Questions about VoIP, Can anybody help me?

Hi All,
I am learning VoIP now and I have serveral questions:
1. when I use "destination-pattern" command in "dial-peer" command, how will the number forwarded? For example: If I want to forward the number 123456 to ip x.x.x.x. If I use "destination-pattern 12...." to identify the number, the router will forward 123456 to x.x.x.x or 3456 to x.x.x.x? I think the answer is 123456. Am I right? And If I am right, there is another issue. What should I do if I just want to forward 3456 when received 123456? I think this is helpful to implement the dialing plan to use some digits as a prefix and discard the prefix to forward to another destination when received the number.
2. Can cisco router only support e.164 numbering plan? Can I use another? How can I explicity config the numbering plan in the router?
3. If there is a case like this:
PhoneA--R1--R2--R3--R4--PhoneB
R2 and R3 is connected via frame-relay. So when I use the "dial-peer" command in R1 and R4, should I use "voip" or "vofr" parameter?
Thank You!
Best Regards
Teru Lei

1) Here is an example of a dial-peer
Dial-peer voice 123456 voip #this mean this is a voip type dial peer name #123456
destination-pattern 123456T # mean when you will call 123456 and any number after that it will go to this dial peer
session target ipv4:192.168.0.1 # this will fwd the packet to that IP when you #will call 123456......
If you like to call somthing and send somthing else you can do translation rule
translation-rule 1
Rule 1 123456 3456
and on the dial-peer you need to set
translate-outgoing calling 1
2) Yes it support E.164
3) I would reccomand to use VOIP

Similar Messages

  • HT1918 I cannot remember my security question answers. Can anybody help please!?!?

     

    If you have a rescue email address set up on your account then you can try going to https://appleid.apple.com/ and click 'Manage your Apple ID' on the right-hand side of that page and log into your account. Then click on 'Password and Security' on the left-hand side of that page and on the right-hand side you might see an option to send security question reset info to your rescue email address.
    If you don't have a rescue email address set up then go to Express Lane  and select 'iTunes' from the list of 'products' in the middle of the screen.
    Then select 'iTunes Store', and on the next screen select 'Account Management'
    Next choose 'iTunes Store Account Questions' or 'iTunes Store account security' (it appears to vary by country) and fill in that you'd like your security questions/answers reset.
    You should get an email reply within about 24 hours (and check your Spam folder as well as your Inbox).
    Or you could see if the second half of Kappy's reply in this thread helps : https://discussions.apple.com/message/20357006#20357006

  • I forgot the answers to my security questions so I went to my account to change them, but the email account they send the security info to no longer exists and I don't know how to change it. Can anybody help me?

    I forgot my answers to my security questions so I went to my account to change them, but the email accout that they send all the security info on how to change them no longer exists and I don't know how to change that email with knowing my security question. Can anybody help me?

    You need to ask Apple to reset your security questions. To do this, click here and pick a method; if that page doesn't list one for your country or you're unable to call, fill out and submit this form.
    (122370)

  • About three days ago my ipod said i needed to sync and so i did . when i did it stop working and the wifi is grey out and says no wifi . Ive tried rebooting it , reseting , restarting but nothing seems to work . Can anybody help me ? Please !

    About three days ago my ipod said i needed to sync and so i did . when i did it stop working and the wifi is grey out and says no wifi . Ive tried rebooting it , reseting , restarting but nothing seems to work . Can anybody help me ? Please !

    Hello Philly,
    I believe that when you reset your ipod(command given from the computer, right?)  touch WHILE the ipod was updating, It cleared the system in the middle of writing files, thus corrupting(equivalent of cutting of in the middle of a sentence) the basic running system.
    I suggest you go to an apple store and ask for a technical diagonosis in person. they may offer to help if the problem is fixable. If your ipod is still under warrenty, i would guess it would be free/low cost.
    ~Remember, I am just giving an educated guess on limited information

  • I have an iPhone 3gs and it used to show up on my computer, but now it shows up on my screen that it is charging however, does not appear in iTunes or My Computer so i can't sync it. Can anybody help? Thanks

    I have an iPhone 3gs and it used to show up on my computer, but now it shows up on my screen that it is charging however, does not appear in iTunes or My Computer so i can't sync it. Can anybody help? Thanks.

    Did you already make sure that Apple Mobile Device Service is installed and active on your computer?
    http://support.apple.com/kb/TS1567
    More troubleshooting about your device not recognized in Windows can be found here: http://support.apple.com/kb/TS1495

  • Can anybody help? My Safari browser keeps crashing. The whole window just turns grey.

    Can anybody help? My Safari browser keeps crashing on iMac 10.7.5. The whole window just turns grey. It started happening around the time of the new bookmarks menu upgrade recently which changed the bookmarks to be only on the side and makes it so you can see all your bookmarks while browsing.  I know I have a lot of bookmarks, so I tried hiding them, but it still happens. I ALREADY TRIED CLEARING MY HISTORY, AND THAT DID NOT HELP, AND I HAVE NO EXTENSIONS FOR THIS BROWSER.
    Does the fact that I am in Brasil have anything to do with it?
    Thank you to anyone who can help. In case no one can come up with an answer, is there an easy way to transfer my bookmarks from safari to either firefox or chrome?
    Much appreciated.

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are outside the safe harbor, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Most of the real-world danger of malware attack comes from highly targeted "zero-day" exploits that are not yet recognized.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • I have just download a book from itunes store but, i don't have an iPad to read it. Can anybody help me? Can i convert it? Thanks.

    i have just download a book from itunes store but, since i don't have an iPad, i can´t read it or even see it. Can anybody help me? Can i convert it? Thanks.

    Every purchase page for an ebook has a section that says "Requirements".  What does that say for your particular book?  That should give you the answer to your question.  Conversion is normally not possible.
    But there are some exceptions.  Please provide the Title of the book if you want further help.

  • Can anybody help me to access Internet with my existing network

    Dear All Recently I purchased new WRT 54G wireless router. Also I have tied up with new ISP to give wireless internet access to some of the my Higher authority employees only. My office network setup is as shown below Local Ip range : 172.18.0.0 to 172.18.2.254 subnet mask : 255.255.0.0 Default gateway : 172.18.0.50 Wireless Router configured as : 1) configured all ISP settings 2) configured LAN site setting( But I had to setup lan as 192.160.1.X i.e the required by ISP ). 3) connected ISP lan port of WRT54G to cable coming from ISP Modem 4) Connected Local port( any one of 4 ports) to my existing switch(existing LAN----172.18.x.x network) Now suppose I configure user laptop to access new ISP internet through wireless.I have done following setting Wireless LAN setting : Ip address : 192.168.1.2( I can give any IP of network 192.168.1.x) subnet mask:255.255.255.0 Default gateway :192.168.1.1 DNS : Automatic I can access the new ISP internet without any problem with WRT54g router. But the problem is while accessing the new ISP internet( Using 192.168.1.x/255.255.255.0/192.168.1.1 network),Also I want to access my existing network( 172.18.0.0/255.255.0.0/172.18.0.50). Since I am very weak in routing the network, can anybody help me out to do routing setting in linksys WRT54g router so as to access my New ISP internet using existing network( 172.18.0.0/255.255.0.0/172.18.0.50). Please help me anybody

    O.K. Still the crucial question remains whether you want the separation of the ISPs enforced or not, i.e. do you actively want to prevent someone to switch to the other ISP simply by reconfiguring some settings on the computer or not?
    If you don't want to enforce the policy and it is enough to just use different IP settings on different computers then this would probably be the easiest solution.
    If you can, install a DHCP server (e.g. on a Linux box) inside your network which does the DHCP address assignments. That way you can dynamically assign the proper addresses to the computers.
    You can then assign the WRT an LAN IP address inside the 172.18 subnet. The DHCP server assigns anyone addresses inside your 172.18 subnet. However, you configure different gateway and dns server addresses depending on the computer. You configure the MAC addresses of those 'preferred' laptops the gateway address of the WRT and the public DNS servers of the new ISP. All other computers you assign the old gateway address of the old router and the DNS server addresses of the first ISP.
    If you don't want to install your own DHCP server you can assign either pool static IP addresses, i.e. assign all preferred laptops static IP address including the gateway address of WRT and use DHCP only for the normal computers or vice versa.
    What won't work reliably is to run two DHCP servers on both routers and connect the LAN of both together. You'll end up with computers picking up the wrong IP address from the wrong DHCP server.
    Again, this separation only happens due to the different configuration of the computers. If anyone can freely reconfigure the computer he has it is easily possible to change the gateway address and thus swap the ISP. But as long as people comply with the rules it works.
    If you want to enforce the separation you will have to install another router between the two gateway router. This third router passes traffic from the WRT subnet for the 172.18 subnet and accepts the return traffic. In the opposite direction the router does not forward traffic. You should even be able to use a standard NAT gateway router and hook up the internet port to the 172.18 subnet and the LAN port to the WRT. You then configure a static route on the WRT to forward packets for 172.18 subnet to the third router. If the third router does not NAT then you have to configure another route on the first router to forward traffic for WRT subnet (192.168.1.*) to the third router as well.

  • I am trying to instal the latest version of iTunes onto my MacBook Pro, but my computer has been "configuring" the installation since 5pm yesterday and now it is 10:30am. It has never done this before. Can anybody help me out?

    I am trying to instal the latest version of iTunes onto my MacBook Pro, but my computer has been "configuring" the installation since 5pm yesterday and now it is 10:30am. It has never done this before. Can anybody help me out?

    Many thanks b Noir
    This is a copy of ONEof the keys  in the registry I changed  as told by Apple support today. I also have changed others as instructed by GEAR  software support to manually delete GEAR drivers (that I had installed but couldn't delete some of the others  they mentioned from Windows system 32. Then some bright spark at work told me I need the Gear drivers so  I downloaded the software and installed again.
    Sorry, just this minute went to insert image  and it is giving me a message saying this sort of content  is not allowed?.
    The most recent key I altered is in: HKey _local _machine. System\class - 4D36E965-E325-11CEBFC1-08002BE10318. Upper Filter data: Upper filter NTIDrvr  SiRem GEARAspiWDN.
    The GEARsoftware info about manually deleting  GEAR drive is from:
    http://www.gearsoftware.com/wiki/index.php?title=DRIVERS:_Windows_-_Updating%2C_ removing%2C_64_bit_versions%2C_etc
    I hope you can help

  • I get an error message when trying to email photos. It says "The email server didn't recognize your username/password combination." Yet I have reset my password and was able to log in to this Support Community. Can anybody help me?

    I get an error message when trying to email photos. It says "The email server didn't recognize your username/password combination." Yet I have reset my password and was able to log in to this Support Community. Can anybody help me?

    See my answer to your previous duplicate question. What happened when you tried my answers?
    LN

  • Visual C ++ Runtime Library, Runtime Error.. I keep getting this message can anybody help!

    Visual C ++ Runtime Library, Runtime error..I keep getting this message can anybody help please !!

    What is the /exact/ error?  What are your system details?  Are you running 32-bit or 64-bit version of the software (if your OS supports it)? 
    I assume the message you are getting is about the UI runtimes every application needs some version of, which is typically supplied by Visual Studio, though there are redist versions bundled with many apps.
    Unfortunately, Windows library management can be a bit of DLL hell (which Microsoft is making an effort to address in Windows 7.)  There are many, many references to this with potential fixes, in Microsoft KB articles.
    But the first step is good information so you can work from the known to the unknown.

  • Hi iPad 2 apps are not opening? Can anybody help please.

    Hi iPad 2 apps are not opening? Can anybody help me please.

    If it's happening on all the apps that you've downloaded from the App Store, but the Apple built-in ones are ok, then try downloading any free app from the store (as that appears to reset something) and then re-try them - the free app can then be deleted.
    If it's happening on all apps including Apple's then try closing them all completely and then see if they work when you re-open them : from the home screen (i.e. not with any app 'open' on-screen) double-click the home button to bring up the taskbar, then press and hold any of the apps on the taskbar for a couple of seconds or so until they start shaking, then press the '-' in the top left of each app to close them, and touch any part of the screen above the taskbar so as to stop the shaking and close the taskbar.
    If that doesn't work then you could try a reset : press and hold both the sleep and home buttons for about 10 to 15 seconds (ignore the red slider), after which the Apple logo should appear - you won't lose any content, it's the iPad equivalent of a reboot.

  • Can anybody help fix my itunes

    my itunes randomly stopped opening one day and now it wont let me reinstall it, can anybody help me fix it?

    The error code is 2330.
    That one's consistent with disk/file damage. The first thing I'd try with that is running a disk check (chkdsk) over your C drive.
    XP instructions in the following document: How to perform disk error checking in Windows XP
    Vista instructions in the following document: Check your hard disk for errors
    Windows 7 instructions in the following document: How to use CHKDSK (Check Disk)
    Select both Automatically fix file system errors and Scan for and attempt recovery of bad sectors, or use chkdsk /r (depending on which way you decide to go about doing this). You'll almost certainly have to schedule the chkdsk to run on startup. The scan should take quite a while ... if it quits after a few minutes or seconds, something's interfering with the scan.
    Does the chkdsk find/repair any damage? If so, can you get an install to go through properly afterwards?

  • Can anybody help? Accidentally trashed iphoto library, emptied trash!

    Can anybody help? Accidentally trashed iphoto library, emptied trash!

    Obvious question I know, but do you have a back up?
    There is no way to recover an intact iPhoto Library once it's deleted. The best you can hop for is togged bak the photos. Try a app like File Salvage - you can download a free trial and it will scan the disk for you and tell you with might be recoverable. Actual recovery will require that you purchase the app. There may be many files with the same or similar names. Always recover the largest file size.
    There are other such apps. Search on Macupdate or the App Store

  • Images won't open in my gmail or websites can anybody help me? this happend when i updated to the newest version of Firefox

    Question
    Images won't open in my gmail or websites can anybody help me? This happen when I updated to the newest version of Firefox

    If images are missing then check that you aren't blocking images from some domains.
    See:
    * http://kb.mozillazine.org/Images_or_animations_do_not_load
    * Check the permissions for the domain in the current tab in Tools > Page Info > Permissions
    * Check that images are enabled: Tools > Options > Content: [X] Load images automatically
    * Check the exceptions in Tools > Options > Content: Load Images > Exceptions
    * Check the "Tools > Page Info > Media" tab for blocked images (scroll through all the images)
    There are also extensions (Tools > Add-ons > Extensions) that can block images.
    * [[Troubleshooting extensions and themes]]

Maybe you are looking for

  • How do I get LP7 to treat OMFs like PT does?

    I've been working with student films recently and they all use Avid for their video editing. They deliver their projects to me for mixing as a Quicktime file and an OMF from Avid. We have tried exporting it from Avid with different options. Protools

  • Error in Oracle 10g Installation windows 2000 advance server

    Hi, I am facing error message below when try 2 install oracle 10 in my work station . Already 8i and 9i with forms and reports was there in my machine. The follwing error display in log file. Actual Result: 4 Check complete. The overall result of thi

  • Factors influencing creation of a planned order

    Hi,         What are the factors that lead to creation of  a planned order during a Heuristic run? When does a system decides to create a planned order? at what stock level? and how is the planned order qty. decided? I have a material in a location t

  • Iphone 2.0 App

    Have anyone experienced difficulties pairing Apple bluetooth with the iphone after uploading 2.0 app.? i have not been able to syn at all...thought maybe there is a problem w/ my bluetooth.

  • Connecting via ethernet?

    I am in a hurry to connect my IBook G4 to my wife's G3 desktop in order to allow her to take my IBook to the States from the UK for a prolonged stay. What's the best way to transfer all my data including in Applications ( incl Word)