![cisco ip phone ip address menu cisco ip phone ip address menu](https://d68bu9da8k2nr.cloudfront.net/OEM-F5-BIG-LTM-2000S-1.jpg)
For increased security, you may specify a 32-character string with a random sequence of “ABCD” characters.
![cisco ip phone ip address menu cisco ip phone ip address menu](https://www.actnetworks.com.au/assets/full/1877.png)
This solution may be considered a “hack”, yet it is functional and secure. dial-peer voice 1 pots application client_on_port_1 incoming called-number A direct-inward-dial port 1:D The solution is to use a number-matching scheme that will not match any number. This dial-peer is not adequate for our needs, because any number matching the specification will prefer the port specification, e.g., this dial-peer will match any port. They will be listed with an operation status of down, as the port specification must be accompanied by a number matching a specification, for example: dial-peer voice 1 pots application client_on_port_1 incoming called-number. Dial-peers should resemble the following configuration: dial-peer voice 1 pots application client_on_port_1 direct-inward-dial port 1:D The often difficult part in gateway configuration is designing dial-peers to match certain voice ports.
![cisco ip phone ip address menu cisco ip phone ip address menu](https://i.ytimg.com/vi/edCzr5L4Zec/maxresdefault.jpg)
You can use the PortaOne’s “Session name” application, or create your own. Use the corresponding application on your gateway to handle the call. Now you must make sure that each call made by that customer is tagged as belonging to him.Only one row in rating entry is necessary, with the node “ANY” and the tariff you have created. For each such customer, create a tariff that you want to use to bill the customer and a product.For port-based billing, you need only do the following: Although it might be a good idea to implement call authorization so that you can control which destinations the customer is allowed to call to, we will not discuss this here. Typically, you do not use authentication or authorization for such “port-based billing”, since you are always sure that your customer is on the other end of the physical line.