Cisco Systems VC-289 manual Gateway with the h323-gateway voip h.323-id command, VC-324

Page 36

Configuring H.323 Gatekeepers and Proxies

H.323 Gatekeeper Configuration Task List

 

Command

Purpose

 

 

 

Step 3 Router(config-gk)# zone prefix

Adds a prefix to the gatekeeper zone list. To remove knowledge of a zone

 

gatekeeper-name e164-prefix

prefix, use the no form of this command with the gatekeeper name and prefix.

 

[gw-priority pri-0-to-10

To remove the priority assignment for a specific gateway, use the no form of

 

gw-alias [gw-alias, ...]]

 

this command with the gw-priorityoption.

 

 

 

 

The keywords and arguments are as follows:

 

 

gatekeeper-name—Specifies the name of a local or remote gatekeeper,

 

 

which must have been defined by using the zone local or zone remote

 

 

command.

 

 

e164-prefix—Specifies an E.164 prefix in standard form followed by dots

 

 

(.). Each dot represents a number in the E.164 address. For example,

 

 

212....... is matched by 212 and any seven numbers.

 

 

Note Although a dot representing each digit in an E.164 address is the

 

 

preferred configuration method, you can also enter an asterisk (*) to

 

 

match any number of digits.

 

 

gw-priority pri-0-to-10gw-alias—(Optional) Use the gw-priority

 

 

option to define how the gatekeeper selects gateways in its local zone for

 

 

calls to numbers that begin with prefix e164-prefix. Do not use this option

 

 

to set priority levels for a prefix assigned to a remote gatekeeper.

 

 

Use values from 0 to 10. A 0 value prevents the gatekeeper from using the

 

 

gateway gw-aliasfor that prefix. Value 10 places the highest priority on

 

 

gateway gw-alias. If you do not specify a priority value for a gateway, the

 

 

value 5 is assigned.

 

 

To assign the same priority value for one prefix to multiple gateways, list

 

 

all the gateway names after the pri-0-to-10value.

 

 

The gw-aliasname is the H.323 identification (ID) of a gateway that is

 

 

registered or that will register with the gatekeeper. This name is set on the

 

 

gateway with the h323-gateway voip h.323-id command.

 

 

 

To put all your gateways in the same zone, use the gw-priorityoption and specify which gateways are used for calling different area codes. For example:

zone local localgk xyz.com

 

 

zone prefix localgk 408

 

 

zone

prefix

localgk

415

gw-priority

10 gw1 gw2

zone

prefix

localgk

650

gw-priority

0 gw1

The above commands accomplish the following:

Domain xyz.com is assigned to gatekeeper localgk.

Prefix 408 is assigned to gatekeeper localgk, and no gateway priorities are defined for it; therefore, all gateways registering to localgk can be used equally for calls to the 408 area code. No special gateway lists are built for the 408 prefix; a selection is made from the master list for the zone.

The prefix 415 is added to gatekeeper localgk, and priority 10 is assigned to gateways gw1 and gw2.

Cisco IOS Voice, Video, and Fax Configuration Guide

VC-324

Image 36
Contents Configuring H.323 Gatekeepers and Proxies VC-289Principal Multimedia Conference Manager Functions VC-290Zone and Subnet Configuration Redundant H.323 Zone SupportGatekeeper Multiple Zone Support Gateway Support for Alternate GatekeepersTechnology Prefixes VC-292Interzone Communication Radius and TACACS+Accounting via Radius and TACACS+ Terminal Name RegistrationInterzone Routing Using E.164 Addresses VC-294VC-295 Hsrp Support VC-296Security VC-297Proxy Inside the Firewall VC-298Proxy in Co-Edge Mode VC-299Proxy Outside the Firewall Proxies and NATVC-300 Quality of Service Application-Specific RoutingVC-301 Prerequisite Tasks and Restrictions VC-302Configuring the Gatekeeper VC-303Starting a Gatekeeper VC-304H323-gateway voip h.323-id command Gw-prioritypriority gw-alias-Optional UseVC-305 Zone subnet command Mask-addressenableSubnet local-gatekeeper-name Subnet-address /bits-in-maskConfiguring Intergatekeeper Communication Server-address2...server-address6 -OptionalRas gk-id@host port priority VC-307Configuring Redundant H.323 Zone Support Other-gatekeeper-ip-address-Specifies the IPVC-308 Configuring Local and Remote Gatekeepers VC-309Configuring Redundant Gatekeepers for a Zone Prefix Verifying Zone Prefix RedundancyOther-gatekeeper-name -Name of the remote Other-gatekeeper-ip-address -IP addressConfiguring Redundant Gatekeepers for a Technology Prefix Zone local or zone remote command. You canVC-311 Verifying Technology Prefix Redundancy VC-312Configuring Static Nodes VC-313Configuring H.323 Users via Radius VC-314Server radius or aaa group server tacacs+ VC-315VC-316 Password default password-Specifies VC-317Configuring a RADIUS/AAA Server VC-318Users via Radius section on VC-319Configuring User Accounting Activity for Radius VC-320Configuring E.164 Interzone Routing Other-gatekeeper-ip-address -Specifies the IPVC-321 Configuring H.323 Version 2 Features VC-322Configuring a Dialing Prefix for Each Gateway VC-323Gateway with the h323-gateway voip h.323-id command VC-324Following is an example of a registration message VC-325Configuring a Prefix to a Gatekeeper Zone List VC-326Arq, lcf, lrj, lrq, rrq, urq -Specifies Registration VC-327VC-328 VC-329 Configuring Inbound or Outbound Gatekeeper Proxied Access Remote-zone remote-zone-name -Defines aVC-330 Verifying Gatekeeper Proxied Access Configuration Router# show gatekeeper zone statusVC-331 Configuring the Proxy Configuring a Forced Disconnect on a GatekeeperVC-332 Configuring a Proxy Without ASR Show interfaces commandVC-333 VC-334 VC-335 VC-336 Configuring a Proxy with ASR TunnelVg-anylan VC-337Without ASR section on VC-338VC-339 Cisco IOS Dial Technologies Command VC-340VC-341 VC-342 VC-343 VC-344 Configuring a Proxy with ASR section on VC-345Configuring a Gatekeeper Example VC-346Redundant Gatekeepers for a Zone Prefix Example Redundant Gatekeepers for a Technology Prefix ExampleInterzone Routing Example VC-347VC-348 Configuring Hsrp on the Gatekeeper Example VC-349Using ASR for a Separate Multimedia Backbone Example VC-350Enabling the Proxy to Forward H.323 Packets Isolating the Multimedia NetworkVC-351 PX1 Configuration VC-352R1 Configuration VC-353Co-Edge Proxy with Subnetting Example VC-354VC-355 PX2 Configuration R2 ConfigurationVC-356 Configuring a QoS-Enforced Open Proxy Using Rsvp Example VC-357VC-358 Configuring a Closed Co-Edge Proxy with ASR VC-359Defining Multiple Zones Example Defining One Zone for Multiple Gateways ExampleVC-360 Configuring a Proxy for Inbound Calls Example Configuring a Proxy for Outbound Calls ExampleVC-361 Removing a Proxy Example Security Example VC-362Gktmp and RAS Messages Example Prohibiting Proxy Use for Inbound Calls ExampleVC-363 VC-364

VC-289 specifications

Cisco Systems has long been a leader in networking technology, and among its diverse range of products is the VC-289. Designed specifically for enhanced performance in high-demand environments, the VC-289 serves a critical role in supporting the modern networking infrastructure.

One of the standout features of the VC-289 is its scalability. The device is engineered to easily accommodate expanded workloads, ensuring that organizations can grow without the need for frequent upgrades. This scalability is complemented by Cisco's commitment to backward compatibility, allowing businesses to integrate new systems with existing setups seamlessly.

In terms of performance, the VC-289 boasts impressive processing power. With advanced multi-core architecture, it is capable of handling multiple data streams simultaneously, making it ideal for environments that require consistent data flow, such as cloud computing and IoT applications. The device’s high throughput ensures that users experience minimal latency, facilitating quick data transfers even during peak usage times.

Security is another key characteristic of the VC-289. Cisco has integrated robust security protocols that protect against various cyber threats. Through features such as advanced encryption standards and intrusion prevention systems, organizations can ensure that sensitive data remains secure and is not compromised during transmission.

Another notable technology within the VC-289 is its support for software-defined networking (SDN) capabilities. This allows for more flexible network management, enabling IT teams to adapt the network according to evolving business needs. The ability to programmatically control the network also means that businesses can implement changes more rapidly, reducing downtime and improving overall productivity.

The VC-289 is designed with energy efficiency in mind, featuring power-saving modes that help reduce operational costs. This focus on sustainability not only benefits the environment but also appeals to organizations striving to meet corporate social responsibility objectives.

In conclusion, the Cisco Systems VC-289 stands as an exemplary solution for modern networking challenges. With its scalability, performance capabilities, enhanced security features, SDN support, and energy efficiency, it meets the demands of today's fast-paced and ever-evolving technological landscape. Organizations looking to invest in a robust networking solution would do well to consider the VC-289 as a cornerstone of their infrastructure.