|
|
This chapter describes how to configure Multimedia Conference Manager, which provides gatekeeper and proxy capabilities required for service provisioning and management of H.323-compliant networks.
This chapter contains the following sections:
For a complete description of the commands used in this chapter that are specific to Multimedia Conference Manager, refer to the Cisco IOS Multiservice Applications Command Reference publication. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online.
Multimedia Conference Manager provides a rich list of networking capability, including the following:
With Multimedia Conference Manager, you can do the following:
Multimedia Conference Manager has two principal functions: gatekeeper and proxy. Gatekeeper subsystems provide the following features:
With Cisco IOS Release 12.0(3)T and later, you can configure Cisco gatekeepers to use the Cisco Hot Standby Routing Protocol (HSRP), so that when one gatekeeper fails, the standby gatekeeper assumes its role.
Proxy subsystems provide the following features:
The Multimedia Conference Manager conforms to the H.323 standard for sending audio, video, and data conferencing data on an IP-based internetwork. The H.323 standard provides for the following types of endpoints in the network:
Figure 37 shows a typical H.323 network.

These nodes attempt to register with a gatekeeper upon startup. When they wish to communicate with another endpoint, they request admission to the call, using a symbolic alias for the endpoint name such as an E.164 address or an e-mail ID. If the gatekeeper decides the call can proceed, it returns a destination IP address to the originating endpoint. This IP address cannot be the actual address of the target endpoint, but it can be an intermediate address. A gatekeeper and its registered endpoints then exchange status information.
![]() |
Note Although the gatekeeper is an optional H.323 component, it must be included in the network if proxies are used. |
![]() |
Note The maximum number of local zones defined in a gatekeeper should not exceed 100. |
A gatekeeper supports a broad variety of H.323 terminal implementations from many different vendors. These terminals must support the standard H.323 RAS protocol in order to function with the gatekeeper features.
![]() |
Note Some terminals have limited multipoint-control built into them. These terminals may not require an MCU with all the functionality mentioned. |
Gateways allow H.323 terminals to communicate with terminals running other protocols. They provide protocol conversion between terminals running different types of protocols. For example, Figure 38 shows a gateway between an H.323 terminal and non-H.323 terminal.

When terminals and proxies are brought online, they first attempt to discover their gatekeeper. Terminals and proxies discover their gatekeeper by either multicasting a discovery request, or by being configured with the name and address of the gatekeeper and unicasting a discovery request. Following successful discovery, each endpoint registers with the gatekeeper. The gatekeeper keeps track of which endpoints are online and available to receive calls.
There are three ways to set up calls between various endpoints, as described in the following sections:
If terminal TA1 wants to make an intrazone call to terminal TB1 in Zone 1, the following sequence of events occurs:
1. TA1 asks GK1 for permission to call TB1.
2. GK1 returns the address of TB1 to TA1.
3. TA1 then calls TB1.
Figure 39 illustrates these events.

If terminal TA1 in Zone 1 wants to call terminal TA2 in Zone 2 without the use of a proxy, the following sequence of events occurs:
1. TA1 asks GK1 for permission to call TA2.
2. TA2 is not in the GK1 zone. GK1 locates GK2 as the TA2 gatekeeper. GK1 then asks GK2 for TA2 address.
3. GK2 returns TA2 address to GK1.
4. GK1 returns the address to TA1.
5. TA1 calls TA2.
Figure 40 illustrates these events.

If terminal TA1 in Zone 1 wants to call terminal TA3 in Zone 3, the following sequence of events occurs:
1. TA1 asks GK1 for permission to call TA3.
2. GK1 locates GK3 as the TA3 gatekeeper. GK1 asks GK3 for TA3 address.
3. GK3 responds with P3 address instead of TA3 address, to hide TA3 identity.
4. GK1 knows that to get to P3, the call must go through P1. So GK1 returns P1 address to TA1.
5. TA1 calls P1.
6. P1 consults GK1 to discover the true call's destination (which is TA3 in this example).
7. GK1 instructs P1 to call P3.
8. P1 calls P3.
9. P3 consults GK3 for the true destination, which is TA3.
10. GK3 gives TA3 address to P3.
11. P3 completes the call to TA3.
Figure 41 illustrates these events.

Gateways provide protocol conversion between terminals running different types of protocols. Gateways communicate with gatekeepers using the RAS protocol. The gatekeeper maintains resource computing information, which it uses to select the appropriate gateway during the admission of a call. In Figure 42, the following conditions exist:

A call from TA1 to TA2 is set up as follows:
1. TA1 asks GK1 for permission to connect to TA2 E.164 address.
2. The gatekeeper looks through its local registrations and does not find any H.323 terminals registered with that E.164 address, so the gatekeeper assumes that it is an H.320 terminal outside the scope of H.323. The gatekeeper instructs TA1 to connect to the GW1 IP address.
3. TA1 connects to GW1.
4. GW1 completes the call to TA2.
A call from TA2 to TA1 is set up as follows:
1. TA2 calls GW1 and provides the TA1 E.164 address as the final destination.
2. GW1 sends a message to GK1 asking to connect to that address.
3. GK1 gives GW1 the address of TA1.
4. GW1 completes the call with TA1.
Figure 43 illustrates these events.

When MCUs are brought online, they first attempt to discover their gatekeeper. As with terminals and proxies, they discover their gatekeeper by either multicasting a discovery request, or by being configured with the name and address of the gatekeeper and unicasting a discovery request. Following successful discovery, the MCU registers with the gatekeeper. The gatekeeper keeps track of which endpoints are online and available to receive calls.
There are three ways to set up an MCU conference call, as described in the following sections:
An MCU conference in Zone 1 is created with the conference ID CompanyMeeting. The MCU reregisters itself with the gatekeeper with the new conference ID appended to its list of existing aliases. If terminals TA1, TA2, and TA3 in Zone 1 want to join CompanyMeeting, the following sequence of events occurs:
1. TA1, TA2, and TA3 join the conference by asking GK1 for permission to call the given conference ID.
2. GK1 returns the address of the MCU to TA1, TB1, and TC1.
3. TA1, TA2, and TA3 then call the MCU.
Figure 44 illustrates these events.

The MCU in Zone 2 creates a conference with conference ID CompanyMeeting@zone2.com. The MCU reregisters itself with GK2, with the new conference ID appended to its list of existing aliases. Terminals TA1, TB1, and TC1 in Zone 1 want to join the MCU conference call with the conference ID CompanyMeeting@zone2.com in Zone 2. The following sequence of events occurs:
1. TA1, TB1, and TC1 ask GK1 for permission to join the conference.
2. GK1 locates GK2 for the remote zone containing conference CompanyMeeting@zone2.com using DNS or information configured on GK1. GK1 sends a request to GK2 to recover the MCU address.
3. GK2 gives the MCU address to GK1.
4. GK1 gives the MCU address to TA1, TB1, and TC1, and instructs these endpoints to set up the call with the MCU.
5. TA1, TB1, and TC1 then call the MCU.

One main reason for using a proxy is to isolate addressing information in one zone from another. When such isolation is desired, zones are configured inaccessible on the gatekeepers.
The MCU in Zone 3 creates a conference with the conference ID CompanyMeeting@zone3.com. The MCU reregisters itself with the gatekeeper, using the new conference ID appended to its list of existing aliases. Terminals TA1, TB1, and TC1 in Zone 1 want to join the MCU conference with the conference ID CompanyMeeting@zone3.com in Zone 3. The following sequence of events occurs:
1. TA1, TB1, and TC1 ask GK1 for permission to join the conference CompanyMeeting@zone3.com.
2. GK1 locates GK3 for the remote zone containing conference CompanyMeeting@zone3.com. GK1 asks GK3 for the MCU address.
3. GK3 responds with PX3 address instead of the MCU address. GK1 knows that to get to PX3 the call should go through P1.
4. GK1 gives P1 address to TA1, TB1 and TC1.
5. TA1, TB1, and TC1 call P1.
6. P1 consults GK1 to discover the true call destination, which is the CompanyMeeting@zone3.com in this example.
7. GK1 instructs P1 to call P3.
8. P1 calls P3.
9. P3 consults with GK3 to discover the true call destination, which is the CompanyMeeting@zone3.com in this example.
10. GK3 gives the MCU address to PX3.
11. P3 completes the call with the MCU.
Figure 46 illustrates these events.

The following sections describe the main features of a gatekeeper in an H.323 network:
Endpoints attempt to discover a gatekeeper, and consequently which zone they are members of, by using the RAS message protocol. The protocol supports a discovery message that may be sent multicast or unicast.
If the message is sent multicast, the endpoint registers nondeterministically with the first gatekeeper to respond. To enforce predictable behavior, where endpoints on certain subnets are assigned to specific gatekeepers, you can use the zone subnet command to define the subnets that constitute a given gatekeeper zone. Any endpoint on a subnet that is not enabled for the gatekeeper will not be accepted as a member of that gatekeeper zone. If the gatekeeper receives a discovery message from such an endpoint, it will send an explicit reject message.
Gatekeepers recognize one of two types of terminal aliases, or terminal names:
If an H.323 network deploys interzone communication, each terminal should at least have a fully-qualified e-mail name as its H.323 ID, for example, bob@cisco.com. The domain name of the e-mail ID should be the same as the configured domain name for the gatekeeper of which it is to be a member. As in the previous example, the domain name would be cisco.com.
To allow endpoints to communicate between zones, gatekeepers must be able to determine which zone an endpoint is in and locate the gatekeeper responsible for that zone. If DNS is available, you can associate a DNS domain name to each gatekeeper. See the DNS configuration task in the section "Setting Up Intergatekeeper Communication" later in this chapter to understand how to configure DNS.
Version 1 of the H.323 specification does not provide a mechanism for authenticating registered endpoints. No credential information is passed. However, by enabling AAA on the gatekeeper and configuring for RADIUS/TACACS+, you can achieve a rudimentary form of identification.
If you enable this feature, the gatekeeper attempts to use the registered aliases along with a password, and complete an authentication transaction to a RADIUS/TACACS+ server. The registration will only be accepted if RADIUS/TACACS+ successfully authenticates the name.
The gatekeeper can be configured to use a default password for all users. It can also be configured to recognize a password separator character that allows users to piggyback their passwords onto H.323-ID registrations by using it to separate the ID and password fields.
![]() |
Note The names loaded into RADIUS/TACACS+ are probably not the same names provided for dial access, because they may all have the same password. |
If you enable AAA on the gatekeeper, the gatekeeper will emit an accounting record each time an endpoint registers or unregisters, or each time a call is admitted or disconnected.
With Cisco IOS Release 12.0(3)T and later, you can configure interzone routing using E.164 addresses.
Two types of address destinations are used in H.323 calls. The destination can be specified using either an H.323-ID address (a character string) or an E.164 address (a string containing telephone keypad characters). The way interzone calls are routed depends on the type of address being used.
When using H.323-ID addresses, interzone routing is handled through the use of domain names. For example, to resolve the domain name bob@cisco.com, the source endpoint gatekeeper finds the gatekeeper for cisco.com and sends it the location request for target address bob@cisco.com. The destination gatekeeper looks in its registration database, sees bob registered, and returns the appropriate IP address to get to bob.
When using E.164 addresses, call routing is handled through means of zone prefixes and gateway type prefixes, also referred to as technology prefixes. The zone prefixes, which are typically area codes, serve the same purpose as domain names in H.323-ID address routing. Unlike domain names, however, more than one zone prefix can be assigned to one gatekeeper, but the same prefix cannot be shared by more than one gatekeeper.
Using the zone prefix command, you can define gatekeeper responsibilities for area codes. The command can also be used to both tell the gatekeeper which prefixes are in its own zones, and which remote gatekeepers are responsible for other prefixes.
![]() |
Note Area codes are used as an example in this section, but a zone prefix need not be an area code. It can be a country code, or an area-code-plus-local-exchange (NPA-NXX), or any other logical hierarchical partition. |
The following sample command shows how to configure a gatekeeper with the knowledge that zone prefix 212...... (that is, any address beginning with area code 212 and followed by seven arbitrary digits) is handled by gatekeeper gk-ny:
my-gatekeeper(config-gk)# zone prefix gk-ny 212.......
When my-gatekeeper is asked to admit a call to destination address 2125551111, it knows to send the location request to gk-ny.
However, once the query gets to gk-ny, gk-ny still needs to resolve the address so that the call can be sent to its final destination. There could be an H.323 endpoint that has registered with gk-ny with that E.164 address, in which case gk-ny returns the IP address for that endpoint. However, it is more likely that the E.164 address belongs to a non-H.323 device such as a telephone or an H.320 terminal.
Because non-H.323 devices do not register with gatekeepers, gk-ny has no knowledge of which device the address belongs to, or which type of device it is, so the gatekeeper cannot decide which gateway should be used to hop off to the non-H.323 device. (The term hop off refers to the point where the call leaves the H.323 network and is destined for a non-H.323 device.)
![]() |
Note The number of zone prefixes defined for a directory gatekeeper that is dedicated to forwarding LRQs and not handling local registrations and calls should not exceed 10,000; 4 MB of memory must be dedicated to describing zones and zone prefixes to support this maximum number of zone prefixes. The number of zone prefixes defined for a gatekeeper that handles local registrations and calls should not exceed 2000. |
To enable the gatekeeper to select the appropriate hop-off gateway, use the gw-type-prefix command to configure technology or gateway-type prefixes. You can select technology prefixes to denote different types or classes of gateways. The gateways are then configured to register with their gatekeepers with these technology prefixes.
For example, voice gateways might register with technology prefix 1#, H.320 gateways with technology prefix 2#, and so on. If you have several gateways of the same type, you should configure them to register with the same prefix type. By having them register with the same prefix type, the gatekeeper treats the gateways as a pool out of which a random selection is made whenever a call for that prefix type arrives. If a gateway can serve more than one type of hop-off technology, it can register more than one prefix type with the gatekeeper.
You will need to let callers know the technology prefixes you define. The callers will need to know the type of device they are trying to reach, and will need to prepend the appropriate technology prefix to the destination address to indicate the type of gateway to reach the destination.
As an example, callers might request 1#2125551111 if they know that address 2125551111 is for a telephone and the technology prefix for voice gateways is 1#. The voice gateway is configured with a dial peer (using the dial-peer command), so that when it receives the call for 1#2125551111, it strips off the technology prefix 1# and bridges the next leg of the call to the telephone at 2125551111.
In cases where the call scenario is as shown in Figure 47, voice-gw1 can be configured to prepend the voice technology prefix 1# so that the use of technology prefixes is completely transparent to the caller.

Additionally, the gw-type-prefix command can provide the ability to define a particular gateway-type prefix as being the default gateway type to be used for unresolveable addresses, and also to force a technology prefix to always hop off in a particular zone.
If the majority of calls hop off on a particular type of gateway, the gatekeeper can be configured to use that type of gateway as the default type so that callers no longer have to prepend a technology prefix on the address. For example, if you use mostly voice gateways in your network, and you have configured all your voice gateways to register with technology prefix 1#, you can configure your gatekeeper to use 1# gateways as the default technology by entering the following command:
my-gatekeeper(config-gk)# gw-type-prefix 1# default-technology
Now a caller no longer needs to prepend 1# to use a voice gateway. Any address that does not contain an explicit technology prefix will be routed to one of the voice gateways that registered with 1#.
With this default technology definition, a caller could ask the gatekeeper for admission to 2125551111. If the local gatekeeper does not recognize the zone prefix as belonging to any remote zone, it will route the call to one of its local (1#) voice gateways, so the call hops off locally. However, if it knows that gk-ny handles the 212 area code, it can send a location request for 2125551111 to gk-ny. This requires that gk-ny also be configured with some default gateway type prefix, and that its voice gateways be registered with that prefix type.
![]() |
Note For ease of maintenance, we recommend that you use the same prefix type to denote the same gateway type in all zones under your administration. No more than 50 different technology prefixes should be registered per zone. |
The gw-type-prefix command also provides the ability to force a hop-off to a particular zone. When an endpoint or gateway makes a call-admission request to its gatekeeper, the gatekeeper resolves the destination address by first looking for the technology prefix. When that is matched, the remaining string is compared against known zone prefixes. If the address resolves to a remote zone, the entire address including both technology and zone prefixes is sent to the remote gatekeeper in a location request. That remote gatekeeper then uses the technology prefix to decide on which of its gateways to hop off. In other words, the zone prefix (defined using the zone prefix command) determines the routing to a zone and, once there, the technology prefix (defined using the gw-type-prefix command) determines the gateway to be used in that zone. The zone prefix takes precedence over the technology prefix.
This behavior can be overridden by associating a forced hop-off zone with a particular technology prefix. Associating a forced hop-off zone with a particular technology prefix forces the call to the specified zone, regardless of what the zone prefix in the address is. As an example, you are in the 408 area code and want callers to the 212 area code in New York to use H.323-over-IP and hop off there because it saves on costs. However, the only H.320 gateway is in Denver. In this example, calls to H.320 endpoints must be forced to hop off in Denver, even if the destination H.320 endpoint is in the 212 area code. You can define the gateway type prefix for H.320 gateways as one that is always forced to the Denver zone. The forced hop-off zone can either be a local zone (that is, one that is managed by the local gatekeeper) or a remote zone.
Each of the following sections describes a reason for using the proxy feature in an H.323 network:
When terminals signal each other directly, they must have direct access to each other's addresses. This exposes an attacker to key information about a network. When a proxy is used, the only addressing information that is exposed to the network is the address of the proxy; all other terminal and gateway addresses are hidden.
There are several ways to use a proxy with a firewall to enhance your network security. The configuration that you choose depends on how capable your firewall is of handling the complex H.323 protocol suite. Each of the following sections describes a common configuration for using the proxy with a firewall:
H.323 is a complex, dynamic protocol consisting of several interrelated subprotocols. During H.323 call setup, the ports and addresses released with this protocol require a detailed inspection as the setup progresses. If the firewall does not support this dynamic access control based on the inspection, you can use a proxy just inside your firewall. The proxy provides a simple access control scheme, as illustrated in Figure 48.

Because the gatekeeper (using RAS) and the proxy (using call setup protocols) are the only endpoints that communicate with other devices outside the firewall, it is simple to set up a tunnel through the firewall to allow traffic destined for either of these two endpoints.
If H.323 terminals exist in an area with local, interior addresses that must be translated to valid exterior addresses, then the firewall must be capable of decoding and translating all addresses passed in the various H.323 protocols. If the firewall is not capable of this translation task, a proxy may be placed next to the firewall in a co-edge mode. In this configuration, interfaces lead to both inside and outside networks. (See Figure 49.)

In co-edge mode, the proxy can present a security risk. To avoid exposing your network to unsolicited traffic, configure the proxy to route only proxied traffic. In other words, the proxy only routes H.323 protocol traffic that is terminated on the inside and then repeated to the outside. You can configure this for traffic moving in the opposite direction as well.
If you would like to place the proxy and gatekeeper outside your firewall, two conditions must exist. First, your firewall must support H.323 dynamic access control. Second, Network Address Translation (NAT) must not be in use.
If NAT is in use, each endpoint must register with the gatekeeper for the duration of the time it is online. This will quickly overwhelm the firewall because a large number of relatively static, internal-to-external address mappings are maintained.
If the firewall does not support H.323 dynamic access control, you could configure the firewall with static access lists that allow traffic from the proxy or gatekeeper through the firewall. This can present a security risk if an attacker can spoof, or simulate, the IP addresses of the gatekeeper or proxy and use them to attack the network. Figure 50 illustrates proxy outside the firewall.

When a firewall is providing NAT between an internal and an external network, proxies may allow H.323 traffic to be handled properly, even in the absence of a firewall that can translate addresses for H.323. Table 9 and Table 10 provide guidelines for proxy deployment with NAT.
| For Networks Using NAT | Firewall with H.323 NAT | Firewall Without H.323 NAT |
|---|---|---|
Firewall with Dynamic Access Control | Gatekeeper and proxy inside the firewall. | Co-edge gatekeeper and proxy. |
Firewall Without Dynamic Access Control | Gatekeeper and proxy inside the firewall with static access lists on the firewall. | Co-edge gatekeeper and proxy. |
| For Networks Not Using NAT | Firewall with H.323. NAT | Firewall Without H.323 NAT |
|---|---|---|
Firewall with Dynamic Access Control | Gatekeeper and proxy inside the firewall. Gatekeeper and proxy outside the firewall. | Gatekeeper and proxy inside the firewall. Gatekeeper and proxy outside the firewall. |
Firewall Without Dynamic Access Control | Gatekeeper and proxy inside the firewall with static access lists on the firewall. | Gatekeeper and proxy inside the firewall with static access lists on the firewall. |
When two H.323 terminals communicate directly, the resulting call quality can range from good (for high-bandwidth intranets) to poor (for most calls over the public network). As a result, deployment of H.323 is almost always predicated on the availability of some high-bandwidth, low-delay, low-packet-loss network that is either separate from the public network or runs overlaid with the network as a premium service with adequate QoS.
Adequate QoS usually requires terminals that know how to signal such premium services. There are two major ways to achieve such signalling:
Unfortunately, the vast majority of H.323 terminals cannot achieve signalling in either of these ways.
You can configure the proxy to use any combination of RSVP and IP precedence bits.
The proxy is not capable of modifying the QoS between the terminal and itself. To achieve the best overall QoS, you should ensure that terminals are connected to the proxy using a network that intrinsically has good QoS. In other words, you can configure a path between a terminal and proxy that provides good bandwidth, delay, and packet-loss characteristics without the terminal needing to request special QoS. A high-bandwidth LAN works well for this.
In order to achieve adequate QoS, you may deploy a separate network that is partitioned away from the standard data network. The proxy can take advantage of such a partitioned network using a feature known as application-specific routing (ASR).
ASR is simple. When the proxy receives outbound traffic, it directs traffic to an interface connected directly to the QoS network. The proxy does not send the traffic using an interface specified for the regular routing protocol. Similarly, inbound traffic from other proxies is received on the interface connected to the QoS network. This is true as long as all of these other proxies around the QoS network use ASR in a consistent fashion. ASR then ensures that ordinary traffic is not routed into the QoS network by mistake.
Implementation of ASR ensures the following:
![]() |
Note ASR is not supported on Frame Relay or ATM interfaces for the Cisco MC3810 platform. |
To configure Multimedia Conference Manager, perform the tasks in the following sections. The tasks in these two sections are required.
See the end of this chapter for the "Multimedia Conference Manager Configuration Examples" section.
To configure gatekeepers in Multimedia Conference Manager, perform the tasks in the following sections. All of the tasks listed are required.
| Command | Purpose | |
|---|---|---|
Step 1 | Router#configure terminal | Enters global configuration mode. |
Step2 | Router(config)#gatekeeper | Enters gatekeeper configuration mode. |
Step3 | Router(config-gk)#zone prefix gatekeeper-name e164-prefix [gw-priority pri-0-to-10 gw-alias [gw-alias, ...]] | Adds a prefix to the gatekeeper zone list. |
Step4 | Router(config-gk)#zone local gatekeeper-name domain-name | Creates the gatekeeper name. |
Step5 | Router(config-gk)#zone subnet local-gatekeeper-name
subnet-address {/bits-in-mask | mask-address} enable
| Defines a set of subnets that constitute the gatekeeper zone. Enables the gatekeeper for each of these subnets, and disables it for all other subnets.(Repeat for all subnets.) or Defines the zone as being all but a set of subnets by disabling a set of subnets and enabling all others. (Repeat for all subnets.) or Accepts the default behavior, which is that all subnets are enabled. |
Step6 | Router(config-gk)#no shutdown | Brings the gatekeeper online. |
The local-gatekeeper-name argument should be a DNS host name if DNS is to be used to locate remote zones.
You can use the zone subnet command more than once to create a list of subnets controlled by a gatekeeper. The subnet masks need not match actual subnets in use at your site. For example, to specify a particular endpoint, you can supply its address with a 32-bit netmask.
If a local gatekeeper name is contained in the message, it must match the local-gatekeeper-name argument.
![]() |
NoteIf you want to explicitly enable or disable a particular endpoint, specify its host address with a 32-bit subnet mask. |
This section describes two ways for setting up intergatekeeper communication:
To configure intergatekeeper communication using DNS, use the following commands starting in EXEC mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router#configure terminal | Enters global configuration mode. |
Step2 | Router(config)#ip name-server dns-server-name | Specifies the DNS server address. |
Step3 | Router(config)#ip domain-name domain name | Sets the default domain name for the Cisco IOS. |
For all gatekeepers in the system, enter into DNS a text record of the form:
ras [gk-id@] host [:port] [priority]
The gk-id argument is an optional gatekeeper ID. If the optional gatekeeper ID is not specified, host is used as the gatekeeper ID.
The host argument is either an IP address or the actual host name of the gatekeeper in the form host.some_domain.com.
The port argument, if specified, should be some port number other than RAS port 1719.
The priority argument specifies the order in which the listed gatekeepers should be searched for endpoints. Gatekeepers with lower priorities are searched before those with higher numbers.
How you enter the text record for a particular domain depends on the DNS implementation. The following examples are for the Berkeley Internet Name Domain (BIND). These records are typically entered into the "hosts" database:
zone1.com in txt "ras gk.zone1.com"
zone2.com in txt "ras gk2@gk.zone2.com"
zone3.com in txt "ras gk3@gk.zone3.com:1725"
zone4.com in txt "ras gk4@gk.zone4.com:1725 123"
zone5.com in txt "ras gk5@101.0.0.1:1725"
If you choose not to use DNS, or DNS is unavailable, you can configure intergatekeeper communication manually. To configure intergatekeeper manual communication, use the following commands beginning in gatekeeper configuration mode for every other gatekeeper in the network:
| Command | Purpose |
|---|---|
Router(config-gk)#zone remote other-gatekeeper-name other-domain-name other-gatekeeper-ip-address [port-number] | Configures inter-gatekeeper communication with other gatekeepers in your network. Enter this command for each gatekeeper. |
By default, a gatekeeper will offer a local proxy IP address when queried by a remote gatekeeper (synonymous with remote zone). Offering a local proxy IP address when queried is considered proxied access. By using the zone access command, you can configure the local gatekeeper to offer the local endpoint address instead of the local proxy address. Offering the local endpoint address is considered direct access.
![]() |
NoteThe zone access command, configured on your local gatekeeper, only affects the use of proxies for incoming calls (that is, it does not affect the use of local proxies for outbound calls). When originating a call, a gatekeeper will use a proxy only if the remote gatekeeper offers a proxy at the remote end. A call between two endpoints in the same zone will always be a direct (nonproxied) call. |
To make your local zone directly accessible to a small set of remote zones and accessible using proxies to all other remote zones, use the following commands in gatekeeper configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router(config-gk)#zone access local-zone-name remote-zone remote-zone-name direct | Makes your local zone directly accessible to a remote zone (proxies not required). Repeat this command for each remote zone that you wish to give direct access to your local zone. |
Step2 | Router(config-gk)#zone access local-zone-name default proxied | Makes your local zone accessible via proxy to all other remote zones. |
To make your local zone accessible using proxies to a small set of remote zones and directly accessible to all other remote zones, use the following commands in gatekeeper configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router(config-gk)#zone access local-zone-name remote-zone remote-zone-name proxied | Makes your local zone accessible via proxies to a remote zone. Repeat this command for each remote zone that you wish to give proxied access to your local zone. |
Step2 | Router(config-gk)#zone access local-zone-name default direct | Makes your local zone directly accessible to all other remote zones. |
In some cases, a particular terminal or endpoint's registration information is not accessible from any gatekeeper. This inaccessible registration information may be because the endpoint does not use RAS, is in an area where no gatekeeper exists, or is in a zone where the gatekeeper addressing is unavailable either through DNS or through configuration.
These endpoints can still be accessed via a gatekeeper by entering them as static nodes. To enter the endpoints as static nodes, obtain the endpoint's address and then use the following commands in gatekeeper configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router(config-gk)#zone local gatekeeper-name domain-name | Defines your local zone. |
Step2 | Router(config-gk)#alias static ip-signaling-addr port gkid gatekeeper-name terminal h323id h323-id | Creates a static entry in your local alias table for an H.323ID. Repeat this step for each H.323ID you want to add for the endpoint. |
Step3 | Router(config-gk)#alias static ip-signaling-addr port gkid gatekeeper-name terminal e164 e164-address | Creates a static entry in your local alias table for each E.164 address. Repeat this step for each E.164 address you want to add for the endpoint. |
To identify H.323 users via RADIUS, use the following commands in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router(config)#aaa new-model | Enables AAA services. |
Step2 | Router(config)#aaa authentication login h323 radius | Enables login authentication for H.323 users via RADIUS. |
Step3 | Router(config)#radius-server host {hostname |
ip-address}
| Specifies the RADIUS server. |
Step4 | Router(config)#radius-server string keystring | Specifies the RADIUS server key. |
Step5 | Router(config)# gatekeeper | Enters gatekeeper configuration mode. |
Step6 | Router(config-gk)#security h323-id | Identifies users by their H.323 ID. Identifies users by their E.164 address. Identifies users by either their E.164 address or H.323 ID. |
Step7 | Router(config-gk)# security password default password | Defines a default security password. Identifies users by their H.323 ID. |
After you complete the previous steps, enter each user into the RADIUS database, using either the default password if using the security password default command, or actual passwords if using the piggybacked password mechanism as the RADIUS authentication for that user. Enter either the user H.323-ID or E.164 address, depending on how you configured the gatekeeper.
For more information about configuring AAA services or RADIUS, refer to the Cisco IOS Security Configuration Guide.
After AAA has been enabled, and the gateway has been configured to recognize RADIUS as the remote security server providing authentication services, the next step is to configure the gateway to report user activity to the RADIUS server in the form of connection accounting records. To send connection accounting records to the RADIUS server, use the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router(config)#aaa accounting connection start-stop radius | Enables connection accounting mode using RADIUS. |
Step2 | Router(config)# gatekeeper | Enters gatekeeper configuration mode. |
Step3 | Router(config-gk)#accounting | Enables gatekeeper accounting. |
For more information about AAA connection accounting services, refer to the Cisco IOS Security Configuration Guide.
With Cisco IOS Release 12.0(3)T and later, you can configure interzone routing using E.164 addresses. To configure interzone routing in the E.164 address space, use the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router#gatekeeper | Enters gatekeeper configuration mode. |
Step2 | Router(config-gk)#zone local gatekeeper-name domain-name | Creates the local gatekeeper name. |
Step3 | Router(config-gk)#zone remote other-gatekeeper-name other-domain-name other-ip-address [port-number] | Creates the remote gatekeeper name. |
Step4 | Router(config-gk)#zone prefix gatekeeper-name e164-prefix | Configures knowledge of the zone prefixes. |
Step5 | Router(config-gk)#gw-type-prefix type-prefix [hopoff gkid] [default-technology] [[gwipaddr ipaddr [port]]] ... | Defines technology prefixes. |
This section describes the following configuration tasks for configuring the proxy. Depending on your specific network design, either the first task or the second task is required.
To start the proxy without ASR, you must start the proxy, then define the H.323 name, zone, and QoS parameters on the interface whose IP address the proxy will use. To start the proxy without ASR, use the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router(config)#proxy h323 | Starts the proxy. |
Step2 | Router(config)#interface type number | Enters interface configuration mode on the interface whose IP address is to be used by the proxy. |
Step3 | Router(config-int)#h323 interface | Signals the proxy that this interface IP address is the one to use. |
Step4 | Router(config-int)#h323 h323-id h323-id | Configures the proxy name. (More than one name can be configured if necessary.) |
Step5 | Router(config-int)#h323 gatekeeper [id gatekeeper-id] ipaddr ipaddr | Sets up the zone in which the proxy will run unicast gatekeeper discovery. Sets up the zone in which the proxy will run multicast gatekeeper discovery. |
Step6 | Router(config-int)#h323 qos ip-precedence value | Configures IP Precedence. |
Step7 | Router(config-int)#h323 qos rsvp controlled-load | Configures RSVP. Sets up RSVP with controlled-load class of service. or Sets up RSVP with guaranteed class of service. |
Step8 | Router(config-int)# ip route-cache same-interface | For every interface, enables fast switching for packets received and forwarded on the same interface. |
If you want to enable ASR on the proxy, you must start the proxy, then define the H.323 name, zone, and QoS parameters on the loopback interface. You must then determine which interface is to route the H.323 traffic and configure ASR on it. The ASR interface and all other interfaces must be separated so that they never propagate routing information between each other. There are two different ways to separate the ASR interface and all other interfaces:
To ensure that the ASR interface and all other interfaces never route packets between each other, you must also configure an access control list. (The proxy traffic will be routed specially because it is always addressed to the loopback interface first, then translated by the proxy subsystem.)
To start the proxy with ASR enabled on the proxy using one type of routing protocol on the ASR interface and another on all of the non-ASR interfaces, with the loopback subnet included in both routing domains, use the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router(config)#proxy h323 | Starts the proxy. |
Step2 | Router(config)#interface Loopback0 | Enters loopback interface configuration mode. |
Step3 | Router(config-int)#ip address ipaddr subnet-mask | Defines the interface subnet. |
Step4 | Router(config-int)#h323 interface | Signals the proxy that this interface IP address is the one to use. |
Step5 | Router(config-int)#h323 h323-id h323-id | Configures the proxy name. (More than one name can be configured if necessary.) |
Step6 | Router(config-int)#h323 gatekeeper [id gatekeeper-id] ipaddr ipaddr | Sets up the zone in which the proxy will run unicast gatekeeper discovery. Sets up the zone in which the proxy will run multicast gatekeeper discovery. |
Step7 | Router(config-int)#h323 qos ip-precedence value | Configures IP Precedence. |
Step8 | Router(config-int)#h323 qos rsvp controlled-load | Configures RSVP. Sets up RSVP with controlled-load class of service. or Sets up RSVP with guaranteed class of service. |
Step9 | Router(config-int)#interface type number | If ASR is to be used, enters interface configuration mode on the interface through which outbound H.323 traffic should be routed. |
Step10 | Router(config-int)#h323 asr | Enables ASR with no bandwidth limitations. Enables ASR and limits the total bandwidth of H.323 traffic through the ASR interface. |
Step11 | Router(config-int)#ip address asr-addr asr-subnet-mask | Sets up the ASR interface network number. |
Step12 | Router(config-int)#exit(or press Ctrl-Z) | Returns to global configuration mode. |
Step13 | Router(config)#interface type number | Enters interface configuration mode on a non-ASR interface. |
Step14 | Router(config-int)#ip address non-asr-addr non-asr-subnet-mask | Sets up a non-ASR interface network number. |
Step15 | Router(config-int)#exit(or press Ctrl-Z) | Returns to global configuration mode. |
Step16 | Router(config)#router rip | Configures RIP for a non-ASR interface. |
Step17 | Router(config)#network non-asr-addr | Includes a non-ASR interface in RIP domain. |
Step18 | Router(config)#network loopback-addr | Includes a loopback interface in RIP domain. |
Step19 | Router(config)#router igrp asr-autonomous-system-number | Configures IGRP for an ASR interface. |
Step20 | Router(config)#network asr-addr | Includes an ASR interface in an IGRP domain. |
Step21 | Router(config)#network loopback-addr | Includes a loopback interface in an IGRP domain. |
Step22 | Router(config)#access-list access-list-number permit ip host loopback-address anyRouter(config)#access-list access-list-number permit ip any host loopback-addressRouter(config)#access-list access-list-number permit igrp any any1 | Creates an access list. |
Step23 | Router(config)#interface type number | Enters interface configuration mode on an ASR interface. |
Step24 | Router(config-int)#ip access-group access-list-number out | Sets the outbound access group. |
Step25 | Router(config-int)#ip access-group access-list-number in | Sets the inbound access group. |
Step26 | Router(config-int)#exit(or press Ctrl-Z) | Leaves ASR interface configuration mode. |
| 1You may replace igrp with the appropriate routing protocol in use on the ASR interface. |
![]() |
NoteASR is not supported on Frame Relay or ATM interfaces for the Cisco MC3810 platform. |
To start the proxy with ASR enabled on the proxy, using two different autonomous systems, one that contains the ASR network and the loopback network, the other that contains the other non-ASR networks and loopback network, use the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router(config)#proxy h323 | Starts the proxy. |
Step2 | Router(config)#interface Loopback0 | Enters loopback interface configuration mode. |
Step3 | Router(config-int)#ip address ipaddr subnet-mask | Defines the interface subnet. |
Step4 | Router(config-int)#h323 interface | Signals the proxy that this interface IP address is the one to use. |
Step5 | Router(config-int)#h323 h323-id h323-id | Configures the proxy name. (More than one name can be configured if necessary.) |
Step6 | Router(config-int)#h323 gatekeeper [id gatekeeper-id] ipaddr ipaddr | Sets up the zone in which the proxy will run unicast gatekeeper discovery. Sets up the zone in which the proxy will run multicast gatekeeper discovery. |
Step7 | Router(config-int)#h323 qos ip-precedence value | Configures IP Precedence. |
Step8 | Router(config-int)#h323 qos rsvp controlled-load | Configures RSVP. Sets up RSVP with controlled-load class of service. or Sets up RSVP with guaranteed class of service. |
Step9 | Router(config-int)#interface type number | If ASR is to be used, enters interface configuration mode on the interface through which outbound H.323 traffic should be routed. |
Step10 | Router(config-int)#h323 asr | Enables ASR with no bandwidth limitations. Enables ASR and limits the total bandwidth of H.323 traffic through the ASR interface. |
Step11 | Router(config-int)#ip address asr-addr asr-subnet-mask | Sets up the ASR interface network number. |
Step12 | Router(config-int)#exit(or press Ctrl-Z) | Returns to global configuration mode. |
Step13 | Router(config)#interface type number | Enters interface configuration mode on a non-ASR interface. |
Step14 | Router(config-int)#ip address non-asr-addr non-asr-subnet-mask | Sets up a non-ASR interface network number. |
Step15 | Router(config-int)#exit(or press Ctrl-Z) | Returns to global configuration mode. |
Step16 | Router(config)#router igrp non-asr-autonomous-system-number | Configures IGRP for a non-ASR interface. |
Step17 | Router(config)#network non-asr-addr | Includes a non-ASR interface in an IGRP domain. |
Step18 | Router(config)#network loopback-addr | Includes a loopback interface in an IGRP domain. |
Step19 | Router(config)#router igrp asr-autonomous-system-number | Configures IGRP for an ASR interface. |
Step20 | Router(config)#network asr-addr | Includes an ASR interface in an IGRP domain. |
Step21 | Router(config)#network loopback-addr | Includes a loopback interface in an IGRP domain. |
Step22 | Router(config)#access-list access-list-number permit ip host loopback-address anyRouter(config)#access-list access-list-number permit ip any host loopback-addressRouter(config)#access-list access-list-number permit igrp any any1 | Creates an access list. |
Step23 | Router(config)#interface type number | Enters interface configuration mode on an ASR interface. |
Step24 | Router(config-int)#ip access-group access-list-number out | Sets the outbound access group. |
Step25 | Router(config-int)#ip access-group access-list-number in | Sets the inbound access group. |
Step26 | Router(config-int)#exit(or press Ctrl-Z) | Leaves ASR interface configuration mode. |
| 1You may replace the igrp keyword with the appropriate routing protocol in use on the ASR interface. |
Multimedia Conference Manager complies with the mandatory requirements and several of the optional features of the H.323 Version 2 specification. Future releases will add more H.323 Version2 features to the Cisco IOS software.
In Cisco IOS Release 12.1, the following H.323 Version 2 features are supported:
The H.323 Version 2 Support in Multimedia Conference Manager feature contains the following configuration tasks. The first two tasks listed are required; the last task listed is optional.
To add a prefix to a gatekeeper zone list, use the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router(config)#gatekeeper | Enters gatekeeper configuration mode. |
Step2 | Router(config-gk)#zone prefix gatekeeper-name e164-prefix [gw-priority pri-0-to-10 gw-alias [gw-alias, ...]] | Adds a prefix to the gatekeeper zone list. |
![]() |
NoteNote that the zone prefix command matches a prefix to a gateway. It does not register the gateway. The gateway must register with the gatekeeper before calls can be completed through that gateway. |
To view the prefixes added to the gatekeeper zone list, use the show gatekeeper zone prefix command. To see gatekeeper zone information, use the show gatekeeper zone status command.
By default, a gatekeeper will offer the IP address of the local proxy when queried by a remote gatekeeper (synonymous with remote zone). Offering the IP address of the local proxy is considered proxied access. In the previous version of MCM, you configure the local gatekeeper to offer the address of the local endpoint instead of the address of the local proxy (considered direct access) by using the zone access command. In the H.323 Version 2 Support in Multimedia Conference Manager feature, the use-proxy command replaces the zone access command.
The use-proxy command enables you to configure a proxy for inbound calls from remote zones to gateways in its local zone and to configure a proxy for outbound calls from gateways in its local zone to remote zones.
To configure inbound or outbound gatekeeper proxied access, use the following commands beginning in global configuration mode:
| Command | Purpose | |
|---|---|---|
Step1 | Router(config)#gatekeeper | Enters gatekeeper configuration mode. |
Step2 | Router(config-gk)#use-proxy local-zone-name
{default | remote-zone remote-zone-name}{inbound-to
| outbound-from}{gateway | terminal}
| Enables proxy communications for calls between local and remote zones. |
![]() |
NoteWhen a previous version of gatekeeper is upgraded, any zone access commands are translated to the corresponding use-proxy commands. |
Use the show gatekeeper zone status command to see information about the configured gatekeeper proxies and gatekeeper zone information.
The following is sample output from the show gatekeeper proxy status command.
router# show gatekeeper zone status
GATEKEEPER ZONES
================
GK name Domain Name RAS Address PORT FLAGS MAX-BW CUR-BW
(kbps) (kbps)
------- ----------- ----------- ---- ----- ------ ------
sj.xyz.com xyz.com 1.14.93.85 1719 LS 0
SUBNET ATTRIBUTES :
All Other Subnets :(Enabled)
PROXY USAGE CONFIGURATION :
inbound Calls from germany.xyz.com :
to terminals in local zone sj.xyz.com :use proxy
to gateways in local zone sj.xyz.com :do not use proxy
Outbound Calls to germany.xyz.com
from terminals in local zone germany.xyz.com :use proxy
from gateways in local zone germany.xyz.com :do not use proxy
Inbound Calls from all other zones :
to terminals in local zone sj.xyz.com :use proxy
to gateways in local zone sj.xyz.com :do not use proxy
Outbound Calls to all other zones :
from terminals in local zone sj.xyz.com :do not use proxy
from gateways in local zone sj.xyz.com :do not use proxy
tokyo.xyz.co xyz.com 172.21.139.89 1719 RS 0
milan.xyz.co xyz.com 171.69.57.90 1719 RS 0
To force a disconnect on an MCM gatekeeper, use the following command beginning in gatekeeper configuration mode:
| Command | Purpose |
|---|---|
Router(config-gk)#clear h323 gatekeeper call {all |
local-callID local-callID}
| Forces a disconnect on a specific call or all calls currently active on this MCM gatekeeper. |
If you want to force a particular call to be disconnected (as opposed to all active calls on the MCM gateway), use the local call identification number (CallID) to identify that specific call. You can find the local CallID number for a specific call by using the show gatekeeper calls command; the ID number is displayed in the LocalCallID column.
To show the status of each ongoing call that a gatekeeper is aware of, use the show gatekeeper calls command. If you have forced a disconnect for either a particular call or all calls associated with a particular MCM gatekeeper, the system will not display information about those calls.
The following is sample output from the show gatekeeper calls command:
router# show gatekeeper calls Total number of active calls =1 Gatekeeper Call Info ==================== LocalCallIDAge (secs)BW 12-3339 94 768 (Kbps) Endpt(s): AliasE.164AddrCallSignalAddrPortRASSignalAddrPort src EP: epA 10.0.0.11172010.0.0.111700 dst EP: epB2zoneB.com src PX: pxA 10.0.0.1172010.0.0.1124999 dst PX: pxB 172.21.139.901720172.21.139.9024999
This section includes the following sample configurations:
Following is an annotated example of how to configure a gatekeeper:
hostname gk-eng.xyz.com ! This router serves as the gatekeeper for the engineering community ! at xyz.com. ip domain-name xyz.com ! domain name of this company interface Ethernet0 ip address 172.21.127.27 255.255.255.0 ! This gatekeeper can be found at address 172.21.127.27 gatekeeper ! Enter gatekeeper config mode zone local gk-eng.xyz.com xyz.com ! Because a zone is, by definition, the area of control of a gatekeeper, ! we tend to use the terms "zone name" and "gatekeeper name" synonymously. ! Here we use the host name as the name of the gatekeeper and zone. ! This is not necessary, but does simplify administration. zone remote gk-mfg.xyz.com xyz.com 171.120.1.4 1719 zone remote gk-corp.xyz.com xyz.com 170.124.3.80 1719 ! A couple of other zones within xyz.com. We make lots of calls ! between these departments, so we just configure these so we save ! a little time bypassing DNS lookup to find their gatekeepers. zone access gk-eng.xyz.com remote-zone gk-mfg.xyz.com direct zone access gk-eng.xyz.com remote-zone gk-corp.xyz.com direct zone access gk-eng.xyz.com default proxied ! We have good QoS on our local network, so we don't need proxies when ! calling between the xyz.com zones. But for all other zones, we want ! to use proxies. zone subnet gk-eng.xyz.com 172.21.127.0/24 enable no zone subnet gk-eng.xyz.com default enable ! We will accept registrations from our local subnet as long as they ! do not specify some other gatekeeper name. We will not accept any ! registrations from any other subnet. zone bw gk-eng.xyz.com 2000 ! Preserve our good QoS by not allowing excessive amounts of H.323 traffic ! on the local network. This restricts the traffic within our zone, ! for both intra-zone and interzone calls, to 2 kbps at any given time. alias static 172.21.127.49 gkid gk-eng.xyz.com terminal h323id joeblow ras 172.21.127.49 1719 ! The "user" has an H.323 terminal, which does not support RAS. So we have ! to configure his alias manually so that callers can find him.
With Cisco IOS Release 12.0(3)T and later, you can configure interzone routing using E.164 addresses.
In this example, there are two gatekeepers, one in San Jose and one in New York that need to be able to resolve E.164 addresses. (See Figure 51.)

In sj (San Jose in the 408 area code), the gateways are configured to register with gk-sj as follows:
Similarly, in ny (New York in the 212 area code), gateways are configured to register with gk-ny as follows:
For the gatekeeper for San Jose, the configuration commands are as follows:
gatekeeper
zone local gk-sj cisco.com
zone remote gk-ny cisco.com 172.21.127.27
zone access gk-sj default direct
zone prefix gk-sj 408.......
zone prefix gk-ny 212.......
gw-type-prefix 3# hopoff gk-sj
gw-type-prefix 4# default-technology
For the gatekeeper for New York, the configuration commands are as follows:
gatekeeper
zone local gk-ny cisco.com
zone remote gk-sj cisco.com 172.21.1.48
zone access gk-ny default direct
zone prefix gk-sj 408.......
zone prefix gk-ny 212.......
gw-type-prefix 3# hopoff gk-ny
gw-type-prefix 4# default-technology
When a call is presented to gatekeeper gk-sj with the following target address in San Jose:
2#2125551212
Gatekeeper gk-sj recognizes that 2# is a technology prefix. It was not configured as such, but because gw-sj2 registered with it, the gatekeeper now treats 2# as a technology prefix. It strips the prefix, which leaves the telephone number 2125551212. This is matched against the zone prefixes that have been configured. It is a match for 212......., so gk-sj knows that gk-ny handles this call. gk-sj forwards the entire address 2#2125551212 over to gk-ny, which also looks at the technology prefix 2#, and routes it to gw-ny2.
When a call is presented to gatekeeper gk-sj with the following target address in San Jose:
2125551212
Gatekeeper gk-sj checks it against known technology prefixes, but finds no match. It then checks it against zone prefixes and matches on 212....... for gk-ny, and so routes this call to gk-ny. gk-ny does not have any local registrations for this address, and there is no technology prefix on the address, but the default prefix is 4#, and gw-ny4 is registered with 4#, so the call gets routed to gw-ny4.
Another call is presented to gatekeeper gk-sj with the following target address in San Jose:
3#2125551212
The call bears technology prefix 3#, which is defined as a local hopoff prefix, so gk-sj routes this call to gw-sj3, despite the fact that it bears a New York zone prefix.
In this last example, a call is presented to gatekeeper gk-sj with the following target address in San Jose:
6505551212
Gatekeeper gk-sj checks for a technology prefix match, but does not find one. It then searches for a zone prefix match, and fails again. But there is a match for default gateway prefix of 4#, and gw-sj4 is registered with 4#, so the call is routed out on gw-sj4.
Cisco routers support HSRP, which allows one router to serve as a backup to another router. With CiscoIOS Release12.0(3)T and later, you can configure Cisco gatekeepers to use HSRP so that when one gatekeeper fails the standby gatekeeper assumes its role.
To configure a gatekeeper to use HSRP, you need to perform the following tasks:
As long as both gatekeepers are up, the one with the higher priority on its HSRP interface will be the active gatekeeper. If this active gatekeeper fails, or if its HSRP interface fails, the standby HSRP interface assumes the virtual HSRP address and, with it, the active gatekeeper role. When the gatekeeper with the higher HSRP priority comes back online, it reclaims the HSRP virtual address and the gatekeeper function, while the secondary gatekeeper goes back to standby status.
![]() |
NoteGatekeeper failover will not be completely transparent to endpoints and gatekeepers. When the standby gatekeeper takes over, it does not have the state of the failed gatekeeper. If an endpoint that had registered with the failed gatekeeper now makes a request to the new gatekeeper, the gatekeeper responds with a reject, indicating that it does not recognize the endpoint. The endpoint must reregister with the new gatekeeper before it can continue H.323 operations. |
This sample configuration uses Ethernet 0 as the HSRP interface on both gatekeepers.
On the primary gatekeeper, enter these commands:
configure terminal ! enter configuration mode interface e0 ! enter interface configuration mode for interface e0 standby 1 ip 172.21.127.55
! member of standby group 1, sharing virtual address 172.21.127.55 standby 1 preempt
! claim active role when it has higher priority standby 1 timers 5 15
! hello timers is 5 seconds, hold timer is 15 seconds standby 1 priority 110
! priority is 110
On the backup gatekeeper, enter these commands:
configure terminal int e0 standby 1 ip 172.21.127.55 standby 1 preempt standby 1 timers 5 15
The configurations are identical except that gk2 has no standby priority configuration, so it assumes the default priority of 100---meaning that gk1 has a higher priority.
On both gk1 and gk2, set up identical gatekeeper mode configurations, as follows:
configure terminal
! enter config mode gatekeeper ! enter gatekeeper config mode zone local gk-sj cisco.com 172.21.127.55
! define local zone using HSRP virtual address as gatekeeper's RAS address. ...
! various other gk-mode configurations no shut
! bring up the gatekeeper configure terminal
! enter config mode gatekeeper
! enter gatekeeper config mode zone local gk-sj cisco.com 172.21.127.55
! define local zone using HSRP virtual address as gatekeeper's RAS address.
! Note this uses the same gkname and address as on gk1. ...
! various other gk-mode configurations no shut
! bring up the gatekeeper
![]() |
NoteThe no shut command is issued on both gatekeepers, primary and secondary. If you issue the show gatekeeper status command on the two gatekeepers, you see on gk1: Gatekeeper State: UP but on gk2 you see: Gatekeeper State: HSRP STANDBY |
The examples in this section create a separate, multimedia backbone network dedicated to transporting only H.323 traffic. The closed functionality of the H.323 proxy is necessary for creating this type of backbone. You can place a closed H.323 proxy on each edge of the multimedia backbone to achieve the following goals:
Figure 52 illustrates a network with a multimedia backbone. A gatekeeper (not shown) in the edge network (zone) directs all out-of-zone H.323 calls to the closed proxy on the edge of that network. The closed proxy forwards this traffic to the remote zone through the multimedia backbone. A closed proxy and the edge router may reside in the same Cisco router, or may be in separate routers, as shown in the figure.

To enable the proxy to forward H.323 packets received from the edge network to the multimedia backbone, designate the interface connecting the proxy to the multimedia backbone to the ASR interface by entering the h323 asr command in interface configuration mode. Enabling the proxy to forward H.323 packets satisfies the first goal identified earlier in this section.
Because the proxy terminates two call legs of an H.323 call and bridges them, any H.323 packet traversing the proxy will have the proxy address either in its source field or in its destination field.
To prevent problems that can occur in proxies with multiple IP addresses, designate only one interface to be the proxy interface by entering the h323 interface command in interface configuration mode. Then all H.323 packets originating from the proxy will have the address of this interface in their source field, and all packets destined to the proxy will have the address of this interface in their destination field.
Figure 52 illustrates that all physical proxy interfaces belong either to the multimedia network or to the edge network. These two networks must be isolated from each other in order for the proxy to be closed; however, the proxy interface must be addressable from both the edge network and the multimedia network. For this reason, you must create a loopback interface on the proxy and configure it to the proxy interface.
It is possible to make the loopback interface addressable from both the edge network and the multimedia network without exposing any physical subnets on one network to routers on the other network. Only packets originating from the proxy or packet destined to the proxy can pass through the proxy's interface to the multimedia backbone in either direction. All other packets are considered unintended packets and are dropped. This can be achieved by configuring access control lists (ACLs) so that the closed proxy acts like a firewall that only allows H.323 packets to pass through the ASR interface. This satisfies the second goal identified earlier in this section.
Now you need only to configure the network such that non-H.323 traffic never attempts to traverse the multimedia backbone and so never risks being dropped by the proxy. This is achieved by completely isolating the multimedia network from all edge networks and from the data backbone, and is done by configuring routing protocols on the various components of the networks.
The example provided in Figure 52 requires availability of six IP address classes, one for each of the four autonomous systems and one for each of the two loopback interfaces. Any Cisco-supported routing protocol can be used on any of the autonomous systems, with one exception: RIP cannot be configured on two adjacent autonomous systems because this protocol does not understand the concept of an autonomous system. The result would be the merging of the two autonomous systems into one.
If the number of IP addresses are scarce, you can use subnetting, but the configuration can get complicated. In this case only the Enhanced IGRP, OSPF, and RIP Version 2 routing protocols, which allow variable-length subnet masks (VLSMs), can be used.
Assuming these requirements are met, you can configure the network depicted in Figure 52 as follows:
In some topologies you can configure the two edge networks and the data backbone as a single autonomous system, but it is preferable to separate them as previously described because they are different networks with different characteristics.
The following examples illustrate the router configuration that is relevant to the closed proxy operation.
See Figure 53 and the following sample configurations to learn how to configure RIP on the two edge networks, and IGRP on the two backbone networks.

PX1 Configuration
! proxy h323 ! interface Loopback0 ip address 101.0.0.1 255.0.0.0 !Assume PX1 is in Zone 1, and the gatekeeper resides in the same routers as PX1: h323 interface h323 h323-id PX1@zone1.com h323 gatekeeper ipaddr 101.0.0.1 ! interface Ethernet0 ip address 172.20.0.1 255.255.0.0 ! interface Ethernet1 ip address 172.22.0.1 255.255.0.0 ip access-group 101 in ip access-group 101 out h323 asr ! router rip network 172.20.0.0 network 101.0.0.0 ! router igrp 4000 network 172.22.0.0 network 101.0.0.0 ! access-list 101 permit ip any host 101.0.0.1 access-list 101 permit ip host 101.0.0.1 any access-list 101 permit igrp any any
R1 Configuration
! interface Ethernet0 ip address 172.20.0.2 255.255.0.0 ! interface Ethernet1 ip address 172.21.0.1 255.255.0.0 ! router rip redistribute igrp 5000 metric 1 network 172.20.0.0 ! router igrp 5000 redistribute rip metric 10000 10 255 255 65535 network 172.21.0.0 distribute-list 10 out ! access-list 10 deny ip 101.0.0.0 0.255.255.255 access-list 10 permit any
![]() |
NoteThe configuration for PX2 and R2 is the same as PX1 and R1. |
Figure 54 illustrates how to configure Enhanced IGRP on all networks.

PX1 Configuration
! proxy h323 ! interface Loopback0 ip address 172.21.10.1 255.255.255.192 h323 interface h323 h323-id PX1@zone1.com h323 gatekeeper ipaddr 172.21.20.1 ! interface Ethernet0 ip address 172.21.0.1 255.255.255.192 ! interface Ethernet1 ip address 172.21.2.1 255.255.255.192 ip access-group 101 in ip access-group 101 out h323 asr ! router eigrp 4000 redistribute connected metric 10000 10 255 255 65535 passive-interface Ethernet1 network 172.21.0.0 distribute-list 10 out no auto-summary ! router eigrp 5000 redistribute connected metric 10000 10 255 255 65535 passive-interface Ethernet0 network 172.21.0.0 distribute-list 11 out no auto-summary ! access-list 10 deny 172.21.2.0 0.0.0.63 access-list 10 permit any access-list 11 deny 172.21.0.0 0.0.0.63 access-list 11 permit any access-list 101 permit ip any host 172.21.10.1 access-list 101 permit ip host 172.21.10.1 any access-list 101 permit eigrp any any
R1 Configuration
! interface Ethernet0 ip address 172.21.0.2 255.255.255.192 ! interface Ethernet1 ip address 172.21.1.1 255.255.255.192 ! router eigrp 4000 redistribute eigrp 6000 metric 10000 10 255 255 65535 passive-interface Ethernet1 network 172.21.0.0 no auto-summary ! router eigrp 6000 redistribute eigrp 4000 metric 10000 10 255 255 65535 passive-interface Ethernet0 network 172.21.0.0 distribute-list 10 out no auto-summary ! access-list 10 deny 172.21.10.0 0.0.0.63 access-list 10 permit any
![]() |
NoteThe configuration for PX2 and R2 is the same as PX1 and R1. |
The configuration of the co-edge proxy in Edge net 1 has already been presented above. Figure 55 illustrates the configuration of the inside-edge proxy, PX2, and edge router, R2, of Edge net 2. RIP is used on the edge networks. IGRP is used on the data backbone and the multimedia backbone.

PX2 Configuration
! proxy h323 ! interface Ethernet0 ip address 172.23.0.2 255.255.0.0 ! interface Serial0 ip address 102.0.0.2 255.0.0.0 ip access-group 101 in ip access-group 101 out h323 interface h323 asr h323 h323-id PX2@zone2.com h323 gatekeeper ipaddr 102.0.0.2 ! router rip redistribute connected metric 10000 10 255 255 65535 network 172.23.0.0 ! access-list 101 permit ip any host 102.0.0.2 access-list 101 permit ip host 102.0.0.2 any
R2 Configuration
! interface Ethernet0 ip address 172.23.0.1 255.255.0.0 ! interface Ethernet1 ip address 172.22.0.1 255.255.0.0 ip access-group 101 in ip access-group 101 out ! interface Ethernet2 ip address 172.21.0.2 255.255.0.0 ! interface Serial0 ip address 102.0.0.1 255.0.0.0 ! router rip redistribute igrp 5000 metric 1 network 172.23.0.0 ! router igrp 4000 network 102.0.0.0 network 172.22.0.0 ! router igrp 5000 redistribute rip metric 10000 10 255 255 65535 network 172.21.0.0 distribute-list 10 out ! ip route 102.0.0.2 255.255.255.255 Serial0 access-list 10 deny ip 102.0.0.0 0.255.255.255 access-list 10 permit any access-list 101 permit ip any host 102.0.0.2 access-list 101 permit ip host 102.0.0.2 any
![]() |
NoteTo guarantee that all traffic between the proxy and other proxies is carried over the multimedia backbone, run IGRP 4000 on both the 102.0.0.0 network and the 172.22.0.0 network, and make sure that the H.323 proxy interface address (102.0.0.2) is not advertised over the data network (distribute list 10 in IGRP 5000). Doing this also eliminates the need to configure policy routes or static routes. |
Figure 56 illustrates a proxy configuration that was created on a Cisco 2500 router with one Ethernet interface and two serial interfaces. Only the Ethernet interface is in use.

PX1 Configuration
! version 11.3 no service password-encryption service tcp-small-servers ! hostname ExampleProxy ! ! no ip domain-lookup ! ! proxy h323 ! interface Ethernet0 ip address 172.21.127.38 255.255.255.192 no ip redirects ip rsvp bandwidth 7000 7000 ip route-cache same-interface fair-queue 64 256 1000 h323 interface h323 qos rsvp controlled-load h323 h323-id px1@zone1.com h323 gatekeeper ipaddr 172.21.127.39 ! interface Serial0 no ip address shutdown ! interface Serial1 no ip address shutdown ! router rip network 172.21.0.0 ! ip classless ! ! line con 0 exec-timeout 0 0 line aux 0 transport input all line vty 0 4 password lab login ! end
Figure 57 illustrates how to configure RIP on the edge networks and IGRP on the two backbone networks. A Cisco 2500 router is used for the proxy.

PX1 Configuration
! version 11.3 no service password-encryption service tcp-small-servers ! hostname ExampleProxy ! ! no ip domain-lookup ! ! proxy h323 ! interface Loopback0 ip address 101.0.0.1 255.0.0.0 h323 interface h323 qos ip-precedence 4 h323 h323-id px1@zone1.com h323 gatekeeper ipaddr 172.20.0.3 ! interface Ethernet0 ip address 172.20.0.1 255.255.255.192 no ip redirects ! interface Serial0 no ip address shutdown ! interface Serial1 ip address 172.22.0.1 255.255.0.0 ip access-group 101 in ip access-group 101 out h323 asr ! router rip network 172.20.0.0 network 101.0.0.0 ! router igrp 4000 network 172.22.0.0 network 101.0.0.0 ! ip classless access-list 101 permit ip any host 101.0.0.1 access-list 101 permit ip host 101.0.0.1 any access-list 101 permit igrp any any ! ! line con 0 exec-timeout 0 0 line aux 0 transport input all line vty 0 4 password lab login ! end
The following example shows how you can define multiple local zones for separating your gateways:
router(config-gk)# zone local gk408or650 xyz.com router(config-gk)# zone local gk415 xyz.com router(config-gk)# zone prefix gk408or650 408....... router(config-gk)# zone prefix gk408or650 650....... router(config-gk)# zone prefix gk415 415.......
Now you can configure all the gateways to be used for area codes 408 or 650 to register with gk408or650 and all gateways to be used for area code 415 to register with gk415.
The following example shows how you can put all your gateways in the same zone but use the gw-priority keyword to determine which gateways will be used for calling different area codes:
router(config-gk)# zone local localgk xyz.com router(config-gk)# zone prefix localgk 408....... router(config-gk)# zone prefix localgk 415....... gw-priority 10 gw1 gw2 router(config-gk)# zone prefix localgk 650....... gw-priority 0 gw1
The commands shown accomplish the following tasks:
A priority 0 is assigned to gateway gw1 to exclude it from the gateway pool for prefix 650........ When gateway gw2 registers with gatekeeper localgk, it is added to the gateway pool for each prefix as follows:
To change gateway gw2 from priority 10 for zone 415....... to the default priority 5, enter the following command:
router(config-gk)# no zone prefix localgk 415....... gw-pri 10 gw2
To change both gateways gw1 and gw2 from priority 10 for zone 415....... to the default priority 5, enter the following command:
router(config-gk)# no zone prefix localgk 415....... gw-pri 10 gw1 gw2
In the preceding example, the prefix 415....... remains assigned to gatekeeper localgk. All gateways that do not specify a priority level for this prefix are assigned a default priority of 5. To remove the prefix and all associated gateways and priorities from this gatekeeper, enter the following command:
router(config-gk)# no zone prefix localgk 415.......
In the following example, the local zone sj.xyz.com is configured to use a proxy for inbound calls from remote zones tokyo.xyz.com and milan.xyz.com to gateways in its local zone. The sj.xyz.com zone is also configured to use a proxy for outbound calls from gateways in its local zone to remote zones tokyo.xyz.com and milan.xyz.com.
router(config)# gatekeeper router(config-gk)# use-proxy sj.xyz.com remote-zone tokyo.xyz.com inbound-to gateway router(config-gk)# use-proxy sj.xyz.com remote-zone tokyo.xyz.com outbound-from gateway router(config-gk)# use-proxy sj.xyz.com remote-zone milan.xyz.com inbound-to gateway router(config-gk)# use-proxy sj.xyz.com remote-zone milan.xyz.com outbound-from gateway
Because the default mode disables proxy communications for all gateway calls, only the gateway call scenarios listed can use the proxy.
In the following example, the local zone sj.xyz.com uses a proxy for only those calls that are outbound from H.323 terminals in its local zone to the specified remote zone germany.xyz.com:
router(config)# gatekeeper router(config-gk)# no use-proxy sj.xyz.com default outbound-from terminal router(config-gk)# use-proxy sj.xyz.com remote-zone germany.xyz.com outbound-from terminal
Note that any calls inbound to H.323 terminals in the local zone sj.xyz.com from the remote zone germany.xyz.com use the proxy because the default applies.
The following example shows how to remove one or more proxy statements for the remote zone germany.xyz.com from the proxy configuration list:
router(config-gk)# no use-proxy sj.xyz.com remote-zone germany.xyz.com
The command removes all special proxy configurations for the remote zone germany.xyz.com. After you enter a command like this, all calls between the local zone (sj.xyz.com) and germany.xyz.com are processed according to the defaults defined by any use-proxy commands that use the default option.
To prohibit proxy use for inbound calls to H.323 terminals in a local zone from a specified remote zone, enter a command similar to the following command:
router(config-gk)# no use-proxy sj.xyz.com remote-zone germany.xyz.com inbound-to terminal
This command overrides the default and disables proxy use for inbound calls from remote zone germany.xyz.com to all H.323 terminals in the local zone sj.xyz.com.
The following example forces an active call on the Multimedia Conference Manager gateway to be disconnected. The local ID number of the active call is 12-3339.
router> enable router# clear h323 gatekeeper call local-callID 12-3339
The following example forces all active calls on the Multimedia Conference Manager gateway to be disconnected:
router> enable router# clear h323 gatekeeper call all
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Jul 27 00:06:51 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.