User`s manual
Table Of Contents
- Mediant 2000 & TP-1610 & TP-260/UNI SIP User’s Manual Version 5.0
- Table of Contents
- List of Figures
- List of Tables
- Notices
- 1. Overview
- 2. Physical Description
- 3. Installation
- 4. Getting Started
- 5. Web Management
- Computer Requirements
- Protection and Security Mechanisms
- Accessing the Embedded Web Server
- Getting Acquainted with the Web Interface
- Protocol Management
- Advanced Configuration
- Status & Diagnostic
- Software Update Menu
- Maintenance
- Logging Off the Embedded Web Server
- 6. Gateway's ini File Configuration
- Secured ini File
- Modifying an ini File
- The ini File Content
- The ini File Structure
- The ini File Example
- Networking Parameters
- System Parameters
- Web and Telnet Parameters
- Security Parameters
- RADIUS Parameters
- SNMP Parameters
- SIP Configuration Parameters
- Voice Mail Parameters
- ISDN and CAS Interworking-Related Parameters
- Number Manipulation and Routing Parameters
- E1/T1 Configuration Parameters
- Channel Parameters
- Configuration Files Parameters
- 7. Using BootP / DHCP
- 8. Telephony Capabilities
- Working with Supplementary Services
- Configuring the DTMF Transport Types
- Fax & Modem Transport Modes
- Event Notification using X-Detect Header
- ThroughPacket™
- Dynamic Jitter Buffer Operation
- Configuring the Gateway’s Alternative Routing (based on Conn
- Call Detail Report
- Supported RADIUS Attributes
- Trunk to Trunk Routing Example
- Proxy or Registrar Registration Example
- SIP Call Flow Example
- SIP Authentication Example
- 9. Networking Capabilities
- 10. Advanced PSTN Configuration
- 11. Advanced System Capabilities
- 12. Special Applications
- 13. Security
- 14. Diagnostics
- 15. SNMP-Based Management
- SNMP Standards and Objects
- Carrier Grade Alarm System
- Cold Start Trap
- Third-Party Performance Monitoring Measurements
- TrunkPack-VoP Series Supported MIBs
- Traps
- SNMP Interface Details
- SNMP Manager Backward Compatibility
- Dual Module Interface
- SNMP NAT Traversal
- SNMP Administrative State Control
- AudioCodes’ Element Management System
- 16. Configuration Files
- Appendix A. Selected Technical Specifications
- Appendix B. Supplied SIP Software Kit
- Appendix C. SIP Compliance Tables
- Appendix D. The BootP/TFTP Configuration Utility
- Appendix E. RTP/RTCP Payload Types and Port Allocation
- Appendix F. RTP Control Protocol Extended Reports (RTCP-XR)
- Appendix G. Accessory Programs and Tools
- Appendix H. Release Reason Mapping
- Appendix I. SNMP Traps
- Appendix J. Installation and Configuration of Apache HTTP Server
- Appendix K. Regulatory Information

SIP User's Manual 15. SNMP-Based Management
Version 5.0 315 October 2006
Table 15-1: Proprietary Traps Description (continues on pages 314 to 315)
Trap Description
acEnhancedBITStatus This trap is used to indicate the status of the Built In Test
(BIT). The information in the trap contains board hardware
elements being tested and their status. The information is
presented in the additional info fields.
acBoardEthernetLinkAlarm Sent when an Ethernet link(s) is down.
acPerformanceMonitoringThresholdC
rossing
Sent every time the threshold of a Performance Monitored
object is crossed. The severity field is 'indeterminate'
when the crossing is above the threshold, and 'cleared'
when it goes back under the threshold. The 'source'
varbind in the trap indicates the object for which the
threshold is being crossed.
acHTTPDownloadResult Sent at the success or failure of HTTP download.
acDChannelStatus Non-alarm trap sent at the establishment, re-
establishment, or release of LAPD link with its peer
connection. The trap is sent with one of the following
textual descriptions:
D-channel synchronized
D-channel not-synchronized
In addition to the listed traps, the device also supports the following standard traps:
dsx1LineStatusChange
dsx3LineStatusChange
coldStart
authenticationFailure
15.7 SNMP Interface Details
This section describes details of the SNMP interface that is required when developing an
Element Manager (EM) for any of the TrunkPack-VoP Series products, or to manage a
device with a MIB browser.
The gateway offers the following SNMP security features:
SNMPv2c community strings
SNMPv3 User-based Security Model (USM) users
SNMP encoded over IPSec (refer to Section 13.1 on page 281)
Combinations of the above
Currently, both SNMP and ini file commands and downloads are not encrypted. For ini file
encoding, refer to Section
6.1 on page 127.