Page 300
Manual
ResistTel IP2 / IP152
ExResistTel IP2 / IP154
•
Protocol
•
To (Application)
•
Uptime
•
Idle
•
Requests
4.9.1.2
Submenu Client
Some files that the device must access via HTTP (update commands (Refer to
chapter 4.9.3 beginning on page 304), MoH, announcements, voicemail, etc.) may
be located in a password-protected area. A list of URLs with the respective user
names and passwords can be configured. The URLs in the list usually specify only the
path to a file (or a part of it). The longest match of the list defines the user name
and the password used for authentication required when establishing a connection.
Note
As soon as a line is completed, the entry fields for the next parameter appear.
Entry fields in a line:
•
URL
•
User
•
Password
Proxy Servers:
Host
Port
HTTP Proxy
Proxy server used for
HTTP requests
Port for the HTTP Proxy
Server
Summary of Contents for ExResistTel IP2/IP154
Page 43: ...Manual ResistTel IP2 IP152 Page 43 ExResistTel IP2 IP154 Figure 9 Set View ...
Page 386: ...Page 386 Manual ResistTel IP2 IP152 ExResistTel IP2 IP154 ...
Page 387: ...Manual ResistTel IP2 IP152 Page 387 ExResistTel IP2 IP154 ...
Page 390: ...Page 390 Manual ResistTel IP2 IP152 ExResistTel IP2 IP154 ...