Cisco Small Business
Webinar for Partners
- Technical Track
Dial Plans for Small Business
Translation Rules, Dial Peers, and COR
Skyler Spence skspence@cisco.com Support Engineer
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
1
Dial Plan Configuration

New S Business Webinar Series for Partners

When making CLI configuration changes, always consult the CCA Out
of Band configuration guide found at
http://www.cisco.com/en/US/docs/net_mgmt/cisco_configuration_assist
ant/version1_8/out_of_band_reference/cca_v18_oob_config_guidelines.
pdf

This presentation may be found at www.cisco.com/go/smallbizsupport

This presentation uses CCA version 1.8 and IOS version 12.4(11) XW9

This presentation will cover the configuration of dial plans on the UC500
platform.
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
2
An Overview of Call Flow
When a call comes into the UC500 it is first matched to an inbound Dial
Peer. This match is made based on the called number, calling number,
or voice port.
After matching an inbound Dial Peer, translation rules or profiles configured
on that Dial Peer are applied.
Finally an outbound Dial Peer is matched based on the called number and
COR list configurations.
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3
Dial Peers
 A Dial Peer is matched whenever a call comes into or is placed
from the UC500. Therefore each call involves both an inbound
and an outbound Dial Peer.
 Dial Peers are matched based upon either the calling or called
number or by port number when this information is not available.
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
4
Types of Dial Peers
 There are two types of Dial Peers to configure on the UC500,
POTS Dial Peers used to interact with traditional PBX systems,
and VoIP Dial Peers used to send calls across the network.
 The syntax for defining a Dial Peer is
dial-peer voice number {pots | voip}
 POTS Dial Peers match calls to voice ports while VoIP Dial Peers
match calls to session targets which can be an IP address or DNS
hostname.
 For more information about Dial Peer configuration and uses,
please refer to the document at
http://www.cisco.com/en/US/docs/ios/voice/dialpeer/configuration/g
uide/vd_dp_feat_cfg.html#wp1067010
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
5
Inbound Dial Peers Matching
Attribute
incoming callednumber
dial_string
answer-address
dial_string
destinationpattern
dial_string
port port
Presentation_ID
Description
This dial peer command uses the called number
to match the incoming call leg to an inbound dial
peer
Call
Element
Called #
This dial peer command uses the calling number
to match the incoming call leg to an inbound dial
Calling #
peer
When inbound call legs are matched, this
command uses the calling number to match the
Calling #
incoming call leg to an inbound dial peer. This is
not the recommended method.
This dial peer command defines the POTS voice
port through which calls to this dial peer are
Voice Port
placed. (POTS Dial Peers only)
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
6
Direct Inward Dialing
 When configuring inbound Dial Peers on a system using PRI/BRI services,
it is important to configure the direct-inward-dial command. This
command, available only on POTS Dial Peers, makes sure that the called
number presented in the call setup information is used to match an
outbound Dial Peer.
 If DID is not enabled on the matching inbound Dial Peer, a dial-tone will be
presented to the caller enabling them to input a new dial string to call
where they wish.
 For more information, please refer to
http://www.cisco.com/en/US/tech/tk652/tk653/technologies_tech_note091
86a00801142f8.shtml
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
7
Outbound Dial Peers Matching
 In order to match outbound dial peers, the UC500 uses the dial
peer destination-pattern called_number command
 On POTS dial peers, the port command is then used to forward
the call
 On VoIP dial peers, the session target command is then used to
forward the call
 The following figure shows the relationship between destinationpattern and session target
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
8
Destination Pattern
•When the router attempts to match an outbound Dial Peer, it compares the called number
to the destination-pattern configured. This is in contrast to matching inbound dial peers
when the calling number is compared to the destination-pattern.
•The destination-pattern can be either a complete telephone number or a partial telephone
number with wildcard digits. In addition to the characters 0-9, #, and * the following symbols
are defined for destination patterns*
Symbol
Description
.
Indicates a single-digit placeholder.
[ ]
Indicates a range of digits. A consecutive range is indicated with a
hyphen (-) a nonconsecutive range is indicated with a comma (,).
Hyphens and commas can be used in combination; for example, [5-7,9]
%
Indicates that the preceding digit occurred zero or more times. This
functions the same as the "*" used in regular expression.
T
Indicates the interdigit timeout. Should be used carefully, most often for
international dialing plans.
*Wildcards may also be used to match inbound dial peers.
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
9
Notes on POTS Destination Patterns
 VoIP dial peers transmit all digits in the called number by default;
however, POTS dial peers remove, or strip, any outbound digits
that explicitly match the destination-pattern.
 To disable this behavior, you can use the no digit-strip dial peer
configuration command.
 The prefix digit command adds a string of digits and pauses
(represented by ‘,’) to the beginning of the string transmitted by a
POTS dial peer.
 The forward-digits command can be used to forward a fixed
number of dialed digits, or all dialed digits, regardless of the
number of digits that explicitly match the destination pattern. The
forward-digits 4 command tells the router to forward the last four
digits in the dialed string. The forward-digits all command
instructs the router to forward the full dialed string.
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
10
Translation Rules &Translation Profiles
 Translation Rules provide a simple and powerful method for
adding, subtracting, and splicing numbers
 The basic format is:
voice translation-rule <tag(1-2147483647)>
rule <tag(1-15)> /match pattern/ /replacement pattern/
Note: / -- / delimits the whole number
 This example replaces the first occurrence of the number "123"
with "456“.
voice translation-rule 1
rule 1 /123/ /456/
 There are multiple special characters that allow patterns to match
a wide range of dial strings.
 Translation Rules can be tested using the command
test voice translation-rule name-tag input-number
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
11
Translation Rules & Translation Profiles
 This table defines wildcard and wildcard combinations
Wildcard
Definition
.
Any single digit
0 to 9,*,#
Any specific character (enter ‘\*’ to match this char.)
[0-9]
Any range or sequence of characters
*
Modifier-match none or more occurrences
+
Modifier-match one or more occurrences
?
Modifier-match none or one occurrence (Ctrl+V+?)
.*
Any digit followed by none or more ocurrences. This
is effectively anything, including null.
.+
Any digit followed by one or more ocurrences. This is
effectively anything, except null.
^$
Begins with and Ends at. Together indicates null.
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
Translation Rules & Translation Profiles
 Once a Translation Rule is made, it can be put into a
Translation Profile where it is applied to the called,
calling, or redirect number or the redirect target.
 The syntax for a Translation Profile is:
voice translation-profile <name>
translate <target> <rule tag>
 The Translation Profile is then applied to a Dial Peer.
 More information on Translation Rules can be found at
http://www.cisco.com/en/US/tech/tk652/tk90/technologies_tech_no
te09186a0080325e8e.shtml
and
http://www.cisco.com/en/US/tech/tk652/tk90/technologies_configur
ation_example09186a0080094681.shtml
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
13
Class of Restrictions (COR) Lists
 COR Lists are used to control which Dial Peers an individual user
may access. To control who can dial certain patterns, international
numbers for example, you can apply a COR list to the Dial Peer
that matches that destination-pattern.
 To create and apply COR lists, follow these steps
1. Configure dial-peer cor custom and assign a
meaningful name that specifies the way CORs apply to
dial-peers.
2. Create the actual lists of the restrictions that apply to
the dial-peer.
3. Create dial-peers and specify the COR list to be used.
4. Apply the COR list to the individual Ephone-dns.
 Note that any ephone-dn without a COR list applied is given full
privileges.
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14
For a copy of this Webinar and others, as well as
application notes and the chance to discuss all this, please
visit the new Partner Community:
www.cisco.com/go/smallbizsupport
<Alternatively, start on Partner Central:
http://www.cisco.com/web/partners/index.html
highlight the sales category and click on Small and Medium
Business: http://www.cisco.com/web/partners/sell/smb/index.html
Then, on this page there's a link to it in the top Announcement box: "SMB
Webinar Schedule for January" (this will be updated each month)
Or to find the page when it's not in the Announcement box, under Achieve
Your Goals, the drop down "What do you want to do today" has "Attend an
SMB Webinar" (this is a permanent link).
Or in the Navigation Click on Tools and Resources, and a subpage is called
"Online Events for SMB Partners" which is our page>
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
15
Presentation_ID
© 2007 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
16