7.1.2 Connection ...................................................................................................................323
7.1.3
Operation ......................................................................................................................324
7.1.4 Error Messages ............................................................................................................326
7.1.5 Restarting the KX-NS1000 ...........................................................................................328
7.1.6 Troubleshooting by Error Log .......................................................................................330
8 Networking Information .......................................................................333
8.1 Information about Using an IP Network ......................................................................334
8.1.1 Using a VoIP Network with the PBX .............................................................................334
8.1.2 DHCP (Dynamic Host Configuration Protocol) Server .................................................337
8.1.3 VLAN (Virtual LAN) ......................................................................................................338
8.1.4 Jitter Buffer ...................................................................................................................339
8.1.5 Voice Activity Detection (VAD) .....................................................................................339
8.1.6 Network Configuration ..................................................................................................340
8.1.7 Network Devices ..........................................................................................................344
8.1.8 QoS (Quality of Service) ...............................................................................................345
8.1.9 Network Time Protocol (NTP) ......................................................................................346
8.2 H.323 Trunks ..................................................................................................................347
8.2.1 Avoid Multiple IP Networks ...........................................................................................347
8.2.2 Gatekeeper ...................................................................................................................348
8.2.3 Bandwidth Assessment ................................................................................................348
8.2.4 Virtual VoIP Gateway Card Specifications ...................................................................351
8.3 SIP Trunks .....................................................................................................................352
8.3.1 IP Telephony Service ...................................................................................................352
8.3.2 SIP Requirements ........................................................................................................355
8.3.3 Router Requirements ...................................................................................................355
8.3.4 Bandwidth Requirements .............................................................................................355
8.3.5 Virtual SIP Trunk Card Specifications ..........................................................................357
8.4 Types of PBX Networks ................................................................................................358
8.4.1 One-look Network .........................................................................................................358
8.4.2 One-look Networking Survivability ................................................................................362
8.4.3 Information about Slave Units ......................................................................................369
8.4.4 H.323 QSIG Network ....................................................................................................371
8.4.5 Working with Multiple PBX Networks ...........................................................................372
8.5 Port Security ..................................................................................................................373
8.6 Built-in Router ...............................................................................................................377
8.6.1 Built-in Router Overview ...............................................................................................377
8.6.2 WAN Connection ..........................................................................................................379
8.6.3 DHCP Relay Agent .......................................................................................................380
8.6.4 Dynamic DNS ...............................................................................................................381
8.6.5 DNS Client ....................................................................................................................382
8.6.6 Protocol Bridge—IPv6 Bridge .......................................................................................383
8.6.7 Protocol Bridge—PPPoE Bridge ..................................................................................383
8.6.8 MAC Address Clone .....................................................................................................384
8.6.9 Routing .........................................................................................................................385
8.6.10 Firewall .........................................................................................................................385
8.6.11 Firewall—Packet Filtering .............................................................................................386
8.6.12 Firewall—Stateful Packet Inspection ............................................................................387
8.6.13 Firewall—DoS Protection .............................................................................................387
8.6.14 Firewall—Other Security Settings ................................................................................388
8.6.15 Dynamic NAPT (IP masquerade) .................................................................................389
8.6.16 Static NAPT (Port Forwarding) .....................................................................................389
8.6.17 DMZ Host .....................................................................................................................390
8.6.18 VoIP Port Dynamic Setting ...........................................................................................390
8.6.19 IPsec Pass-through ......................................................................................................391
Installation Manual 25
Table of Contents