Chapter 38. Tunneling proprietary protocols
Part III. Software resources
Tunneling proprietary protocols
Table of Contents
38.1. Tunneling proprietary protocols
38.1.1. Link check
38.2. Configuring Packet Voice tunnels
38.2.1. Packet Voice over IP- Extended Mode
38.2.2. IP Packet Voice - Extended-Server/Extended Client Mode
38.2.3. IP-BCK Packet Voice - Extended Mode with ISDN backup
38.2.4. IP Packet Voice - Extended Mode with Double Path
38.3. Configuring Abilis Ip Tunnels (AIPT)
38.3.1. Abilis IP Tunnel over IP – Extended Mode
38.3.2. Abilis IP Tunnel over IP - Extended-Server/Extended Client Mode
38.3.3. Abilis IP Tunnel over IP - Extended Mode with ISDN backup
38.3.4. Abilis IP Tunnel over IP - Extended Mode with Double Path
38.4. Tunneling diagnostics and statistics
38.4.1. Tunneling diagnostics
38.4.2. Tunneling statistics
38.5. Appendix - LN2 parameter