Polycom V2IU 4350 User Manual
Polycom V2IU 4350 User Manual

Polycom V2IU 4350 User Manual

Converged network appliance
Hide thumbs Also See for V2IU 4350:
Table of Contents

Advertisement

Quick Links

User Manual

2
V
IU 4350 Converged
Network Appliance
V7.2.2 — May 2007

Advertisement

Table of Contents
loading

Summary of Contents for Polycom V2IU 4350

  • Page 1: User Manual

    User Manual IU 4350 Converged Network Appliance V7.2.2 — May 2007...
  • Page 2 As between the parties, Polycom, Inc. retains title to, and ownership of, all proprietary rights with respect to the software contained within its products. The software is protected by United States copyright laws and international treaty provision.
  • Page 3: Table Of Contents

    Administration of the 4350 ........2–4 3 Configuring the V2IU 4350 ......3–1 Configuration Guide For IP Centrex Applications .
  • Page 4 User Manual V IU 4350 Converged Network Appliance System Configuration ......... . 3–12 Read-only User .
  • Page 5 Configuring Peering Proxy ........3–47 Adding an H.323 Prefix Entry ......3–48 Clients List Lock .
  • Page 6 5 Saving and Restoring the V2IU 4350 Configuration ..5–1 6 Upgrading the V2IU 4350 ......6–1 Upgrade Procedure for Software Revision 1.3.11 or Later .
  • Page 7 Contents FCC PART 68 NOTICE TO USERS OF DIGITAL SERVICE Regulatory Notices–10 INDUSTRY CANADA (IC) NOTICE ... . . Regulatory Notices–11...
  • Page 8 User Manual V IU 4350 Converged Network Appliance...
  • Page 9: Introduction

    Introduction The V IU 4350 Converged Network Appliance The V and service providers. It reduces costs by simplifying the deployment, management and security of converged voice, video and data networks. The 4350 provides the following important functions for converged networks: T1 Wide Area Network (WAN) Access Router The 4350 provides an integrated T1 CSU/DSU for small and medium office connectivity.
  • Page 10: Security

    User Manual V IU 4350 Converged Network Appliance • Security A stateful packet inspection firewall is used in combination with a VoIP application layer gateway to provide comprehensive “media-aware” security. The 4350 also supports IPSec for secure site-to-site networking. VoIP The 4350 resolves NAT/FW traversal problems for SIP, MGCP and H.323 traffic.
  • Page 11: Front Panel Leds

    • • Front Panel LEDs The LEDs display real-time information for key functions of the 4350. They are as follows: LED Label Power Status — Diffserv marking and policing — Traffic shaping — VoIP call admission control prevents oversubscription of priority queue Security —...
  • Page 12: Back Panel

    Press the Erase button three times in quick succession to reset the Polycom V2IU 4350 to the factory default. This will reset all passwords and erase all prior configurations.The default LAN address will now be 192.168.1.1.
  • Page 13: Getting Started

    Getting Started Physical Installation The V observe the following guidelines when installing the system: • • Ensure that the physical location of the installation has adequate air circulation and meets the minimum operating conditions as provided in the environmental specifications for the system. Warning Secure the power supply using a fastener or nearby shelf so that it does not hang from the power connector.
  • Page 14: Desktop Installation

    User Manual V IU 4350 Converged Network Appliance • To reduce the risk of fire, use only 26 AWG or larger wire (e.g. 24, 22, 20, etc.) to Warning connect the T1 port on your unit to an RJ-45 jack. •...
  • Page 15: Rack-Mount Installation

    4. Mount the 4350 on the wall as shown below. Do not mount the 4350 on the wall as shown below. 1. Connect the power and network cables to the appropriate ports on the Warning Secure the power supply using a fastener or nearby shelf so that it does not hang from the power connector.
  • Page 16: Connecting The Power And Cables

    User Manual V IU 4350 Converged Network Appliance Connecting the Power and Cables The 4350 comes with an AC power cord and power adapter for connecting the unit to the AC outlet. Always connect the AC power cord to an AC outlet suitable for the power supply Warning that came with the unit in order to reduce the risk of damage to it.
  • Page 17 2. Launch a web browser on the PC and enter the URL string: 192.168.1.1. Press Return. 3. Enter the username root and the password default to log into the system. The 4350 main configuration menu appears. Note For secure management of your network, be sure to change the default userid and password as described under Change the Administration Password.
  • Page 18 User Manual V IU 4350 Converged Network Appliance 2 - 6...
  • Page 19: Configuring The V2Iu 4350

    Configuring the V The V provides many critical networking functions for IP based voice, video and data. It can be installed in several different topologies: • • • • Most users will follow the steps provided in the “Configuring The Systems Settings”...
  • Page 20: Configuration Guide For Ip Centrex Applications

    User Manual V IU 4350 Converged Network Appliance Configuration Guide For IP Centrex Applications A typical 4350 installation for an IP Centrex application requires no external router or firewall. The 4350 WAN port is connected directly to the T1/E1 line and the LAN port(s) are connected directly to enterprise devices and/or Ethernet switches.
  • Page 21: Configuration Outline

    VoIP subnet route dynamic NAT static NAT static IP routing enable the data firewall configure basic settings configure advanced settings enable traffic shaping Configuring the V2IU 4350 Configure For IP Centrex Application? Optional Optional but recommended Optional Optional Optional but recommended...
  • Page 22: Configuration Guide For Station Side Ip Pbx Applications

    User Manual V IU 4350 Converged Network Appliance Configuration Guide For Station Side IP PBX Applications Most private enterprise VoIP networks use an IP PBX at the corporate headquarters location to provide voice switching between headquarters, branch offices and the PSTN. The 4350 is used in these environments to securely connect branch office employees to the IP PBX installed in the corporate headquarters location.
  • Page 23: Configuration Outline

    Call quality monitoring and test tools. Subtask configure LAN/WAN interface set ethernet link rate enable the DHCP server configure SNMP enable the VoIP ALG configure a VoIP subnet route Configuring the V2IU 4350 Configure For Station Side IP PBX Application? Optional Optional but recommended Optional...
  • Page 24: Configuration Guide For Trunk Side Ip Pbx Applications

    User Manual V IU 4350 Converged Network Appliance Data Networking Configuration Firewall Configuration Traffic Management Configuration Configuration Guide For Trunk Side IP PBX Applications Companies with existing IP-based WAN links for inter-office voice and data communications can use the 4350 as a traffic shaper to meet the stringent jitter, latency and packet loss requirements for toll quality voice.
  • Page 25: Configuration Outline

    NAT Not required static IP routing Not required enable the data firewall Not required configure basic settings Not required configure advanced settings Not required enable traffic shaping enable Call Admission Not required Control Configuring the V2IU 4350 3 - 7...
  • Page 26: Configuration Guide For Hosted Video Applications

    User Manual V IU 4350 Converged Network Appliance Configuration Guide For Hosted Video Applications A typical 4350 installation for hosted video applications is depicted in the diagram below. In this scenario, the 4350s are used to connect all of the video endpoints to the Gatekeeper.
  • Page 27 NAT static NAT static IP routing enable the data firewall configure basic settings configure advanced settings enable traffic shaping enable Call Admission Control Configuring the V2IU 4350 Configure For Hosted Video Applications? Optional Optional Optional Optional Optional but recommended...
  • Page 28: Configuration Guide For Enterprise Video Applications

    User Manual V IU 4350 Converged Network Appliance Configuration Guide For Enterprise Video Applications A typical 4350 installation for enterprise video applications is depicted in the diagram below. In this scenario, the 4350s are used to connect all of the video endpoints to the Gatekeeper.
  • Page 29 NAT static NAT static IP routing enable the data firewall configure basic settings configure advanced settings enable traffic shaping enable Call Admission Control Configuring the V2IU 4350 Configure For Hosted Video Applications? Optional Optional Optional Optional Optional but recommended...
  • Page 30: System Configuration

    User Manual V IU 4350 Converged Network Appliance System Configuration This section explains how to configure the 4350 to function in your IP network. You will configure the T1/E1 WAN interface, Ethernet interfaces, network addresses, DNS settings, default gateway, SNMP settings and change the administrative password.
  • Page 31: Configuring Vlans In The 4350

    — Other non-VoIP traffic in the same VLAN will not receive priority treatment • A DHCP server can be enabled/disabled per VLAN • Cisco Discovery Protocol is not supported Configuring the V2IU 4350 4350 4300T VLANid 1/2/3 (VLANid 16) EM006...
  • Page 32 User Manual V IU 4350 Converged Network Appliance • 1. Select the Network link. 2. Select Enable VLAN support. 3. Press Submit. Be careful when changing a port from 802.1 to 802.1q mode. Any 802.1 devices Caution connected to that port (such as your management PC!) will loose access to the 4350.
  • Page 33: Modify An Existing Vlan Configuration

    Delete an Existing VLAN Configuration 1. Select the Network link. 2. Select VLAN Settings. 3. Press the trash can icon next to the VLAN you wish to delete. Configuring the V2IU 4350 3 - 15...
  • Page 34: Assign The 4350'S Alg To Your Priority Vlan

    User Manual V IU 4350 Converged Network Appliance Assign the 4350’s ALG to your Priority VLAN Once you have completed your VLAN configuration you must assign the 4350 ALG to the VLAN containing your VoIP phones. 1. Select the VoIP ALG from the main configuration menu. 2.
  • Page 35 The 4350 supports a wide range of T1/E1 Layer 2 configuration parameters. The specific values you will need must be supplied by the WAN provider. Each of the 4350’s configurable parameters are described below. Configuring the V2IU 4350 3 - 17...
  • Page 36: Protocol

    User Manual V IU 4350 Converged Network Appliance Protocol Display and set the T1 Layer 2 protocol. Supported protocols are: • • • • • 1. Select the desired T1 protocol. 2. Press Submit. Frame Relay Mode and DLCI When the Protocol is one of ANSI or CCITT, then additional Frame Relay configuration parameters are required.
  • Page 37: Timing

    NTP server address, Time offset from NTP value, WINS address and TFTP/FTP server name that can be served to the requesting IP devices. IU (Internal). With a carrier-provided T1, the timing is usually Configuring the V2IU 4350 3 - 19...
  • Page 38 User Manual V IU 4350 Converged Network Appliance In addition the 4350 will provide its LAN IP address in DHCP user options 150 and 151 for use by IP phones. Some IP phones use these values for configuration of their TFTP server and MGCP control server addresses. The DHCP server in the 4350 should not be used if a DHCP server already exists in Note the same subnet as the 4350.
  • Page 39: Delete A Dhcp Ip Address

    DHCP IP Addresses list and press the Delete key on your keyboard. 3. Press Submit. Disable The DHCP Server 4. Select DHCP Server. 5. Uncheck\ the Enable DHCP Server checkbox. 6. Press Submit. Configuring the V2IU 4350 3 - 21...
  • Page 40: Configure Hostname, Snmp And Remote Logging

    User Manual V IU 4350 Converged Network Appliance Configure Hostname, SNMP and Remote Logging The 4350 can be managed remotely by an SNMP network management system such as HP Openview. The 4350 supports SNMPv1 or SNMPv3 and MIB-II (RFC1213). All MIB-II variables are read only. The MIB variables sysContact and sysLocation are set by the web GUI.
  • Page 41: Disable Snmp

    ADDRESS:PORT. 3. Press Submit. Disable Remote System Logging 1. Select System. 2. Select System Overview. 3. Select Services Configuration. 4. Uncheck the Enable Remote System Logging checkbox. 5. Press Submit. Configuring the V2IU 4350 3 - 23...
  • Page 42: Configure A Local Hostname

    User Manual V IU 4350 Converged Network Appliance Configure a local Hostname A locally configured hostname is useful for remote management. This name can appear as the identifier string for the 4350 on a system management console. >> Enable Mean Opinion Scoring (MOS) The 4350 produces useful statistics on a per call basis that can be written to syslog.
  • Page 43: Read-Only User

    Menu on the left-hand side, click Network. Note: You must have administrator access and log in as an administrator to change read-only user. Configuring the V2IU 4350 3 - 25...
  • Page 44: Subinterfaces

    How Subinterfaces Works A common use for subinterfaces is forwarding a public subnet. A subinterface may be created to support a subnet forwarded through the Polycom V 4350. When forwarding a subnet through the Polycom V necessary to assign an address for this subnet to the system to act as the subnet's gateway.
  • Page 45: Configuring Subinterfaces

    The system does not support supernetting. Interface is the port where the subinterfaces will be configured. following popup appears: window in the list area. Configuring the V2IU 4350 3 - 27...
  • Page 46: Tos Byte Setting

    How the ToS Byte Setting Works For all RTP traffic (voice and video), the Polycom V byte in the IP header as “High Priority,” and strips (set to 0) the ToS byte for all other traffic. Unchecking the “Enable ToS Byte Stripping” option means that the ToS byte will not be stripped from non-RTP traffic, but will remain unchanged.
  • Page 47 ToS byte setting, that provider should also provide the other parameters required on this screen. 4. If you have changed the values, click Submit to activate the new settings. Configuring the V2IU 4350 3 - 29...
  • Page 48: H.323 Configuration

    User Manual V IU 4350 Converged Network Appliance H.323 Configuration To access the H.323 Settings page, select VoIP ALG > H.323 in the Configura- tion Menu. 3 - 30...
  • Page 49 The H.323 Settings page has the following areas: • Gatekeeper Mode • WAN/Provider-side gatekeeper mode settings • LAN/Subscriber-side gatekeeper mode settings • Embedded gatekeeper mode settings LRQ Size • Default Alias • Stale Time • • Multicast Messages Configuring the V2IU 4350 3 - 31...
  • Page 50 User Manual V IU 4350 Converged Network Appliance • • In the Gatekeeper mode area, select one of the following modes: Item None WAN/Provider-side gatekeeper mode LAN/Subscriber-side gatekeeper mode Peering-Proxy mode Embedded gatekeeper mode If WAN/Provider-Side Gatekeeper mode is selected, you must configure the following parameters: Item WAN/Provider-side GK...
  • Page 51 This area includes the following configurable parameters: Item Description Delete stale clients Select this checkbox to enable the stale timer feature. Stale time (m) Specify the length of the interval in minutes. Configuring the V2IU 4350 3 - 33...
  • Page 52 User Manual V IU 4350 Converged Network Appliance Some RAS messages can be multicast in order to automatically detect gate- keepers. In the Multicast Messages area, you can enable listening to multicast messages. This area includes the following configurable parameter: Item Listen to multicast messages...
  • Page 53: H.323 Activity

    Normal call look-up is performed following alias manipulation. Current time WAN Gatekeeper status Current payload bandwidth Estimated total bandwidth Activity log of recent H.323 events Configuring the V2IU 4350 3 - 35...
  • Page 54 User Manual V IU 4350 Converged Network Appliance To access the H.323 Alias Manipulation page, select VoIP ALG > H.323 >Alias Manipulation in the Configuration Menu. This page includes the following areas: Item Destination H323-ID or E.164 Alias Modification table Add a rule Item Action...
  • Page 55: H.323 Neighboring

    To access the H.323 Neighboring page (formerly the Prefix Routing page), select VoIP ALG > H.323 > Neighboring in the Configuration Menu. Description Applies the settings configured on this page. Clears all fields and selections and allows you to enter new information. Configuring the V2IU 4350 3 - 37...
  • Page 56 User Manual V IU 4350 Converged Network Appliance This page includes the following areas: Item Prefix Routing Gatekeeper Neighboring table Add a prefix Item Action Prefix Index Strip Neighbor Local Zone Address The H.323 Neighboring page includes the following buttons: Item Commit Reset...
  • Page 57: Regular Expressions

    Matches 555 followed by exactly 3 digits. Matches the character '#'. Matches the character '*'. Note that '*' by itself is a regular expression and must therefore be escaped with a '\' to match the character itself. Configuring the V2IU 4350 3 - 39...
  • Page 58: Forwarding Rules

    How Forwarding Rules Works When forwarding, one address from the forwarded range of addresses must be assigned to the rule's output interface. The Polycom V address to act as a gateway router for the subnet. The address may be assigned using the Subinterfaces page.
  • Page 59: Configuring Forwarding Rules

    To configure address forwarding rules, use the following steps: Using the configuration graphical user interface, from the Configuration Menu on the left-hand side, click Firewall. Click Forwarding Rules. The window shown below opens. Configuring the V2IU 4350 3 - 41...
  • Page 60 User Manual V IU 4350 Converged Network Appliance • • • • • 3 - 42 On this screen, complete the following information: IP Subnet: The subnet to be forward through the firewall from the Input Interface to the Output Interface. Netmask: The network mask to apply to the IP Subnet to create the range of IP addresses that are forwarded through the firewall.
  • Page 61: Peering Proxy

    The illustration below shows a sample diagram with dial plan and call flow examples. It is a snapshot of how the Peering Proxy can be deployed. Peering Proxy however, is not limited to this specific scenario, so contact your Polycom representative to discuss specific network requirements for full Peering Proxy support.
  • Page 62 1 prefix pointing to the master gatekeeper and let that gatekeeper signal the other endpoints directly. In the example above, the Polycom V “Private Video Network A and B,” a peering point into this network. This network could have additional peering points to allow topology spreading of network resources.
  • Page 63 Configuring the V2IU 4350 Proxy provides an access point into this network and is responsible for the E.164 dial plan using NANP (North American Numbering Plans or NAP’s). The NAP’s in this case are 831 and 408. Dial plan integrity is required to insure proper routing of prefix's. This means that if users are to dial into your network, they could be required to enter a “Prefix”...
  • Page 64 User Manual V IU 4350 Converged Network Appliance the Peering Proxy IP 10.10.10.1. The Peering Proxy applies the same rule set, in this case, NO matching prefix is found and ANNEX O dialing is applied. The call is now routed to Site A's V PathNavigator where the registered client with the E.164 of 4155551000 is located and the call is gatekeeper routed to the called endpoint.
  • Page 65: Configuring Peering Proxy

    Configuring the V2IU 4350 Embedded Gatekeeper Mode. In this mode, the endpoint is directly registered, an E.164 registered client match is made, and the call is routed to the called endpoint. Outbound from Site C to Public IP Endpoint Site C dials the public endpoint: 9@61.10.10.4. The PathNavigator receives the call and generates a Q.931 setup to the V...
  • Page 66: Adding An H.323 Prefix Entry

    User Manual V IU 4350 Converged Network Appliance 3. On this screen, check “Peering-Proxy mode”. 4. Scroll to the bottom of the window and click Submit. Adding an H.323 Prefix Entry You can add prefixes by entering the prefix string and the target address. To add an H.323 prefix entry, use the following steps: 1.
  • Page 67: Clients List Lock

    The prefix string can be a regular expression as described above. The target address can be a domain name or an IP address. Creating a client, as follows: Configuring the V2IU 4350 3 - 49...
  • Page 68: Enabling The Clients List Lock

    User Manual V IU 4350 Converged Network Appliance • This feature is useful for lists involved with 911 usage. When this feature is in effect, any message from an unauthorized SIP client will be rejected with a “403 Forbidden” response. MGCP messages will be discarded.
  • Page 69: H.323 Activity Monitor

    Following this information are a number of lines with event specific informa- tion such as call-id, duration, call-status, and so on. Abnormal events have their event specific information listed in red. Event/Time Source Destination Configuring the V2IU 4350 3 - 51...
  • Page 70: Type Of Events

    User Manual V IU 4350 Converged Network Appliance Type of Events The events that may currently be listed in the activity monitor are as follows: • • • • • • • • Call Status The call status shows the last state of the call at the time of the event. Each call progresses through a number of states when being established.
  • Page 71 An incoming media channel (from the WAN/provider side to the LAN/sub- scriber side) has been opened. • “Bidirectional media channels established” Media channels have been opened in both directions. This is a normal call where media is being sent in both directions. Configuring the V2IU 4350 3 - 53...
  • Page 72: Call Termination

    User Manual V IU 4350 Converged Network Appliance Call Termination The call termination cause may also give some information about why the call terminated or failed to be established. • The call could not be completed because the system was out of system resources.
  • Page 73: Viewing The H.323 Activity Monitor

    — The Source field - shows the source of the event as an IP address and an alias (when available). — The Destination field - shows the destination of the event as an IP address and an alias (when available). Configuring the V2IU 4350 3 - 55...
  • Page 74: Voip Configuration

    User Manual V IU 4350 Converged Network Appliance VoIP Configuration The 4350 provides a VoIP application layer gateway (ALG) for the SIP, MGCP, and H.323 protocols. The ALG proxies the connection between the VoIP softswitch, IP PBX or gatekeeper and voice and video devices such as IP phones, IADs or softphones.
  • Page 75: Configure The Voip Alg

    The SIP server port is the port used by the SIP registrar. The default value is port 5060. server that contains the images used by IP phones at boot up. The 4350 performs a TFTP server relay function. Configuring the V2IU 4350 3 - 57...
  • Page 76 User Manual V IU 4350 Converged Network Appliance Note It is not necessary to program in an FTP server address if your IP phones use the FTP protocol instead of TFTP to retrieve their images. A relay function is not needed for FTP as the 4350 will forward FTP traffic to the destination server as programmed in your IP phone.
  • Page 77: Configure Voip Subnet Routing

    IP address is the address where the gateway can be reached. V2IU Subnet B Configuring the V2IU 4350 IP Phones Router Subnet B EM007B...
  • Page 78: Enter A Voip Subnet Route

    User Manual V IU 4350 Converged Network Appliance Note VoIP Subnet Routing is separate and independent from static data routes (see Static IP routing). VoIP subnet routes must be configured for each LAN subnet that contains devices making use of the 4350’s Application Layer Gateway (ALG). These entries tell the ALG that the identified subnet is allowed to make use of its services and what router the ALG should use to reach that subnet.
  • Page 79: Configure Ip Phones, Iads Or Softphones

    This is the IP address of the remote subnet containing the voice devices. This is the mask of the IP address of the subnet containing the voice devices. path to the remote subnet from the 4350. Configuring the V2IU 4350 3 - 61...
  • Page 80: Data Networking Configuration

    User Manual V IU 4350 Converged Network Appliance Data Networking Configuration The 4350 provides static IP routing and two types of Network Address Translation (NAT) functions for data traffic. This section describes the use and configuration of these features. NAT for Data Traffic NAT allows hosts on a private internal network (the LAN side of the 4350) to anonymously communicate with devices on an external network (the WAN side of the 4350).
  • Page 81: Configure Dynamic Nat

    “subinterface” or “secondary address” on the WAN interface of the 4350 so that external hosts can reach the web server. Each entry should be placed on a new line. 3. Press Submit. Configuring the V2IU 4350 3 - 63...
  • Page 82: Delete A Static Nat Entry

    User Manual V IU 4350 Converged Network Appliance Delete a Static NAT entry 1. Select NAT. 2. To delete an IP address or a range of IP addresses highlight the entry in 3. Press Submit. Static IP routing In addition to locally connected IP networks the 4350 can forward traffic for a remote data network by configuring a static route entry.
  • Page 83: Delete The Static Route

    Firewall Configuration you would like the 4350 to forward to the gateway. The hosts portion of the IP address should be set to “0”. For example, 10.10.20.0 255.255.255.0 destined for the remote data network. Configuring the V2IU 4350 3 - 65...
  • Page 84: Enable Or Disable The Firewall

    User Manual V IU 4350 Converged Network Appliance The 4350 uses a Stateful Packet Inspection (SPI) firewall to protect data devices installed behind the LAN interface. Voice devices are protected by the 4350 Application Layer Gateway (ALG) as described in VoIP Configuration. The firewall is enabled by default.
  • Page 85 *Port ranges are specified using a : character. For example: 192.168.3.1-23:50 means port 23 through 50 *Classful IP addresses are assumed by default. For example: 192.168.3.1 uses a class c mask. Subnets can be specified using the / notation. E.g. 192.168.3.1/24 Configuring the V2IU 4350 3 - 67...
  • Page 86: Remove Advanced Setting Entries

    User Manual V IU 4350 Converged Network Appliance Allow Hostwise Allows all traffic matching UDP (IP-Port) the specified UDP port numbers and the specified source IP addresses If a given packet does not match any of the configured rules, it is dropped. 1.
  • Page 87: Enable Traffic Shaping

    4350 and overwrites any specific TOS bit configuration set by VoIP endpoints. Ensures that bandwidth allocated to new voice and video calls does not adversely affect the quality of existing active calls (Call Admission Control or CAC). Configuring the V2IU 4350 3 - 69...
  • Page 88: Optionally Enable Priority Ip Addresses

    User Manual V IU 4350 Converged Network Appliance 3. Specify the upstream and downstream bandwidth of your WAN link 4. Enter the WAN Downstream Bandwidth in Kbps. 5. Enter the WAN Upstream Bandwidth in Kbps. Note For FT1/T1/E1 links the upstream and downstream bandwidths will always be the same value (the link is full-duplex).
  • Page 89: Determining The Maximum Number Of Concurrent Calls

    Configuring the V2IU 4350 Determining the maximum number of concurrent calls The maximum number of concurrent calls that can be supported by the WAN access link is calculated using the following formula: Max calls = (Maximum WAN upstream bandwidth * .85)/VoIP codec rate...
  • Page 90: Classifying

    User Manual V IU 4350 Converged Network Appliance applied to traffic in both the upstream (LAN to WAN) and downstream (WAN to LAN) direction. Each direction is independent of the other and can support different size priority queues. Classifying High priority voice and video traffic generated by endpoint devices is automatically identified by the V VoIP devices (not making use of the ALG) can be defined as high-priority by their IP address.
  • Page 91: Downstream Traffic Management

    FTP ACKs, are also delayed. This results in a throttling of the transmit rate by the (far-end) FTP hosts, reducing overall WAN bandwidth consumption. Configuring the V2IU 4350 3 - 73...
  • Page 92 User Manual V IU 4350 Converged Network Appliance Although RTP makes use of UDP the 4350 appliance is able to provide its own congestion avoidance mechanism for voice traffic using Call Admission Control (CAC). 3 - 74...
  • Page 93: System Diagnostics

    System Diagnostics The V troubleshooting tools and utilities for system maintenance to network operators. Viewing Software Version, Hardware Platform and the LAN MAC Address The software version, hardware platform, and LAN MAC address are common pieces of information requested by technical support and are accessed directly through the System page of the 4350 web GUI.
  • Page 94: Viewing The Alg Registration Code

    User Manual V IU 4350 Converged Network Appliance Viewing the ALG registration code You will also find a link to the ALG registration code on the System page. The registration code enables the ALG and is pre-installed at the factory. If the registration code is inadvertently deleted you can re-enter the code using the following steps: Enter the Registration Code...
  • Page 95: Routing Information

    To view the networking configuration and status of the 4350 proceed to the Network Information page as follows: 1. Select System. 2. Select System Overview. 3. Select Network Information. The following networking information is displayed: Routing Information The system routing table contains the static routes for hosts and networks that are configured on the 4350.
  • Page 96: Viewing Advanced System Information

    User Manual V IU 4350 Converged Network Appliance The interface statistics can point to areas of congestion in the network. If the errors statistic is a few percent or more of the total packets sent it may be an indication of excessive congestion on the network interface. If the congestion is not corrected the quality of voice calls will be affected.
  • Page 97: System Logging Messages

    System Logging Messages Displays information logged during system boot and normal operation. Logging messages may indicate unauthorized attempts to access the 4350, process restart messages, and excessive resource utilization messages. Passive Voice Call Monitoring The 4350 monitors live voice calls and performs objective speech quality assessment.
  • Page 98: Verify Registered Voice And Video Devices

    User Manual V IU 4350 Converged Network Appliance Verify Registered Voice and Video Devices The 4350 maintains a list of all registered voice and video devices called a clients list so that it can properly route voice and video calls. At startup, voice and video devices register their IP addresses with the 4350.
  • Page 99: Performing A Ping Test

    System Diagnostics Performing a Ping Test A ping test is the most common test used to verify basic connectivity to a networking device. Successful ping test results indicate that both physical and virtual path connections exist between the 4350 and the test IP address. Successful ping tests do not guarantee that all data traffic is allowed between the 4350 and the test IP address but is useful to verify basic reachability.
  • Page 100: Restarting Networking Processes

    User Manual V IU 4350 Converged Network Appliance The Network Test Tools page will be refreshed and the results of the traceroute test are displayed (this may take several seconds). The Reset button is used to clear the IP address entry used in step D above. Restarting Networking Processes In extreme circumstances while troubleshooting you may be asked to restart the networking processes including the VoIP ALG in the 4350 by technical...
  • Page 101: The Ewn Command

    Saving and Restoring the V Configuration The V individual files that reside in local flash memory. These files are read at boot time to determine the configuration identity of the 4350 and then stored in RAM as “running” state. As you configure the 4350 the submit command writes the configuration changes to both RAM and flash so that the files stored in flash are always up to date with the running state of the system.
  • Page 102: Create A Backup File And Save In Local Flash

    User Manual V IU 4350 Converged Network Appliance 1. Use a NULL modem cable to connect to serial port 1 of the 4350 2. Use a terminal emulator such as Hyperterminal set to a baud rate of 9600, Alternatively you can connect to the 4350 remotely using SSH: 1.
  • Page 103: Saving And Restoring The V2Iu 4350 Configuration

    Loads the specified backup file into RAM and makes it the active running configuration. Issuing this command will automatically restart the 4350 and therefore interrupt any Warning active voice calls and data sessions. Saving and Restoring the V2IU 4350 Configuration 5 - 3...
  • Page 104 User Manual V IU 4350 Converged Network Appliance 5 - 4...
  • Page 105: Upgrading The V2Iu 4350

    Upgrading the V This chapter describes how to upgrade your 4350 to the latest software release available from Polycom. It is recommended that you reboot the 4350 prior to performing the upgrade. This is to make sure there is enough dynamic memory available to handle the upgrade process.
  • Page 106 User Manual V IU 4350 Converged Network Appliance 4. Enter the Download Server address of ftp.support.polycom.com. 5. Enter the Filename: flash.bin 6. Press Submit. Do not change the configuration or power off the device until the write is 100 Warning percent complete.
  • Page 107: Appendix

    Appendix Troubleshooting Tips This section contains possible solutions to problems regarding the installation of the V I am having trouble reaching the Internet through the 4350. We recommend connecting a PC directly (or via a switch) to the LAN port of the 4350.
  • Page 108: Specifications

    User Manual V IU 4350 Converged Network Appliance 5. Select Network Test Tools. 6. Enter the softswitch address in the IP Address to Ping field. 7. Press Ping. Specifications WAN Ports LAN Ports Serial Ports Dimensions Weight Power Warranty Environmental Appendix - 2 1xT1 CSU/DSU or 10/100 Ethernet 4x10/100 Ethernet (switched)
  • Page 109: Regulatory Notices

    (and/or any company you represent) and either Polycom (Neth- erlands) B.V. (in Europe, Middle East, and Africa), Polycom Hong Kong, Ltd. (in Asia Pacific) or Polycom, Inc. (in the rest of the world) (each referred to individually and collectively herein as “POLYCOM”), for the SOFTWARE PRODUCT licensed by POLYCOM.
  • Page 110 SOFTWARE PRODUCT is licensed (not sold) to you, and its use is subject to the terms of this Agreement. This is NOT a sale contract. 1.GRANT OF LICENSE. Subject to the terms of this Agreement, POLYCOM grants to you a non-exclusive, non-transferable, revocable license to install and use the SOFTWARE PRODUCT solely on the POLYCOM product with which this SOFTWARE PRODUCT is supplied (the “PRODUCT”).
  • Page 111 POLYCOM for damages or losses caused by your non-compliance. The waiver by POLYCOM of a specific breach or default shall not constitute the waiver of any subsequent breach or default.
  • Page 112 POLYCOM's option and expense, to refund the purchase price paid by you for any defective soft- ware product which is returned to POLYCOM with a copy of your receipt, or to replace any defective media with software which substantially conforms to applicable POLYCOM published specifications.
  • Page 113 RESULTS FROM THE DOWNLOAD OR USE OF THE SOFTWARE PROD- UCT. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL POLYCOM OR ITS SUPPLIERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR...
  • Page 114 11.3Contact. If you have any questions concerning this Agreement, or if you desire to contact POLYCOM for any reason, please contact the POLYCOM office serving your country. 11.4U.S. Government Restricted Rights. The SOFTWARE PRODUCT and doc- umentation are provided with RESTRICTED RIGHTS.
  • Page 115 translated into another language. (Hereinafter, translation is included without limitation in the term “modification”.) Each licensee is addressed as “you”. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program).
  • Page 116 IU 4350 Converged Network Appliance User Manual or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: The source code for a work means the preferred form of the work for making modifications to it.
  • Page 117 Regulatory Notices to copy, distribute or modify the Program subject to these terms and condi- tions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
  • Page 118 IU 4350 Converged Network Appliance User Manual write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
  • Page 119 the telephone lines until you learn if your equipment or the telephone line is the source of the trouble. If your equipment needs repair, it should not be reconnected until it is repaired. parameters, the telephone company can temporarily disconnect service, although they will attempt to give you advance notice if possible.
  • Page 120 IU 4350 Converged Network Appliance User Manual Caution Users should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate.” WARRANTY AND REPAIR SERVICE CENTER: The RAM Group Kent McDonald kent.macdonald@theramgroup.com (403) 266-5840 x 100 This Class (B) digital apparatus complies with Canadian ICES-003.

Table of Contents