12.07.2015 Views

Admin Guide - VoIP software provider

Admin Guide - VoIP software provider

Admin Guide - VoIP software provider

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

If you need more flexibility, you can edit the v_check_pxrules stored procedure manually using any SQL expression.For CLI control you can set the “cli” field for any user:CLI: CLIR and CLIP settings0: forward always (forward asserted as normal number always!). Will not hide, even if caller was set so.1: normal handling (forward asserted as normal number) -default2: forward as asserted identity always (identityrewrite asserted)3: forward as asserted identity only to trusted domains (identityrewrite asserted)4: normal hide (no idenityrewrite forwarding)5: force hide (no asserted identity too!). Always hidden.To completely rewrite the A number you can use the “rewriteanumber” field.To cut some prefixes from the A number use the “cutanumber” field.To allow some A numbers and rewrite other numbers you can use the identityrewrite and identityforward fields.This can be useful when not all your user have real PSTN numbers.Addtechprefix: we insert this number before the callednumber if the caller doesn‟t send its calls with tech prefix.identityforward: we can toward these kinds of usernames and the other we rewrite to „identityrewrite”.identityrewrite: if the caller username don‟t match the identityforward prefix, then we rewrite it.For more control over the A number you can use the prefix rules form or manually edit the v_check_pxrules stored procedure.Prefixed can be also used for authentication, routing and billing.5.89. Possible NATs and firewallsThere are several ways UDP might be handled by a specific NAT or firewall implementations, these are categorized into:Full Cone NATA full cone NAT is a solution, where all requests from the same internal IP address and port are mapped to the same external IP address and port.Furthermore, any external host can send a packet to the internal host, by sending a packet to the mapped external address.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!