24
SmartWare Software Configuration Guide Table of Contents
Configuring DTMF relay .............................................................................................................................574
Configuring RTP payload types ....................................................................................................................574
Configuring RTP payload type for transparent-clearmode ............................................................................575
Configuring RTP payload types for the g726-32k and g726-32k-cisco coders ..............................................575
Configuring RTP payload type for Cisco NSE ..............................................................................................575
Configuring Cisco NSE for Fax ....................................................................................................................575
Configuring the dejitter buffer (advanced) ....................................................................................................576
Enabling/disabling filters (advanced) .............................................................................................................578
Configuring Fax transmission .......................................................................................................................579
T.38 CED retransmission .............................................................................................................................582
T.38 No-Signal Retransmission ....................................................................................................................583
Fax bypass method ........................................................................................................................................583
Configuring fax failover ................................................................................................................................583
Configuring modem transmission .................................................................................................................584
Modem bypass method .................................................................................................................................584
Configuring the traffic class for Voice and Fax data ......................................................................................585
Configuring IP-IP codec negotiation .............................................................................................................585
Examples .............................................................................................................................................................586
Home office in an enterprise network ...........................................................................................................586
Home office with fax ....................................................................................................................................588
Soft phone client gateway ..............................................................................................................................589
48 PSTN profile configuration......................................................................................................................... 592
Introduction........................................................................................................................................................593
PSTN profile configuration task list ....................................................................................................................593
Creating a PSTN profile ...............................................................................................................................593
Configuring the echo canceller ......................................................................................................................594
Configuring output gain ...............................................................................................................................594
49 SIP profile configuration............................................................................................................................. 596
Introduction........................................................................................................................................................597
SIP profile configuration task list.........................................................................................................................597
Entering the configuration mode for a SIP profile .........................................................................................597
Mapping from a SIP disconnect cause ...........................................................................................................597
Mapping to a SIP cause .................................................................................................................................598
Mapping from a SIP redirection reason .........................................................................................................598
Mapping to a SIP redirection code ................................................................................................................598
50 Authentication Service................................................................................................................................. 599
Introduction........................................................................................................................................................600
Authentication Service configuration task list ......................................................................................................600
Creating an Authentication Service ...............................................................................................................600
Configuring a Realm .....................................................................................................................................601
Configuring the authentication protocol .......................................................................................................601
Creating credentials ......................................................................................................................................601
Configuration Examples ......................................................................................................................................601