Chapter 48. Tunneling proprietary protocols
Part III. Software resources
Tunneling proprietary protocols
Table of Contents
48.1. Tunneling proprietary protocols
48.1.1. Link check
48.2. Configuring Packet Voice tunnels
48.2.1. Packet Voice over IP- Extended Mode
48.2.2. IP Packet Voice - Extended-Server/Extended Client Mode
48.2.3. IP-BCK Packet Voice - Extended Mode with ISDN backup
48.2.4. IP Packet Voice - Extended Mode with Double Path
48.3. Configuring Abilis IP Tunnels (AIPT)
48.3.1. Abilis IP Tunnel over IP – Extended Mode
48.3.2. Abilis IP Tunnel over IP - Extended-Server/Extended Client Mode
48.3.3. Abilis IP Tunnel over IP - Extended Mode with ISDN backup
48.3.4. Abilis IP Tunnel over IP - Extended Mode with Double Path
48.4. Tunneling diagnostics and statistics
48.4.1. Tunneling diagnostics
48.4.2. Tunneling statistics
48.5. Appendix - LN2 parameter