Chapter 44. Tunneling proprietary protocols
Part III. Software resources
Tunneling proprietary protocols
Table of Contents
44.1. Tunneling proprietary protocols
44.1.1. Link check
44.2. Configuring Packet Voice tunnels
44.2.1. Packet Voice over IP- Extended Mode
44.2.2. IP Packet Voice - Extended-Server/Extended Client Mode
44.2.3. IP-BCK Packet Voice - Extended Mode with ISDN backup
44.2.4. IP Packet Voice - Extended Mode with Double Path
44.3. Configuring Abilis IP Tunnels (AIPT)
44.3.1. Abilis IP Tunnel over IP – Extended Mode
44.3.2. Abilis IP Tunnel over IP - Extended-Server/Extended Client Mode
44.3.3. Abilis IP Tunnel over IP - Extended Mode with ISDN backup
44.3.4. Abilis IP Tunnel over IP - Extended Mode with Double Path
44.4. Tunneling diagnostics and statistics
44.4.1. Tunneling diagnostics
44.4.2. Tunneling statistics
44.5. Appendix - LN2 parameter