How to configure an AvayaTM IP600 Server with Cisco
Gatekeeper - Issue 1.0
Abstract
These Application Notes describe the configurations that enable the Avaya IP600 Server to
successfully interoperate with Cisco’s Gatekeeper. These notes describe both an Avaya
Gatekeeper to Cisco Gatekeeper peer configuration, as well as a Multiple Gatekeeper
Configuration between an Avaya Gatekeeper and multiple Cisco Gatekeepers.
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
One of the functions of a Gatekeeper is to perform E.164 to IP address resolution based on a dial
plan. All remote calls within a Zone are sent to its Gatekeeper, where it is sent either to a
gateway or to another remote gatekeeper zone. These Application Notes describe how to
configure an Avaya™ IP600 Server to interoperate with Cisco’s Gatekeepers and Gateways.
2. Background
In the block diagram (Figure 1) below, the Avaya™ IP600 Server is represented as a Gatekeeper
and Gateway within one box. This is because in H.323 terms, the Avaya IP600 Server is a
Gatekeeper with an embedded or fixed Gateway. Avaya’s IP600 Gatekeeper provides address
translation and control access. Avaya’s embedded Gateway performs the media conversions.
Once an endpoint registers with the Gatekeepers (via RAS), call signaling messages between the
endpoint are routed through Avaya’s Gatekeeper. This method of call signaling is called
Gatekeeper Routed Call Signaling and is the method used by Avaya.
Cisco4604
Gateway A
Avaya IP600
Gatekeeper
Gateway
Zone 1
Cisco 3660
Gatekeeper
Cisco 1751
Gateway B
Zone 2
Figure 1: Block Diagram of IP600 Server and Cisco Gatekeeper
The configuration in Figure 2 is based on the block diagram depicted in Figure 1. In this
configuration, Avaya and Cisco are considered to be in peer gatekeeper zones; that is, the Avaya
Gatekeeper zone manages extensions 77XX, while Cisco Gatekeeper zone manages extensions
62XX and 66XX. When an extension in Zone 1 calls an endpoint in Zone 2, Zone 2 is
considered a remote zone to Zone 1. Likewise in the other direction, when an endpoint in Zone 2
calls an extension in Zone 1, Zone 1 is considered to be a remote zone to Zone 2.
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
All communications of E.164 traffic must first deal with the Gatekeeper because it is configured
to send or direct E.164 numbers to an appropriate IP endpoint. In Figure 2 for example, when a
phone on Gateway A (Catalyst 4000 Gateway) calls a phone on Gateway B (Cisco 1751), the
E.164 number being called from A is presented to the Cisco’s Gatekeeper. The Gatekeeper finds
the called number and its associated end-point IP address within its configuration. A direct
channel is set up between gateway A and gateway B, where the called number is directed.
Gateway B’s dial-peers steers the call to the port where the actual phone is located.
Cisco 3660
Catalyst 4000 - 4604-GWY
Gatekeeper
Zone 2
Cajun P333T
Avaya IP Phone
X 7702
Avaya IP Phone
X 7712
. 2
10.30.1.0
HS1HS2 OK1OK2 PS
To
DHCP Server
TFTP Server
.1
Cisco 4224
10.9.1.5
123456789101112
COLACTSTA-
. 2
Gateway A
10.50.1.0
.1
10.20.1.0
.1
CONSOLE
CLAN
10.9.1.4
10.9.1.3
Prowler
Avaya IP SoftPhone
X 7716
Avaya
IP 600
Zone 1
. 2
FXS
X 6200
Gateway B
Cisco 1751
DCP
X 7704
DCP
X 7705
FXS
X 6600
Figure 2: IP600 Server and Cisco Gatekeeper
3. Equipment and Software Validated
1. Avaya
Avaya Equipment Version
Avaya™ IP600 Server Version R010c.01.0.032.3
Avaya™ IP Telephone Version 1.51
2. Cisco (IOS)
Cisco Router Version of IOS
Cisco 3660 IOS 12.1.5T10
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
The following screen shots show the pertinent aspects of the Avaya IP600 Server configuration.
The more important aspects are highlighted.
4.1. Outbound Signaling
The administration of the Cisco Gatekeeper as a remote peer requires the addition of a Signaling
/ Trunk Group that points at the Cisco Gatekeeper IP Address as the Far-End (10.30.1.2). In
addition, the appropriate routing (UDP, AAR/ARS, Routing Pattern, etc.) procedures to access
this Signaling / Trunk Group combination are required.
4.1.1. Signaling Group
Permitting the Avaya IP600 server to be administered as a Gatekeeper requires an IP Trunk, and
an H.323 Signaling Group set up as follows. The Signaling Group’s “LRQ Required” is set to
“y”, the Near-End IP address is set to the IP node name of the CLAN (see Node Names-IP) at
port 1719, and the Far-End node name is set to the IP node name of the Cisco Gatekeeper at port
1719. This Signaling Group along with its Trunk Group handles all outbound traffic from Zone
1 to Zone 2.
This Signaling and Trunk Group handle all outbound traffic from Zone 1 to Zone 2. In
addition, the Signaling group points at the Cisco Gatekeeper utilizing port 1719 and “LRQ
Required” must be set to “y”. Note: Cisco uses Port 1719 by default. Also, note that Direct IPIP Audio Connections and IP Audio Hairpinning are set to “n”.
SIGNALING GROUP
Group Number: 6Group Type: h.323
Remote Office? nMax number of NCA TSC: 0
Max number of CA TSC: 0
Trunk Group for NCA TSC:
Trunk Group for Channel Selection: 6
Supplementary Service Protocol: aNetwork Call Transfer? n
In this example, Trunk Group 6 is associated with Signaling Group 6, and includes trunk
member assignment.
TRUNK GROUP
Group Number: 6Group Type: isdnCDR Reports: y
Group Name: Alternate IP600 Test Networ COR: 1TN: 1TAC: 106
Direction: two-wayOutgoing Display? yCarrier Medium: IP
Dial Access? nBusy Threshold: 99Night Service:
Queue Length: 0
Service Type: tieAuth Code? nTestCall ITC: rest
Far End Test Line No:
TestCall BCC: 4
TRUNK PARAMETERS
Codeset to Send Display: 6Codeset to Send National IEs: 6
Max Message Size to Send: 260Charge Advice: none
Supplementary Service Protocol: aDigit Handling (in/out):enbloc/enbloc
Trunk Hunt: cyclicalQSIG Value-Added? n
Digital Loss Group: 13
Calling Number - Delete:Insert:Numbering Format:
Bit Rate: 1200Synchronization: asyncDuplex: full
Disconnect Supervision - In? yOut? n
Answer Supervision Timeout: 0
Trunk Members
Trunk member port values are initially created by assigning the term “ip” in the Port column.
The system will then assign the T000xx value to the port as shown below.
TRUNK GROUP
Administered Members (min/max):1/7
GROUP MEMBER ASSIGNMENTSTotal Administered Members:7
All inbound traffic from Zone 2 to Zone 1 requires an additional Trunk and Signaling Group.
In this case, the Signaling Group’s Near-End IP address is set to the IP address of the CLAN at
port 1720, and the Far-End is unspecified.
The unspecified far-end signaling group is used for all incoming calls from Zone 2 to Zone 1.
The Avaya IP600 Server listens on Port 1720 to handle H.225 /Q.931 traffic.
4.2.1. Unspecified Signaling Group
The “Far-end Node Name” field is left blank, and it is necessary that “Direct IP-IP Audio
Connections” and “IP Audio Hairpinning” be set to “n” on this screen.
SIGNALING GROUP
Group Number: 10Group Type: h.323
Remote Office? nMax number of NCA TSC: 0
Max number of CA TSC: 0
Trunk Group for NCA TSC:
Trunk Group for Channel Selection: 10
Supplementary Service Protocol: aNetwork Call Transfer? n
This Trunk Group is used in conjunction with the unspecified Signaling Group.
TRUNK GROUP
Group Number: 10Group Type: isdnCDR Reports: y
Group Name: Alternate IP600 Test Networ COR: 1TN: 1TAC: 110
Direction: two-wayOutgoing Display? yCarrier Medium: IP
Dial Access? nBusy Threshold: 99Night Service:
Queue Length: 0
Service Type: tieAuth Code? nTestCall ITC: rest
Far End Test Line No:
TestCall BCC: 4
TRUNK PARAMETERS
Codeset to Send Display: 6Codeset to Send National IEs: 6
Max Message Size to Send: 260Charge Advice: none
Supplementary Service Protocol: aDigit Handling (in/out):enbloc/enbloc
Trunk Hunt: cyclicalQSIG Value-Added? n
Digital Loss Group: 13
Calling Number - Delete:Insert:Numbering Format:
Bit Rate: 1200Synchronization: asyncDuplex: full
Disconnect Supervision - In? yOut? n
Answer Supervision Timeout: 0
Trunk Members
Trunk member port values are initially created by assigning the term “ip” in the Port column.
The system will then assign the T000xx value to the port as shown below.
TRUNK GROUP
Administered Members (min/max):1/6
GROUP MEMBER ASSIGNMENTSTotal Administered Members:6
The Node Names-IP form configures CLANs, Prowlers, Gatekeepers and their associated IP
addresses. Display or edit the node name by entering: change node-names ip
Display or change the IP network region by entering: change ip-network region 1
IP Network Region
Region: 1
Name: main
Audio Parameters
Codec Set: 1
UDP Port Range
Min: 2048
Max: 65535
DiffServ PHB Value: 40
802.1p/Q Enabled? n
Direct IP-IP Audio Connections? y
IP Audio Hairpinning? y
4.2.6. IP Codec
Display or change the IP codec by entering: change ip-codec 1. Other codec setting can be
used as long as Cisco “dial-peer” configuration statements as set accordingly.
IP Codec Set
Codec Set: 1
AudioSilenceFramesPacket
CodecSuppressionPer PktSize(ms)
1: G.711MUn220
2:
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
When the commands listed below are entered on the Cisco 3660 router, the Gatekeeper
functionality is enabled. The “zone local” command administers the Gatekeeper itself, where a
Gatekeeper name, domain, and its IP address are indicated and established. Associated with the
local Gatekeeper is a “zone remote” command, where the CLAN name, domain, CLAN’s IP
address and port 1719 are established as a remote zone on the local Cisco Gatekeeper. Since
Avaya is a peer Gatekeeper zone to Cisco, Avaya is administratively placed into Cisco
configuration as a “zone remote”. Associated with the remote zone is its zone prefix (E.164
number). In this case, any patterns beginning with 77 (* represents wild characters) will be
directed at the CLAN board. In addition, the Cisco gateways are defined with the gw-type-prefix command. Note that the shaded area contains descriptive info that is not to be entered.
Gatekeeper
zone local Gk-3660 avaya.com 10.30.1.2! Cisco local or main Gatekeeper
zone remote clan-IP600-gk avaya.com 10.9.1.4 1719 ! CLAN name and IP
zone prefix clan-IP600-gk 77*! Dial pattern known to Avaya IP600
gw-type-prefix 62* gw ipaddr 10.50.1.2 1720 ! Prefix and Gateway Address
gw-type-prefix 66* gw ipaddr 10.20.1.2 1720
no shutdown
6. Catalyst 4000 / 4604GWY Gateway Configuration
This router is configured to be a gateway. The h323-gateway commands provide the mechanism
that enables the Cisco gateway to communicate with the Cisco Gatekeeper. In addition, VOIP
dial-peers provide a RAS path back to the Gatekeeper. The configuration used for this gateway
is displayed below.
interface FastEthernet0/0
ip address 10.50.1.2 255.255.255.0
duplex auto
speed auto
h323-gateway voip interface ! Gateway Interface
h323-gateway voip id Gk-3660 ipaddr 10.30.1.2 1718 ! Gatekeeper ID
h323-gateway voip h323-id 4604-gw ! Assigning an H.323-ID
!
voice-port 3/0
output attenuation 0
!
voice-port 3/1
output attenuation 0
!
dial-peer voice 77 voip
destination-pattern 77..
session target ras ! RAS path back to Gatekeeper
dtmf-relay h245-signal h245-alphanumeric ! Used to relay DTMF tones between
! telephony interfaces and an IP network
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
dial-peer voice 6200 pots
destination-pattern 6200
port 3/0
forward-digits all
!
dial-peer voice 6201 pots
destination-pattern 6201
port 3/1
forward-digits all
!
gateway
7. Cisco 1751 Gateway Router Configuration
This router is also configured as a gateway and the functionality is the same as the Catalyst 4000
/ 4604GWY router. The configuration used for this gateway is displayed below.
interface FastEthernet0/0
ip address 10.20.1.2 255.255.255.0
speed auto
full-duplex
h323-gateway voip interface
h323-gateway voip id Gk-3660 ipaddr 10.30.1.2 1718
h323-gateway voip h323-id 1751-gw
!
voice-port 2/0
!
voice-port 2/1
!
dial-peer voice 6 pots
destination-pattern 6600
port 2/0
forward-digits all
!
dial-peer voice 7 pots
destination-pattern 6601
port 2/1
forward-digits all
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
interface FastEthernet5/15
no ip address
duplex auto
speed auto
switchport access vlan 15
snmp trap link-status
!
interface FastEthernet5/16
no ip address
duplex auto
speed auto
switchport access vlan 16
snmp trap link-status
!
interface Vlan 2
ip address 10.30.1.1 255.255.255.0
!
interface Vlan 4
ip address 10.50.1.1 255.255.255.0
!
interface Vlan 9
ip address 10.20.1.1 255.255.255.0
!
interface Vlan 15 ! Used with Zone 3s configuration
ip address 10.60.1.1 255.255.255.0
!
interface Vlan 16 ! Used with Zone 3s configuration
ip address 10.70.1.1 255.255.255.0
9. Multiple Gatekeeper Configuration
The block diagram illustrated in Figure 3 is the Multiple Gatekeeper Configuration. In general,
all aspects of the above discussion still apply for the Multiple Gatekeeper Configuration. The
addition of a second Cisco Gatekeeper introduces another peer Gatekeeper to the Avaya IP600
Server.
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
Figure 3: Block Diagram IP600 Server with multiple Cisco Gatekeepers
When another Cisco Gatekeeper is placed into the network, the Avaya IP600 Server requires
another Signaling / Trunk Group to take care of all outbound traffic to this new Gatekeeper (that
is between Zone 1 and Zone 3). Additionally, all inbound traffic from this new Gatekeeper
(Zone 3) shall use the unspecified Signaling / Trunk Group created earlier. For this reason, if
multiple Gatekeepers are being used, inbound trunk port capacity may need to be increased to
meet the incoming traffic requirements. The configuration shown in Figure 4 is based on this
block diagram.
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
Figure 4 shows an additional Cisco Gatekeeper (Gatekeeper 2) as well as an additional Cisco
Gateway (Gateway C). Cisco’s Zone 2 and Zone 3 communicate directly to Avaya Zone 1,
where routing between Zones is determined. In other words, Zone 2 and Zone 3 communicate
with each other only through the role of the Zone 1 Gatekeeper .
Again, emphasis is placed on the unspecified Far-end Signaling Group created earlier (Signaling
Group 10 / Trunk Group 10). Its role has increased since it now must dedicate IP ports for
inbound traffic for both Zone 2 and Zone 3. In other words, there are now two Outbound
trunks (Trunk 6 and 12) with only one Inbound trunk (Trunk 10), therefore the Inbound trunk
port capacity should be increased to suit the network needs.
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
The Signaling Group has a Far-End name of “2ndGatekeeper” and an IP node name and listening
port of the second Cisco Gatekeeper. See Node Names-IP. Also, note that “LRQ Required”
must be set to “y”.
SIGNALING GROUP
Group Number: 12Group Type: h.323
Remote Office? nMax number of NCA TSC: 0
Max number of CA TSC: 0
Trunk Group for NCA TSC:
Trunk Group for Channel Selection: 6
Supplementary Service Protocol: aNetwork Call Transfer? n
The Second Cisco Gatekeeper (Zone 3) configuration.
gatekeeper
zone local Gk-3660-2 avaya.com 10.60.1.2!Name of Cisco 2nd Gatekeeper and IP address
zone remote clan-IP600-gk avaya.com 10.9.1.4 1719 !! CLAN interface
zone prefix clan-IP600-gk 77* !! Send this pattern to Avaya IP600 Server
zone prefix clan-IP600-gk 62* !! Send this pattern to Avaya IP600 Server
zone prefix clan-IP600-gk 66* !! Send this pattern to Avaya IP600 Server
gw-type-prefix 69* gw ipaddr 10.70.1.2 1720 !! Zone 3’s Local Gateway
no shutdown
9.5. Zone 2 Cisco Gatekeeper
The original Zone 2 Cisco Gatekeeper has been modified to include a new route pattern to be
passed on to the Avaya IP600 Server.
gatekeeper
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
zone local Gk-3660 avaya.com 10.30.1.2
zone remote clan-IP600-gk avaya.com 10.9.1.4 1719
zone prefix clan-IP600-gk 69* !! Zone 3’s route pattern being sent to Zone 1
zone prefix clan-IP600-gk 77*
gw-type-prefix 66* gw ipaddr 10.20.1.2 1720
gw-type-prefix 62* gw ipaddr 10.20.1.2 1720
no shutdown
9.6. Zone 3 Gateway
The Gateway configuration and dial-peers for the new Gateway (Gateway C) in Zone 3.
interface FastEthernet0/0
ip address 10.70.1.2 255.255.255.0
speed auto
full-duplex
h323-gateway voip interface
h323-gateway voip id Gk-3660-2 ipaddr 10.60.1.2 1718 !Point at 2nd Cisco Gatekeeper
h323-gateway voip h323-id 2nd-1751-gw
!
voice-port 2/0
!
voice-port 2/1
!
dial-peer voice 69 pots ! Extension 69xx is local to Zone 3
destination-pattern 6900
port 2/0
forward-digits all
!
dial-peer voice 691 pots
destination-pattern 6901
port 2/1
forward-digits all
The Gateways in Zone 2 (Gateway A and Gateway B) require an additional “dial-peer” in their
configuration. This dial-peer allows the new (69..) dial pattern to be sent to the local
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
Enter change route-pattern 66 to view or edit route pattern 66.
change route-pattern 66
Pattern Number: 66
Grp. FRL NPA Pfx Hop Toll No.InsertedDCS/ IXC
No.Mrk Lmt List DelDigitsQSIG
DgtsIntw
1: 603nuser
2:nuser
3:nuser
10.5. Route Pattern for Extension 69xx
Enter change route-pattern 69 to view or edit route pattern 69.
change route-pattern 69
Pattern Number: 69
Grp. FRL NPA Pfx Hop Toll No.InsertedDCS/ IXC
No.Mrk Lmt List DelDigitsQSIG
DgtsIntw
1: 1203nuser
2:nuser
3:nuser
11. Conclusion
In a network where H.323 gateways are used, an H.323 Gatekeeper although optional, should be
used to facilitate the translation of E.164 addresses into IP address endpoints. These application
notes attempts to shed some light on how single and multiple gatekeeper zones can interact as
well as, act as a guide to understand more complicated Gatekeeper / Gateway network design.
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes
Avaya and the Avaya Logo are trademarks of Avaya Inc. All trademarks identified by ® and ™
are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the
property of their respective owners. The information provided in these Application Notes is
subject to change without notice. The configurations, technical data, and recommendations
provided in these Application Notes are believed to be accurate and dependable, but are
presented without express or implied warranty. Users are responsible for their application of any
products specified in these Application Notes.
Please e-mail any questions or comments pertaining to these Application Notes along with the
title and filename, located in the lower right corner, directly to the Avaya Solution &
Interoperability Test Lab at interoplabnotes@list.avaya.com
SVS; Reviewed:
WCH/MI 6/20/02
Solution & Interoperability Test Lab Application Notes