User's Manual
4.
In the Inbound Manipulations table (see ''Configuring IP-to-IP Inbound Manipulations''
on page 529), add a manipulation rule for the secondary extensions (e.g., 601 and
602) so that they also register to the device's database under the primary extension
contact (e.g., 600):
•
'Manipulation Purpose': Shared Line
•
Match:
♦
♦
♦
•
Action:
♦
♦
♦
29.8.3 Configuring Call Survivability for Call Centers
The device supports call survivability for call centers. When a communication failure (e.g.,
in the network) occurs with the remote voice application server responsible for handling the
call center application (such as IVR), the device routes the incoming calls received from the
customer (i.e., from the TDM gateway) to the call center agents.
Version 7.2
'Request Type': REGISTER
'Source IP Group': IP Group created for the users (e.g., 2)
'Source Username Prefix': Represents the secondary extensions, e.g., 601
and 602
'Manipulated URI': Source (manipulates the source URI)
'Remove From Right': "1" (removes the last digit of the extensions, e.g., 601
is changed to 60)
'Suffix to Add': "0" (adds 0 to the end of the manipulated number, e.g., 60 is
changed to 600)
581
29. Advanced SBC Features
Mediant 4000 SBC