Huawei v200r001 Typical Configuration of IP Fax, Versatile Routing Platform IP Fax Configuration

Page 224

User Manual - Configuration Guide (Volume 3)

Chapter 2

Versatile Routing Platform

IP Fax Configuration

 

Table VC-2-9Monitoring and maintenance of IP Fax

 

 

 

 

 

Operation

Command

 

 

 

 

Open all of the debugging information switches of ipfax

debug ipfax all

 

Open the debugging information switch of function api of ipfax

debug ipfax api

 

Open the debugging information switch of main task of ipfax

debug ipfax cc

 

Open the debugging information switch of controller of ipfax

debug ipfax controller

 

Open the debugging information switch of level 1 error message of ipfax

debug ipfax error 1_level

 

Open the debugging information switch of level 2 error message of ipfax

debug ipfax error 2_level

 

Open the debugging information switch of level 3 error message of ipfax

debug ipfax error 3_level

 

Open the debugging information switch of all levels of error messages of

debug ipfax error all

 

ipfax

 

 

Open the debugging information switch of T38 message of ipfax

debug ipfax t38

 

Open the debugging information switch of cisco message of ipfax

debug ipfax cisco

 

Open the debugging information switch for reading and writing fax data

debug vpm fax

 

between vpm module and voice card.

 

2.4 Typical Configuration of IP Fax

The networking mode of IP Fax is basically the same as IP Phone. Thus, the functions of IP Fax can be realized only when the telephone sets in the network of IP Phone are replaced by facsimile machines. You can basically use the functions of IP Fax only if you can configure IP Phone. The operation is easy to use.

1)Networking Requirements

Suppose a company headquarter located in Shenzhen plans to send/receive faxes to/from its Beijing branch via IP network.

The fax number of its Beijing branch is 0101002, and the number of Shenzhen headquarter is 07551001.

The IP address used to access to the Internet port through the router in Beijing is

1.1.1.2.The IP address used to access to the Internet port through the router in Shenzhen is 1.1.1.1.

The facsimile machine in Beijing is connected with the second voice port on the router, and the facsimile machine in Shenzhen is connected with the first voice port on the router.

2)Networking Diagram

port2

1.1.1.2

1.1.1.1

port1

 

 

Internet

 

0101002

Router

Router

07551001

 

Beijing

Shenzhen

 

Figure VC-2-2Networking diagram for typical IP fax configuration

 

3)Configuration Procedure

The parameter settings for the router in Beijing is as follows:

Quidway(config)# dial-peer voice 1 voip

Quidway(config-peer-voip1)# destination 07551001

Quidway(config-peer-voip1)# session target ipv4:1.1.1.1

2-6

Image 224
Contents Huawei V200R001Manual Version T2-080168-20011213-C-1.5 BOM31010868Contents About This ManualFormat Description Key Bracket, e.g. Enter , Tab , Backspace , or aKey 1 + Key Key 1, KeySymbol Action DescriptionSecurity Configuration SC HuaweiConfiguration of IKE II. IKE featuresIKE Configuration Task List Creating IKE Security PolicySelect Encryption Algorithm Select Authentication AlgorithmNo IKE security policy is created by default Select DH Group ID Set Pre-shared KeySelect Hashing Algorithm Set Lifetime of IKE Association SA Show IKE SA parameter Quidway# show crypto ike saNetworking requirements Show IKE security policy Quidway# show crypto ike policyII. Networking diagram III. Configuration procedureProblem 1 Invalid user ID information VPN Configuration VPN Table of Contents VPN features VPN OverviewAccording to operation mode Classification of IP VPNII. According to the layer where the tunnel is III. According to service purposeIV. According to networking model Configuration of L2TP Brief Introduction to L2TP ProtocolOverview of Vpdn Brief induction to VpdnTunnel and session 2 L2TP ProtocolIII. Method to realize Vpdn II. Control message and data message III. Two typical L2TP tunnel modesIV. Call setup flow of L2TP tunnel Call setup flow of L2TP channel is shown in the followingFeatures of L2TP protocol Figure VPN-2-3Call setup flow of L2TP channelConfiguring at LAC Side Configuring L2TP1 L2TP Configuration Task List Disable Vpdn to run by default II. Create Vpdn groupConfiguring at LNS Side Disable Vpdn running by defaultIV. Set the connection request to originate L2TP channel Table VPN-2-4L2TP attribute tableIII. Create/delete virtual interface template No vpdn group group-numberAccept dialin l2tp virtual-template virtual No accept dialinSet local name of channel Optional configurationIII. Force local end to perform Chap authentication Local end does not perform Chap authentication by default LCP does not renegotiate by defaultIV. LNS forces LCP to renegotiate Set domain name delimiter and search sequenceVII. Enable/disable hiding AV pairs Disable hiding AV pairs by defaultMonitoring and Maintenance of L2TP VIII. Force to disconnect tunnelTypical Configuration of L2TP Show l2tp session command domainNAS-Initialized VPN Networking requirementIII. Configuration procedure Figure VPN-2-5Networking diagram of Client-Initialized VPN Client-Initialized VPNSingle User Interconnects Headquarters via Router Chapter Fault Diagnosis of L2TP Brief introduction to the protocol Configuration of GREBrief Introduction to GRE Protocol II. Applicable range Figure VPN-3-2Format of transmission message in the tunnelConfiguring GRE GRE Configuration Task ListCreating Virtual Tunnel Interface Setting the Source Address of Tunnel InterfaceSetting the Destination Address of Tunnel Interface Setting the Network Address of Tunnel Interface Setting the Encapsulation Mode of Tunnel Interface MessageSetting the Identification Key Word of Tunnel Interface Setting Tunnel Interface to Check with Check SumShow interface tunnel tunnel-number Monitoring and Maintenance of GREDisable tunnel interface to check with check sum by default Typical Configuration of GRE Figure VPN-3-6Networking diagram of GRE applicationChapter Troubleshooting GRE Reliability Configuration LC Configuration of Backup Center Configuration of HsrpConfiguration of Backup Center Backup Center OverviewConfiguring the Backup Center Configuration Task ListBackup logic-channel logic-channel No backup delay Backup state-up interval-time Configuring Routes for Main and Backup InterfacesBackup state-down number Monitoring and Maintaining of Backup Center Typical Configuration of Backup CenterAn example of Backup Between Interfaces An Example of Multiple Backup InterfacesChapter Chapter Configuration of Hsrp Hsrp OverviewConfiguring Hsrp Starting Hsrp FunctionSetting Router’s Priority in Hsrp Hot Standby Group Setting Router’s Preemption Mode in Hsrp Standby GroupSetting Hsrp Authorization Word Standby group-number preemptSetting Hsrp Timer Table LC-2-4Set Hsrp authorization wordStandby group-numberauthentication string Monitoring the Specified InterfaceTable LC-2-6Monitor the specified interface Using Actual Interface MAC AddressModifying Virtual MAC Address Typical Configurations of Hsrp An example for single hot standby group configurationMonitoring and Maintaining Hsrp Show relevant Hsrp information Quidway# show standby202.38.160.111 An example for setting Hsrp to monitor a specified interface An example for multiple hot standby groups configuration Fault Diagnosis and Troubleshooting of Hsrp QoS Configuration QC Apply CAR Rules to Packets Which is Matched the ACL CAR Configuration ExampleConfigure CAR Rules Based on the MAC Address Three service types of QoS Best-effort ServiceII.Integrated Service QoS OverviewIII. Differentiated Service Functions of QoSChapter II. CAR Committed Access Rate Traffic Classification and PolicingTraffic Classification and Policing Introduction to Traffic ClassificationFeatures of Token Bucket Introduction to Traffic PolicingIII Complicacy Evaluation Introduction to CARII.Traffic Measuring with Token Bucket CAR Configuration CAR Configuration Task ListNo CAR rule is specified by default Specify CAR rulesMonitoring and Maintenance of CAR Table QC-2-3Monitoring and maintenance of CARApply the CAR Rule on the Interface Show CAR statistics Quidway# show car interface serialCAR Configuration Example II.ConfigurationApplying CAR Rules to All Packets RequirementsIII. Configuration Apply CAR Rules to Packets Which is Matched the ACLII.Networking diagram Configure CAR Rules Based on the Priority LevelConfigure CAR Rules Based on the MAC Address Chapter Congestion Management Congestion and Congestion ManagementAbout Congestion Congestion Management PolicyIV. WFQ Weighted Fair Queuing Fifo QueuingII. PQ Priority Queuing III. CQ Custom QueuingSelecting Congestion Management Policy Working Principle of Congestion Management Policy No. Advantages Disadvantages QueueFifo III. CQ PQ Configuration task list Configuration of Congestion ManagementConfiguring PQ II. Configuring priority queue Priority-list list-number interface type number high medium Normal lowTable QC-3-7Configuration of queue length of priority queue Interface adopts Fifo queuing by defaultIII. Applying priority queue to the interface IV. Maintaining and monitoring the priority queueII. Configuring the custom queue Configuring CQCQ configuration task list Operation Command Configure the default custom queue No custom-list list-number interface type numberIII. Applying custom queue to the interface No custom-list list-number queue queue-number limitCustom-list list-number queue queue-number byte-count No custom-list list-number queue queue-number byte-countConfiguring WFQ WFQ configuration task listII. Configuring the weighted fair queue III. Maintenance and monitoring of the weighted fair queueCQ Configuration Example Configuration Example of Congestion ManagementPQ Configuration Example Figre QC-3-6Networking diagram of CQ Configuration Versatile Routing Platform Troubleshooting of Congestion Management DDR Configuration DC DDR in Which the Router Calls Back PC Configuring Synchronous/Asynchronous Serial Port Using DDRDDR Configuration Configuration of Modem Management Introduction to DDR Technology DDR ConfigurationBrief Introduction to Dial Configuration Preparing DDR Configuration Figure DC-1-1DDR configuration preparation flowConfiguring DDR Configuring Legacy DDRConfiguration tasks of Legacy DDR include II. Configure an interface to send callsDialer string dial-string isdn-address Dialer rotary-group number III. Configure an interface to receive calls Figure DC-1-2Schematic diagram of Dialer Rotary GroupIV. Configure an interface to send and receive calls Versatile Routing Platform DDR ConfigurationSet the attribute parameters of Legacy DDR Table DC-1-13Set the idle time of busy interface Table DC-1-16Set access control of the dial interface Access-list access-list-numberdeny permitAccess-list access-list-number deny permit Permit denyIntroduction to Dialer Profile Configuring Dialer ProfileDefault interval is 300 seconds IV. Set the attribute parameters of a dial interface II. Configuration task list of Dialer ProfileIII. Configure a logic dial interface Configuring Callback Bind physical interfaces for a dialer poolSignificance of callback II. Terms and abbreviationsIV. Configure Isdn calling line identification callback Dialer caller remote-number callbackOr dialer caller remote-number Interface dialerConfigure PPP callback User name callback-dialstring telephone-numberChapter Table DC-1-28Client end using Legacy DDR to configure PPP Configuring DDR Special Functions Configure Isdn dedicated lineAutodial interval is 300 seconds by default II. Configure autodialIII. Configure cyclic use of dialer map Name Meaning Monitoring and Maintenance of DDRTable DC-1-34Configure cyclic use of dialer map Network requirements DDR Typical Configuration ExampleLegacy DDR Chapter Dialer Profile Chapter Point-to-Point DDR Networking diagramII. Configuration procedure Chapter Chapter Point-to-Multipoint DDR 8810063Chapter Chapter 8810148 Multipoint-to-Multipoint DDR8810052 III. Configuration procedure Chapter Chapter Chapter Chapter DDR Bearing IPX Chapter Chapter Chapter DDR Bearing IP and IPX at the Same Time Chapter Chapter Chapter Flow Control of Dialer Profile MP over Dialer Profile-Case RouterA RouterB BRI02.2 661012Chapter Figure DC-1-11Networking diagram of DDR Case Channels for Dial-up and Connection to the Remote End CaseChapter Two Serial Ports for Dial-up and Remote Dial Connection Case One Serial Port for Dial-up and Remote Dial Connection Case Chapter DDR for Access Service Chapter Chapter Chapter Chapter DDR for Inter-Router Callback Chapter DDR in Which the Router Calls Back PC III. Configuration procedure DDR for Autodial DDR Using Dialer Map Cyclically DDR Using Dialer Map as Backup Solution 1 Logical interface as backup interfaceChapter Configuring Synchronous/Asynchronous Serial Port Using DDR Precautions for DDR ConfigurationConfiguring Dialer-group Configuring Network Layer Address Configuring PPP In Dialer Profile Configuration Mode Apply PAP authenticationChapter II. Apply Chap authentication Chapter Configuring PPP In Legacy DDR Configuration Mode Chapter II. Apply Chap authentication Chapter Troubleshooting DDR Configure Dialer-listDDR Fault Diagnosis Whether modem is normalIII. Check whether dialer-group is configured IV. Check whether dialer-list is configured correctly Chapter DDR Fault Elimination Information displayed at the calling end Troubleshooting with DDR Debugging InformationHow to acquire DDR debugging information Information displayed at the call receiving end DDR link negotiation Down on interface Configuration of Modem Management Modem Management Functions Provided by VRP1.4Modem Script FunctionTimeout seconds Key words DescriptionConfiguring Modem Management Modem Management Configuration Task ListConfiguring Modem Call-In and Call-Out Authorities Configuring Modem ScriptSpecifying the Event to Trigger Modem Script Configuring Modem Answer ModeExecuting Modem Script Manually Typical Configuration of Modem Management Managing Modem with Modem ScriptNetworking requirements Direct Dial with Script Configuration requirementsRouter Initialization with Initialization Script Interactively Connect Cisco Router Through Modem VoIP Configuration VC VoIP Configuration IP Fax ConfigurationIphc Configuration E1 Voice ConfigurationGK Client Configuration Versatile Routing Platform Table of Contents VoIP Configuration VoIP OverviewII. H.323 protocol stack VoIP PrincipleBasic composition IP Voice Implementation over VRP III. a typical telephone call processing by VoIPIP Voice Feature over VRP Switch Router Capacity channelChapter VoIP Configuration Task List Configuring Dial-peerPots dial-peer configuration II. VoIP dial-peer configurationConfiguring Dial Terminator Ip precedence priority-numberConfiguring Abbreviated Dialing Configuring Voice PortBy default, we do not configure the dial terminator By default, we do not configure the abbreviated dialingTable VC-1-6Configuring voice-port By default, please use the shortest number match policy Configuring Global Number Match PolicyConfiguring the Recovery Method of Voice Board VoIP Monitoring and Maintenance By default, Watchdog is enabledKHT Rcvccactivecall Channel = Status = Chtransframe Typical VoIP Configuration Examples Configuring Router FXS Port for InterconnectionIII. Configuration procedures Shanghai Chapter Figure VC-1-7RouterShenzhen FXO works in the Plar mode LAN VoIP Troubleshooting III. Configuration descriptionIP Fax Configuration Configuring IP FaxTask List of IP Fax Configuration Overview to IP FaxGateway does not use ECM mode by default Checking If Configuring Fax to Use ECM ModeConfiguring Fax Rate Configuring Fax Train Mode Configuring Fax Local-train Threshold ValueBy default, the fax rate will be determined by voice mode Mode is local-train mode local by defaultConfiguring Gateway Carrier Transmit Energy Level Fax protocol t38 ls-redundancy numberNo fax protocol t38 ls-redundancy Fax protocol t38 hs-redundancy numberBy default, rtp protocol is used Monitoring and Maintenance of IP FaxBy default, T.38 protocol is used Typical Configuration of IP Fax Versatile Routing Platform IP Fax ConfigurationChapter E1 Voice Configuration Overview of E1 Voice ConfigurationFunction of E1 Voice Usage of cE1/PRI InterfaceFeatures of E1 Voice Signaling modes supportedII. Protocols and standards supported III. Support single stage dialing and two-stage dialingE1 Voice Configuration Configuration Task List of E1 VoiceConfiguring Pots dial-peer IV. Integrated transmission of voice and dataConfiguring VoIP dial-peer Table VC-3-1Configuration Commands of Pots dial-peerIncoming called-number number No incoming called-numberConfiguring the Basic Parameters of E1 Interface Table VC-3-2Configuration Commands of VoIP dial-peerConfiguring Voice Port E1 Interface Table VC-3-3Configuration Commands of E1 InterfaceTable VC-3-4Configuration Commands of E1 Voice Port Configuring E1 Voice R2 SignalingConfiguring DS0 group II. Configuring Related Parameters of R2 Signaling By default, the system has not created any DS0 groupTable VC-3-6Configuration Commands of R2 Signaling Configuring the Basic Parameters of Isdn PRI Interface Pri-group timeslots timeslots-listNo pri-group Interface serial serial-noMaintaining the MFC Channel and Circuit of the Specified TS Monitoring and Maintenance of E1 VoiceConfiguring Voice Port Isdn PRI Interface II. show Command Related to E1 Voice Quidway# show voice-port III. debug Commands Related to E1 Voice R2 signalling call statisticsRouter Connected to PBX through E1 Voice Port Typical Configuration Examples of E1 VoiceTable VC-3-11debug Commands of E1 Voice Versatile Routing Platform Router Connected to PBX in Isdn PRI Mode Two-stage Dialing Configuration II. Netwoking diagram Parameter configuration of Beijing-side router Transmission of Data and Voice SimultaneouslyFault Diagnosis and Troubleshooting of E1 Voice GK Client Configuration Configuration of GK ClientConfiguration Task List of GK Client Configuring One Interface as H.323 Gateway InterfaceConfiguring Gateway Alias Configure the GK Server Name and AddressBy default, GK Client function is deactivated Activating or Deactivate GK Client FunctionBy default, there is not any tech-prefix Configuring Tech-PrefixConfiguring GK Interworking Mode Versatile Routing Platform GK Client Configuration Typical Configuration Examples of GK ClientBe default, the GK interworking mode is cisco mode Chapter Fault Diagnosis and Troubleshooting of GK Client Iphc Configuration Overview of IphcIphc Configuration Configuration Task List of IphcEnable/disable RTP header compression No ip rtp compression-connectionsConfigure the Cisco-compatible RTP header compression Configure the deleting of udpchk field from UDP headerBy default, the udpchk field in UDP packet field is set to No ip tcp header-compressionMonitoring and Maintenance of Iphc Table VC-5-6Monitoring and Maintenance of IphcHow Are We Doing Excellent Good Fair PoorMistake Suggested Correction Line No
Related manuals
Manual 13 pages 6.76 Kb