Chapter 36. Tunneling proprietary protocols
Part III. Software resources
Tunneling proprietary protocols
Table of Contents
36.1. Tunneling proprietary protocols
36.1.1. Link check
36.2. Configuring Packet Voice tunnels
36.2.1. Packet Voice over IP- Extended Mode
36.2.2. IP Packet Voice - Extended-Server/Extended Client Mode
36.2.3. IP-BCK Packet Voice - Extended Mode with ISDN backup
36.2.4. IP Packet Voice - Extended Mode with Double Path
36.3. Configuring Abilis Ip Tunnels (AIPT)
36.3.1. Abilis IP Tunnel over IP – Extended Mode
36.3.2. Abilis IP Tunnel over IP - Extended-Server/Extended Client Mode
36.3.3. Abilis IP Tunnel over IP - Extended Mode with ISDN backup
36.3.4. Abilis IP Tunnel over IP - Extended Mode with Double Path
36.4. Tunneling diagnostics and statistics
36.4.1. Tunneling diagnostics
36.4.2. Tunneling statistics
36.5. Appendix - LN2 parameter