background image

TD 92579EN

15 February 2012 / Ver. H

Installation and Operation Manual
IP-DECT Base Station & IP-DECT Gateway (software version 5.0.x)

8

2.2.2

IPBS2 with External Antennas

This section contains the differences between the IPBS2 with internal antenna and the 
IPBS2 with external antennas. For all other information see 

2.2.1 

IPBS2 with Internal 

Antenna 

on page 6.

Figure 3. IPBS2 with MCX connectors for external antennas.

Contents of the Box

The box in which the IPBS2 is packed contains:

• An IPBS2 with external antennas.

TFTP mode

Solid yellow.

TFTP mode.

Error

100 ms red, 100 ms off.

No Ethernet connection.

Fatal error

Solid red.

Fatal hardware error.

Deployment: 
Good sync

2000 ms blue, 400 ms yellow.

The IPBS2 is in deployment 
mode and has good air sync 
coverage.

Deployment:

 

Bad sync

400 ms blue, 600 ms off, 400 ms blue, 
600 ms off, 400 ms yellow.

The IPBS2 is in deployment 
mode and does not have 
adequate air sync coverage.

Deployment:

 

No sync

2000 ms red, 400 ms yellow.

The IPBS2 is in deployment 
mode and has no air sync 
coverage.

                   

                   

                   

                                               

                                               

                                               

Back view while lying down

MCX connectors

Summary of Contents for IPBL

Page 1: ...TD 92579EN 15 February 2012 Ver H Installation and Operation Manual IP DECT Base Station and IP DECT Gateway software version 5 0 x ...

Page 2: ...h External Antennas 17 2 6 AC adapter 18 3 Safety Instructions 19 3 1 Protection Against Electrostatic Discharge ESD 19 3 1 1 ESD Handling 19 3 2 Safety Aspects 20 3 2 1 IP DECT Base Station 20 3 2 2 DECT Base Station BS3x0 and TDM DECT Base Station DB1 20 3 2 3 IP DECT Gateway IPBL 20 3 3 Regulatory Compliance Statements EU EFTA only 20 3 4 Regulatory Compliance Statements USA and Canada only 20 ...

Page 3: ...n 33 5 3 Power the Base Station 34 5 3 1 Power the IPBS over Ethernet 34 5 3 2 Power the BS3x0 and DB1 over Express Powering Pair EPP and data pairs 34 5 3 3 Power the Base Station with a Local Power Supply 34 6 Installation of the IPBL 36 6 1 Install the IPBL 36 6 2 Pin the IPBL Cable 38 6 2 1 Synchronization Cable 38 6 2 2 RFP Cable 39 6 2 3 LAN Cable 39 6 3 Power the IPBL 40 6 3 1 110 230 VAC 4...

Page 4: ...Password 60 8 1 3 Centralized Management of Administrator Auditor Accounts Using Kerberos 61 8 1 4 Configure Automatic Firmware Update 68 8 1 5 Configure the NTP Settings 68 8 1 6 Configure Logging 69 8 1 7 Configure the HTTP settings 71 8 1 8 Configure the HTTP Client settings 72 8 1 9 SNMP 72 8 1 10 Certificates 73 8 1 11 License 79 8 2 LAN 79 8 2 1 Set DHCP Mode 79 8 2 2 Set a Static IP Address...

Page 5: ...ous Devices 97 8 5 18 Select Mobility Master Mode 97 8 5 19 Connect Mobilty Master to other Mobility Master s 98 8 5 20 Disconnect Mobilty Master from other Mobility Master s 98 8 5 21 Connect Master to a Mobility Master 98 8 5 22 Enable the Radio 98 8 5 23 Enter IP Address to the PARI Master and the Standby PARI Master 99 8 5 24 Multiple Radio Configuration 99 8 5 25 PARI 99 8 5 26 SARI 100 8 5 2...

Page 6: ...111 8 11 2 Disturbances 113 8 11 3 Status 113 8 12 Traffic 113 8 12 1 Display All Ongoing Calls in the System 113 8 12 2 Display Calls 114 8 12 3 Handover 114 8 13 Gateway 114 8 13 1 General 114 8 13 2 Interfaces 115 8 13 3 SIP Interfaces 115 8 13 4 Gatekeeper Interfaces 119 8 13 5 Routes Configuration 122 8 13 6 Show Active Calls 125 8 14 Backup 126 8 15 Software Upgrade 127 8 15 1 Before Upgradi...

Page 7: ...21 5 Performance 136 8 21 6 Config Show 136 8 21 7 Ping 137 8 21 8 Traceroute 137 8 21 9 Environment 137 8 21 10 RFP Scan 137 8 21 11 Service Report 137 8 22 Reset 138 8 22 1 Idle Reset 138 8 22 2 Immediate Reset 138 8 22 3 TFTP Mode 138 8 22 4 Boot 138 8 23 Reset Using the Reset Button 138 9 Commissioning 140 9 1 Radio coverage verification tests 140 9 1 1 Base Station Operation Test 140 9 1 2 Co...

Page 8: ...allation and Operation Manual IP DECT Base Station IP DECT Gateway software version 5 0 x Appendix E Load Balancing 158 Appendix F Update Script for Configuration of Kerberos Clients 165 Appendix G Install Certificate in the Web Browser 166 ...

Page 9: ...tallation troubleshooting and maintenance purposes and are relevant for the following personnel System administrator Service technician For information on the IP DECT system see the applicable System Description documentation for IP DECT For information about supported PBXs contact your supplier 1 In previous documentation IPBS Base Station or IPBS was sometimes referred to as IP DECT Base Station...

Page 10: ...h the Internet IPBL Previously called IP DECT Gateway or more commonly as the Blade IPBS Also referred to as IPBS Base Station Previously called IP DECT Base Station LAN Local Area Network a group of computers and associated devices that share a common communication line LDAP Lightweight Directory Access Protocol PBX Private Branch Exchange telephone system within an enterprise that switches calls...

Page 11: ...se Station see 2 4 DECT Base Station BS3x0 on page 13 TDM DECT Base Station see 2 5 DB1 on page 15 2 1 IPBS1 The following versions of the IPBS1 are available IPBS1 with internal antenna IPBS1 with external antennas 2 1 1 IPBS1 with Internal Antenna Figure 1 IPBS1 Overview Contents of the Box The box in which the IPBS1 is packed contains An IPBS1 with integrated antennas A mounting bracket Two scr...

Page 12: ... See 8 18 Update on page 130 for information Connectors Two 8 pin RJ45 modular jacks for LAN PoE and powering A 6 pin RJ12 modular jack for factory testing LEDs Status of LED1 lower LED Description Steady Green Operational Flashing fast amber Download of firmware in progress Steady Amber TFTP mode Alternating red green No Ethernet connection Status of LED2 upper LED Description Not lit IPBS1 opera...

Page 13: ...tween the IPBS1 with internal and external antennas For all other information see 2 1 1 IPBS1 with Internal Antenna on page 3 Contents of the Box The box in which the IPBS1 is packed contains An IPBS1 for external antennas Two antennas A mounting bracket Two screws with wall plugs Note The IPBS1 cannot be mounted with the antennas pointing downwards as the mounting bracket does not support it Inse...

Page 14: ... comes to coverage functionality accessories and mounting bracket If an old IPBS1 has to be replaced you just reuse the mounting bracket and install the IPBS2 2 2 1 IPBS2 with Internal Antenna Figure 2 IPBS2 Overview Contents of the Box The box in which the IPBS2 is packed contains An IPBS2 with integrated antennas A mounting bracket Two screws with wall plugs Front view LED LAN RJ45 Power Supply ...

Page 15: ...tus This section describes the different indications and when they shall be used In the illustrations below Each blink pattern is represented by a number of blocks where each block is 100 ms Light grey blocks means that the LED is off Whenever the indication is changed the new pattern always starts from the first block Idle OK Solid blue IPBS2 operational and no traffic on the IPBS2 Starting up se...

Page 16: ...e Box The box in which the IPBS2 is packed contains An IPBS2 with external antennas TFTP mode Solid yellow TFTP mode Error 100 ms red 100 ms off No Ethernet connection Fatal error Solid red Fatal hardware error Deployment Good sync 2000 ms blue 400 ms yellow The IPBS2 is in deployment mode and has good air sync coverage Deployment Bad sync 400 ms blue 600 ms off 400 ms blue 600 ms off 400 ms yello...

Page 17: ...ruary 2012 Ver H Installation and Operation Manual IP DECT Base Station IP DECT Gateway software version 5 0 x 9 A mounting bracket An antenna bracket Two antenna coaxial cables Two antennas Four screws with wall plugs ...

Page 18: ...ware in the IPBL can be updated by downloading new software without disconnecting the equipment The new software is stored in flash memory See 8 18 Update on page 130 for information Pos Name Function 1 Reset Resets the IPBL see 8 23 Reset Using the Reset Button on page 138 for more information 2 Status LED Indicates the status on the IPBL 3 Lan 10BASE T 100BASE T Ethernet interface LAN1 port must...

Page 19: ...Flashing All speech channels occupied in RFP Steady Speech activity in RFP Figure 2 Sync Ref sync LED Description Not lit No sync communication established Steady Communication established Figure 3 Sync Ref sync LED Description Not lit Sync port not selected as input sync source Flashing Sync port selected as input sync source but the sync signal is not in sync Steady Sync port selected as input s...

Page 20: ...579EN 15 February 2012 Ver H Installation and Operation Manual IP DECT Base Station IP DECT Gateway software version 5 0 x 12 Figure 5 Lan LED Description Not lit 10 Mbps operation Steady 100 Mbps operation ...

Page 21: ...Power RJ45 Front viewBack view LED1 LED2 Figure 5 BS3x0 Overview Contents of the Box The box in which the base station is packed contains A base station Two antennas only base station with external antenna A mounting bracket Two screws with wall plugs Power Distribution The base station can be powered using the following methods From the IPBL via the Express Powering Pair EPP and data pairs With a...

Page 22: ...wo 8 pin RJ45 modular jacks for data and powering A 6 pin RJ12 modular jack for factory testing LEDs Status of LED1 lower LED Description Steady Green Power LED Status of LED2 upper LED Description Not lit Base station operational and no traffic on the base station Flashing green Fully occupied with traffic Steady green Base station operational and traffic on the base station Flashing amber Softwa...

Page 23: ...o coverage functionality accessories and mounting bracket If an old BS3x0 has to be replaced you just reuse the mounting bracket and install the DB1 2 5 1 DB1 with Internal Antenna Figure 6 DB1 Overview Contents of the Box The box in which the DB1 is packed contains A DB1 with integrated antennas A mounting bracket Two screws with wall plugs Front view LED DECT RJ45 Power Supply RJ45 Back view whi...

Page 24: ...ering LEDs The IPBS2 has one RGB LED to indicate status This section describes the different indications and when they shall be used In the illustrations below Each blink pattern is represented by a number of blocks where each block is 100 ms Light grey blocks means that the LED is off Whenever the indication is changed the new pattern always starts from the first block Idle OK Solid blue DB1 oper...

Page 25: ...ternal antennas For all other information see 2 5 1 DB1 with Internal Antenna on page 15 Figure 7 DB1 with MCX connectors for external antennas Contents of the Box The box in which the DB1 is packed contains A DB1 with external antennas A mounting bracket An antenna bracket Two antenna coaxial cables Two antennas Four screws with wall plugs Fatal error Solid red Fatal hardware error DIP switch 1 O...

Page 26: ...ly Note The maximum length of cable from adapter must not exceed 10 meters Versions For European countries except U K Art no 130137B Order no BSX 0013 For U K Art no 130136B Order no BSX 0014 For NA Art no 130138A Order no BSX 0015 For Australia Art no 130139B Order no 660263 different type of mains plug IMPORTANT If local power supply is used for the RFPs the EPP cable pair must NOT be connected ...

Page 27: ...C CSA UL AU NZS 60950 are to be used when the IPBS RFPs are powered by local power supplies 3 1 Protection Against Electrostatic Discharge ESD Integrated circuits are sensitive to ESD To avoid damage caused by ESD service engineers and other people must handle equipment and boards carefully Electronic equipment has become more resistive to ESD but we see an increase of situations where static elec...

Page 28: ...e equipment are in compliance with the essential requirements and other relevant provisions of R TTE Directive 1999 5 EC The Declarations of Conformity may be consulted at http www ascom com ws products_ws htm The IP DECT Base Stations BS3x0 Base Station TDM DECT Base Station DB1 and IP DECT Gateway are marked with the label 3 4 Regulatory Compliance Statements USA and Canada only FCC compliance s...

Page 29: ... aux appareils radio exempts de licence L exploitation est autorisée aux deux conditions suivantes 1 l appareil ne doit pas produire de brouillage et 2 l utilisateur de l appareil doit accepter tout brouillage radioélectrique subi même si le brouillage est susceptible d en compromettre le fonctionnement IC Requirements for Canada This Class B digital apparatus Base Stations complies with Canadian ...

Page 30: ...The signature may be signed by a trusted entity called a Certificate Authority CA see Certificate Authorities The most common use of public key certificates is for TLS certificates https websites Certificate Authorities A Certificate Authority or Certification Authority CA is a trusted entity which issues public key certificates The certificates contain a public key and the identity of the owner T...

Page 31: ...cipients by applying an encryption algoritm to the message plaintext producing ciphertext appearently random bits A decryption algoritm if given the correct key converts the ciphertext back into plaintext Public key algoritms use paired keys one for encryption and another for decryption Authentication Authentication is the verification of a message s sender This requires the message to be protecte...

Page 32: ...ird parties see 2 Certificate Handling Options with Device Certificates 1 Trust Relationships Trust relationships are defined by a trust list in the device The list contains the certificates to be accepted by the device for TLS secured connections e g HTTPS SIPS For more information see Trust List on page 74 2 Certificate Handling Options with Device Certificates There are three certificate handli...

Page 33: ...private CA B Certificates signed by a trusted public third party entity organization There are only about a dozen issuers who have the authority to sign certificates for servers worldwide An example is VeriSign To use a public CA for certificate approvals the IP DECT system would in most cases need to be connected to the Internet and hold a fully qualified domain name For more information see Cert...

Page 34: ...used by web browsers to authenticate the identity of the device Web server For more information see 8 1 10 Certificates on page 73 4 3 3 Configuration SIPS SIP Secure SIPS is used to encrypt the signalling communication between the IPBS and the IP PBX SIPS uses the TLS protocol for encryption The signalling between the IPBSs is also encrypted by default and there is no possibility to disable it Fo...

Page 35: ...mited a RJ45 modular jack without cable retention must be used Note Ensure that during the installation of an base station each base station is given an extra length 5 10 metres of cable because it is possible that it will have to be moved for one reason or another 5 2 Install the Base Station The base station can be mounted vertically or horizontally Mount the base station at places and positions...

Page 36: ...hen the base station has to be positioned above a suspended ceiling make sure that the front of the base station points downwards 5 2 3 Fix the Mounting Bracket to a Pole or Beam The mounting bracket can be fixed to a pole diameter 45 mm or a beam wider than 50 mm by means of a strap or flexible metal band less than 30 mm wide The strap or flexible metal band is not included in the box 1 Fix the m...

Page 37: ...sion 5 0 x 29 Figure 9 Fixing the mounting bracket to a pole or beam 5 2 4 Use the Cable Ducts for IPBS1 When the base station IPBS1 is mounted to the wall cable ducts can be used to route the wiring through 1 Fix the cable duct to the wall in one of the positions shown in figure 8 on page 30 Figure 7 Tied wrongly 012 ...

Page 38: ...and mark the two holes for the antenna bracket see figure 11 on page 31 1 2 When using wall plugs Drill the two holes using a 6 mm drill and insert the included wall plugs 3 Position the antenna bracket to the wall and fasten it with the two included 3 5 mm screws 4 Mount the two included coaxial cables on the antenna bracket figure 11 on page 31 2 Fasten the coaxial cables with the lock nuts whic...

Page 39: ... 6 Connect the coaxial cables to the MCX connectors on the base station Back view while lying down MCX connectors 7 Mount the base station 3 see 5 2 9 Mount the Base Station on page 33 Figure 11 Connect external antennas TOP Min 74 mm Max 250 mm 1 3 coaxial cable lock nut antenna base station antenna bracket mounting bracket 2 TOP ...

Page 40: ...nd DB1 Pin the BS3x0 DB1 Cable on page 33 Do not plug the connector in the base station yet Note Since the distance between the base station and the wall is limited a RJ45 modular jack without cable retention must be used Pin the IPBS Cable Figure 9 RJ45 modular jack Tx Tx Rx Pwr Pwr Rx Pwr Pwr Pwr Power pairs Rx Reciever data pair Tx Transmitter data pair 014 1 5 4 3 2 6 7 8 Figure 12 Connector p...

Page 41: ... be connected 5 2 8 Connect the Base Station Cables 1 Only for IPBS1 If it is required that the cables enter the base station centrally from above guide the cables through the recess in the middle of the base station as shown below 2 Plug the modular jack of the data cable into one of the data power connectors 3 When an AC adapter is used Plug the modular jack of the AC adapter in one of the data ...

Page 42: ...dard supports two ways of feeding the power 1 Power over the Rx Tx data pairs 2 Power over the spare cable pairs Both power feed methods are supported in the IPBS it is also insensitive to change of the polarity 5 3 2 Power the BS3x0 and DB1 over Express Powering Pair EPP and data pairs When a base station is powered remotely via the IPBL the maximum length between the base station and the IPBL de...

Page 43: ...n and Operation Manual IP DECT Base Station IP DECT Gateway software version 5 0 x 35 Note Only approved power supply according to valid editions of EN IEC CSA UL AU NZS 60950 is to be used when the base station is powered by a local power supply ...

Page 44: ...d below 1 Install the IPBL in a standard 19 rack 2 Pin the cables see 6 2 Pin the IPBL Cable on page 38 3 Attach the power cable see 6 3 Power the IPBL on page 40 4 Connect the cables in the following order Ethernet cable A LAN1 port must be used in the IP DECT system LAN2 port is for administration only Synchronization cable ring sync reference sync B Base station cable RFP cable C IMPORTANT The ...

Page 45: ... 2012 Ver H Installation and Operation Manual IP DECT Base Station IP DECT Gateway software version 5 0 x 37 consumption For more information of power consumption of the RFPs see Appendix B RFP Power Consumption on page 153 ...

Page 46: ...eed 2000 meters 1 Cut the cable to the correct length 2 Connect the cable to a RJ45 modular jack For information on pinning see Figure 13 and Figure 14 3 Label the cable Sync IN Figure 13 RJ45 modular jack Sign Tx Sign Tx Sign Rx Rx Rx Sign Rx Tx Tx Sign Signalling Rx Reciever data pair Tx Transmitter data pair 026 1 5 4 3 2 6 7 8 Figure 17 Connector pinning of the Sync IN cable Sync OUT Figure 14...

Page 47: ...RJ45 modular jack For information on the pinning see below IMPORTANT If local power supply is used for the RFP the EPP cable pairs must NOT be connected 3 Label the cable 6 2 3 LAN Cable Note The TX RX crossover straight cable feature does not work in the IPBL It must be a straight cable between the IPBL and the switch port 1 Cut the cable to the correct length 2 Connect the cable to a RJ45 modula...

Page 48: ...s There are two alternatives to power the IPBL 110 230 VAC 60 50 Hz 48 VDC 6 3 1 110 230 VAC The 110 230VAC 100 240 VAC power input is protected against overload by a 4A fuse The IEC 60320 type C14 male connector consists of live lead 1 neutral lead 2 protective earth 3 Figure 19 Pinning of the 110 230 VAC power supply 1 Connect the power cable on the IPBL 2 Connect the power cable in a wall socke...

Page 49: ...mages caused by the user reversing the input terminals during installation Figure 20 Pinning of the 48 VDC power supply Note A ground cable must be fastened to the protective earth 3 when 48 VDC is used as power source 1 Fasten the ground cable to the protective earth 3 using the attached M4 screw Philips and washer 2 Cut the power cable to the correct length The recommended wire size diameter is ...

Page 50: ...ection 7 1 1 Web Browser Requirements To use the interface properly the web browser has to meet the following requirements HTTP 1 1 protocol HTML 4 0 protocol XML XSL Version 1 0 The GUI has been tested with Internet Explorer 7 x and Firefox 3 x but can also be operated with other browsers in compliance with the requirements above 7 2 Access the GUI Note To access the GUI for an IPBS IPBL using se...

Page 51: ...without a DHCP Server If the network does not have a DHCP server and the DHCP mode is set to automatic factory default follow the steps below Note If the IPBS IPBL has been used before it must be restored to factory default settings by performing a long hardware reset see 8 23 Reset Using the Reset Button on page 138 1 Connect an Ethernet cable between the IPBS IPBL and the computer NOTE For IPBS ...

Page 52: ... Run and enter cmd in the Open text field 2 Enter the following commands C nbtstat R C nbtstat a ipbs xx xx xx in case of IPBL enter ipbl xx xx xx Where xx xx xx should be replaced with the last 6 hexadecimal digits of the MAC address 3 The IP address is displayed in the command window see the white frame in figure below Figure 17 4 Enter http xxx xxx xxx xxx where xxx xxx xxx xxx is the determine...

Page 53: ...DECT Gateway software version 5 0 x 45 3 Enter user name and password in the dialog box Default user name is admin Default password is changeme 4 Enter a user name in the User Name text field 5 Enter a password in the Password text field Repeat the password in the second text field 6 Click OK ...

Page 54: ...dministrators on page 47 for more information 7 3 4 User Administrators IPBS IPBL is not supplied with preinstalled user administration accounts Therefore the first user administration account must be created by a system administrator see 7 3 5 System Administrators on page 47 If additional user administration accounts are needed they must also be created by a system administrator see Managing Use...

Page 55: ... 6 The User Administration page is displayed See the figure below for a sample Figure 21 User Administration Sample The right side of the page consists of two list sections User Administrators in the upper right section Note this section is read only since a user administrator cannot manage other user administrators See Managing User Administrators on page 49 Users in the lower right section Refer...

Page 56: ...rd Enter a password Confirm Password Confirm the password Note Only changing the password will not result in the settings being saved For the settings to be saved both user name and password must be updated at the same time 4 Click OK Additional Administrator Accounts Note To create additional administrator accounts Kerberos must have been configured see 8 1 3 Centralized Management of Administrat...

Page 57: ...herefore the first user administration account must be created by a system administrator If additional user administration accounts are needed they must also be created by a system administrator 1 Log in as System Administrator see Log in as System Administrator on page 47 2 Select Users 3 Click show The User Administration page see figure 21 on page 47 for a sample is displayed 4 Click new 5 Sele...

Page 58: ...rmation see the corresponding subsection in 8 Operation on page 60 1 Determine the address and access the GUI see 7 2 Access the GUI on page 42 2 Change the default password see 7 2 2 Change the Default Password on page 44 3 Set a static IP address and set DHCP to off see 8 2 2 Set a Static IP Address on page 80 4 Set the mode to Mobility Master see 8 5 18 Select Mobility Master Mode on page 97 5 ...

Page 59: ...ge 44 3 Configure LDAP user name and password select the Write Access check box see 8 4 1 Configure LDAP Server on page 82 4 Set a static IP address and set DHCP to off see 8 2 2 Set a Static IP Address on page 80 5 Set the mode to Master see 8 5 13 Select Mode on page 94 6 Perform a reset to restart the IPBS IPBL in Master mode see 8 22 Reset on page 138 7 Select system name and password see 8 5 ...

Page 60: ...ddress and set DHCP to off see 8 2 2 Set a Static IP Address on page 80 5 Set the mode to Standby Master see 8 5 13 Select Mode on page 94 6 Perform a reset to restart the IPBS IPBL in Standby Master mode see 8 22 Reset on page 138 7 Enter system name and password this should be the same system name and password as in the Pari Master see 8 5 1 Change System Name and Password on page 89 8 Select su...

Page 61: ...38 7 9 Configure the Standby Master It is recommended to have a Standby Master in the IP DECT system This section describes how to configure a Standby Master Each configuration step is briefly described in the step list below for more detailed information see the corresponding subsection in 8 Operation on page 60 1 Determine the address and access the GUI see 7 2 Access the GUI on page 42 2 Change...

Page 62: ... the GUI see 7 2 Access the GUI on page 42 2 Change the default password see 7 2 2 Change the Default Password on page 44 3 Set DHCP mode to Client see 8 2 3 Dynamic IP address via DHCP on page 80 4 Enable the Radio in the IPBS IPBL see 8 5 22 Enable the Radio on page 98 5 Enter Pari Master and Standby Pari Master IP addresses see 8 5 23 Enter IP Address to the PARI Master and the Standby PARI Mas...

Page 63: ...iers see 8 5 7 Enable Carriers on page 91 13 Set Master Id see 8 5 14 Set Master Id on page 94 14 Enable Pari function see 8 5 15 Enable PARI Function on page 94 15 Assign PARI see 8 5 25 PARI on page 99 Note If two IPBss are configured for coverage test of air sync both IPBS must have the same system ID 16 Enter SARI see 8 5 26 SARI on page 100 17 Reset in order to make the configuration changes ...

Page 64: ...e phone number extension need to be unique throughout the system 30 Password Optional is used for registration towards the gatekeeper 30 Idle Display Optional will be shown in the handset display when the handset is idle 47 4 Click OK 5 Repeat step 2 to 4 for all users Assign Handsets to Users 1 Select DECT System 2 In the Subscriptions drop down list select With System AC to enable anonymous regi...

Page 65: ... the corresponding text fields Field name Description Max characters Long Name Mandatory the name of the user need to be unique throughout the system 30 Display Name Optional and only available when using the Ascom VoIP Gateway the calling or called party name will be shown in the handset display depending on whose handset 30 Name Optional the user name 30 Number Mandatory the phone number extensi...

Page 66: ... correct number of entries are correct 5 Click Next Limitations Maximum 1000 rows in the csv file The maximum csv file size is 128 Kb If the file is to large divide the file into several files Only the new user data is imported The old user data is not deleted Existing user data cannot be updated If the separator is wrong an error message will be displayed Field name Description Max characters Lon...

Page 67: ...e administrator will have to use Show see 8 9 1 Show all Registered Users in the IP DECT System on page 106 The Handset d41 and d62 must have version 3 2 X or later The Handset d81 must have version 3 0 X or later No other handsets in addition to the above works Assign Handset to Users With User AC must be enabled see 8 5 2 Set Subscription Method on page 89 When the battery is inserted in the han...

Page 68: ... IPBS are used as default 8 1 General This section describes how to do the following configurations and settings Name the equipment Change Administrator User Name and Password Kerberos Configure automatic firmware update Configure the NTP settings Configure Logging Configure the HTTP settings Figure 22 Assigning a administrator name username and password 8 1 1 Name the IPBS IPBL Each IPBS IPBL can...

Page 69: ... IPBLs that are setup as client devices in the installation The Kerberos server and the group of client devices constitute a domain called a realm During Kerberos communication no password is actually sent over the network Kerberos uses encrypted data packets tickets which are time stamped and expire after a certain period of time Therefore it is crucial to get the correct time across the system f...

Page 70: ...m many clients on page 63 Configure IPBS IPBL as a client in a new system see Configure IPBS IPBL as a client in a new system on page 64 Configure IPBS IPBL as a client in a small existing system few clients The location of the Kerberos server must be configured locally on each client The server must be configured as a client as well so that it can also join the realm To configure each IPBS IPBL a...

Page 71: ...e running on either software version 3 x x or software version 4 1 x 1 Install either the software version 4 1 x or software version 5 x x using the update server and an update script see 8 1 4 Configure Automatic Firmware Update on page 68 2 Setup the update server using the update script described in Appendix F 3 Select DECT Radio config 4 Go to the Update section 5 In the Command File URL text ...

Page 72: ...in the Kerberos server Password Enter the same password defined in the Kerberos server Disable local authentication Select the Disable local authentication check box recommended Overwrite existing Select the Overwrite existing check box optional 5 Go to the Authentication Servers section 6 In the Realm Domain text field enter the realm name specified in the Kerberos server 7 In the Address text fi...

Page 73: ... The trust relationship must be configured in the AD server 1 In the Windows Start menu select Administrative Tools Active Directory Domains and Trusts 2 Right click the domain name and select Properties 3 Select the Trusts tab and click New Trust 4 The New Trust Wizard appears Click Next 5 Enter the name of the Kerberos realm Click Next 6 Select Realm trust Click Next 7 Select Nontransitive Click...

Page 74: ...tocol is used when logging in Authorization Set user access rights from the Windows domain Use domain group Specify a Windows group with Administrator or Auditor rights Administrator All Windows domain users have administrator access rights Auditor All Windows domain users have auditor access rights Admin Group RID Specify the Relative Identifier RID of a Windows group with administrator rights Th...

Page 75: ...rmation stored on the server 4 Click OK 5 The secondary Kerberos server is enabled Enter the realm name in the Realm field 6 LDAP is used to replicate the primary server database Enter the IP address of the primary Kerberos server in the Master field in the LDAP Replication section For more information about LDAP see 8 4 LDAP on page 82 7 Select the Enable check box 8 Click OK 9 Click OK again to ...

Page 76: ...realm account in the Deregister with Kerberos server section Click Deregister Delete Leave the realm without removing data from the server Click Delete 8 1 4 Configure Automatic Firmware Update The IPBS IPBL can be configured to automatically update its firmware A script file must be uploaded to a suitable directory on an internal web server For information on the script file syntax see Appendix A...

Page 77: ...tern Daylight Time Second Offset time difference between the summer time and the UTC Date Time Date Time beginning and end of summertime date format Mm n d d day of n week in the m month time format hh mm ss in 24 hour format Note that a week always starts on a Sunday and the number for Sunday is 0 Example North Carolina is located in the Eastern Time Zone Eastern Standard Time EST is 5 hours behi...

Page 78: ...the Path text field 6 Click OK Note The IPBS IPBL will make an HTTP GET request or HTTPS GET request to the web server on the registered URL followed by the URL encoded log entry Example Enter the value cdr cdrwrite asp in the URL Path field if a page is on the web server with the name cdr cdrwrite asp with a form that expects the log message in the msg parameter In this example the IPBS IPBL will...

Page 79: ...s traffic respectively would be disabled if their port values were to be set to zero 0 Therefore To disable http traffic set Port to 0 which is recommended in a secure system Attempts to contact the device using the http protocol will result in an Unable to connect message To disable https traffic set HTTPS Port to 0 not recommended Any other port values would enable http and https traffic respect...

Page 80: ...thentication can be specified 1 Select General HTTP Client 2 Enter the URL in the URL text field 3 Enter User and Password in the User and Password text fields 4 Click OK A new row will be shown and more URLs can be added 8 1 9 SNMP Faults can be reported in the IP DECT system via the Simple Network Management Protocol SNMP The SNMP framework has three parts An SNMP manager the system used to cont...

Page 81: ...urposes 5 Enter a location in the Location field This field is optional and serves only informational purposes 6 Select the Authentification Trap check box to enable the sending of authentification traps Access via SNMP is only possible if the correct Community Name is entered If enabled a trap will be generated in the event of access with an incorrect Community Name 7 Enter the IP address of the ...

Page 82: ...cate details in a window PEM Click the PEM hyperlink under the Download header to download the certificate in PEM format DER Click the DER hyperlink under the Download header to download the certificate in DER format Remove To remove a certificate Select the check box for the certificate and click the Remove button Clear To remove all certificates from the trust list Click the Clear button Downloa...

Page 83: ...y CA see Certificate Signing Request CSR on page 77 The following table describes the different functions Field name Description Subject Click the name of a certificate to display its details in a window Clear Discard all rejected certificate chains Trust Click this button to add the selected certificates to the trust list and remove the corresponding chains from the rejected certificates Field na...

Page 84: ...tificates cannot be verified and thus the user administrator will be prompted by the web browser to accept the certificate before it can be used From this point on within the browser session as long as the certificate is not changed communication between the browser and the device is possible without further accept operations from the user administrator If the device certificate is replaced or reg...

Page 85: ...owser when accessing the device DNS Name If the device has got a DNS name it should be entered here It will be stored as a subjectAltName SAN in the certificate The format of this field is a FQDN e g host domain com 5 Click OK 6 A new key pair and a certificate will be created This may take up to one hour depending on the key strength selected During this time the device will be fully operational ...

Page 86: ... same value as entered in the web browser when accessing the device DNS Name If the device has got a DNS name it should be entered here It will be stored as a subjectAltName SAN in the certificate The format of this field is a FQDN e g host domain com 5 Click OK The windows closes A key pair and a CSR file will be created This may take up to one hour depending on the key strength selected During t...

Page 87: ...d settings Set DHCP mode Set IP static address Set dynamic IP address Set link type Configure VLAN View LAN statistics Deactivate LAN port only for IPBL Note The IPBL has two LAN ports LAN1 port must be used in the IP DECT system LAN2 port is for administration only 8 2 1 Set DHCP Mode The IPBS IPBL can have different DHCP modes see the table below Figure 20 Disabled Used if the IPBS IPBL should h...

Page 88: ...eld and select the Check ARP check box to detect and prevent ARP poisoning attacks 3 Click OK 4 Reset in order to make the changes take effect see 8 22 Reset on page 138 5 Start the web based configuration using the static IP address 8 2 3 Dynamic IP address via DHCP The Radios can have dynamic IP address allocation if the network has an DHCP server 1 On the IPBS Select LAN DHCP On the IPBL Select...

Page 89: ...oS priority value recommended value is 0xb8 in the ToS Priority RTP Data text field 3 Enter the ToS priority value recommended value is 0x68 in the ToS Priority VoIP Signalling text field 4 Select which ports to use for RTP traffic by entering the first port in the First UDP RTP Port text field 5 Enter the number of ports to use in the Number of Ports text field 6 Click OK ToS priority RTP Data an...

Page 90: ...and settings Configure LDAP Server Check LDAP Server Status Configure LDAP Replicator Check LDAP Replicator Status 8 4 1 Configure LDAP Server The IP DECT system needs an LDAP server in some configurations If the VoIP gateway is set up as an LDAP server the Master should be set up as an LDAP replicator see 8 4 3 Configure LDAP Replicator on page 83 Setup the IPBS IPBL as an LDAP server Note The se...

Page 91: ...tor is configured on the Masters not hosting the LDAP Server To have full roaming between Masters the LDAP user must have write access to the LDAP server Configure Full Directory Replication 1 Select LDAP Replicator 2 Select Full Replication in the Type drop down list 3 Select the Enable check box 4 Enter the IP address to the LDAP server in the Server text field 5 Enter the IP address to the alte...

Page 92: ...ick Show Options to see some naming contexts on the configured server 6 Enter an LDAP filter to retrieve only the relevant LDAP objects from the AD A default objectclass user filter is offered but it is recommended to assign all IP DECT users to a group within the AD For example the following filter can be entered to retrieve only IP DECT users objectClass user memberOf CN grp_ipdect CN Users DC D...

Page 93: ...n be configured with the following text fields Source Attribute The name of the AD attribute to be replicated Only those users are replicated who have the defined source attributes See AD attribute name on page 85 for examples IP DECT designator IP DECT attribute name AD attribute name Description Long Name cn cn Common name mandatory and must be unique Name h323 userPrincipalName User name Number...

Page 94: ...les configured for In Maps are assigned to the internal IP DECT attributes Out Maps can be configured with the following text fields Dest Attribute The name of the IP DECT attribute See IP DECT attribute name on page 85 for examples Destination Value The name of the local temporary variable Example In the example above regular expressions are used to remove non numerical characters from the phone ...

Page 95: ...rectory 2003 does not allow simple binds so it may be necessary to change Windows Registry settings to use AD replication 1 In Windows select Run in the Start menu 2 Enter regedit and click OK to start the Windows Registry Editor 3 In the Editor navigate to the HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services NTDS Parameters LDAPServerIntegrity key 4 Click on the key with the right mouse butto...

Page 96: ...ctory Three states are possible Stopped Active Completed Notify Number of change notifications sent to the server Add Number of locally added objects Del Number of locally deleted objects Modify Number of locally modified objects Pending Number of local objects waiting to be sent to the server 8 4 5 Expert tool The Expert function should only be used after consultation with Ascom Technical Support...

Page 97: ...he Ascom VoIP Gateway PBX Password 1 Select DECT System Note To access the System tab the Master mode has to be activated see 8 5 13 Select Mode on page 94 2 Write a system name in the System Name text field 3 Enter a new password in the Password text field Repeat the password 4 Click OK Note It is recommended to create a backup of the IPBS configuration when the password has been changed see 8 14...

Page 98: ... page 94 2 Enter an authentication code in the Authentication Code text field 3 Click OK 8 5 4 Select Tones 1 Select DECT System NOTE To access the System tab the Master mode has to be activated see 8 5 13 Select Mode on page 94 2 Choose tones in the Tones drop down list 3 Click OK 8 5 5 Set Default Language If the handset does not send language information to the system this setting determine whi...

Page 99: ...urther described in Appendix C 1 Select DECT System NOTE To access the System tab the Master mode has to be activated see 8 5 13 Select Mode on page 94 2 To enable select the Local R Key Handling check box NOTE To access the Local R Key Handling check box the SIP protocol has to be selected on the Master see 8 5 16 Configure Gatekeeper on page 95 3 Click OK 8 5 9 No Transfer on Hangup If enabled i...

Page 100: ... on the CPU when SRTP is used it is recommended to deactivate the Radio in the Master 1 Select DECT System Note To access the System tab the Master mode has to be activated see 8 5 13 Select Mode on page 94 2 To enable SRTP Select in the Secure RTP drop down list a cryptographic suite The numbers in the list refer to key length sha1 hash length To disable SRTP Select in the Secure RTP drop down li...

Page 101: ...es that can be selected to enable MWI Fixed interrogate and fixed notify number User dependent interrogate number User dependent notify number Both numbers users dependent Fixed means that a common call number is used for all users User dependent means that the user s own call number is used MWI Interrogate Number The number used by the handset when it checks with the IP PBX if there are any messa...

Page 102: ...is looped back to the handset 3 If you have selected the Standby mode enter the primary Master IP address in its text field 4 Click OK 5 Reset in order to make the changes take effect see 8 22 Reset on page 138 8 5 14 Set Master Id 1 Select DECT Master 2 Enter a Master id in the Master Id field The id must be unique for each Master in a multiple Master system The Standby Master must have the same ...

Page 103: ...m 5060 to the SIP proxy registrar in the Proxy text field 6 Enter the IP address or host name and optionally port of proxy e g proxy2 example com 5060 to the alternative SIP proxy registrar in the Alt Proxy text field 7 If used enter the domain address in the Domain text field 8 Enter the maximum internal number length in the Max internal number length text field 9 To enable Enbloc Dialing select ...

Page 104: ...s carried out To enable this option select the Hold before Transfer check box Accept Inbound Calls not Routed via Home Proxy If this option is enabled it could be possible for inbound calls to bypass call restrictions configured in the IP PBX If it is disabled a 305 Use Proxy response will be sent To enable this option select the Accept inbound calls not routed via home proxy check box Register wi...

Page 105: ...option also provides a solution for the case when the Master running on an IPBS with local power or an IPBL loses IP connectivity without the local host Radio losing its connection to the Master The handsets locked to this Radio become isolated from the system without any notification 1 Select DECT Master 2 Enter the registration name and number to the PBX in the Registration Name Number text fiel...

Page 106: ...lete the password in the Password text field 4 Delete the address to the other Mobility Master in the IP Address text field 5 Delete the address to the Standby Mobility Master for the other Mobility Master in the Alt IP Address text field 6 Click OK 7 Repeat the above steps to disconnect from additional Mobility Masters Note When disconnecting from other Mobility Master s the password field might ...

Page 107: ... configured in the Radio Config page replace the local Radio settings This means that all settings in the Radio Config menu will have precedence over values configured locally or received via DHCP options 1 Select DECT Radio Config NOTE To access the Radio Config tab the PARI function has to be enabled see 8 5 15 Enable PARI Function on page 94 2 Configure alarm and event forwarding see Forward Al...

Page 108: ...red to a common SARI Note Several guest SARIs have an impact on the system performance so it is recommended to use the same SARI across all PARI Masters in the system If this is not feasible you can add up to 10 SARIs 1 Select DECT SARI Note To access the SARI tab the PARI function has to be enabled see 8 5 15 Enable PARI Function on page 94 2 Enter the SARI number in the SARI text field 3 Click O...

Page 109: ...t is also possible to use static synchronization that is manually lock on to a specific RFPI When specifying a specific RFPI it must be within the same synchronization region Configure Sync Slave as follows 1 Select DECT Air Sync 2 Select Slave in the Sync Mode drop down list 3 To lock the sync slave to a specific RFPI enter the sync RFPI in the Sync RFPI text field Enter an alternative sync RFPI ...

Page 110: ...orm at reference sync failure a manual or an automatic scheduled one 6 Click OK 8 6 VoIP This section only applies if the SIP protocol is used in the system 8 6 1 Add instance id to the user registration with the IP PBX This might simplify administration with some IP PBXs 1 Select VoIP SIP 2 To enable select the Add instance id to the user registration with the IP PBX check box corresponding to th...

Page 111: ...e activated see 8 5 13 Select Mode on page 94 2 Enter the address to the IMS3 Unite CM in the IP Address text field 3 Click OK If Multicast is to be used do as follows 1 Select UNITE SMS NOTE To access the SMS tab the Master mode has to be activated see 8 5 13 Select Mode on page 94 2 Select the Multicast checkbox NOTES a The Multicast groups are created in the ESS refer to Installation and Operat...

Page 112: ...r example IMS3 has been selected to be used in the IP DECT system see 8 7 2 Device Management on page 104 then the Master will automatically search for an existing Device Manager on the network To set the Master to search in a specific domain on the network or to stop the search follow the steps below 1 Select UNITE Service Discovery NOTE To access the Service Discovery tab the Master mode has to ...

Page 113: ...phonebook functionality in the IPBS IPBL is enabled then the SMS feature in the IMS3 Unite CM is disabled If an IMS3 Unite CM is connected the central phonebook should be located in the IMS3 Unite CM instead of the IPBS IPBL Import Entries to the Central Phonebook from a csv file Note A csv file can contain max 1000 users The csv file to be imported to the phonebook shall have the following format...

Page 114: ...port a csv file with user information 8 9 1 Show all Registered Users in the IP DECT System Shows both User Administrator and Users 1 Select Users Users 2 Click show It is possible to change the order of the list by clicking on the headings 8 9 2 Search for User Information It is possible to search for users registered in the system by name or extension number Search for a user following the steps...

Page 115: ...le should be saved 4 Click Save Note For safety reasons the Auth Code and Password will not be included in the csv file 8 9 6 Show Anonymous The IPEI IPDI number is displayed on anonymous registered handsets 1 Select Users 2 Select Anonymous 8 10 Device Overview 8 10 1 Radios Information about the devices in the IP DECT system 1 Select Device Overview Radios Figure 23 Name The unique identificatio...

Page 116: ...ed Radios no longer registered to the PARI Master are shown If it is vital that the new device keeps the RFPI for the broken device e g alarm localization purposes move the RFPI for the broken device to the new device registered to the PARI Master 1 Connect the replacing device 2 Add the Radio to the PARI Master see Add Radios on page 108 3 Select Device Overview Radios 4 In the Static Registratio...

Page 117: ...dentity number SW Version The current software version Hardware The hardware version Boot RFP boot version Connected Time The elapsed time since the RFP connected to the IPBL Cable Delay The delay caused by the cable Tx Error The number of transmitting errors Rx Error The number of receiving errors 3 The following actions are available Click OK to save your settings and close the pop up window Cli...

Page 118: ...Lost Counter When an IPBS increments the sync lost counter it means that the IPBS stops to handle all radio traffic for a while and after that restarts the synchronization procedure The radio part is not really restarted but out of service for a short time period The IP part of the IPBS is not affected by this but is in service all the time There are five reasons for when the sync lost counter is ...

Page 119: ...andsets have a short delay before showing No System the handset has time to roam to another IPBS This requires a good overlap between radio cells to make it possible for the handset to roam to another IPBS If no other IPBS is available the handset s will indicate No System As soon as the IPBS is synchronized it is available again for handset communication The handset will then connect to the syste...

Page 120: ...are three counters Calculations Is incremented each time the sync tree is calculated Configurations Is incremented when an IPBS has received a new sync instruction Sync Lost Is incremented when an IPBS stops to handle radio traffic for a while and after that restarts the synchronization procedure To clear the counters click Clear Reference Synchronization To get the Sync Master to resynchronize to...

Page 121: ...n progress performed by the current IPBS so it can be in synchronization with the synch source Drift The time difference between the current IPBS and its sync source Sync lost counter A counter that is incremented when the IPBS stops to handle radio traffic for a while and after that restarts the synchronization procedure RFPI Radio Fixed Part Identity is the Id number of the sync bearer Carrier T...

Page 122: ...epper in a PBX SIP interfaces can be used to obtain for example a trunk line from a SIP Provider This solution still requires handset VoIP registrations to be managed in IP DECT this is not performed by the SIP provider 8 13 1 General 1 Select Gateway General 2 Select Enter following settings Calls In Delivered The number of connected incoming calls in the Master Calls Out The number of outgoing c...

Page 123: ...egistrar as Gatekeeper Identifier H 323 or Registrar Name SIP see 8 13 4 Gatekeeper Interfaces on page 119 If multiple gatekeepers are installed in a network this can be used to find the right gatekeeper using Gatekeeper Discovery If a PBX is enabled on the same system a different Gatekeeper Identifier must be used for Gateway and PBX Column Values Description Interface The descriptive name of the...

Page 124: ...e Proxy The IP address of the SIP provider to where the SIP messages REGISTER INVITE etc are to be sent STUN Server Only necessary if the SIP server is outside the private network Note STUN Server has not been tested and is not officially supported by the Ascom IP DECT System Authorization Username Username for authorization only if different from the registration ID Password Retype The password f...

Page 125: ...o streams can be played using Wireshark SIP Interop Tweaks Proposed Registration Interval s Set in seconds default is 120 seconds A value too low increases the network load Accept INVITE s from Anywhere Check this box to accept invites from anywhere not only from the proxy configured Enforce Sending Complete Affects handling of 484 Address Incomplete responses If enabled and 484 Address Incomplete...

Page 126: ...roperability option for outgoing calls This controls the way CGPN is transmitted to the SIP provider Possible values are CGPN is user part of URI The Identity header contains an URI with the calling party number as user part left from Fixed AOR The Identity header contains the fixed registration URI AOR The actual calling party number and name will be transmitted inside the P Preferred Identity he...

Page 127: ...ber called in incoming calls s National Call number with area code Calling number from home country n International Call number with country code and area code Calling number from abroad i Abbreviated Unusual a Network specific Unusual x Call Number Formats Table 6 Click OK 8 13 4 Gatekeeper Interfaces Gatekeeper GK interfaces are channels to the world of Voice over Internet Protocol VoIP If your ...

Page 128: ...erent groups it is able to communicate in all with several hundred VoIP devices 1 Click Gateway GK 2 Click the desired interface name to be configured A new window opens 3 Select Enter following settings Field name Description Name Enter a name for the route Disable Select the Disable check box to disable the route Protocol Select one of the values below in the Protocol drop down list Possible val...

Page 129: ...ated in your network or if Gatekeeper discovery is not used Authorization Use these settings if log on to another gatekeeper is needed Password The Password corresponds to the H 235 SIP password required for logging on to the remote gatekeeper Retype Confirm password Alias list Name Define the H 323 SIP name required to identify yourself with the gatekeeper This is the Long name on the PBX Show ar...

Page 130: ...teway and where they are to be switched 1 Select Gateway Routes All configured routes are shown in a routing table 2 a If no routes have been configured click on the in front of From b Add a new route by clicking on the leftmost in the route which you want to insert the new route after Note the order of the routes here The new route is always inserted after the current entry A new window opens Sup...

Page 131: ... for Number in can be used in two ways Pre and Post dial We can use the following special characters here the period the question mark and the exclamation mark 42 3 ignores the 3 and will use any number in starting with 42 of length 4 42 3 will allow the following numbers 4203 4213 4223 4233 4243 4253 4263 4273 4283 4 293 Number out Enter the replacement for the dial prefix that you specified in t...

Page 132: ...number Verify CGPN Map will match only if there is a matching CGPN map too Interworking QSIG SIP Enable to support supplementary services such as name display call transfer call diversion etc u between the H 323 SIP network and a QSIG network Rerouting as Deflection Enable if call rerouting supplementary service shall be implemented as call deflection Routing on Diverting No Enable if routing shal...

Page 133: ...Number out 5 Click OK Note All call numbers in IP DECT are always processed in unknown format That is why the result of a number replacement for incoming calls always is of the type unknown and the call number type of outgoing calls to be replaced is likewise always unknown Accordingly you cannot specify a number type for replacements of incoming numbers in the Number out field and for replacement...

Page 134: ...mber before routing Cgnm calling name before routing Dif Interface for the outgoing call Cdpn called number after routing Cdnm called name after routing ccn Name of the call counter used for this route call counter name Protocols AProtocol BProtocol The protocol used on the calling and the called side Coders ACoders BCoders Coder ms round jitter Encoder used from A to B or B to Coder voice compres...

Page 135: ...note of the alternative SIP proxy registrar IP address found in the Alt Gatekeeper IP Address text field 8 15 2 Upgrading Sequence The best order is to start with the firmware and boot file upgrade of the Standby Master then the Master then all Radios then do the configuration changes This way the Radios will not be able to connect to the Master or Standby Master with incompatible firmware The upg...

Page 136: ... 6 When upgrading from software version 2 x x to later Reset in order to make the changes take effect see 8 22 Reset 7 Update the boot file to 5 0 x The boot file version contains a built in web server so there is no need to use the Gwload tool a tftp style client used to repair a broken firmware if the IPBS is unreachable through the web GUI See 8 18 3 Update the Boot File for more information on...

Page 137: ...erv and select an MWI mode in the MWI Mode drop down list When upgrading a system from software version 3 x x to later existing system administration accounts remain configured locally in the IPBS s IPBL s However it is recommended that the system administration accounts are configured centrally instead by moving them to the Kerberos server To have the system administration accounts configured loc...

Page 138: ...rom software version 5 0 x to 2 x x from 4 x x to 2 x x and from 3 x x to 2 x x If a system with 3 x x 4 x x or 5 0 x firmware and boot file is downgraded to a 2 x x version the HTTP server part of the boot code is removed If the firmware is downgraded to version 2 x x the LDAP replication must be activated again 1 Select LDAP Replicator 2 Select the Enable check box to activate LDAP replication 3...

Page 139: ...aded again Do not execute a reset before the firmware upload is complete For information on how to load new firmware if the IPBS IPBL is unreachable through the web GUI see 10 1 Load Firmware Using the Gwload Tool on page 142 1 Select Update Firmware 2 Click Browse and browse to the firmware file 3 Click Upload 4 Reset in order to make the changes take effect see 8 22 Reset on page 138 8 18 3 Upda...

Page 140: ...t When idle check box to start the update when the RFP is idle 7 Mark the applicable RFPs to be updated 8 Click Start to upgrade the selected RFPs The RFP restarts after the upload is finished 8 19 System Upgrade in System with Mobility Masters Upgrade in the following order 1 Upgrade all Standby Mobility Masters 2 Upgrade all Mobility Masters 3 Upgrade all of the remaining devices for each site b...

Page 141: ...ware in Multiple Master System If a faulty Master IPBS is replaced with a new one and the same configuration shall be applied to the new one then the faulty Master must have been disconnected from the system more than 2 minutes before the new Master is connected otherwise all the subscription data will be lost For information on how to load a configuration on the new Master see 8 18 1 Update Confi...

Page 142: ...r Diagnostics Alarms are all active alarms displayed An alarm is a fault that affects the normal service of the IP DECT system and may require action from personnel to correct it An IP DECT Master can collect alarms from Radios and it can display all active alarms in the system If an object is removed from the system Setting Description TCP Logs generated upon TCP connection set ups in the H 225 H...

Page 143: ...uired It is displayed for example if the capability of the managed object is severely degraded Indeterminate Level of severity cannot be determined Remote The IP Address of the object that reported the alarm Click the IP address to access the object Source The software module that reported the alarm Together with the code it uniquely identifies an alarm Description A textual description of the ala...

Page 144: ... hours The maximum possible value is displayed in the top left corner Click the left or right arrow buttons to see different time frames 8 21 6 Config Show Under Diagnostics Config Show the configuration is displayed as a text output Code A unique number that identifies the alarm Click the code to get more detailed information about the alarm For a list of possible codes and their descriptions see...

Page 145: ... applies to the IPBL The environment tab gives information power supply and consumption It also display temperature and fan status 1 Select Diagnostics Environment 2 The following information is available in the Power section Power supply AC or DC power port Voltage input voltage Current consumption total consumption for the IPBL an the connected RFPs Max 4 0 A when supplied with AC power port Max...

Page 146: ... reached using the gwload utility This mode should not be used during normal operation 8 22 4 Boot When the IPBS IPBL is in Boot mode it uses a small version of the firmware minifirmware which contains only the IP stack and the web interface 1 Select Reset Boot 2 Click OK 8 23 Reset Using the Reset Button It is possible to do a hardware reset of the IPBS and IPBL by pressing the reset button The b...

Page 147: ...s gone the LED on IPBS2 will start to flash in blue indicating the start of the factory reset process Hence the reset button can then be released When the LED LED 1 for IPBS1 is steady amber yellow the factory reset process is complete The device can now be restarted by disconnecting the supply voltage Factory reset all configuration parameters will be set to default values ...

Page 148: ...ove close to each base station and check that the handset locks to it the service display should display the correct number After having checked that all base stations are operational proceed with the coverage area test 9 1 2 Coverage Area Test The purpose of this test is to verify that there is satisfactory field strength to enable good speech quality everywhere within the covered area rooms lift...

Page 149: ...1 1 Put all handset together in order of extension number on a table 2 Go off hook with each handset and check that the dial tone is heard 3 Call with a handset handset A all other handsets sequentially and check that the handset with the corresponding number on its display rings when called 4 Call handset A and check if it rings ...

Page 150: ...1 prot path firmwarefilename go 4 If there is more than one IPBS IPBL in TFTP mode select the unit to update and press enter 10 2 Fault Code Descriptions This section lists the possible fault codes their description and severity level Explanation of the table columns C M and I C Critical IP DECT Critical Unite M Major IP DECT Error Unite I Indeterminate IP DECT Warning Unite Description Code Devic...

Page 151: ...edia 0x00080001 IPBS IPBL X Coder missing in URL WebMedia 0x00080002 IPBS IPBL X Unexpected restart watchdog reset power on Cmd 0x000b0001 IPBS IPBL X Unexpected message TLS 0x000c010a IPBS IPBL X Unexpected message TLS 0x000c020a IPBS IPBL X Bad MAC TLS 0x000c0114 IPBS IPBL X Bad MAC TLS 0x000c0214 IPBS IPBL X Decryption failed TLS 0x000c0115 IPBS IPBL X Decryption failed TLS 0x000c0215 IPBS IPBL...

Page 152: ...c0150 IPBS IPBL X Internal error TLS 0x000c0250 IPBS IPBL X User cancelled TLS 0x000c015a IPBS IPBL X User cancelled TLS 0x000c025a IPBS IPBL X No renegotiation TLS 0x000c0164 IPBS IPBL X No renegotiation TLS 0x000c0264 IPBS IPBL X Service not found Kerb client 0x000c0403 IPBS IPBL X Kerberos server unreachable Kerb client 0x000c0406 IPBS IPBL X Kerberos cross realm failure Kerb client 0x000c0407 ...

Page 153: ... X ARP poisoning detected ipproc 0x00110041 IPBS IPBL X Out of TCP NAT ports ipproc 0x00110046 IPBS IPBL X Out of TCP ports ipproc 0x00110047 IPBS IPBL X TCP bind error ipproc 0x00110049 IPBS IPBL X Out of UDP RTP ports ipproc 0x00110050 IPBS IPBL X Out of UDP ports ipproc 0x00110051 IPBS IPBL X UDP bind error ipproc 0x00110053 IPBS IPBL X No route to destination ipproc 0x0011005a IPBS IPBL X No r...

Page 154: ...heet IP DECT Base Station TD 92370GB Data Sheet IP DECT Base Station IPBS2 TD 92836EN Data Sheet IP DECT Gateway TD 92430GB Configuration Manual FXO in Ascom IP DECT System TD 92529GB Configuration Notes for Cisco Call Manager in Ascom IP DECT System TD 92424GB Configuration Notes for Aastra MX ONE in Ascom IP DECT System TD 92637GB Configuration Notes for Ascom VoIP Gateway in Ascom IP DECT Syste...

Page 155: ...on on page 100 Updated 8 10 1 Radios on page 107 New 8 10 6 Sync Lost Counter in IPBS on page 110 New 8 11 DECT Sync on page 111 Updated 8 15 Software Upgrade on page 127 Ver D 3 September 2010 New 7 13 3 Easy Registration on page 58 Updated 8 1 3 Centralized Management of Administrator Auditor Accounts Using Kerberos on page 61 Updated 8 5 2 Set Subscription Method on page 89 New 8 7 1 Configure ...

Page 156: ...ge number of HTTP sessions simultaneously since potentially all devices may attempt a configuration update at the same time For example Microsoft s Personal Web Server is not adequate since it only support 10 simultaneous sessions Following URLs are supported HTTP HTTPS and TFTP A 1 2 Installation To be able to upload save device configuration information on the web server it must allow HTTP PUT r...

Page 157: ...e maintenance command file is retrieved the commands found in the file are executed in sequence Theoretically all commands which can be typed in to a telnet session to the device or which appear in a config file can be used in the maintenance file However in most cases you will use config change commands and commands to the UP0 UP1 modules The command file is executed every time it is retrieved de...

Page 158: ...n quickly A 1 5 Setting the UP0 Parameters To perform a firmware update use the following command mod cmd UP0 prot url final command build serial The command above downloads the new firmware from url and flash it to the device then final command is executed The IPBSs maintain an internal variable UPDATE PROT which is initially or when the device is reset to factory settings empty The prot command ...

Page 159: ...uence Replacement Example d Current date and time 20040319 162544 m Device mac address 00 90 33 03 0d f0 h Device hardware ID ipbs 03 0d f0 b Rolling backup index loops over 0 n 1 for each backup 5 A 1 6 Setting the RFP_UPDATE0 Parameter To perform a RFP firmware update use the following commands mod cmd RFP_UPDATE0 firmware http 192 168 0 10 Worf4_GAP_R4H s2 The command above specifies the url to...

Page 160: ...for the IPBS1 IPBS2 and IPBL mod cmd UP0 prot http 172 20 8 128 ascom firmware ireset 5 0 0 mod cmd UP0 boot http 172 20 8 128 ascom boot ireset 5 0 0 A 1 7 Configuration File Backup To make a backup of the configuration file use the following command mod cmd UP0 scfg url final command save serial force hours The scfg command uploads the current configuration file to the specified url Example mod ...

Page 161: ...meters B 1 KRCNB 201 DCT1800 Figure 3 Cable length metres 0 4 mm wire size 0 5 mm wire size 0 6 mm wire size Without EPP With EPP Without EPP With EPP Without EPP With EPP 0 7 5 7 5 7 5 7 5 7 5 7 5 100 7 9 7 8 7 8 7 7 7 7 7 6 200 8 3 8 0 8 0 7 8 7 8 7 7 300 8 9 8 3 8 3 8 0 8 0 7 8 400 9 8 8 7 8 7 8 2 8 2 7 9 500 11 3 9 2 9 2 8 5 8 4 8 0 600 9 8 9 8 8 7 8 6 8 2 700 10 7 10 7 9 0 8 8 8 3 800 12 3 12...

Page 162: ...EPP 0 5 0 5 0 5 0 5 0 5 0 5 0 100 5 2 5 1 5 1 5 1 5 1 5 1 200 5 3 5 2 5 2 5 1 5 1 5 1 300 5 6 5 3 5 3 5 2 5 2 5 1 400 5 8 5 5 5 5 5 3 5 3 5 2 500 6 1 5 6 5 6 5 4 5 4 5 2 600 6 5 5 8 5 8 5 5 5 4 5 3 700 7 1 6 0 6 0 5 6 5 5 5 3 800 8 1 6 2 6 2 5 7 5 6 5 4 900 6 5 6 5 5 8 5 7 5 4 1000 6 9 6 9 5 9 5 8 5 5 1100 7 3 7 3 6 1 5 9 5 6 1200 8 1 8 1 6 2 6 1 5 6 1300 6 4 6 2 5 7 1400 6 6 6 4 5 8 1500 6 9 6 6 ...

Page 163: ...ption R Put the ongoing call on hold and get a new line Dial the number to the second call R0 Send busy signal to the incoming call R1 Terminate the ongoing call and switch to call on hold incomming call R2 Switch between ongoing call and call on hold incomming call R3 This function normally used for three party conference is not supported in the IP DECT System R4 Transfer call on hold to ongoing ...

Page 164: ...rd General Admin LDAP replication must not be activated D 2 Database Maintenance Procedure 1 Make sure the handsets that correspond to the moved user data have no contact with the system Turn off the handsets or switch off the Radio s in the area where the handsets are located Handsets should show No system Handsets may be desubscribed if they have connection to the system during database maintena...

Page 165: ...x user admin no pbx gw name DECT_CEg ipei 002020173479 subs 90bd79116daec066105610822cabc1e7 usn 15 mod cmd FLASHDIR0 add view 101 cn PBX0 mod cmd FLASHDIR0 add item 101 cn 1950 guid bin 80319FC0E909D311905C00013E00EFC8 dn 1950 h323 1950 e164 1950 pbx user admin no pbx gw name DECT_CEg ipei 002020173394 subs 977e9bfc568c8223197e4195bec9ec28 usn 14 mod cmd FLASHDIR0 add view 101 cn PBX0 mod cmd FLA...

Page 166: ...P DECT system is connected to a fixed IP PBX Note For redundancy an alternative gatekeeper proxy should always be used Figure 1 Load balancing using fixed connection towards IP PBXs 1 Select DECT Master 2 In the drop down list select SIP protocol 3 Enter the IP address or host name and optionally port of proxy e g proxy1 ascom rd com 5060 to the SIP proxy registrar in the Proxy text field 4 To get...

Page 167: ...ist of SRV Service records one for each IP PBX Each SRV record contains a priority and a weight value Lower priority value means more preferred When there are two or more records with the same priority then the weight value determines which IP PBX the user should be dynamically connected to A DNS server assign each user a primary and a secondary proxy address using DNS SRV service mechanism E 2 2 ...

Page 168: ... the domain name for which this record is valid TTL standard DNS time to live field Class standard DNS class field this is always IN Priority the priority of the target host lower value means more preferred Weight A relative weight for records with the same priority Port the TCP or UDP port on which the service is to be found Target the hostname of the machine providing the service _Service _Proto...

Page 169: ...s with priority 10 are primary servers and the last two records with priority 20 are secondary servers For each client a primary server is selected at random with the help of the weight values 60 20 and 20 This will distribute all clients on the primary servers according to the weight values If a client s primary server goes down the client will use the secondary server instead i e backupbox1 asco...

Page 170: ...er Settings The example below shows the settings in Microsoft Windows Server where the DNS server is installed 1 From a Microsoft Windows Server with the DNS server installed open the DNS management tool 2 Right click the domain or subdomain you are assigning this service to and select Other New Records Figure 4 Select Other New Records 3 Scroll down to Service Location SRV in the list ...

Page 171: ...riority and weight For information on how to set priority and weight see E 2 3 About SRV Records on page 160 Enter 5060 as the port number Enter the host name of your SIP server IP PBX Note The host name must be a fully qualified domain name FQDN Click OK Figure 5 New resource record settings 5 You can view your new SRV record by clicking on the _udp item under your domain 6 Right click the domain...

Page 172: ... 5 0 x 164 7 In the New Host window see Figure 6 do as follows Enter in the Name field the host name of your SIP server IP PBX Verify that the fully qualified domain name FQDN is the correct one Enter the IP address of your SIP server Click Add Host Figure 6 New host settings 8 Repeat step 1 to 7 for all exisiting IP PBXs ...

Page 173: ...o valid time server and active time can be retrieved Correct time is very important in Kerberos for joining of realm and for login purpose Command line 3 vars create CMD0 KCMD p The format of this line is very important It is very important to only modify the data surrounded with double quote This script describes the mandatory data the other data is set to default values All parameters set by the...

Page 174: ...their certificates signed by public or private CAs Self signed certificates provide encryption but do in most cases not provide authentication For more information see Self signed Certificates on page 76 Certificates signed by a Certificate Authority CA Two options are possible A Certificates signed by the customer s own CA Customers possessing the knowledge and infrastructure to house their own C...

Page 175: ...ll appear when using secure web access https to access the GUI Figure 7 Security warning window 2 In the security warning window click on the text link Continue to this website not recommended The login window for the device will appear 3 Click on the Certificate Error notification in the Security Status bar next to the Internet Explorer Address bar see Figure 8 The Security Report window will ...

Page 176: ... Installation and Operation Manual IP DECT Base Station IP DECT Gateway software version 5 0 x 168 appear see Figure 9 Figure 8 Sceen shot of the login window with the Security Status bar highlighted Figure 9 The Security Report window ...

Page 177: ...k View certificates The Certificate window will appear Figure 10 The Certificate window 5 In the Certificate window click on the button Install Certificate The Certificate Import wizard is started 6 Click on Next 7 Make sure that option Automatically slelct the certificate store based on the type of certificate is selected see Figure 11 Click on Next Figure 11 The Certificate Import wizard ...

Page 178: ...stallation and Operation Manual IP DECT Base Station IP DECT Gateway software version 5 0 x 170 8 Click on Finish to complete the Certificate Import wizard The Security Warning window will appear 9 Click on Yes to install the certificate ...

Reviews: