Advertisement

Table of Contents
  • Radio frequency interference

    3
  • Fcc part

    4
  • Ringer equivalence number

    5
  • Music on hold warning

    7
  • Underwriters laboratories

    8
  • CHAPTER 1. Basic Configuration

    11
  • Part ii. wan interface and protocols

    12
  • Revision history

    15
  • Logging in

    35
  • LAN Ports

    43
  • WAN Ports

    45
  • Mini modules

    47
  • Port Numbering Examples

    48
  • Configuring Simple Network Management Protocol

    49
  • SNMP Applications Supported

    59
  • Logging System Events

    61
  • Configuring Remote Monitoring

    65
  • Configuring RMON

    66
  • Verifying RMON Configuration

    67
  • PART II. WAN Interface and Protocols CHAPTER 6. Serial Interfaces

    71
  • Serial Interfaces Overview

    73
  • HSSI Interface

    75
  • Module Configuration

    77
  • Bundle Configuration

    79
  • Configuring HSSI

    83
  • Chapter 7. wan interfaces

    87
  • Configuring ct

    90
  • Configuring CT3 bundle

    92
  • CHAPTER 8. PPP, MLPPP, and HDLC

    95
  • Protocol Configuration

    97
  • MLPPP Configuration

    98
  • PPP and MLPPP Configuration

    99
  • Layer Two Configurations

    103
  • PART III. Switching and Routing Protocols CHAPTER 10. Layer-2 Switching

    109
  • Layer 2 LAN Switching and Bridging

    111
  • IGMP Snooping

    112
  • Configuring 802.1x

    118
  • LACP Configuration

    119
  • GVRP Configuration

    120
  • Configuring IGMP Snooping

    122
  • Chapter 11. dhcp relay

    127
  • CHAPTER 12. Static Routing

    131
  • CHAPTER 13. RIP

    133
  • Configuring RIP

    135
  • Configuring RIPv2 authentication

    137
  • Configuring RIP on a bundle interface

    139
  • CHAPTER 14. OSPF

    141
  • OSPF Configuration

    142
  • Chapter 15. bgp

    147
  • Protocol Features

    149
  • Minimum BGP Configuration

    151
  • BGP Application using Route-Map

    154
  • CHAPTER 16. MultiCast Protocols

    157
  • Configuration example

    168
  • CHAPTER 17. VRRP

    175
  • Configuring VRRP

    176
  • CHAPTER 18. MPLS

    179
  • MPLS Forwarding

    180
  • Martini L2 VPN Overview

    181
  • MPLS Configuration Example

    189
  • Enabling label-switching-minimal configuration

    192
  • Establishing a Trunk-CSPF disabled

    194
  • Establishing a Trunk-Using CSPF

    195
  • Establishing a Trunk-Using Explicitly Defined Path

    196
  • Reserving Bandwidth for the Trunk

    197
  • Adding a Secondary LSP to the Trunk

    198
  • Adding Administrative Group Constraints to an LSP

    199
  • CHAPTER 19. QoS

    203
  • Definitions

    204
  • Configuration

    205
  • Create Bundle AppTest

    206
  • VLAN Identifiers

    207
  • Create bundle VLANtest

    208
  • Historical Statistics

    209
  • Traffic Policing versus Traffic Shaping

    210
  • Configuring Traffic Policing

    211
  • Multi-Field Classification

    213
  • Packet Marking

    214
  • Traffic Policing

    217
  • Policing Using Single Rate Three Color Marking (srTCM)

    219
  • Configuring srTCM

    221
  • Configuring trTCM

    223
  • Egress Queuing, Shaping and Scheduling

    224
  • Buffer Management for Class Queues

    227
  • Buffer Reservation for Interfaces

    228
  • Congestion Management on Output Queues

    233
  • Drop Probability Calculation

    235
  • Configuring RED parameters

    236
  • Differentiated Services

    239
  • QoS Statistics

    240
  • Ingress and egress QoS for IP tunnels

    241
  • L2 Bridge Based CoS Marking

    242
  • Configuration Example

    243
  • Policy Based CoS Marking

    244
  • Multi-Field Classification using PCLs

    248
  • Billing & conformance counters

    251
  • Congestion Management on Egress Queues

    253
  • Buffer Management

    254
  • CHAPTER 20. VLAN forwarding with QoS

    255
  • Virtual LAN Domain

    257
  • Configuring Bridging on the WAN Interface

    258
  • Creating a Bridge Group

    259
  • CHAPTER 22. Packet Filtering

    261
  • Configuration examples

    264
  • Example: Blocking Telnet Access

    270
  • CHAPTER 23. Firewall NAT

    271
  • Virtual Firewall

    272
  • Access Policy Database

    274
  • Application Level Gateways

    276
  • Application Content Filtering

    277
  • Configuring Firewalls

    278
  • NAT configuration Examples

    280
  • Port Address Translation (Many to one)

    281
  • Static NAT (one to one)

    283
  • Reverse NAT

    286
  • NAT-Failover for Firewalls

    287
  • CHAPTER 24. GRE

    289
  • Configuring Site to Site Tunnel

    290
  • Configuring GRE Site to Site with IPSec

    292
  • Configuring GRE Site to Site with IPSec and OSPF

    294
  • Introduction to Security

    295
  • Access Methods

    296
  • Securely Managing the Ubigate iBG3026 System Example

    298
  • Joining Two Private Networks Example

    306
  • Joining Two Networks using Multiple IPSec Proposals Example

    314
  • Supporting Remote User Access Example

    326
  • Configuring IPSec Remote Access Example

    335
  • PART V. Voice CHAPTER 26. Voice Feature

    345
  • Introduction of Voice Feature

    347
  • Operation Mode

    350
  • Key Functions

    353
  • Call routing

    356
  • Digit manipulation

    357
  • Voice Deployment Scenario

    366
  • Introduction to voip gateway features

    369
  • CHAPTER 27. VoIP Gateway Management

    370
  • Introduction to SIP Gateway Features

    379
  • Sip components

    380
  • Configuring Basic SIP Gateway

    398
  • Configuring Enhanced SIP Gateway Features

    415
  • Configuring SIP Security Features

    440
  • Verifying and Troubleshooting SIP Features

    447
  • Introduction to h.323 gateway features

    453
  • CHAPTER 29. H.323 Gateway Management

    454
  • Configuring a H.323 Gateway

    465
  • Verifying and Troubleshooting H.323 Features

    491
  • Introduction to Analog Voice Port Features

    495
  • Analog Voice Port Monitoring

    501
  • Configuring Analog FXS Voice Port

    503
  • Configuring Analog FXO Voice Port

    510
  • Configuring analog e & m voice port

    513
  • Configuring Analog DID

    519
  • Configuring E911 CAMA

    523
  • Digital Trunk E1-R2 Features

    531
  • Digital trunk t1-cas features

    553
  • Overview

    579
  • Configuring ISDN BRI

    582
  • Configuring ISDN PRI

    593
  • Dial peer management

    603
  • CHAPTER 33. Routing and Digit Manipulation

    604
  • Dial Plan Mode

    625
  • Dialed Number Analysis

    626
  • Access Group Management

    636
  • Trunk Group Management

    638
  • PLAR

    641
  • Ubigate iBG3026 Configuration Guide/Ed

    645
  • Fax Relay with VoIP

    649
  • Supplementary services for stand alone mode

    663
  • CHAPTER 35. Call Admission Control

    669
  • Resource-based CAC

    680
  • Call-admission Spike

    682
  • Call admission Treatment

    683
  • Alarm

    685
  • Statistics

    688
  • Debug Management

    698
  • CDR Management

    701
  • Configuring Call Forward for Survivable Telephony

    707
  • Configuring System Message for Survivable Telephony

    709
  • Configuring COR List for Survivable Telephony

    711
  • Configuring Translation for Survivable Telephony

    712
  • Configuration guide

    717