User`s manual
Table Of Contents
- Mediant 2000 & TP-1610 & TP-260/UNI SIP User’s Manual Version 5.0
- Table of Contents
- List of Figures
- List of Tables
- Notices
- 1. Overview
- 2. Physical Description
- 3. Installation
- 4. Getting Started
- 5. Web Management
- Computer Requirements
- Protection and Security Mechanisms
- Accessing the Embedded Web Server
- Getting Acquainted with the Web Interface
- Protocol Management
- Advanced Configuration
- Status & Diagnostic
- Software Update Menu
- Maintenance
- Logging Off the Embedded Web Server
- 6. Gateway's ini File Configuration
- Secured ini File
- Modifying an ini File
- The ini File Content
- The ini File Structure
- The ini File Example
- Networking Parameters
- System Parameters
- Web and Telnet Parameters
- Security Parameters
- RADIUS Parameters
- SNMP Parameters
- SIP Configuration Parameters
- Voice Mail Parameters
- ISDN and CAS Interworking-Related Parameters
- Number Manipulation and Routing Parameters
- E1/T1 Configuration Parameters
- Channel Parameters
- Configuration Files Parameters
- 7. Using BootP / DHCP
- 8. Telephony Capabilities
- Working with Supplementary Services
- Configuring the DTMF Transport Types
- Fax & Modem Transport Modes
- Event Notification using X-Detect Header
- ThroughPacket™
- Dynamic Jitter Buffer Operation
- Configuring the Gateway’s Alternative Routing (based on Conn
- Call Detail Report
- Supported RADIUS Attributes
- Trunk to Trunk Routing Example
- Proxy or Registrar Registration Example
- SIP Call Flow Example
- SIP Authentication Example
- 9. Networking Capabilities
- 10. Advanced PSTN Configuration
- 11. Advanced System Capabilities
- 12. Special Applications
- 13. Security
- 14. Diagnostics
- 15. SNMP-Based Management
- SNMP Standards and Objects
- Carrier Grade Alarm System
- Cold Start Trap
- Third-Party Performance Monitoring Measurements
- TrunkPack-VoP Series Supported MIBs
- Traps
- SNMP Interface Details
- SNMP Manager Backward Compatibility
- Dual Module Interface
- SNMP NAT Traversal
- SNMP Administrative State Control
- AudioCodes’ Element Management System
- 16. Configuration Files
- Appendix A. Selected Technical Specifications
- Appendix B. Supplied SIP Software Kit
- Appendix C. SIP Compliance Tables
- Appendix D. The BootP/TFTP Configuration Utility
- Appendix E. RTP/RTCP Payload Types and Port Allocation
- Appendix F. RTP Control Protocol Extended Reports (RTCP-XR)
- Appendix G. Accessory Programs and Tools
- Appendix H. Release Reason Mapping
- Appendix I. SNMP Traps
- Appendix J. Installation and Configuration of Apache HTTP Server
- Appendix K. Regulatory Information

SIP User's Manual 5. Web Management
Version 5.0 65 October 2006
Possible uses for number manipulation can be as follows:
To strip/add dialing plan digits from/to the number. For example, a user could dial 9 in
front of each number to indicate an external line. This number (9) can be removed
here before (after) the call is setup.
Assignment of NPI/TON to IPÆTel calls. The VoIP gateway can use a single global
setting for NPI/TON classification or it can use the setting in this table on a call by call
basis. Control for this is done using Protocol Management > Protocol Definition >
Destination/Source Number Encoding Type.
Allow / disallow Caller ID information to be sent according to destination / source
prefixes.
¾ To configure the Number Manipulation tables, take these 5 steps:
1. Open the Number Manipulation screen you want to configure (Protocol Management
menu > Manipulation Tables submenu); the relevant Manipulation table screen is
displayed. Figure 5-6 shows the ‘Source Phone Number Manipulation Table for
TelÆIP calls’.
Figure 5-6: Source Phone Number Manipulation Table for TelÆIP Calls
2. In the ‘Table Index’ drop-down list, select the range of entries that you want to edit (up
to 20 entries can be configured for Source Number Manipulation and 50 entries for
Destination Number Manipulation).
3. Configure the Number Manipulation table according to Table 5-3.
4. Click the Submit button to save your changes.
5. To save the changes so they are available after a power fail, refer to Section 5.9.2 on
page 124.
Table 5-3: Number Manipulation Parameters (continues on pages 65 to 66)
Parameter Description
Destination Prefix Each entry in the Destination Prefix fields represents a destination telephone
number prefix. An asterisk (*) represents any number.
Source Prefix Each entry in the Source Prefix fields represents a source telephone number
prefix. An asterisk (*) represents any number.
Source IP Each entry in the Source IP fields represents the source IP address of the call
(obtained from the Contact header in the INVITE message).
This column only applies to the ‘Destination Phone Number Manipulation Table
for IP to Tel’.
Note: The source IP address can include the ‘x’ wildcard to represent single
digits. For example: 10.8.8.xx represents all the addresses between 10.8.8.10 to
10.8.8.99. The ‘*’ wildcard represents any number between 0 and 255, e.g.,
10.8.8.* represents all addresses between 10.8.8.0 and 10.8.8.255.