Cisco Small Business Webinar for Partners - Technical Track Dial Plans for Small Business Translation Rules, Dial Peers, and COR Skyler Spence skspence@cisco.com Support Engineer Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Dial Plan Configuration New S Business Webinar Series for Partners When making CLI configuration changes, always consult the CCA Out of Band configuration guide found at http://www.cisco.com/en/US/docs/net_mgmt/cisco_configuration_assist ant/version1_8/out_of_band_reference/cca_v18_oob_config_guidelines. pdf This presentation may be found at www.cisco.com/go/smallbizsupport This presentation uses CCA version 1.8 and IOS version 12.4(11) XW9 This presentation will cover the configuration of dial plans on the UC500 platform. Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 An Overview of Call Flow When a call comes into the UC500 it is first matched to an inbound Dial Peer. This match is made based on the called number, calling number, or voice port. After matching an inbound Dial Peer, translation rules or profiles configured on that Dial Peer are applied. Finally an outbound Dial Peer is matched based on the called number and COR list configurations. Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 Dial Peers A Dial Peer is matched whenever a call comes into or is placed from the UC500. Therefore each call involves both an inbound and an outbound Dial Peer. Dial Peers are matched based upon either the calling or called number or by port number when this information is not available. Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 Types of Dial Peers There are two types of Dial Peers to configure on the UC500, POTS Dial Peers used to interact with traditional PBX systems, and VoIP Dial Peers used to send calls across the network. The syntax for defining a Dial Peer is dial-peer voice number {pots | voip} POTS Dial Peers match calls to voice ports while VoIP Dial Peers match calls to session targets which can be an IP address or DNS hostname. For more information about Dial Peer configuration and uses, please refer to the document at http://www.cisco.com/en/US/docs/ios/voice/dialpeer/configuration/g uide/vd_dp_feat_cfg.html#wp1067010 Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 Inbound Dial Peers Matching Attribute incoming callednumber dial_string answer-address dial_string destinationpattern dial_string port port Presentation_ID Description This dial peer command uses the called number to match the incoming call leg to an inbound dial peer Call Element Called # This dial peer command uses the calling number to match the incoming call leg to an inbound dial Calling # peer When inbound call legs are matched, this command uses the calling number to match the Calling # incoming call leg to an inbound dial peer. This is not the recommended method. This dial peer command defines the POTS voice port through which calls to this dial peer are Voice Port placed. (POTS Dial Peers only) © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 Direct Inward Dialing When configuring inbound Dial Peers on a system using PRI/BRI services, it is important to configure the direct-inward-dial command. This command, available only on POTS Dial Peers, makes sure that the called number presented in the call setup information is used to match an outbound Dial Peer. If DID is not enabled on the matching inbound Dial Peer, a dial-tone will be presented to the caller enabling them to input a new dial string to call where they wish. For more information, please refer to http://www.cisco.com/en/US/tech/tk652/tk653/technologies_tech_note091 86a00801142f8.shtml Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 Outbound Dial Peers Matching In order to match outbound dial peers, the UC500 uses the dial peer destination-pattern called_number command On POTS dial peers, the port command is then used to forward the call On VoIP dial peers, the session target command is then used to forward the call The following figure shows the relationship between destinationpattern and session target Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8 Destination Pattern •When the router attempts to match an outbound Dial Peer, it compares the called number to the destination-pattern configured. This is in contrast to matching inbound dial peers when the calling number is compared to the destination-pattern. •The destination-pattern can be either a complete telephone number or a partial telephone number with wildcard digits. In addition to the characters 0-9, #, and * the following symbols are defined for destination patterns* Symbol Description . Indicates a single-digit placeholder. [ ] Indicates a range of digits. A consecutive range is indicated with a hyphen (-) a nonconsecutive range is indicated with a comma (,). Hyphens and commas can be used in combination; for example, [5-7,9] % Indicates that the preceding digit occurred zero or more times. This functions the same as the "*" used in regular expression. T Indicates the interdigit timeout. Should be used carefully, most often for international dialing plans. *Wildcards may also be used to match inbound dial peers. Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9 Notes on POTS Destination Patterns VoIP dial peers transmit all digits in the called number by default; however, POTS dial peers remove, or strip, any outbound digits that explicitly match the destination-pattern. To disable this behavior, you can use the no digit-strip dial peer configuration command. The prefix digit command adds a string of digits and pauses (represented by ‘,’) to the beginning of the string transmitted by a POTS dial peer. The forward-digits command can be used to forward a fixed number of dialed digits, or all dialed digits, regardless of the number of digits that explicitly match the destination pattern. The forward-digits 4 command tells the router to forward the last four digits in the dialed string. The forward-digits all command instructs the router to forward the full dialed string. Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10 Translation Rules &Translation Profiles Translation Rules provide a simple and powerful method for adding, subtracting, and splicing numbers The basic format is: voice translation-rule <tag(1-2147483647)> rule <tag(1-15)> /match pattern/ /replacement pattern/ Note: / -- / delimits the whole number This example replaces the first occurrence of the number "123" with "456“. voice translation-rule 1 rule 1 /123/ /456/ There are multiple special characters that allow patterns to match a wide range of dial strings. Translation Rules can be tested using the command test voice translation-rule name-tag input-number Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11 Translation Rules & Translation Profiles This table defines wildcard and wildcard combinations Wildcard Definition . Any single digit 0 to 9,*,# Any specific character (enter ‘\*’ to match this char.) [0-9] Any range or sequence of characters * Modifier-match none or more occurrences + Modifier-match one or more occurrences ? Modifier-match none or one occurrence (Ctrl+V+?) .* Any digit followed by none or more ocurrences. This is effectively anything, including null. .+ Any digit followed by one or more ocurrences. This is effectively anything, except null. ^$ Begins with and Ends at. Together indicates null. Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12 Translation Rules & Translation Profiles Once a Translation Rule is made, it can be put into a Translation Profile where it is applied to the called, calling, or redirect number or the redirect target. The syntax for a Translation Profile is: voice translation-profile <name> translate <target> <rule tag> The Translation Profile is then applied to a Dial Peer. More information on Translation Rules can be found at http://www.cisco.com/en/US/tech/tk652/tk90/technologies_tech_no te09186a0080325e8e.shtml and http://www.cisco.com/en/US/tech/tk652/tk90/technologies_configur ation_example09186a0080094681.shtml Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13 Class of Restrictions (COR) Lists COR Lists are used to control which Dial Peers an individual user may access. To control who can dial certain patterns, international numbers for example, you can apply a COR list to the Dial Peer that matches that destination-pattern. To create and apply COR lists, follow these steps 1. Configure dial-peer cor custom and assign a meaningful name that specifies the way CORs apply to dial-peers. 2. Create the actual lists of the restrictions that apply to the dial-peer. 3. Create dial-peers and specify the COR list to be used. 4. Apply the COR list to the individual Ephone-dns. Note that any ephone-dn without a COR list applied is given full privileges. Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14 For a copy of this Webinar and others, as well as application notes and the chance to discuss all this, please visit the new Partner Community: www.cisco.com/go/smallbizsupport <Alternatively, start on Partner Central: http://www.cisco.com/web/partners/index.html highlight the sales category and click on Small and Medium Business: http://www.cisco.com/web/partners/sell/smb/index.html Then, on this page there's a link to it in the top Announcement box: "SMB Webinar Schedule for January" (this will be updated each month) Or to find the page when it's not in the Announcement box, under Achieve Your Goals, the drop down "What do you want to do today" has "Attend an SMB Webinar" (this is a permanent link). Or in the Navigation Click on Tools and Resources, and a subpage is called "Online Events for SMB Partners" which is our page> Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15 Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16