Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note Cisco IOS Release 12.2(13)T Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
C O N T E N T S Preface ix Audience ix Organization ix Conventions x Safety Overview xi Related Documentation xii Obtaining Documentation xiii World Wide Web xiii Documentation CD-ROM xiii Ordering Documentation xiii Documentation Feedback xiv Obtaining Technical Assistance xiv Cisco.
Contents EFT DRAFT - CISCO CONFIDENTIAL Advanced Voice Services 1-8 Routing Services 1-8 Security 1-9 QoS 1-9 Resiliency 1-9 Network Management Support CHAPTER 2 1-10 Installing the Access Gateway Module 2-1 Preparing to Install the AGM 2-1 Preventing Electrostatic Discharge Damage 2-2 Removing Catalyst 4000 Switching Modules (optional) Installing the AGM 2-3 Hot-Swapping Features Checking the AGM Operation 2-2 2-5 2-6 Installing Voice and WAN Interface Modules 2-6 Connecting the Voice and WAN
Contents EFT DRAFT - CISCO CONFIDENTIAL Configuring the Console Port 3-3 Connecting a Terminal 3-4 Connecting a Modem 3-4 Configuring the Management Port 3-4 Understanding the Interface Numbering 3-5 Using the Cisco IOS CLI 3-5 Getting Help 3-6 Command Modes 3-6 Disabling a Command or Feature 3-7 Saving Configuration Changes 3-8 Interface Configuration Examples CHAPTER 4 3-8 Configuring the Data Interfaces 4-1 About Configuring Data Interfaces 4-1 Configuring the Host Name and Password Configurin
Contents EFT DRAFT - CISCO CONFIDENTIAL Configuring T1-CAS Analog Emulation (H.323) 5-14 Managing Input Gain for Cisco IP Voice Applications FXS Emulation Example 5-16 FXO Emulation Example 5-16 E&M Emulation Example 5-17 5-15 ISDN BRI Configuration (H.
Contents EFT DRAFT - CISCO CONFIDENTIAL CHAPTER 7 Configuring Encryption Services 7-1 About the Encryption Service Adapter 7-1 Configuring the Encryption Service Adapter 7-1 Configure the T1 Channel Group 7-2 Configure the Internet Key Exchange Security Protocol 7-3 Configuring IPSec Network Security 7-3 Configure Encryption on the T1 Channel Group Serial Interface Verifying the Configuration 7-6 Sample Configurations 7-7 Encrypting Traffic Between Two Networks 7-7 Configuration File for the Public
Contents EFT DRAFT - CISCO CONFIDENTIAL APPENDIX A Identifying Hardware Problems with the ROM Monitor Entering ROM Monitor Mode Configuring for Autoboot A-1 A-1 A-2 ROM Monitor Commands A-3 ROM Monitor Syntax Conventions A-3 Command Descriptions A-3 General Use Commands A-3 Debugging Commands A-6 Cookie Commands A-7 Configuration Register Command A-10 Modifying the Configuration Register from the Operating System Software Boot and System Image Recovery Commands A-11 A-11 Upgrading the ROM Monitor A
Preface This preface describes who should read the Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note, how it is organized and its document conventions, where to find Cisco Catalyst 4000 Access Gateway Module (AGM) related information, and how to obtain technical assistance. Audience This publication is intended for experienced network administrators who are responsible for installing the AGM.
Conventions Conventions Chapter Title Description (continued) Appendix B Using Loss Plan Defaults Describes how to use the defaults. Appendix C Connector and Cable Specifications Describes the ports, cables and adapters that you use to connect the switch to other devices. Conventions This publication uses the following conventions: Convention Description boldface font Commands and keywords are in boldface. italic font Command arguments for which you supply values are in italic.
Safety Overview Safety Overview Notes use the following conventions: Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication. Cautions use the following conventions: Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. Safety Overview Safety warnings appear throughout this publication in procedures that, if performed incorrectly, can harm you.
Related Documentation Related Documentation Warnung Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu einer Körperverletzung führen könnte. Bevor Sie mit der Arbeit an irgendeinem Gerät beginnen, seien Sie sich der mit elektrischen Stromkreisen verbundenen Gefahren und der Standardpraktiken zur Vermeidung von Unfällen bewußt.
Obtaining Documentation Obtaining Documentation • Catalyst 3620 Installation and Configuration Guide • Catalyst 3200 Installation and Configuration Guide • Quick Start Guide Cisco 2600 Series Cabling and Setup • Cisco 2600 Series Power Supply Configuration Guide • Quick Software Configuration—Catalyst 4000 Family, Catalyst 29266 Series, Catalyst 29486, and Catalyst 2908G Switches • System Message Guide—Catalyst 4000 Family, Catalyst 2948G, and Catalyst 2980G Switches • Command Reference—Cataly
Documentation Feedback Obtaining Technical Assistance • Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription Store: http://www.cisco.com/go/subscription • Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco corporate headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387). Documentation Feedback If you are reading Cisco product documentation on Cisco.
Technical Assistance Center Obtaining Technical Assistance Technical Assistance Center The Cisco TAC is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two types of support are available through the Cisco TAC: the Cisco TAC Web Site and the Cisco TAC Escalation Center.
Technical Assistance Center Obtaining Technical Assistance • Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled; for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). In addition, please have available your service agreement number and your product serial number.
C H A P T E R 1 Overview This chapter provides an overview of the Cisco Catalyst 4000 Access Gateway Module (AGM) and describes its applications, features, and supported modules.
Chapter 1 Overview AGM Features IP Telephony Campus The Catalyst 4000 family switches support inline power for IP telephones that are usually deployed in wiring or distribution closets at a campus. These switches can be equipped with the AGM to support the IP telephony campus application. Figure 1-1 Shows the AGM deployed in an IP telephony campus application.
Chapter 1 Overview AGM Features Figure 1-2 Shows the AGM deployed in a large branch office application with up to 192 users. Figure 1-2 Large Branch Office Application of a Catalyst 4000 Family Switch with an AGM Fax Catalyst 4000/4500 Series with AGM V PSTN T1/E1/PRI/BRI/FXO 85428 IP WAN Catalyst 4000 Switch Integration The AGM is a physically integrated but functionally independent Cisco IOS router inside the switch. It is connected to the switch by a Gigabit Ethernet 802.
Chapter 1 Overview Hardware Features Figure 1-3 shows the front-panel of the AGM. You can see the console port on the lower left and the Fast Ethernet port immediately to the right of the console port.
Chapter 1 Overview Hardware Features Cisco Catalyst 4000 DSP Set The Cisco Catalyst 4000 DSP set for the AGM includes 4 SIMMs with 6 DSPs each for telephony services. The DSPs are required for analog or digital voice gateway support as well as for advanced voice services such as conferencing or transcoding. For information on the voice services enabled by the DSPs, see Voice Gateway Features and Advanced Voice Services in the Software Features section.
Chapter 1 Overview Hardware Features Table 1-1 Data Interface Modules Module Description WIC-2A/S Dual asynchronous or synchronous serial ports WIC-2T Two-port serial WAN interface module Note WIC-1T is not supported WIC-1DSU-T1 One-port T1/ fractional T1 with CSU/DSU WIC-1DSU-56K4 One-port four-wire 56 or 64 kbps CSU/DSU VWIC-1MFT-T1 One-port T1/ fractional T1 multiflex trunk with CSU/DSU VWIC-2MFT-T1 Two-port T1/ fractional T1 multiflex trunk with CSU/DSU VWIC-2MFT-T1- DI Dual-port T
Chapter 1 Overview Hardware Features Table 1-2 Voice Interface Modules Module Description VIC-2FXS Two-port FXS voice/fax interface module VIC-2FXO Two-port FXO voice/fax interface module (North American version) VIC-2FXO-EU Two-port FXO voice/fax interface module (European version) VIC-2BRI-S/T-TE Two-port BRI S/T terminal equipment voice/fax interface module (also supports data) VWIC-1MFT-T1 One-port T1/fractional T1 multiflex trunk with CSU/DSU VWIC-2MFT-T1 Dual-port T1/fractional T1 mul
Chapter 1 Overview Software Features Software Features This section describes the AGM software features. Telephony Call Control The AGM supports several options for telephony call control: • Cisco Call Manager (CCM) can be used for centralized call control for numerous VoIP gateways, including the AGM, at campus and branch sites. The AGM supports both MGCP and H.323v2 interfaces to the CCM. • SRST is an IOS-based backup for the CCM that resides on the AGM itself.
Chapter 1 Overview Software Features • NAT • WCCP v2 • 10 kpps 802.1q inter-VLAN routing The link to Feature Navigator is: http://www.cisco.com/cgi-bin/Support/FeatureNav/FN.pl Security The AGM provides the same security to voice and video networks that is available for data networks. The AGM supports the optional Cisco IOS Software Firewall Feature Set, Cisco IOS Intrusion Detection Service (IDS), IP Security (IPsec) with data encryption standard (DES), and Triple DES (3DES).
Chapter 1 Overview Software Features Network Management Support The AGM supports the following tools for network management: • Simple Network Management Protocol (SNMP) • CiscoWorks • Cisco Voice Manager (CVM) • Cisco CallManager Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note 1-10 OL-3008-01
C H A P T E R 2 Installing the Access Gateway Module This chapter describes how to install the Cisco Catalyst 4000 Access Gateway Module (AGM) in a Catalyst 4000 family switch chassis.
Chapter 2 Installing the Access Gateway Module Removing Catalyst 4000 Switching Modules (optional) Caution Before you handle switching modules, read the “Preventing Electrostatic Discharge Damage” section on page 2-2. You also need an appropriate connecting cable to install and connect your interface module(s). The cable type required for each module is described in the section for that module.
Chapter 2 Installing the Access Gateway Module Installing the AGM To install the AGM, you might need to remove a switching module from a Catalyst 4000 family switch. If so, perform these steps: Step 1 Disconnect any network interface cables attached to the ports on the switching module that you intend to remove. Step 2 Loosen the captive installation screws, as shown in Figure 2-1. This figure displays the AGM, but the instructions apply to all the switch modules.
Chapter 2 Installing the Access Gateway Module Installing the AGM Caution To prevent ESD damage, handle the AGM by the carrier edges only. Moreover, you should use a wrist strap or other grounding device to prevent ESD damage. To install the AGM, perform these steps: Step 1 Note Choose a slot for the new AGM. The AGM can be inserted into slots 2 or 3 in the Catalyst 4003 switch and slots 2 through 6 in the Catalyst 4006 switch.
Chapter 2 Installing the Access Gateway Module Installing the AGM Figure 2-2 Installing the AGM in the Chassis Power Supply 1 73352 CAUTION Power Supply 2 THIS ASSEMBLY CONTAINS ELECTROSTATICSENSITIVE DEVICES 0% 100% WS-X4204 WIC 2A.
Chapter 2 Installing the Access Gateway Module Checking the AGM Operation The system runs diagnostic tests on any new interfaces. Caution • If the test passes, the system is operating normally. If the new AGM is faulty, the system resumes normal operation but places the new module in the “faulty” state. • If the test fails, the system crashes, which usually indicates that the new AGM has a problem and should be removed.
Chapter 2 Installing the Access Gateway Module Installing Voice and WAN Interface Modules Note Caution VICs, WICs, and VWICs do not support online insertion and removal (hot swapping). Before inserting a VIC, WIC, or VWIC into the AGM, you must turn off the electrical power by either powering off the switch or unplugging the AGM from the chassis and disconnecting the network cables. Warning Do not work on the system or connect or disconnect cables during periods of lightning activity.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Note To channel ESD voltages to ground, do not unplug the power cable. Step 3 Use either a number 2 Phillips screwdriver or a small flat-blade screwdriver to loosen the screws of the blank faceplate and remove the faceplate from the interface slot where you plan to install the module. Save the faceplate for future use.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules • Voice Interface Modules, page 2-14 • T1/E1 Multiflex Voice/WAN Interface Modules, page 2-22 WAN Interface Modules This section describes the procedures for connecting the following WAN interface modules: • Connecting the 1-Port 56/64-kbps DSU/CSU Modules, page 2-9 • Connecting the 1-Port T1/FT1 DSU/CSU Modules, page 2-10 • Connecting the 2-Port Asynchronous/Synchronous Serial Modules, page 2-11 • Con
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Table 2-1 describes the 56/64-kbps WAN interface module LEDs. Table 2-1 56/64-kbps WAN Interface Module LEDs LED Description TD Green indicates that data is being transmitted to the DTE interface. RD Green indicates that data is being received from the DTE interface. LP Yellow indicates that the internal DSU/CSU is in loopback mode. This LED is off during normal operation.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Step 5 Verify that the CD LED is green, indicating that the internal DSU/CSU in the module is communicating with another DSU/CSU. Table 2-2 describes the T1/FT1 WAN interface module LEDs. Table 2-2 T1/FT1 WAN Interface Module LEDs LED Description LP Yellow indicates that the internal DSU/CSU is in loopback mode. This LED is off during normal operation.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules • Synchronous modem • DSU/CSU • Other DCE, if connecting to a digital WAN line To connect the 2-port A/S serial module, perform these steps: Step 1 Power off the AGM. Step 2 Connect one end of the appropriate serial cable to a DB-60 port on the module, as shown in Figure 2-6. Step 3 Connect the other end of the cable to the appropriate type of equipment, as shown in Figure 2-6.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules The 2-port A/S serial module has “smart” serial ports. The serial cable attached to one of the module’s ports can determine the electrical interface type and mode (DTE or DCE).
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Figure 2-7 Connecting a 1- Port Serial Module (WIC-1T) Synchronous serial port (DB-60) CONN LED CONN SERIAL Serial transition cable EIA/TIA-232, EIA/TIA-449, V.35, X.21, or EIA-530 connector 58519 DSU/CSU or other DCE Step 4 Power on the AGM. Step 5 Verify that the CONN LED goes on, indicating that the serial port on the module detects the WAN serial connection.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Setting the Jumpers on the 2-Port FXS Module The 2-port FXS voice interface module has two jumper headers (W3 and W4) that you can use to set loop-start or ground-start mode. One jumper configures each FXS port. The default setting is loop start. In the default setting, jumpers are placed over positions 2 and 3 of headers W3 and W4.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Table 2-5 describes the FXS voice interface module LED. Table 2-5 FXS Voice Interface Module LED LED Description IN USE Green indicates that an off-hook has been detected. Off indicates that an on-hook has been detected. The VIC-2FXS-EU voice interface module is intended for use in Europe.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Because 90 degree RJ-21 connectors have only one screw, they require additional support to hold one side of the connector to the module. We supply a bracket and a velcro strap in the accessory kit (see Figure 2-10) for this purpose.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules defined as port 0, ground/ground, port 1, ground/ground, and so on.) Connecting these grounds directly to the FXS module results in shorting every alternate port on the module to ground. Warning If the symbol of suitability with an overlaid cross appears above a port, you must not connect the port to a public network that follows the European Union standards.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Figure 2-12 Pinout Convention for the Telco RJ-21 Pin 25 Port 24 Port 7 Port 0 Pin 1 Ring Grounds Not used Configurable 50436 Tip See Table C-3 in Appendix C, “Connector and Cable Specifications” for a mapping of the RJ-21 pinouts for the 8-port FXS module connector.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Figure 2-13 Connecting a 2-Port FXO Module (VIC-2FXO) 1 IN USE VIC FXS IN USE RJ-11 ports SEE MANUAL BEFORE INSTAL LATION 0 17370 Straight-through RJ-11-to-RJ-11 cable RJ-11 wall jack Step 4 Power on the AGM. Step 5 verify the IN USE LED is green, indicating that the line is in use. Table 2-7 describes the E/M voice interface module LED.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Step 1 Power off the AGM. Step 2 Connect one end of the RJ-11 cable to one of the RJ48S ports of the module, as shown in Figure 2-14. Step 3 Connect the other end of the cable to the RJ48S wall jack, as shown in Figure 2-14.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Caution To prevent damage to the switch, be sure to connect the cable to the BRI connector only. Do not connect the cable to any other RJ-48C connector. Figure 2-15 Connecting a 2-Port ISDN BRI Module (VIC-2B-S/T TE) RJ-48C ports B1 B2 OK VIC 2B-S/T TE ISDN BRI S/T 1 ISDN BRI S/T 0 SEE MANUAL BEFORE INTALLATION 17367 Straight-through RJ-45-to-RJ-45 cable NT1 device S/T port Step 4 Power on the AGM.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Connecting the 1-Port Multiflex Trunk Interface Modules This section describes how to connect and verify the status of the 1-port multiflex trunk interface modules (VWIC-1MFT-T1, VWIC-1MFT-E1, or VWIC-1MFT-G703). Use the straight-through RJ-48C-to-RJ-48C cable that shipped with the AGM. To connect the 1-port multiflex trunk interface module, perform these steps: Step 1 Power off the AGM.
Chapter 2 Installing the Access Gateway Module Connecting the Voice and WAN Interface Modules Table 2-10 describes the 1-port multiflex trunk interface module LEDs. Table 2-10 1-Port Multiflex Trunk Interface Module LEDs LED Description AL Yellow indicates that there is a local or remote alarm state. This LED is off during normal operation. LP Yellow indicates that a loopback or line state has been detected or has been manually set by the user. This LED is off during normal operation.
Chapter 2 Installing the Access Gateway Module Connecting a Terminal to the Console and Ethernet Management Ports Step 5 Verify that the CD LED is green, indicating that the module’s internal DSU/CSU is communicating with the DSU/CSU at the T1 or E1 service provider CO. Table 2-11 describes the 2-port multiflex interface module LEDs. Table 2-11 2-Port Multiflex Trunk Interface Module LEDs LED Description AL Yellow indicates that there is a local or remote alarm state.
Chapter 2 Installing the Access Gateway Module Connecting a Terminal to the Console and Ethernet Management Ports Table 2-12 Console Port Pinouts Pin Signal Direction Description 1 RTS output Request to send 2 DTR output Data terminal ready 3 TXD output Transmit data 4 Ground Ground 5 Ground Ground 6 RXD input Receive data 7 DSR input Data set ready 8 CTS input Clear to send Table 2-13 10/100 Ethernet Management Port Pinouts Pin Signal Direction Description 1 RXD+
C H A P T E R 3 Configuring the AGM for the First Time This chapter describes how to use the setup command facility to configure your Cisco Catalyst 4000 Access Gateway Module (AGM). Note The setup command facility prompts you to enter information needed to quickly start the AGM functioning. The facility steps you through a basic configuration, including configuring LAN and WAN interfaces.
Chapter 3 Configuring the AGM for the First Time Preparing to Configure the AGM Table 3-1 shows the AGM default configuration. Table 3-1 AGM Default Configuration Feature Default Value Host name Gateway Interface configuration None VLAN configuration None Password encryption Disabled Break to console Ignore Accessing the AGM This section describes how to access the AGM from Catalyst Operating System on Supervisor Engine I and II, and from Cisco IOS on Supervisor Engine III and IV.
Chapter 3 Configuring the AGM for the First Time Preparing to Configure the AGM To download an image to bootflash from Catalyst Operating System on Supervisor Engine I and II, access the AGM using the session command: Console> (enable) session To download an image to bootflash from Cisco IOS on supervisor engine III and IV, access the AGM using the attach command: Switch# attach module module_number Enter the following command in privileged mode: copy tftp: [/directory] /filename [/directory] /filename
Chapter 3 Configuring the AGM for the First Time Preparing to Configure the AGM Connecting a Terminal To connect a terminal to the console port using the cable and adapters provided with the Catalyst 4000 family switch, ensure that the console port mode switch is in the in position (factory default). Connect to the port using the RJ-45-to-RJ-45 cable and RJ-45-to-DB-25 DTE adapter or RJ-45-to-DB-9 DTE adapter (labeled “Terminal”).
Chapter 3 Configuring the AGM for the First Time Using the Cisco IOS CLI Understanding the Interface Numbering The AGM has three slots in which you can install interface cards: • Slot 1 supports voice interface cards (VICs), WAN interface cards (WICs), and voice and WAN interface cards (VWICs). • Slot 2 supports voice interface cards (VICs), WAN interface cards (WICs), and voice and WAN interface cards (VWICs). • Slot 3 supports only VICs and VWICs (no WICs).
Chapter 3 Configuring the AGM for the First Time Using the Cisco IOS CLI If you have never used the Cisco IOS CLI, you should still be able to perform the configuration required using the instructions and examples provided in this guide. To help get you started, this section provides a brief overview of some of the main features of the CLI. For more information, refer to the Cisco IOS configuration guides and command references.
Chapter 3 Configuring the AGM for the First Time Using the Cisco IOS CLI Table 3-2 Common Command Modes Command Mode Access Method Gateway Prompt Displayed Exit Method Interface configuration From the global configuration mode, enter the interface type number command, such as FastEthernet int 0/0. hostname (config-if)# To exit to global configuration mode, use the exit command. From the global configuration mode, enter the dial-peer voice command, such as dial-peer voice 1 pots/voip.
Chapter 3 Configuring the AGM for the First Time Interface Configuration Examples Saving Configuration Changes You need to enter the copy running-config startup-config command to save your configuration changes to nonvolatile random-access memory (NVRAM), so the changes are not lost if there is a system reload or power outage. For example: Gateway# copy running-config startup-config Building configuration... Note It might take a minute or two to save the configuration to NVRAM.
C H A P T E R 4 Configuring the Data Interfaces This chapter describes how to configure the data interfaces on the Cisco Catalyst 4000 Access Gateway Module (AGM).
Chapter 4 Configuring the Data Interfaces Configuring the Host Name and Password To configure the host name and password, perform these steps: Step 1 Command Purpose gateway> enable Enter enable mode. Password: password Enter the password. gateway# Step 2 gateway# configure terminal Enter configuration commands, one per line. End with Ctrl-Z. gateway(config)# You know you have entered enable mode when the prompt changes to gateway#. Enter global configuration mode.
Chapter 4 Configuring the Data Interfaces Configuring the Fast Ethernet Interface To verify that you configured the correct host name and password, perform these steps: Step 1 Enter the show config command: gwy1# show config Using 1888 out of 126968 bytes ! version XX.X . . . ! hostname gwy1 ! enable secret 5 $1$60L4$X2JYOwoDc0.kqa1loO/w8/ . . . Check the host name and encrypted password displayed near the top of the command output.
Chapter 4 Configuring the Data Interfaces Configuring Asynchronous/Synchronous Serial Interfaces To configure the Fast Ethernet interface, perform these steps: Step 1 Command Purpose gateway> enable Enter enable mode. Password: Enter the password. gateway# Step 2 gateway# configure terminal Enter configuration commands, one per line. End with Ctrl-Z. gateway(config)# You know you have entered enable mode when the prompt changes to gateway#. Enter global configuration mode.
Chapter 4 Configuring the Data Interfaces Configuring Asynchronous/Synchronous Serial Interfaces To configure the serial interfaces, perform these steps: Step 1 Command Purpose gateway> enable Enter enable mode. Password: Enter the password. gateway# Step 2 You know you have entered enable mode when the prompt changes to gateway#. gateway# configure terminal Enter configuration commands, one per line. End with Ctrl-Z. gateway(config)# Enter global configuration mode.
Chapter 4 Configuring the Data Interfaces Configuring Asynchronous/Synchronous Serial Interfaces Step 10 Command Purpose (continued) gateway(config-if)# exit Exit back to global configuration mode. If your AGM has more that one serial interface that you need to configure, repeat Steps 4 through 14. Step 11 When you finish configuring the interface, return to enable mode. gateway(config)# Ctrl-z gateway# Table 4-1 lists the half-duplex timer commands.
Chapter 4 Configuring the Data Interfaces Configuring ISDN BRI Interfaces Configuring ISDN BRI Interfaces This section describes how to configure the interfaces on the basic rate interface (BRI) card of your AGM. Note Timesaver Before using a AGM with an ISDN BRI interface, you must order a correctly configured ISDN BRI line from your local telecommunications service provider. ISDN BRI provisioning refers to the types of services provided by the ISDN BRI line.
Chapter 4 Configuring the Data Interfaces Configuring T1 and E1 Interfaces Step 7 Command Purpose (continued) gateway(config-if)# exit Exit back to global configuration mode. If your AGM has more than one BRI interface that you need to configure, repeat Steps 5 through 7. Step 8 gateway(config)# memory-size iomem 40 By default, the AGM allocates 25 percent of DRAM to shared memory (used for data transmitted (or received) by WAN interface cards).
Chapter 4 Configuring the Data Interfaces Configuring T1 and E1 Interfaces Configuring T1 Interfaces To configure a new T1, Channelized T1 (CT1)/PRI, or CT1/PRI-channel status unit (CSU) interface, or to change the configuration of an existing interface, perform these steps: Step 1 Command Purpose gateway> enable Enter enable mode. Password: Step 2 Enter the password. gateway# You know you have entered enable mode when the prompt changes to gateway#.
Chapter 4 Configuring the Data Interfaces Configuring T1 and E1 Interfaces Step 7 Command Purpose (continued) gateway(config-controller)# linecode b8zs Specify the line code format. This is an encoding method used to allow synchronous data to be transmitted in a compatible format for T1 transmission. Common line codes are RZ (return to zero), NRZ (non-return to zero), binary zero 0 substitution (B8ZS), alternate mark inversion (AMI), and HDB3 (high density bipolar order 3).
Chapter 4 Configuring the Data Interfaces Configuring T1 and E1 Interfaces Configuring E1 Interfaces To configure a new E1 interface (balanced or unbalanced) or to change the configuration of an existing interface, perform these steps: Step 1 Command Purpose gateway> enable Enter enable mode. Password: Step 2 < password> Enter the password. gateway# You know you have entered enable mode when the prompt changes to gateway#. gateway# configure terminal Enter global configuration mode.
Chapter 4 Configuring the Data Interfaces Verifying the Interface Configuration Command Purpose (continued) Step 9 gateway(config-if)# ip address 10.1.15.1 255.255.255.0 Assign an IP address and subnet mask to the interface. Step 10 gateway(config-if)# exit Exit back to global configuration mode. If your AGM has more than one CE1/PRI interface that you need to configure, return to Step 4. Step 11 gateway(config)# Ctrl-z gateway# When you finish configuring interfaces, return to enable mode.
Chapter 4 Configuring the Data Interfaces Saving Configuration Changes Saving Configuration Changes To prevent the loss of the AGM configuration, you need to save it to NVRAM. To save configuration changes, perform these steps: Command Step 1 Password: Step 2 Step 3 Purpose Enter enable mode. gateway> enable Enter the password. gateway# You know you have entered enable mode when the prompt changes to gateway#.
Chapter 4 Configuring the Data Interfaces Saving Configuration Changes Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note 4-14 OL-3008-01
C H A P T E R 5 Configuring the Voice Interfaces This chapter describes how to configure Voice over IP (VoIP) routing on the Cisco Catalyst 4000 Access Gateway Module (AGM). This chapter includes the following sections: • About Configuring Voice Interfaces, page 5-1 • Preparing to Configure VoIP, page 5-1 • Configuring Voice Interfaces, page 5-2 • MGCP Configuration, page 5-3 • H.323 Gateway Configuration, page 5-12 • Configuring T1-CAS Analog Emulation (H.
Chapter 5 Configuring the Voice Interfaces Configuring Voice Interfaces • Establish a working telephony network based on the dial plan for your company. • Integrate your dial plan and telephony network into your existing IP network topology.
Chapter 5 Configuring the Voice Interfaces MGCP Configuration gateway(config)# The AGM enters global configuration mode, indicated by the gateway (config) # prompt. Step 5 If you have not configured the AGM, or want to change the configuration, use Cisco IOS commands to configure global parameters, passwords, network management, and routing protocols.
Chapter 5 Configuring the Voice Interfaces MGCP Configuration • Configuring FXS and FXO Analog Ports, page 5-6 • Configuring T1-CAS E&M Emulation, page 5-7 • T1/E1 Configuration (H.323), page 5-22 • Where to Go Next, page 5-12 For more information on using MGCP with Cisco CallManager 3.0, refer to the Cisco CallManager 3.0 online help and to Configuring Cisco IP Telephony Gateways, available online at Cisco.com.
Chapter 5 Configuring the Voice Interfaces MGCP Configuration To configure gateway switchback, enter the following command: Gateway(config)#ccm-manager switchback {graceful|imm[ediate]|sch[edule-time] hh:mmm|uptime[-delay] minutes} During switchover and switchback, Cisco CallManager maintains active connected calls. Transient calls (calls in progress or on hold without an active voice connection) are torn down.
Chapter 5 Configuring the Voice Interfaces MGCP Configuration Example 5-1 illustrates a typical display that appears in response to this command. Example 5-1 Output of the show ccm-manager Command router#sh ccm-manager MGCP Domain Name: router Priority Status Host ============================================================ Primary Registered 172.20.71.
Chapter 5 Configuring the Voice Interfaces MGCP Configuration For example, the following command string configures voice port 0 in voice interface card 1 with MGCP: Gateway(config)# dial-peer voice 1 pots Gateway(config-dial-peer)# application MGCPAPP Gateway(config-dial-peer)# port 1/1/0 Configuring T1-CAS E&M Emulation You can use MGCP with the following emulation types: • E&M Wink Start • E&M Delay Start To configure T1-CAS E&M emulation with MGCP using Cisco CallManager Administrator, perform the
Chapter 5 Configuring the Voice Interfaces MGCP Configuration Step 3 Enable MGCP for the port by entering the following commands: Gateway(config)# dial-peer voice 1 pots Gateway(config-dial-peer)# application mgcpapp port : Replace portnumber with the port number on the voice gateway you are configuring and ds0group with the DS0 group number.
Chapter 5 Configuring the Voice Interfaces MGCP Configuration Gateway(config-controller)# interface serial 1/0:23 c. Specify the T1 interface and unit number to modify: interface Serial 1/0:23 no ip address no logging event link-status isdn switch-type primary-5ess isdn incoming-voice voice no cdp enable Step 3 Configure the PRI port by entering the following command: Gateway(controller-t1)# pri-group timeslots 1-24 service mgcp Step 4 Bind Layer 3 to the Cisco CallManager for PRI Q.
Chapter 5 Configuring the Voice Interfaces MGCP Configuration The following example shows the overall configuration required to enable MGCP on a T1/PRI line: isdn switch-type primary-5ess controller T1 1/0 framing crc4 linecode hdb3 pri-group timeslots 1-24 service mgcp interface Serial1/0:23 no ip address no logging event link-status isdn switch-type primary-net5 isdn incoming-voice voice no cdp enable isdn bind-l3 ccm-manager dial-peer voice 1 pots application mgcpapp port 1/0:0 Configuring E1 Interfa
Chapter 5 Configuring the Voice Interfaces MGCP Configuration Step 4 Bind Layer 3 to the Cisco CallManager for PRI Q.931: Gateway(config-if)# isdn bind-l3 ccm-manager backhaul q931 This command backhauls (tunnels) ISDN Layer 3 and above to the Cisco CallManager. PRI/Q.931 signaling backhaul transports signals (Q.931 and higher layers) for processing a PRI trunk physically connected to an MGCP call agent. The ISDN lower layer information (Q.921 and below) is terminated and processed on the gateway.
Chapter 5 Configuring the Voice Interfaces H.323 Gateway Configuration application mgcpapp port 1/0:0 Where to Go Next At this point, you should make sure that Cisco CallManager is properly configured to provision the voice gateway and to configure MGCP endpoints or H.323 route patterns as required. Refer to the documentation and online help provided with Cisco CallManager. Refer to the Cisco IOS software configuration guide and command reference publications for more advanced configuration topics.
Chapter 5 Configuring the Voice Interfaces H.323 Gateway Configuration Replace: • with a unique numeric identifier for each dial peer • with the E.
Chapter 5 Configuring the Voice Interfaces Configuring T1-CAS Analog Emulation (H.323) The number of digits that you substitute for pattern plus the number of periods in the wildcard (...) must match the total number of digits configured for use by the AGM in Cisco CallManager Administration. Also, keep in mind that the numbers that you substitute for pattern are removed by the AGM. When the call is forwarded to the destination number, only the digits in the position of the wildcard pattern (...
Chapter 5 Configuring the Voice Interfaces Configuring T1-CAS Analog Emulation (H.323) Table 5-2 T-1 Emulation Types Emulation Type Function fxs-loop-start Uses FXS emulation in loop-start mode. fxs-ground-start Uses FXS emulation in ground-start mode. fxo-loop-start Uses FXO emulation in loop-start mode. fxo-ground-start Uses FXO emulation in ground-start mode. e&m-immediate-start Uses E&M emulation in immediate-start mode. e&m-wink-start Uses E&M emulation in wink-start mode.
Chapter 5 Configuring the Voice Interfaces Configuring T1-CAS Analog Emulation (H.323) FXS Emulation Example By connecting the T1-CAS port on a AGM to a T1 channel bank using FXS emulation, you can achieve high port density when interconnecting POTS and VoIP endpoints. You can configure the dial plan for this configuration by treating Cisco CallManager as the only H.323 endpoint, or by configuring H.323 endpoints on a AGM. If you configure Cisco CallManager as an H.
Chapter 5 Configuring the Voice Interfaces ISDN BRI Configuration (H.323) The first and last parts of the configuration are the same as for the FXO example. However, you must configure your DS-0 groups for FXS by changing the emulation type and enabling direct inward dialing (DID). Then enter the destination patterns required for routing voice calls to and from the PSTN.
Chapter 5 Configuring the Voice Interfaces ISDN BRI Configuration (H.
Chapter 5 Configuring the Voice Interfaces ISDN BRI Configuration (H.323) Table 5-4 ISDN Provisioning by Switch Type Switch Type Provisioning 5ESS Custom BRI For voice only: • (Use these values only if you have an ISDN telephone connected.
Chapter 5 Configuring the Voice Interfaces ISDN BRI Configuration (H.
Chapter 5 Configuring the Voice Interfaces ISDN BRI Configuration (H.323) gateway (config-if)# isdn spid1 spid-number [ldn] gateway (config-if)# isdn spid2 spid-number [ldn] Note Although the LDN is an optional parameter in the command, you might need to enter it so the gateway can answer calls made to the second directory number. For further information on configuring ISDN, refer to the chapters “Configuring ISDN” and “Configuring DDR” in the Wide-Area Networking Configuration Guide publication.
Chapter 5 Configuring the Voice Interfaces T1/E1 Configuration (H.323) Gateway 2 Configuration This is the sample configuration for gateway 2: dial-peer voice 1 pots port 1/0/0 destination-pattern 2000 T1/E1 Configuration (H.323) This section describes how to configure an ISDN PRI interface or T1/E1 multiflex trunk interface on your AGM.
Chapter 5 Configuring the Voice Interfaces T1/E1 Configuration (H.323) c. Specify the T1 interface, unit number, and channel group to modify, as in the following example input: interface Serial pri-group no ip address no logging event link-status isdn switch-type primary-5ess isdn incoming-voice voice no cdp enable Note After completing these steps, configure the route pattern and dial plan and save your configuration, as described in “H.323 Gateway Configuration” section on page 5-12.
Chapter 5 Configuring the Voice Interfaces T1/E1 Configuration (H.323) Step 2 Configure parameters for the voice interface. a. Specify the PRI group and time slots to be mapped. gateway(config-controller)# pri-group timeslots 1-31 b. Configure each channel group as a virtual serial interface. gateway(config-controller)# interface serial 1/0:31 c.
Chapter 5 Configuring the Voice Interfaces Voice over IP Configuration Examples Voice over IP Configuration Examples This section describes how to configure voice network modules with recEive and transMit (E&M), Foreign Exchange Office (FXO), and Foreign Exchange Station (FXS) interfaces for your AGM. Your actual configuration procedures depend upon the topology of your network. You will need to customize the following example scenarios to reflect your network topology.
Chapter 5 Configuring the Voice Interfaces Voice over IP Configuration Examples ! Create pots dial-peer 1 dial-peer voice 1 pots ! Define its associated telephone number and voice port destination-pattern +4085264001 port 1/0 ! Configure serial interface 2/0 interface Serial2/0 ip address 10.0.0.1 255.0.0.
Chapter 5 Configuring the Voice Interfaces Voice over IP Configuration Examples FXO Connection to PSTN The following example shows how to configure VoIP to link users with the PSTN gateway using an FXO connection. In this example, users connected to the AGM in San Jose can reach PSTN users in Salt Lake City through AGM in Salt Lake City. The AGM in Salt Lake City is connected directly to the PSTN through an FXO interface. Figure 5-3 illustrates the topology of this connection example.
Chapter 5 Configuring the Voice Interfaces Voice over IP Configuration Examples dial-peer voice 2 voip destination-pattern +14085554000 session target ipv4:172.16.1.123 ! Configure serial interface interface serial 2/0 ip address 172.16.65.182 no shutdown FXO Connection to PSTN Using PLAR Mode The following example shows how to configure VoIP to link users with the PSTN gateway using an FXO connection in PLAR mode.
Chapter 5 Configuring the Voice Interfaces Voice over IP Configuration Examples AGM SLC Configuration This is a sample configuration for the SLC site. ! Configure pots dial-peer 1 dial-peer voice 1 pots destination-pattern +9........... port 1/0/0 ! Configure voip dial-peer 2 dial-peer voice 2 voip destination-pattern +14085554000 session target ipv4:172.16.1.123 ! Configure the voice port voice port 1/0 connection plar 14085554000 ! Configure the serial interface interface serial 2/0 ip address 172.16.
Chapter 5 Configuring the Voice Interfaces Voice over IP Configuration Examples Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note 5-30 OL-3008-01
C H A P T E R 6 Configuring the 8-Port and 16-Port FXS RJ-21 Modules This chapter describes how to configure the 8-port and 16-port FXS modules on the Cisco Catalyst 4000 Access Gateway Module (AGM). Note In this chapter, all references to the 8-port FXS module also apply to the 16-port FXS module unless otherwise noted.
Chapter 6 Configuring the 8-Port and 16-Port FXS RJ-21 Modules Configuring FXS Voice Ports Configuring FXS Voice Ports Although the default values are adequate for FXS voice ports, under some circumstances you might need to change these values.
Chapter 6 Configuring the 8-Port and 16-Port FXS RJ-21 Modules Configuring FXS Voice Ports The following example shows how to use the FXS configuration commands: gateway# conf t Enter configuration commands, one per line. End with CNTL/Z.
Chapter 6 Configuring the 8-Port and 16-Port FXS RJ-21 Modules Fine-Tuning FXS Voice Ports Ring Ground Status is inactive Tip Ground Status is inactive Digit Duration Timing is set to 100 ms InterDigit Duration Timing is set to 100 ms Ring Cadence is defined by CPTone Selection Ring Cadence are [4 2] [4 20] * 100 msec Troubleshooting the Configuration If you are having trouble placing a call and you suspect the problem is associated with the voice port configuration, you might be able to resolve the pro
Chapter 6 Configuring the 8-Port and 16-Port FXS RJ-21 Modules Fine-Tuning FXS Voice Ports Command Purpose (continued) output attenuation value Specifies (in decibels) the amount of attenuation at the transmit side of the interface. Acceptable values are from 0 to 14. Enables echo-cancellation of voice that is sent out through the interface and received back on the same interface. Adjusts the size (in milliseconds) of the echo-cancel. Acceptable values are 16, 24, and 32.
Chapter 6 Configuring the 8-Port and 16-Port FXS RJ-21 Modules Activating the Voice Port Activating the Voice Port By default, the configured voice ports are active. However, if you need to activate a port because it has been shut down explicitly, use the no shutdown command, as follows: gateway# conf t Enter configuration commands, one per line. End with CNTL/Z.
Chapter 6 Configuring the 8-Port and 16-Port FXS RJ-21 Modules Sample Configuration 2 20 VOIP — 172.20.59.93 G.729 (default) For 8-Port and 16-Port RJ-21 FXS Module 1 20 POTS 4/0 — G.711 (default) 2 10 VOIP — 172.20.59.61 G.729 (default) 1. Assigns a unique number (1, 2,...) to a dial peer. Has only local significance. 2. Assigns phone numbers to dial peers. The router directs voice calls based on these patterns. 3.
Chapter 6 Configuring the 8-Port and 16-Port FXS RJ-21 Modules Sample Configuration To display the values configured on the Cisco 2600, use the show running-config command, as follows: 2600# sh running-config Building configuration... Current configuration:951 bytes ! version 12.
Chapter 6 Configuring the 8-Port and 16-Port FXS RJ-21 Modules Sample Configuration To display the values configured on the 8-Port RJ-21 FXS module, use the show running-config command, as follows: -------------------gateway# sh running-config Building configuration... Current configuration:1062 bytes ! version 12.
Chapter 6 Configuring the 8-Port and 16-Port FXS RJ-21 Modules Sample Configuration voice-port 4/7 ! dial-peer voice 1 pots destination-pattern 20 port 4/0 ! dial-peer voice 2 voip destination-pattern 10 session target ipv4:172.20.59.
C H A P T E R 7 Configuring Encryption Services This chapter describes how to configure the Encryption Service Adapter (ESA) module on the Cisco Catalyst 4000 Access Gateway Module (AGM).
Chapter 7 Configuring Encryption Services Configuring the Encryption Service Adapter Configure the T1 Channel Group The first step toward configuring the ESA is to establish a T1 connection. In order to do this, you must define the characteristics of a configuration group (such as speed and slot number). To configure the T1 channel group, follow this procedure: Command Purpose Step 1 gateway(config)# controller {t1|e1}slot|port Specifies a controller and enter controller configuration mode.
Chapter 7 Configuring Encryption Services Configuring the Encryption Service Adapter Configure the Internet Key Exchange Security Protocol The second step is to establish an Internet Key Exchange (IKE) Security Protocol for encryption. The Internet Key Exchange (IKE) protocol is a key management protocol standard that is used in conjunction with the IPSec standard. IPSec is an IP security feature that provides robust authentication and encryption of IP packets.
Chapter 7 Configuring Encryption Services Configuring the Encryption Service Adapter encryption and authentication keys to be used by IPSec. IPSec can be used to protect one or more data flows between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.
Chapter 7 Configuring Encryption Services Configuring the Encryption Service Adapter Command Purpose (continued) Step 7 gateway(config-crypto map)# match address [access_list_id | name] Specifies an extended access list for a crypto map entry. This value should match the access-list-number or name argument of the extended access list. Step 8 gateway(cfg-crypto-trans)# exit Returns to global configuration mode.
Chapter 7 Configuring Encryption Services Verifying the Configuration Configure Encryption on the T1 Channel Group Serial Interface The fourth step is to configure a T1 serial interface with an IP address and a crypto map. To configure encryption on the T1 channel group, follow this procedure: Command Purpose Step 1 gateway (config)# interface serial slot|port:timeslot Selects the serial interface and enter interface configuration mode.
Chapter 7 Configuring Encryption Services Sample Configurations Note Although encryption is enabled by default when you install the ESA hardware, if you need to enable it, you would use the no crypto engine accel command. This command is useful for debugging problems with the ESA or for testing features available only with software encryption.
Chapter 7 Configuring Encryption Services Sample Configurations interface Ethernet0/1 ip address 99.99.99.2 255.255.255.0 no ip directed-broadcast no ip route-cache no ip mroute-cache crypto map rtp ! interface Ethernet0/2 no ip address no ip directed-broadcast shutdown ! interface Ethernet0/3 no ip address no ip directed-broadcast shutdown ! ip classless ip route 0.0.0.0 0.0.0.0 99.99.99.1 no ip http server ! access-list 115 permit ip 98.98.98.0 0.0.0.255 10.103.1.0 0.0.0.255 access-list 115 deny ip 98.
Chapter 7 Configuring Encryption Services Sample Configurations ! crypto ipsec transform-set rtpset esp-des esp-md5-hmac crypto map rtp 1 ipsec-isakmp set peer 99.99.99.
Chapter 7 Configuring Encryption Services Sample Configurations ip nat inside ! interface Ethernet3/3 no ip address no ip directed-broadcast shutdown ! ip nat pool FE30 95.95.95.10 95.95.95.10 netmask 255.255.255.0 ip nat inside source route-map nonat pool FE30 overload ip classless ip route 0.0.0.0 0.0.0.0 95.95.95.1 ip route 171.68.120.0 255.255.255.0 10.103.1.1 no ip http server ! access-list 110 deny ip 10.103.1.0 0.0.0.255 98.98.98.0 0.0.0.255 access-list 110 permit ip 10.103.1.0 0.0.0.
Chapter 7 Configuring Encryption Services Sample Configurations crypto ipsec security-association lifetime seconds 86400 ! crypto ipsec transform-set transform-1 esp-des ! crypto map cmap 1 ipsec-isakmp set peer 6.6.6.
Chapter 7 Configuring Encryption Services Sample Configurations fair-queue 64 256 0 ! router rip network 4.0.0.0 network 6.0.0.0 ! ip classless ip route 0.0.0.0 0.0.0.0 111.0.0.1 no ip http server ! access-list 101 deny udp any eq rip any access-list 101 deny udp any any eq rip access-list 101 permit ip 6.6.6.0 0.0.0.255 6.6.6.0 0.0.0.255 ! line con 0 exec-timeout 0 0 transport input none line aux 0 line vty 0 4 password lab login ! end Configuration File for Peer 2 version 12.
Chapter 7 Configuring Encryption Services Sample Configurations ! process-max-time 200 ! interface FastEthernet0/0 ip address 172.0.0.13 255.0.0.0 no ip directed-broadcast no ip mroute-cache load-interval 30 no keepalive speed 10 ! interface FastEthernet0/1 ip address 3.3.3.2 255.0.0.0 no ip directed-broadcast no ip route-cache no ip mroute-cache load-interval 30 speed 10 ! interface Serial1/0:0 bandwidth 1472 ip address 6.6.6.2 255.0.0.
Chapter 7 Configuring Encryption Services Sample Configurations Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note 7-14 OL-3008-01
C H A P T E R 8 Configuring the DSP Farm This chapter describes how to configure the IP telephony conferencing and transcoding services on the Cisco Catalyst 4000 Access Gateway Module (AGM). Note Before you configure the IP telephony conferencing and transcoding services in the AGM, you need to set up the module and configure the services in Cisco CallManager.
Chapter 8 Configuring the DSP Farm About the DSP Farm In VoIP gateway mode, the AGM acts as an H.323 gateway. The H.323 gateway is a node on a LAN that communicates with other H.323 terminals or gateways on other networks. H.323 is the standard for deploying VoIP in a LAN. Figure 8-1 shows the AGM VoIP gateway mode. VoIP Gateway Mode Access Gateway V Access Gateway IP WAN V PBX PBX H.
Chapter 8 Configuring the DSP Farm About the DSP Farm Figure 8-2 IP Telephony Gateway Mode Access Gateway IP WAN DSP To remote Gateway V PSTN IP PBX IP CallManager 44132 Analog phones Conferencing Service The conferencing service allows an external Cisco CallManager to use the DSP farm to mix participants into multiple conferences. The conferencing service adds G.711 voice streams to form unicast conferences. Figure 8-3 shows the IP telephony conferencing service.
Chapter 8 Configuring the DSP Farm About the DSP Farm Up to 24 channels or voice streams • Partitioning the 24 channels into a set of conferences is done at the Cisco CallManager. • A maximum of six participants per conference • A maximum of eight simultaneous conferences • G.711 a-Law or u-Law encoding only Transcoding Service The transcoding service allows an external Cisco CallManager to use the DSP farm to compress or decompress WAN packets of voice streams between G.723.1 or G.
Chapter 8 Configuring the DSP Farm Configuring IP Telephony Gateway Mode Configuring IP Telephony Gateway Mode The VoIP gateway is the default mode for the AGM.
Chapter 8 Configuring the DSP Farm Configuring IP Telephony Gateway Mode Gateway(config)# voicecard transcode Enable the IP telephony gateway transcoding service. After registering the transcoding service with the Cisco CallManager at the IOS CLI, you need to configure transcoding in Cisco CallManager. In addition, you need to configure VAD and echo cancellation with Cisco CallManager. Note You must save the configuration and reboot the module for these configuration changes to take effect.
Chapter 8 Configuring the DSP Farm Configuring IP Telephony Gateway Mode 5409 023 02 {trans} 5409 024 02 {trans} 3.5 idle 3.5 idle idle idle 0 0 0 0 Verifying the Conferencing Configuration To verify the conferencing configuration, use the show voicecard conference command. The ch_nb variable provides information on a specific channel number. The following example displays results of the show voicecard conference command: Gateway# show voicecard conference Conference Bridge: (mac address 00e0.b0ff.
Chapter 8 Configuring the DSP Farm Configuring IP Telephony Gateway Mode remote IP: remote port: IP precedence: DSP Information: dsp: participant: tx_chan: rx_chan: logical chan: 172.20.59.113 0x7612 0xB0 6 3 3 67 4 Verifying the Transcoding Configuration To verify the transcoding configuration, use the show voicecard transcode command. The ch_nb variable provides information on a specific channel number.
Chapter 8 Configuring the DSP Farm Troubleshooting the AGM Returning to the VoIP Gateway Mode To disable the IP telephony gateway mode in the AGM and return to the VoIP gateway mode, follow this procedure: Command Purpose Step 1 Gateway# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Gateway(config)# Enters global configuration mode. You have entered global configuration mode when the prompt changes to Gateway (config)#.
Chapter 8 Configuring the DSP Farm Troubleshooting the AGM Gateway# show diag Slot 0: Gigabit Ethernet Port adapter, 1 port Port adapter is analyzed Port adapter insertion time unknown EEPROM contents at hardware discovery: Hardware revision 0.
Chapter 8 Configuring the DSP Farm Troubleshooting the AGM phy register #18: C000 phy register #19: 1 phy register #20: 79 fcc_gfmr: 7C PQII SCC specific errors: 0 buffer errors, 0 overflow errors 0 input aborts on late collisions 0 heartbeat failures, 0 cumulative deferred Interface GigabitEthernet0/0(idb 0x812E0614) Hardware is WISEMAN 2.
Chapter 8 Configuring the DSP Farm Troubleshooting the AGM Entry=12: Addr=0000.0000.0000 Entry=13: Addr=0000.0000.0000 Entry=14: Addr=0000.0000.0000 Entry=15: Addr=0000.0000.
Chapter 8 Configuring the DSP Farm Troubleshooting the AGM tmd( tmd( tmd( tmd( tmd( tmd( tmd( tmd( tmd( tmd( tmd( 31860A8 31860B0 31860B8 31860C0 31860C8 31860D0 31860D8 31860E0 31860E8 31860F0 31860F8 ): ): ): ): ): ): ): ): ): ): ): status status status status status status status status status status status 0 length 0 address 0 0 length 0 address 0 0 length 0 address 0 0 length 0 address 0 0 length 0 address 0 0 length 0 address 0 0 length 0 address 0 0 length 0 address 0 0 length 0 address 0 0 len
Chapter 8 Configuring the DSP Farm Troubleshooting the AGM Gateway show tdm map slot 1 Connection Memories for TDM in slot 1 ===================================== Local connection memory, Stream/Channel: 00/000: 5000 5001 5100 5101 4000 4000 4000 4000 4000 00/010: 4000 4000 4000 4000 4000 4000 4000 4000 4000 00/020: 4000 4000 4000 4000 4000 4000 4000 4000 4000 00/030: 4000 4000 01/000: 4000 4000 4000 4000 4000 4000 4000 4000 4000 01/010: 4000 4000 4000 4000 4000 4000 4000 4000 4000 01/020: 4000 4000 4000
Chapter 8 Configuring the DSP Farm Troubleshooting the AGM Table 8-1 SIMM 3 DSP 12–17 SIMM 4 DSP 18–23 Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note OL-3008-01 8-15
Chapter 8 Configuring the DSP Farm Troubleshooting the AGM Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note 8-16 OL-3008-01
A P P E N D I X A Identifying Hardware Problems with the ROM Monitor This appendix describes how to use the ROM monitor bootstrap program to identify hardware problems on the Cisco Catalyst 4000 Access Gateway Module (AGM) that you encounter during installation.
Appendix A Identifying Hardware Problems with the ROM Monitor Configuring for Autoboot 16:51:22:%SYS-5-RELOAD:Reload requested System Bootstrap, Version 12.1(5r)YF1, RELEASE SOFTWARE (fc1) TAC Support: http://www.cisco.com/cgi-bin/ibld/view.pl?i=support Copyright (c) 2001 by cisco Systems, Inc. C4GWY platform with 65536 Kbytes of main memory rommon 1 > *** This ROMMON prompt will appear provided Autoboot is disabled.
Appendix A Identifying Hardware Problems with the ROM Monitor ROM Monitor Commands ROM Monitor Commands This section describes the ROM monitor syntax conventions and the most commonly used commands. To display a complete list, enter ? or help at the ROMMON prompt, as follows: rommon 1 > ? You can terminate any command by pressing the Break key at the console.
Appendix A Identifying Hardware Problems with the ROM Monitor ROM Monitor Commands An example of this command is as follows: boot c4gwy-io3s-mz 172.15.19.11 • Note b filename boots the named Cisco IOS software from the boothelper image. (The boothelper is the downloaded image that downloads the IOS image.) This method of booting is necessary if the device ID is unrecognizable. If the device does not have an image or if the Flash is corrupt, the Flash ID might be lost.
Appendix A Identifying Hardware Problems with the ROM Monitor ROM Monitor Commands meminfo [-l] Enter the meminfo[-I] command to display supported Dual In-Line Memory Module (DIMM) configurations. An example of this command is as follows: rommon 1 > meminfo -l Supported memory configurations: DIMM 0 --------- priv Enter the priv command to enter privileged ROMMON mode. An example of this command is as follows: rommon 3 > priv You now have access to the full set of monitor commands.
Appendix A Identifying Hardware Problems with the ROM Monitor ROM Monitor Commands Debugging Commands This section lists the ROM monitor debugging commands. Most debugging commands are functional only when IOS software has crashed or is aborted. If you enter a debugging command and IOS crash information is unavailable, this error message is displayed: “xxx: kernel context state is invalid, can not proceed.” stack or k Enter the stack command produces a stack trace.
Appendix A Identifying Hardware Problems with the ROM Monitor ROM Monitor Commands at 0x80006590 (fp + 0x24) at 0x80006594 (fp + 0x28) at 0x80006598 (fp + 0x2c) rommon 7 > frame 03 Frame 03:FP = 0x8000665c at 0x80006664 (fp + 0x08) at 0x80006668 (fp + 0x0c) rommon 8 > frame 04 Frame 04:FP = 0x8000666c at 0x80006674 (fp + 0x08) at 0x80006678 (fp + 0x0c) at 0x8000667c (fp + 0x10) at 0x80006680 (fp + 0x14) rommon 9 > frame 05 Frame 05:FP = 0x80006684 at 0x8000668c (fp + 0x08) at 0x80006690 (fp + 0x0c) at 0x8
Appendix A Identifying Hardware Problems with the ROM Monitor ROM Monitor Commands An example of this command is as follows: rommon 2 cookie: 01 01 00 00 00 00 32 01 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > cookie 10 00 00 00 00 00 00 00 7b 00 00 00 00 00 00 00 fb 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 36 00 00 00 00 00 00 00 53 4a 00 00 00 00 00 00 00 41 00 00 00 00 00 00 00 42 00 00 00 00 00 00 00 04 00 00 00 00 00 00 01 44 05 00 00 00 00 00 7a 30 00 00 00 00 00 00 00 44 00 0
Appendix A Identifying Hardware Problems with the ROM Monitor ROM Monitor Commands Board Configuration:00 PCA Number:00 00 00 00 rommon 5 > fxs_high_density cookie Enter the fxs_high_density cookie command to display identification information for the Catalyst 4000 8-port RJ21 FXS module. In nonprivileged mode, the fxs_high_density cookie command displays read-only information for an 8-port FXS module.
Appendix A Identifying Hardware Problems with the ROM Monitor ROM Monitor Commands OEM_string:Cisco Systems Inc product_number:WS-U4604-16 serial_number:YOURfxs_high_density part_number:73-6476-02 part_revision:ff ff ff ff mfg_deviation:None hw_rev_major:ff ff hw_rev_minor:ff ff mfg_bits:ff ff eng_bits:ff ff snmpIOD:ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff power_consumption:ff ff RMA failure code:ff ff ff ff rommon 4 > Configuration Register Command This section describes the ROM confreg command.
Appendix A Identifying Hardware Problems with the ROM Monitor ROM Monitor Commands [0]: 0 Configuration Summary enabled are: diagnostic mode break/abort has effect console baud: 9600 boot: the ROM Monitor do you wish to change the configuration? y/n [n]: You must reset or power cycle for new config to take effect confreg [hexnum] Enter the confreg [hexnum] command to change the virtual configuration register to the value specified. The value is always interpreted as hexadecimal.
Appendix A Identifying Hardware Problems with the ROM Monitor ROM Monitor Commands The following variables are required: • IP_ADDRESS—The IP address for the AGM you are using. • IP_SUBNET_MASK—The subnet mask for the AGM you are using. • DEFAULT_GATEWAY—The default gateway for the AGM you are using. • TFTP_SERVER—The IP address of the server from which you want to download the image file. • TFTP_FILE—The name of the file that you want to download.
Appendix A Identifying Hardware Problems with the ROM Monitor Upgrading the ROM Monitor Upgrading the ROM Monitor There are two ways to upgrade the ROM monitor: • Upgrading the ROM Monitor from IOS CLI, page A-13 • Upgrading the ROM Monitor from ROMMON, page A-13 Upgrading the ROM Monitor from IOS CLI To upgrade the ROM monitor, enter this IOS command in privileged mode: chopin# upgrade rommon tftp://171.69.1.129/c4gwy_rommon.
Appendix A Identifying Hardware Problems with the ROM Monitor Upgrading the ROM Monitor Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note A-14 OL-3008-01
A P P E N D I X B Using Loss Plan Defaults This appendix describes the loss plan defaults on the Cisco Catalyst 4000 Access Gateway Module (AGM). Default Loss and Gain Values When the CLI indicates the default Transmit (T) Input gain / Receive (R) output loss pads is 0 dB, the actual level for each of the VIC modules is: • FXS : T = 0 dB and R = 3 dB • FXO : T = 0 dB and R = 3 dB Transmission Loss Plan This system does not have pre-configured transmission loss plan settings.
Appendix B Using Loss Plan Defaults Transmission Loss Plan Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note B-2 OL-3008-01
A P P E N D I X C Connector and Cable Specifications This appendix describes the ports, cables, and adapters that you use to connect the Cisco Catalyst 4000 Access Gateway Module to other devices. This section contains the following subsections: • Console Connector Pinouts, page C-1 • Management Port Pinouts, page C-1 • 8-Port RJ21 FXS Module Connector Pinouts, page C-2 • Cable and Adapter Specifications, page C-3 Console Connector Pinouts Table C-1 lists the console connector pinouts.
Appendix C Connector and Cable Specifications 8-Port RJ21 FXS Module Connector Pinouts Table C-2 Management Port Pinouts — RJ-45 Pin Signal Direction Description 1 RXD+ input Receive data diff1 pair 2 RXD- input Receive data diff pair 3 TXD+ output Transmit data diff pair 4 Ground Unused pair 5 Ground Unused pair 6 TXD- output Transmit data diff pair 7 Unused pair 8 Unused pair 1. Differential. There exists a positive and negative copy of the signal with a set impedance.
Appendix C Connector and Cable Specifications Cable and Adapter Specifications Cable and Adapter Specifications This section contains the following topics: • Crossover and Straight-Through Cable Pinouts, page C-3 • Rollover Cable and Adapter Pinouts, page C-3 Crossover and Straight-Through Cable Pinouts The schematics of crossover and straight-through cables are shown in Figure C-1 and Figure C-2.
Appendix C Connector and Cable Specifications Cable and Adapter Specifications Figure C-3 Identifying a Rollover Cable Pin 1 on one connector and pin 8 on the other connector should be the same color. Pin 1 H10632 Pin 8 Connecting to a PC Use the supplied thin, flat, RJ-45-to-RJ-45 rollover cable and RJ-45-to-DB-9 female DTE adapter to connect the console port to a PC running terminal-emulation software.
Appendix C Connector and Cable Specifications Cable and Adapter Specifications Table C-5 Console Port Signaling and Cabling Using a DB-25 Adapter Console Port (DTE) RJ-45-to-RJ-45 Rollover Cable RJ-45-to-DB-25 Terminal Adapter Console Device Signal RJ-45 Pin RJ-45 Pin DB-25 Pin Signal RTS 1 8 5 CTS DTF 2 7 6 DSR TxD 3 6 3 RxD GND 4 5 7 GND GND 5 4 7 GND RxD 6 3 2 TxD DTF 7 2 20 DTR CTS 8 1 4 RTS Cisco Catalyst 4000 Access Gateway Module Installation and C
Appendix C Connector and Cable Specifications Cable and Adapter Specifications Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note C-6 OL-3008-01