User`s manual

Table Of Contents
SIP User's Manual Contents
Version 5.0 7 October 2006
12 Special Applications .......................................................................................267
12.1 TDM Tunneling.....................................................................................................267
12.1.1 Implementation ..................................................................................................... 267
12.2 SS7 Tunneling......................................................................................................269
12.2.1 MTP2 Tunneling Technology................................................................................ 270
12.2.2 SS7 Characteristics .............................................................................................. 270
12.2.3 SS7 Parameters ................................................................................................... 271
12.2.4 SS7 Parameter Tables ......................................................................................... 272
12.2.5 SS7 MTP2 Tunneling ini File Example................................................................. 276
12.3 QSIG Tunneling ...................................................................................................280
12.3.1 Implementation ..................................................................................................... 280
13 Security............................................................................................................281
13.1 IPSec and IKE......................................................................................................281
13.1.1 IKE ........................................................................................................................ 282
13.1.2 IPSec .................................................................................................................... 282
13.1.3 Configuring the IPSec and IKE............................................................................. 283
13.2 SSL/TLS...............................................................................................................290
13.2.1 SIP Over TLS (SIPS)............................................................................................ 290
13.2.2 Embedded Web Server Configuration.................................................................. 290
13.2.3 Secured Telnet ..................................................................................................... 291
13.2.4 Server Certificate Replacement............................................................................ 291
13.2.5 Client Certificates.................................................................................................. 293
13.3 SRTP....................................................................................................................294
13.4 RADIUS Login Authentication..............................................................................295
13.4.1 Setting Up a RADIUS Server................................................................................ 295
13.4.2 Configuring RADIUS Support ............................................................................... 296
13.5 Internal Firewall....................................................................................................298
13.6 Network Port Usage.............................................................................................300
13.7 Recommended Practices.....................................................................................301
13.8 Legal Notice .........................................................................................................301
14 Diagnostics......................................................................................................303
14.1 Self-Testing..........................................................................................................303
14.2 Syslog Support.....................................................................................................304
14.2.1 Syslog Servers...................................................................................................... 304
14.2.2 Operation .............................................................................................................. 305
15 SNMP-Based Management.............................................................................307
15.1 SNMP Standards and Objects .............................................................................307
15.1.1 SNMP Message Standard .................................................................................... 307
15.1.2 SNMP MIB Objects............................................................................................... 308
15.1.3 SNMP Extensibility Feature.................................................................................. 308
15.2 Carrier Grade Alarm System................................................................................309
15.2.1 Active Alarm Table................................................................................................ 309
15.2.2 Alarm History ........................................................................................................ 309
15.3 Cold Start Trap.....................................................................................................310
15.4 Third-Party Performance Monitoring Measurements ...........................................310
15.4.1 Total Counters ...................................................................................................... 311
15.5 TrunkPack-VoP Series Supported MIBs..............................................................311
15.6 Traps....................................................................................................................314