
FireBrick FB6502 User Manual
vii
12.2. Configuring VRRP ................................................................................................... 60
12.2.1. Advertisement Interval .................................................................................... 60
12.2.2. Priority ........................................................................................................ 60
12.3. Using a virtual router ................................................................................................ 60
12.4. VRRP versions ........................................................................................................ 60
12.4.1. VRRP version 2 ............................................................................................ 60
12.4.2. VRRP version 3 ............................................................................................ 61
12.5. Compatibility ........................................................................................................... 61
13. VoIP ................................................................................................................................. 62
13.1. What is VoIP? ......................................................................................................... 62
13.2. Registration and Proxies ............................................................................................ 62
13.2.1. Registrar ...................................................................................................... 62
13.2.2. Proxy ........................................................................................................... 62
13.3. Core call routing switch ............................................................................................ 63
13.3.1. Call control .................................................................................................. 63
13.3.2. Bulk registration client ................................................................................... 63
13.4. Network Address Translation ..................................................................................... 63
13.5. Number plan ........................................................................................................... 64
13.6. Telephone handsets .................................................................................................. 64
13.7. VoIP call carriers ..................................................................................................... 65
13.8. Hunt groups ............................................................................................................ 66
13.9. Call pickup/steal ...................................................................................................... 66
13.10. Busy lamp field ..................................................................................................... 66
13.11. Using RADIUS ...................................................................................................... 66
13.11.1. RADIUS accounting ..................................................................................... 66
13.11.2. RADIUS authentication ................................................................................. 66
13.11.2.1. Call routing by RADIUS .................................................................... 67
13.12. Call recording ........................................................................................................ 68
13.13. Voicemail and IVR services ..................................................................................... 69
13.14. Call Data Records .................................................................................................. 69
13.15. Technical details .................................................................................................... 70
13.16. Custom tones ......................................................................................................... 70
14. BGP ................................................................................................................................. 72
14.1. What is BGP? ......................................................................................................... 72
14.2. BGP Setup .............................................................................................................. 72
14.2.1. Overview ..................................................................................................... 72
14.2.2. Standards ..................................................................................................... 72
14.2.3. Simple example setup ..................................................................................... 73
14.2.4. Peer type ...................................................................................................... 73
14.2.5. Route filtering ............................................................................................... 74
14.2.5.1. Matching attributes .............................................................................. 74
14.2.5.2. Action attributes .................................................................................. 74
14.2.6. Well known community tags ........................................................................... 75
14.2.7. Announcing black hole routes .......................................................................... 75
14.2.8. Announcing dead end routes ............................................................................ 76
14.2.9. Bad optional path attributes ............................................................................. 76
14.2.10. <network> element ....................................................................................... 76
14.2.11. <route>, <subnet> and other elements ............................................................. 76
14.2.12. Route feasibility testing ................................................................................. 76
14.2.13. Diagnostics ................................................................................................. 77
14.2.14. Router shutdown .......................................................................................... 77
14.2.15. TTL security ............................................................................................... 77
15. Command Line Interface ...................................................................................................... 78
A. CIDR and CIDR Notation ..................................................................................................... 79
B. MAC Addresses usage .......................................................................................................... 81
B.1. Multiple MAC addresses? ........................................................................................... 81