID: 1102

Voice Capacity Max.= Avail.= Current.= 0

10.1.250.102 1720 10.1.250.102 58306 BR VOIP-GW

H323-ID: GW-A2

Voice Capacity Max.= Avail.= Current.= 0

Total cardinal of alive registrations = 2

Dial-Peer Configuration


Dial-Peer Configuration

The VoIP punch associate determines how to absolute calls that arise from a bounded articulation port

into a VoIP billow to the RAS affair target. The affair ambition indicates the abode of

the alien aperture area the alarm is terminated.

In the book presented in Figure 8-37 and Archetype 8-16, all calls appointed for 2...

will be baffled from Houston to the gatekeeper.

500 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

San Jose

Gatekeeper

Houston

(H.323)

Fa0/1

SanJose

(H.323)

Houston

Phone2-1

3001

Phone2-2

3002

Phone1-1

2001

Phone1-2

2002

WAN

GK1

Figure 8-37 Dial-Peer Agreement Topology

Example 8-16 Configuring a Punch Associate for Attendant Operation

Chapter 8: Configuring H.323 Gatekeepers 501

GK1(config)#gateway

GK1(config)#dial-peer articulation 1 voip

GK1(config-dial-peer)#destination arrangement 2...

GK1(config-dial-peer)#tech-prefix 1#

GK1(config-dial-peer)#session ambition ras

You can use the afterward accomplish to actualize a punch associate to be acclimated with a gatekeeper.

Step 1. Enter dial-peer agreement mode.

Router(config)#dial-peer articulation 1 voip

Step 2. Specify the E.164 abode associated with this punch peer.

Router(config-dial-peer)#destination arrangement 2...

Step 3. (Optional) Define the numbers acclimated as the technology prefix that the gateway

uses to annals with the gatekeeper.

Router(config-dial-peer)#tech-prefix 1#

Note In this example, no prepending of a technology prefix is all-important because of the

default technology agreement on the gatekeeper.

Step 4. Specify that the RAS agreement is actuality acclimated to actuate the IP abode of

the affair ambition (meaning a attendant translates the E.164 abode to an IP

address).

Router(config-dial-peer)#session ambition ras

Note Back ambidextrous with casework numbers, such as 911, accomplish abiding to accommodate the no

e.164 annals command.

Example 8-17 shows the use of the no e.164 annals command back configuring a dial

peer for 911 operation.

Example 8-17 911 Dial-Peer Configuration

502 Authorized Self-Study Guide: Cisco Articulation over IP (CVOICE)

Router(config)#dial-peer articulation 911 pots

Router(config-dial-peer)#destination arrangement 911

Router(config-dial-peer)#prefix 911

Router(config-dial-peer)#no e.164 register

Router(config-dial-peer)#session ambition ras

Configuring Gateways to Use H.323 Gatekeepers

Configuring Gateways to Use H.323 Gatekeepers
Following are the configuration steps for registering a gateway on a gatekeeper:
Step 1. Enable the gateway process on the router.
Step 2. Configure interface commands for H.323 registration at the gatekeeper.
Step 3. Configure the dial peers that are pointing to the gatekeeper.
Step 4. If necessary, prevent ephone-dn and dial-peer registration at the gatekeeper.
Example 8-15 and Figure 8-36 show the configuration for a gateway registering with a
gatekeeper.
Example 8-15 H.323 Gateway Configuration
SanJose#show running-config
gateway
!
interface Loopback 0
ip address 192.168.1.3 255.255.255.0
h323-gateway voip interface
h323-gateway voip bind srcaddr 192.168.1.3
h323-gateway voip id GK1 ipaddr 192.168.1.15 1719 priority 1
h323-gateway voip h323-id Houston
h323-gateway voip tech-prefix 1#
Figure 8-36 Configuring Gateways to Use H.323 Gatekeepers
You can use the following steps to configure gateways to use H.323 gatekeepers.
Step 1. Enable the H.323 VoIP gateway to register with a gatekeeper.
Router(config)#gateway
Sometimes it is helpful to enable the gateway process at the end of your gateway
configuration to avoid automatic gateway registration at the gatekeeper.
For example, this is useful if you have multiple gatekeepers and want to make
sure you are unicasting to a specific gatekeeper or using a specific H.323 ID.
This allows all interface commands to be entered before the gateway attempts
registration with the gatekeeper.
Step 2. Enter interface configuration mode for the interface you intend to use for
communication with the H.323 gatekeeper.
Router(config)#interface loopback 0
Step 3. Give the interface an IP address.
Router(config-if)#ip-address 192.168.1.3 255.255.255.0
Step 4. Configure the interface as an H.323 gateway interface.
Router(config-if)#h323-gateway voip interface
Step 5. Define the IP address on the gateway to be used for H.323 communication.
Router(config-if)#h323-gateway voip bind srcaddr 192.168.1.3
Step 6. Define the name and location of the gatekeeper.
Router(config-if)#h323-gateway voip id Houston ipaddr 192.168.1.15 1719
priority 1
498 Authorized Self-Study Guide: Cisco Voice over IP (CVOICE)
San Jose
Gatekeeper
192.168.1.15
Houston
(H.323)
192.168.1.3
Fa0/1
SanJose
(H.323)
Houston
Phone2-1
3001
Phone2-2
3002
Phone1-1
2001
Phone1-2
2002
WAN
GK1

This command is acclimated to specify the IP abode of the attendant and the

zone the aperture should annals with, in this case Houston. Without the voip

id parameter, the aperture will use multicast for attendant discovery. When

using multicast, the aperture will annals with the aboriginal accessible area on the

gatekeeper. The attendant ID is the area the aperture should annals with.

Step 7. Specify the H.323 aperture name to analyze it to its associated gatekeeper.

Router(config-if)#h323-gateway voip h323-id Houston

This is an alternative command acclimated to analyze a aperture to its associated gatekeeper.

In this case, the aperture will annals with the name Houston at the

gatekeeper.

Step 8. Specify the technology prefix the aperture registers with the gatekeeper.

Router(config-if)#h323-gateway voip tech-prefix 1#

The aperture will acquaint the attendant it wants to annals with a technology

prefix of 1#. Each technology prefix can accommodate as abounding as 11 characters.

Although not carefully necessary, a batter assurance (#) is frequently acclimated as the last

digit in a technology prefix.

Table 8-3 provides a table of aperture interface agreement commands and explains

their purpose.

Table 8-3 Aperture Interface Agreement Commands

Command Purpose

h323-gateway voip interface Identifies an interface as a VoIP aperture interface.

h323-gateway voip id (Optional) Defines the name and area of the gatekeeper

gatekeeper-id {ipaddr for this gateway.

ip-address [port]| multicast} Following are the keywords and arguments:

[priority priority] ■ gatekeeper-id: H.323 identification of the gatekeeper,

which should bout a area configured on a gatekeeper. If

no bout is found, the attendant will annals the gateway

with the aboriginal configured bounded zone.

■ ipaddr ip-address: IP abode acclimated to analyze the

gatekeeper.

■ port: UDP anchorage cardinal acclimated for communicating with a

gatekeeper.

■ multicast: Acclimated by the aperture to locate a gatekeeper.

■ antecedence priority: This is the antecedence of this gatekeeper.

The adequate ambit is 1–127, and the absence is 127.

continues

Table 8-3 Gateway Interface Configuration Commands (continued)
Command Purpose
h323-gateway voip (Optional) Defines the H.323 name of the gateway that
h323-id interface-id identifies this gateway to its associated gatekeeper.
Usually this ID is the name of the gateway, with the gatekeeper
domain name appended to the end: name@domainname.
h323-gateway voip (Optional) Defines the numbers used as the technology prefix
tech-prefix prefix that the gateway uses to register with a gatekeeper.
This command can contain up to 11 characters. Although it is
not strictly necessary, a pound symbol (#) is frequently used
as the last digit in a prefix. Valid characters are 0–9, #, and *.

Configuring Technology Prefixes

Configuring Technology Prefixes
To enable the gatekeeper to select the appropriate hop-off gateway, use the gw-typeprefix
command to configure technology or gateway-type prefixes. Select technology
prefixes to denote different types or classes of gateways. The gateways are then configured
to register with their gatekeepers using these technology prefixes.
As an example, Example 8-14 and Figure 8-35 illustrate a sample technology prefix configuration,
with 99# being used as a voice gateway technology prefix and 1# being used
as a default technology prefix.
Example 8-14 Zone Prefix Configuration Example
Chapter 8: Configuring H.323 Gatekeepers 495
San Jose
Gatekeeper
SanJose2
SanJose1
Phone1-1
2001
Phone1-2
2002
WAN
GK1
GK1(config)#gatekeeper
GK1(config-gk)#zone local SanJose cisco.com 10.1.1.10
GK1(config-gk)#zone local Houston cisco.com
GK1(config-gk)#zone prefix SanJose 2... gw-priority 10 SanJose
GK1(config-gk)#zone prefix Houston 3... gw-priority 10 Houston
GK1(config-gk)#gw-type-prefix 99#* gw ipaddr 192.168.1.1 1720
GK1(config-gk)#gw-type-prefix 1#* default-technology
GK1(config-gk)#no shutdown
Figure 8-35 Configuring Technology Prefixes
As an additional example, voice gateways might register with a technology prefix of 1#,
and H.320 gateways might register with a technology prefix of 2#. If several gateways of
the same type exist, configure them to register with the same prefix type. By having
them register with the same prefix type, the gatekeeper treats the gateways as a pool out
of which a random selection is made whenever a call for that prefix type arrives.
Callers will need to know the technology prefixes that are defined and the type of device
they are trying to reach. This enables them to prepend the appropriate technology prefix
to the destination address for the type of gateway needed to reach the destination.
If the callers know the type of device they are trying to reach, they can include the technology
prefix in the destination address to indicate the type of gateway to use to get to
the destination. For example, if a caller knows that address 2125551111 belongs to a regular
telephone, the destination address of 99#2125551111 can be used, where 99# indicates
the address should be resolved by a voice gateway. When the voice gateway
receives the call for 99#2125551111, it strips off the technology prefix and bridges the
next leg of the call to the telephone at 2125551111.
Additionally, when you use the gw-type-prefix command, you can define a specific
gateway-type prefix as the default gateway type to be used for addresses that cannot be
resolved. This also forces a technology prefix to always hop off in a particular zone.
If the majority of calls hop off on a particular type of gateway, you can configure the
gatekeeper to use that type of gateway as the default type so that callers no longer have
to prepend a technology prefix on the address. For example, if voice gateways are mostly
used in a network, and all voice gateways have been configured to register with technology
prefix 1#, the gatekeeper can be configured to use 1# gateways as the default technology
if this command is entered:
GK1(config-gk)#gw-type-prefix 1#* default-technology
496 Authorized Self-Study Guide: Cisco Voice over IP (CVOICE)
San Jose
Gatekeeper
Houston
(H.323)
SanJose
(H.323)
Houston
Phone2-1
3001
Phone2-2
3002
Phone1-1
2001
Phone1-2
2002
WAN
GK1
Now a caller no longer needs to prepend 1# to use a voice gateway. Any address that
does not contain an explicit technology prefix will be routed to one of the voice gateways
that registered with 1#.
With this default technology definition, a caller could ask the gatekeeper for admission to
2125551111. If the local gatekeeper does not recognize the zone prefix as belonging to
any remote zone, it will route the call to one of its local (1#) voice gateways so the call
hops off locally. However, if it knows the San Jose gatekeeper handles the 212 area code,
it can send a location request for 2125551111 to that gatekeeper. This requires the San
Jose gatekeeper also be configured with some default gateway-type prefix and its voice
gateways be registered with that prefix type.
Chapter 8: Configuring H.323 Gatekeepers 497
Note You must use consistent technology prefixes throughout a gatekeeper deployment
and have a consistent dial plan mapped out prior to implementation.

Configuring Zone Prefixes

Configuring Zone Prefixes
A zone prefix is a string of numbers that is used to associate a gateway to a dialed number
in a zone. In Figure 8-34 and Example 8-13, the gatekeeper supports the 2... and 3...
zone prefixes. The four digits are used by the gatekeeper for resolving the addresses. The
San Jose and Houston sites use these digits for dialing between the sites. The gateways in
each zone register with either “2” or “3” at the gatekeeper. This allows the gatekeeper to
route the calls for a specific number range to the correct zone and gateway. Instead of
using 2... and 3... for the zone prefix configuration, you could use 2* and 3* for the prefixes.
The *symbol defines an endless number of digits. For example, a call to 24,
22224444, 2123, or 299999999999 would be routed to the designated gateway.
Example 8-13 Zone Prefix Configuration Example
GK1(config)#gatekeeper
GK1(config)#zone local SanJose cisco.com 10.1.1.10
GK1(config)#zone local Houston cisco.com
GK1(config)#zone prefix SanJose1 2... gw-priority 5 SanJose
GK1(config)#zone prefix SanJose2 2... gw-priority 10 Houston
GK1(config)#no shutdown
Figure 8-34 Configuring Zone Prefixes
You can complete the following steps to configure zone prefixes on a gatekeeper.
Step 1. Enter gatekeeper configuration mode.
GK1(config)#gatekeeper
Step 2. Add a prefix to the gatekeeper zone list.
GK1(config-gk)#zone prefix SanJose1 2... gw-priority 5 SanJose
GK1(config-gk)#zone prefix SanJose2 2... gw-priority 10 SanJose

Configuring Gatekeeper Zones

Configuring Gatekeeper Zones
The scenario presented in Figure 8-33 and Example 8-12 shows the basic steps to configure
gatekeepers managing two local zones.
Chapter 8: Configuring H.323 Gatekeepers 493
San Jose
Gatekeeper
10.1.1.10
Houston
(H.323)
SanJose
(H.323)
Houston
Phone2-1
3001
Phone2-2
3002
Phone1-1
2001
Phone1-2
2002
WAN
Austin
(H.323)
Gatekeeper
10.1.1.12
Austin
GK1
GK2
Figure 8-33 Configuring Zones
Example 8-12 Zone Configuration Example
GK1(config)#gatekeeper
GK1(config-gk)#zone local SanJose cisco.com 10.1.1.10
GK1(config-gk)#zone local Houston cisco.com enable-intrazone
GK1(config-gk)#zone remote Austin cisco.com 10.1.1.12
GK1(config-gk)#no shutdown
The gatekeeper is configured for the two zones: San Jose and Houston.
You can use the following procedure to configure zones on a gatekeeper:
Step 1. Enter gatekeeper configuration mode.
GK1(config)#gatekeeper
Step 2. Specify local zones to be controlled by the gatekeeper.
GK1(config-gk)#zone local SanJose cisco.com 10.1.1.10
GK1(config-gk)#zone local Houston cisco.com enable-intrazone
494 Authorized Self-Study Guide: Cisco Voice over IP (CVOICE)
Note Setting the IP address for one local zone makes it the address used for all local
zones.
Step 3. Specify a remote gatekeeper to which the local gatekeeper can send location
requests (LRQs).
GK1(config-gk)#zone remote Austin cisco.com 10.1.1.12
Step 4. Activate the gatekeeper.
GK1(config-gk)#no shutdown

Configuring H.323 Gatekeepers

Configuring H.323 Gatekeepers

In this section, you will apprentice how to configure basal attendant functionality. You will

learn how to configure gatekeepers and Cisco Unified Communications Manager to operate

together. You will additionally apprentice how to configure gateways to annals with a gatekeeper.

Gatekeeper Agreement Steps

Following are the basal accomplish all-important to configure a Cisco IOS attendant and gateway:

Step 1. Configure bounded and alien zones on the gatekeeper.

Step 2. Configure area prefixes for all zones area calls should be routed.

Step 3. Configure technology prefixes to accommodate added adaptability in alarm routing.

Step 4. Configure gateways to use H.323 gatekeepers.

Step 5. Configure punch peers.

Figure 8-32 shows a accepted cartography area a distinct accessory (which in this book is a

gatekeeper) manages assorted zones. Only one attendant can ascendancy a area at any time.

The San Jose aperture is registered with the attendant in the San Jose zone, and the

Houston aperture is registered in the Houston area with the Houston gatekeeper. The

gatekeeper is amenable for alarm resolution, Alarm Admission Ascendancy (CAC), and other

features ahead declared in this chapter. After the alarm setup, the IP phones (which in

this case are Phone1-1 and Phone2-2) are anon connected.

Chapter 8: Configuring H.323 Gatekeepers 489

San Jose

Gatekeeper

Houston

(H.323)

SanJose

(H.323)

Houston

Phone2-1

3001

Phone2-2

3002

Phone1-1

2001

Phone1-2

2002

WAN

Figure 8-32 Distinct Gatekeeper—Multizone Agreement Scenario

Gateway Alternative Process

The attendant maintains a abstracted aperture list, ordered by priority, for anniversary of its zone

prefixes. If a aperture does not accept an assigned antecedence for a area prefix, it defaults to

priority 5, which is the median. To absolutely bar the use of a aperture for a area prefix,

the aperture charge be authentic as accepting a antecedence 0 for that area prefix.

When selecting gateways, the attendant identifies a ambition basin of gateways by performing

a longest area prefix match. Then it selects from the ambition basin according to priorities

and ability availability. If all acute gateways are busy, a low-priority gateway

might be selected.

Cisco H.323 adaptation 2 software improves the aperture alternative action as follows:

■ Back added than one aperture is registered in a zone, the adapted area prefix command

allows alternative priorities to be assigned to these gateways on the base of the

dialed prefix.

■ Aperture ability advertisement allows the aperture to acquaint the attendant back H.323

resources are accepting low. The attendant uses this advice to actuate which

gateway to use to complete a call.

Configuration Considerations

When configuring a gatekeeper, accumulate the afterward in mind:

■ Assorted bounded zones can be defined. The attendant manages all configured local

zones. Intrazone behavior is amid the attendant and the endpoints and gateways

within a specific zone. A attendant can abutment added than one zone. Even though

there is a distinct attendant per bounded zone, the communications amid zones are

considered to be interzone. So, the aforementioned attendant can abutment both intrazone and

interzone communications.

■ Only one RAS IP altercation can be authentic for all bounded zones. You cannot configure

each area to use a altered RAS IP address. If you ascertain this IP abode in the first

zone definition, you can omit it for all consecutive zones that automatically aces up

this address. If you set it in a consecutive area bounded command, it additionally changes the

RAS IP abode of all ahead configured bounded zones. After the IP abode is

defined, you can change it by reissuing any area bounded command with a different

RAS IP address.

■ You cannot abolish a bounded area if there are endpoints or gateways registered in it. To

remove the bounded zone, aboriginal shut bottomward the gatekeeper, which armament the endpoints,

gateways, and the bounded area to unregister.

■ Assorted analytic gatekeepers ascendancy the assorted zones on the aforementioned Cisco IOS

platform.

■ The best cardinal of bounded zones authentic in a attendant should not beat 100.

Basic Attendant Agreement Commands

Table 8-2 shows basal attendant agreement commands.

Table 8-2 Basal Attendant Agreement Commands

Command Purpose

Gatekeeper Enters attendant agreement mode.

zone bounded gatekeeper-name Specifies a area controlled by a gatekeeper.

domain-name [ras-ip-address] ■ gatekeeper-name: Specifies the area name. This is usually

[invia inbound_gatekeeper | the absolutely able area name of the gatekeeper.

outvia outbound_gatekeeper ■ domain-name: Specifies the area name served by this

[enable-intrazone]] gatekeeper.

■ ras-ip-address: (Optional) Specifies the IP abode of one

of the interfaces on the gatekeeper. Back the gatekeeper

responds to attendant analysis messages, it signals the

endpoint or aperture to use this abode in future

communications.

■ invia inbound_gatekeeper: Specifies the attendant used

for calls entering this zone.

■ outvia outbound_gatekeeper: Specifies the gatekeeper

used for calls abrogation this zone.

■ enable-intrazone: Armament all intrazone calls to use the via

gatekeeper.

zone alien other- Statically specifies a alien area if area name service

gatekeeper-name other- (DNS) is bare or undesirable.

domain-name other- ■ other-gatekeeper-name: Name of the alien gatekeeper.

gatekeeper-ip-address ■ other-domain-name: Area name of the remote

[port-number] [cost cost-value gatekeeper.

[priority priority-value]] ■ other-gatekeeper-ip-address: IP abode of the remote

[foreign-domain] [invia gatekeeper.

inbound_gatekeeper] | [outvia ■ port-number: (Optional) RAS signaling anchorage cardinal for

outbound_gatekeeper] the alien zone. The ambit is 1–65535. If the amount is not

set, the absence is the acclaimed RAS anchorage cardinal of 1719.

■ amount cost-value: (Optional) Amount of the zone. The ambit is

1–100. The absence is 50.

■ antecedence priority-value: (Optional) Antecedence of the zone.

The ambit is 1–100. The absence is 50.

■ foreign-domain: (Optional) The array is in a different

administrative domain.

■ invia inbound_gatekeeper: Specifies the attendant for

calls entering this zone.

■ outvia outbound_gatekeeper: Specifies the attendant for

calls abrogation this zone.

continues

Chapter 8: Configuring H.323 Gatekeepers 491

Table 8-2 Basal Attendant Agreement Commands (continued)

Command Purpose

zone prefix gatekeeper- Adds a prefix to the attendant area list. The alternative blast

name e164-prefix [blast | seq] and seq ambit are for accountability advanced attendant networks.

[gw-priority antecedence gw- ■ gatekeeper-name: Name of a bounded or alien gatekeeper,

alias [gw-alias, ...]] which charge accept been authentic by application the area bounded or

zone alien command.

■ e164-prefix: E.164 prefix in accepted anatomy followed by

dots (.). Anniversary dot represents a cardinal in the E.164 address.

■ blast: (Optional) If you account assorted hop-offs, this indicates

that the LRQs should be beatific accompanying to the

gatekeepers based on the adjustment in which they were listed.

The absence is seq.

■ seq: (Optional) If you account assorted hop-offs, this indicates

that the LRQs should be beatific sequentially to the

gatekeepers based on the adjustment in which they were listed.

■ gw-priority antecedence gw-alias: (Optional) Defines how the

gatekeeper selects gateways in its bounded area for calls to

numbers alpha with the defined e164-prefix. The

range is 0–10, area 0 prevents the attendant from using

the gateway’s gw-alias for that prefix, and 10 places the

highest antecedence on gateway’s gw-alias. The absence is 5.

gw-type-prefix type-prefix Configures a technology prefix in the gatekeeper. Technology

[[hopoff gkid1] [hopoff prefixes can be configured either on a attendant or directly

gkid2] [hopoff gkidn] [seq | on a gateway.

blast]] [default-technology] Back application appropriate flags (hop off or default-technology),

[[gw ipaddr ipaddr [port]]] configure the prefix on the attendant and on the gateway.

■ type-prefix: A technology prefix is accustomed and is

stripped afore blockage for the area prefix.

■ hopoff gkid: (Optional) Use this advantage to specify the

gatekeeper area the alarm is to hop off, behindhand of the

zone prefix in the destination address. The gkid argument

refers to a attendant ahead configured application the zone

local and/or area alien commands.

■ seq | blast: (Optional) If you account assorted hop offs, this indicates

that the LRQs should be beatific sequentially or simultaneously

(blast) to the gatekeepers according to the adjustment in

which they were listed.

■ default-technology: (Optional) Gateways registering with

this prefix advantage are acclimated as the absence for acquisition any

addresses that are contrarily unresolved.

492 Authorized Self-Study Guide: Cisco Voice over IP (CVOICE)

Command Purpose

■ gw ipaddr ipaddr [port]: (Optional) Use this advantage to indicate

the aperture is butterfingers of registering technology prefixes.

When it registers, it adds the aperture to the group

for this blazon prefix, aloof as if it had beatific the technology prefix

in its registration.

no abeyance Brings a attendant online.