cc/td/doc/product/software/ios121/121cgcr/multi_c
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring Gatekeepers (Multimedia Conference Manager)

Configuring Gatekeepers (Multimedia Conference Manager)

This chapter describes how to configure Multimedia Conference Manager, which provides gatekeeper and proxy capabilities required for service provisioning and management of H.323-compliant networks.

This chapter contains the following sections:

For a complete description of the commands used in this chapter that are specific to Multimedia Conference Manager, refer to the Cisco IOS Multiservice Applications Command Reference publication. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online.

Overview of Multimedia Conference Manager

Deploying H.323 applications and services requires careful design and planning both on the network infrastructure and the H.323 devices. The Multimedia Conference Manager provides both gatekeeper and proxy capabilities, which are required for service provisioning and management of H.323 networks. With Multimedia Conference Manager you can configure your current internetwork to route bit-intensive data such as audio, telephony, video and audio telephony, and data conferencing using existing telephone and ISDN links, without degrading the network current level of service. In addition, you can implement H.323-compliant applications on existing networks in an incremental fashion without upgrades.

Multimedia Conference Manager provides a rich list of networking capability, including the following:

With Multimedia Conference Manager, you can do the following:

Multimedia Conference Manager Principal Functions

Multimedia Conference Manager has two principal functions: gatekeeper and proxy. Gatekeeper subsystems provide the following features:

With Cisco IOS Release 12.0(3)T and later, you can configure Cisco gatekeepers to use the Cisco Hot Standby Routing Protocol (HSRP), so that when one gatekeeper fails, the standby gatekeeper assumes its role.

Proxy subsystems provide the following features:

The H.323 Standard

The Multimedia Conference Manager conforms to the H.323 standard for sending audio, video, and data conferencing data on an IP-based internetwork. The H.323 standard provides for the following types of endpoints in the network:

Figure 37 shows a typical H.323 network.


Figure 37: Multimedia Conference Manager in an H.323 Network


Proxies

Proxies are a special type of gateway that relays H.323 data to another H.323 session. They can be used to isolate sections of an H.323 network for security purposes, to manage QoS, or to perform special application-specific routing tasks.

Gatekeepers

Gatekeepers are optional nodes that manage other nodes in an H.323 network. Other nodes communicate with the gatekeeper using the RAS protocol.

These nodes attempt to register with a gatekeeper upon startup. When they wish to communicate with another endpoint, they request admission to the call, using a symbolic alias for the endpoint name such as an E.164 address or an e-mail ID. If the gatekeeper decides the call can proceed, it returns a destination IP address to the originating endpoint. This IP address cannot be the actual address of the target endpoint, but it can be an intermediate address. A gatekeeper and its registered endpoints then exchange status information.


Note Although the gatekeeper is an optional H.323 component, it must be included in the network if proxies are used.

Gatekeeper Zones

H.323 endpoints are grouped in zones. Each zone has one gatekeeper that manages all of the endpoints in the zone. A zone is an administrative convenience similar to a domain name server (DNS) domain. (Because a zone is, by definition, the area of control of a gatekeeper, you will find the terms "zone name" and "gatekeeper name" used synonymously in this chapter.)


Note The maximum number of local zones defined in a gatekeeper should not exceed 100.

H.323 Terminals

An H.323 terminal is an endpoint in the LAN that provides for real-time, two-way communications with another H.323 terminal, gateway, or multipoint control unit (MCU). This communication consists of control, indications, audio, moving color video pictures, or data between the two terminals. A terminal may provide audio only; audio and data; audio and video; or audio, data, and video. The terminal can be a computer-based video conferencing system or other device.

A gatekeeper supports a broad variety of H.323 terminal implementations from many different vendors. These terminals must support the standard H.323 RAS protocol in order to function with the gatekeeper features.

MCUs

An MCU is an endpoint on the LAN that provides the capability for three or more terminals and gateways to participate in a multipoint conference. It controls and mixes video, audio, and data from terminals to create a robust video conference. An MCU may also connect two terminals in a point-to-point conference, which may later develop into a multipoint conference.


Note Some terminals have limited multipoint-control built into them. These terminals may not require an MCU with all the functionality mentioned.

Gateways

Gateways allow H.323 terminals to communicate with terminals running other protocols. They provide protocol conversion between terminals running different types of protocols. For example, Figure 38 shows a gateway between an H.323 terminal and non-H.323 terminal.


Figure 38:
Gateway Between an H.323 Terminal and an H.320 Terminal


How Terminals, Gatekeepers, and Proxies Work Together

When terminals and proxies are brought online, they first attempt to discover their gatekeeper. Terminals and proxies discover their gatekeeper by either multicasting a discovery request, or by being configured with the name and address of the gatekeeper and unicasting a discovery request. Following successful discovery, each endpoint registers with the gatekeeper. The gatekeeper keeps track of which endpoints are online and available to receive calls.

There are three ways to set up calls between various endpoints, as described in the following sections:

Intrazone Call

If terminal TA1 wants to make an intrazone call to terminal TB1 in Zone 1, the following sequence of events occurs:

    1. TA1 asks GK1 for permission to call TB1.

    2. GK1 returns the address of TB1 to TA1.

    3. TA1 then calls TB1.

Figure 39 illustrates these events.


Figure 39: Intrazone Call


Interzone Call Without Proxy

If terminal TA1 in Zone 1 wants to call terminal TA2 in Zone 2 without the use of a proxy, the following sequence of events occurs:

    1. TA1 asks GK1 for permission to call TA2.

    2. TA2 is not in the GK1 zone. GK1 locates GK2 as the TA2 gatekeeper. GK1 then asks GK2 for TA2 address.

    3. GK2 returns TA2 address to GK1.

    4. GK1 returns the address to TA1.

    5. TA1 calls TA2.

Figure 40 illustrates these events.


Figure 40: Interzone Call Without Proxy


Interzone Call with Proxy

One reason for using a proxy is to isolate addressing information in one zone from another. When such isolation is desired, zones are configured as inaccessible on the gatekeepers. (Other reasons for using proxies are discussed later in this document.)

If terminal TA1 in Zone 1 wants to call terminal TA3 in Zone 3, the following sequence of events occurs:

    1. TA1 asks GK1 for permission to call TA3.

    2. GK1 locates GK3 as the TA3 gatekeeper. GK1 asks GK3 for TA3 address.

    3. GK3 responds with P3 address instead of TA3 address, to hide TA3 identity.

    4. GK1 knows that to get to P3, the call must go through P1. So GK1 returns P1 address to TA1.

    5. TA1 calls P1.

    6. P1 consults GK1 to discover the true call's destination (which is TA3 in this example).

    7. GK1 instructs P1 to call P3.

    8. P1 calls P3.

    9. P3 consults GK3 for the true destination, which is TA3.

    10. GK3 gives TA3 address to P3.

    11. P3 completes the call to TA3.

Figure 41 illustrates these events.


Figure 41: Interzone Call with Proxy


How Terminals, Gatekeepers, and Gateways Work Together

Gateways provide protocol conversion between terminals running different types of protocols. Gateways communicate with gatekeepers using the RAS protocol. The gatekeeper maintains resource computing information, which it uses to select the appropriate gateway during the admission of a call. In Figure 42, the following conditions exist:


Figure 42: Intrazone Call Through Gateway


A call from TA1 to TA2 is set up as follows:

    1. TA1 asks GK1 for permission to connect to TA2 E.164 address.

    2. The gatekeeper looks through its local registrations and does not find any H.323 terminals registered with that E.164 address, so the gatekeeper assumes that it is an H.320 terminal outside the scope of H.323. The gatekeeper instructs TA1 to connect to the GW1 IP address.

    3. TA1 connects to GW1.

    4. GW1 completes the call to TA2.

A call from TA2 to TA1 is set up as follows:

    1. TA2 calls GW1 and provides the TA1 E.164 address as the final destination.

    2. GW1 sends a message to GK1 asking to connect to that address.

    3. GK1 gives GW1 the address of TA1.

    4. GW1 completes the call with TA1.

Figure 43 illustrates these events.


Figure 43: Gateways Provide Translation Between Terminal Types


How Terminals, Gatekeepers, Proxies, and MCUs Work Together

When MCUs are brought online, they first attempt to discover their gatekeeper. As with terminals and proxies, they discover their gatekeeper by either multicasting a discovery request, or by being configured with the name and address of the gatekeeper and unicasting a discovery request. Following successful discovery, the MCU registers with the gatekeeper. The gatekeeper keeps track of which endpoints are online and available to receive calls.

There are three ways to set up an MCU conference call, as described in the following sections:

Intrazone MCU Conference Call

An MCU conference in Zone 1 is created with the conference ID CompanyMeeting. The MCU reregisters itself with the gatekeeper with the new conference ID appended to its list of existing aliases. If terminals TA1, TA2, and TA3 in Zone 1 want to join CompanyMeeting, the following sequence of events occurs:

    1. TA1, TA2, and TA3 join the conference by asking GK1 for permission to call the given conference ID.

    2. GK1 returns the address of the MCU to TA1, TB1, and TC1.

    3. TA1, TA2, and TA3 then call the MCU.

Figure 44 illustrates these events.


Figure 44: Intrazone Call with MCU


Interzone MCU Conference Call Without Proxy

The MCU in Zone 2 creates a conference with conference ID CompanyMeeting@zone2.com. The MCU reregisters itself with GK2, with the new conference ID appended to its list of existing aliases. Terminals TA1, TB1, and TC1 in Zone 1 want to join the MCU conference call with the conference ID CompanyMeeting@zone2.com in Zone 2. The following sequence of events occurs:

    1. TA1, TB1, and TC1 ask GK1 for permission to join the conference.

    2. GK1 locates GK2 for the remote zone containing conference CompanyMeeting@zone2.com using DNS or information configured on GK1. GK1 sends a request to GK2 to recover the MCU address.

    3. GK2 gives the MCU address to GK1.

    4. GK1 gives the MCU address to TA1, TB1, and TC1, and instructs these endpoints to set up the call with the MCU.

    5. TA1, TB1, and TC1 then call the MCU.


Figure 45: Interzone MCU Conference Call Without Proxies


Interzone MCU Conference Call With Proxy

One main reason for using a proxy is to isolate addressing information in one zone from another. When such isolation is desired, zones are configured inaccessible on the gatekeepers.

The MCU in Zone 3 creates a conference with the conference ID CompanyMeeting@zone3.com. The MCU reregisters itself with the gatekeeper, using the new conference ID appended to its list of existing aliases. Terminals TA1, TB1, and TC1 in Zone 1 want to join the MCU conference with the conference ID CompanyMeeting@zone3.com in Zone 3. The following sequence of events occurs:

    1. TA1, TB1, and TC1 ask GK1 for permission to join the conference CompanyMeeting@zone3.com.

    2. GK1 locates GK3 for the remote zone containing conference CompanyMeeting@zone3.com. GK1 asks GK3 for the MCU address.

    3. GK3 responds with PX3 address instead of the MCU address. GK1 knows that to get to PX3 the call should go through P1.

    4. GK1 gives P1 address to TA1, TB1 and TC1.

    5. TA1, TB1, and TC1 call P1.

    6. P1 consults GK1 to discover the true call destination, which is the CompanyMeeting@zone3.com in this example.

    7. GK1 instructs P1 to call P3.

    8. P1 calls P3.

    9. P3 consults with GK3 to discover the true call destination, which is the CompanyMeeting@zone3.com in this example.

    10. GK3 gives the MCU address to PX3.

    11. P3 completes the call with the MCU.

Figure 46 illustrates these events.


Figure 46: Interzone MCU Conference Call With Proxy


Gatekeeper Features

The following sections describe the main features of a gatekeeper in an H.323 network:

Zone and Subnet Configuration

A zone is defined as the set of H.323 nodes controlled by a single gatekeeper. Gatekeepers coexisting on a network may be configured so that they register endpoints from different subnets.

Endpoints attempt to discover a gatekeeper, and consequently which zone they are members of, by using the RAS message protocol. The protocol supports a discovery message that may be sent multicast or unicast.

If the message is sent multicast, the endpoint registers nondeterministically with the first gatekeeper to respond. To enforce predictable behavior, where endpoints on certain subnets are assigned to specific gatekeepers, you can use the zone subnet command to define the subnets that constitute a given gatekeeper zone. Any endpoint on a subnet that is not enabled for the gatekeeper will not be accepted as a member of that gatekeeper zone. If the gatekeeper receives a discovery message from such an endpoint, it will send an explicit reject message.

Terminal Name Registration

Gatekeepers recognize one of two types of terminal aliases, or terminal names:

If an H.323 network deploys interzone communication, each terminal should at least have a fully-qualified e-mail name as its H.323 ID, for example, bob@cisco.com. The domain name of the e-mail ID should be the same as the configured domain name for the gatekeeper of which it is to be a member. As in the previous example, the domain name would be cisco.com.

Interzone Communication

To allow endpoints to communicate between zones, gatekeepers must be able to determine which zone an endpoint is in and locate the gatekeeper responsible for that zone. If DNS is available, you can associate a DNS domain name to each gatekeeper. See the DNS configuration task in the section "Setting Up Intergatekeeper Communication" later in this chapter to understand how to configure DNS.

Endpoint Identification via RADIUS/TACACS+

Version 1 of the H.323 specification does not provide a mechanism for authenticating registered endpoints. No credential information is passed. However, by enabling AAA on the gatekeeper and configuring for RADIUS/TACACS+, you can achieve a rudimentary form of identification.

If you enable this feature, the gatekeeper attempts to use the registered aliases along with a password, and complete an authentication transaction to a RADIUS/TACACS+ server. The registration will only be accepted if RADIUS/TACACS+ successfully authenticates the name.

The gatekeeper can be configured to use a default password for all users. It can also be configured to recognize a password separator character that allows users to piggyback their passwords onto H.323-ID registrations by using it to separate the ID and password fields.


Note The names loaded into RADIUS/TACACS+ are probably not the same names provided for dial access, because they may all have the same password.

Accounting via RADIUS/TACACS+

If you enable AAA on the gatekeeper, the gatekeeper will emit an accounting record each time an endpoint registers or unregisters, or each time a call is admitted or disconnected.

Interzone Routing Using E.164 Addresses

With Cisco IOS Release 12.0(3)T and later, you can configure interzone routing using E.164 addresses.

Two types of address destinations are used in H.323 calls. The destination can be specified using either an H.323-ID address (a character string) or an E.164 address (a string containing telephone keypad characters). The way interzone calls are routed depends on the type of address being used.

When using H.323-ID addresses, interzone routing is handled through the use of domain names. For example, to resolve the domain name bob@cisco.com, the source endpoint gatekeeper finds the gatekeeper for cisco.com and sends it the location request for target address bob@cisco.com. The destination gatekeeper looks in its registration database, sees bob registered, and returns the appropriate IP address to get to bob.

When using E.164 addresses, call routing is handled through means of zone prefixes and gateway type prefixes, also referred to as technology prefixes. The zone prefixes, which are typically area codes, serve the same purpose as domain names in H.323-ID address routing. Unlike domain names, however, more than one zone prefix can be assigned to one gatekeeper, but the same prefix cannot be shared by more than one gatekeeper.

Using the zone prefix command, you can define gatekeeper responsibilities for area codes. The command can also be used to both tell the gatekeeper which prefixes are in its own zones, and which remote gatekeepers are responsible for other prefixes.


Note Area codes are used as an example in this section, but a zone prefix need not be an area code. It can be a country code, or an area-code-plus-local-exchange (NPA-NXX), or any other logical hierarchical partition.

The following sample command shows how to configure a gatekeeper with the knowledge that zone prefix 212...... (that is, any address beginning with area code 212 and followed by seven arbitrary digits) is handled by gatekeeper gk-ny:

my-gatekeeper(config-gk)# zone prefix gk-ny 212.......

When my-gatekeeper is asked to admit a call to destination address 2125551111, it knows to send the location request to gk-ny.

However, once the query gets to gk-ny, gk-ny still needs to resolve the address so that the call can be sent to its final destination. There could be an H.323 endpoint that has registered with gk-ny with that E.164 address, in which case gk-ny returns the IP address for that endpoint. However, it is more likely that the E.164 address belongs to a non-H.323 device such as a telephone or an H.320 terminal.

Because non-H.323 devices do not register with gatekeepers, gk-ny has no knowledge of which device the address belongs to, or which type of device it is, so the gatekeeper cannot decide which gateway should be used to hop off to the non-H.323 device. (The term hop off refers to the point where the call leaves the H.323 network and is destined for a non-H.323 device.)


Note The number of zone prefixes defined for a directory gatekeeper that is dedicated to forwarding LRQs and not handling local registrations and calls should not exceed 10,000; 4 MB of memory must be dedicated to describing zones and zone prefixes to support this maximum number of zone prefixes. The number of zone prefixes defined for a gatekeeper that handles local registrations and calls should not exceed 2000.

To enable the gatekeeper to select the appropriate hop-off gateway, use the gw-type-prefix command to configure technology or gateway-type prefixes. You can select technology prefixes to denote different types or classes of gateways. The gateways are then configured to register with their gatekeepers with these technology prefixes.

For example, voice gateways might register with technology prefix 1#, H.320 gateways with technology prefix 2#, and so on. If you have several gateways of the same type, you should configure them to register with the same prefix type. By having them register with the same prefix type, the gatekeeper treats the gateways as a pool out of which a random selection is made whenever a call for that prefix type arrives. If a gateway can serve more than one type of hop-off technology, it can register more than one prefix type with the gatekeeper.

You will need to let callers know the technology prefixes you define. The callers will need to know the type of device they are trying to reach, and will need to prepend the appropriate technology prefix to the destination address to indicate the type of gateway to reach the destination.

As an example, callers might request 1#2125551111 if they know that address 2125551111 is for a telephone and the technology prefix for voice gateways is 1#. The voice gateway is configured with a dial peer (using the dial-peer command), so that when it receives the call for 1#2125551111, it strips off the technology prefix 1# and bridges the next leg of the call to the telephone at 2125551111.

In cases where the call scenario is as shown in Figure 47, voice-gw1 can be configured to prepend the voice technology prefix 1# so that the use of technology prefixes is completely transparent to the caller.


Figure 47: Call Scenario


Additionally, the gw-type-prefix command can provide the ability to define a particular gateway-type prefix as being the default gateway type to be used for unresolveable addresses, and also to force a technology prefix to always hop off in a particular zone.

If the majority of calls hop off on a particular type of gateway, the gatekeeper can be configured to use that type of gateway as the default type so that callers no longer have to prepend a technology prefix on the address. For example, if you use mostly voice gateways in your network, and you have configured all your voice gateways to register with technology prefix 1#, you can configure your gatekeeper to use 1# gateways as the default technology by entering the following command:

my-gatekeeper(config-gk)# gw-type-prefix 1# default-technology

Now a caller no longer needs to prepend 1# to use a voice gateway. Any address that does not contain an explicit technology prefix will be routed to one of the voice gateways that registered with 1#.

With this default technology definition, a caller could ask the gatekeeper for admission to 2125551111. If the local gatekeeper does not recognize the zone prefix as belonging to any remote zone, it will route the call to one of its local (1#) voice gateways, so the call hops off locally. However, if it knows that gk-ny handles the 212 area code, it can send a location request for 2125551111 to gk-ny. This requires that gk-ny also be configured with some default gateway type prefix, and that its voice gateways be registered with that prefix type.


Note For ease of maintenance, we recommend that you use the same prefix type to denote the same gateway type in all zones under your administration. No more than 50 different technology prefixes should be registered per zone.

The gw-type-prefix command also provides the ability to force a hop-off to a particular zone. When an endpoint or gateway makes a call-admission request to its gatekeeper, the gatekeeper resolves the destination address by first looking for the technology prefix. When that is matched, the remaining string is compared against known zone prefixes. If the address resolves to a remote zone, the entire address including both technology and zone prefixes is sent to the remote gatekeeper in a location request. That remote gatekeeper then uses the technology prefix to decide on which of its gateways to hop off. In other words, the zone prefix (defined using the zone prefix command) determines the routing to a zone and, once there, the technology prefix (defined using the gw-type-prefix command) determines the gateway to be used in that zone. The zone prefix takes precedence over the technology prefix.

This behavior can be overridden by associating a forced hop-off zone with a particular technology prefix. Associating a forced hop-off zone with a particular technology prefix forces the call to the specified zone, regardless of what the zone prefix in the address is. As an example, you are in the 408 area code and want callers to the 212 area code in New York to use H.323-over-IP and hop off there because it saves on costs. However, the only H.320 gateway is in Denver. In this example, calls to H.320 endpoints must be forced to hop off in Denver, even if the destination H.320 endpoint is in the 212 area code. You can define the gateway type prefix for H.320 gateways as one that is always forced to the Denver zone. The forced hop-off zone can either be a local zone (that is, one that is managed by the local gatekeeper) or a remote zone.

Proxy Features

Each of the following sections describes a reason for using the proxy feature in an H.323 network:

Security

When terminals signal each other directly, they must have direct access to each other's addresses. This exposes an attacker to key information about a network. When a proxy is used, the only addressing information that is exposed to the network is the address of the proxy; all other terminal and gateway addresses are hidden.

There are several ways to use a proxy with a firewall to enhance your network security. The configuration that you choose depends on how capable your firewall is of handling the complex H.323 protocol suite. Each of the following sections describes a common configuration for using the proxy with a firewall:

Proxy Inside the Firewall

H.323 is a complex, dynamic protocol consisting of several interrelated subprotocols. During H.323 call setup, the ports and addresses released with this protocol require a detailed inspection as the setup progresses. If the firewall does not support this dynamic access control based on the inspection, you can use a proxy just inside your firewall. The proxy provides a simple access control scheme, as illustrated in Figure 48.


Figure 48: Proxy Inside the Firewall


Because the gatekeeper (using RAS) and the proxy (using call setup protocols) are the only endpoints that communicate with other devices outside the firewall, it is simple to set up a tunnel through the firewall to allow traffic destined for either of these two endpoints.

Proxy in Co-Edge Mode

If H.323 terminals exist in an area with local, interior addresses that must be translated to valid exterior addresses, then the firewall must be capable of decoding and translating all addresses passed in the various H.323 protocols. If the firewall is not capable of this translation task, a proxy may be placed next to the firewall in a co-edge mode. In this configuration, interfaces lead to both inside and outside networks. (See Figure 49.)


Figure 49: Proxy in Co-Edge Mode


In co-edge mode, the proxy can present a security risk. To avoid exposing your network to unsolicited traffic, configure the proxy to route only proxied traffic. In other words, the proxy only routes H.323 protocol traffic that is terminated on the inside and then repeated to the outside. You can configure this for traffic moving in the opposite direction as well.

Proxy Outside the Firewall

If you would like to place the proxy and gatekeeper outside your firewall, two conditions must exist. First, your firewall must support H.323 dynamic access control. Second, Network Address Translation (NAT) must not be in use.

If NAT is in use, each endpoint must register with the gatekeeper for the duration of the time it is online. This will quickly overwhelm the firewall because a large number of relatively static, internal-to-external address mappings are maintained.

If the firewall does not support H.323 dynamic access control, you could configure the firewall with static access lists that allow traffic from the proxy or gatekeeper through the firewall. This can present a security risk if an attacker can spoof, or simulate, the IP addresses of the gatekeeper or proxy and use them to attack the network. Figure 50 illustrates proxy outside the firewall.


Figure 50: Proxy Outside the Firewall


Proxies and NAT

When a firewall is providing NAT between an internal and an external network, proxies may allow H.323 traffic to be handled properly, even in the absence of a firewall that can translate addresses for H.323. Table 9 and Table 10 provide guidelines for proxy deployment with NAT.


Table 9: Guidelines for Networks Using NAT
For Networks Using NAT Firewall with H.323 NAT Firewall Without H.323 NAT

Firewall with Dynamic Access Control

Gatekeeper and proxy inside the firewall.

Co-edge gatekeeper and proxy.

Firewall Without Dynamic Access Control

Gatekeeper and proxy inside the firewall with static access lists on the firewall.

Co-edge gatekeeper and proxy.


Table 10: Guidelines for Networks Not Using NAT
For Networks Not Using NAT Firewall with H.323. NAT Firewall Without H.323 NAT

Firewall with Dynamic Access Control

Gatekeeper and proxy inside the firewall.

Gatekeeper and proxy outside the firewall.

Gatekeeper and proxy inside the firewall.

Gatekeeper and proxy outside the firewall.

Firewall Without Dynamic Access Control

Gatekeeper and proxy inside the firewall with static access lists on the firewall.

Gatekeeper and proxy inside the firewall with static access lists on the firewall.

Quality of Service

QoS enables complex networks to control and predictably service a variety of applications. QoS expedites the handling of mission-critical applications, while sharing network resources with noncritical applications. QoS also ensures available bandwidth and minimum delays required by time-sensitive multimedia and voice applications. It also gives network managers control over network applications, improves cost-efficiency of WAN connections, and enables advanced differentiated services. QoS technologies are elemental building blocks for other Cisco IOS enabling services such as the Multimedia Conference Manager. By using pairs of proxies between regions of the network where QoS can be requested, you can dramatically improve overall call quality in the multimedia network.

When two H.323 terminals communicate directly, the resulting call quality can range from good (for high-bandwidth intranets) to poor (for most calls over the public network). As a result, deployment of H.323 is almost always predicated on the availability of some high-bandwidth, low-delay, low-packet-loss network that is either separate from the public network or runs overlaid with the network as a premium service with adequate QoS.

Adequate QoS usually requires terminals that know how to signal such premium services. There are two major ways to achieve such signalling:

Unfortunately, the vast majority of H.323 terminals cannot achieve signalling in either of these ways.

You can configure the proxy to use any combination of RSVP and IP precedence bits.

The proxy is not capable of modifying the QoS between the terminal and itself. To achieve the best overall QoS, you should ensure that terminals are connected to the proxy using a network that intrinsically has good QoS. In other words, you can configure a path between a terminal and proxy that provides good bandwidth, delay, and packet-loss characteristics without the terminal needing to request special QoS. A high-bandwidth LAN works well for this.

Application-Specific Routing

In order to achieve adequate QoS, you may deploy a separate network that is partitioned away from the standard data network. The proxy can take advantage of such a partitioned network using a feature known as application-specific routing (ASR).

ASR is simple. When the proxy receives outbound traffic, it directs traffic to an interface connected directly to the QoS network. The proxy does not send the traffic using an interface specified for the regular routing protocol. Similarly, inbound traffic from other proxies is received on the interface connected to the QoS network. This is true as long as all of these other proxies around the QoS network use ASR in a consistent fashion. ASR then ensures that ordinary traffic is not routed into the QoS network by mistake.

Implementation of ASR ensures the following:


Note ASR is not supported on Frame Relay or ATM interfaces for the Cisco MC3810 platform.

Multimedia Conference Manager Configuration Task List

To configure Multimedia Conference Manager, perform the tasks in the following sections. The tasks in these two sections are required.

See the end of this chapter for the "Multimedia Conference Manager Configuration Examples" section.

Configuring Gatekeepers

To configure gatekeepers in Multimedia Conference Manager, perform the tasks in the following sections. All of the tasks listed are required.

Starting a Gatekeeper

To enter gatekeeper configuration mode and start the gatekeeper, use the following commands beginning in privileged EXEC mode:

Command Purpose

Step 1

Router#configure terminal

Enters global configuration mode.

Step2

Router(config)#gatekeeper

Enters gatekeeper configuration mode.

Step3

Router(config-gk)#zone prefix gatekeeper-name 
e164-prefix [gw-priority pri-0-to-10 gw-alias 
[gw-alias, ...]]

Adds a prefix to the gatekeeper zone list.

Step4

Router(config-gk)#zone local gatekeeper-name 
domain-name

Creates the gatekeeper name.

Step5

Router(config-gk)#zone subnet local-gatekeeper-name 
subnet-address {/bits-in-mask | mask-address} enable

Router(config-gk)#no zone subnet 
local-gatekeeper-name default enable

or

Router(config-gk)#no zone subnet 
local-gatekeeper-name subnet-address {/bits-in-mask 
| mask-address} enable

or

Router(config-gk)#zone subnet gatekeeper-name 
default enable

Defines a set of subnets that constitute the gatekeeper zone. Enables the gatekeeper for each of these subnets, and disables it for all other subnets.(Repeat for all subnets.)

or

Defines the zone as being all but a set of subnets by disabling a set of subnets and enabling all others. (Repeat for all subnets.)

or

Accepts the default behavior, which is that all subnets are enabled.

Step6

Router(config-gk)#no shutdown

Brings the gatekeeper online.

The local-gatekeeper-name argument should be a DNS host name if DNS is to be used to locate remote zones.

You can use the zone subnet command more than once to create a list of subnets controlled by a gatekeeper. The subnet masks need not match actual subnets in use at your site. For example, to specify a particular endpoint, you can supply its address with a 32-bit netmask.

If a local gatekeeper name is contained in the message, it must match the local-gatekeeper-name argument.


NoteIf you want to explicitly enable or disable a particular endpoint, specify its host address with a 32-bit subnet mask.

Setting Up Intergatekeeper Communication

This section describes two ways for setting up intergatekeeper communication:

Via DNS

To configure intergatekeeper communication using DNS, use the following commands starting in EXEC mode:

Command Purpose

Step1

Router#configure terminal

Enters global configuration mode.

Step2

Router(config)#ip name-server dns-server-name

Specifies the DNS server address.

Step3

Router(config)#ip domain-name domain name

Sets the default domain name for the Cisco IOS.

For all gatekeepers in the system, enter into DNS a text record of the form:

ras [gk-id@] host [:port] [priority]

The gk-id argument is an optional gatekeeper ID. If the optional gatekeeper ID is not specified, host is used as the gatekeeper ID.

The host argument is either an IP address or the actual host name of the gatekeeper in the form host.some_domain.com.

The port argument, if specified, should be some port number other than RAS port 1719.

The priority argument specifies the order in which the listed gatekeepers should be searched for endpoints. Gatekeepers with lower priorities are searched before those with higher numbers.

How you enter the text record for a particular domain depends on the DNS implementation. The following examples are for the Berkeley Internet Name Domain (BIND). These records are typically entered into the "hosts" database:

zone1.com in txt "ras gk.zone1.com"
zone2.com in txt "ras gk2@gk.zone2.com"
zone3.com in txt "ras gk3@gk.zone3.com:1725"
zone4.com in txt "ras gk4@gk.zone4.com:1725 123"
zone5.com in txt "ras gk5@101.0.0.1:1725"

Manual Configuration

If you choose not to use DNS, or DNS is unavailable, you can configure intergatekeeper communication manually. To configure intergatekeeper manual communication, use the following commands beginning in gatekeeper configuration mode for every other gatekeeper in the network:

Command Purpose
Router(config-gk)#zone remote other-gatekeeper-name 
other-domain-name other-gatekeeper-ip-address 
[port-number]

Configures inter-gatekeeper communication with other gatekeepers in your network. Enter this command for each gatekeeper.

Controlling Zone Accessibility

By default, a gatekeeper will offer a local proxy IP address when queried by a remote gatekeeper (synonymous with remote zone). Offering a local proxy IP address when queried is considered proxied access. By using the zone access command, you can configure the local gatekeeper to offer the local endpoint address instead of the local proxy address. Offering the local endpoint address is considered direct access.


NoteThe zone access command, configured on your local gatekeeper, only affects the use of proxies for incoming calls (that is, it does not affect the use of local proxies for outbound calls). When originating a call, a gatekeeper will use a proxy only if the remote gatekeeper offers a proxy at the remote end. A call between two endpoints in the same zone will always be a direct (nonproxied) call.

To make your local zone directly accessible to a small set of remote zones and accessible using proxies to all other remote zones, use the following commands in gatekeeper configuration mode:

Command Purpose

Step1

Router(config-gk)#zone access local-zone-name 
remote-zone remote-zone-name direct

Makes your local zone directly accessible to a remote zone (proxies not required). Repeat this command for each remote zone that you wish to give direct access to your local zone.

Step2

Router(config-gk)#zone access local-zone-name 
default proxied

Makes your local zone accessible via proxy to all other remote zones.

To make your local zone accessible using proxies to a small set of remote zones and directly accessible to all other remote zones, use the following commands in gatekeeper configuration mode:

Command Purpose

Step1

Router(config-gk)#zone access local-zone-name 
remote-zone remote-zone-name proxied

Makes your local zone accessible via proxies to a remote zone. Repeat this command for each remote zone that you wish to give proxied access to your local zone.

Step2

Router(config-gk)#zone access local-zone-name 
default direct

Makes your local zone directly accessible to all other remote zones.

Defining Static Nodes

In some cases, a particular terminal or endpoint's registration information is not accessible from any gatekeeper. This inaccessible registration information may be because the endpoint does not use RAS, is in an area where no gatekeeper exists, or is in a zone where the gatekeeper addressing is unavailable either through DNS or through configuration.

These endpoints can still be accessed via a gatekeeper by entering them as static nodes. To enter the endpoints as static nodes, obtain the endpoint's address and then use the following commands in gatekeeper configuration mode:

Command Purpose

Step1

Router(config-gk)#zone local gatekeeper-name 
domain-name

Defines your local zone.

Step2

Router(config-gk)#alias static ip-signaling-addr 
port gkid gatekeeper-name terminal h323id h323-id

Creates a static entry in your local alias table for an H.323ID. Repeat this step for each H.323ID you want to add for the endpoint.

Step3

Router(config-gk)#alias static ip-signaling-addr 
port gkid gatekeeper-name terminal e164 e164-address

Creates a static entry in your local alias table for each E.164 address. Repeat this step for each E.164 address you want to add for the endpoint.

Identifying H.323 Users via RADIUS

To identify H.323 users via RADIUS, use the following commands in global configuration mode:

Command Purpose

Step1

Router(config)#aaa new-model

Enables AAA services.

Step2

Router(config)#aaa authentication login h323 radius

Enables login authentication for H.323 users via RADIUS.

Step3

Router(config)#radius-server host {hostname | 
ip-address} 

Specifies the RADIUS server.

Step4

Router(config)#radius-server string keystring 

Specifies the RADIUS server key.

Step5

Router(config)# gatekeeper

Enters gatekeeper configuration mode.

Step6

Router(config-gk)#security h323-id

or

Router(config-gk)#security e164

or

Router(config-gk)#security any

Identifies users by their H.323 ID.
or

Identifies users by their E.164 address.
or

Identifies users by either their E.164 address or H.323 ID.

Step7

Router(config-gk)# security password default 
password

or

Router(config-gk)#security password separator 
character

Defines a default security password.
or

Identifies users by their H.323 ID.

After you complete the previous steps, enter each user into the RADIUS database, using either the default password if using the security password default command, or actual passwords if using the piggybacked password mechanism as the RADIUS authentication for that user. Enter either the user H.323-ID or E.164 address, depending on how you configured the gatekeeper.

For more information about configuring AAA services or RADIUS, refer to the Cisco IOS Security Configuration Guide.

Sending Accounting Records to RADIUS

After AAA has been enabled, and the gateway has been configured to recognize RADIUS as the remote security server providing authentication services, the next step is to configure the gateway to report user activity to the RADIUS server in the form of connection accounting records. To send connection accounting records to the RADIUS server, use the following commands beginning in global configuration mode:

Command Purpose

Step1

Router(config)#aaa accounting connection start-stop 
radius

Enables connection accounting mode using RADIUS.

Step2

Router(config)# gatekeeper

Enters gatekeeper configuration mode.

Step3

Router(config-gk)#accounting

Enables gatekeeper accounting.

For more information about AAA connection accounting services, refer to the Cisco IOS Security Configuration Guide.

Enabling E.164 interzone Routing

With Cisco IOS Release 12.0(3)T and later, you can configure interzone routing using E.164 addresses. To configure interzone routing in the E.164 address space, use the following commands beginning in global configuration mode:

Command Purpose

Step1

Router#gatekeeper

Enters gatekeeper configuration mode.

Step2

Router(config-gk)#zone local gatekeeper-name 
domain-name

Creates the local gatekeeper name.

Step3

Router(config-gk)#zone remote other-gatekeeper-name 
other-domain-name other-ip-address [port-number]

Creates the remote gatekeeper name.

Step4

Router(config-gk)#zone prefix gatekeeper-name 
e164-prefix

Configures knowledge of the zone prefixes.

Step5

Router(config-gk)#gw-type-prefix type-prefix 
[hopoff gkid] [default-technology] [[gwipaddr 
ipaddr [port]]] ...

Defines technology prefixes.

Configuring Proxies

This section describes the following configuration tasks for configuring the proxy. Depending on your specific network design, either the first task or the second task is required.

Starting a Proxy Without Application-Specific Routing

To start the proxy without ASR, you must start the proxy, then define the H.323 name, zone, and QoS parameters on the interface whose IP address the proxy will use. To start the proxy without ASR, use the following commands beginning in global configuration mode:

Command Purpose

Step1

Router(config)#proxy h323

Starts the proxy.

Step2

Router(config)#interface type number

Enters interface configuration mode on the interface whose IP address is to be used by the proxy.

Step3

Router(config-int)#h323 interface

Signals the proxy that this interface IP address is the one to use.

Step4

Router(config-int)#h323 h323-id h323-id

Configures the proxy name. (More than one name can be configured if necessary.)

Step5

Router(config-int)#h323 gatekeeper [id 
gatekeeper-id] ipaddr ipaddr

or

Router(config-int)#h323 gatekeeper [id 
gatekeeper-id] multicast

Sets up the zone in which the proxy will run unicast gatekeeper discovery.
or

Sets up the zone in which the proxy will run multicast gatekeeper discovery.

Step6

Router(config-int)#h323 qos ip-precedence value

Configures IP Precedence.

Step7

Router(config-int)#h323 qos rsvp controlled-load

or

Router(config-int)#h323 qos rsvp guaranteed-qos

Configures RSVP. Sets up RSVP with controlled-load class of service.

or

Sets up RSVP with guaranteed class of service.

Step8

Router(config-int)# ip route-cache same-interface

For every interface, enables fast switching for packets received and forwarded on the same interface.

Starting a Proxy with ASR

If you want to enable ASR on the proxy, you must start the proxy, then define the H.323 name, zone, and QoS parameters on the loopback interface. You must then determine which interface is to route the H.323 traffic and configure ASR on it. The ASR interface and all other interfaces must be separated so that they never propagate routing information between each other. There are two different ways to separate the ASR interface and all other interfaces:

To ensure that the ASR interface and all other interfaces never route packets between each other, you must also configure an access control list. (The proxy traffic will be routed specially because it is always addressed to the loopback interface first, then translated by the proxy subsystem.)

To start the proxy with ASR enabled on the proxy using one type of routing protocol on the ASR interface and another on all of the non-ASR interfaces, with the loopback subnet included in both routing domains, use the following commands beginning in global configuration mode:

Command Purpose

Step1

Router(config)#proxy h323

Starts the proxy.

Step2

Router(config)#interface Loopback0

Enters loopback interface configuration mode.

Step3

Router(config-int)#ip address ipaddr subnet-mask

or

Router(config-int)#ip address 
ipaddr/subnet-mask-size

Defines the interface subnet.

Step4

Router(config-int)#h323 interface

Signals the proxy that this interface IP address is the one to use.

Step5

Router(config-int)#h323 h323-id h323-id

Configures the proxy name. (More than one name can be configured if necessary.)

Step6

Router(config-int)#h323 gatekeeper [id 
gatekeeper-id] ipaddr ipaddr

or

Router(config-int)#h323 gatekeeper [id 
gatekeeper-id] multicast

Sets up the zone in which the proxy will run unicast gatekeeper discovery.
or

Sets up the zone in which the proxy will run multicast gatekeeper discovery.

Step7

Router(config-int)#h323 qos ip-precedence value

Configures IP Precedence.

Step8

Router(config-int)#h323 qos rsvp controlled-load

or

Router(config-int)#h323 qos rsvp guaranteed-qos

Configures RSVP. Sets up RSVP with controlled-load class of service.

or

Sets up RSVP with guaranteed class of service.

Step9

Router(config-int)#interface type number

If ASR is to be used, enters interface configuration mode on the interface through which outbound H.323 traffic should be routed.

Step10

Router(config-int)#h323 asr

or

Router(config-int)#h323 asr bandwidth bandwidth

Enables ASR with no bandwidth limitations.
or

Enables ASR and limits the total bandwidth of H.323 traffic through the ASR interface.

Step11

Router(config-int)#ip address asr-addr 
asr-subnet-mask

Sets up the ASR interface network number.

Step12

Router(config-int)#exit

(or press Ctrl-Z)

Returns to global configuration mode.

Step13

Router(config)#interface type number

Enters interface configuration mode on a non-ASR interface.

Step14

Router(config-int)#ip address non-asr-addr 
non-asr-subnet-mask

Sets up a non-ASR interface network number.

Step15

Router(config-int)#exit

(or press Ctrl-Z)

Returns to global configuration mode.

Step16

Router(config)#router rip

Configures RIP for a non-ASR interface.

Step17

Router(config)#network non-asr-addr

Includes a non-ASR interface in RIP domain.

Step18

Router(config)#network loopback-addr

Includes a loopback interface in RIP domain.

Step19

Router(config)#router igrp 
asr-autonomous-system-number

Configures IGRP for an ASR interface.

Step20

Router(config)#network asr-addr

Includes an ASR interface in an IGRP domain.

Step21

Router(config)#network loopback-addr

Includes a loopback interface in an IGRP domain.

Step22

Router(config)#access-list access-list-number 
permit ip host loopback-address any

Router(config)#access-list access-list-number 
permit ip any host loopback-address

Router(config)#access-list access-list-number 
permit igrp any any1

Creates an access list.

Step23

Router(config)#interface type number

Enters interface configuration mode on an ASR interface.

Step24

Router(config-int)#ip access-group 
access-list-number out

Sets the outbound access group.

Step25

Router(config-int)#ip access-group 
access-list-number in

Sets the inbound access group.

Step26

Router(config-int)#exit

(or press Ctrl-Z)

Leaves ASR interface configuration mode.

1You may replace igrp with the appropriate routing protocol in use on the ASR interface.


NoteASR is not supported on Frame Relay or ATM interfaces for the Cisco MC3810 platform.

To start the proxy with ASR enabled on the proxy, using two different autonomous systems, one that contains the ASR network and the loopback network, the other that contains the other non-ASR networks and loopback network, use the following commands beginning in global configuration mode:

Command Purpose

Step1

Router(config)#proxy h323

Starts the proxy.

Step2

Router(config)#interface Loopback0

Enters loopback interface configuration mode.

Step3

Router(config-int)#ip address ipaddr subnet-mask

or

Router(config-int)#ip address 
ipaddr/subnet-mask-size

Defines the interface subnet.

Step4

Router(config-int)#h323 interface

Signals the proxy that this interface IP address is the one to use.

Step5

Router(config-int)#h323 h323-id h323-id

Configures the proxy name. (More than one name can be configured if necessary.)

Step6

Router(config-int)#h323 gatekeeper [id 
gatekeeper-id] ipaddr ipaddr

or

Router(config-int)#h323 gatekeeper [id 
gatekeeper-id] multicast

Sets up the zone in which the proxy will run unicast gatekeeper discovery.
or

Sets up the zone in which the proxy will run multicast gatekeeper discovery.

Step7

Router(config-int)#h323 qos ip-precedence value

Configures IP Precedence.

Step8

Router(config-int)#h323 qos rsvp controlled-load

or

Router(config-int)#h323 qos rsvp guaranteed-qos

Configures RSVP. Sets up RSVP with controlled-load class of service.

or

Sets up RSVP with guaranteed class of service.

Step9

Router(config-int)#interface type number

If ASR is to be used, enters interface configuration mode on the interface through which outbound H.323 traffic should be routed.

Step10

Router(config-int)#h323 asr

or

Router(config-int)#h323 asr bandwidth bandwidth

Enables ASR with no bandwidth limitations.
or

Enables ASR and limits the total bandwidth of H.323 traffic through the ASR interface.

Step11

Router(config-int)#ip address asr-addr 
asr-subnet-mask

Sets up the ASR interface network number.

Step12

Router(config-int)#exit

(or press Ctrl-Z)

Returns to global configuration mode.

Step13

Router(config)#interface type number

Enters interface configuration mode on a non-ASR interface.

Step14

Router(config-int)#ip address non-asr-addr 
non-asr-subnet-mask

Sets up a non-ASR interface network number.

Step15

Router(config-int)#exit

(or press Ctrl-Z)

Returns to global configuration mode.

Step16

Router(config)#router igrp 
non-asr-autonomous-system-number

Configures IGRP for a non-ASR interface.

Step17

Router(config)#network non-asr-addr

Includes a non-ASR interface in an IGRP domain.

Step18

Router(config)#network loopback-addr

Includes a loopback interface in an IGRP domain.

Step19

Router(config)#router igrp 
asr-autonomous-system-number

Configures IGRP for an ASR interface.

Step20

Router(config)#network asr-addr

Includes an ASR interface in an IGRP domain.

Step21

Router(config)#network loopback-addr

Includes a loopback interface in an IGRP domain.

Step22

Router(config)#access-list access-list-number 
permit ip host loopback-address any

Router(config)#access-list access-list-number 
permit ip any host loopback-address

Router(config)#access-list access-list-number 
permit igrp any any1

Creates an access list.

Step23

Router(config)#interface type number

Enters interface configuration mode on an ASR interface.

Step24

Router(config-int)#ip access-group 
access-list-number out

Sets the outbound access group.

Step25

Router(config-int)#ip access-group 
access-list-number in

Sets the inbound access group.

Step26

Router(config-int)#exit

(or press Ctrl-Z)

Leaves ASR interface configuration mode.

1You may replace the igrp keyword with the appropriate routing protocol in use on the ASR interface.

Configuring H.323 Version 2 Features

Multimedia Conference Manager complies with the mandatory requirements and several of the optional features of the H.323 Version 2 specification. Future releases will add more H.323 Version2 features to the Cisco IOS software.

In Cisco IOS Release 12.1, the following H.323 Version 2 features are supported:

H.323 Version 2 defines a lightweight registration procedure that still requires the full registration process for initial registration, but uses an abbreviated renewal procedure to update the gatekeeper and minimize overhead.
Lightweight registration requires each endpoint to specify a time-to-live (TTL) value in its Registration Request (RRQ) message. When a gatekeeper receives an RRQ message with a TTL value, it returns an updated TTL timer value in a Registration Confirmation (RCF) message to the endpoint. Shortly before the TTL timer expires, the endpoint sends an RRQ message with KeepAlive field set to TRUE, which refreshes the existing registration.
An H.323 Version 2 endpoint is not required to indicate a TTL in its registration request. If the endpoint does not indicate a TTL, the gatekeeper assigns one and sends it to the gateway in the RCF message. No configuration changes are permitted during a lightweight registration, so all fields are ignored other than the endpoint identifier, gatekeeper identifier, tokens, and TTL. In the case of H.323 Version 1, endpoints cannot process the TTL field in the RCF; the gatekeeper probes the endpoint with IRQs for a predetermined grace period to learn if the endpoint is still alive.
The H.323 Version 2 software improves the gateway selection process as follows:
The gatekeeper maintains a separate gateway list, ordered by priority, for each of its zone prefixes. If a gateway does not have an assigned priority for a zone prefix, it defaults to priority5, which is the median. To explicitly bar the use of a gateway for a zone prefix, define it as having a priority 0 for that zone prefix.
When selecting gateways, the gatekeeper identifies a target pool of gateways by performing a longest zone prefix match; then it selects from the target pool according to priorities and resource availability. If all high-priority gateways are busy, a low-priority gateway might be selected.

The H.323 Version 2 Support in Multimedia Conference Manager feature contains the following configuration tasks. The first two tasks listed are required; the last task listed is optional.

Adding a Prefix to a Gatekeeper Zone List

To add a prefix to a gatekeeper zone list, use the following commands beginning in global configuration mode:

Command Purpose

Step1

Router(config)#gatekeeper

Enters gatekeeper configuration mode.

Step2

Router(config-gk)#zone prefix gatekeeper-name 
e164-prefix [gw-priority pri-0-to-10 gw-alias 
[gw-alias, ...]]

Adds a prefix to the gatekeeper zone list.


NoteNote that the zone prefix command matches a prefix to a gateway. It does not register the gateway. The gateway must register with the gatekeeper before calls can be completed through that gateway.

Verifying an Added Prefix

To view the prefixes added to the gatekeeper zone list, use the show gatekeeper zone prefix command. To see gatekeeper zone information, use the show gatekeeper zone status command.

Configuring Inbound or Outbound Gatekeeper Proxied Access

By default, a gatekeeper will offer the IP address of the local proxy when queried by a remote gatekeeper (synonymous with remote zone). Offering the IP address of the local proxy is considered proxied access. In the previous version of MCM, you configure the local gatekeeper to offer the address of the local endpoint instead of the address of the local proxy (considered direct access) by using the zone access command. In the H.323 Version 2 Support in Multimedia Conference Manager feature, the use-proxy command replaces the zone access command.

The use-proxy command enables you to configure a proxy for inbound calls from remote zones to gateways in its local zone and to configure a proxy for outbound calls from gateways in its local zone to remote zones.

To configure inbound or outbound gatekeeper proxied access, use the following commands beginning in global configuration mode:

Command Purpose

Step1

Router(config)#gatekeeper

Enters gatekeeper configuration mode.

Step2

Router(config-gk)#use-proxy local-zone-name 
{default | remote-zone remote-zone-name}{inbound-to 
| outbound-from}{gateway | terminal}

Enables proxy communications for calls between local and remote zones.


NoteWhen a previous version of gatekeeper is upgraded, any zone access commands are translated to the corresponding use-proxy commands.

Verifying Gatekeeper Proxied Access Configuration

Use the show gatekeeper zone status command to see information about the configured gatekeeper proxies and gatekeeper zone information.

The following is sample output from the show gatekeeper proxy status command.

router# show gatekeeper zone status
 
                      GATEKEEPER ZONES
                      ================
GK name      Domain Name   RAS Address     PORT  FLAGS MAX-BW   CUR-BW
                                                       (kbps)   (kbps)
-------      -----------   -----------     ----  ----- ------   ------
sj.xyz.com   xyz.com       1.14.93.85      1719  LS             0       
  SUBNET ATTRIBUTES :
    All Other Subnets :(Enabled)
  PROXY USAGE CONFIGURATION :
    inbound Calls from germany.xyz.com :
      to terminals in local zone sj.xyz.com :use proxy
      to gateways in local zone sj.xyz.com  :do not use proxy
    Outbound Calls to germany.xyz.com
      from terminals in local zone germany.xyz.com :use proxy
      from gateways in local zone germany.xyz.com  :do not use proxy
    Inbound Calls from all other zones :
      to terminals in local zone sj.xyz.com :use proxy
      to gateways in local zone sj.xyz.com  :do not use proxy
    Outbound Calls to all other zones :
      from terminals in local zone sj.xyz.com :do not use proxy
      from gateways in local zone sj.xyz.com  :do not use proxy
tokyo.xyz.co xyz.com       172.21.139.89      1719  RS             0  
milan.xyz.co xyz.com       171.69.57.90       1719  RS             0

Forcing a Disconnect on an MCM Gatekeeper

To force a disconnect on an MCM gatekeeper, use the following command beginning in gatekeeper configuration mode:

Command Purpose
Router(config-gk)#clear h323 gatekeeper call {all | 
local-callID local-callID}

Forces a disconnect on a specific call or all calls currently active on this MCM gatekeeper.

If you want to force a particular call to be disconnected (as opposed to all active calls on the MCM gateway), use the local call identification number (CallID) to identify that specific call. You can find the local CallID number for a specific call by using the show gatekeeper calls command; the ID number is displayed in the LocalCallID column.

Verifying a Forced Disconnect

To show the status of each ongoing call that a gatekeeper is aware of, use the show gatekeeper calls command. If you have forced a disconnect for either a particular call or all calls associated with a particular MCM gatekeeper, the system will not display information about those calls.

The following is sample output from the show gatekeeper calls command:

router# show gatekeeper calls
 
Total number of active calls =1
Gatekeeper Call Info
====================
LocalCallIDAge (secs)BW
12-3339 94 768 (Kbps)
Endpt(s): AliasE.164AddrCallSignalAddrPortRASSignalAddrPort
src EP: epA 10.0.0.11172010.0.0.111700
dst EP: epB2zoneB.com
src PX: pxA 10.0.0.1172010.0.0.1124999
dst PX: pxB 172.21.139.901720172.21.139.9024999

Multimedia Conference Manager Configuration Examples

This section includes the following sample configurations:

Configuring a Gatekeeper Example

Following is an annotated example of how to configure a gatekeeper:

hostname gk-eng.xyz.com
! This router serves as the gatekeeper for the engineering community
! at xyz.com.
ip domain-name xyz.com
! domain name of this company
interface Ethernet0
 ip address 172.21.127.27 255.255.255.0
! This gatekeeper can be found at address 172.21.127.27
gatekeeper
! Enter gatekeeper config mode
 zone local gk-eng.xyz.com xyz.com
! Because a zone is, by definition, the area of control of a gatekeeper,
! we tend to use the terms "zone name" and "gatekeeper name" synonymously.
! Here we use the host name as the name of the gatekeeper and zone.
! This is not necessary, but does simplify administration.
 zone remote gk-mfg.xyz.com xyz.com 171.120.1.4 1719
 zone remote gk-corp.xyz.com xyz.com 170.124.3.80 1719
! A couple of other zones within xyz.com. We make lots of calls
! between these departments, so we just configure these so we save
! a little time bypassing DNS lookup to find their gatekeepers.
 zone access gk-eng.xyz.com remote-zone gk-mfg.xyz.com direct
 zone access gk-eng.xyz.com remote-zone gk-corp.xyz.com direct
 zone access gk-eng.xyz.com default proxied
! We have good QoS on our local network, so we don't need proxies when
! calling between the xyz.com zones. But for all other zones, we want
! to use proxies.
zone subnet gk-eng.xyz.com 172.21.127.0/24 enable
no zone subnet gk-eng.xyz.com default enable
! We will accept registrations from our local subnet as long as they
! do not specify some other gatekeeper name. We will not accept any
! registrations from any other subnet.
 zone bw gk-eng.xyz.com 2000
! Preserve our good QoS by not allowing excessive amounts of H.323 traffic
! on the local network. This restricts the traffic within our zone,
! for both intra-zone and interzone calls, to 2 kbps at any given time.
 alias static 172.21.127.49 gkid gk-eng.xyz.com terminal h323id joeblow ras
172.21.127.49 1719
! The "user" has an H.323 terminal, which does not support RAS. So we have
! to configure his alias manually so that callers can find him.

Enabling E.164 Interzone Routing Example

With Cisco IOS Release 12.0(3)T and later, you can configure interzone routing using E.164 addresses.

In this example, there are two gatekeepers, one in San Jose and one in New York that need to be able to resolve E.164 addresses. (See Figure 51.)


Figure51: E.164 Interzone Routing


In sj (San Jose in the 408 area code), the gateways are configured to register with gk-sj as follows:

Similarly, in ny (New York in the 212 area code), gateways are configured to register with gk-ny as follows:

For the gatekeeper for San Jose, the configuration commands are as follows:

   gatekeeper
     zone local gk-sj cisco.com
     zone remote gk-ny cisco.com 172.21.127.27
     zone access gk-sj default direct
     zone prefix gk-sj 408.......
     zone prefix gk-ny 212.......
     gw-type-prefix 3# hopoff gk-sj
     gw-type-prefix 4# default-technology

For the gatekeeper for New York, the configuration commands are as follows:

   gatekeeper
     zone local gk-ny cisco.com
     zone remote gk-sj cisco.com 172.21.1.48
     zone access gk-ny default direct
     zone prefix gk-sj 408.......
     zone prefix gk-ny 212.......
     gw-type-prefix 3# hopoff gk-ny
     gw-type-prefix 4# default-technology

When a call is presented to gatekeeper gk-sj with the following target address in San Jose:

2#2125551212
 

Gatekeeper gk-sj recognizes that 2# is a technology prefix. It was not configured as such, but because gw-sj2 registered with it, the gatekeeper now treats 2# as a technology prefix. It strips the prefix, which leaves the telephone number 2125551212. This is matched against the zone prefixes that have been configured. It is a match for 212......., so gk-sj knows that gk-ny handles this call. gk-sj forwards the entire address 2#2125551212 over to gk-ny, which also looks at the technology prefix 2#, and routes it to gw-ny2.

When a call is presented to gatekeeper gk-sj with the following target address in San Jose:

2125551212
 

Gatekeeper gk-sj checks it against known technology prefixes, but finds no match. It then checks it against zone prefixes and matches on 212....... for gk-ny, and so routes this call to gk-ny. gk-ny does not have any local registrations for this address, and there is no technology prefix on the address, but the default prefix is 4#, and gw-ny4 is registered with 4#, so the call gets routed to gw-ny4.

Another call is presented to gatekeeper gk-sj with the following target address in San Jose:

3#2125551212
 

The call bears technology prefix 3#, which is defined as a local hopoff prefix, so gk-sj routes this call to gw-sj3, despite the fact that it bears a New York zone prefix.

In this last example, a call is presented to gatekeeper gk-sj with the following target address in San Jose:

6505551212
 

Gatekeeper gk-sj checks for a technology prefix match, but does not find one. It then searches for a zone prefix match, and fails again. But there is a match for default gateway prefix of 4#, and gw-sj4 is registered with 4#, so the call is routed out on gw-sj4.

Configuring a Gatekeeper for HSRP Example

Cisco routers support HSRP, which allows one router to serve as a backup to another router. With CiscoIOS Release12.0(3)T and later, you can configure Cisco gatekeepers to use HSRP so that when one gatekeeper fails the standby gatekeeper assumes its role.

To configure a gatekeeper to use HSRP, you need to perform the following tasks:

As long as both gatekeepers are up, the one with the higher priority on its HSRP interface will be the active gatekeeper. If this active gatekeeper fails, or if its HSRP interface fails, the standby HSRP interface assumes the virtual HSRP address and, with it, the active gatekeeper role. When the gatekeeper with the higher HSRP priority comes back online, it reclaims the HSRP virtual address and the gatekeeper function, while the secondary gatekeeper goes back to standby status.


NoteGatekeeper failover will not be completely transparent to endpoints and gatekeepers. When the standby gatekeeper takes over, it does not have the state of the failed gatekeeper. If an endpoint that had registered with the failed gatekeeper now makes a request to the new gatekeeper, the gatekeeper responds with a reject, indicating that it does not recognize the endpoint. The endpoint must reregister with the new gatekeeper before it can continue H.323 operations.

Sample Commands for Configuring HSRP on the Gatekeeper

This sample configuration uses Ethernet 0 as the HSRP interface on both gatekeepers.

On the primary gatekeeper, enter these commands:

configure terminal 
 ! enter configuration mode
interface e0 
 ! enter interface configuration mode for interface e0
standby 1 ip 172.21.127.55
! member of standby group 1, sharing virtual address 172.21.127.55 standby 1 preempt
! claim active role when it has higher priority standby 1 timers 5 15
! hello timers is 5 seconds, hold timer is 15 seconds standby 1 priority 110
! priority is 110

On the backup gatekeeper, enter these commands:

configure terminal
int e0
standby 1 ip 172.21.127.55
standby 1 preempt
standby 1 timers 5 15

The configurations are identical except that gk2 has no standby priority configuration, so it assumes the default priority of 100---meaning that gk1 has a higher priority.

On both gk1 and gk2, set up identical gatekeeper mode configurations, as follows:

configure terminal
! enter config mode gatekeeper ! enter gatekeeper config mode zone local gk-sj cisco.com 172.21.127.55
! define local zone using HSRP virtual address as gatekeeper's RAS address. ...
! various other gk-mode configurations no shut
! bring up the gatekeeper configure terminal
! enter config mode gatekeeper
! enter gatekeeper config mode zone local gk-sj cisco.com 172.21.127.55
! define local zone using HSRP virtual address as gatekeeper's RAS address.
! Note this uses the same gkname and address as on gk1. ...
! various other gk-mode configurations no shut
! bring up the gatekeeper

NoteThe no shut command is issued on both gatekeepers, primary and secondary. If you issue the show gatekeeper status command on the two gatekeepers, you see on gk1:
Gatekeeper State: UP
but on gk2 you see:
Gatekeeper State: HSRP STANDBY

Using ASR for a Separate Multimedia Backbone Example

The examples in this section create a separate, multimedia backbone network dedicated to transporting only H.323 traffic. The closed functionality of the H.323 proxy is necessary for creating this type of backbone. You can place a closed H.323 proxy on each edge of the multimedia backbone to achieve the following goals:

Figure 52 illustrates a network with a multimedia backbone. A gatekeeper (not shown) in the edge network (zone) directs all out-of-zone H.323 calls to the closed proxy on the edge of that network. The closed proxy forwards this traffic to the remote zone through the multimedia backbone. A closed proxy and the edge router may reside in the same Cisco router, or may be in separate routers, as shown in the figure.


Figure52: Sample Network with Multimedia Backbone


Enabling the Proxy to Forward H.323 Packets

To enable the proxy to forward H.323 packets received from the edge network to the multimedia backbone, designate the interface connecting the proxy to the multimedia backbone to the ASR interface by entering the h323 asr command in interface configuration mode. Enabling the proxy to forward H.323 packets satisfies the first goal identified earlier in this section.

Because the proxy terminates two call legs of an H.323 call and bridges them, any H.323 packet traversing the proxy will have the proxy address either in its source field or in its destination field.

To prevent problems that can occur in proxies with multiple IP addresses, designate only one interface to be the proxy interface by entering the h323 interface command in interface configuration mode. Then all H.323 packets originating from the proxy will have the address of this interface in their source field, and all packets destined to the proxy will have the address of this interface in their destination field.

Figure 52 illustrates that all physical proxy interfaces belong either to the multimedia network or to the edge network. These two networks must be isolated from each other in order for the proxy to be closed; however, the proxy interface must be addressable from both the edge network and the multimedia network. For this reason, you must create a loopback interface on the proxy and configure it to the proxy interface.

It is possible to make the loopback interface addressable from both the edge network and the multimedia network without exposing any physical subnets on one network to routers on the other network. Only packets originating from the proxy or packet destined to the proxy can pass through the proxy's interface to the multimedia backbone in either direction. All other packets are considered unintended packets and are dropped. This can be achieved by configuring access control lists (ACLs) so that the closed proxy acts like a firewall that only allows H.323 packets to pass through the ASR interface. This satisfies the second goal identified earlier in this section.

Isolating the Multimedia Network

Now you need only to configure the network such that non-H.323 traffic never attempts to traverse the multimedia backbone and so never risks being dropped by the proxy. This is achieved by completely isolating the multimedia network from all edge networks and from the data backbone, and is done by configuring routing protocols on the various components of the networks.

The example provided in Figure 52 requires availability of six IP address classes, one for each of the four autonomous systems and one for each of the two loopback interfaces. Any Cisco-supported routing protocol can be used on any of the autonomous systems, with one exception: RIP cannot be configured on two adjacent autonomous systems because this protocol does not understand the concept of an autonomous system. The result would be the merging of the two autonomous systems into one.

If the number of IP addresses are scarce, you can use subnetting, but the configuration can get complicated. In this case only the Enhanced IGRP, OSPF, and RIP Version 2 routing protocols, which allow variable-length subnet masks (VLSMs), can be used.

Assuming these requirements are met, you can configure the network depicted in Figure 52 as follows:

In some topologies you can configure the two edge networks and the data backbone as a single autonomous system, but it is preferable to separate them as previously described because they are different networks with different characteristics.

The following examples illustrate the router configuration that is relevant to the closed proxy operation.

Configuring a Co-Edge Proxy with ASR Without Subnetting Example

See Figure 53 and the following sample configurations to learn how to configure RIP on the two edge networks, and IGRP on the two backbone networks.


Figure53: Sample Configuration Without Subnetting


PX1 Configuration

!
proxy h323
!
interface Loopback0
 ip address 101.0.0.1 255.0.0.0
!Assume PX1 is in Zone 1, and the gatekeeper resides in the same routers as PX1:
 h323 interface
 h323 h323-id PX1@zone1.com
 h323 gatekeeper ipaddr 101.0.0.1
!
interface Ethernet0
 ip address 172.20.0.1 255.255.0.0
!
interface Ethernet1
 ip address 172.22.0.1 255.255.0.0
 ip access-group 101 in
 ip access-group 101 out
 h323 asr
!
router rip
 network 172.20.0.0
 network 101.0.0.0
!
router igrp 4000
 network 172.22.0.0
 network 101.0.0.0
!
access-list 101 permit ip any host 101.0.0.1
access-list 101 permit ip host 101.0.0.1 any
access-list 101 permit igrp any any

R1 Configuration

!
interface Ethernet0
 ip address 172.20.0.2 255.255.0.0
!
interface Ethernet1
 ip address 172.21.0.1 255.255.0.0
!
router rip
 redistribute igrp 5000 metric 1
 network 172.20.0.0
!
router igrp 5000
 redistribute rip metric 10000 10 255 255 65535
 network 172.21.0.0
 distribute-list 10 out
!
access-list 10 deny ip 101.0.0.0 0.255.255.255
access-list 10 permit any

NoteThe configuration for PX2 and R2 is the same as PX1 and R1.

Co-Edge Proxy with Subnetting Example

Figure 54 illustrates how to configure Enhanced IGRP on all networks.


Figure54: Sample Configuration with Subnetting


PX1 Configuration

!
proxy h323
!
interface Loopback0
 ip address 172.21.10.1 255.255.255.192
 h323 interface
 h323 h323-id PX1@zone1.com
 h323 gatekeeper ipaddr 172.21.20.1
!
interface Ethernet0
 ip address 172.21.0.1 255.255.255.192
!
interface Ethernet1
 ip address 172.21.2.1 255.255.255.192
 ip access-group 101 in
 ip access-group 101 out
 h323 asr
!
router eigrp 4000
 redistribute connected metric 10000 10 255 255 65535
 passive-interface Ethernet1
 network 172.21.0.0
 distribute-list 10 out
 no auto-summary
!
router eigrp 5000
 redistribute connected metric 10000 10 255 255 65535
 passive-interface Ethernet0
 network 172.21.0.0
 distribute-list 11 out
 no auto-summary
!
access-list 10 deny 172.21.2.0 0.0.0.63
access-list 10 permit any
access-list 11 deny 172.21.0.0 0.0.0.63
access-list 11 permit any
access-list 101 permit ip any host 172.21.10.1
access-list 101 permit ip host 172.21.10.1 any
access-list 101 permit eigrp any any

R1 Configuration

!
interface Ethernet0
 ip address 172.21.0.2 255.255.255.192
!
interface Ethernet1
 ip address 172.21.1.1 255.255.255.192
!
router eigrp 4000
 redistribute eigrp 6000 metric 10000 10 255 255 65535
 passive-interface Ethernet1
 network 172.21.0.0
 no auto-summary
!
router eigrp 6000
 redistribute eigrp 4000 metric 10000 10 255 255 65535
 passive-interface Ethernet0
 network 172.21.0.0
 distribute-list 10 out
 no auto-summary
!
access-list 10 deny 172.21.10.0 0.0.0.63
access-list 10 permit any

NoteThe configuration for PX2 and R2 is the same as PX1 and R1.

Configuring an Inside-Edge Proxy with ASR Without Subnetting Example

The configuration of the co-edge proxy in Edge net 1 has already been presented above. Figure 55 illustrates the configuration of the inside-edge proxy, PX2, and edge router, R2, of Edge net 2. RIP is used on the edge networks. IGRP is used on the data backbone and the multimedia backbone.


Figure55: Edge Net 2 with Inside-Edge Proxy, No Subnetting


PX2 Configuration

!
proxy h323
!
interface Ethernet0
 ip address 172.23.0.2 255.255.0.0
!
interface Serial0
 ip address 102.0.0.2 255.0.0.0
 ip access-group 101 in
 ip access-group 101 out
 h323 interface
 h323 asr
 h323 h323-id PX2@zone2.com
 h323 gatekeeper ipaddr 102.0.0.2
!
router rip
 redistribute connected metric 10000 10 255 255 65535
 network 172.23.0.0
!
access-list 101 permit ip any host 102.0.0.2
access-list 101 permit ip host 102.0.0.2 any

R2 Configuration

!
interface Ethernet0
 ip address 172.23.0.1 255.255.0.0
!
interface Ethernet1
 ip address 172.22.0.1 255.255.0.0
 ip access-group 101 in
 ip access-group 101 out
!
interface Ethernet2
 ip address 172.21.0.2 255.255.0.0
!
interface Serial0
 ip address 102.0.0.1 255.0.0.0
!
router rip
 redistribute igrp 5000 metric 1
 network 172.23.0.0
!
router igrp 4000
 network 102.0.0.0
 network 172.22.0.0
!
router igrp 5000
 redistribute rip metric 10000 10 255 255 65535
 network 172.21.0.0
 distribute-list 10 out
!
ip route 102.0.0.2 255.255.255.255 Serial0
access-list 10 deny ip 102.0.0.0 0.255.255.255
access-list 10 permit any
access-list 101 permit ip any host 102.0.0.2
access-list 101 permit ip host 102.0.0.2 any

NoteTo guarantee that all traffic between the proxy and other proxies is carried over the multimedia backbone, run IGRP 4000 on both the 102.0.0.0 network and the 172.22.0.0 network, and make sure that the H.323 proxy interface address (102.0.0.2) is not advertised over the data network (distribute list 10 in IGRP 5000). Doing this also eliminates the need to configure policy routes or static routes.

Configuring an Open Proxy, QoS Enforced, Using RSVP Example

Figure 56 illustrates a proxy configuration that was created on a Cisco 2500 router with one Ethernet interface and two serial interfaces. Only the Ethernet interface is in use.


Figure56: Configuring a QoS-Enforced Open Proxy Using RSVP


PX1 Configuration

!
version 11.3
no service password-encryption
service tcp-small-servers
!
hostname ExampleProxy
!
!
no ip domain-lookup
!
!
proxy h323
!
interface Ethernet0
 ip address 172.21.127.38 255.255.255.192
 no ip redirects
 ip rsvp bandwidth 7000 7000
 ip route-cache same-interface
 fair-queue 64 256 1000
 h323 interface
 h323 qos rsvp controlled-load
 h323 h323-id px1@zone1.com
 h323 gatekeeper ipaddr 172.21.127.39
!
interface Serial0
 no ip address
 shutdown
!
interface Serial1
 no ip address
 shutdown
!
router rip
 network 172.21.0.0
!
ip classless
!
!
line con 0
 exec-timeout 0 0
line aux 0
 transport input all
line vty 0 4
 password lab
 login
!
end

Configuring a Closed Co-Edge Proxy with ASR, Network Without Subnetting Example

Figure 57 illustrates how to configure RIP on the edge networks and IGRP on the two backbone networks. A Cisco 2500 router is used for the proxy.


Figure57: Configuring a Closed Co-Edge Proxy with ASR


PX1 Configuration

!
version 11.3
no service password-encryption
service tcp-small-servers
!
hostname ExampleProxy
!
!
no ip domain-lookup
!
!
proxy h323
!
interface Loopback0
 ip address 101.0.0.1 255.0.0.0
 h323 interface
 h323 qos ip-precedence 4
 h323 h323-id px1@zone1.com
 h323 gatekeeper ipaddr 172.20.0.3
!
interface Ethernet0
 ip address 172.20.0.1 255.255.255.192
 no ip redirects
!
interface Serial0
 no ip address
 shutdown
!
interface Serial1
 ip address 172.22.0.1 255.255.0.0
 ip access-group 101 in
 ip access-group 101 out
 h323 asr
!
router rip
 network 172.20.0.0
 network 101.0.0.0
!
router igrp 4000
 network 172.22.0.0
 network 101.0.0.0
!
ip classless
access-list 101 permit ip any host 101.0.0.1
access-list 101 permit ip host 101.0.0.1 any
access-list 101 permit igrp any any
!
!
line con 0
 exec-timeout 0 0
line aux 0
 transport input all
line vty 0 4
 password lab
 login
!
end

Defining Multiple Zones Example

The following example shows how you can define multiple local zones for separating your gateways:

router(config-gk)# zone local gk408or650 xyz.com
router(config-gk)# zone local gk415 xyz.com
router(config-gk)# zone prefix gk408or650 408.......
router(config-gk)# zone prefix gk408or650 650.......
router(config-gk)# zone prefix gk415 415.......
 

Now you can configure all the gateways to be used for area codes 408 or 650 to register with gk408or650 and all gateways to be used for area code 415 to register with gk415.

Defining One Zone for Multiple Gateways Example

The following example shows how you can put all your gateways in the same zone but use the gw-priority keyword to determine which gateways will be used for calling different area codes:

router(config-gk)# zone local localgk xyz.com
router(config-gk)# zone prefix localgk 408.......
router(config-gk)# zone prefix localgk 415....... gw-priority 10 gw1 gw2
router(config-gk)# zone prefix localgk 650....... gw-priority 0 gw1
 

The commands shown accomplish the following tasks:

A priority 0 is assigned to gateway gw1 to exclude it from the gateway pool for prefix 650........ When gateway gw2 registers with gatekeeper localgk, it is added to the gateway pool for each prefix as follows:

To change gateway gw2 from priority 10 for zone 415....... to the default priority 5, enter the following command:

router(config-gk)# no zone prefix localgk 415....... gw-pri 10 gw2
 

To change both gateways gw1 and gw2 from priority 10 for zone 415....... to the default priority 5, enter the following command:

router(config-gk)# no zone prefix localgk 415....... gw-pri 10 gw1 gw2
 

In the preceding example, the prefix 415....... remains assigned to gatekeeper localgk. All gateways that do not specify a priority level for this prefix are assigned a default priority of 5. To remove the prefix and all associated gateways and priorities from this gatekeeper, enter the following command:

router(config-gk)# no zone prefix localgk 415.......

Configuring a Proxy for Inbound Calls Example

In the following example, the local zone sj.xyz.com is configured to use a proxy for inbound calls from remote zones tokyo.xyz.com and milan.xyz.com to gateways in its local zone. The sj.xyz.com zone is also configured to use a proxy for outbound calls from gateways in its local zone to remote zones tokyo.xyz.com and milan.xyz.com.

router(config)# gatekeeper
router(config-gk)# use-proxy sj.xyz.com remote-zone tokyo.xyz.com inbound-to gateway
router(config-gk)# use-proxy sj.xyz.com remote-zone tokyo.xyz.com outbound-from gateway
router(config-gk)# use-proxy sj.xyz.com remote-zone milan.xyz.com inbound-to gateway
router(config-gk)# use-proxy sj.xyz.com remote-zone milan.xyz.com outbound-from gateway
 

Because the default mode disables proxy communications for all gateway calls, only the gateway call scenarios listed can use the proxy.

Configuring a Proxy for Outbound Calls Example

In the following example, the local zone sj.xyz.com uses a proxy for only those calls that are outbound from H.323 terminals in its local zone to the specified remote zone germany.xyz.com:

router(config)# gatekeeper
router(config-gk)# no use-proxy sj.xyz.com default outbound-from terminal
router(config-gk)# use-proxy sj.xyz.com remote-zone germany.xyz.com outbound-from
terminal
 

Note that any calls inbound to H.323 terminals in the local zone sj.xyz.com from the remote zone germany.xyz.com use the proxy because the default applies.

Removing a Proxy Example

The following example shows how to remove one or more proxy statements for the remote zone germany.xyz.com from the proxy configuration list:

router(config-gk)# no use-proxy sj.xyz.com remote-zone germany.xyz.com
 

The command removes all special proxy configurations for the remote zone germany.xyz.com. After you enter a command like this, all calls between the local zone (sj.xyz.com) and germany.xyz.com are processed according to the defaults defined by any use-proxy commands that use the default option.

Prohibiting Proxy Use for Inbound Calls Example

To prohibit proxy use for inbound calls to H.323 terminals in a local zone from a specified remote zone, enter a command similar to the following command:

router(config-gk)# no use-proxy sj.xyz.com remote-zone germany.xyz.com inbound-to
terminal
 

This command overrides the default and disables proxy use for inbound calls from remote zone germany.xyz.com to all H.323 terminals in the local zone sj.xyz.com.

Disconnecting a Single Call Associated with a Multimedia Conference Manager Gateway Example

The following example forces an active call on the Multimedia Conference Manager gateway to be disconnected. The local ID number of the active call is 12-3339.

router> enable
router# clear h323 gatekeeper call local-callID 12-3339

Disconnecting All Calls Associated with an Multimedia Conference Manager Gateway Example

The following example forces all active calls on the Multimedia Conference Manager gateway to be disconnected:

router> enable
router# clear h323 gatekeeper call all

hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Jul 27 00:06:51 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.