
FireBrick FB2700 User Manual
ix
17.8.1. Ring Type .................................................................................................. 108
17.8.2. Ring order .................................................................................................. 109
17.8.3. Overflow .................................................................................................... 109
17.8.4. Out of hours ............................................................................................... 109
17.9. Call pickup/steal ..................................................................................................... 109
17.10. Busy lamp field .................................................................................................... 110
17.11. Using RADIUS .................................................................................................... 110
17.11.1. RADIUS accounting ................................................................................... 110
17.11.2. RADIUS authentication ............................................................................... 110
17.11.2.1. Call routing by RADIUS ................................................................... 111
17.12. Call recording ...................................................................................................... 112
17.13. Voicemail and IVR services ................................................................................... 113
17.14. Call Data Records ................................................................................................. 113
17.15. Technical details ................................................................................................... 114
17.16. Custom tones ....................................................................................................... 114
18. BGP ............................................................................................................................... 116
18.1. What is BGP? ........................................................................................................ 116
18.2. BGP Setup ............................................................................................................ 116
18.2.1. Overview .................................................................................................... 116
18.2.2. Standards .................................................................................................... 116
18.2.3. Simple example setup ................................................................................... 117
18.2.4. Peer type .................................................................................................... 117
18.2.5. Route filtering ............................................................................................. 118
18.2.5.1. Matching attributes ............................................................................ 118
18.2.5.2. Action attributes ................................................................................ 118
18.2.6. Well known community tags .......................................................................... 119
18.2.7. Announcing black hole routes ........................................................................ 119
18.2.8. Announcing dead end routes .......................................................................... 120
18.2.9. Bad optional path attributes ........................................................................... 120
18.2.10. <network> element ..................................................................................... 120
18.2.11. <route>, <subnet> and other elements ............................................................ 120
18.2.12. Route feasibility testing ............................................................................... 120
18.2.13. Diagnostics ................................................................................................ 121
18.2.14. Router shutdown ........................................................................................ 121
18.2.15. TTL security ............................................................................................. 121
19. OSPF .............................................................................................................................. 122
19.1. What is OSPF? ...................................................................................................... 122
19.2. OSPF Setup ........................................................................................................... 122
19.2.1. Overview .................................................................................................... 122
19.2.2. Standards .................................................................................................... 122
19.2.3. Simple example setup ................................................................................... 123
19.2.4. <ospf> configelement ................................................................................... 123
20. Internet Service Providers ................................................................................................... 124
20.1. Background ........................................................................................................... 124
20.1.1. How it all began .......................................................................................... 124
20.1.2. Point to Point Protocol .................................................................................. 124
20.1.3. L2TP ......................................................................................................... 124
20.1.4. Broadband .................................................................................................. 125
20.1.5. RADIUS ..................................................................................................... 125
20.1.6. BGP .......................................................................................................... 125
20.2. Incoming L2TP connections ..................................................................................... 125
20.3. The importance of CQM graphs ................................................................................ 126
20.4. Authentication ........................................................................................................ 126
20.5. Accounting ............................................................................................................ 127
20.6. RADIUS Control messages ...................................................................................... 127
20.7. PPPoE .................................................................................................................. 127