Cisco IOS Voice Command Reference
Commands: SCCP through sgcp tse payload

Table Of Contents

Cisco IOS Voice Commands:
S

sccp

sccp ccm

sccp ip precedence

sccp local

sccp switchback timeout guard

sctp

security

security acl answerarq

sequence-numbers

server (RLM)

server absent reject

server flow-control

server registration-port

server routing

server trigger arq

server trigger brq

server trigger drq

server trigger irr

server trigger lcf

server trigger lrj

server trigger lrq

server trigger rai

server trigger rrq

server trigger urq

service local-directory

service-relationship

service-type call-check

session

session group

session protocol

session protocol (Voice over Frame Relay)

session protocol aal2

session protocol multicast

session-set

session target (MMoIP dial peer)

session target (POTS dial peer)

session target (VoATM dial peer)

session target (VoFR dial peer)

session target (VoIP dial peer)

session transport

set

set pstn-cause

set sip-status

settle-call

settlement

settlement roam-pattern

sgcp

sgcp call-agent

sgcp graceful-shutdown

sgcp max-waiting-delay

sgcp modem passthru

sgcp quarantine-buffer disable

sgcp request retries

sgcp request timeout

sgcp restart

sgcp retransmit timer

sgcp timer

sgcp tse payload


Cisco IOS Voice Commands:
S


This chapter contains commands to configure and maintain Cisco IOS voice applications. The commands are presented in alphabetical order. Some commands required for configuring voice may be found in other Cisco IOS command references. Use the command reference master index or search online to find these commands.

For detailed information on how to configure these applications and features, refer to the Cisco IOS Voice Configuration Guide.

sccp

To enable the Skinny Client Control Protocol (SCCP) protocol and its related applications (transcoding and conferencing), use the sccp command in global configuration mode. To disable the protocol, use the no form of this command.

sccp

no sccp

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release
Modification

12.1(5)YH

This command was introduced on the Cisco VG200.

12.2(13)T

This command was implemented on the Cisco 2600 series, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 3700 series.


Usage Guidelines

The router on which this command is used must be equipped with one or more digital T1/E1 packet voice trunk network modules (NM-HDVs) or high-density voice (HDV) transcoding/conferencing DSP farms (NM-HDV-FARMs) to provide digital-signal-processor (DSP) resources.

SCCP and its related applications (transcoding and conferencing) become enabled only if digital-signal-processor (DSP) resources for these applications are configured, DSP-farm service is enabled, and the Cisco CallManager registration process is completed.

The no form of this command disables SCCP and its applications by unregistering from the active Cisco CallManager, dropping existing connections, and freeing allocated resources.

Examples

The following example sets related values and then enables SCCP:

Router(config)# sccp ccm 10.10.10.1 priority 1
Router(config)# sccp local fastEthernet 0/0
Router(config)# sccp switchback timeout guard 180
Router(config)# sccp ip precedence 5
Router(config)# sccp
Router(config)# end

Related Commands

Command
Description

dspfarm (DSP farm)

Enables DSP-farm service.

show dspfarm

Displays summary information about DSP resources.

show sccp

Displays the SCCP configuration information and current status.


sccp ccm

To add a Cisco CallManager server to the list of available servers and set various parameters—including address or Domain Name System (DNS) name, priority if more than one server is available, port number, and version number— use the sccp ccm command in global configuration mode. To remove a particular server from the list, use the no form of this command.

sccp ccm {ip-address | dns} priority priority [port port-number] {version 3.0 | 3.1+}

no sccp ccm {ip-address | dns} priority priority port port-number {version 3.0 | 3.1+}

Syntax Description

ip-address

IP address of the Cisco CallManager server.

dns

DNS name.

priority priority

Priority of this Cisco CallManager server relative to other connected servers. Range is from 1 (highest) to 4 (lowest).

port port-number

(Optional) TCP port number.

version 3.0 | 3.1+

Cisco CallManager version: version 3.0 or version 3.1 and higher.


Defaults

No default behavior or values

Command Modes

Global configuration

Command History

Release
Modification

12.1(5)YH

This command was introduced on the Cisco VG200.

12.2(13)T

This command was implemented on the Cisco 2600 series, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 3700 series.


Usage Guidelines

The router on which this command is used must be equipped with one or more digital T1/E1 packet voice trunk network modules (NM-HDVs) or high-density voice (HDV) transcoding/conferencing DSP farms (NM-HDV-FARMs) to provide digital-signal-processor (DSP) resources.

You can configure up to four Cisco CallManager systems—a primary and up to three backups—to support digital-signal-processor (DSP) farm services.

Examples

The following example configures the Cisco CallManager whose IP address is 10.0.0.0:

Router# sccp ccm 10.0.0.0 priority 1 port 1025 version 3.1+

Related Commands

Command
Description

dspfarm (DSP farm)

Enables DSP-farm service.

sccp

Enables SCCP and its associated transcoding and conferencing applications.

show sccp

Displays the SCCP configuration information and current status.


sccp ip precedence

To set the IP precedence value to be used by Skinny Client Control Protocol (SCCP), use the sccp ip precedence command in global configuration mode. To reset to the default, use the no form of this command.

sccp ip precedence value

no sccp ip precedence

Syntax Description

value

IP precedence value. Range is from 1 (highest) to 7 (lowest).


Defaults

5

Command Modes

Global configuration

Command History

Release
Modification

12.1(5)YH

This command was introduced on the Cisco VG200.

12.2(13)T

This command was implemented on the Cisco 2600 series, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 3700 series.


Usage Guidelines

The router on which this command is used must be equipped with one or more digital T1/E1 packet voice trunk network modules (NM-HDVs) or high-density voice (HDV) transcoding/conferencing DSP farms (NM-HDV-FARMs) to provide digital-signal-processor (DSP) resources.

Examples

The following example sets IP precedence to the highest possible value:

Router# sccp ip precedence 1

Related Commands

Command
Description

dspfarm (DSP farm)

Enables DSP-farm service.

sccp

Enables SCCP and its associated transcoding and conferencing applications.

show sccp

Displays the SCCP configuration information and current status.


sccp local

To select the local interface that the Skinny Client Control Protocol (SCCP) applications (transcoding and conferencing) should use to register with Cisco CallManager, use the sccp local command in global configuration mode. To deselect the interface, use the no form of this command.

sccp local interface-type interface-number

no sccp local interface-type interface-number

Syntax Description

interface-type

Interface type that the SCCP application uses to register with Cisco CallManager. The type can be an interface address or a virtual-interface address such as Ethernet.

interface-number

Interface number that the SCCP application uses to register with Cisco CallManager.


Defaults

No default behavior or values

Command Modes

Global configuration

Command History

Release
Modification

12.1(5)YH

This command was introduced on the Cisco VG200.

12.2(13)T

This command was implemented on the Cisco 2600 series, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 3700 series.


Usage Guidelines

The router on which this command is used must be equipped with one or more digital T1/E1 packet voice trunk network modules (NM-HDVs) or high-density voice (HDV) transcoding/conferencing DSP farms (NM-HDV-FARMs) to provide digital-signal-processor (DSP) resources.

Examples

The following example selects an Ethernet interface for the SCCP applications to use to register with Cisco CallManager:

Router# sccp local Ethernet 1

Related Commands

Command
Description

dspfarm (DSP farm)

Enables DSP-farm service.

sccp

Enables SCCP and its associated transcoding and conferencing applications.

show sccp

Displays the SCCP configuration information and current status.


sccp switchback timeout guard

To set the Skinny Client Control Protocol (SCCP) switchback guard timer, use the sccp switchback timeout guard command in global configuration mode. To reset to the default, use the no form of this command.

sccp switchback timeout guard seconds

no sccp switchback timeout guard

Syntax Description

seconds

Guard timer value, in seconds. Range is from 180 to 7200. Default is 1200.


Defaults

1200 seconds

Command Modes

Global configuration

Command History

Release
Modification

12.1(5)YH

This command was introduced on the Cisco VG200.

12.2(13)T

This command was implemented on the Cisco 2600 series, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 3700 series.


Usage Guidelines

The router on which this command is used must be equipped with one or more digital T1/E1 packet voice trunk network modules (NM-HDVs) or high-density voice (HDV) transcoding/conferencing DSP farms (NM-HDV-FARMs) to provide digital-signal-processor (DSP) resources.

You can use the guard timer value for the switchback algorithm that follows the Graceful Timer method.

Examples

The following example sets the switchback guard timer value to 180 seconds (3 minutes):

Router# sccp switchback timeout guard 180

Related Commands

Command
Description

dspfarm (DSP farm)

Enables DSP-farm service.

sccp

Enables SCCP and its associated transcoding and conferencing applications.

show sccp

Displays the SCCP configuration information and current status.


sctp

To enter the Stream Control Transmission Protocol (SCTP) configuration, use the sctp command in IDSN User Adaptation Layer (IUA) configuration mode. To disable, use the no form of this command.

sctp [[t1-init milliseconds][t3-rtx-min seconds][t3-rtx-max milliseconds][startup-rtx number][assoc-rtx number][path-rtx number]]

no sctp

Syntax Description

t1-init milliseconds

Timer T1 initiation value in milliseconds. Valid values are from 1000 to 60000. The t1-init configurable option applies only during the creation of an SCTP instance.

t3-rtx-min seconds

Timer T3 retransmission minimum timeout in seconds. Valid values are from 1 to 300.

t3-rtx-max milliseconds

Timer T3 retransmission maximum timeout in milliseconds. Valid values are from 1000 to 60000.

startup-rtx number

Maximum startup retransmissions. The startup-rtx configurable option applies only during the creation of an SCTP instance. Valid values are from 2 to 20.

assoc-rtx number

Maximum association retransmissions. Valid values are from 2 to 20.

path-rtx number

Maximum path retransmissions. Valid values are from 2 to 20.


Defaults

No default behavior or values.

Command Modes

IUA configuration

Command History

Release
Modification

12.2(15)T

This command was introduced on the Cisco 2420, Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series; and Cisco AS5300, Cisco AS5350, Cisco AS5400, and Cisco AS5850 network access server (NAS) platforms.


Usage Guidelines

To enter SCTP configuration commands, you must first enter IUA configuration mode and then enter sctp at the Router(config-iua)# prompt to enter SCTP configuration mode.

Examples

The following example shows how to enter IUA configuration mode:

Router# configure terminal

Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)# iua
Router(config-iua)#

The following is an example of how to set failover time (in milliseconds) between 1 and 10 seconds as part of SCTP configuration of the T1 initiation timer. This example uses the lowest failover timer value allowed (1 second):

Router(config-iua)# as as5400-3 fail-over 1000

The following is an example of how to set SCTP maximum startup retransmission interval. This example uses the maximum startup retransmission interval value allowed:

Router(config-iua)# as as5400-3 sctp-startup 20

The following is an example of how to configure the number of SCTP streams for this AS. This example uses the maximum SCTP streams allowed:

Router(config-iua)# as as5400-3 sctp-streams 57

The following is an example of how to configure the SCTP T1 initiation timer (in milliseconds). This example uses the maximum timer value allowed:

Router(config-iua)# as as5400-3 sctp-t1init 60000

Related Commands

Command
Description

pri-group (pri-slt)

Specifies an ISDN PRI on a channelized T1 or E1 controller.


security

To enable authentication and authorization on a gatekeeper, use the security command in gatekeeper configuration mode. To disable security, use the no form of this command.

security {any | h323-id | e164} {password default password | password separator character}

no security {any | h323-id | e164} {password default password | password separator character}

Syntax Description

any

Uses the first alias of an incoming registration, admission, and status (RAS) protocol registration, regardless of its type, to identify the user to RADIUS/TACACS+.

h323-id

Uses the first H.323 ID type alias to identify the user to RADIUS/TACACS+.

e164

Uses the first E.164 address type alias to identify the user to RADIUS/TACACS+.

password default password

Default password that the gatekeeper associates with endpoints when authenticating them with an authentication server. The password must be identical to the password on the authentication server.

password separator character

Character that endpoints use to separate the H.323-ID from the piggybacked password in the registration. Specifying this character allows each endpoint to supply a user-specific password. The separator character and password are stripped from the string before it is treated as an H.323-ID alias to be registered.

Note that passwords may only be piggybacked in the H.323-ID, not the E.164 address, because the E.164 address allows a limited set of mostly numeric characters. If the endpoint does not wish to register an H.323-ID, it can still supply an H.323-ID consisting of just the separator character and password. This H.323-ID consisting of just the separator character and password are understood to be a password mechanism and no H.323-ID is registered.


Defaults

No default

Command Modes

Gatekeeper configuration

Command History

Release
Modification

11.3(2)NA

This command was introduced on the Cisco 2600 series and Cisco 3600 series.


Usage Guidelines

Use this command to enable identification of registered aliases by RADIUS/TACACS+. If the alias does not exist in RADIUS/TACACS+, the endpoint is not allowed to register.

A RADIUS/TACACS+ server and encryption key must have been configured in Cisco IOS software for security to work.

Only the first alias of the proper type is identified. If no alias of the proper type is found, the registration is rejected.

This command does not allow you to define the password mechanism unless the security type (h323-id or e164 or any) has been defined. Although the no security password command undefines the password mechanism, it leaves the security type unchanged, so security is still enabled. However, the no security command disables security entirely, including removing any existing password definitions.

Examples

The following example enables identification of registrations using the first H.323 ID found in any registration:

security h323id

The following example enables security, authenticating all users by using their H.323-IDs and a password of qwerty2x:

security h323-id
security password qwerty2x

The next example enables security, authenticating all users by using their H.323-IDs and the password entered by the user in the H.323-ID alias he or she registers:

security h323-id
security password separator !

Now if a user registers with an H.323-ID of joe!024aqx, the gatekeeper authenticates user joe with password 024aqx, and if that is successful, registers the user with the H.323-ID of joe. If the exclamation point is not found, the user is authenticated with the default password, or a null password if no default has been configured.

The following example enables security, authenticating all users by using their E.164 IDs and the password entered by the user in the H.323-ID alias he or she registers:

security e164
security password separator !

Now if a user registers with an E.164 address of 5551212 and an H.323-ID of !hs8473q6, the gatekeeper authenticates user 5551212 and password hs8473q6. Because the H.323-ID string supplied by the user begins with the separator character, no H.323-ID is registered, and the user is known only by the E.164 address.

Related Commands

Command
Description

accounting (gatekeeper)

Enables the accounting security feature on the gatekeeper.

radius-server host

Specifies a RADIUS server host.

radius-server key

Sets the authentication and encryption key for all RADIUS communications between the router and the RADIUS daemon.


security acl answerarq

To configure the gatekeeper to use tokenless call authorization, use the security acl answerarq command in gatekeeper configuration mode. To disable, use the no form of this command.

security acl answerarq access-list-number

no security acl answerarq access-list-number

Syntax Description

access-list-number

Number of an access list that was configured using the access-list command. This is a decimal number from 1 to 99 or from 1300 to 1999. Only standard IP access lists numbered 1 through 99 are supported for the Tokenless Call Authorization feature.


Defaults

By default, tokenless call authorization is not configured.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.2(15)T

This command was introduced on the Cisco 2610, Cisco 2611, Cisco 2611XM, Cisco 2613, Cisco 2620, Cisco 2620XM, Cisco 2621, Cisco 2621XM, Cisco 2650, Cisco 2650XM, Cisco 2651, Cisco 2651XM, Cisco 3620, Cisco 3640, Cisco 3660, and Cisco 3725.


Usage Guidelines

Use this command in conjunction with the access-list command to configure tokenless call authorization on a gatekeeper. The IP access list contains endpoints that are not in the gatekeeper's administrative domain, but from which calls should be accepted. This command configures the gatekeeper to use the IP access list for security.

Examples

The following example shows how to configure a gatekeeper to use a previously configured IP access list with an IP access list number of 20 for call authorization:

Router(config-gk)# security acl answerarq 20

Related Commands

Command
Description

access-list

Configures the access list mechanism for filtering frames by protocol type or vendor code.


sequence-numbers

To enable the generation of sequence numbers in each frame generated by the digital signal processor (DSP) for Voice over Frame Relay applications, use the sequence-numbers command in dial-peer configuration mode. To disable the generation of sequence numbers, use the no form of this command.

sequence-numbers

no sequence-numbers

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Dial-peer configuration

Command History

Release
Modification

12.0(3)XG

This command was introduced on the Cisco 2600 series, Cisco 3600 series, and Cisco MC3810.

12.0(4)T

This command was integrated into Cisco IOS Release 12.0(4)T.


Usage Guidelines

Sequence numbers on voice packets allow the digital signal processor (DSP) at the playout side to detect lost packets, duplicate packets, or out-of-sequence packets. This helps the DSP to mask out occasional drop-outs in voice transmission at the cost of one extra byte per packet. The benefit of using sequence numbers versus the cost in bandwidth of adding an extra byte to each voice packet on the Frame Relay network must be weighed to determine whether to disable this function for your application.

Another factor to consider is that this command does not affect codecs that require a sequence number, such as G.726. If you are using a codec that requires a sequence number, the DSP generates one regardless of the configuration of this command.

Examples

The following example disables generation of sequence numbers for VoFR frames on a Cisco 2600 series or Cisco 3600 series router or on a Cisco MC3810 for VoFR dial peer 200, starting from global configuration mode:

dial-peer voice 200 vofr
 no sequence-numbers

Related Commands

Command
Description

called-number (dial-peer)

Enables an incoming VoFR call leg to get bridged to the correct POTS call leg when using a static FRF.11 trunk connection.

codec (dial-peer)

Specifies the voice coder rate of speech for a Voice over Frame Relay dial peer.

cptone

Specifies a regional analog voice interface-related tone, ring, and cadence setting.

destination-pattern

Specifies either the prefix, the full E.164 telephone number, or an ISDN directory number (depending on the dial plan) to be used for a dial peer.

dtmf-relay (Voice over Frame Relay)

Enables the generation of FRF.11 Annex A frames for a dial peer.

session protocol (Voice over Frame Relay)

Establishes a session protocol for calls between the local and remote routers via the packet network.

session target

Specifies a network-specific address for a specified dial peer or destination gatekeeper.

signal-type

Sets the signaling type to be used when connecting to a dial peer.


server (RLM)

To identify an RLM server, use the server RLM configuration command. To remove the identification, use the no form of this command

server name-tag

no server name-tag

Syntax Description

name-tag

Name to identify the server configuration so that multiple entries of server configuration can be entered.


Defaults

Disabled

Command Modes

RLM configuration

Command History

Release
Modification

11.3(7)

This command was introduced.


Usage Guidelines

Each server can have multiple entries of IP addresses or aliases.

Examples

The following example identifies the RLM server and defines the associated IP addresses:

rlm group 1

 server r1-server

 link address 10.1.4.1 source Loopback1 weight 4

 link address 10.1.4.2 source Loopback2 weight 3

Related Commands

Command
Description

clear interface

Resets the hardware logic on an interface.

clear rlm group

Clears all RLM group time stamps to zero.

interface

Defines the IP addresses of the server, configures an interface type, and enters interface configuration mode.

link (RLM)

Specifies the link preference.

protocol rlm port

Reconfigures the port number for the basic RLM connection for the whole rlm-group.

retry keepalive

Allows consecutive keepalive failures a certain amount of time before the link is declared down.

show rlm group statistics

Displays the network latency of the RLM group.

show rlm group status

Displays the status of the RLM group.

show rlm group timer

Displays the current RLM group timer values.

shutdown (RLM)

Shuts down all of the links under the RLM group.

timer

Overwrites the default setting of timeout values.


server absent reject

To configure the gatekeeper to reject new registrations or calls when the connection to the Gatekeeper Transaction Message Protocol (GKTMP) server is down, use the server absent reject command in gatekeeper configuration mode. To disable, use the no form of this command.

server absent reject {arq | rrq}

no server absent reject {arq | rrq}

Syntax Description

arq

Reject call admission request (ARQ) messages.

rrq

Reject registration request (RRQ) messages.


Defaults

By default, registrations and calls are not rejected.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.2(11)T

This command was introduced on the Cisco 3660 and Cisco MC3810.


Usage Guidelines

This command configures the gatekeeper to reject new registrations or calls when it is unable to reach the GKTMP server because the TCP connection between the gatekeeper and GKTMP server is down. If multiple GKTMP servers are configured, the gatekeeper tries all of them and rejects registrations or calls only if none of the servers respond. You can also use this feature for security or service denial if a connection with the server is required to complete a registration.


Note This command assumes that RRQ and ARQ triggers are used between the gatekeeper and GKTMP server.


Examples

The following example directs the gatekeeper to reject registrations when it cannot connect to the GKTMP server:

Router# show gatekeeper configuration
.
.
.
h323id tet
 gw-type-prefix 1#* default-technology
 gw-type-prefix 9#* gw ipaddr 1.1.1.1 1720
 no shutdown
 server absent reject rrq
.
.
.

server flow-control

To enable flow control on the Cisco IOS gatekeeper (GK) and reset all thresholds to default, use the server flow-control command in gatekeeper configuration mode. To disable GK flow control, use the no form of this command.

server flow-control [onset value] [abatement value] [qcount value]

no server flow-control

Syntax Description

onset value

(Optional) Percentage of the server timeout value that is used to mark the server as usable or unusable. Range is from 1 to 100. The default is 80.

abatement value

(Optional) Percentage of the server timeout value that is used to mark the server as unusable or usable. Range is from 1 to 100. The default is 50.

Note The abatement value must be less than the onset value.

qcount value

(Optional) Threshold length of the outbound queue on the GK. The queue contains messages waiting to be transmitted to the server. The TCP socket between the GK and Gatekeeper Transaction Message Protocol (GKTMP) server queues messages if it has too many to transmit. If the count of outbound queue length on the server reaches the qcount value, the server is marked unusable. Range is from 1 to 2000. The default is 50.


Defaults

Onset: 80
Abatement: 50
Qcount: 50

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.2(2)XB

This command was introduced.

12.2(8)T

This command was integrated into Cisco IOS Release 12.2(8)T.


Usage Guidelines

Suppose the server timeout value is 3 seconds, the onset value is 50, and the abatement value is 40. When the average response time from the server to the Gatekeeper Transaction Message Protocol (GKTMP) reaches 1.5 seconds (the onset percentage of the server timeout value), the server is marked as unusable. During the period that the server is marked as unusable, REQUEST ALV messages are still sent to the unusable server. When the response time is lowered to 1.2 seconds (the abatement percentage of the timeout value), the server is marked usable again, and the GKTMP resumes sending messages to the server.

If you change one parameter using the server flow-control command, all other parameters revert to the default values. For example, if the onset is configured at 70 percent and you use the server flow-control command to set the abatement level, the onset resets to the default (80 percent).

Examples

The following example uses the command with the default values:

Router# server flow-control

The following example enables the GKTMP Interface Resiliency Enhancement feature with an onset level of 50:

Router# server flow-control onset 50

*Mar  8 20:05:34.081: gk_srv_handle_flowcontrol: Flow control enabled

Router# show running-config

Building configuration...

Current configuration : 1065 bytes
!
version 12.2
no service single-slot-reload-enable
service timestamps debug datetime msec
service timestamps log uptime
no service password-encryption
!
hostname snet-3660-3
!
.
.
.
gatekeeper
 zone local snet-3660-3 cisco.com
 zone remote snet-3660-2 cisco.com 209.165.200.225 1719
 zone prefix snet-3660-2 408*
 lrq forward-queries
 no use-proxy snet-3660-3 default inbound-to terminal
 no use-proxy snet-3660-3 default outbound-from terminal
 no shutdown
 server registration-port 8000
 server flow-control onset 50
!
.
.
.
end

The following example enables the GKTMP Interface Resiliency Enhancement feature:

Router# show gatekeeper status

Gatekeeper State: UP
    Load Balancing:   DISABLED
    Flow Control:     ENABLED
    Zone Name:        snet-3660-3
    Accounting:       DISABLED
    Endpoint Throttling:        DISABLED
    Security:         DISABLED
    Maximum Remote Bandwidth:              unlimited
    Current Remote Bandwidth:              0 kbps
    Current Remote Bandwidth (w/ Alt GKs): 0 kbps

The following example shows the server statistics, including timeout encountered, average response time, and the server status:

Router# show gatekeeper server

            GATEKEEPER SERVERS STATUS
            =========================

Gatekeeper Server listening port: 8250
Gatekeeper Server timeout value: 30 (100ms)
GateKeeper GKTMP version: 3.1

Gatekeeper-ID: Gatekeeper1
------------------------
  RRQ  Priority: 5
    Server-ID: Server43
    Server IP address: 209.165.200.254:40118
    Server type: dynamically registered
    Connection Status: active
    Trigger Information:
      Trigger unconditionally

    Server Statistics:
    REQUEST RRQ Sent=0
    RESPONSE RRQ Received = 0
    RESPONSE RCF Received = 0
    RESPONSE RRJ Received = 0
    Timeout encountered=0
    Average response time(ms)=0
    Server Usable=TRUE

Related Commands

Command
Description

timer server timeout

Specifies the timeout value for a response from a back-end GKTMP server.


server registration-port

To configure the listener port for the server to establish a connection with the gatekeeper, use the server registration-port command in gatekeeper configuration mode. To force the gatekeeper to close the listening socket so that no more new registration takes place, use the no form of this command.

server registration-port port-number

no server registration-port port-number

Syntax Description

port-number

Port number on which the gatekeeper listens for external server connections. Range is from 1 to 65535. There is no default.


Defaults

No registration port is configured.


Note If the gatekeeper is to communicate with network servers, a registration port must be configured on it.


Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.1(1)T

This command was introduced on the following platforms: Cisco 2500 series, Cisco 2600 series, Cisco 3600 series, Cisco 7200 series, and Cisco MC3810.

12.2(11)T

This command was implemented on the Cisco 3700 series.


Usage Guidelines

Use this command to configure a server registration port to poll for servers that want to establish connections with the gatekeeper.


Note The no form of this command forces the gatekeeper on this router to close the listen socket, so it cannot accept more registrations. However, existing connections between the gatekeeper and servers are left open.


Examples

The following example establishes a listener port for a server connection with a gatekeeper:

Router(config)# gatekeeper
Router(config-gk)# server registration-port 20000

Related Commands

Command
Description

server trigger

Configure static server triggers for specific RAS messages to be forwarded to a specified server.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server routing

To specify the type of circuit messages sent to the Gatekeeper Transaction Message Protocol (GKTMP) server, use the server routing command in gatekeeper configuration mode. To return to the default, use the no form of this command.

server routing {both | carrier | trunk-group}

no server routing {both | carrier | trunk-group}

Syntax Description

both

Sends both types of information in GKTMP messages.

carrier

Sends only carrier information in GKTMP messages. This is the default.

trunk-group

Sends only trunk-group information in GKTMP messages.


Defaults

Carrier

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.2(11)T

This command was introduced.


Usage Guidelines

Use this command to route carrier and trunk-group messages from the gatekeeper to the GKTMP server.

The carrier keyword sends the "I" and "J" tags in the GKTMP messages. The trunk-group keyword sends the "P" and "Q" tags in the GKTMP messages. The both keyword sends both sets of tags.

Examples

The following example enables trunk-group information to be sent in GKTMP messages from the gatekeeper:

Router(config)# gatekeeper
Router(config-gk)# server routing trunk-group

Related Commands

Command
Description

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server trigger arq

To configure the admission request (ARQ) trigger statically on the gatekeeper, use the server trigger arq command in gatekeeper configuration mode. Submode commands are available after the server trigger arq command is entered. To delete a single static trigger on the gatekeeper, use the no form of this command. To delete all static triggers on the gatekeeper, use the all form of this command.

server trigger arq gkid priority server-id server-ip-address server-port

Submode Commands:

info-only
shutdown
destination-info {e164 | email-id | h323-id} value
redirect-reason reason-number

no server trigger arq gkid priority server-id server-ip-address server-port

no server trigger all

Syntax Description

all

Deletes all CLI-configured triggers.

gkid

Local gatekeeper identifier.

priority

Priority for each trigger. Range is from 1 to 20; 1 is the highest priority.

server-id

ID number of the external application.

server-ip-address

IP address of the server.

server-port

Port on which the Cisco IOS gatekeeper listens for messages from the external server connection.


Submode Commands

After the command is entered, the software enters a submode that permits you to configure additional filters on the reliability, availability, and serviceability (RAS) message. These filters are optional, and you may configure any of them, one per command line.

info-only

Use to indicate to the Cisco IOS gatekeeper that messages that meet the specified trigger parameters should be sent to the GKTMP server application as notifications only and that the gatekeeper should not wait for a response from the Gatekeeper Transaction Message Protocol (GKTMP) server application.

shutdown

Use to temporarily disables a trigger. The gatekeeper does not consult triggers in a shutdown state when determining what message to forward to the GKTMP server application.

destination-info
{e164 | email-id | h323-id} value

Use to send ARQ RAS messages containing a specified destination to the GKTMP server application. Configure one of the following conditions

e164Destination is an E.164 address.

email-idDestination is an e-mail ID.

h323-idDestination is an H.323 ID.

valueValue against which to compare the destination address in the RAS messages. For E.164 addresses, the following wildcards can be used:

A trailing series of periods, each of which represents a single character.

A trailing asterisk, which represents one or more characters.

redirect-reason reason-number

Use to send ARQ RAS messages containing a specific redirect reason to the GKTMP server application.

reason-numberRange is from 0 to 65535. Currently-used values are:

0Unknown reason.

1Call forwarding busy or called DTE busy.

2Call forwarded; no reply.

4Call deflection.

9Called DTE out of order.

10Call forwarding by the called DTE.

15Call forwarding unconditionally.


Defaults

No trigger servers are set.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(11)T

This command was implemented on the Cisco 2600 series, Cisco 3600 series, Cisco 3700 series, Cisco 7200 series, and Cisco MC3810. The irr trigger was added.


Usage Guidelines

Use this command and its optional submode commands to configure the admission request (ARQ) static server trigger. The gatekeeper checks incoming gateway ARQ messages for the configured trigger information. If an incoming ARQ message contains the specified trigger information, the gatekeeper sends the ARQ message to the GKTMP server application. In addition, the gatekeeper processes the message according to its programmed instructions. If the ARQ message does not contain the specified information, the gatekeeper processes the message but does not send it to the GKTMP server application.

If no submode commands are configured for the ARQ messages, the gatekeeper sends all ARQ messages to the GKTMP server application.

If the gatekeeper receives an ARQ trigger registration message that contains several trigger conditions, the conditions are treated as "OR" conditions. In other words, if an incoming ARQ RAS message meets any one of the conditions, the gatekeeper sends the RAS message to the GKTMP server.

If the gatekeeper receives two ARQ trigger registration messages with the same priority for the same GKTMP server, the gatekeeper retains the second registration and discards the first one. If the gatekeeper receives two ARQ trigger registration messages with different priorities for the same GKTMP server, the gatekeeper checks incoming ARQ messages against the conditions on the higher priority registration before using the lower priority registration. If the gatekeeper receives more than one ARQ trigger registration message with the same priority but for different GKTMP servers, the gatekeeper retains all of the registrations.

The no form of the command removes the trigger definition from the Cisco IOS gatekeeper with all statically configured conditions under that trigger.

Examples

The following example configures a trigger registration on gatekeeper "sj.xyz.com" to send all ARQ messages to GKTMP server "Server-123":

Router(config-gk)# server trigger arq sj.xyz.com 1 Server-123 1.14.93.130 1751
Router(config-gk_arqtrigger)# exit

The following example configures an ARQ trigger registration on gatekeeper "alpha", which sends to GKTMP server "Server-west" any ARQ message that contains H.323 ID "3660-gw1", e-mail ID "joe.xyz.com", or a redirect reason 1. All other ARQ messages are not sent to the GKTMP server application.

Router(config-gk)# server trigger arq alpha 1 Server-west 10.10.10.10 1751
Router(config-gk-arqtrigger)# destination-info h323-id 3660-gw1
Router(config-gk-arqtrigger)# destination-info email-id joe.xyz.com
Router(config-gk-arqtrigger)# redirect-reason 1
Router(config-gk-arqtrigger# exit

If the ARQ registration message defined above for gatekeeper "alpha" is configured and the gatekeeper receives the following trigger registration:

Router(config-gk)# server trigger arq alpha 2 Server-west 10.10.10.10 1751
Router(config-gk_arqtrigger)# destination-info e164 1800....
Router(config-gk_arqtrigger)# exit

Then gatekeeper "alpha" checks all incoming ARQ messages for the destination H.323 ID, e-mail ID, or redirect reason before checking for the E.164 address 1800 (for example, 18005551212). If any one of those conditions is met, the gatekeeper sends the ARQ message to the GKTMP server "Server-west".

If the second gatekeeper "alpha" ARQ trigger registration had been defined with a priority 1 instead of priority 2, the second server trigger definition would have overridden the first one. In other words, the gatekeeper "alpha" would send to GKTMP server "Server-west" only those ARQ messages that contain a destination E.164 address that starts with 1800. All other ARQ messages would not be sent to the GKTMP server.

Related Commands

Command
Description

server registration-port

Configures the server listening port on the gatekeeper.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server trigger brq

To configure the bandwidth request (BRQ) trigger statically on the gatekeeper, use the server trigger brq command in gatekeeper configuration mode. Submode commands are available after entering the server trigger brq command. To delete a single static trigger on the gatekeeper, use the no form of this command. To delete all static triggers on the gatekeeper, use the all form of the command.

server trigger brq gkid priority server-id server-ip-address server-port

Submode Commands:

info-only
shutdown
redirect-reason
reason-number

no server trigger brq gkid priority server-id server-ip-address server-port

no server trigger all

Syntax Description

all

Deletes all CLI-configured triggers.

gkid

Local gatekeeper identifier.

priority

Priority for each trigger. Range is from 1 to 20; 1 is the highest priority.

server-id

ID number of the external application.

server-ip-address

IP address of the server.

server-port

Port on which the Cisco IOS gatekeeper listens for messages from the external server connection.


Submode Commands

After the command is entered, the software enters a submode that permits you to configure additional filters on the reliability, availability, and serviceability (RAS) message. These filters are optional, and you may configure any of them, one per command line.

info-only

Use to indicate to the gatekeeper that messages that meet the specified trigger parameters should be sent to the Gatekeeper Transaction Message

 

Protocol (GKTMP) server application as notifications only and that the gatekeeper should not wait for a response from the GKTMP server application.

redirect-reason reason-number

Use to send BRQ RAS messages containing a specific redirect reason to the GKTMP server application.

reason-number—Range is from 0 to 65535. Currently used values are as follows:

0Unknown reason.

1Call forwarding busy or called DTE busy.

2Call forwarded; no reply.

4Call deflection.

9Called DTE out of order.

10Call forwarding by the called DTE.

15Call forwarding unconditionally.

shutdown

Use to temporarily disable a trigger. The gatekeeper does not consult triggers in a shutdown state when determining what message to forward to the GKTMP server application.


Defaults

No trigger servers are set.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.2(2)XB

This command was introduced.

12.2(11)T

This the command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, Cisco 3700 series, Cisco 7200 series, and Cisco MC3810. The irr trigger was added.


Usage Guidelines

Use this command and its optional submode commands to configure the bandwidth request (BRQ) static server trigger. The gatekeeper checks incoming gateway BRQ messages for the configured trigger information. If an incoming BRQ message contains the specified trigger information, the gatekeeper sends the BRQ message to the GKTMP server application. In addition, the gatekeeper processes the message according to its programmed instructions. If the BRQ message does not contain the specified information, the gatekeeper processes the message but does not send it to the GKTMP server application.

If no submode commands are configured for the BRQ messages, the gatekeeper sends all BRQ messages to the GKTMP server application.

If the gatekeeper receives BRQ trigger registration message that contains several trigger conditions, the conditions are treated as "OR" conditions. In other words, if an incoming BRQ RAS message meets any one of the conditions, the gatekeeper sends the RAS message to the GKTMP server.

If the gatekeeper receives two BRQ trigger registration messages with the same priority for the same GKTMP server, the gatekeeper retains the second registration and discards the first one. If the gatekeeper receives two BRQ trigger registration messages with different priorities for the same GKTMP server, the gatekeeper checks incoming BRQ messages against the conditions on the higher priority registration before using the lower priority registration. If the gatekeeper receives more than one BRQ trigger registration message with the same priority but for different GKTMP servers, the gatekeepers retains all of the registrations.

The no form of the command removes the trigger definition from the Cisco IOS gatekeeper with all statically configured conditions under that trigger.

Examples

The following example configures a trigger registration on gatekeeper "sj.xyz.com" to send all BRQ messages to GKTMP server "Server-123":

Router(config-gk)# server trigger brq sj.xyz.com 1 Server-123 1.14.93.130 1751
Router(config-gk_brqtrigger)# exit

The following example configures BRQ trigger registration on gatekeeper "alpha", which sends to GKTMP server "Server-west" any BRQ message containing redirect reason 1 or redirect reason 2. All other BRQ messages are not sent to the GKTMP server application.

Router(config-gk)# server trigger brq alpha 1 Server-west 10.10.10.10 1751
Router(config-gk-brqtrigger)# redirect-reason 1
Router(config-gk-brqtrigger)# redirect-reason 2
Router(config-gk-brqtrigger# exit

If the BRQ registration message defined above for gatekeeper "alpha" is configured and the gatekeeper receives the following trigger registration:

Router(config-gk)# server trigger brq alpha 2 Server-west 10.10.10.10 1751
Router(config-gk_brqtrigger)# redirect-reason 10
Router(config-gk_brqtrigger)# exit

Then gatekeeper "alpha" checks all incoming BRQ messages for redirect reasons 1 or 2 before checking for redirect reason 10. If any one of those conditions is met, the gatekeeper sends the BRQ message to the GKTMP server "Server-west".

If the second gatekeeper "alpha" BRQ trigger registration had been defined with a priority 1 instead of priority 2, then the second server trigger definition would have overridden the first one. In other words, the gatekeeper "alpha" would send to GKTMP server "Server-west" only those BRQ messages that contain a redirect reason 10. All other BRQ messages would not be sent to the GKTMP server.

Related Commands

Command
Description

server registration-port

Configures the server listening port on the gatekeeper.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server trigger drq

To configure the disengage request (DRQ) trigger statically on the gatekeeper, use the server trigger drq command in gatekeeper configuration mode. Submode commands are available after entering the server trigger drq command. To delete a single static trigger on the gatekeeper, use the no form of this command. To delete all static triggers on the gatekeeper, use the all form of the command.

server trigger drq gkid priority server-id server-ip-address server-port

Submode Commands:

info-only
shutdown
destination-info {e164 | email-id | h323-id} value

no server trigger drq gkid priority server-id server-ip-address server-port

no server trigger all

Syntax Description

all

Deletes all CLI-configured triggers.

gkid

Local gatekeeper identifier.

priority

Priority for each trigger. Range is from 1 to 20; 1 is the highest priority.

server-id

ID number of the external application.

server-ip-address

IP address of the server.

server-port

Port on which the Cisco IOS gatekeeper listens for messages from the external server connection.


Submode Commands

After the command is entered, the software enters a submode that permits you to configure additional filters on the reliability, availability, and serviceability (RAS) message. These filters are optional, and you may configure any of them, one per command line.

info-only

Use to indicate to the gatekeeper that messages that meet the specified trigger parameters should be sent to the Gatekeeper Transaction Message

 

Protocol (GKTMP) server application as notifications only and that the gatekeeper should not wait for a response from the GKTMP server application.

destination-info
{e164 | email-id | h323-id} value

Use to send ARQ RAS messages containing a specified destination to the GKTMP server application. Configure one of the following conditions

e164Destination is an E.164 address.

email-idDestination is an e-mail ID.

h323-idDestination is an H.323 ID.

value—Value against which to compare the destination address in the RAS messages. For E.164 addresses, the following wildcards can be used:

A trailing series of periods, each of which represents a single character.

A trailing asterisk, which represents one or more characters.

shutdown

Use to temporarily disable a trigger. The gatekeeper does not consult triggers in a shutdown state when determining what message to forward to the GKTMP server application.


Defaults

No trigger servers are set.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.2(2)XB

This command was introduced.

12.2(11)T

This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, Cisco 3700 series, Cisco 7200 series, and Cisco MC3810. The irr trigger was added.


Usage Guidelines

Use this command and its optional submode commands to configure the disengage request (DRQ) static server trigger. The gatekeeper checks incoming gateway DRQ messages for the configured trigger information. If an incoming DRQ message contains the specified trigger information, the gatekeeper sends the DRQ message to the GKTMP server application. In addition, the gatekeeper processes the message according to its programmed instructions. If the DRQ message does not contain the specified information, the gatekeeper processes the message but does not send it to the GKTMP server application.

If no submode commands are configured for the DRQ messages, the gatekeeper sends all DRQ messages to the GKTMP server application.

If the gatekeeper receives DRQ trigger registration message that contains several trigger conditions, the conditions are treated as "OR" conditions. In other words, if an incoming DRQ RAS message meets any one of the conditions, the gatekeeper sends the RAS message to the GKTMP server.

If the gatekeeper receives two DRQ trigger registration messages with the same priority for the same GKTMP server, the gatekeeper retains the second registration and discards the first one. If the gatekeeper receives two DRQ trigger registration messages with different priorities for the same GKTMP server, the gatekeeper checks incoming DRQ messages against the conditions on the higher priority registration before using the lower priority registration. If the gatekeeper receives more than one DRQ trigger registration message with the same priority but for different GKTMP servers, the gatekeepers retains all of the registrations.

The no form of the command removes the trigger definition from the Cisco IOS gatekeeper with all statically configured conditions under that trigger.

Examples

The following example configures a trigger registration on gatekeeper "sj.xyz.com" to send all DRQ messages to GKTMP server "Server-123":

Router(config-gk)# server trigger drq sj.xyz.com 1 Server-123 1.14.93.130 1751
Router(config-gk_drqtrigger)# exit

The following example configures DRQ trigger registration on gatekeeper "alpha", which sends to GKTMP server "Server-west" any DRQ message containing an H.323 ID "3660-gw1" or e-mail ID "joe.xyz.com". All other DRQ messages are not sent to the GKTMP server application.

Router(config-gk)# server trigger drq alpha 1 Server-west 10.10.10.10 1751
Router(config-gk-drqtrigger)# destination-info h323-id 3660-gw1
Router(config-gk-drqtrigger)# destination-info email-id joe.xyz.com
Router(config-gk-drqtrigger# exit

If the DRQ registration message defined above for gatekeeper "alpha" is configured and the gatekeeper receives the following trigger registration:

Router(config-gk)# server trigger drq alpha 2 Server-west 10.10.10.10 1751
Router(config-gk_drqtrigger)# destination-info e164 1800....
Router(config-gk_drqtrigger)# exit

then gatekeeper "alpha" checks all incoming DRQ messages for the destination H.323 ID or e-mail ID before checking for the E.164 address 1800 (for example, 18005551212). If any one of those conditions is met, the gatekeeper sends the DRQ message to the GKTMP server "Server-west".

If the second gatekeeper "alpha" DRQ trigger registration had been defined with a priority 1 instead of priority 2, then the second trigger registration would have overridden the first one. In other words, the gatekeeper "alpha" would send to GKTMP server Server-west only those DRQ messages that contain a destination E.164 address starting with 1800. All other DRQ messages would not be sent to the GKTMP server.

Related Commands

Command
Description

server registration-port

Configures the server listening port on the gatekeeper.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server trigger irr

To configure the information request response (IRR) trigger statically on the gatekeeper, use the server trigger irr command in gatekeeper configuration mode. Submode commands are available after entering the server trigger irr command. To delete a single static trigger on the gatekeeper, use the no form of this command. To delete all static triggers on the gatekeeper, use the all form of the command.

server trigger irr gkid priority server-id server-ip-address server-port

Submode Commands:

info-only
shutdown
destination-info {e164 | email-id | h323-id} value
redirect-reason reason-number

no server trigger irr gkid priority server-id server-ip-address server-port

no server trigger all

Syntax Description

all

Deletes all CLI-configured triggers.

gkid

Local gatekeeper identifier.

priority

Priority for each trigger. Range is from 1 to 20; 1 is the highest priority.

server-id

ID number of the external application.

server-ip-address

IP address of the server.

server-port

Port on which the Cisco IOS gatekeeper listens for messages from the external server connection.


Submode Commands

After the command is entered, the software enters a submode that permits you to configure additional filters on the reliability, availability, and serviceability (RAS) message. These filters are optional, and you may configure any of them, one per command line.

destination-info
{e164 | email-id | h323-id} value

Use to send IRR RAS messages containing a specified destination to the GKTMP server application. Configure one of the following conditions:

e164Destination is an E.164 address.

email-idDestination is an e-mail ID.

h323-idDestination is an H.323 ID.

 

value—Value against which to compare the destination address in the RAS messages. For E.164 addresses, the following wildcards can be used:

A trailing series of periods, each of which represents a single character.

A trailing asterisk, which represents one or more characters.

info-only

Use to indicate to the gatekeeper that messages that meet the specified trigger parameters should be sent to the Gatekeeper Transaction Message Protocol (GKTMP) server application as notifications only and that the gatekeeper should not wait for a response from the GKTMP server application.

redirect-reason reason-number

Use to send IRR RAS messages containing a specific redirect reason to the GKTMP server application.

reason-number—Range is from 0 to 65535. Currently used values are the following:

0Unknown reason.

1Call forwarding busy or called DTE busy.

2Call forwarded; no reply.

4Call deflection.

9Called DTE out of order.

10Call forwarding by the called DTE.

15Call forwarding unconditionally.

shutdown

Use to temporarily disable a trigger. The gatekeeper does not consult triggers in a shutdown state when determining what message to forward to the GKTMP server application.


Defaults

No trigger servers are set.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(11)T

This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, Cisco 3700 series, Cisco 7200 series, and Cisco MC3810. The irr trigger was added.


Usage Guidelines

Use this command and its optional submode commands to configure the information request response (IRR) static server trigger. The gatekeeper checks incoming gateway IRR messages for the configured trigger information. If an incoming IRR message contains the specified trigger information, the gatekeeper sends the IRR message to the GKTMP server application. In addition, the IRR message does not contain the specified information, the gatekeeper processes the message but does not send it to the GKTMP server application.

If no submode commands are configured for the IRR messages, the gatekeeper sends all IRR messages to the GKTMP server application.

If the gatekeeper receives an IRR trigger registration message that contains several trigger conditions, the conditions are treated as "OR" conditions. In other words, if an incoming IRR RAS message meets any one of the conditions, the gatekeeper sends the RAS message to the GKTMP server.

If the gatekeeper receives two IRR trigger registration messages with the same priority for the same GKTMP server, the gatekeeper retains the second registration and discards the first one. If the gatekeeper receives two IRR trigger registration messages with different priorities for the same GKTMP server, the gatekeeper checks incoming IRR messages against the conditions on the higher priority registration before using the lower priority registration. If the gatekeeper receives more than one IRR trigger registration message with the same priority but for different GKTMP servers, the gatekeepers retains all of the registrations.

The no form of the command removes the trigger definition from the Cisco IOS gatekeeper with all statically configured conditions under that trigger.

Examples

The following example configures a trigger registration on gatekeeper "sj.xyz.com" to send all IRR messages to GKTMP server "Server-123":

Router(config-gk)# server trigger irr sj.xyz.com 1 Server-123 1.14.93.130 1751
Router(config-gk_irrtrigger)# exit

The following example configures an IRR trigger registration on gatekeeper "alpha", which send to GKTMP server "Server-west" any IRR message containing an H.323 ID "3660-gw1", e-mail ID "joe.xyz.com, or a redirect reason 1. All other IRR messages are not sent to the GKTMP server application.

Router(config-gk)# server trigger irr alpha 1 Server-west 10.10.10.10 1751
Router(config-gk-irrtrigger)# destination-info h323-id 3660-gw1
Router(config-gk-irrtrigger)# destination-info email-id joe.xyz.com
Router(config-gk-irrtrigger)# redirect-reason 1
Router(config-gk-irrtrigger# exit

If the IRR registration message defined above for gatekeeper "alpha" is configured and the gatekeeper receives the following trigger registration:

Router(config-gk)# server trigger irr alpha 2 Server-west 10.10.10.10 1751
Router(config-gk_irrtrigger)# destination-info e164 1800....
Router(config-gk_irrtrigger)# exit

Then gatekeeper "alpha" checks all incoming IRR messages for the destination H.323 ID, e-mail ID, or redirect reason before checking for the E.164 address 1800 (for example, 18005551212). If any one of those conditions is met, the gatekeeper sends the IRR message to the GKTMP server "Server-west".

If the second gatekeeper "alpha" IRR trigger registration had been defined with a priority 1 instead of priority 2, then the second server trigger definition would have overridden the first one. In other words, the gatekeeper "alpha" would send to GKTMP server "Server-west" only those IRR messages that contain a destination E.164 address starting with 1800. All other IRR messages would not be sent to the GKTMP server.

Related Commands

Command
Description

server registration-port

Configures the server listening port on the gatekeeper.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server trigger lcf

To configure the location confirm (LCF) trigger statically on the gatekeeper, use the server trigger lcf command in gatekeeper configuration mode. Submode commands are available after entering the server trigger lcf command. To delete a single static trigger on the gatekeeper, use the no form of this command. To delete all static triggers on the gatekeeper, use the all form of the command.

server trigger lcf gkid priority server-id server-ip-address server-port

Submode Commands:

info-only
shutdown
destination-info {e164 | email-id | h323-id} value
remote-ext-address e164 value

no server trigger lcf gkid priority server-id server-ip-address server-port

no server trigger all

Syntax Description

all

Deletes all CLI-configured triggers.

gkid

Local gatekeeper identifier.

priority

Priority for each trigger. Range is from 1 to 20; 1 is the highest priority.

server-id

ID number of the external application.

server-ip-address

IP address of the server.

server-port

Port on which the Cisco IOS gatekeeper listens for messages from the external server connection.


Submode Commands

After the command is entered, the software enters a submode that permits you to configure additional filters on the RAS message. These filters are optional, and you may configure any of them, one per command line.

destination-info
{e164 | email-id | h323-id} value

Use to send LCF RAS messages containing a specified destination to the GKTMP server application. Configure one of the following conditions:

e164Destination is an E.164 address.

email-idDestination is an e-mail ID.

h323-idDestination is an H.323 ID.

value—Value against which to compare the destination address in the RAS messages. For E.164 addresses, the following wildcards can be used:

 

A trailing series of periods, each of which represents a single character.

A trailing asterisk, which represents one or more characters.

info-only

Use to indicate to the gatekeeper that messages that meet the specified trigger parameters should be sent to the Gatekeeper Transaction Message Protocol (GKTMP) server application as notifications only and that the gatekeeper should not wait for a response from the GKTMP server application.

remote-ext-address e164 value

Use to send LCF RAS messages that contain a specified remote extension address to the GKTMP server application.

e164—Remote extension address is an E.164 address.

value—Value against which to compare the destination address in the RAS messages. The following wildcards can be used:

A trailing series of periods, each of which represents a single character.

A trailing asterisk, which represents one or more characters.

shutdown

Use to temporarily disable a trigger. The gatekeeper does not consult triggers in a shutdown state when determining what message to forward to the GKTMP server application.


Defaults

No trigger servers are set.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(11)T

This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, Cisco 3700 series, Cisco 7200 series, and Cisco MC3810. The irr trigger was added.


Usage Guidelines

Use this command and its optional submode commands to configure the location confirm (LCF) static server trigger. The gatekeeper checks incoming gateway LCF messages for the configured trigger information. If an incoming LCF message contains the specified trigger information, the gatekeeper sends the LCF message to the GKTMP server application. In addition, the gatekeeper processes the message according to its programmed instructions. If the LCF message does not contain the specified information, the gatekeeper processes the message but does not send it to the GKTMP server application.

If no submode commands are configured for the LCF messages, the gatekeeper sends all LCF messages to the GKTMP server application.

If the gatekeeper receives an LCF trigger registration message that contains several trigger conditions, the conditions are treated as "OR" conditions. In other words, if an incoming LCF RAS message meets any one of the conditions, the gatekeeper sends the RAS message to the GKTMP server.

If the gatekeeper receives two LCF trigger registration messages with the same priority for the same GKTMP server, the gatekeeper retains the second registration and discards the first one. If the gatekeeper receives two LCF trigger registration messages with different priorities for the same GKTMP server, the gatekeeper checks incoming LCF messages against the conditions on the higher priority registration before using the lower priority registration. If the gatekeeper receives more than one LCF trigger registration message with the same priority but for different GKTMP servers, the gatekeepers retains all of the registrations.

The no form of the command removes the trigger definition from the Cisco IOS gatekeeper with all statically configured conditions under that trigger.

Examples

The following example configures a trigger registration on gatekeeper "sj.xyz.com" to send all LCF messages to GKTMP server "Server-123":

Router(config-gk)# server trigger lcf sj.xyz.com 1 Server-123 1.14.93.130 1751
Router(config-gk_lcftrigger)# exit

The following example configures an LCF trigger registration on gatekeeper "alpha", which send to GKTMP server "Server-west" any LCF message containing an H.323 ID "3660-gw1", e-mail ID joe.xyz.com, or a remote extension address starting with 1408. All other LCF messages are not sent to the GKTMP server application.

Router(config-gk)# server trigger lcf alpha 1 Server-west 10.10.10.10 1751
Router(config-gk-lcftrigger)# destination-info h323-id 3660-gw1
Router(config-gk-lcftrigger)# destination-info email-id joe.xyz.com
Router(config-gk-lcftrigger)# remote-ext-address e164 1408....
Router(config-gk-lcftrigger# exit

If the LCF registration message defined above for gatekeeper "alpha" is configured and the gatekeeper receives the following trigger registration:

Router(config-gk)# server trigger lcf alpha 2 Server-west 10.10.10.10 1751
Router(config-gk_lcftrigger)# remote-ext-address e164 1800....
Router(config-gk_lcftrigger)# exit

then gatekeeper "alpha" checks all incoming LCF messages for the destination H.323 ID, e-mail ID, or remote extension address 1408 before checking for the remote extension address 1800 (for example, 18005551212). If any one of those conditions is met, the gatekeeper sends the LCF message to the GKTMP server "Server-west".

If the second gatekeeper "alpha" LCF trigger registration had been defined with a priority 1 instead of priority 2, then the second trigger registration would have overridden the first one. In other words, the gatekeeper "alpha" would send to GKTMP server "Server-west" only those LCF messages that contain a remote extension address E.164 address starting with 1800. All other LCF messages would not be sent to the GKTMP server.

Related Commands

Command
Description

server registration-port

Configures the server listening port on the gatekeeper.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server trigger lrj

To configure the location reject (LRJ) trigger statically on the gatekeeper, use the server trigger lrj command in gatekeeper configuration mode. Submode commands are available after entering the server trigger lrj command. To delete a single static trigger on the gatekeeper, use the no form of this command. To delete all static triggers on the gatekeeper, use the all form of the command.

server trigger lrj gkid priority server-id server-ip-address server-port

Submode Commands:

info-only
shutdown
destination-info {e164 | email-id | h323-id} value

no server trigger lrj gkid priority server-id server-ip-address server-port

no server trigger all

Syntax Description

all

Deletes all CLI-configured triggers.

gkid

Local gatekeeper identifier.

priority

Priority for each trigger. Range is from 1 to 20; 1 is the highest priority.

server-id

ID number of the external application.

server-ip-address

IP address of the server.

server-port

Port on which the gatekeeper listens for messages from the external server connection.


Submode Commands

After the command is entered, the software enters a submode that permits you to configure additional filters on the reliability, availability, and serviceability (RAS) message. These filters are optional, and you may configure any of them, one per command line.

destination-info
{e164 | email-id | h323-id} value

Use to send LRJ RAS messages containing a specified destination to the GKTMP server application. Configure one of the following conditions:

e164Destination is an E.164 address.

email-idDestination is an e-mail ID.

h323-idDestination is an H.323 ID.

value—Value against which to compare the destination address in the RAS messages. For E.164 addresses, the following wildcards can be used:

 

A trailing series of periods, each of which represents a single character.

A trailing asterisk, which represents one or more characters.

info-only

Use to indicate to the gatekeeper that messages that meet the specified trigger parameters should be sent to the Gatekeeper Transaction Message Protocol (GKTMP) server application as notifications only and that the gatekeeper should not wait for a response from the GKTMP server application.

shutdown

Use to temporarily disable a trigger. The gatekeeper does not consult triggers in a shutdown state when determining what message to forward to the GKTMP server application.


Defaults

No trigger servers are set.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(11)T

This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, Cisco 3700 series, Cisco 7200 series, and Cisco MC3810.


Usage Guidelines

Use this command and its optional submode commands to configure the location reject (LRJ) static server trigger. The gatekeeper checks incoming gateway LRJ messages for the configured trigger information. If an incoming LRJ message contains the specified trigger information, the gatekeeper sends the LRJ message to the GKTMP server application. In addition, the gatekeeper processes the message according to its programmed instructions. If the LRJ message does not contain the specified information, the gatekeeper processes the message but does not send it to the GKTMP server application.

If no submode commands are configured for the LRJ messages, the gatekeeper sends all LRJ messages to the GKTMP server application.

If the gatekeeper receives an LRJ trigger registration message that contains several trigger conditions, the conditions are treated as "OR" conditions. In other words, if an incoming LRJ RAS message meets any one of the conditions, the gatekeeper sends the RAS message to the GKTMP server.

If the gatekeeper receives two LRJ trigger registration messages with the same priority for the same GKTMP server, the gatekeeper retains the second registration and discards the first one. If the gatekeeper receives two LRJ trigger registration messages with different priorities for the same GKTMP server, the gatekeeper checks incoming LRJ messages against the conditions on the higher priority registration before using the lower priority registration. If the gatekeeper receives more than one LRJ trigger registration message with the same priority but for different GKTMP servers, the gatekeepers retains all of the registrations.

The no form of the command removes the trigger definition from the Cisco IOS gatekeeper with all statically configured conditions under that trigger.

Examples

The following example configures a trigger registration on gatekeeper "sj.xyz.com" to send all LRJ messages to GKTMP server "Server-123":

Router(config-gk)# server trigger lrj sj.xyz.com 1 Server-123 1.14.93.130 1751
Router(config-gk_lrjtrigger)# exit

The following example configures an LRJ trigger registration on gatekeeper "alpha", which send to GKTMP server "Server-west" any LRJ message containing an H.323 ID "3660-gw1" or e-mail ID joe.xyz.com. All other LRJ messages are not sent to the GKTMP server application.

Router(config-gk)# server trigger lrj alpha 1 Server-west 10.10.10.10 1751
Router(config-gk-lrjtrigger)# destination-info h323-id 3660-gw1
Router(config-gk-lrjtrigger)# destination-info email-id joe.xyz.com
Router(config-gk-lrjtrigger# exit

If the LRJ registration message defined above for gatekeeper "alpha" is configured and the gatekeeper receives the following trigger registration:

Router(config-gk)# server trigger lrj alpha 2 Server-west 10.10.10.10 1751
Router(config-gk_lrjtrigger)# destination-info e164 1800....
Router(config-gk_lrjtrigger)# exit

then gatekeeper "alpha" checks all incoming LRJ messages for the destination H.323 ID or email ID before checking for the E.164 address 1800 (for example, 18005551212). If any one of those conditions is met, the gatekeeper sends the LRJ message to the GKTMP server "Server-west".

If the second gatekeeper "alpha" LRJ trigger registration had been defined with a priority 1 instead of priority 2, then the second trigger registration would have overridden the first one. In other words, the gatekeeper "alpha" would send to GKTMP server "Server-west" only those LRJ messages that contain a destination E.164 address starting with 1800. All other LRJ messages would not be sent to the GKTMP server.

Related Commands

Command
Description

server registration-port

Configures the server listening port on the gatekeeper.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server trigger lrq

To configure the location request (LRQ) trigger statically on the gatekeeper, use the server trigger lrq command in gatekeeper configuration mode. Submode commands are available after entering the server trigger lrq command. To delete a single static trigger on the gatekeeper, use the no form of this command. To delete all static triggers on the gatekeeper, use the all form of the command.

server trigger lrq gkid priority server-id server-ip-address server-port

Submode Commands:

info-only
shutdown
destination-info {e164 | email-id | h323-id} value
redirect-reason reason-number

no server trigger lrq gkid priority server-id server-ip-address server-port

no server trigger all

Syntax Description

all

Deletes all CLI-configured triggers.

gkid

Local gatekeeper identifier.

priority

Priority for each trigger. Range is from 1 to 20; 1 is the highest priority.

server-id

ID number of the external application.

server-ip-address

IP address of the server.

server-port

Port on which the Cisco IOS gatekeeper listens for messages from the external server connection.


Submode Commands

After the command is entered, the software enters a submode that permits you to configure additional filters on the reliability, availability, and serviceability (RAS) message. These filters are optional, and you may configure any of them, one per command line.

destination-info
{e164 | email-id | h323-id} value

Use to send LRQ RAS messages containing a specified destination to the GKTMP server application. Configure one of the following conditions:

e164Destination is an E.164 address.

email-idDestination is an e-mail ID.

h323-idDestination is an H.323 ID.

value—Value against which to compare the destination address in the RAS messages. For E.164 addresses, the following wildcards can be used:

 

A trailing series of periods, each of which represents a single character.

A trailing asterisk, which represents one or more characters.

info-only

Use to indicate to the gatekeeper that messages that meet the specified trigger parameters should be sent to the Gatekeeper Transaction Message Protocol (GKTMP) server application as notifications only and that the gatekeeper should not wait for a response from the GKTMP server application.

redirect-reason reason-number

Use to send LRQ RAS messages containing a specific redirect reason to the GKTMP server application.

reason-number—Range is from 0 to 65535. Currently used values are the following:

0Unknown reason.

1Call forwarding busy or called DTE busy.

2Call forwarded; no reply.

4Call deflection.

9Called DTE out of order.

10Call forwarding by the called DTE.

15Call forwarding unconditionally.

shutdown

Use to temporarily disable a trigger. The gatekeeper does not consult triggers in a shutdown state when determining what message to forward to the GKTMP server application.


Defaults

No trigger servers are set.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(11)T

This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, Cisco 3700 series, Cisco 7200 series, and Cisco MC3810.


Usage Guidelines

Use this command and its optional submode commands to configure the location request (LRQ) static server trigger. The gatekeeper checks incoming gateway LRQ messages for the configured trigger information. If an incoming LRQ message contains the specified trigger information, the gatekeeper sends the LRQ message to the GKTMP server application. In addition, the gatekeeper processes the message according to its programmed instructions. If the LRQ message does not contain the specified information, the gatekeeper processes the message but does not send it to the GKTMP server application.

If no submode commands are configured for the LRQ messages, the gatekeeper sends all LRQ messages to the GKTMP server application.

If the gatekeeper receives an LRQ trigger registration message that contains several trigger conditions, the conditions are treated as "OR" conditions. In other words, if an incoming LRQ RAS message meets any one of the conditions, the gatekeeper sends the RAS message to the GKTMP server.

If the gatekeeper receives two LRQ trigger registration messages with the same priority for the same GKTMP server, the gatekeeper retains the second registration and discards the first one. If the gatekeeper receives two LRQ trigger registration messages with different priorities for the same GKTMP server, the gatekeeper checks incoming LRQ messages against the conditions on the higher priority registration before using the lower priority registration. If the gatekeeper receives more than one LRQ trigger registration message with the same priority but for different GKTMP servers, the gatekeepers retains all of the registrations.

The no form of the command removes the trigger definition from the Cisco IOS gatekeeper with all statically configured conditions under that trigger.

Examples

The following example configures a trigger registration on gatekeeper "sj.xyz.com" to send all LRQ messages to GKTMP server "Server-123":

Router(config-gk)# server trigger lrq sj.xyz.com 1 Server-123 1.14.93.130 1751
Router(config-gk_lrqtrigger)# exit

The following example configures an LRQ trigger registration on gatekeeper "alpha", which sends to GKTMP server "Server-west" any LRQ message containing an H.323 ID "3660-gw1", e-mail ID joe.xyz.com, or a redirect reason 1. Other LRQ messages are not sent to the GKTMP server application.

Router(config-gk)# server trigger lrq alpha 1 Server-west 10.10.10.10 1751
Router(config-gk-lrqtrigger)# destination-info h323-id 3660-gw1
Router(config-gk-lrqtrigger)# destination-info email-id joe.xyz.com
Router(config-gk-lrqtrigger)# redirect-reason 1
Router(config-gk-lrqtrigger# exit

If the LRQ registration message defined above for gatekeeper "alpha" is configured and the gatekeeper receives the following trigger registration:

Router(config-gk)# server trigger lrq alpha 2 Server-west 10.10.10.10 1751
Router(config-gk_lrqtrigger)# destination-info e164 1800....
Router(config-gk_lrqtrigger)# exit

then gatekeeper "alpha" checks all incoming LRQ messages for the destination H.323 ID, email ID, or redirect reason before checking for the E.164 address 1800 (for example, 18005551212). If any one of those conditions is met, the gatekeeper sends the LRQ message to the GKTMP server "Server-west".

If the second gatekeeper "alpha" LRQ trigger registration had been defined with a priority 1 instead of priority 2, then the second server trigger definition would have overridden the first one. In other words, the gatekeeper "alpha" would send to GKTMP server "Server-west" only those LRQ messages that contain a destination E.164 address starting with 1800. All other LRQ messages would not be sent to the GKTMP server.

Related Commands

Command
Description

server registration-port

Configures the server listening port on the gatekeeper.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server trigger rai

To configure the resources available indicator (RAI) trigger statically on the gatekeeper, use the server trigger rai command in gatekeeper configuration mode. Submode commands are available after entering the server trigger rai command. To delete a single static trigger on the gatekeeper, use the no form of this command. To delete all static triggers on the gatekeeper, use the all form of the command.

server trigger rai gkid priority server-id server-ip-address server-port

Submode Commands:

info-only
shutdown
endpoint-type value
supported-prefix value

no server trigger rai gkid priority server-id server-ip-address server-port

no server trigger all

Syntax Description

all

Deletes all CLI-configured triggers.

gkid

Local gatekeeper identifier.

priority

Priority for each trigger. Range is from 1 to 20; 1 is the highest priority.

server-id

ID number of the external application.

server-ip-address

IP address of the server.

server-port

Port on which the Cisco IOS gatekeeper listens for messages from the external server connection.


Submode Commands

After the command is entered, the software enters a submode that permits you to configure additional filters on the reliability, availability, and serviceability (RAS) message. These filters are optional, and you may configure any of them, one per command line.

endpoint-type value

Use to send RAI RAS messages that contain a particular endpoint type to the GKTMP server application.

value—Value against which to compare the endpoint type in the RAS messages. Valid endpoint types are the following:

gatekeeper—Endpoint is an H.323 gatekeeper.

h320-gateway—Endpoint is an H.320 gateway.

mcu—Endpoint is a multipoint control unit (MCU).

other-gateway—Endpoint is another type of gateway not specified on this list.

 

proxy—Endpoint is an H.323 proxy.

terminal—Endpoint is an H.323 terminal.

voice-gateway—Endpoint is a voice gateway.

info-only

Use to indicate to the gatekeeper that messages that meet the specified trigger parameters should be sent to the Gatekeeper Transaction Message Protocol (GKTMP) server application as notifications only and that the gatekeeper should not wait for a response from the GKTMP server application.

shutdown

Use to temporarily disable a trigger. The gatekeeper does not consult triggers in a shutdown state when determining what message to forward to the GKTMP server application.

supported-prefix value

Use to send RAI RAS messages that contain a specific supported prefix to the GKTMP server application.

value—Value against which to compare the supported prefix in the RAS messages. The possible values are any E.164 pattern used as a gateway technology prefix. The value string can contain any of the following: 0123456789#*.


Defaults

No trigger servers are set.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(11)T

This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, Cisco 3700 series, Cisco 7200 series, and Cisco MC3810. The irr trigger was added.


Usage Guidelines

Use this command and its optional submode commands to configure the resources available indicator (RAI) static server trigger. The gatekeeper checks incoming gateway RAI messages for the configured trigger information. If an incoming RAI message contains the specified trigger information, the gatekeeper sends the RAI message to the GKTMP server application. In addition, the gatekeeper processes the message according to its programmed instructions. If the RAI message does not contain the specified information, the gatekeeper processes the message but does not send it to the GKTMP server application.

If no submode commands are configured for the RAI messages, the gatekeeper sends all RAI messages to the GKTMP server application.

If the gatekeeper receives an RAI trigger registration message that contains several trigger conditions, the conditions are treated as "OR" conditions. In other words, if an incoming RAI RAS message meets any one of the conditions, the gatekeeper sends the RAS message to the GKTMP server.

If the gatekeeper receives two RAI trigger registration messages with the same priority for the same GKTMP server, the gatekeeper retains the second registration and discards the first one. If the gatekeeper receives two RAI trigger registration messages with different priorities for the same GKTMP server, the gatekeeper checks incoming RAI messages against the conditions on the higher priority registration before using the lower priority registration. If the gatekeeper receives more than one RAI trigger registration message with the same priority but for different GKTMP servers, the gatekeepers retains all of the registrations.

The no form of the command removes the trigger definition from the Cisco IOS gatekeeper with all statically configured conditions under that trigger.

Examples

The following example configures a trigger registration on gatekeeper "sj.xyz.com" to send all RAI messages to GKTMP server "Server-123":

Router(config-gk)# server trigger rai sj.xyz.com 1 Server-123 1.14.93.130 1751
Router(config-gk_raitrigger)# exit

The following example configures an RAI trigger registration on gatekeeper "alpha", which sends to the GKTMP server "Server-west" any RAI message that contain an MCU endpoint, an H.323 proxy endpoint, or a supported prefix 1#. All other RAI messages are not sent to the GKTMP server.

Router(config-gk)# server trigger rai alpha 1 Server-west 10.10.10.10 1751
Router(config-gk-raitrigger)# endpoint-type mcu
Router(config-gk-raitrigger)# endpoint-type proxy
Router(config-gk-raitrigger)# supported-prefix 1#
Router(config-gk-raitrigger# exit

If the RAI registration message defined above for gatekeeper "alpha" is configured and the gatekeeper receives the following trigger registration:

Router(config-gk)# server trigger rai alpha 2 Server-west 10.10.10.10 1751
Router(config-gk_raitrigger)# supported-prefix 1234*
Router(config-gk_raitrigger)# exit

Then gatekeeper "alpha" checks all incoming RAI messages for the MCU or H.323 proxy endpoint or the supported prefix 1# before checking for the supported prefix 1234*. If any one of those conditions is met, the gatekeeper sends the RAI message to the GKTMP server "Server-west".

If the second gatekeeper "alpha" RAI trigger registration had been defined with a priority 1 instead of priority 2, then the second trigger registration would have overridden the first one. In other words, the gatekeeper "alpha" would send to GKTMP server "Server-west" only those RAI messages that contain a supported prefix of 1234*. All other RAI messages would not be sent to the GKTMP server.

Related Commands

Command
Description

server registration-port

Configures the server listening port on the gatekeeper.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server trigger rrq

To configure the registration request (RRQ) trigger statically on the gatekeeper, use the server trigger rrq command in gatekeeper configuration mode. Submode commands are available after entering the server trigger rrq command. To delete a single static trigger on the gatekeeper, use the no form of this command. To delete all static triggers on the gatekeeper, use the all form of the command.

server trigger rrq gkid priority server-id server-ip-address server-port

Submode Commands:

info-only
shutdown
endpoint-type value
supported-prefix value

no server trigger rrq gkid priority server-id server-ip-address server-port

no server trigger all

Syntax Description

all

Deletes all CLI-configured triggers.

gkid

Local gatekeeper identifier.

priority

Priority for each trigger. Range is from 1 to 20; 1 is the highest priority.

server-id

ID number of the external application.

server-ip-address

IP address of the server.

server-port

Port on which the Cisco IOS gatekeeper listens for messages from the external server connection.


Submode Commands

After the command is entered, the software enters a submode that permits you to configure additional filters on the reliability, availability, and serviceability (RAS) message. These filters are optional, and you may configure any of them, one per command line.

endpoint-type value

Use to send RRQ RAS messages containing a particular endpoint type to the GKTMP server application.

value—Value against which to compare the endpoint-type in the RAS messages. Valid endpoint types are the following:

gatekeeper—Endpoint is an H.323 gatekeeper.

h320-gateway—Endpoint is an H.320 gateway.

mcu—Endpoint is a multipoint control unit (MCU).

other-gateway—Endpoint is another type of gateway not specified on this list.

 

proxy—Endpoint is an H.323 proxy.

terminal—Endpoint is an H.323 terminal.

voice-gateway—Endpoint is a voice gateway.

info-only

Use to indicate to the gatekeeper that messages that meet the specified trigger parameters should be sent to the Gatekeeper Transaction Message Protocol (GKTMP) server application as notifications only and that the gatekeeper should not wait for a response from the GKTMP server application.

shutdown

Use to temporarily disable a trigger. The gatekeeper does not consult triggers in a shutdown state when determining what message to forward to the GKTMP server application.

supported-prefix value

Use to send RRQ RAS messages containing a specific supported prefix to the GKTMP server application.

value—Value against which to compare the supported prefix in the RAS messages. The possible values are any E.164 pattern used as a gateway technology prefix. The value string can contain any of the following: 0123456789#*.


Defaults

No trigger servers are set.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(11)T

This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, Cisco 3700 series, Cisco 7200 series, and Cisco MC3810.


Usage Guidelines

Use this command and its optional submode commands to configure the registration request (RRQ) static server trigger. The gatekeeper checks incoming gateway RRQ messages for the configured trigger information. If an incoming RRQ message contains the specified trigger information, the gatekeeper sends the RRQ message to the GKTMP server application. In addition, the gatekeeper processes the message according to its programmed instructions. If the RRQ message does not contain the specified information, the gatekeeper processes the message but does not send it to the GKTMP server application.

If no submode commands are configured for the RRQ messages, the gatekeeper sends all RRQ messages to the GKTMP server application.

If the gatekeeper receives an RRQ trigger registration message that contains several trigger conditions, the conditions are treated as "OR" conditions. In other words, if an incoming RRQ RAS message meets any one of the conditions, the gatekeeper sends the RAS message to the GKTMP server.

If the gatekeeper receives two RRQ trigger registration messages with the same priority for the same GKTMP server, the gatekeeper retains the second registration and discards the first one. If the gatekeeper receives two RRQ trigger registration messages with different priorities for the same GKTMP server, the gatekeeper checks incoming RRQ messages against the conditions on the higher priority registration before using the lower priority registration. If the gatekeeper receives more than one RRQ trigger registration message with the same priority but for different GKTMP servers, the gatekeepers retains all of the registrations.

The no form of the command removes the trigger definition from the Cisco IOS gatekeeper with all statically configured conditions under that trigger.

Examples

The following example configures a trigger registration on gatekeeper "sj.xyz.com" to send all RRQ messages to GKTMP server "Server-123":

Router(config-gk)# server trigger rrq sj.xyz.com 1 Server-123 1.14.93.130 1751
Router(config-gk_rrqtrigger)# exit

The following example configures an RRQ trigger registration on gatekeeper "alpha", which sends to the GKTMP server "Server-west" any RRQ message containing an MCU endpoint, an H.323 proxy endpoint, or a supported prefix 1#. Other RRQ messages are not sent to the GKTMP server.

Router(config-gk)# server trigger rrq alpha 1 Server-west 10.10.10.10 1751
Router(config-gk-rrqtrigger)# endpoint-type mcu
Router(config-gk-rrqtrigger)# endpoint-type proxy
Router(config-gk-rrqtrigger)# supported-prefix 1#
Router(config-gk-rrqtrigger# exit

If the RRQ registration message defined above for gatekeeper "alpha" is configured and the gatekeeper receives the following trigger registration:

Router(config-gk)# server trigger rrq alpha 2 Server-west 10.10.10.10 1751
Router(config-gk_rrqtrigger)# supported-prefix 1234*
Router(config-gk_rrqtrigger)# exit

then gatekeeper "alpha" checks all incoming RRQ messages for the MCU or H.323 proxy endpoint or the supported prefix 1# before checking for the supported prefix 1234*. If any one of those conditions is met, the gatekeeper sends the RRQ message to the GKTMP server "Server-west".

If the second gatekeeper "alpha" RRQ trigger registration had been defined with a priority 1 instead of priority 2, then the second trigger registration would have overridden the first one. In other words, the gatekeeper "alpha" would send to GKTMP server "Server-west" only those RRQ messages that contain a supported prefix of 1234*. All other RRQ messages would not be sent to the GKTMP server.

Related Commands

Command
Description

server registration-port

Configures the server listening port on the gatekeeper.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


server trigger urq

To configure the unregistration request (URQ) trigger statically on the gatekeeper, use the server trigger urq command in gatekeeper configuration mode. Submode commands are available after entering the server trigger urq command. To delete a single static trigger on the gatekeeper, use the no form of this command. To delete all static triggers on the gatekeeper, use the all form of the command.

server trigger urq gkid priority server-id server-ip-address server-port

Submode Commands:

info-only
shutdown
endpoint-type value
supported-prefix value

no server trigger urq gkid priority server-id server-ip-address server-port

no server trigger all

Syntax Description

all

Deletes all CLI-configured triggers.

gkid

Local gatekeeper identifier.

priority

Priority for each trigger. Range is from 1 to 20; 1 is the highest priority.

server-id

ID number of the external application.

server-ip-address

IP address of the server.

server-port

Port on which the Cisco IOS gatekeeper listens for messages from the external server connection.


Submode Commands

After the command is entered, the software enters a submode that permits you to configure additional filters on the reliability, availability, and serviceability (RAS) message. These filters are optional, and you may configure any of them, one per command line.

endpoint-type value

Use to send URQ RAS messages containing a particular endpoint type to the GKTMP server application.

value—Value against which to compare the endpoint-type in the RAS messages. Valid endpoint types are the following:

gatekeeper—Endpoint is an H.323 gatekeeper.

h320-gateway—Endpoint is an H.320 gateway.

mcu—Endpoint is a multipoint control unit (MCU).

other-gateway—Endpoint is another type of gateway not specified on this list.

 

proxy—Endpoint is an H.323 proxy.

terminal—Endpoint is an H.323 terminal.

voice-gateway—Endpoint is a voice gateway.

info-only

Use to indicate to the gatekeeper that messages that meet the specified trigger parameters should be sent to the Gatekeeper Transaction Message Protocol (GKTMP) server application as notifications only and that the gatekeeper should not wait for a response from the GKTMP server application.

shutdown

Use to temporarily disable a trigger. The gatekeeper does not consult triggers in a shutdown state when determining what message to forward to the GKTMP server application.

supported-prefix value

Use to send URQ RAS messages containing a specific supported prefix to the GKTMP server application.

value—Value against which to compare the supported prefix in the RAS messages. The possible values are any E.164 pattern used as a gateway technology prefix. The value string can contain any of the following: 0123456789#*.


Defaults

No trigger servers are set.

Command Modes

Gatekeeper configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(11)T

This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, Cisco 3700 series, Cisco 7200 series, and Cisco MC3810.


Usage Guidelines

Use this command and its optional submode commands to configure the unregistration request (URQ) static server trigger. The gatekeeper checks incoming gateway URQ messages for the configured trigger information. If an incoming URQ message contains the specified trigger information, the gatekeeper sends the URQ message to the GKTMP server application. In addition, the gatekeeper processes the message according to its programmed instructions. If the URQ message does not contain the specified information, the gatekeeper processes the message but does not send it to the GKTMP server application.

If no submode commands are configured for the URQ messages, the gatekeeper sends all URQ messages to the GKTMP server application.

If the gatekeeper receives a URQ trigger registration message that contains several trigger conditions, the conditions are treated as "OR" conditions. In other words, if an incoming URQ RAS message meets any one of the conditions, the gatekeeper sends the RAS message to the GKTMP server.

If the gatekeeper receives two URQ trigger registration messages with the same priority for the same GKTMP server, the gatekeeper retains the second registration and discards the first one. If the gatekeeper receives two URQ trigger registration messages with different priorities for the same GKTMP server, the gatekeeper checks incoming URQ messages against the conditions on the higher priority registration before using the lower priority registration. If the gatekeeper receives more than one URQ trigger registration message with the same priority but for different GKTMP servers, the gatekeepers retains all of the registrations.

The the no form of the command removes the trigger definition from the Cisco IOS gatekeeper with all statically configured conditions under that trigger.

Examples

The following example configures a trigger registration on gatekeeper "sj.xyz.com" to send all URQ messages to GKTMP server "Server-123":

Router(config-gk)# server trigger urq sj.xyz.com 1 Server-123 1.14.93.130 1751
Router(config-gk_urqtrigger)# exit

The following example configures a URQ trigger registration on gatekeeper "alpha", which sends to the GKTMP server "Server-west" any URQ message containing an MCU endpoint, an H.323 proxy endpoint, or a supported prefix 1#. Other URQ messages are not sent to the GKTMP server.

Router(config-gk)# server trigger urq alpha 1 Server-west 10.10.10.10 1751
Router(config-gk-urqtrigger)# endpoint-type mcu
Router(config-gk-urqtrigger)# endpoint-type proxy
Router(config-gk-urqtrigger)# supported-prefix 1#
Router(config-gk-urqtrigger# exit

If the URQ registration message defined above for gatekeeper "alpha" is configured and the gatekeeper receives the following trigger registration:

Router(config-gk)# server trigger urq alpha 2 Server-west 10.10.10.10 1751
Router(config-gk_urqtrigger)# supported-prefix 1234*
Router(config-gk_urqtrigger)# exit

then gatekeeper "alpha" checks all incoming URQ messages for the MCU or H.323 proxy endpoint or the supported prefix 1# before checking for the supported prefix 1234*. If any one of those conditions is met, the gatekeeper sends the URQ message to the GKTMP server "Server-west".

If the second gatekeeper "alpha" URQ trigger registration had been defined with a priority 1 instead of priority 2, then the second trigger registration would have overridden the first one. In other words, the gatekeeper "alpha" would send to GKTMP server "Server-west" only those URQ messages that contain a supported prefix of 1234*. All other URQ messages would not be sent to the GKTMP server.

Related Commands

Command
Description

server registration-port

Configures the server listening port on the gatekeeper.

show gatekeeper servers

Displays the triggers configured on the gatekeeper.


service local-directory

To enable the availability of the local directory service on IP phones served by Cisco IOS Telephony Service (ITS), use the service local-directory command in telephony service configuration mode. To disable the display, use the no form of this command.

service local-directory

no service local-directory

Syntax Description

This command has no arguments or keywords.

Defaults

Local directory service is available on IP phones.

Command Modes

Telephony-service configuration

Command History

Release
Modification

12.2(11)YT

This command was introduced.

12.2(15)T

This command was integrated into Cisco IOS Release 12.2(15)T.


Usage Guidelines

Use this command with Cisco ITS V2.1 or a later version.

The local directory service is available on IP phones by default.

Examples

The following example specifies that the directory service should not be available on the IP phones served by this ITS router:

Router(config)# telephony-service
Router(config-telephony-service)# no service local-directory

Related Commands

Command
Description

telephony-service

Enables Cisco ITS and enters telephony-service configuration mode.


service-relationship

To enter Annex G neighbor configuration mode and enable service relationships for the particular neighbor, use the service-relationship command in Annex G neighbor configuration mode. To exit this mode, use the no form of this command.

service-relationship

no service-relationship

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Annex G neighbor configuration

Command History

Release
Modification

12.2 (11)T

This command was introduced.


Usage Guidelines

Service relationships are defined to be unidirectional. If a service relationship is established between border element A and border element B, A is entitled to send requests to B and to expect responses. For B to send requests to A and to expect responses, a second service relationship must be established. Repeat this command for each border-element neighbor that you configure.


Note The no shutdown command must be used to enable each service relationship.


Examples

The following example enables a service relationship on a border element:

Router(config-annexg-neigh)# service-relationship

Related Commands

Command
Description

access-policy

Requires that a neighbor be explicitly configured.

inbound ttl

Sets the inbound time-to-live value.

outbound retry-interval

Defines the retry period for attempting to establish the outbound relationship between border elements.

retry interval

Defines the time between delivery attempts.

retry window

Defines the total time for which a border element attempts delivery.

shutdown

Enables or disables the border element.


service-type call-check

To identify preauthentication requests to the authentication, authorization, and accounting (AAA) server, use the service-type call-check command in AAA preauthentication configuration mode. To return this setting to the default, use the no form of this command.

service-type call-check

no service-type call-check

Syntax Description

This command has no arguments or keywords.

Defaults

The service type is not set to call-check.

Command Modes

AAA preauthentication configuration

Command History

Release
Modification

12.2(11)T

This command was introduced.


Usage Guidelines

Setting the service-type attribute to call-check causes preauthentication access requests to include this value, which allows AAA servers to distinguish preauthentication requests from other types of Access-Requests. This command has no effect on packets that are not of the preauthentication type.

Examples

The following example sets the RADIUS service-type attribute to call-check:

Router(config)# aaa preauth
Router(config-preauth)# service-type call-check

Related Commands

Command
Description

aaa preauth

Enters AAA preauthentication configuration mode.


session

To associate a transport session with a specified session group, use the session command in backhaul session manager configuration mode. To delete the session, use the no form of this command.

session group group-name remote-ip remote-port local-ip local-port priority

no session group group-name remote-ip remote-port local-ip local-port priority

Syntax Description

group-name

Session-group name.

remote-ip

Remote IP address.

remote-port

Remote port number. Range is from 1024 to 9999.

local-ip

Local IP address.

local-port

Local port number. Range is from 1024 to 9999.

priority

Priority of the session-group. Range is from 0 to 9999; 0 is the highest priority.


Defaults

No default behavior or values

Command Modes

Backhaul session manager configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(4)T

This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco MC3810.

12.2(2)XB

This command was implemented on the Cisco AS5350 and Cisco AS5400.

12.2(2)XB1

This command was implemented on the Cisco AS5850.

12.2(8)T

This command was implemented on the Cisco IAD2420 series. Support for the Cisco AS5350 and Cisco AS5400 and Cisco AS5850 is not included in this release.

12.2(11)T

This command is supported on the Cisco AS5350, Cisco AS5400, and Cisco AS5850 in this release.


Usage Guidelines

It is assumed that the server is located on a remote machine.

Examples

The following example associates a transport session with the session group "group5" and specifies the parameters:

Router(config-bsm)# session group group5 172.13.2.72 5555 172.18.72.198 5555 1

session group

To associate a transport session with a specified session group, use the session group command in backhaul session-manager configuration mode. To delete the session, use the no form of this command.

session group group-name remote-ip remote-port local-ip local-port priority

no session group group-name remote-ip remote-port local-ip local-port priority

Syntax Description

group-name

Session-group name.

remote-ip

Remote IP address.

remote-port

Remote port number. Range is from 1024 to 9999.

local-ip

Local IP address.

local-port

Local port number. Range is from 1024 to 9999.

priority

Priority of the session group. Range is from 0 to 9999; 0 has the highest priority.


Defaults

No default behavior or values.

Command Modes

Backhaul session-manager configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(2)T

This command was implemented on the Cisco 7200 series.

12.2(4)T

This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco MC3810.

12.2(2)XB1

This command was implemented on the Cisco AS5850.

12.2(8)T

This command was implemented on the Cisco IAD2420 series.


Usage Guidelines

The Cisco VSC3000 server is assumed to be located on a remote machine.

Examples

The following example associates a transport session with the session group named "group5" and specifies the keywords described above:

session group group5 172.16.2.72 5555 192.168.72.198 5555 1

session protocol

To specify a session protocol for calls between local and remote routers using the packet network, use the session protocol command in dial-peer configuration mode. To reset to the default, use the no form of this command.

session protocol {aal2-trunk | cisco | sipv2 | smtp}

no session protocol

Syntax Description

aal2-trunk

Dial peer uses ATM adaptation layer 2 (AAL2) nonswitched trunk session protocol.

cisco

Dial peer uses the proprietary Cisco VoIP session protocol.

sipv2

Dial peer uses the Internet Engineering Task Force (IETF) Session Initiation Protocol (SIP). Use this keyword with the SIP option.

smtp

Dial peer uses Simple Mail Transfer Protocol (SMTP) session protocol.


Defaults

No default behaviors or values

Command Modes

Dial-peer configuration

Command History

Release
Modification

11.3(1)T

This command was introduced for VoIP peers on the Cisco 3600 series.

12.0(3)XG

This command was modified to support VoFR) dial peers.

12.0(4)XJ

This command was modified for store-and-forward fax on the Cisco AS5300.

12.1(1)XA

This command was implemented for VoATM dial peers on the Cisco MC3810. The aal2-trunk keyword was added.

12.1(1)T

This command was integrated into Cisco IOS Release 12.1(1)T. The sipv2 keyword was added.

12.1(2)T

This command was integrated into Cisco IOS Release 12.1(2)T.

12.2(2)T

This command was implemented on the Cisco 7200 series.

12.2(4)T

This command was implemented on the Cisco 1750.

12.2(2)XA

This command was implemented on the Cisco AS5350 and Cisco AS5400.

12.2(2)XB1

This command was implemented on the Cisco AS5850.

12.2(8)T

This command was integrated into Cisco IOS Release 12.2(8)T and was implemented on the Cisco 7200 series. Supported for the Cisco AS5300, Cisco AS5350, Cisco AS5400, and Cisco AS5850 is not included in this release. The aal2-trunk and smtp keywords are not supported on the Cisco 7200 series in this release.

12.2(11)T

This command is supported on the Cisco AS5350, Cisco AS5400, and Cisco AS5850 in this release.


Usage Guidelines

The cisco keyword is applicable only to VoIP on the Cisco 1750, Cisco 1751, Cisco 3600 series, and Cisco 7200 series routers.

The aal2-trunk keyword is applicable only to VoATM on the Cisco MC3810 multiservice access concentrator and the Cisco 7200 series router.

This command applies to both on-ramp and off-ramp store-and-forward fax functions.

Examples

The following example shows that AAL2 trunking has been configured as the session protocol:

dial-peer voice 10 voatm
 session protocol aal2-trunk

The following example shows that Cisco session protocol has been configured as the session protocol:

dial-peer voice 20 voip
 session protocol cisco

The following example shows that a VoIP dial peer for SIP has been configured as the session protocol for VoIP call signaling:

dial-peer voice 102 voip
 session protocol sipv2

Related Commands

Command
Description

dial-peer voice

Enters dial-peer configuration mode and specifies the method of voice-related encapsulation.

session target (VoIP)

Configures a network-specific address for a dial peer.


session protocol (Voice over Frame Relay)

To establish a Voice over Frame Relay protocol for calls between the local and remote routers via the packet network, use the session protocol command in dial-peer configuration mode. To reset to the default, use the no form of this command.

session protocol {cisco-switched | frf11-trunk}

no session protocol

Syntax Description

cisco-switched

Proprietary Cisco VoFR session protocol. (This is the only valid session protocol for the Cisco 7200 series.)

frf11-trunk

FRF.11 session protocol.


Defaults

cisco-switched

Command Modes

Dial-peer configuration

Command History

Release
Modification

11.3(1)T

This command was introduced for VoIP.

12.0(3)XG

This command was modified to support VoFR on the following platforms: Cisco 2600 series, Cisco 3600 series, Cisco 7200 series, and Cisco MC3810.

12.0(4)T

The cisco-switched and frf11-trunk keywords were added for VoFR dial peers.


Usage Guidelines

For Cisco-to-Cisco dial peer connections, Cisco recommends that you use the default session protocol because of the advantages it offers over a pure FRF.11 implementation. When connecting to FRF.11-compliant equipment from other vendors, use the FRF.11session protocol.


Note When using the FRF.11 session protocol on Cisco 2600 series and Cisco 3600 series routers, you must also use the called-number command.


Examples

The following example configures the FRF.11 session protocol on a Cisco 2600 series or Cisco 3600 series router for VoFR dial peer 200:

dial-peer voice 200 vofr
 session protocol frf11-trunk
 called-number 5552150

The following example configures the FRF.11 session protocol on a Cisco MC3810 for VoFR dial peer 200:

dial-peer voice 200 vofr
 session protocol frf11-trunk

Related Commands

Command
Description

called-number (dial-peer)

Enables an incoming VoFR call leg to get bridged to the correct POTS call leg when using a static FRF.11 trunk connection.

codec (dial-peer)

Specifies the voice coder rate of speech for a Voice over Frame Relay dial peer.

cptone

Specifies a regional analog voice interface-related tone, ring, and cadence setting.

destination-pattern

Specifies either the prefix, the full E.164 telephone number, or an ISDN directory number (depending on the dial plan) to be used for a dial peer.

dtmf-relay (Voice over Frame Relay)

Enables the generation of FRF.11 Annex A frames for a dial peer.

preference

Indicates the preferred order of a dial peer within a rotary hunt group.

session target

Specifies a network-specific address for a specified dial peer or destination gatekeeper.

signal-type

Sets the signaling type to be used when connecting to a dial peer.


session protocol aal2

To enter voice-service-session configuration mode and specify ATM adaptation layer 2 (AAL2) trunking, use the session protocol aal2 command in voice-service configuration mode.

session protocol aal2

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

Voice-service configuration

Command History

Release
Modification

12.1(1)XA

This command was introduced on the Cisco MC3810.

12.1(2)T

This command was integrated into Cisco IOS Release 12.1(2)T.

12.2(2)T

This command was implemented on the Cisco 7200 series.


Usage Guidelines

This command applies to VoATM on the Cisco MC3810 multiservice access concentrator and the Cisco 7200 series router.

In the voice-service-session configuration mode for AAL2, you can configure only AAL2 features, such as call admission control and subcell multiplexing.

Examples

The following example accesses voice-service-session configuration mode, beginning in global configuration mode:

voice service voatm
 session protocol aal2

session protocol multicast

To set the session protocol as multicast, use the session protocol multicast command in dial-peer configuration mode. To reset to the default protocol, use the no version of this command.

session protocol multicast

no session protocol multicast

Syntax Description

This command has no arguments or keywords.

Defaults

Default session protocol: Cisco.

Command Modes

Dial-peer configuration

Command History

Release
Modification

12.1(2)XH

This command was introduced for the Cisco Hoot and Holler over IP application on the Cisco 2600 series and Cisco 3600 series.

12.1(3)T

This command was integrated into Cisco IOS Release 12.1(3)T.

12.2(8)T

This command was implemented on the Cisco 1750 and Cisco 1751.


Usage Guidelines

Use this command for voice conferencing in a hoot and holler networking implementation. This command allows more than two ports to join the same session simultaneously. It is supported on Cisco 1700, Cisco 2600, and Cisco 3600 series routers.

Examples

The following example shows the use of the session protocol multicast dial-peer configuration command in context with its accompanying commands:

dial-peer voice 111 voip
 destination-pattern 111
 session protocol multicast
 session target ipv4:237.111.0.111:22222
 ip precedence 5
 codec g711ulaw

Related Commands

Command
Description

session target ipv4

Assigns the session target for voice-multicasting dial peers.


session-set

To create a Signlaing System 7 (SS7)-link-to-SS7-session-set association or to associate an SS7 link with an SS7 session set on the Cisco 2600-based Signaling Link Terminal (SLT), enter the session-set command in global configuration mode. To remove the link from its current SS7 session set and to add it to SS7 session set 0 (the default), use the no form of this command.

session-set session-set-id

no session-set

Syntax Description

session-set-id

SS7 session ID. Valid values are 0 and 1. Default is 0.


Defaults

SS7 session set 0

Command Modes

Global configuration

Command History

Release
Modification

12.2(15)T

This command was introduced on the Cisco 2600-based SLT.


Usage Guidelines

On Cisco AS5350 and Cisco AS5400 platforms, the channel-id command is used to create an SS7-link-to-SS7-session-set association on the Cisco SLT. The Cisco 26xx platforms do not support the channel-id command, so channel IDs on the Cisco 26xx-based SLT are implicitly assigned on the basis of the slot location of the WAN interface card (WIC) and the channel group ID used to create the SS7 link.

If this command is omitted, the link is implicitly added to the SS7 session set 0, which is the default.

Examples

The following example shows how the session-set command is used to add the associated SS7 link to an SS7 session set:

session-set 1 

The following example shows how the no session-set command is used to remove the link from its current SS7 session set and add it to SS7 session set 0, which is the default:

no session-set

Related Commands

Command
Description

channel-id

Assigns a session channel ID to a Signaling System 7 (SS7) serial link or assign an SS7 link to an SS7 session set on a Cisco AS5350 or Cisco AS5400.


session target (MMoIP dial peer)

To designate an e-mail address to receive T.37 store-and-forward fax calls from a Multimedia Mail over IP (MMoIP) dial peer, use the session target command in dial peer configuration mode. To remove the target address, use the no form of this command.

session target mailto:{name | $d$ | $m$ | $e$}[@domain-name]

no session target

Syntax Description

mailto:

Matching calls are passed to the network using Simple Mail Transfer Protocol (SMTP) or Extended Simple Mail Transfer Protocol (ESMTP).

name

String that can be an e-mail address, name, or mailing list alias.

$d$

Macro that is replaced by the destination pattern of the gateway access number, which is the called number or dialed number identification service (DNIS) number.

$m$

Macro that is replaced by the redirecting dialed number (RDNIS) if present; otherwise, it is replaced by the gateway access number (DNIS). This macro requires use of the fax detection interactive voice response (IVR) application.

Note Other strings can be passed to mailto in place of $m$ if you modify the fax detection application Tool Command Language (TCL) script or VoiceXML document. For more information, refer to the readme file that came with the TCL script or the Cisco VoiceXML Programmer's Guide.

$e$

Macro that is replaced by the DNIS, the RDNIS, or a string that represents a valid e-mail address, as specified by the cisco-mailtoaddress variable in the transfer tag of the VoiceXML fax detection document. By default, if the cisco-mailtoaddress variable is not specified in the fax detection document, the DNIS is mapped to $e$.

If $e$ is not specified for the session target mailto command in the MMoIP dial peer, but the cisco-mailtoaddress variable is specified in the transfer tag of the fax detection document, then whatever is specified in the MMoIP dial peer takes precedence; the cisco-mailtoaddress variable is ignored.

Note If a domain name is configured with this command, the VoiceXML document should pass only the username portion of the e-mail address and not the domain. If the domain name is passed from cisco-mailtoaddress, the session target mailto command should specify only $e$.

@domain-name

(Optional) String that contains the domain name to be associated with the target address, preceded by the at sign (@); for example, @mycompany.com.


Defaults

No default behavior or values

Command Modes

Dial peer configuration

Command History

Release
Modification

11.3(1)T

This command was introduced.

12.0(4)T

This command was modified to support store-and-forward fax.

12.1(5)XM1

The $m$ keyword was introduced for the fax detection feature on the Cisco AS5300.

12.2(2)XA

This command was implemented on the Cisco AS5350 and Cisco AS5400.

12.2(2)XB

The $e$ keyword was introduced for VoiceXML fax detection on the Cisco AS5300.

12.2(8)T

This command was integrated into Cisco IOS Release 12.2(8)T and was implemented on the following platforms: Cisco 1751, Cisco 2600 series, Cisco 3600 series, Cisco 3725, and Cisco 3745.

12.2(11)T

This command was implemented on the following platforms: Cisco AS5300, Cisco AS5350, and Cisco AS5400.


Usage Guidelines

Use this command to deliver e-mail to one recipient by specifying one e-mail name, or to deliver e-mail to multiple recipients by specifying an e-mail alias as the name argument and having that alias expanded by the mailer.

Use the $m$ macro to include the redirecting dialed number (RDNIS) as part of the e-mail name when using the fax detection IVR application. If $m$ is specified and RDNIS is not present in the call information, the access number of the gateway (the dialed number, or DNIS) is used instead. For example, if the calling party originally dialed 6015551111 to send a fax, and the call was redirected (forwarded on busy or no answer) to 6015552222 (the gateway), the RDNIS is 6015551111, and the DNIS is 6015552222.

Use the $e$ macro to map the cisco-mailtoaddress variable in the VoiceXML fax detection document to the username portion of the e-mail address when sending a fax. If the VoiceXML document does not specify the cisco-mailtoaddress variable in the transfer tag, the application maps the DNIS to the e-mail address username.

Examples

The following example delivers fax-mail to multiple recipients:

dial-peer voice 10 mmoip
 session target mailto:marketing-information@mailer.example.com

Assuming that mailer.example.com is running the sendmail application, you can put the following information into its /etc/aliases file:

marketing-information:
 john@example.com,
 fax=+14085551212@sj-offramp.example.com

The following example uses the fax detection IVR application. Here, the session target (MMoIP dial peer) command forwards fax calls to an e-mail account that uses the Redirected Dialed Number Identification Service (RDNIS) as part of its address. In this example, the calling party originally dialed 6015551111 to send a fax, and the call was forwarded (on busy or no answer) to 6015552222, which is the incoming number for the gateway being configured. The RDNIS is 6015551111, and the dialed number (DNIS) is 6015552222. When faxes are forwarded from the gateway, the session target in the example is expanded to 6015551111@mail-server.unified-messages.com.

dial-peer voice 4 mmoip
 session target mailto:$m$@mail-server.unified-messages.com

The following examples configure a session target for a VoiceXML fax detection application. In this example, the VoiceXML document passes just the username portion of the e-mail address, for example, "johnd":

dial-peer voice 4 mmoip
 session target mailto:$e$@cisco.com

In this example, the VoiceXML document passes the complete e-mail address including domain name, for example, "johnd@cisco.com":

dial-peer voice 5 mmoip
 session target mailto:$e$

Related Commands

Command
Description

destination-pattern

Specifies either the partial or full E.164 telephone number (depending on your dial plan) used to match the dial peer.

dial-peer voice

Enters dial-peer configuration mode and defines a dial peer.


session target (POTS dial peer)

To designate loopback calls from a POTS dial peer, use the session target command in dial-peer configuration mode. To reset to the default, use the no form of this command.

session target loopback:compressed | loopback:uncompressed

no session target

Syntax Description

loopback:compressed

All voice data is looped back in compressed mode to the source.

loopback:uncompressed

All voice data is looped back in uncompressed mode to the source.


Defaults

No loopback calls are designated.

Command Modes

Dial-peer configuration

Command History

Release
Modification

11.3(1)T

This command was introduced on the Cisco 2600 series and Cisco 3600 series.

12.0(3)T

This command was implemented on the Cisco AS5300.

12.2(2)XA

This command was implemented on the Cisco AS5350 and Cisco AS5400.

12.2(2)XB1

This command was implemented on the Cisco AS5850.

12.2(8)T

Support for the Cisco AS5300, Cisco AS5350, Cisco AS5400 and Cisco AS5850 is not included in this release.

12.2(11)T

This command was integrated into Cisco IOS Release 12.2(11)T and is supported on the Cisco AS5200, Cisco AS5350, Cisco AS5400, and Cisco AS5850 in this release.


Usage Guidelines

Use this command to test the voice transmission path of a call. The loopback point depends on the call origin and the loopback type selected.

Examples

The following example loops back the traffic from the dial peer in compressed mode:

dial-peer voice 10 pots
 session target loopback:compressed

Related Commands

Command
Description

dial-peer voice

Enters dial-peer configuration mode and specifies the method of voice-related encapsulation.


session target (VoATM dial peer)

To specify a network-specific address for a specified VoATM dial peer, use the session target command in dial-peer configuration mode. To reset to the default, use the no form of this command.

Cisco 3600 Series Routers

session target interface pvc {name | vpi/vci | vci}

no session target

Cisco MC3810 Multiservice Access Concentrators

session target {serial | atm} interface pvc {word | vpi/vci | vci} cid

no session target

Cisco 7200 Series Routers

session target atm slot/port pvc {word | vpi/vci | vci} cid

no session target

Syntax Description

serial

Serial interface for the dial-peer address.

atm

ATM interface. The only valid number is 0.

interface

Interface type and interface number on the router.

slot/port

Slot and port numbers for the dial-peer address.

pvc

Specific ATM permanent virtual circuit (PVC) for this dial peer.

name

PVC name.

word

(Optional) Name that identifies the PVC. The argument can identify the PVC if a word identifier was assigned when the PVC was created.

vpi/vci

ATM network virtual path identifier (VPI) and virtual channel identifier (VCI) of this PVC. Values are as follows:

Cisco 3600 series with Multiport T1/E1 ATM network module with inverse multiplexing over ATM (IMA): vpi range is from 0 to 5; vci range is from 1 to 255.

OC3 ATM network module: vpi range is from 0 to 15; vci range is from 1 to 1023.

vci

ATM network virtual channel identifier (VCI) of this PVC.

cid

ATM network channel identifier (CID) of this PVC. Range is from 8 to 255.


Defaults

Command is enabled with no IP address or domain name defined.

Command Modes

Dial-peer configuration

Command History

Release
Modification

11.3(1)T

This command was introduced.

11.3(1)MA

This command was modified to support VoATM, VoHDLC, and POTS dial peers. The command was implemented on the Cisco MC3810.

12.0(3)XG

This command was modified to support VoFR dial peers. The command was implemented on the Cisco 2600 series and Cisco 3600 series.

12.0(4)T

This command was integrated into Cisco IOS Release 12.0(4)T.

12.0(7)XK

This command was modified to support VoATM and VoIP dial peers. The command was implemented on the Cisco 3600 series and the Cisco MC3810. Support for VoHDLC was removed.

12.1(1)XA

This command was modified to provide enhanced support for VoATM dial peers.

12.1(2)T

This command was integrated into Cisco IOS Release 12.1(2)T.

12.2(2)T

This command was implemented on the Cisco 7200 series.


Usage Guidelines

Use the session target command to specify a network-specific address or domain name for a dial peer. Whether you select a network-specific address or a domain name depends on the session protocol that you select. The syntax of this command complies with the simple syntax of mailto: as described in RFC 1738.

Use the session target loopback command to test the voice transmission path of a call. The loopback point depends on the call origin and the loopback type selected.

This command applies to on-ramp store-and-forward fax functions.

You must enter the session protocol aal2-trunk dial-peer configuration command before you can specify a CID for a dial peer for VoATM on the Cisco MC3810 multiservice access concentrator and Cisco 7200 series router.


Note This command does not apply to POTS dial peers.


Examples

The following example configures a session target for VoATM on a Cisco MC3810 multiservice access concentrator. The session target is sent to ATM interface 0 for a PVC with a VCI of 20.

dial-peer voice 12 voatm
 destination-pattern 13102221111
 session target atm0 pvc 20

The following example delivers fax-mail to multiple recipients:

dial-peer voice 10 mmoip
 session target marketing-information@mailer.example.com

Assuming that mailer.example.com is running sendmail, you can put the following information into its /etc/aliases file:

marketing-information:
 john@example.com,

 fax=+14085551212@sj-offramp.example.com


The following example configures a session target for VoATM on the Cisco 3600 series. The session target is sent to ATM interface 0, and is for a PVC with a VPI/VCI of 1/100.

dial-peer voice 12 voatm
 destination-pattern 13102221111
 session target atm1/0 pvc 1/100

Related Commands

Command
Description

called-number

Enables an incoming VoFR call leg to be bridged to the correct POTS call leg.

codec (dial-peer)

Specifies the voice coder rate of speech for a dial peer.

cptone

Specifies a regional tone, ring, and cadence setting for an analog voice port.

destination-pattern

Specifies either the prefix or full E.164 telephone number (depending on the dial plan) to be used for a dial peer.

dtmf-relay

Enables the DSP to generate FRF.11 Annex A frames for a dial peer.

preference

Indicates the preferred selection order of a dial peer within a hunt group.

session protocol

Establishes a VoFR protocol for calls between local and remote routers via the packet network.

session target

Configures a network-specific address for a dial peer.

session target loopback

Tests the voice transmission path of a call.

signal-type

Sets the signaling type to be used when connecting to a dial peer.


session target (VoFR dial peer)

To specify a network-specific address for a specified VoFR dial peer, use the session target command in dial-peer configuration mode. To reset to the default, use the no form of this command.

Cisco 2600 Series and Cisco 3600 Series Routers

session target interface dlci [cid]

no session target

Cisco MC3810 Multiservice Access Concentrators

session target interface dlci [cid]

no session target

Cisco 7200 Series Routers

session target interface dlci

no session target

Syntax Description

interface

Serial interface and interface number (slot number and port number) associated with this dial peer. For the range of valid interface numbers for the selected interface type, enter a ? character after the interface type.

dlci

Data link connection identifier for this dial peer. Range is from 16 to 1007.

cid

(Optional) DLCI subchannel to be used for data on FRF.11 calls. A CID must be specified only when the session protocol is frf11-trunk. When the session protocol is cisco-switched, the CID is dynamically allocated. Range is from 4 to 255.

Note By default, CID 4 is used for data; CID 5 is used for call-control. We recommend that you select CID values between 6 and 63 for voice traffic. If the CID is greater than 63, the FRF.11 header contains an extra byte of data.


Defaults

The default for this command is enabled with no IP address or domain name defined.

Command Modes

Dial-peer configuration

Command History

Release
Modification

11.3(1)T

This command was introduced.

11.3(1)MA

This command was implemented for VoFR, VoHDLC, and POTS dial peers on the Cisco MC3810.

12.0(3)XG

This command was implemented for VoFR dial peers on the Cisco 2600 series and Cisco 3600 series. The cid option was added.

12.0(4)T

This command was integrated into Cisco IOS Release12.0(4)T and implemented for VoFR and POTS dial peers on the Cisco 7200 series.


Usage Guidelines

Use the session target command to specify a network-specific address or domain name for a dial peer. Whether you select a network-specific address or a domain name depends on the session protocol you select. The syntax of this command complies with the simple syntax of mailto: as described in RFC 1738.

The session target loopback command is used for testing the voice transmission path of a call. The loopback point depends on the call origin and the loopback type selected.

For VoFR dial peers, the cid option is not allowed when the cisco-switched option for the session protocol command is used.

Examples

The following example configures a session target for Voice over Frame Relay on a Cisco MC3810 with a session target on serial port1 and a DLCI of 200:

dial-peer voice 11 vofr
 destination-pattern 13102221111
 session target serial1 200

The following example configures serial interface 1/0, DLCI 100 as the session target for VoFR dial peer 200 (an FRF.11 dial peer) on a Cisco 2600 series or Cisco 3600 series router, starting from global configuration mode and using the FRF.11 session protocol:

dial-peer voice 200 vofr
 destination-pattern 13102221111
 called-number 5552150
 session protocol frf11-trunk
 session target serial 1/0 100 20

The following example delivers fax-mail to multiple recipients:

dial-peer voice 10 mmoip
 session target marketing-information@mailer.example.com

Assuming that mailer.example.com is running sendmail, you can put the following information into its /etc/aliases file:

marketing-information:
 john@example.com,

 fax=+14085551212@sj-offramp.example.com

Related Commands

Command
Description

called-number

Enables an incoming VoFR call leg to be bridged to the correct POTS call leg.

codec (dial-peer)

Specifies the voice coder rate of speech for a dial peer.

cptone

Specifies a regional tone, ring, and cadence setting for an analog voice port.

destination-pattern

Specifies either the prefix or the full E.164 telephone number (depending on the dial plan) to be used for a dial peer.

dtmf-relay

Enables the DSP to generate FRF.11 Annex A frames for a dial peer.

preference

Indicates the preferred selection order of a dial peer within a hunt group.

session protocol

Establishes a VoFR protocol for calls between the local and the remote routers via the packet network.

signal-type

Sets the signaling type to be used when connecting to a dial peer.


session target (VoIP dial peer)

To designate a network-specific address to receive calls from a VoIP dial peer, use the session target command in dial-peer configuration mode. To reset to the default, use the no form of this command.

Cisco 1751, Cisco 3725, Cisco 3745, Cisco AS5300

session target {ipv4:destination-address | dns:[$s$. | $d$. | $e$. | $u$.] host-name | enum:table-num | loopback:rtp | ras | sip-server}

no session target

Cisco 2600 Series, Cisco 3600 Series, Cisco AS5350, Cisco AS5400, Cisco AS5850, Cisco MC3810

session target {ipv4:destination-address | dns:[$s$. | $d$. | $e$. | $u$.] host-name | enum:table-num | loopback:rtp | ras | settlement provider-number | sip-server}

no session target

Cisco AS5800

session target {ipv4:destination-address | dns:[$s$. | $d$. | $e$. | $u$.] host-name | enum:table-num | loopback:rtp}

no session target

Syntax Description

ipv4:destination-address

IP address of the dial peer to receive calls.

dns:[$s$....] host-name

Host device housing the domain name server that resolves the name of the dial peer to receive calls.

Use one of the following macros with this keyword when defining the session target for VoIP peers:

$s$.—(Optional) Source destination pattern is used as part of the domain name.

$d$.—(Optional) Destination number is used as part of the domain name.

$e$.—(Optional) Digits in the called number are reversed and periods are added between the digits of the called number. The resulting string is used as part of the domain name.

$u$.—(Optional) Unmatched portion of the destination pattern (such as a defined extension number) is used as part of the domain name.

host-name—String that contains the complete host name to be associated with the target address; for example, serverA.mycompany.com.

enum:table-num

ENUM search table number. Range is from 1 to 15.

loopback:rtp

All voice data is looped back to the source.

ras

Registration, admission, and status (RAS) signaling function protocol is being used, meaning that a gatekeeper is consulted to translate the E.164 address into an IP address.

settlement provider-number

The settlement server is the target to resolve the terminating gateway address. The argument is as follows:

provider-number—Provider IP address.

sip-server

The global Session Initiation Protocol (SIP) server is the destination for calls from this dial peer.


Defaults

Enabled, with no IP address or domain name defined.

Command Modes

Dial-peer configuration

Command History

Release
Modification

11.3(1)T

This command was introduced on the Cisco 2600 series and Cisco 3600 series.

12.0(3)T

This command was implemented on the Cisco AS5300. The ras keyword was added.

12.0(4)XJ

This command was implemented for store-and-forward fax on the Cisco AS5300.

12.1(1)T

This command was integrated into Cisco IOS Release 12.1(1)T. The settlement and sip-server keywords were added.

12.2(2)XA

This command was implemented on the Cisco AS5350 and Cisco AS5400.

12.2(2)XB1

This command was implemented on the Cisco AS5850.

12.2(8)T

This command was integrated into Cisco IOS Release 12.2(8)T. Support for on the Cisco AS5300, Cisco AS5350, Cisco AS5400, and Cisco AS5850 is not included in this release.

12.2(11)T

This command is supported on the Cisco AS5300, Cisco AS5350, Cisco AS5400 and Cisco AS5850 in this release. The enum keyword was added.


Usage Guidelines

Use this command to specify a network-specific destination for a dial peer to receive calls from the current dial peer. You can select an option to define a network-specific address or domain name as a target, or you can select one of several methods to automatically determine the destination for calls from the current dial peer.

Use the session target dns command with or without the specified macros. Using the optional macros can reduce the number of VoIP dial-peer session targets that you must configure if you have groups of numbers associated with a particular router.

The session target enum command instructs the dial peer to use a table of translation rules to convert the dialed number identification service (DNIS) number into a number in E.164 format. This translated number is sent to a DNS server that contains a collection of URLs. These URLs identify each user as a destination for a call and may represent various access services, such as SIP, H.323, telephone, fax, e-mail, instant messaging, and personal web pages. Before assigning the session target to the dial peer, configure an ENUM match table with the translation rules using the voice enum-match-table command in global configuration mode. The table is identified in session target enum as table-num.

Use the session target loopback command to test the voice transmission path of a call. The loopback point depends on the call origin.

Use the session target ras command to specify that the RAS protocol is being used to determine the IP address of the session target.

In Cisco IOS Release 12.1(1)T the session target command configuration cannot combine the target of RAS with the settle-call command.

If the session target type is settlement when the VoIP dial peers are configured for a settlement server, the provider-number parameter in the session target and settle-call commands should be identical.

Use the session target sip-server command to name the global SIP server interface as the destination for calls from this dial peer. You must first define the SIP server interface by using the sip-server command in SIP user-agent configuration mode. Then you can enter the session target sip-server option for each dial peer instead of having to enter the entire IP address for the SIP server interface under each dial peer.

Examples

The following example creates a session target using DNS for a host named "voice_router" in the domain cisco.com:

dial-peer voice 10 voip
 session target dns:voice_router.cisco.com

The following example creates a session target using DNS with the optional $u$. macro. In this example, the destination pattern ends with four periods (.) to allow for any four-digit extension that has the leading numbers 1310555. The optional macro $u$. directs the gateway to use the unmatched portion of the dialed number—in this case, the four-digit extension—to identify a dial peer. As in the preceding example, the domain is "cisco.com."

dial-peer voice 10 voip
 destination-pattern 1310555....
 session target dns:$u$.cisco.com

The following example creates a session target using DNS, with the optional $d$. macro. In this example, the destination pattern has been configured for 13105551111. The optional macro $d$. directs the gateway to use the destination pattern to identify a dial peer in the "cisco.com" domain.

dial-peer voice 10 voip
 destination-pattern 13105551111
 session target dns:$d$.cisco.com

The following example creates a session target using DNS, with the optional $e$. macro. In this example, the destination pattern has been configured for 12345. The optional macro $e$. directs the gateway to do the following: reverse the digits in the destination pattern, add periods between the digits, and use this reverse-exploded destination pattern to identify the dial peer in the "cisco.com" domain.

dial-peer voice 10 voip
 destination-pattern 12345
 session target dns:$e$.cisco.com

The following example creates a session target using an ENUM table. It indicates that calls made using dial peer 101 should use the preferential order of rules in enum match table 3.

dial-peer voice 101 voip
 session target enum:3

The following example creates a session target using RAS:

dial-peer voice 11 voip
 destination-pattern 13105551111
 session target ras

The following example creates a session target using settlement:

dial-peer voice 24 voip
 session target settlement:0

Related Commands

Command
Description

destination-pattern

Specifies either the prefix or the full E.164 telephone number (depending on the dial plan) to be used for a dial peer.

dial-peer voice

Enters dial-peer configuration mode and specifies the method of voice-related encapsulation.

settle-call

Specifies that settlement is to be used for the specified dial peer, regardless of session target type.

sip-server

Defines a network address for the SIP server interface.

voice enum-match-table

Initiates the ENUM match table definition.


session transport

To configure a VoIP dial peer to use Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) as the underlying transport layer protocol for Session Initiation Protocol (SIP) messages, use the session transport command in dial-peer configuration mode. To reset to the default, use the no form of this command.

session transport {udp | tcp}

no session transport {udp | tcp}

Syntax Description

udp

The SIP dial peer uses the UDP transport layer protocol. This is the default.

tcp

The SIP dial peer uses the TCP transport layer protocol.


Defaults

UDP


Note The transport protocol specified with the transport command and the one specified with the session transport command must be the same.


Command Modes

Dial-peer configuration

Command History

Release
Modification

12.1(1)T

This command was introduced on the Cisco 2600 series, Cisco 3600 series, and Cisco AS5300.

12.2(2)XA

This command was implemented on the Cisco AS5350 and Cisco AS5400.

12.2(2)XB1

This command was implemented on the Cisco AS5850.

12.2(11)T

This command was integrated into Cisco IOS Release 12.2(11)T.


Usage Guidelines

Use the show sip-ua status command to ensure that the transport protocol that you set using the session transport command matches the protocol set using the transport command. This command is used in dial-peer configuration mode to specify the SIP transport method, either UDP or TCP.

Examples

The following example shows a VoIP dial peer configured to use UDP as the underlying transport layer protocol for SIP messages:

dial-peer voice 102 voip
 session transport udp

set

To create a fault-tolerant or non-fault-tolerant session set with the client or server option, use the set command in backhaul session-manager configuration mode. To delete the set, use the no form of this command.

set set-name {client | server} {ft | nft}

no set set-name {client | server} {ft | nft}

Syntax Description

set-name

Session-set name.

client

The session set operates as a client. Select this option for signaling backhaul.

server

The session set operates as a server.

ft

Fault-tolerant operation. Select fault-tolerant if this session set can contain more than one session group, with each session group connecting the gateway to a different Cisco VSC3000. Fault-tolerance allows the system to operate properly if a session group in the session set fails.

nft

Non-fault-tolerant operation. Select non-fault-tolerant if this session set contains only one session group (which connects the gateway to a single Cisco VSC3000).


Defaults

No default behavior or values

Command Modes

Backhaul session-manager configuration

Command History

Release
Modification

12.1(1)T

This command was introduced.

12.2(4)T

This command was implemented on the Cisco 2600 series, Cisco 3600 series, and Cisco MC3810.

12.2(2)XB

This command was implemented on the Cisco AS5350 and Cisco AS5400.

12.2(2)XB1

This command was implemented on the Cisco AS5850.

12.2(8)T

This command was integrated into Cisco IOS Release 12.2(8)T and was implemented on the Cisco IAD2420 series. Support for on the Cisco AS5350, Cisco AS5400, and Cisco AS5850 is not included in this release.

12.2(11)T

This command is supported on the Cisco AS5350, Cisco AS5400 and Cisco AS5850 in this release.


Usage Guidelines

Multiple session groups can be associated with a session set.

For signaling backhaul, session sets should be configured to operate as clients.

A session set cannot be deleted unless all session groups associated with the session set are deleted first.

Examples

The following example sets the client set named "set1" as fault-tolerant:

Router(config-bsm)# set set1 client ft

set pstn-cause

To map an incoming PSTN cause code to a Session Initiation Protocol (SIP) error status code, use the set pstn-cause command in SIP user-agent configuration mode. To reset to the default, use the no form of this command.

set pstn-cause value sip-status value

no set pstn-cause

Syntax Description

pstn-cause value

PSTN cause code. Range is from 1 to 127

sip-status value

SIP status code that is to correspond with the PSTN cause code. Range is from 400 to 699.


Defaults

The default mappings defined in the following table are used:

Table 26 Default PSTN Cause Codes Mapped to SIP Events 

PSTN Cause Code
Description
SIP Event

1

Unallocated number

404 Not found

2

No route to specified transit network

404 Not found

3

No route to destination

404 Not found

17

User busy

486 Busy here

18

No user responding

480 Temporarily unavailable

19

No answer from the user

20

Subscriber absent

21

Call rejected

403 Forbidden

22

Number changed

410 Gone

26

Non-selected user clearing

404 Not found

27

Destination out of order

404 Not found

28

Address incomplete

484 Address incomplete

29

Facility rejected

501 Not implemented

31

Normal, unspecified

404 Not found

34

No circuit available

503 Service unavailable

38

Network out of order

503 Service unavailable

41

Temporary failure

503 Service unavailable

42

Switching equipment congestion

503 Service unavailable

47

Resource unavailable

503 Service unavailable

55

Incoming class barred within the Closed User Group (CUG)

403 Forbidden

57

Bearer capability not authorized

403 Forbidden

58

Bearer capability not currently available

501 Not implemented

65

Bearer capability not implemented

501 Not implemented

79

Service or option not implemented

501 Not implemented

87

User not member of the Closed User Group (CUG)

503 Service unavailable

88

Incompatible destination

400 Bad request

95

Invalid message

400 Bad request

102

Recover on Expires timeout

408 Request timeout

111

Protocol error

400 Bad request

Any code other than those listed above

500 Internal server error


Command Modes

SIP user-agent configuration

Command History

Release
Modification

12.2(2)XB

This command was introduced.

12.2(2)XB2

This command was implemented on the Cisco AS5850.

12.2(8)T

This command was integrated into Cisco IOS Release 12.2(8)T. Support for on the Cisco AS5300  Cisco AS5350, Cisco AS5400, and Cisco AS5850 is not included in this release.


Usage Guidelines

A PSTN cause code can be mapped only to one SIP status code at a time.

Examples

The following example maps a SIP status code to correspond to a PSTN cause code:

Router(config)# sip-ua
Router(config-sip-ua)# set pstn-cause 111 sip-status 400
Router(config-sip-ua)# exit

Related Commands

Command
Description

set sip-status

Sets an incoming SIP error status code to a PSTN release cause code.


set sip-status

To map an incoming Session Initiation Protocol (SIP) error status code to a PSTN cause code, use the set sip-status command in SIP user-agent configuration mode. To reset to the default, use the no form of this command.

set sip-status value pstn-cause value

no set sip-status

Syntax Description

sip-status value

SIP status code. Range is from 400 to 699.

pstn-cause value

PSTN cause code that is to correspond with the SIP status code. Range is from 1 to 127.


Defaults

The default mappings defined in the following table are used:

Table 27 Default SIP Events Mapped to PSTN Cause Codes 

SIP Event
PSTN Cause Code
Description

400 Bad request

127

Interworking, unspecified

401 Unauthorized

57

Bearer capability not authorized

402 Payment required

21

Call rejected

403 Forbidden

57

Bearer capability not authorized

404 Not found

1

Unallocated number

405 Method not allowed

127

Interworking, unspecified

406 Not acceptable

407 Proxy authentication required

21

Call rejected

408 Request timeout

102

Recover on Expires timeout

409 Conflict

41

Temporary failure

410 Gone

1

Unallocated number

411 Length required

127

Interworking, unspecified

413 Request entity too long

414 Request URI (URL) too long

415 Unsupported media type

79

Service or option not available

420 Bad extension

127

Interworking, unspecified

480 Temporarily unavailable

18

No user response

481 Call leg does not exist

127

Interworking, unspecified

482 Loop detected

483 Too many hops

484 Address incomplete

28

Address incomplete

485 Address ambiguous

1

Unallocated number

486 Busy here

17

User busy

487 Request canceled

127

Interworking, unspecified

488 Not acceptable here

127

Interworking, unspecified

500 Internal server error

41

Temporary failure

501 Not implemented

79

Service or option not implemented

502 Bad gateway

38

Network out of order

503 Service unavailable

63

Service or option unavailable

504 Gateway timeout

102

Recover on Expires timeout

505 Version not implemented

127

Interworking, unspecified

580 Precondition failed

47

Resource unavailable, unspecified

600 Busy everywhere

17

User busy

603 Decline

21

Call rejected

604 Does not exist anywhere

1

Unallocated number

606 Not acceptable

58

Bearer capability not currently available


Command Modes

SIP user-agent configuration

Command History

Release
Modification

12.2(2)XB

This command was introduced.

12.2(2)XB2

This command was implemented on the Cisco AS5850.

12.2(8)T

This command was integrated into Cisco IOS Release 12.2(8)T. Support for the Cisco AS5300, Cisco AS5350, Cisco AS5400, and Cisco AS5850 is not included in this release.


Usage Guidelines

A SIP status code can be mapped to many PSTN cause codes. For example, 503 can be mapped to 34, 38, and 58.

Examples

The following example maps a PSTN cause code to correspond to a SIP status code:

Router(config)# sip-ua
Router(config-sip-ua)# set sip-status 400 pstn-cause 16

Related Commands

Command
Description

set pstn-cause

Sets an incoming PSTN cause code to a SIP error status code.


settle-call

To force a call to be authorized with a settlement server that uses the address resolution method specified in the session target command, use the settle-call command in dial-peer configuration mode. To ensure that no authorization is performed by a settlement server, use the no form of this command.

settle-call provider-number

no settle-call provider-number

Syntax Description

provider-number

Digit defining the ID of a particular settlement server. The only valid entry is 0.

Note If session target type is settlement, the provider-number argument in the session target and settle-call commands should be identical.


Defaults

No default behavior or values.

Command Modes

Dial-peer configuration

Command History

Release
Modification

12.1(1)T

This command was introduced on the Cisco 2600 series, Cisco 3600 series, and Cisco AS5300.


Usage Guidelines

With the session target command, a dial peer can determine the address of the terminating gateway through the ipv4, dns, ras, and settlement keywords.

If the session target is not settlement, and the settle-call provider-number argument is set, the gateway resolves address of the terminating gateway using the specified method and then requests the settlement server to authorize that address and create a settlement token for that particular address. If the server cannot authorize the terminating gateway address suggested by the gateway, the call fails.

Do not combine the session target types ras and settle-call. Combination of session target types is not supported.

Examples

The following example sets a call to be authorized with a settlement server that uses the address resolution method specified in the session target:

dial-peer voice 10 voip
 destination-pattern 1408.......
 session target ipv4:172.22.95.14
 settle-call 0

Related Commands

Command
Description

session target

Specifies a network-specific address for a specified dial peer.


settlement

To enter settlement configuration mode and specify the attributes specific to a settlement provider, use the settlement command in global configuration mode. To disable the settlement provider, use the no form of this command.

settlement provider-number

no settlement provider-number

Syntax Description

provider-number

Digit that defines a particular settlement server. The only valid entry is 0.


Defaults

0

Command Modes

Global configuration

Command History

Release
Modification

12.0(4)XH1

This command was introduced on the Cisco 2600 series, Cisco 3600 series, and Cisco AS5300.

12.1(1)T

This command was integrated into Cisco IOS Release 12.1(1)T.


Usage Guidelines

The variable provider-number defines a particular settlement provider. For Cisco IOS Release 12.1, only one clearinghouse per system is allowed, and the only valid value for provider-number is 0.

Examples

This example enters settlement configuration mode:

settlement 0

Related Commands

Command
Description

connection-timeout

Configures the length of time for which a connection is maintained after a communication exchange is completed.

customer-id

Identifies a carrier or ISP with a settlement provider.

device-id

Specifies a gateway associated with a settlement provider.

encryption

Sets the encryption method to be negotiated with the provider.

max-connection

Sets the maximum number of simultaneous connections to be used for communication with a settlement provider.

response-timeout

Configures the maximum time to wait for a response from a server.

retry-delay

Sets the time between attempts to connect with the settlement provider.

retry-limit

Sets the connection retry limit.

session-timeout

Sets the interval for closing the connection when there is no input or output traffic.

show settlement

Displays the configuration for all settlement server transactions.

shutdown

Brings up the settlement provider.

type

Configures an SAA-RTR operation type.


settlement roam-pattern

To configure a pattern that must be matched to determine if a user is roaming, use the settlement roam-pattern command in global configuration mode. To delete a particular pattern, use the no form of this command.

settlement provider-number roam-pattern pattern {roaming | no roaming}

no settlement provider-number roam-pattern pattern {roaming | no roaming}

Syntax Description

provider-number

Digit defining the ID of particular settlement server. The only valid entry is 0.

pattern

User account pattern.

roaming | no roaming

Whether a user is roaming.


Defaults

No default pattern

Command Modes

Global configuration

Command History

Release
Modification

12.1(1)T

This command was introduced on the Cisco 2600 series, Cisco 3600 series, and Cisco AS5300.


Usage Guidelines

Multiple roam patterns can be entered on one gateway.

Examples

The following example configures a pattern that determines if a user is roaming:

settlement 0 roam-pattern 1222 roam
settlement 0 roam-pattern 1333 noroam
settlement roam-pattern 1444 roam
settlement roam-pattern 1555 noroam

Related Commands

Command
Description

roaming (settlement)

Enables the roaming capability for a settlement provider.

settlement

Enters settlement configuration mode.


sgcp

To start and allocate resources for the Simple Gateway Control Protocol (SGCP) daemon, use the sgcp command in global configuration mode. To terminate all calls, release all allocated resources, and kill the SGCP daemon, use the no form of this command.

sgcp

no sgcp

Syntax Description

This command has no arguments or keywords.

Defaults

The SGCP daemon is not enabled.

Command Modes

Global configuration

Command History

Release
Modification

12.0(5)T

This command was introduced in a private release on the Cisco AS5300 only and was not generally available.

12.0(7)XK

This command was implemented on the Cisco MC3810 and the Cisco 3600 series (except for the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and Cisco MC3810.


Usage Guidelines

When the SGCP daemon is not active, all SGCP messages are ignored.

When you enter the no sgcp command, the SGCP process is removed.


Note After you enter the no sgcp command, you must save the configuration and reboot the router for the disabling of SGCP to take effect.


Examples

The following example enables the SGCP daemon:

sgcp

The following example disables the SGCP daemon:

no sgcp

Related Commands

Command
Description

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.

sgcp timer

Configures how the gateway detects the RTP stream host.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp call-agent

To define the IP address of the default Simple Gateway Control Protocol (SGCP) call agent in the router configuration file, use the sgcp call-agent command in global configuration mode. To remove the IP address of the default SGCP call agent from the router configuration, use the no form of this command.

sgcp call-agent ipaddress [:udp port]

no sgcp call-agent ipaddress

Syntax Description

ipaddress

IP address or hostname of the call agent.

:udp port

(Optional) UDP port of the call agent.


Defaults

No IP address is configured.

Command Modes

Global configuration

Command History

Release
Modification

12.0(5)T

This command was introduced in a private release on the Cisco AS5300 only and was not generally available.

12.0(7)XK

This command was implemented on the Cisco MC3810 and the Cisco 3600 series (except for the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and Cisco MC3810.


Usage Guidelines

This command defines the IP address of the default SGCP call agent to which the router sends an initial RSIP (Restart In Progress) packet when the router boots up. This is used for initial bootup only before the SGCP call agent contacts the router acting as the gateway.

When you enter the no sgcp call-agent command, only the IP address of the default SGCP call agent is removed.

Examples

The following example enables SGCP and specifies the IP address of the call agent:

sgcp
sgcp call-agent 209.165.200.225

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.

sgcp timer

Configures how the gateway detects the RTP stream host.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp graceful-shutdown

To block all new calls and gracefully terminate all existing calls (wait for the caller to end the call), use the sgcp graceful-shutdown command in global configuration mode. To unblock all calls and allow new calls to go through, use the no form of this command.

sgcp graceful-shutdown

no sgcp graceful-shutdown

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.0(5)T

This command was introduced in a private release on the Cisco AS5300 and was not generally available.

12.0(7)XK

This command was implemented on the Cisco MC3810 and Cisco 3600 series (except for the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and Cisco MC3810.


Usage Guidelines

Once you issue this command, all requests for new connections (CreateConnection requests) are denied. All existing calls are maintained until users terminate them, or until you enter the no sgcp command. When the last active call is terminated, the SGCP daemon is terminated, and all resources allocated to it are released.

Examples

The following example blocks all new calls and terminates existing calls:

sgcp graceful-shutdown

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.

sgcp timer

Configures how the gateway detects the RTP stream host.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp max-waiting-delay

To set the Simple Gateway Control Protocol (SGCP) maximum waiting delay to prevent restart avalanches, use the sgcp max-waiting-delay command in global configuration mode. To reset to the default, use the no form of this command.

sgcp max-waiting-delay delay

no sgcp max-waiting-delay delay

Syntax Description

delay

Maximum waiting delay (MWD), in milliseconds. Range is from 0 to 600000. Default is 3000.


Defaults

3,000 ms

Command Modes

Global configuration

Command History

Release
Modification

12.0(5)T

This command was introduced in a private release on the Cisco AS5300, and was not generally available.

12.0(7)XK

This command was implemented on the Cisco MC3810 and the Cisco 3600 series (except for the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and the Cisco MC3810.


Examples

The following example sets the maximum wait delay value to 40 ms:

sgcp max-waiting-delay 40

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.

sgcp timer

Configures how the gateway detects the RTP stream host.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp modem passthru

To enable Simple Gateway Control Protocol (SGCP) modem or fax pass-through, use the sgcp modem passthru command in global configuration mode. To disable SGCP modem or fax pass-through, use the no form of this command.

sgcp modem passthru {ca | cisco | nse}

no sgcp modem passthru {ca | cisco | nse}

Syntax Description

ca

Call-agent-controlled modem upspeed-method violation message.

cisco

Cisco-proprietary upspeed method based on the protocol.

nse

NSE-based modem upspeed method.


Defaults

SGCP modem or fax pass-through is disabled by default.

Command Modes

Global configuration.

Command History

Release
Modification

12.0(7)XK

This command was introduced on the Cisco MC3810 and the Cisco 3600 series (except the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and the Cisco MC3810.


Usage Guidelines

You can use this command for fax pass-through because the answer tone can come from either modem or fax transmissions. The upspeed method is the method used to dynamically change the codec type and speed to meet network conditions.

If you use the nse option, you must also configure the sgcp tse payload command.

Examples

The following example configures SGCP modem pass-through using the call-agent upspeed method:

sgcp modem passthru ca

The following example configures SGCP modem pass-through using the proprietary Cisco upspeed method:

sgcp modem passthru cisco

The following example configures SGCP modem pass-through using the NSE-based modem upspeed:

sgcp modem passthru nse
sgcp tse payload 110

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.

sgcp timer

Configures how the gateway detects the RTP stream host.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp quarantine-buffer disable

To disable the Simple Gateway Control Protocol (SGCP) quarantine buffer, use the sgcp quarantine-buffer disable command in global configuration mode. To reenable the SGCP quarantine buffer, use the no form of this command.

sgcp quarantine-buffer disable

no sgcp quarantine-buffer disable

Syntax Description

This command has no arguments or keywords.

Defaults

The SGCP quarantine buffer is enabled.

Command Modes

Global configuration

Command History

Release
Modification

12.0(7)XK

This command was introduced on the Cisco MC3810 and the Cisco 3600 series (except for the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was on the Cisco 3600 series and the Cisco MC3810.


Usage Guidelines

The SGCP quarantine buffer is the mechanism for buffering the SGCP events between two notification-request (RQNT) messages.

Examples

The following example disables the SGCP quarantine buffer:

sgcp quarantine-buffer disable

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.

sgcp timer

Configures how the gateway detects the RTP stream host.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp request retries

To specify the number of times to retry sending notify and delete messages to the Simple Gateway Control Protocol (SGCP) call agent, use the sgcp request retries command in global configuration mode. To reset to the default, use the no form of this command.

sgcp request retries count

no sgcp request retries

Syntax Description

count

Number of times that a notify and delete message is retransmitted to the SGCP call agent before it is dropped. Range is from 1 to 100. Default is 3.


Defaults

3 times

Command Modes

Global configuration

Command History

Release
Modification

12.0(5)T

This command was introduced in a private release on the Cisco AS5300 and was not generally available.

12.0(7)XK

This command was implemented on the Cisco MC3810 and the Cisco 3600 series (except for the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and the Cisco MC3810.


Usage Guidelines

The actual retry count may be different from the value you enter for this command. The retry count is also limited by the call agent. If there is no response from the call agent after 30 seconds, the gateway does not retry anymore, even though the number set using the sgcp request retries command has not been reached.

The router stops sending retries after 30 seconds, regardless of the setting for this command.

Examples

The following example configures the system to send the sgcp command 10 times before dropping the request:

sgcp request retries 10

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.

sgcp timer

Configures how the gateway detects the RTP stream host.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp request timeout

To specify how long the system should wait for a response to a request, use the sgcp request timeout command in global configuration mode. To reset to the default, use the no form of this command.

sgcp request timeout timeout

no sgcp request timeout

Syntax Description

timeout

Time to wait for a response to a request, in milliseconds. Range is from 1 to 10000. Default is 500.


Defaults

500 ms

Command Modes

Global configuration

Command History

Release
Modification

12.0(5)T

This command was introduced in a private release on the Cisco AS5300 and was not generally available.

12.0(7)XK

This command was implemented on the Cisco MC3810 and the Cisco 3600 series (except for the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and the Cisco MC3810.


Usage Guidelines

This command is used for "notify" and "delete" messages, which are sent to the SGCP call agent.

Examples

The following example configures the system to wait 40 ms for a reply to a request:

sgcp request timeout 40

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.

sgcp timer

Configures how the gateway detects the RTP stream host.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp restart

To trigger the router to send a Restart in Progress (RSIP) message to the Simple Gateway Control Protocol (SGCP) call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller, use the sgcp restart command in global configuration mode. To reset to the default, use the no form of this command.

sgcp restart {delay delay | notify}

no sgcp restart {delay delay | notify}

Syntax Description

delay delay

Restart delay, in milliseconds. Range is from 0 to 600. Default is 0.

notify

Restarts notification upon the SGCP/digital interface state transition.


Defaults

0 ms

Command Modes

Global configuration

Command History

Release
Modification

12.0(7)XK

This command was introduced on the Cisco MC3810 and the Cisco 3600 series (except the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and the Cisco MC3810.


Usage Guidelines

Use this command to send RSIP messages from the router to the SGCP call agent. RSIP messages are used to synchronize the router and the call agent. RSIP messages are also sent when the sgcp command is entered to enable the SGCP daemon.

You must enter the notify option to enable RSIP messages to be sent.

Examples

The following example configures the system to wait 40 ms before restarting SGCP:

sgcp restart delay 40

The following example configures the system to send an RSIP notification to the SGCP call agent when the T1 controller state changes:

sgcp restart notify

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.

sgcp timer

Configures how the gateway detects the RTP stream host.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp retransmit timer

To configure the Simple Gateway Control Protocol (SGCP) retransmission timer to use a random algorithm, use the sgcp retransmit timer command in global configuration mode. To reset to the default, use the no form of this command.

sgcp retransmit timer {random}

no sgcp retransmit timer {random}

Syntax Description

random

SGCP retransmission timer uses a random algorithm.


Defaults

The SGCP retransmission timer does not use a random algorithm.

Command Modes

Global configuration

Command History

Release
Modification

12.0(7)XK

This command was introduced on the Cisco 3600 series and the Cisco MC3810 in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and the Cisco MC3810.


Usage Guidelines

Use this command to enable the random algorithm component of the retransmission timer. For example, if the retransmission timer is set to 200 ms, the first retransmission timer is 200 ms, but the second retransmission timer picks up a timer value randomly between either 200 or 400. The third retransmission timer picks up a timer value randomly of 200, 400, or 800 as shown below:

First retransmission timer: 200

Second retransmission timer: 200 or 400

Third retransmission timer: 200, 400, or 800

Fourth retransmission timer: 200, 400, 800, or 1600

Fifth retransmission timer: 200, 400, 800, 1600, or 3200 and so on.

After 30 seconds, the retransmission timer no longer retries.

Examples

The following example sets the retransmission timer to use a random algorithm:

sgcp retransmit timer random

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp timer

Configures how the gateway detects the RTP stream host.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp timer

To configure how the gateway detects the Real-Time Transport Protocol (RTP) stream lost, use the sgcp timer command in global configuration mode. To reset to the default, use the no form of this command.

sgcp timer {receive-rtcp timer | rtp-nse timer}

no sgcp timer {receive-rtcp timer | rtp-nse timer}

Syntax Description

receive-rtcp timer

RTP Control Protocol (RTCP) transmission interval, in milliseconds. Range is from 1 to 100. Default is 5.

rtp-nse timer

RTP named signaling event (NSE) timeout, in milliseconds. Range is from 100 to 3000. Default is 200.


Defaults

receive-rtcp: 5 ms

rtp-nse: 200 ms

Command Modes

Global configuration

Command History

Release
Modification

12.0(5)T

This command was introduced in a private release on the Cisco AS5300 and was not generally available.

12.0(7)XK

This command was implemented on the Cisco MC3810 and the Cisco 3600 series (except for the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and the Cisco MC3810.


Usage Guidelines

The RTP NSE timer is used for proxy ringing (the ringback tone is provided at the originating gateway).

Examples

The following example sets the RTPCP transmission interval to 100 ms:

sgcp timer receive-rtcp 100

The following example sets the NSE timeout to 1000 ms:

sgcp timer rtp-nse 1000

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.

sgcp tse payload

Enables Inband TSE for fax/modem operation.


sgcp tse payload

To enable Inband Telephony Signaling Events (TSE) for fax and modem operation, use the sgcp tse payload command in global configuration mode. To reset to the default, use the no form of this command.

sgcp tse payload type

no sgcp tse payload type

Syntax Description

type

TSE payload type. Range is from 96 to 119. Default is 0, meaning that the command is disabled.


Defaults

0 (disabled)

Command Modes

Global configuration

Command History

Release
Modification

12.0(7)XK

This command was introduced on the Cisco MC3810 and the Cisco 3600 series (except the Cisco 3620) in a private release that was not generally available.

12.1(2)T

This command was implemented on the Cisco 3600 series and the Cisco MC3810.


Usage Guidelines

Because this command is disabled by default, you must specify a TSE payload type.

If you set the sgcp modem passthru command to the nse value, then you must configure this command.

Examples

The following example sets Simple Gateway Control Protocol (SGCP) modem pass-through using the NSE-based modem upspeed and the Inband Telephony Signaling Events payload value set to 110:

sgcp modem passthru nse
sgcp tse payload 110

Related Commands

Command
Description

sgcp

Starts and allocates resources for the SGCP daemon.

sgcp call-agent

Defines the IP address of the default SGCP call agent.

sgcp graceful-shutdown

Gracefully terminates all SGCP activity.

sgcp max-waiting-delay

Sets the SGCP maximum waiting delay to prevent restart avalanches.

sgcp modem passthru

Enables SGCP modem or fax pass-through.

sgcp quarantine-buffer disable

Disables the SGCP quarantine buffer.

sgcp request retries

Specifies the number of times to retry sending "notify" and "delete" messages to the SGCP call agent.

sgcp request timeout

Specifies how long the system should wait for a response to a request.

sgcp restart

Triggers the router to send an RSIP message to the SGCP call agent indicating that the T1 controller is up or down so that the call agent can synchronize with the T1 controller.

sgcp retransmit timer

Configures the SGCP retransmission timer to use a random algorithm method.up or down so that the call agent can synchronize

sgcp timer

Configures how the gateway detects the RTP stream host.