Polycom V2IU 4350 user manual Regular Expressions Symbol Description

Page 57

Configuring the V2IU 4350

Regular Expressions

Alias manipulation patterns and prefixes use regular expressions to match a string in the destination alias. A regular expression can be a string of literal characters to match or a set of special expressions.

Alias manipulation patterns can match a sub-string at any location and number of times within the alias. Prefixes are always searched from the left of the alias and cannot match a middle part or the end of the alias.

Regular expressions are listed in <l_link>Table 1 and <l_link>Table 2 lists some example expressions.

Table 1 Regular Expressions

Symbol

Description

 

 

.

Matches any single character.

[]

Matches any single character listed between the []. For example,

 

[abc], [123]. If the characters are separated by a -, all characters

 

between the two are matching, e.g. [a-z], [0-9]

()

Matches the literal string given, e.g. (abc)

Matches the block on either side of the , e.g. ab.

?Matches 0 or 1 of the preceding block.

*Matches 0 or more of the preceding block.

+Matches 1 or more of the preceding block.

\Escapes the special meaning of the next character.

{a}

Matches exactly 'a' numbers of the preceding block.

{a,}

Matches 'a' or more of the preceding block.

{a,b}

Matches between 'a' and 'b' (inclusive) of the preceding block.

 

 

Table 2 Example Regular Expressions

Expression Description

100Matches the string 100.

(555)?123 Matches 555123 or 123.

(408555) Matches 408 or 555.

555[0-9]{3} Matches 555 followed by exactly 3 digits.

#Matches the character '#'.

\*

Matches the character '*'. Note that '*' by itself is a regular

 

expression and must therefore be escaped with a '\' to match the

 

character itself.

 

 

3 - 39

Image 57
Contents V2IU 4350 Converged Network Appliance Trademark Information Contents Page Contents System Diagnostics Saving and Restoring the V2IU 4350 ConfigurationUpgrading the V2IU 4350 Contents Page V2IU 4350 Converged Network Appliance T1 Wide Area Network WAN Access RouterFeature Summary LED Label Activity Description Front Panel LEDsBack panel of the 4350E contains the following connections Back PanelRequired Tools and Materials Physical InstallationWall-Mount Installation Desktop InstallationRack-Mount Installation Connecting the Power and Cables AdministrationGetting Started Page Configuring the V2IU Configuration Guide For IP Centrex Applications Task Subtask Application? Configuration OutlineConfiguration Guide For Station Side IP PBX Applications Configure For Station Configuration Guide For Trunk Side IP PBX Applications Configure For Trunk Side IP Hotspot Configuration Guide For Hosted Video ApplicationsConfigure For Hosted Configuration Guide For Enterprise Video Applications Configure For Hosted Configure the LAN Interface System ConfigurationPress Submit Page Modify an Existing Vlan Configuration Configure the WAN Interface Configuring the V2IU Frame Relay Mode and Dlci Configure the Dhcp Server Mask Delete a Dhcp IP Address Configure Hostname, Snmp and Remote Logging Disable Snmp Change the Administration Password Enabling a Read-only User Read-only UserClick Submit How Subinterfaces WorksConfiguring Subinterfaces Viewing or Changing the ToS Byte Setting How the ToS Byte Setting WorksConfiguring the V2IU Configuration Configuring the V2IU Settings in the Embedded gatekeeper mode settings This is an advanced configuration option and should H.323 Settings page includes the following two buttons Alias Manipulation Activity Item Description Neighboring H.323 Neighboring page includes the following buttons Regular Expressions Regular Expressions Symbol DescriptionHow Forwarding Rules Works Forwarding RulesConfiguring Forwarding Rules Page How Peering Proxy Works Peering ProxyPage Outbound from Site C to Site a Inbound from Site a to Site C Outbound from Site C to Public IP Endpoint Configuring Peering ProxyAdding an H.323 Prefix Entry Clients List Lock Enabling the Clients List Lock To configure clients list lock, use the following stepsActivity Monitor Type of Events Callee admission request received Call Termination Received invalid data Viewing the H.323 Activity MonitorVoIP Configuration Configure the VoIP ALG Programmed in your IP phone Configure VoIP Subnet Routing Enter a VoIP Subnet Route Configure IP Phones, IADs or Softphones NAT for Data Traffic Data Networking ConfigurationProtocolPublicIPAddress/netmask-portPrivateIPAddress-port Static IP routing Firewall Configuration Enable or disable the firewall Action Description Input format Traffic Management Configuration Enable Traffic Shaping Enable CAC Optionally enable priority IP addressesCloser Look at Traffic Management Upstream Traffic Management ClassifyingDownstream Traffic Management Page System Diagnostics Viewing Networking Information Viewing the ALG registration codeRouting Information Viewing Advanced System Information Passive Voice Call Monitoring Accessing Troubleshooting ToolsVerify Registered Voice and Video Devices Performing a Ping Test Restarting Networking Processes Ewn Command Saving and Restoring the V2IU 4350 ConfigurationCopy a Backup File to a Remote Tftp Server Create a Backup File and Save in Local FlashDownload a Backup File from a Remote Tftp Server List the Available Backup FilesDelete a Backup File Page Upgrading the V2IU Upgrade Procedure for Software Revision 1.3.11 or LaterPage Appendix Troubleshooting TipsSpecifications Regulatory Notices Other Rights and Limitations Regulatory Notices Warranty and Warranty Exclusions Regulatory Notices Page Regulatory Notices Page Regulatory Notices FCC Part 68 Notice to Users of Digital Service Industry Canada IC Notice Warranty and Repair Service Center