Peer Call Authentication; Figure 101 Peer Devices Connecting; Table 66 Matching Incoming And Outgoing Authentication - ZyXEL Communications P-2602H User Manual

P-2602h series adsl2+ voip iad
Hide thumbs Also See for P-2602H:
Table of Contents

Advertisement

Chapter 12 VoIP Trunking
Other settings controlled by the auto attendant include a time limit to decide whether you want
to forward a call from the ZyXEL Device or call the phone directly connected to the ZyXEL
Device. When you call into your ZyXEL Device you can request to forward a call to another
phone number simply by dialing that number. If you don't dial any number within a specified
time limit (for example 5 seconds) then the phone directly connected to the ZyXEL Device
rings. It also controls the time limit you have between dialing digits of a phone number.

12.2.2 Peer Call Authentication

VoIP devices can make peer calls to each other by using the IP address instead of a SIP
number to establish a call. The advantage of this is that you do not need to pay a VoIP service
provider. VoIP devices that connect using an IP address are referred to here as peer devices. A
local peer device is where the VoIP call originates and a remote peer device is where the VoIP
call ends. In the following figure, local peer device (A) connects to a remote peer device (B)
via the IP address of B.

Figure 101 Peer Devices Connecting

A peer-to-peer call doesn't require any authentication, however, authentication is required
when you request the remote peer device to forward a call. The remote peer device has a list of
accounts, each consisting of a username and password, which are allowed to use the remote
peer device to forward calls. These accounts make up an incoming authentication list.
The local peer device has a corresponding list of outgoing authentication accounts. These
accounts consist of the IP address of a remote peer device, the port number to communicate
over as well as a username and password to use for authentication. An outgoing authentication
account must match an incoming authentication account's username and password in order for
the remote device to forward calls. The following table shows example entries for incoming
and outgoing authentication. The bolded entries must match in order for authentication
between two peer devices to occur.

Table 66 Matching Incoming and Outgoing Authentication

ACCOUNT DETAILS
Outgoing Authentication
Username
Password
Incoming Authentication
Username
Password
176
LOCAL PEER DEVICE
localDeviceA
passwordA
userone
userpassword
REMOTE PEER DEVICE
localDeviceB
passwordB
localDeviceA
passwordA
P-2602H(W)(L)-DxA User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents