List of Figures
.............................................................. 101
.............................................. 109
Figure 47 Identifying Users ....................................................................................................................115
Figure 49 Pseudowire Mapping .............................................................................................................117
Figure 50 VPLS Tunneling .....................................................................................................................118
............................................ 120
Figure 70 STUN .................................................................................................................................... 151
Figure 73 SIP User Agent ..................................................................................................................... 160
Figure 74 SIP Proxy Server .................................................................................................................. 161
20
User's Guide