Chapter 45. Tunneling proprietary protocols
Part III. Software resources
Tunneling proprietary protocols
Table of Contents
45.1. Tunneling proprietary protocols
45.1.1. Link check
45.2. Configuring Packet Voice tunnels
45.2.1. Packet Voice over IP- Extended Mode
45.2.2. IP Packet Voice - Extended-Server/Extended Client Mode
45.2.3. IP-BCK Packet Voice - Extended Mode with ISDN backup
45.2.4. IP Packet Voice - Extended Mode with Double Path
45.3. Configuring Abilis IP Tunnels (AIPT)
45.3.1. Abilis IP Tunnel over IP – Extended Mode
45.3.2. Abilis IP Tunnel over IP - Extended-Server/Extended Client Mode
45.3.3. Abilis IP Tunnel over IP - Extended Mode with ISDN backup
45.3.4. Abilis IP Tunnel over IP - Extended Mode with Double Path
45.4. Tunneling diagnostics and statistics
45.4.1. Tunneling diagnostics
45.4.2. Tunneling statistics
45.5. Appendix - LN2 parameter