background image

Field

Description

(!D-

(

Password

You may need a password to obtain certificates for your keys.

Enter the password here.

2.8.2 CRLs

In the System Management->Certificates->CRLs menu, a list of all CRLs (Certification
Revocation List) is displayed.

If a key is no longer to be used, e.g. because it has fallen into the wrong hands or has
been lost, the corresponding certificate is declared invalid. The certification authority re-
vokes the certificate and publishes it on a certificate blacklist, so-called CRL. Certificate
users should always check against these lists to ensure that the certificate used is cur-
rently valid. This check can be automated via a browser.

The Simple Certificate Enrollment Protocol (SCEP) supports the issue and revocation of
certificates in networks.

2.8.2.1 Import

Choose the Import button to import CRLs.

The System Management->Certificates->CRLs->Import menu consists of the following
fields:

Fields in the CRL Import menu

Field

Description

External Filename

Enter the file path and name of the CRL to be imported, or use
Browse... to select it from the file browser.

Local Certificate De-
scription

Enter a unique description for the CRL.

File Encoding

Select the type of encoding, so that your device can decode
the CRL.

Possible values:

(default value): Activates automatic code recognition. If

Gigaset Communications GmbH

2 System Management

hybird 120 Gigaset Edition

49

Summary of Contents for Pro series Hybird 120

Page 1: ...Manual hybird 120 Gigaset Edition Copyright Version 1 0 2013 Gigaset Communications GmbH Gigaset Communications GmbH Manual hybird 120 Gigaset Edition 1 ...

Page 2: ...set GmbH is not liable for any direct indirect col lateral consequential or any other damage connected to the delivery supply or use of this manual Copyright Gigaset GmbH All rights to the data included in particular the right to copy and propagate are resevered by Gigaset GmbH Manual Gigaset Communications GmbH 2 hybird 120 Gigaset Edition ...

Page 3: ...3 1 Alternative Access Codes 20 2 4 Interface Mode Bridge Groups 21 2 4 1 Interfaces 23 2 5 Administrative Access 24 2 5 1 Access 24 2 5 2 SSH 25 2 5 3 SNMP 28 2 6 Remote Authentication 29 2 6 1 RADIUS 29 2 6 2 TACACS 34 2 6 3 Options 37 2 7 Configuration Access 37 2 7 1 Access Profiles 38 2 7 2 Users 40 2 8 Certificates 41 2 8 1 Certificate List 42 Gigaset Communications GmbH Table of Contents hy...

Page 4: ...XO 57 3 3 2 Analogue Internal FXS 59 Chapter 4 VoIP 61 4 1 Settings 61 4 1 1 SIP Provider 61 4 1 2 Locations 69 4 1 3 Codec Profiles 71 4 1 4 Options 74 Chapter 5 Numbering 76 5 1 Trunk Settings 76 5 1 1 Trunks 76 5 1 2 Trunk Numbers 78 5 1 3 Trunk Groups 81 5 1 4 X 31 82 5 2 User Settings 83 5 2 1 Users 83 5 2 2 Class of Services 90 5 2 3 Parallel Ringing 104 Table of Contents Gigaset Communicati...

Page 5: ...123 6 2 1 VoIP 123 6 2 2 ISDN 126 6 2 3 analog 127 6 2 4 CAPI 130 6 3 Overview 131 6 3 1 Overview 131 Chapter 7 Call Routing 132 7 1 Outgoing Services 132 7 1 1 Direct Call 132 7 1 2 Call Forwarding 133 7 1 3 Dial Control 135 7 1 4 Priority Numbers 136 7 2 Automatic Route Selection 137 7 2 1 General 137 7 2 2 Interfaces Provider 138 7 2 3 Zones Routing 139 Gigaset Communications GmbH Table of Cont...

Page 6: ... Entries 153 8 4 2 Import Export 154 8 4 3 General 156 8 5 Call Data Records 156 8 5 1 Outgoing 156 8 5 2 Incoming 157 8 5 3 General 158 8 6 Mini Call Center 159 8 6 1 Status 160 8 6 2 Lines 160 8 6 3 Agents 163 8 6 4 General 164 8 7 Doorcom Units 164 8 7 1 Doorcom Units 165 8 7 2 Doorcom Signalling 166 8 8 Alarm Calls 169 8 8 1 Alarm Calls 169 8 9 Voice Mail System 172 Table of Contents Gigaset C...

Page 7: ...4 Route Configuration 186 10 1 2 IPv4 Routing Table 191 10 1 3 Options 192 10 2 NAT 193 10 2 1 NAT Interfaces 193 10 2 2 NAT Configuration 194 10 3 QoS 200 10 3 1 QoS Filter 200 10 3 2 QoS Classification 203 10 3 3 QoS Interfaces Policies 206 10 4 Access Rules 213 10 4 1 Access Filter 214 10 4 2 Rule Chains 217 10 4 3 Interface Assignment 219 10 5 Drop In 220 10 5 1 Drop In Groups 220 Gigaset Comm...

Page 8: ... 12 1 2 PPTP 237 12 1 3 ISDN 241 12 1 4 IP Pools 248 12 2 Real Time Jitter Control 249 12 2 1 Controlled Interfaces 249 Chapter 13 VPN 251 13 1 IPSec 251 13 1 1 IPSec Peers 252 13 1 2 Phase 1 Profiles 266 13 1 3 Phase 2 Profiles 273 13 1 4 XAUTH Profiles 277 13 1 5 IP Pools 278 13 1 6 Options 279 13 2 L2TP 282 13 2 1 Tunnel Profiles 283 Table of Contents Gigaset Communications GmbH vi hybird 120 G...

Page 9: ...oS 306 14 1 3 Options 307 14 2 Interfaces 309 14 2 1 Groups 309 14 3 Addresses 309 14 3 1 Address List 309 14 3 2 Groups 310 14 4 Services 311 14 4 1 Service List 311 14 4 2 Groups 313 Chapter 15 Local Services 314 15 1 DNS 314 15 1 1 Global Settings 316 15 1 2 DNS Servers 318 15 1 3 Static Hosts 319 15 1 4 Domain Forwarding 320 15 1 5 Cache 322 Gigaset Communications GmbH Table of Contents hybird...

Page 10: ... 15 5 CAPI Server 333 15 5 1 User 333 15 5 2 Options 334 15 6 Scheduling 335 15 6 1 Trigger 335 15 6 2 Actions 340 15 6 3 Options 350 15 7 Surveillance 350 15 7 1 Hosts 351 15 7 2 Interfaces 353 15 7 3 Ping Generator 354 15 8 UPnP 355 15 8 1 Interfaces 355 15 8 2 General 356 15 9 HotSpot Gateway 357 15 9 1 HotSpot Gateway 358 15 9 2 Options 362 15 10 Wake On LAN 362 15 10 1 Wake On LAN Filter 362 ...

Page 11: ... Phones 375 16 3 2 Firmware Files 376 16 3 3 Settings 377 16 4 Reboot 378 16 4 1 System Reboot 378 Chapter 17 External Reporting 379 17 1 Syslog 379 17 1 1 Syslog Servers 379 17 2 IP Accounting 381 17 2 1 Interfaces 381 17 2 2 Options 382 17 3 Alert Service 383 17 3 1 Alert Recipient 383 17 3 2 Alert Settings 384 17 4 SNMP 386 17 4 1 SNMP Trap Options 386 17 4 2 SNMP Trap Hosts 387 Gigaset Communi...

Page 12: ... 390 18 2 1 System Messages 390 18 3 IPSec 390 18 3 1 IPSec Tunnels 391 18 3 2 IPSec Statistics 392 18 4 Interfaces 393 18 4 1 Statistics 393 18 5 HotSpot Gateway 395 18 5 1 HotSpot Gateway 395 18 6 QoS 395 18 6 1 QoS 395 Index 397 Table of Contents Gigaset Communications GmbH x hybird 120 Gigaset Edition ...

Page 13: ...e following basic configuration tasks First steps Internet Access VPN PBX Choose the corresponding task from the navigation bar and follow the instructions and ex planations on the separate pages of the Assistant Gigaset Communications GmbH 1 Assistants hybird 120 Gigaset Edition 1 ...

Page 14: ...f any You can customise the update interval of the status page by entering the desired period in seconds as Automatic Refresh Interval and clicking on the Apply button Caution Under Automatic Refresh Interval do not enter a value of less than seconds otherwise the refresh interval of the screen will be too short to make further changes The menu System Management Status consists of the following fi...

Page 15: ... and the size of the memory in GBytes or MBytes Active Sessions SIF RTP etc Displays the total of all SIF TDRC and IP load balancing ses sions Active IPSec Tunnels Displays the number of currently active IPSec tunnels in rela tion to the number of configured IPSec tunnels Fields in the Modules menu Feld Wert DSP Module Shows the type of plugged DSP module if any An acquired fax licence if any can ...

Page 16: ... the Global Settings menu 2 2 1 System The System Management Global Settings System menu is used for entering your system s basic data The System Management Global Settings System menu consists of the following fields Fields in the menu Basic Settings Field Value System Name Enter the system name of your device This is also used as the PPP host name A character string of up to 255 characters is po...

Page 17: ... recorded at syslog level Possible values Only messages with emergency priority are re corded Messages with emergency and alert priority are re corded Messages with emergency alert and critical pri ority are recorded Messages with emergency alert critical and error priority are recorded Messages with emergency alert critical error and warning priority are recorded Messages with emergency alert cri...

Page 18: ...he call is to be transferred to an internal exten sion Possible values the default value Caller hears the ringing tone while being transferred The caller hears the sys tem s on hold music while being transferred Transfer to busy ex tension Set whether a caller may be transferred to a busy subscriber The function is activated with The function is disabled by default Rerouting to Number Set the dest...

Page 19: ...he respective country variants the system can be adjusted to the particular features of the network in the required country As the system requirements vary from country to country the functionality of certain fea tures needs to be customised The basic settings for different country variants are stored in the system Fields in the menu Country Settings Field Value Country Profile Select the country ...

Page 20: ...09999 and the system then automatically dials 495151 909999 If you fail to enter the country code you may misdial as the system will then dial 5151 909999 Without the entry Generate international phone number and International Prefix Country Code the full number plus the country code always has to be dialled in the case of SIP providers Note Not every SIP provider supports this setting National Pr...

Page 21: ... EURO ISDN default value Both protocols are recognised Fields in the menu Day Mode Field Value Global Rerouting Select the call variant in day modus that shall apply to the over all system if no specific redirect has been set up The default value is Night operation You can switch the system to night operation and thus enable particular call variants for the team signalling the door intercom signal...

Page 22: ...and the same PINs As long as the passwords or PINs remain un changed they are not protected against unauthorised use When you log onto your device for the first time you are prompted to change the password You need to change the system administrator pass word in order to be able to configure your device Make sure you change all passwords and PIN s to prevent unauthorised ac cess to the device The ...

Page 23: ...In the basic setting the PIN1 is set to The following performance features are protected using PIN2 Remote access for Follow me room monitoring Fields in the Configuration via Phone 4 Digit Numeric PIN menu Field Value PIN1 Enter PIN1 With the 4 digit PIN1 PIN number you protect your system settings through configuration via telephone Fields in the Remote Access to Phone 6 Digit Numeric PIN menu F...

Page 24: ...ited in plain text One exception is IPSec keys They can only be entered in plain text After pressing OK or calling the menu again they are dis played as asterisks 2 2 3 Date and Time You need the system time for tasks such as correct time stamps for system messages or accounting You have the following options for determining the system time local time ISDN Manual The system time can be updated via...

Page 25: ...rent time you should configure one or more time serv ers Note If a method for automatically deriving the time is defined on the device the values obtained in this way automatically have higher priority A manually entered system time is therefore overwritten The menu System Management Global Settings Date and Time consists of the fol lowing fields Fields in the Basic Settings menu Field Description...

Page 26: ...ined by means of a time server The function is activated with The function is enabled by default First Timeserver Enter the primary time server by using either a domain name or an IP address In addition select the protocol for the time server request Possible values 3 6 default value This server uses the simple network time protocol via UDP port 123 3 4 A 6 This server uses the Time service with U...

Page 27: ... server by using either a domain name or an IP address In addition select the protocol for the time server request Possible values 3 6 default value This server uses the simple network time protocol via UDP port 123 3 4 A 6 This server uses the Time service with UDP port 37 3 4 A 6 This server uses the Time service with TCP port 37 This time server is not currently used for the time re quest Time ...

Page 28: ...e Server Select whether the internal timeserver is to be used The function is activated by selecting Time requests from a client will be answered with the current system time This is given as GMT without offset The function is enabled by default Clients time requests are answered in the LAN 2 2 4 Timer In the Timer menu you can configure the times at which particular system features are to be swit...

Page 29: ...ls the configured direct call number If you do not dial within the specified period from picking up the receiver automatic dialling is initiated Possible values are to C The default value is External Door Connec tions If an external telephone requests a door intercom call here you can set the time after which this call is forcefully terminated Possible values D E default value C Fields in the Adva...

Page 30: ...ime entered here the switchboard is called again Possible values are to D The default value is C System Parked En quiry Enter the time after which an open hold for enquiry is termin ated and the subscriber called back or given a call waiting You are making a call and want to transfer it to a colleague Unfortunately you do not know where this colleague is Sys tem Parking Open Enquiry holds the call...

Page 31: ...he menu System Management Global Settings System Licences New consists of the following fields Fields in the Basic Settings menu Field Value Licence Serial Number Enter the licence serial number you received when you bought the licence Licence Key Enter the licence key you received by e mail 2 3 Access Codes In your day to day work you have employed codes to use particular features and you wish to...

Page 32: ...umber or the access number described in the user guide excluding dialling code The System Management Access Codes Alternative Access Codes menu consists of the following fields Fields in the Basic Settings menu Field Description Line Access Digit Select the exchange code Possible values default value D F E B Pick up Group Enter the new code for performance feature Pick up group Pick up Extension E...

Page 33: ...of the OSI model data link layer are independent of higher level protocols and transmit data packets using MAC addresses Data transmission is transparent which means the information contained in the data packets is not interpreted With routing different networks are connected at layer 3 network layer of the OSI model and information is routed from one network to the other Conventions for port inte...

Page 34: ... on the first wireless module The name of the WDS link or bridge link is made up of the following parts a Abbreviation for interface type b Number of the wireless module on which the WDS link or bridge link is configured c Number of the WDS link or bridge link Example 8 first WDS link or bridge link on the first wireless module The name of the client link is made up of the following parts a Abbrev...

Page 35: ...the Interfaces menu Field Description Interface Description Displays the name of the interface Mode Bridge Group Select whether you want to run the interface in or whether you want to assign the interface to an existing etc or new bridge group 8 1 When selecting 8 1 a new bridge group is automatically created after you click the OK button Configuration Inter face Select the interface via which the...

Page 36: ... an Ethernet interface you can select the access parameters 33 6 63 6 3 6 and for the ISDN interfaces 3 G The menu Advanced Settings consists of the following fields Fields in the menu Advanced Settings Field Description Restore Default Set tings Only when you make changes to the administrative access configuration are relevant access rules set up and activated You can restore the default settings...

Page 37: ...ese in the Service Support section at www gigastepro com To be able to reach the shell of your device via an SSH client make sure the settings for the SSH Daemon and SSH client are the same Note If configuration of an SSH connection is not possible restart the device to initialise the SSH Daemon correctly The System Management Administrative Access SSH menu consists of the follow ing fields Fields...

Page 38: ...at are to be available for message au thentication of the SSH connection Possible options 3 1 D By default 3 and 1 D are enabled Fields in the menu Key Status Field Value RSA Key Status Shows the status of the RSA key If an RSA key has not been generated yet is displayed in red and a link is provided If you se lect the link the generation process is triggered and the view is updated The status is ...

Page 39: ...eneration of a key is not possible for example because there is not enough space in the FlashROM The menu Advanced Settings consists of the following fields Fields in the menu Advanced Settings Field Value Login Grace Time Enter the time in seconds that is available for establishing the connection If a client cannot be successfully authenticated during this time the connection is terminated The de...

Page 40: ...n be trans mitted as well as the communication process The data objects queried via SNMP are structured in tables and variables and defined in the MIB Management Information Base This contains all the configuration and status variables of the device SNMP can be used to perform the following network management tasks Surveillance of network components Remote controlling and configuration of network ...

Page 41: ...authentic ation and configuration information to be exchanged between your device and a RADIUS server The RADIUS server administrates a database with information about user authen tication and configuration and for statistical recording of connection data RADIUS can be used for Authentication Accounting Exchange of configuration data For an incoming connection your device sends a request with user...

Page 42: ... Client If the RADIUS server has authenticated the information con tained in the ACCESS_REQUEST it sends an AC CESS_ACCEPT to your device together with the parameters used for setting up the connection ACCESS_REJECT Server Client If the information contained in the ACCESS_REQUEST does not correspond to the information in the user database of the RADIUS server it sends an ACCESS_REJECT to reject th...

Page 43: ...work for PPP connections only The RADIUS serv er is used for recording statistical call data G The RADIUS server is used for controlling access to the SNMP shell of your device 63 The RADIUS server is used for sending configuration data for IPSec peers to your device H The RADIUS server is used for authenticating IPSec peers via XAuth Vendor Mode Only for Authentication Type In hotspot application...

Page 44: ...anced Settings Entry active Select whether the RADIUS server configured in this entry is to be used The function is activated by selecting The function is enabled by default Group Description Define a new RADIUS group description or assign the new RA DIUS entry to a predefined group The configured RADIUS servers for a group are queried according to Priority and the Policy Possible values 8 default...

Page 45: ...ponse in milliseconds After timeout the request is repeated according to Retries or the next configured RADIUS server is requested Possible values are whole numbers between and The default value is 1 second Alive Check Here you can activate a check of the accessibility of a RADIUS server in Status 8 An Alive Check is carried out regularly every 20 seconds by sending an ACCESS_REQUEST to the IP add...

Page 46: ...tivated by selecting The function is disabled by default If the function is active you can enter the following options 4 Enter the time period in seconds between update intervals The default entry here is i e an automatic reload is not car ried out 2 6 2 TACACS TACACS permits access control for your device network access servers NAS and oth er network components via one or more central servers Lik...

Page 47: ...f the TACACS server that is to be re quested for login authentication TACACS Secret Enter the password to be used to authenticate and if applic able encrypt data exchange between the TACACS server and the network access server your device The maximum length of the entry is 32 characters Priority Assign a priority to the current TACACS server The server with the lowest value is the one used first f...

Page 48: ...S pro tocol The value cannot be changed Timeout Enter time in seconds for which the NAS is to wait for a re sponse from TACACS If a response is not received during the wait time the next con figured TACACS server is queried only if Policy 4 and the status of the current server is set to 0 The possible values are to D the default value is C Block Time Enter the time in seconds for which the status ...

Page 49: ...f a listed re mote terminal or RADIUS user your device accepts the incoming call The menu System Management Remote Authentication Options consists of the fol lowing fields Fields in the Global RADIUS Options menu Field Description Authentication for PPP Dialin By default the following authentication sequence is used for in coming calls with RADIUS First CLID then PPP and then PPP with RADIUS Optio...

Page 50: ...oose the New button to create additional access profiles To create an access profile you can use all the entries in the navigation bar of the GUI plus Save configuration and Switch to SNMP Browser You can create a maximum of 29 access profiles The menu System Management Configuration Access Access Profiles New con sists of the following fields Fields in the menu Basic Settings Field Description De...

Page 51: ...th the permission for Switch to SNMP Browser you remove the configured GUI restric tions at the MIB level once more Enable or disable Switch to SNMP Browser The function is enabled with The function is disabled by default Fields in the menu Navigation Entrys Field Description Menus You see all the menus from the GUI s navigation bar Menus that contain at least one sub menu are flagged by and The i...

Page 52: ... list of all the users that have been configured You can delete existing entries with the icon You can click the button to display the details of the configured user You can see which fields and menus are assigned to the user The icon means that Read only is permitted If a row is flagged with the icon the informa tion is released for reading and writing The icon indicates blocked entries 2 7 2 1 E...

Page 53: ... option Read only is not available in the SNMP browser view If intersecting access profiles are assigned to a user read and write have a higher priority than Read only Buttons cannot be set to the setting Read only 2 8 Certificates An asymmetric cryptosystem is used to encrypt data to be transported in a network to generate or check digital signatures and the authenticate users A key pair consisti...

Page 54: ...riod usually one year i e they have a limited valid ity period Your device is designed to use certificates for VPN connections and for voice connections over Voice over IP 2 8 1 Certificate List A list of all existing certificates is displayed in the System Management Certificates Certificate List menu 2 8 1 1 Edit Click the icon to display the content of the selected object key certificate or req...

Page 55: ... one exists It is does not the same procedure is used as that described un der Only if a CRL Distribution Point is present Force certificate to be trusted Define that this certificate is to be accepted as the user certific ate without further checks during authentication The function is enabled with The function is disabled by default Caution It is extremely important for VPN security that the int...

Page 56: ...ficate Request button to request or import more certificates The menu System Management Certificates Certificate List Certificate Request consists of the following fields Fields in the Certificate Request menu Field Description Certificate Request Description Enter a unique description for the certificate Mode Select the way in which you want to request the certificate Possible settings default va...

Page 57: ...ication authority CA from which you wish to request your certificate e g 8 8 Your CA administrator can provide you with the necessary data If no CA certificates are available the device will first down load the CA certificate of the relevant CA It then continues with the enrolment process provided no more important parameters are missing In this case it returns to the Gener ate Certificate Request...

Page 58: ...ication authority here Fields in the Subject Name menu Field Description Custom Select whether you want to enter the name components of the subject name individually as specified by the CA or want to enter a special subject name If is selected a subject name can be given in Sum mary with attributes not offered in the list Example CN VPNServer DC mydomain DC com c DE If the field is not selected en...

Page 59: ...Province Only for Custom disabled Enter the state province according to CA Country Only for Custom disabled Enter the country according to CA The menu Advanced Settings consists of the following fields Fields in the Subject Alternative Names menu Field Description 1 2 3 For each entry define the type of name and enter additional subject names Possible values default value No additional name is ent...

Page 60: ... with The function is enabled by default 2 8 1 3 Import Choose the Import button to import certificates The menu System Management Certificates Certificate List Import consists of the following fields Fields in the Import menu Field Description External Filename Enter the file path and name of the certificate to be imported or use Browse to select it from the file browser Local Certificate De scri...

Page 61: ...sed is cur rently valid This check can be automated via a browser The Simple Certificate Enrollment Protocol SCEP supports the issue and revocation of certificates in networks 2 8 2 1 Import Choose the Import button to import CRLs The System Management Certificates CRLs Import menu consists of the following fields Fields in the CRL Import menu Field Description External Filename Enter the file pat...

Page 62: ... via a certificate server The certificate server also issues the private key and provides certificate revocation lists CRL that are accessed by the device via LDAP or HTTP in order to verify certificates 2 8 3 1 New Choose the New button to set up a certificate server The System Management Certificates Certificate Servers New menu consists of the following fields Fields in the Basic Parameters men...

Page 63: ... a serial connection via the Serial 1 interface ETH1 ETH4 The interfaces can be used separately They are logically separated from each other each separated port is assigned the desired logical Ethernet interface in the Ethernet In terface Selection field of the Port Configuration menu For each assigned Ethernet in terface another interface is displayed in the list in the LAN IP Configuration menu ...

Page 64: ...f the total bandwidth If you group together several switch ports into one interface the full bandwidth of max 1000 mbps full duplex is available for all the ports together The menu Physical Interfaces Ethernet Ports Port Configuration consists of the fol lowing fields Fields in the Switch Configuration menu Field Description Switch Port Shows the respective switch port The numbering corresponds to...

Page 65: ...responding interface Possible values default value No flow control is performed Flow will be controlled Flow will be controlled automatically 3 2 ISDN Ports The system s ISDN connections can be configured as either internal or external ISDN connections The external ISDN connections are used for connection to the network oper ator s ISDN network The internal ISDN connections are provided for connec...

Page 66: ... to point connections P P 3 2 1 1 Working with Choose the button to edit an entry The menu Physical Interfaces ISDN Ports ISDN External consists of the follow ing fields Fields in the Basic Settings menu Field Description Description Enter a user defined description of the ISDN interface The default value is 3 Name Shows the name of the ISDN interface Possible values 3A 4 wire S A Displays the por...

Page 67: ...g GSM gateway is connected to an external point to point ISDN access in the system the ex ternal device s signal can disturb the synchronisation in the ISDN signal Only if such a disturbance occurs should you switch off the layer 1 synchronisation The function is activated by selecting The function is enabled by default 3 2 2 ISDN Internal You configure your system s internal ISDN interfaces in th...

Page 68: ...ISDN S0 connection Default MSN Shows whether a standard MSN is assigned for an internal S0 bus You can use a standard MSN to access unconfigured S0 ter minals As a standard MSN you can dial the internal numbers con figured in the Numbering User Settings Users menu and assigned to a terminal in the Terminals menu Status Displays the status of the interface 3 2 2 1 Edit Choose the button to edit an ...

Page 69: ... FXO menu consists of the following fields Values in the Analogue External FXO list Field Description Name Shows the name of the analogue interface Possible values 5H Name for the analogue connection Description Shows the user defined description of the analogue interface Dialling Method Displays the dialling method used Possible values 5 default value 6 6 Status Displays the status of the interfa...

Page 70: ...od should be used Possible values 5 default value 6 6 CLIP Select whether the CLIP feature is to be used i e whether the caller s number should be displayed to the person called Possible values default value The caller s number is not displayed to the person called 53 The data is sent as DTMF Receive charges Select whether your device is to receive charge information from the network For this purp...

Page 71: ... before it begins dialling You can switch on the Dial Tone Pause if the hybird 120 fails to recognise the external dial tone or if no dial tone is being sent You must decide the duration of the Dial Tone Pause Possible values are whole number values between second and seconds End of Selection Sig nal Enter the time that the system is to wait after dialling a num ber before it considers the telepho...

Page 72: ...connection Usage Shows the function of the analogue interface Possible values 1 5 4 A 8 6 The function of the analogue terminal is configured in the Ter minals Other phones analog menu Status Displays the status of the interface 3 Physical Interfaces Gigaset Communications GmbH 60 hybird 120 Gigaset Edition ...

Page 73: ...y connected telephones The num ber of connections depends on various parameters The availability of the system s free channels The available bandwidth of the DSL connection The configured available SIP providers The SIP out licenses that have been entered 4 1 1 SIP Provider You configure the SIP provider you want in the VoIP Settings SIP Provider menu You change the status of the SIP provider by p...

Page 74: ...meric sequence is possible Password At this point you can assign a password A 32 digit alpha numeric sequence is possible User Name Enter the user name you received from your VoIP provider A 64 digit alpha numeric sequence is possible Domain Enter a new domain name or a new IP address for the SIP proxy server If you do not make an entry the entry in the Registrar field is used Note Enter a name or...

Page 75: ... disabled by default Signal fixed out num ber Only for Outgoing Signalisation 5 Enter the number that is to be displayed to the person called with any outward connection Fields in the Registrar menu Field Description Registrar Enter the DNS name or IP address of the SIP server A 26 digit alpha numeric sequence is possible Registrar Port Enter the number of the port to be used for the connection to...

Page 76: ...E A 5 digit sequence is possible Fields in the Timer menu Field Description Registration Timer Enter the time in seconds within which the SIP client must re register to prevent the connection from disconnecting automat ically The default value is D The menu Advanced Settings consists of the following fields Fields in the Advanced Settings menu Field Description Proxy Enter the DNS name or IP addre...

Page 77: ...ment here Possible values default value An unlimited number of simultaneous calls is possible C Location Select the location of the SIP server Locations are defined in the VoIP Settings Locations menu Possible values G default value The server is not operated at any defined location G Codec Profiles Select the codec profile for this SIP server Codec profiles are defined in the VoIP Settings Codec ...

Page 78: ...f you have enabled this function and entered C for Austria underGlobal SettingsCountry Profile the 0043 before a number dialled with area code is generated automatically The function is activated by selecting The function is disabled by default Generate national sub scriber number If you have enabled this function and entered the National Prefix City Code e g for Abfaltersbach E D under Global Set...

Page 79: ...y field is added to the SIP header to transmit the sender ID there 6 The so called p asserted identity field is ad ded to the SIP header to transmit the sender ID there Substitution of Inter national Prefix with Select whether the prefix e g 00 should be replaced by for international numbers The function is activated by selecting The function is disabled by default PBX coupling Select whether anot...

Page 80: ...dress already known to the correspondent An example of this method is Microsoft Exchange SIP The function is enabled with The function is disabled by default If this function is not enabled an authentication is performed by default For this every SIP client user sends its current posi tion to a registrar server This information on the user and his current address is saved by the registrar on a ser...

Page 81: ...n menu Field Description Default Behavior Specify how the system is to proceed when registering VoIP subscribers for whom no location has been defined Possible values 6 4 8 0 default value The VoIP subscriber is only registered if located with in the private network 5 The VoIP subscriber is never registered The VoIP subscriber is al ways registered 4 1 2 1 Edit or New Choose the icon to edit exist...

Page 82: ...er IP Ad dress DNS Name Also enter the required Netmask Interfaces Only for Type Indicate the interfaces to which the devices of a SIP location are connected Click Add to select a new interface Under Interface select the interface you want Upstream Bandwidth Limitation Determine whether the upstream bandwidth is to be restricted The bandwidth is reduced with The function is disabled by default Max...

Page 83: ...s indicated in decimal format 3 6 Differentiated Services Code Point according to RFC 3260 is used to signal the priority of IP packets indicated in hexadecimal format 3 The TOS value is specified in binary format e g 00111111 3 The TOS value is specified in decim al format e g 63 3 The TOS value is specified in hexadecimal format e g 3F 4 1 3 Codec Profiles In the VoIP Settings Codec Profiles you...

Page 84: ... are sorted by required band width If possible the codec with the lowest bandwidth re quirement is used 8 The codecs are sorted by required band width If possible the codec with the highest bandwidth re quirement is used G 711 uLaw Only for Codec Proposal Sequence not ISDN codec with US characteristic G 711 uLaw passes audio signals in the range of 300 3500 Hz and samples them at the rate of 8 000...

Page 85: ...16 kbit s bit rate the mean opinion score MOS is 3 7 G 726 24 kbit s Only for Codec Proposal Sequence not G 726 24 kbit s passes audio signals in the range of 200 3400 Hz and samples them at the rate of 8 000 samples per second At 24 kbit s bit rate the mean opinion score MOS is 3 8 G 726 32 kbit s Only for Codec Proposal Sequence not G 726 32 kbit s passes audio signals in the range of 200 3400 H...

Page 86: ...s The VoIP Settings Options menu consists of the following fields Fields in the Basic Settings menu Field Description RTP Port Enter the port via which the RTP data is to be transported The default value is Client Registration Timer Here enter a default value for the time in seconds within which the SIP clients must re register to prevent the connection from disconnecting automatically The default...

Page 87: ...to RFC 3260 is used to signal the priority of IP packets indicated in decimal format 3 6 Differentiated Services Code Point according to RFC 3260 is used to signal the priority of IP packets indicated in hexadecimal format 3 The TOS value is specified in binary format e g 00111111 3 The TOS value is specified in decim al format e g 63 3 The TOS value is specified in hexadecimal format e g 3F Gigas...

Page 88: ...these settings it will not be used in the subsequent configuration It merely serves as description for the con nection 5 1 1 Trunks You configure your system s external connections in the Numbering Trunk Settings Trunks menu 5 1 1 1 Edit or New Choose the icon to edit existing entries Select the New button to create new connec tions The Numbering Trunk Settings Trunks New menu consists of the foll...

Page 89: ...ields in the Outgoing Signalisation Settings menu Field Description Outgoing Signalisation Select the signal you want for outgoing calls Possible values 3 default value G 6 3 4 G 6 3 5 Global CLIP no Screening Number Only for Outgoing Signalisation G 6 3 Here you can enter a number to be displayed with the called party for all outbound external calls This number is not checked Signal remote caller...

Page 90: ...xtension number Call Hold inside the PBX system Select whether a telephone call is to be put on hold in the sys tem without losing the connection The function is activated by selecting The function is disabled by default 5 1 2 Trunk Numbers In the menu Numbering Trunk Settings Trunk Numbers you assign the external numbers and the name indicated in a system telephone display to the external connec ...

Page 91: ...der C is normally signalled at the internal sub scriber with call number However if you enter extension number in this list you can define that calls under C are signalled at the internal subscriber by call num ber C External subscriber numbers at point to multipoint connection For a point to multipoint connection you can request up to 10 numbers MSN multiple subscriber number per ISDN connection ...

Page 92: ...ub scriber numbers Direct dial at the point to point connection al ways proceeds to the subscriber whose number was dialled along as extension E g the internal subscriber has the num ber D If this subscriber is called from outside on C DF D the call is signalled at his telephone However if with direct dial D a subscriber with the number EEE is to be called enter EEE as the exception number In Inco...

Page 93: ...r the bundle cleared for the subscriber is used in connection setup 5 1 3 1 Edit or New Choose the icon to edit existing entries Select the New button to create a new bundle The Numbering Trunk Settings Trunk Group New menu consists of the following fields Fields in the Basic Settings menu Field Description Description Enter a description for the entry Sequence of Trunk Lines in Group Select the d...

Page 94: ... terminals occurs via these TEI s Note You can only use this performance feature if performance feature X 31 has been requested from the network operator and you operate a correspond ing terminal on this connection For information on operation please see the user s guide for your terminals 5 1 4 1 Edit or New Choose the icon to edit existing entries Select the New button to set up new X 31 ap plic...

Page 95: ... terminal in menu Terminals In this way its possible to create settings for several terminals via an author isation class e g a user setting a user setting 1 and a user set ting 0 Now all that s left to do is assign the corresponding terminals to one of these Class of Service 5 2 1 Users In the Numbering User Settings Users you configure the users of your system their class and assign them interna...

Page 96: ...e book Access from system phone option Home Number Enter a number under which the user can be reached privately Also select whether this number is to be shown in the system telephone display so that it can be dialled on the system tele phone from the system phone book Access from system phone option E mail Address Enter the e mail address for the user Fields in the Class of Service menu Field Desc...

Page 97: ...ings Class of Services Only se lection occurs in this setting Possible values 3 default value 8 No class of service Fields in the Further Options menu Field Description Busy on busy Select whether the performance feature Busy on Busy shall be enabled for this user If a subscriber for whom multiple telephone numbers have been configured makes a call you can decide whether addi tional calls for this...

Page 98: ...uld light up The functions are activated by default Add new Internal Numbers with Add 5 2 1 3 Outgoing Signalisation In the Numbering User Settings Users Outgoing Signalisation menu select the outgoing numbers for the user For an outgoing call if the remote subscriber should not see the number assigned to your own connection one of the existing numbers can be selected here for display If no num be...

Page 99: ...nfigured you can specify the procedure for outgoing calls When an external line is engaged the order of the entries determines the sequence in which the other lines assigned will be used to dial The configured Outgoing Signalisation can be hidden for each outgoing line to do so put a tick under Hide Number in the relevant row If you wish to move an entry in the list displayed select the icon in th...

Page 100: ...ys the internal numbers configured for the user Displayed Description Displays for each internal number the description configured for the system telephone display Rerouting Application Select from the dropdown list the desired redirect application that you wish to assign to the internal number You may choose from the redirect applications that you ve configured in the Applications Rerouting Rerou...

Page 101: ... password can remain free if IP telephones log in but need not authenticate themselves PIN for Phone Access Here you can change the PIN for the user s personal answer ing machine voicemail box The default value is Fields in the User HTML Configuration menu Field Description Personal Access Select whether this user shall receive access authorisation to a personalised user interface user access wher...

Page 102: ...call options for Call Through shall be used 5 2 2 Class of Services In the Numbering User Settings Class of Services CoS the functions and perform ance features for the user settings are defined These authorisation classes can then be assigned to individual users user groups in the user settings Choose the icon to edit existing entries Choose the New button to create additional authorisation class...

Page 103: ...ephones cannot make any national or inter national calls For this dial permission 10 exception numbers allowing national or international dialling can be configured An exception number can consist of complete call numbers or sections thereof e g the first numerals G The telephones can make local calls National and international calls are not possible The telephones do not have authorisation for in...

Page 104: ...ore selective bundle assignment then initiate external dialling with the code for bundle assignment The function is activated by selecting The function is disabled by default Then select the bundles for which manual bundle assignment is to be allowed You can configure bundles in the Numbering Trunk Settings Trunk Groups menu Number display If you call a subscriber your number is displayed to him T...

Page 105: ...all Routing Outgo ing Services Dial Control menu shall be allowed or denied also for this authorisation class The function is activated by selecting The function is disabled by default Automatic Route Se lection ARS Select whether the routing rules entered in the Call Routing Automatic Route Selection menu shall also be ap plied to this authorisation class The function is activated by selecting Th...

Page 106: ...gue s tele phone or transfer your colleague s call to your phone Assignment is done by the option Pick up Group in the menu Features the group is then assigned to a user If the values are identical a call pickup is possible Call pickup is not possible for open inquiry System telephones can pick up calls via programmed function keys You can set up line keys connection keys and team keys on system t...

Page 107: ...ection Call waiting automatically ends after 30 seconds and the caller hears a busy signal Analogue terminals The call waiting option can be individually configured for every subscriber Allowing call waiting or not can be set via configuration or via a code number in operations Analogue terminals get the system call waiting tone The number of the call waiting party can be shown in the analogue tel...

Page 108: ...conference calls for do not disturb analogue terminals for announcements for room monitoring for terminals for which the Data Protection performance feature is set up e g fax modem in analogue subscriber s dialling status the receiver has been picked up but there is no connection yet for current call waiting protection for dialling a team number Then there is no call waiting for analogue team subs...

Page 109: ...The function is activated by selecting The function is disabled by default Call Through Select whether Call Through shall be allowed for this authorisa tion class The function is activated by selecting The function is enabled by default Simplex operation The simplex operation function allows you to set up a connection from a system telephone to another system telephone without this connection havi...

Page 110: ...ted with the ESC key A function key can also be configured on a system telephone to deny or allow simplex op eration calls Note Simplex operation calls are automatically accepted by the called telephone by enabling the hands free function if the telephone is not in use simplex operation is allowed and the Do not disturb function Call Protection is disabled If a simplex operation connection is not ...

Page 111: ...he announcement If a system telephone is the destination for an announcement the number of the announ cer appears on the display The announcement is signalled with a positive acknowledge tone over the loudspeaker The announcement can be terminated with the ESC key A function key with associated LED can also be set up on a system telephone to deny or allow announcements Individual announcement You ...

Page 112: ...yed transparently by the system When an MMI is present the Gigaset telephone displays an envelope symbol and a text generated in the telephone along with the caller s phone number Analogue terminals Switching on the MMI can only occur with receiver replaced If there s a message from a voicemail system there s a short call Depending on the ter minal a symbol a text generated in the telephone as wel...

Page 113: ...ne the reception telephone number is entered into the caller list and the special dialling tone is enabled Disabling the MWI announcement Manual disabling via reception telephone procedure Call from reception telephone to room telephone The MWI information is automatically deleted in call status Callback from room telephone to reception telephone deletes the MWI information Note This performance f...

Page 114: ...pad functions can only operate from terminals that have been assigned an external multiple subscriber number MSN in configuration and possess a keypad authorisation Your network operator s performance features are always set up for the number MSN sent by your terminal The menu Advanced Settings consists of the following fields Fields in the Advanced Settings menu Field Description Receive System I...

Page 115: ...sts of the following fields Fields in the Application Authorization menu Field Description System Phonebook Authorization Select whether this authorisation class may use entries in the system phone book and if so to what extent Possible values L J 9 default value System phone book entries may be used unless located beyond the configured line ac cess authorisation L J 8 System phone book entries ma...

Page 116: ...saved The function is activated by selecting The function is enabled by default Transmit charge in formation Select whether the transferred charge information shall be transmitted to terminals of this authorisation class The function is activated by selecting The function is enabled by default 5 2 3 Parallel Ringing In the Numbering User Settings Parallel Ringing you configure whether in case of i...

Page 117: ...e Numbering Groups Teams Teams menu you configure you system s teams Teams are groups of people working together to realise an objective In practice this means that all people within a team can be reached under the same subscriber number for external and internal calls In the PABX each team of telephones terminals can thus be assigned a specific subscriber number to guarantee accessibility to inte...

Page 118: ... Internal Number Enter the internal number of the team Fields in the Further Settings menu Field Description Switch call signalling Define whether the call option configured for the team shall be enabled manually over the telephone or via the calendar For this calendar and switching times must first have been con figured You can create up to four call variants for each team in the menu Numbering G...

Page 119: ...a defined period The default value is D seconds Wrap up Timer This setting is only enabled in Signalling 4 G 5 For every subscriber who has ended a call a Post processing time is configured during which he receives no more calls Calls received by the subscriber on his number rather than via the team and self initiated calls are not included in the time cal culation The default value is D seconds t...

Page 120: ...eriod 1 99 The Numbering Groups Teams Teams Variant menu consists of the following fields Fields in the Basic Settings menu Field Description Assignment You can assign several internal numbers to each team or an external number to each Define whether calls for a team shall be signalled to internal or external subscribers Possible values The entered external number is called default value The subsc...

Page 121: ...ces the receiver or the call is ended by the exchange after ca 2 minutes The terminals are called in the order of their entry in the subscriber list Every terminal that has already been called is called again until all entered terminals are called G J3 1 Rotating or linear is set for the team call After defined times have run out all team subscribers can be called in parallel simultaneously Exampl...

Page 122: ...ure Busy on Busy is to be enabled for this call option If a team subscriber is currently engaged you can decide whether additional calls for this team should be signalled If Busy on Busy is set for a team other callers are signalled as engaged The function is activated by selecting The function is disabled by default Automatic Call Pick up with Select whether an incoming call should be automatical...

Page 123: ... be switched Possible values No other redirect options are used The incoming call is immediately rerouted to the redirect function selected in Immediately The incoming call is rerouted to the redirect func tion selected in On Busy Immediately Only if Further Rerouting Select the redirect function for immediate redirect Configure redirect functions in Applications Rerouting Rerouting Functions On B...

Page 124: ...the team member is logged into the team The team member is logged in by selecting G 5 4 Call Distribution In this menu you configure internal forwarding of all incoming calls 5 4 1 Incoming Distribution In the Numbering Call Distribution Incoming Distribution menu you configure the assignment of incoming calls to the desired internal numbers In Call Assignment you assign the call numbers entered u...

Page 125: ...ings menu Field Description Internal Number Only for Assignment Select the internal number to which incoming calls shall be as signed via the line selected in Trunk Rerouting Application Only for Assignment 11 Select the desired redirect application to be assigned to the number You can configure redirect applications in the Applic ations Rerouting Rerouting Applications menu Active Variant Day Onl...

Page 126: ...ntry 6 Dialling release occurs after PIN entry 6 Dialling release occurs after matching the entered number with the entry in the system phone book or with the user s call number entries Mobile Number and Home Number OR PIN entry PIN 6 Digit Numeric Only for Authorization 6 6 6 The system checks the caller s authorisation for Call Through then activates a simulated external dialling tone for the ca...

Page 127: ...ed c all center are in post processing 5 4 2 1 Edit Choose the icon to edit existing entries The Numbering Call Distribution Misdial Routing menu consists of the follow ing fields Fields in the Basic Settings menu Field Description Trunk Displays the external connection for which redirect for wrong dialling is configured Rerouting to Number Select the type of rerouting No redirect here the caller ...

Page 128: ... edit existing entries As soon as a Description is entered for the telephone and saved with OK the entry for that device is moved to the upper part of the overview To continue with configuring click the symbol again Select the New button to manually set up a new IP end device Select the button to go to the Gigaset telephone user interface administrator page This is described in the telephone user ...

Page 129: ...ertheless registered No location is defined According to set default behaviour the subscriber is not registered 6 4 8 0 No location is defined According to set de fault behaviour the subscriber is only registered if located in a private network G A defined location is selected The subscriber is only registered if at this location MAC Address Shows the MAC address of the telephone The menu Advanced...

Page 130: ...ettings Users New You can delete assigned numbers from the list with Values in the list Number Settings Field Description Connections Nr Shows the serial number of the connection Internal Number Displays the assigned internal number Displayed Description Displays the description that will be displayed on the IP tele phone s display User Displays the user s name 6 1 1 3 Settings In the Terminals Gi...

Page 131: ...ly set up a new base station Select the button to go to the base station s Web configurator This is described in the user guide for the relevant DECT system Use the automatic provisioning to use the elmeg hybird to transfer elementary telephony parameters to the DECT system If you want to use the assistant First Steps to do this you activate the value 6 A under Assistants First steps Advanced Sett...

Page 132: ...al In the menu Terminals Gigaset Phones Gigaset DECT you make the basic settings for base stations The Terminals Gigaset Phones Gigaset DECT General menu consists of the fol lowing fields Fields in the menu Basic Settings Field Description Description To clearly identify the base station in the system enter a de scription for the telephone Phone Type Displays the type of base station Possible valu...

Page 133: ...CP Here you have the option of permanently assigning the dis played IP address to the base station with the displayed MAC address This option should be activated to enable quick re login after a functional fault The menu Advanced Settings consists of the following fields Fields in the menu Further Settings Field Description No Hold and Retrieve The performance features hold a call and retrieve a h...

Page 134: ...number is permanently assigned to the mobile part so that it can be uniquely identified Internal Number Displays the assigned internal number Displayed Description Displays the description entered for the internal number In standby mode this description is shown on the mobile part s display User Displays the user s name 6 1 2 3 Settings In the Terminals Gigaset Phones Gigaset DECT Settings menu yo...

Page 135: ...example you perform assignment of a configured internal number 6 2 1 1 Edit or New Choose the icon to edit existing entries Select the New button to add VoIP terminals The Terminals Other phones VoIP New menu consists of the following fields Fields in the menu Basic Settings Field Description Description Enter a description for the IP telephone Location Select the location of the telephone You def...

Page 136: ...mbers Select one of the existing numbers of the configured users The menu Advanced Settings consists of the following fields Fields in the menu SIP Client Settings Field Description SIP Client Mode Select whether a SIP client or a SIP client is to be used Possible values default value Your device e g a standard SIP telephone runs a SIP registration to tell the system its dynamic IP address 3 The s...

Page 137: ...n the menu Codec Settings Field Description Codec Profile Select the codec profile to be used if the connection is over a VoIP line Codec profiles are configured in the VoIP Settings Codec Profiles menu Fields in the menu Further Settings Field Description Multiple SIP Connec tions Sub Exchange Select whether multilinks shall be allowed from this terminals Operation as subsystem Only in case of co...

Page 138: ... 2 ISDN In the Terminals Other phones ISDN menu you configure the connected ISDN ter minals For example you perform assignment of a configured internal number 6 2 2 1 Edit or New Choose the icon to edit existing entries Select the New button to add ISDN terminals The Terminals Other phones ISDN New menu consists of the following fields Fields in the Basic Settings menu Field Description Descriptio...

Page 139: ...the icon to edit existing entries Choose the icon to copy existing entries Copying an entry can prove useful if you wish to create an entry only distinguished by a few parameters from an existing entry In this case you copy the entry and modify the desired parameters The Terminals Other phones analog Edit menu consists of the following fields Fields in the Basic Settings menu Field Description Des...

Page 140: ...ng Select whether call waiting shall be allowed for this device The function is activated by selecting The function is enabled by default Do not Disturb Select whether you wish to use the call protection do not dis turb performance feature With this performance feature you can enable call signalling to your terminal Analogue terminals use system code numbers for this Possible values The menu Advan...

Page 141: ...aller s number can be displayed if an entry exists in the sys tem telephone book The function is activated by selecting The function is enabled by default Show incoming wait ing Number CLIP off Hook Only for Show incoming Number CLIP Select whether the number of a caller waiting during an exist ing call shall be displayed The function is activated by selecting The function is enabled by default Fi...

Page 142: ...h a frequency of 9 or 9 The default value is Hz Flash Time for DTMF Dialling When operating analogue terminals with the multifrequency code dialling method you can set the flashtime that the system detects as maximum flash length If the terminal flash is longer than the defined period replaced receiver is detected Values from standard value to are pos sible 6 2 4 CAPI If your device supports CAPI ...

Page 143: ...sting numbers of the configured users 6 3 Overview 6 3 1 Overview In the Terminals Overview Overview menu you get an overview of all configured ter minals Values in the Overview list Field Description Description Displays the terminal description Phone Type Displays the telephone type Interface Location For ISDN system and analogue terminals displays the inter face at which you re connected to the...

Page 144: ...ave set up the Direct Call function for one or more telephones the receiver of the corresponding telephone only needs to be lifted After a time period without further entries set in configuration the system automatically dials the configured direct call number If you do not dial within the specified period from picking up the receiver automatic dial ling is initiated The time for the direct call i...

Page 145: ... or the secretary by using call forwarding on busy Every internal subscriber to the system can forward her calls to another number Calls can be forwarded to internal subscriber numbers internal team numbers or external numbers When the number to which calls shall be forwarded is entered the system automatically checks whether it s an internal or external number In a team call forwarding can be set...

Page 146: ...N for external to external con nections the system systematically attempts to initiate call forwarding via the exchange For teams there can be manual definition of whether call for warding shall occur via the exchange or the system If the system pos sesses no ISDN connections or if Call Deflection point to multipoint con nection or Partial Rerouting point to point connection has not been ordered f...

Page 147: ...bers You can block specific numbers or prefixes with the blocked numbers list You can clear the blocked numbers or prefixes with the cleared numbers list If a number entered as a cleared number is longer than one entered as a blocked number this number can be di alled When you dial a number dialling after the blocked digit is terminated and you hear the busy tone You can assign each user individua...

Page 148: ...num bers with particular special functions e g emergency functions In your system configuration you can enter numbers that must be accessible in an emer gency If you now dial one of these priority numbers it is detected by the system and an ISDN B channel is automatically cleared If the external ISDN B channels are already in use one of the ISDN B channels is freed up and the calling subscribers h...

Page 149: ...Routing Automatic Route Selection General menu you enable the ARS Automatic Route Selection function and select the desired route level The menu Call Routing Automatic Route Selection General consists of the following fields Fields in the Basic Settings menu Field Description ARS Select whether to enable the ARS performance feature Automatic Route Selection The function is activated by selecting T...

Page 150: ...aces Provider In the Call Routing Automatic Route Selection Interfaces Provider menu enter the routes or providers along with their network access profiles 7 2 2 1 Edit or New Choose the icon to edit existing entries Select the New button to create new entries The Call Routing Automatic Route Selection Interfaces Provider New menu consists of the following fields Fields in the Basic Settings menu ...

Page 151: ...fallback Choose the icon to edit existing entries Select the New button to create new entries 7 2 3 1 Numbers In the Numbers area enter the number or partial number of the zones for which you wish to configure the routing tables Fields in the Basic Settings menu Field Description Description Enter a description for the entry Zones Configure the desired external zones which should be dialled via th...

Page 152: ...nterface or a specific network provider and select the latter under Interface Provider Routing Stage 2 Configure the switching times for routing level 2 For this first select the Start Time from which routing shall occur over a specific interface or a specific network provider and select the latter under Interface Provider 7 Call Routing Gigaset Communications GmbH 140 hybird 120 Gigaset Edition ...

Page 153: ...witched The switch occurs according to the data in the assigned calendar You can set up five types of calendars in the system The Authorisation Class and Night Operation calendars are intended for central switching and can only be set up once The Team Signalling Intercom Signalling and Redirect to internal external number calen dars can be set up repeatedly Several different switching times can be...

Page 154: ... be set up Here only one calendar can be set up 3 4 Here only one calendar can be set up A Here several calendars can be set up 3 Here several calendars can be set up 1 Here several calendars can be set up 8 1 1 2 Mon Sun In the Mon Sun area you set up the switching days and times for this calendar The Applications Calendar Calendar Monmenu consists of the following fields Fields in the Weekday me...

Page 155: ... be imported If you require specific settings for this day select the option 4 8 1 1 3 Exception In the Exception area select whether holidays shall be taken into account and if so how The menu Applications Calendar Calendar Exception consists of the following fields Fields in the Settings holidays menu Field Description Consider public holi days Select whether appointments entered in the Applicat...

Page 156: ...ble 3 Call option 1 to call option 4 3 Door Intercom call option 1 and door intercom call option 2 Night operation and night operation off 3 4 Authorisation class by default and au thorisation class optional A Redirect option 1 to redirect option 4 8 1 2 Public Holiday In the Applications Calendar Public Holiday menu you can enter holidays or any special days for which divergent settings should be...

Page 157: ...ately On Busy On No Reply or On Busy and On No Reply You then assign these redirect options to the external connections in the Numbering Call Distribution Incoming Distribution menu 8 2 1 1 Edit or New Choose the icon to edit existing entries Select the New button to create new redirect options The Applications Rerouting Rerouting Functions New menu consists of the fol lowing fields Fields in the ...

Page 158: ...ing time in the queue Only for Type of Rerouting Function or 1 Define maximum time a caller can remain on hold After expira tion of this time the caller shall be transferred to the defined re direct destination Leave for an unlimited queue corresponds to value 0 Disable to enter the de sired value Fields in the On No Reply Settings menu Field Description Time for Rerouting on No Reply Define maxim...

Page 159: ... information call number which customers with various prob lems or requests ring up Naturally no single employee or team can provide information in every subject areas So the caller would need to be transferred to the individual depart ments If you knew beforehand which requests subject area a caller had you could im mediately transfer him to the competent department Thus your callers don t have t...

Page 160: ... system and can accept up to 28 calls simultaneously Fields in the Announcement Auto Attendant Settings menu Field Description Call Switching Select how incoming calls are to be transferred Possible values 8 3 default value The con figured announcement is played There follows either transfer to the configured internal number or the connection is inter rupted and the caller hears the busy tone 3 J ...

Page 161: ...ng Applications New menu consists of the fol lowing fields Fields in the Basic Settings menu Field Description Description Enter a description for the redirect application Type of Rerouting Ap plication Select the destination to which an incoming call shall be redir ected Possible values 0 default value Switch call signalling Select how to switch between options Possible values J 8 2 2 2 Variant 1...

Page 162: ...is available in the system basic settings The available storage space can be ex tended with an SD card The length of the language and music files that can be saved is based upon the SD card used Voice and music data is saved in Wave format The following voice applications can be defined in the system Announcement before query Announcement without query Infobox Wake up call Music on hold You can fi...

Page 163: ... download these to your PC To save a message click on the icon The download dialog then opens To listen to a message click on the icon 8 3 1 1 Edit Choose the icon to edit existing entries Select to change the entry and are files specified in the system and can thus not be deleted The Applications Voice Applications Wave Files Edit menu consists of the follow ing fields Fields in the Basic Setting...

Page 164: ...es an integrated phone book in which you can save phone book entries of up to 24 digits numbers and up to 20 character names text When creating a telephone book entry a Speed Dial Number code is assigned to each entry Authorised telephones can initiate speed dial from the phone book via these speed dial numbers System telephones System telephones can dial from the system phone book via a special m...

Page 165: ...Entries menu all configured telephone book entries are displayed with the corresponding speeddial index The entries in the Descrip tion column are sorted alphabetically Click the column title of any column to sort entries in ascending or descending order 8 4 1 1 Edit or New Choose the icon to edit existing entries Select the New button to create new entries The menu Applications System Phonebook E...

Page 166: ...ut look for example The phone book data stored in your device is exported to a text file The Applications System Phonebook Import Export menu consists of the following fields Fields in the Basic Settings menu Field Description Action Select the desired action Possible values 1 default value You can export the names saved in Applications System Phonebook Entries into a text file specifying phone nu...

Page 167: ...o generate only one phonebook entry select the blank option in all selection fields for the second record Phonebook Import The Applications System Phonebook Import Export Phonebook Import menu consists of the following fields Fields in the Phonebook Import menu Field Description Phone Number Select which data is to be used from a data record as the phonenumber Name Select which columns are to be u...

Page 168: ... really want to delete all entries of the phonebook Confirm your entry by clicking OK 8 5 Call Data Records In the Applications Call Data Records menu you configure the recording of incoming and outgoing calls The capture of call data records provides an overview of the telephone usage in your company All external calls can be saved in the device in the form of call data records These data records...

Page 169: ...splays the connection charge but only if the provider trans mits the corresponding data 8 5 2 Incoming The Applications Call Data Records Incoming menu contains information that per mits the monitoring of incoming activities The Applications Call Data Records Incoming menu consists of the following fields Fields in the Incoming menu Field Description Date Displays the connection date Time Displays...

Page 170: ...lds in the Basic Settings menu Field Description Web Access User name Enter a user name for the call data administrator Web Access Password Enter a password for the call data administrator Save outgoing calls Select which outgoing connections should be saved Possible values default value 6 Save incoming calls Select which incoming connections should be saved Possible values default value 6 Privacy...

Page 171: ... current connection data record in an ex ternal file click Export and save the file under the desired stor age location and file name Delete call data re cords If you wish to delete the current connection data record from the system storage click Delete 8 6 Mini Call Center The mini call centre is an integrated call centre solution for up to 16 agents It provides the ideal solution for small group...

Page 172: ...in post processing time Active Calls Displays the number of active connections Waiting Calls Displays the number of waiting incoming calls Answered of Calls Today Displays the current number of accepted calls for this day Lost Calls Today Displays the current number of missed calls for this day 8 6 2 Lines In the Applications Mini Call Center Lines menu lines are assigned to external and internal ...

Page 173: ...ling Select whether the call options for this line shall be switched over a configured calendar and if so over which Possible values J Active Variant Select which call option shall be enabled by default after con figuration for this line The menu Advanced Settings consists of the following fields Fields in the Advanced Settings menu Field Description Team Speed Timer Enter the time after which cal...

Page 174: ...entered time Possible values There shall be no redirect on no reply The incoming call is forwarded to the selected team after the time specified in Time until rerouting Further Rerouting Select additional redirect functions You must first configure these in Applications Rerouting Rerouting Functions Then the following values may be selected No additional redirect functions Immediately transfers th...

Page 175: ... in by selecting G 8 6 3 Agents In the Applications Mini Call Center Agents menu lines are assigned to agents An agent can operate one or more mini call centre lines 8 6 3 1 Edit or New Choose the icon to edit existing entries Select the New button to create new entries The menu Applications Mini Call Center Agents New consists of the following fields Fields in the Basic Settings menu Field Descri...

Page 176: ...entre manager The latter can then monitor the status of lines and agents and modify the settings for lines and agents The Applications Mini Call Center General menu consists of the following fields Fields in the Basic Settings menu Field Description Web Access User name Enter a user name for the mini call centre administrator When a user logs into the user interface under this name he she has acce...

Page 177: ...he internal number for the connection and optionally the codes for call acceptance 8 7 1 1 Edit or New Choose the icon to edit existing entries Select the New button to create new entries The menu Applications Doorcom Units Doorcom Units New consists of the follow ing fields Fields in the Basic Settings menu Field Description Interface Select the interface to which an intercom adapter shall be con...

Page 178: ... 7 2 1 General In the General area you set up the basic features of intercom signalling The menu Applications Doorcom Units Doorcom Signalling General consists of the following fields Fields in the Basic Settings menu Field Description Description Select one of the configured intercom settings previously cre ated in the Applications Doorcom Units Doorcom Units menu Bell ID Enter an unambiguous fou...

Page 179: ...e for all numbers assigned to this door intercom sig nalling to be called simultaneously after a specified time The default value is 60 seconds 8 7 2 2 Doorcom Signalling Variant 1 and 2 In the Doorcom Signalling Variant area you configure both intercom call options for this signalling profile The Applications Doorcom Units Doorcom Signalling Intercom call variant con sists of the following fields...

Page 180: ... linear call After all terminals are called call signalling begins again with the first entered terminal The call is signalled until the caller re places the receiver or the call is ended by the intercom ad apter after ca 2 minutes The terminals are called in the sequence of their entry in the configuration subscriber list Every terminal that has already been called is called again until all enter...

Page 181: ... create new alarm in puts 8 8 1 1 General In the General area you set up the alarm inputs basic features The Applications Alarm Calls Alarm Calls General menu consists of the following fields Fields in the menu Basic Settings Field Description Status Enable or disable the alarm input function The function is enabled with The function is enabled by default Description Enter a unique name for the al...

Page 182: ... via a FXO interface Number of repeats Specify the number of repeats if the alarm is not taken A value of between 1 and 10 repeats is possible The default value is Call repeats are not possible via a FXO interface External Connection Timer Specify the maximum duration of an external call once it has been accepted in seconds A value of between and D seconds is possible The default value is D second...

Page 183: ...n assign up to eight internal numbers or two external numbers to each alarm Define whether an alarm s calls are to be signalled to the internal or external subscribers Possible values The external number that was entered is called Alternatively two external numbers can be called for an alarm default value The subscribers assigned to the selected numbers are called based on the signalling defined F...

Page 184: ...oxes occurs via telephone Every subscriber can use her individual voicemail box by transferring calls to her voice mail box Note If you wish to use a voicemail box you ll need an installed SD card You may need load the required folder structure with the announcement texts on the SD card Choose in the Maintenance Software Configuration menu the option 1 4 5 Caution Do not remove the SD card during ...

Page 185: ...t status of the voicemail box or License Allocation Indicates whether a licence is currently assigned to a voicemail box Note The number of configured voicemail boxes may exceed the number of existing licences However you must make sure that the number of currently used voicemail boxes is covered by the number of licences 8 9 1 1 Edit or New Choose the icon to edit existing entries Select the New ...

Page 186: ...om if you wish to operate voicemail boxes with various languages within your voicemail sys tem E Mail Address from User Settings Here is displayed the user e mail address to which a notifica tion shall be sent if a message has been left on the voicemail box The e mail address in saved in the Numbering User Settings User Basic Settings menu E Mail Notification Once a message has been left on the vo...

Page 187: ... default value is E seconds Calendar for status Out of Office When the subscriber is out the voicemail box can be switched over a calendar If a calendar is to be used it needs to be configured with the setting Application 3 in the menu Ap plications Calendar Possible values J default value The sub scriber can manually switch the voicemail box on and off Calendar Using the selected calendar the voi...

Page 188: ...t value A caller hears an announcement and can leave a message A caller hears an announcement but cannot leave a message Mode for status Out of Office The voicemail box can be operated with two different settings outside of office hours Possible values default value A caller hears an an nouncement but cannot leave a message A caller hears an an nouncement and can leave a message 8 9 2 Status In th...

Page 189: ...e Mail General consists of the following fields Fields in the menu Basic Settings Field Description Voice Mail System Select whether to activate your voicemail system The function is enabled with The function is enabled by default Description Only for Voice Mail System enabled Enter a description for your voicemail system This description is displayed on the telephone when a call goes in to the vo...

Page 190: ...used for sending e mails The default value is Return Address Enter any address to be used as sender when sending e mails This address merely serves to identify e mails in the inbox SMTP User Name Enter the user name for the SMTP server SMTP Password Enter the password for the SNMP server user The menu Advanced Settings consists of the following fields Fields in the menu Advanced Settings Field Des...

Page 191: ...thernet interfaces in routing mode You can use the New button to create virtual interfaces However this is only needed in special applications e g BRRP Depending on the option selected different fields and options are available All the config uration options are listed below Note Please note If your device has obtained an IP address dynamically from a DHCP server operated in your network for the b...

Page 192: ...ion Interfaces New menu consists of the following fields Fields in the Basic Parameters menu Field Description Based on Ethernet In terface This field is only displayed if you are editing a virtual routing in terface Select the Ethernet interface for which the virtual interface is to be configured Address Mode Select how an IP address is assigned to the interface Possible values 3 default value Th...

Page 193: ...llocate a virtual MAC address The first 6 characters of the MAC are preset but can be changed VLAN ID Only for Interface Mode G This option only applies for routing interfaces Assign the inter face to a VLAN by entering the VLAN ID of the relevant VLAN Possible values are default value to B The menu Advanced Settings consists of the following fields Fields in the Advanced Settings menu Field Descr...

Page 194: ...HCP requests in which this bit is not set In this case disable this option The function is activated by selecting The function is enabled by default Proxy ARP Select whether your device is to respond to ARP requests from its own LAN on behalf of defined remote terminals The function is activated by selecting The function is disabled by default TCP MSS Clamping Select whether your device is to appl...

Page 195: ...VLAN menu you can make all the settings needed for this and query their status Caution For interfaces that operate in Routing mode you only assign a VLAN ID to the interface You define this via the parameters Interface Mode G and field VLAN ID in menu LAN IP Configuration Interfaces New 9 2 1 VLANs In this menu you can display all the VLANs already configured edit your settings and cre ate new VLA...

Page 196: ...VLAN ports The LAN VLANs Port Configuration menu consists of the following fields Fields in the Port Configuration menu Field Description Interface Shows the port for which you define the PVID and processing rules PVID Assign the selected port the required PVID Port VLAN Identifi er If a packet without a VLAN tag reaches this port it is assigned this PVID Drop untagged frames If this option is ena...

Page 197: ...ts of the following fields Fields in the Bridge Group br ID VLAN Options menu Field Description Enable VLAN Enable or disable the specified bridge group for VLAN The function is enabled with The function is not activated by default Management VID Select the VLAN ID of the VLAN in which your device is to op erate Gigaset Communications GmbH 9 LAN hybird 120 Gigaset Edition 185 ...

Page 198: ...rk route to the head office You can enter several default routes on your device but only one default route can be active at any one time If you enter several default routes you should thus note differing values for Metric 10 1 1 IPv4 Route Configuration A list of all configured routes is displayed in the Network Routes IPv4 Route Config uration menu 10 1 1 1 Edit or New Choose the icon to edit exi...

Page 199: ...ith those configured here to the active routing table This en ables e g in the case of dynamically changing gateway ad dresses particular routes to be maintained or routes with dif ferent metrics i e of differing priority to be specified However if the DHCP server sends static routes the settings configured here are not copied to the routing 1 1 6 The routing in formation is taken entirely from th...

Page 200: ...parameters If the function is active a route is created with extended routing parameters such as source interface and source IP address as well as protocol source and des tination port type of service TOS and the status of the device interface Fields in the menu Route Parameters Field Description Local IP Address Only for Route Type 4 4 or 8 0 4 Enter the IP address of the host to which your devic...

Page 201: ...interface over which the data packets are to reach the device The default value is Source IP Address Netmask Enter the IP address and netmask of the source host or source network Layer 4 Protocol Select a protocol Possible values 6 6 6 6 36 365 6 G 6 The default value is Source Port Only for Layer 4 Protocol 6 or 6 Enter the source port First select the port number range Possible values default va...

Page 202: ... Entry of privileged port numbers 0 1023 3 4 Entry of server port numbers 5000 32767 Entry of client port numbers 1024 4999 Entry of client port numbers 32768 65535 1 4 Entry of unprivileged port numbers 1024 65535 Enter the appropriate values for the individual port or start port of a range in Port and for a range the end port in to Port DSCP TOS Value Select the Type of Service TOS Possible valu...

Page 203: ...and wait until the interface is up 4 The route can always be used 1 The route can be used when the interface is up If the interface is dormant then select and use the alternative route rerouting until the interface is up 4 1 The route can be used when the interface is up 8 1 The route can be used when the interface is up If the interface is dormant then dial and wait until the interface is up In t...

Page 204: ...rs Delete You can delete entries with the symbol 10 1 3 Options Back Route Verify The term Back Route Verify describes a very simple but powerful function If a check is activated for an interface incoming data packets are only accepted over this interface if outgoing response packets are routed over the same interface You can therefore prevent the acceptance of packets with false IP addresses even...

Page 205: ...ress Translation NAT is a function on your device for defined conversion of source and destination addresses of IP packets If NAT is activated IP connections are still only allowed by default in one direction outgoing forward protective function Ex ceptions to the rule can be configured in NAT Configuration on page 194 10 2 1 NAT Interfaces A list of all NAT interfaces is displayed in the Networki...

Page 206: ...ed by default PPTP Passthrough Select whether the setup and operation of several simultan eous outgoing PPTP connections from hosts in the network are also to be permitted if NAT is activated The function is disabled by default If PPTP Passthrough is enabled the device itself cannot be configured as a tunnel endpoint Port Shows the number of portforwarding rules configured in Net working NAT NAT C...

Page 207: ...hod for outgoing data traffic The starting point for choosing the NAT method is a NAT scenario in which an internal source host has initiated an IP connection to an external destination host over the NAT interface and in which an internally valid source address and internally valid source port are translated to an externally valid source address and an externally valid source port Possible values ...

Page 208: ...ices Possible values default value 4 Action Only for Type of traffic Select which data packets are to be excluded by NAT Possible values default value All the data packets that match the fol lowing parameters that are to be configured protocol source IP address network mask destination IP address netmask etc are excluded by NAT All the data packets that do not match the following parameters that a...

Page 209: ...rding to the selected Service different protocols are available Possible values default value 6 36 6 6 6 6 6 6 6 6 6 64D 6H 6 3 6 1 G 6 365 6 6 6 3 6 3 6 6 G36 6 6 H 3 6 Gigaset Communications GmbH 10 Networking hybird 120 Gigaset Edition 197 ...

Page 210: ...of traffic 3 Enter the source IP address and corresponding netmask of the original data packets as the case arises Original Source Port Range Only for Type of traffic 3 NAT method Service and Pro tocol 6 6 6A 6 Enter the source port of the original data packets The default setting means that the port remains unspecified If you select 31 1 you can specify a single port if you select 31 1 you can sp...

Page 211: ...figuration Specify original traffic menu can be translated Fields in the menu Replacement Values Field Description New Destination IP Ad dress Netmask Only for Type of traffic Enter the destination IP address and corresponding netmask to which the original destination IP address is to be translated New Destination Port Only for Type of traffic Service and Protocol 6 6 6A 6 Leave the destination po...

Page 212: ...rce Port Range is not changed all port numbers are retained 8 6 A There is an input field for you to specify the port number with which to start the port range that replaces the original port rannge The count of ports is retained 10 3 QoS QoS Quality of Service makes it possible to distribute the available bandwidths effect ively and intelligently Certain applications can be given preference and b...

Page 213: ...eld Description Description Enter the name of the filter Service Select one of the preconfigured services The extensive range of services configured ex works includes the following 4 11 O K 1 The default value is Protocol Select a protocol The option default value matches any protocol Type Only for Protocol 6 Select the type Possible values 1 3 O 1 1 1 See RFC 792 The default value is Gigaset Comm...

Page 214: ...s default value The destination port is not specified 31 1 Enter a destination port 31 1 Enter a destination port range Source IP Address Netmask Enter the source IP address of the data packets and the cor responding netmask Source Port Range Only for Protocol 6 or 6 Enter a source port number or a range of source port numbers Possible values default value The destination port is not specified 31 ...

Page 215: ...vice CoS Possible values are whole numbers between and F Value range to F The default value is 10 3 2 QoS Classification The data traffic is classified in the Networking QoS QoS Classification menu i e the data traffic is associated using class IDs of various classes To do this create class plans for classifying IP packets based on pre defined IP filters Each class plan is associated to at least o...

Page 216: ...of the data packets to be classified Possible values Incoming data packets are assigned to the class Class ID that is then to be defined default value Outgoing data packets are as signed to the class Class ID that is then to be defined Incoming and outgoing data packets are assigned to the class Class ID that is then to be defined High Priority Class Enable or disable the high priority class If th...

Page 217: ...de Point according to RFC 3260 is used to signal the priority of IP packets indicated in decimal format 3 6 Differentiated Services Code Point according to RFC 3260 is used to signal the priority of IP packets indicated in hexadecimal format 3 The TOS value is specified in binary format e g 00111111 3 The TOS value is specified in decim al format e g 63 3 The TOS value is specified in hexadecimal ...

Page 218: ...ed automatically for each class but only for data traffic classified as outgoing and for data traffic classified in both direc tions A priority is assigned to these automatic queues The value of the priority is equal to the value of the class ID You can change the default priority of a queue If you add new queues you can also use classes in other class plans via the class ID 10 3 3 1 New Choose th...

Page 219: ...d on the inter face The existing configuration is not deleted but can be ac tivated again if required Traffic shaping Activate or deactivate data rate limiting in the send direction The function is enabled with The function is disabled by default Maximum Upload Speed Only for Traffic shaping enabled Enter a maximum data rate for the queue in the send direction in kbits Possible values are to The d...

Page 220: ...length of the block cipher which is taken into account during bandwidth calcula tion Possible values 3J C 3J 8 J 1 0 9 P D AES128 AES192 AES256 Twofish cipher block size 128 Bit Real Time Jitter Con trol Only for Traffic shaping enabled Real Time Jitter Control optimises latency when forwarding real time datagrams The function ensures that large data packets are fragmented according to the availab...

Page 221: ...is activated by the control instances ALG or MGW 8 Real Time Jitter Control is always active even if no real time data is routed Queues Policies Configure the desired QoS queues For each class created from the class plan which is associated with the selected interface a queue is generated automatically and displayed here only for data traffic classified as outgoing and for data traffic classified ...

Page 222: ...e class ID must be given in the Network ing QoS QoS Classification menu Priority Only for Prioritisation queue Choose the priority of the queue Possible values are 1 to 8 1 The default value is Weight Only for Prioritisation Algorithm or 5 I Choose the priority of the queue Possible values are to The default value is RTT Mode Realtime Traffic Mode Active or deactivate the real time transmission of...

Page 223: ... values are to The default value is Overbooking allowed Only for Traffic Shaping enabled Enable or disable the function The function controls the band width limit If Overbooking allowed is activated the bandwidth limit set for this queue can be exceeded as long as free bandwidth ex ists on the interface If Overbooking allowed is deactivated the queue can never occupy bandwidth beyond the bandwidth...

Page 224: ... data size of between Min queue size and Max queue size are preventively dropped to prevent queue overflow RED Random Early Detection This proced ure ensures a smaller long term queue size for TCP based data traffic so that traffic bursts can also usually be transmitted without large packet losses The function is activated with The function is disabled by default Min queue size Enter the lower thr...

Page 225: ...combination of filters and actions for filter rules rules and the linking of these rules to form rule chains They act on the incoming data packets to allow or deny access to the gateway for certain data A filter describes a certain part of the IP data traffic based on the source and or destina tion IP address netmask protocol and source and or destination port You use the rules that you set up in ...

Page 226: ... certain part of the IP traffic and defines for example the IP addresses the protocol the source port or the des tination port A list of all access filters is displayed in the Networking Access Rules Access Filter menu 10 4 1 1 Edit or New Choose the icon to edit existing entries To configure access fitters select the New button The Networking Access Rules Access Filter New menu consists of the fo...

Page 227: ...es any protocol Type Only if Protocol 6 Possible values 1 3 O 1 1 1 The default value is See RFC 792 Connection State Only if Protocol 6 You can define a filter that takes the status of the TCP connec tions into account Possible values Gigaset Communications GmbH 10 Networking hybird 120 Gigaset Edition 215 ...

Page 228: ...nation port numbers that matches the filter Possible values default value The filter is valid for all port numbers 31 1 Enables the entry of a port number 31 1 Enables the entry of a range of port numbers Source IP Address Netmask Enter the source IP address and netmask of the data packets Source Port Range Only if Protocol 6 6 Enter a source port number or the range of source port num bers Possib...

Page 229: ...he TOS value is specified in decim al format e g 63 3 The TOS value is specified in hexadecimal format e g 3F COS Filter 802 1p Layer 2 Enter the service class of the IP packets Class of Service CoS Possible values are whole numbers between and F The default value is 10 4 2 Rule Chains Rules for IP filters are configured in the Rule Chains menu These can be created separ ately or incorporated in r...

Page 230: ...hain already exists select the filter to be attached to the rule chain Action Define the action to be taken for a filtered data packet Possible values 8 default value Allow packet if it matches the filter 8 Allow packet if it does not match the filter Deny packet if it matches the filter Deny packet if it does not match the filter Use next rule To set the rules of a rule chain in a different order...

Page 231: ...Basic Parameters menu Field Description Interface Select the interface for which a configured rule chain is to be assigned Rule Chain Select a rule chain Silent Deny Define whether the sender is to be informed if an IP packet is denied default value The sender is not informed The sender receives an ICMP message Reporting Method Define whether a syslog message is to be generated if a pack et is den...

Page 232: ...s menu displays a list of all the Drop In Groups Each Drop In group represents a network 10 5 1 1 New Select the New button to set up other Drop In Groups The Networking Drop In Drop In Groups New menu consists of the following fields Fields in the Basic Parameters menu Field Description Group Description Enter a unique name for the Drop In group Mode Select which mode is to be used to send the MA...

Page 233: ... client You need this setting for example if your provider s router is being used as the DHCP server You can choose from the interfaces available to your device however the interface must be a member of the drop in group ARP Lifetime Determines the time period for which the ARP entries will be held in the cache The default value is CD seconds DNS assignment via DHCP The gateway can modify DHCP pac...

Page 234: ...tion is enabled with The function is disabled by default Interface Selection Select all the ports which are to be included in the Drop In group in the network Add new entries with Add 10 Networking Gigaset Communications GmbH 222 hybird 120 Gigaset Edition ...

Page 235: ...dio conferences All subscribers are displayed in a window and the speaker s are indicated by a black box Other areas of use are of particular interest to companies Here multicast ing makes it possible to synchronise the databases of several servers which is valuable for multinationals or even companies with just a few locations Address range for multicast For IPv4 the IP addresses 224 0 0 0 to 239...

Page 236: ...Several senders with different IP addresses can therefore transmit to the same multicast group leading to a 1 to n rela tionship between groups and source addresses This information is forwarded to the router by means of reports In the case of incoming multicast data traffic a router can use this information to decide whether a host in its subnet wants to receive it Your device supports the curren...

Page 237: ...aken into consideration At the moment there are three versions of IGMP V1 V3 most current systems use V3 and less often V2 Two packet types play a central role in IGMP queries and reports Queries are only transmitted from a router If several IGMP routers exist in a network the router with the lowest IP address is the querier We differentiate here between a general query sent to 224 0 0 1 a group s...

Page 238: ...ral hosts improving per formance Possible values are J to J The default value is J Robustness Select the multiplier for controlling the timer values A higher value can e g compensate for packet loss in a network sus ceptible to loss If the value is too high however the time between logging off and stopping of the data traffic can be in creased leave latency Possible values are to E The default val...

Page 239: ...rded on the IPGM Proxy interface The menu Advanced Settings consists of the following fields Fields in the Advanced Settings menu Field Description IGMP Proxy Select whether your device is to forward the hosts IGMP mes sages in the subnet via its defined Proxy Interface Proxy Interface Only for IGMP Proxy enabled Select the interface on your device via which queries are to be received and collecte...

Page 240: ...on 3 is used Maximum Groups Enter the maximum number of groups to be permitted both in ternally and in reports Maximum Sources Enter the maximum number of sources that are specified in version 3 reports and the maximum number of internally man aged sources per group IGMP State Limit Enter the maximum permitted total number of incoming queries and messages per second The default value is i e the nu...

Page 241: ...check Disable the option if you only want to forward one defined mul ticast group to a particular interface The option is deactivated by default Multicast Group Ad dress Only for All Multicast Groups not active Enter here the address of the multicast group you want to for ward from a defined Source Interface to a defined Destina tion Interface Source Interface Select the interface on your device t...

Page 242: ... Internet access you must set up a connection to your Internet Ser vice Provider ISP For broadband Internet access your device provides the PPP over Ethernet PPPoE PPP over PPTP and PPP over ATM PPPoA protocols You can also configure Internet access over ISDN Note Note your provider s instructions Dialin connections over ISDN are used to establish a connection to networks or hosts out side your LA...

Page 243: ...tly defined and admitted Connection Idle Timeout The connection idle timeout is determined in order to clear the connection automatically if it is not being used i e if data is no longer being sent to help you save costs Block after Connection Failure You use this function to set up a waiting time for outgoing connection attempts after which your device s connection attempt is regarded as having f...

Page 244: ...l bundling for dialup connections Chan nel bundling can only be used for ISDN connections for a bandwidth increase or as a backup Only one B channel is initially opened when a connection is set up Dynamic Dynamic channel bundling means that your device connects other ISDN B channels to in crease the throughput for connections if this is required e g for large data rates If the amount of data traff...

Page 245: ...t the moment many providers are still in the process of preparing the PPPoE Multilink func tion For PPPoE Multilink we recommend using your device s Eth ernet switch in Split Port mode and to use a separate Ethernet interface e g for each PPPoE connection If you also want to use an external modem for PPPoE Multilink you must run your device s Ethernet switch in Split Port mode PPPoE Ethernet Inter...

Page 246: ...if Always on is disabled Enter the idle time in seconds for static short hold The static short hold setting determines how many seconds should pass between sending the last traffic data packet and clearing the connection Possible values are to CD seconds deactivates the short hold The default value is C Example for FTP transmission for LAN to LAN trans mission B for Internet connections Fields in ...

Page 247: ...ion partner Add new entries with Add 6 IP address of the destination host or network 0 Netmask for Remote IP Address If no entry is made your device uses a default netmask The lower the value the higher the priority of the route range of values The default value is The menu Advanced Settings consists of the following fields Fields in the Advanced Settings menu Field Description Block after connect...

Page 248: ...connection part ner MSCHAP version 1 or 2 possible 3 64 Run MS CHAP version 2 only Some providers use no authentication In this case select this option DNS Negotiation Select whether your device receives IP addresses for Primary DNS Server and Secondary DNS Server from the connection partner or sends these to the connection partner The function is enabled with The function is enabled by default Pr...

Page 249: ...figure an Internet connection that uses the Point Tunnelling Protocol PPTP to set up a connection This is required in Austria for example 12 1 2 1 New Choose the New button to set up new PPTP interfaces The menu WAN Internet Dialup PPTP New consists of the following fields Fields in the Basic Parameters menu Field Description Description Enter a name for uniquely identifying the internet connectio...

Page 250: ...ed Enter the idle interval in seconds This determines how many seconds should pass between sending the last traffic data packet and clearing the connection Possible values are to CD seconds deactivates the timeout The default value is C Example for FTP transmission for LAN to LAN trans mission B for Internet connections Fields in the IP Mode and Routes menu Field Description IP Address Mode Select...

Page 251: ... Address Mode 3 Define other routing entries for this PPTP partner Add new entries with Add 6 IP address of the destination host or network 0 Netmask for Remote IP Address If no entry is made your device uses a default netmask The lower the value the higher the priority of the route range of values The default value is The menu Advanced Settings consists of the following fields Fields in the Advan...

Page 252: ...tocol 6 6A 6A 3 6 Primarily run CHAP on denial then the authentication protocol required by the connection part ner MSCHAP version 1 or 2 possible 3 64 Run MS CHAP version 2 only Some providers use no authentication In this case select this option DNS Negotiation Select whether your device receives IP addresses for Primary DNS Server and Secondary DNS Server from the connection partner or sends th...

Page 253: ...CP echo requests or replies This makes it possible to switch to a backup connection more quickly in the event of line faults The function is enabled with The function is enabled by default 12 1 3 ISDN A list of all ISDN interfaces is displayed in the WAN Internet Dialup ISDN menu In this menu you configure the following ISDN connections Internet access over ISDN LAN to LAN connection over ISDN Rem...

Page 254: ...ser Name Enter your device code local PPP user name Remote User for Dial in only Enter the code of the remote terminal remote PPP user name Password Enter the password Always on Select whether the interface should always be activated The function is enabled with The function is disabled by default Only activate this option if you have Internet access with a flat rate charge Connection Idle Timeout...

Page 255: ...ly for IP Address Mode 3 and 6 When you configure an ISDN Internet connection specify whether Network Address Translation NAT is to be activated The function is enabled with The function is disabled by default Local IP Address Only if IP Address Mode 3 Assign the IP address from your LAN to the ISDN interface which is to be used as your device s internal source address Route Entries Only if IP Add...

Page 256: ... connec tion before the interface is blocked Possible values are to The default value is Usage Type If necessary select a special interface use Possible values 3 default value No special type is selected The interface is used for incoming dialup connections and callbacks initiated externally The interface is defined as multi user connection partner i e several clients dial in with the same user na...

Page 257: ...Encryption is set the remote terminal must also support it otherwise a connection cannot be set up Possible values default value MPP encryption is not used MPP encryption V2 with 128 bit is used to RFC 3078 8 1 MPP encryption V2 with 128 bit is used as compatible with Microsoft and Cisco Callback Mode Select the Callback Mode function Possible values default value Your device does not call back 4 ...

Page 258: ...back This only applies if no fixed outgoing number has been configured for the connection partner This is done by closing the dialog box that appears with Cancel Fields in the Bandwith on Demand Options menu Field Description Channel Bundling Select whether channel bundling is to be used for ISDN con nections with the connection partner and if so what type Your device supports dynamic and static c...

Page 259: ...For outgoing calls where you dial your connec tion partner The calling party number of the incoming call is compared with the number entered under Call Number Call Number Enter the connection partner s numbers Number of Used Ports Select which port is used Fields in the IP Options menu Field Description OSPF Mode Select whether and how routes are propagated via the inter face and or OSPF protocol ...

Page 260: ...ves IP addresses for Primary DNS Server and Secondary DNS Server and WINS Server Primary and Secondary from the connection partner or sends these to the connection partner The function is enabled with The function is enabled by default 12 1 4 IP Pools The IP Pools menu displays a list of all IP pools Your device can operate as a dynamic IP address server for PPP connections You can use this functi...

Page 261: ...NS server that is to be used preferably by clients who draw an address from this pool Secondary Optionally enter the IP address of an alternative DNS server 12 2 Real Time Jitter Control When telephoning over the Internet voice data packets normally have the highest priority Nevertheless if the upstream bandwidth is low noticeable delays in voice transmission can occur when other packets are route...

Page 262: ... ised Control Mode Select the mode for the optimisation Possible values 6 3 default value By means of the data routed via the media gateway the system detects voice data traffic and optimises the voice transmis sion 6 3 All RTP streams are optimised 4 Voice data transmission is not optimised 8 Voice data transmission is always optimised Maximum Upload Speed Enter the maximum available upstream ban...

Page 263: ...s used function here as the endpoints of the VPN tunnel IPSec involves a number of Internet Engineering Task Force IETF standards which specify mechanisms for the protection and authentication of IP packets IPSec offers mechanisms for encrypt ing and decrypting the data transferred in the IP packets The IPSec implementation can also be smoothly integrated in a Public Key Infrastructure PKI see Cer...

Page 264: ... an IP packet does not match the defined Additional Traffic Filter it is rejected If an IP packet meets the requirements in an Additional Traffic Filter IPSec phase 2 ne gotiation begins and data traffic is transferred over the tunnel Note The parameter Additional Traffic Filter is exclusively relevant for the initiat or of the IPSec connection it is only used for outgoing traffic Note Please note...

Page 265: ...the configuration has been saved Description Enter a description of the peer that identifies it The maximum length of the entry is 255 characters Peer Address Enter the official IP address of the peer or its resolvable host name The entry can be omitted in certain configurations whereby your device then cannot initiate an IPSec connection Peer ID Select the ID type and enter the peer ID This entry...

Page 266: ...configured during peer configuration in the IPSec Peers The preshared key is the shared password 3 3 Phase 1 key calculations are authentic ated using the RSA algorithm Local ID Type Only for Internet Key Exchange 4 Select the local ID type Possible ID types 5 I 5I 6 3 Any string Local ID Only for Internet Key Exchange 4 Enter the ID of your device For Authentication Method 3 3 or 3 3 the option U...

Page 267: ...outes Field Description IP Address Assign ment Select the configuration mode of the interface Possible values 3 default value Enter a static IP address Can only be selected for IKEv1 Select this option if your gateway receives an IP ad dress from the server as IPSec client 3 4 Select this option if your gate way assigns an IP address as server for connecting clients This is taken from the selected...

Page 268: ...nel This can be the same IP address as the address configured on your router as the LAN IP address Metric Only for IP Address Assignment 3 or and Default Route Select the priority of the route The lower the value the higher the priority of the route Value range from to The default value is Route Entries Only for IP Address Assignment 3 or Define routing entries for this connection partner 6 IP add...

Page 269: ...thod simplifies many configurations at the same time there can be problems due to competing routes or the coarser filtering of the data traffic The Additional Traffic Filter parameter fixes this problem You can filter more finely i e you can e g specify the source IP address or the source port If there is a Additional Traffic Filter configured it is used to negotiate the IPSec phase 2 SAs the rout...

Page 270: ...nly for Protocol 6 or 6 Enter the source port of the data packets The default setting 1 means that the port remains unspecified Destination IP Ad dress Netmask Enter the destination IP address and corresponding netmask of the data packets Destination Port Only for Protocol 6 or 6 Enter the destination port of the data packets The default set ting 1 means that the port remains unspecified The menu ...

Page 271: ...n menu VPN IPSec Phase 2 Profiles 6 Uses a profile configured in menu VPN IPSec Phase 2 Profiles for Phase 2 XAUTH Profile Select a profile created in VPN IPSec XAUTH Profiles if you wish to use this IPSec peer XAuth for authentication If XAuth is used together with IKE Config Mode the transac tions for XAuth are carried out before the transactions for IKE Config Mode Number of Admitted Connection...

Page 272: ...Depending on the priorities in the current rout ing table the selected interface is used if no more favourable route is available via a different interface Public Source IP Ad dress If you are operating more than one Internet connection in paral lel here you can specify the public IP address that is to be used as the source address for the peer s data traffic Select whether the Public Source IP Ad...

Page 273: ...DynDNS service to enable hosts without fixed IP ad dresses to obtain a secure connection over the Internet This service enables a peer to be identified using a host name that can be resolved by DNS You do not need to configure the IP address of the peer The DynDNS service does not signal whether a peer is actually online and cannot cause a peer to set up an Internet connection to enable an IPSec t...

Page 274: ... actually reach the local device if it initiates the tunnel setup Transfer of IP Address over ISDN Transferring the IP address of a device over ISDN in the D channel and or B channel opens up new possibilities for the configuration of IPSec VPNs This enables restrictions that occur in IPSec configuration with dynamic IP addresses to be avoided Note To use the IP address transfer over ISDN function...

Page 275: ... place in the follow ing steps 1 Peer A the callback initiator sets up a connection to the Internet in order to be as signed a dynamic IP address and be reachable for peer B over the Internet 2 Your device creates a token with a limited validity and saves it together with the cur rent IP address in the MIB entry belonging to peer B 3 Your device sends the initial ISDN call to peer B which transfer...

Page 276: ...the remote device to cause this to set up an IPSec tunnel 4 The local device sends an ISDN call to the remote device to cause this to set up an IPSec tunnel The device does not react to incoming ISDN calls Your device can react to incoming ISDN calls and send ISDN calls to the remote device The setting up of an IPSec tunnel is executed after an incoming ISDN call and initiated by an outgoing ISDN ...

Page 277: ...channel is excluded 1 Your device tries to transfer the IP address in the mode set in the Mode field 1 J 0 Your device tries to transfer the IP address in the mode set in the Mode field If this does not succeed the IP address is transferred in the B channel This incurs costs Your device transfers the IP address in the B channel This incurs costs D Channel Mode Only for Transfer Mode 1 or 1 J 0 Sel...

Page 278: ...ssage hash algorithms for IKE phase 1 on your device The combination of six encryption algorithms and four message hash algorithms gives 24 possible values in this field At least one proposal must exist Therefore the first line of the table cannot be deactivated Encryption algorithms Encryption C 3 default value 3DES is an extension of the DES al gorithm with an effective key length of 112 bits wh...

Page 279: ...key setup low memory requirements high level of se curity against attacks and general speed Here it is used with a key length of 256 bits Hash algorithms Authentication default value MD5 Message Digest 5 is an older hash algorithm It is used with a 96 bit digest length for IPSec 3 SHA1 Secure Hash Algorithm 1 is a hash algorithm developed by NSA United States National Security Associ ation It is r...

Page 280: ...ys As for RFC 2407 the default value is eight hours which means the key must be renewed once eight hours have elapsed The following options are available for defining the Lifetime Input in Seconds Enter the lifetime for phase 1 key in seconds The value can be a whole number from 0 to 2147483647 The default value is Input in kBytes Enter the lifetime for phase 1 keys as amount of data processed in ...

Page 281: ... that a certificate is essential Mode Only for Phase 1 IKE Parameters Select the phase 1 mode Possible values 4 default value The Aggressive Mode is ne cessary if one of the peers does not have a static IP address and preshared keys are used for authentication It requires only three messages to configure a secure channel 6 This mode also designated Main Mode requires six messages for a Diffie Hell...

Page 282: ...ault Make sure you and your peer both use the same name i e that your local ID and the peer ID your partner configures for you are identical Alive Check During communication between two IPSec peers one of the peers may become unavail able e g due to routing problems or a reboot However this can only be detected when the end of the lifetime of the security connection is reached Up until this point ...

Page 283: ...eart beat from the peer but sends one itself 3 Q 1 Your device expects a heartbeat from the peer and sends one itself 6 Use DPD dead peer detection in accordance with RFC 3706 DPD uses a request reply pro tocol to check the availability of the remote terminal and can be configured independently on both sides This option only checks the availability of the peer if data is to be sent to it 6 Use DPD...

Page 284: ... host within a LANs and behind a NAT device to another host or device NAT T enables these kinds of tunnels without conflicts with NAT device activated NAT is automatically detected by the IPSec Daemon and NAT T is used Only for 4 1 Possible values default value NAT Traversal is enabled NAT Traversal is disabled 5 The device always behaves as it would if NAT were in use Only for 4 1 The function is...

Page 285: ...5 characters Proposals In this field you can select any combination of encryption and message hash algorithms for IKE phase 2 on your default The combination of six encryption algorithms and two message hash algorithms gives 12 possible values in this field Encryption algorithms Encryption C 3 default value 3DES is an extension of the DES al gorithm with an effective key length of 112 bits which i...

Page 286: ... slower than Blowfish but faster than 3DES 3 DES is an older encryption algorithm which is rated as weak due to its small effective length of 56 bits Hash algorithms Authentication default value MD5 Message Digest 5 is an older hash algorithm It is used with a 96 bit digest length for IPSec GG All options can be used 3 SHA1 Secure Hash Algorithm 1 is a hash algorithm developed by NSA United States...

Page 287: ... RFC 2407 the default value is eight hours which means the key must be renewed once eight hours have elapsed The following options are available for defining the Lifetime Input in Seconds Enter the lifetime for phase 2 key in seconds The value can be a whole number from to F ECD F The default value is F Input in kBytes Enter the lifetime for phase 2 keys as amount of data processed in Kbytes The v...

Page 288: ...very 5 seconds depend ing on the configuration If these signals are not received after 20 seconds the SA is discarded as invalid Possible values default value Automatic detection of whether the remote terminal is a bintec elmeg device If it is 3 Q 1 for a remote terminal with bintec elmeg or 4 for a remote terminal without bintec el meg is set 4 Your device sends and expects no heartbeat Set this ...

Page 289: ... several branches via IPSec several peers can be con figured A specific user can then use the IPSec tunnel over various peers depending on the assignment of various profiles This is useful for example if an employee works al ternately in different branches if each peer represents a branch and if the employee wishes to have on site access to the tunnel XAuth is carried out once IPSec IKE Phase 1 ha...

Page 290: ...Password Only for Role Enter the authentication password RADIUS Server Group ID Only for Role 3 4 Select the desired list in System Management Remote Au thentication RADIUS configured RADIUS group Users Only for Role 3 4 and Mode G If your gateway is configured as an XAuth server the clients can be authenticated via a locally configured user list Define the members of the user group of this XAUTH ...

Page 291: ...Enter the IP address of the DNS server that is to be used preferably by clients who draw an address from this pool Secondary Optionally enter the IP address of an alternative DNS server 13 1 6 Options The menu VPN IPSec Options consists of the following fields Fields in the Global Options menu Field Description Enable IPSec Select whether you want to activate IPSec The function is enabled with The...

Page 292: ...teroperability flags are set The default values are globally valid and enable your system to work correctly to other bintec elmeg devices so that you only need to change these values if the remote terminal is a third party product or you know special settings are necessary These may be needed for ex ample if the remote end operates with older IPSec implementations The menu Advanced Settings consis...

Page 293: ...ecurity Parameter Index in IKE proposals as they are redundant they are normally set to the value of the negotiation currently in progress Alternatively your device can use zeroes for all values of the cookie In this case select Zero Cookie Size Only for Use Zero Cookies enabled Enter the length in bytes of the zeroed SPI used in IKE propos als The default value is C Dynamic RADIUS Au thentication...

Page 294: ...ether CRLs are to be sent during IKE phase 1 The function is enabled with The function is disabled by default Send Key Hash Pay loads Select whether key hash payloads are to be sent during IKE phase 1 In the default setting the public key hash of the remote end is sent together with the other authentication data Only applies for RSA encryption Activate this function with to sup press this behaviou...

Page 295: ...changed Local Hostname Enter the host name for LNS or LAC G The local hostname is used in outgoing tunnel setup messages to identify this device and is associated with the remote hostname of a tunnel profile configured on the LNS These tunnel setup messages are SCCRQs Start Control Connection Request sent from the LAC and SCCRPs Start Control Connection Reply sent from the LNS G 3 Is the same as t...

Page 296: ... fixed IP address of the LNS used as the destination address for connections based on this profile The destination must be a device that can behave like an LNS UDP Source Port Enter how the port number to be used as the source port for all outgoing L2TP connections based on this profile is to be de termined By default the Fixed option is disabled which means that ports are dynamically assigned to ...

Page 297: ...e fore resending a L2TP control packet for which it received no response The wait time is dynamically extended until it reaches the Max imum Time between Retries The available values are to the default value is Maximum Time between Retries Enter the maximum time in seconds that your device waits before resending a L2TP control packet for which it received no response The available values are E to ...

Page 298: ...he role of the L2TP network server LNS or the functions of a L2TP access concentrator client LAC client Possible values G 3 default value If you select this option the L2TP part ner is configured so that it accepts L2TP tunnels and re stores the encapsulated PPP traffic flow G If you select this option the L2TP partner is configured so that it encapsulates a PPP traffic flow in L2TP and sets up a ...

Page 299: ... Mode Select whether your device is to be assigned a static IP ad dress or whether it should be assigned this dynamically Possible values 3 default value You enter a static IP address 6 4 6 Only for Connection Type G 3 Your device dynamically assigns an IP address to the remote terminal 6 Only for Connection Type G Your device is dynamically assigned an IP address Default Route Only for IP Address...

Page 300: ...consists of the following fields Fields in the Advanced Settings menu Field Description Block after connection failure for Enter the wait time in seconds before the device should try again after an attempt to set up a connection has failed The default value is C Authentication Select the authentication protocol for this L2TP partner Possible values 6 6A 6A 3 6 default value Primarily run CHAP on d...

Page 301: ...it is used to RFC 3078 8 1 MPP encryption V2 with 128 bit is used as compatible with Microsoft and Cisco LCP Alive Check Select whether the availability of the remote terminal is to be checked by sending LCP echo requests or replies This is re commended for leased lines PPTP and L2TP connections The function is enabled with The function is enabled by default Prioritize TCP ACK Packets Select wheth...

Page 302: ...RP for this L2TP partner 1 Your device only responds to an ARP re quest if the status of the connection to the L2TP partner is 1 active or In the case of your device only responds to the ARP request the connection is not set up until someone actually wants to use the route 1 Your device responds to an ARP request only if the status of the connection to the L2TP partner is 1 active i e a connection...

Page 303: ...st a connection to an ISP Internet Service Provider is set up at both sites Once these connections are available a tunnel is set up to the PPTP partner over the Internet using PPTP The PPTP subsystem sets up a control connection between the endpoints of the tunnel This is used to send control data to set up keep alive and terminate the connection between the two PPTP tunnel end points As soon as t...

Page 304: ...tivated The function is enabled with The function is disabled by default Connection Idle Timeout Only if Always on is disabled Enter the idle interval in seconds This determines how many seconds should pass between sending the last traffic data packet and clearing the connection Possible values are to CD seconds deactivates the timeout The default value is C Example for FTP transmission for LAN to...

Page 305: ...er is to be defined as the default route The function is enabled with The function is disabled by default Create NAT Policy Only if IP Address Mode 3 When you configure an PPTP connection specify whether Net work Address Translation NAT is to be enabled The function is enabled with The function is disabled by default Local IP Address Only for IP Address Mode 3 Assign the IP address from your LAN t...

Page 306: ...Authentication Protocol the password is transferred unencrypted 6 Only run CHAP PPP Challenge Handshake Authen tication Protocol as per RFC 1994 password is transferred encrypted 6 6A 6 Primarily run CHAP otherwise PAP 3 64 Only run MS CHAP version 1 PPP Microsoft Challenge Handshake Authentication Protocol 6 6A 6A 3 6 Give priority to CHAP if refused use the authentication protocol requested by t...

Page 307: ... remote terminal is to be checked by sending LCP echo requests or replies This is re commended for leased lines PPTP and L2TP connections The function is enabled with The function is enabled by default Fields in the IP Options menu Field Description OSPF Mode Select whether and how routes are propagated via the inter face and or OSPF protocol packets are to be sent Possible values 6 4 default valu...

Page 308: ...e PPTP partner is 4 i e if a connection to the PPTP partner has already been estab lished DNS Negotiation Select whether your device receives IP addresses for Primary DNS Server and Secondary DNS Server from the PPTP part ner or sends these to the PPTP partner The function is enabled with The function is enabled by default Fields in the PPTP Callback menu Field Description Callback Enables a PPTP ...

Page 309: ...ted over an available ISDN port 31 1 In Specific Ports You can select the re quired ISDN port Specific Ports Only for Selected Ports 31 1 you can select ad ditional ports with Add 13 3 2 Options In this menu you can make general settings of the global PPTP profile The VPN PPTP Options menu consists of the following fields Fields in the Global Options menu Field Description GRE Window Adaption Sele...

Page 310: ...dialling in connection partners for the duration of the connection Any host routes entered always have priority over IP addresses from the address pools This means if an incoming call has been authenticated your device first checks whether a host route is entered in the routing table for this caller If not your device can allocate an IP address from an address pool if available If address pools ha...

Page 311: ...ailable in two versions GRE V 1 for use in PPTP connections RFC 2637 configuration in the PPTP menu GRE V 0 RFC 2784 for general encapsulation using GRE In this menu you can configure a virtual interface for using GRE V 0 The data traffic routed over this interface is then encapsulated using GRE and sent to the specified recipi ent 13 4 1 GRE Tunnels A list of all configured GRE tunnels is display...

Page 312: ...gh the GRE tunnel Route Entries Define other routing entries for this connection partner Add new entries with Add 6 IP address of the destination host or network 0 Netmask for Remote IP Address If no entry is made your device uses a default netmask The lower the value the higher the priority of the route range of values The default value is MTU Enter the maximum packet size Maximum Transfer Unit M...

Page 313: ...The function is disabled by default Key Value Only if Use key is enabled Enter the GRE connection key Possible values are to F ECD F The default value is Gigaset Communications GmbH 13 VPN hybird 120 Gigaset Edition 301 ...

Page 314: ...configuration work for the SIF is comparatively straightforward with systems like Net work Address Translation NAT and IP Access Lists IPAL As SIF NAT and IPAL are active in the system simultaneously attention must be given to possible interaction If any packet is rejected by one of the security instances this is done immediately This is irrelevant whether another instance would accept it or not Y...

Page 315: ...to an existing connection If so it is forwarded If the packet cannot be assigned to an existing connection a check is made to see if a suitable connection is expected e g as affiliated connection of an existing connection If so the packet is also accepted If the packet cannot be assigned to any existing or expected connection the SIF filter rules are applied If a deny rule matches the packet the p...

Page 316: ...e moved 14 1 1 1 New Choose the New button to create additional parameters The menu Firewall Policies Filter Rules New consists of the following fields Fields in the Basic Parameters menu Field Description Source Select one of the preconfigured aliases for the source of the packet In the list all WAN LAN interfaces interface groups see Fire wall Interfaces Groups addresses see Firewall Ad dresses ...

Page 317: ...applied to a filtered packet Possible values default value The packets are forwarded on the basis of the entries The packets are rejected The packets are rejected An error message is is sued to the sender of the packet Apply QoS Only for Action Select whether you want to enable QoS for this policy with the priority selected in Priority The function is enabled with The option is deactivated by defa...

Page 318: ...reasingly larger bandwidths which are not always available Quality of Service QoS makes it possible to distribute the available band widths effectively and intelligently Certain applications can be given preference and band width reserved for them A list of all QoS rules is displayed in the Firewall Policies QoS menu 14 1 2 1 New Choose the New button to set up new QoS rules The Firewall Policies ...

Page 319: ... whether the bandwidth defined in Band width can be exceeded in the longer term By activating this field you specify that it cannot be exceeded If the option is deactivated the bandwidth can be exceeded and the excess data rate is handled in accordance with the priority defined in the firewall policy The option is deactivated by default 14 1 3 Options In this menu you can disable or enable the fir...

Page 320: ...Fields in the Session Timer menu Field Description UDP Inactivity Enter the inactivity time after which a UDP session is to be re garded as expired in seconds Possible values are C to ED The default value is E TCP Inactivity Enter the inactivity time after which a TCP session is to be re garded as expired in seconds Possible values are C to ED The default value is CD PPTP Inactivity Enter the inac...

Page 321: ... Firewall Interfaces Groups New consists of the following fields Fields in the Basic Parameters menu Field Description Description Enter the desired description of the interface group Members Select the members of the group from the available interfaces To do this activate the field in the Selection column 14 3 Addresses 14 3 1 Address List A list of all configured addresses is displayed in the Fi...

Page 322: ...nter the IP address of the host or a network address and the related netmask The default value is Address Range Only for Address Type Enter the start and end IP address of the range 14 3 2 Groups A list of all configured address groups is displayed in the Firewall Addresses Groups menu You can group together addresses This makes it easier to configure firewall rules 14 3 2 1 New Choose the New but...

Page 323: ...Enter an alias for the service you want to configure Protocol Select the protocol on which the service is to be based The most important protocols are available for selection Destination Port Range Only for Protocol 6 6A 6 or 6 In the first field enter the destination port via which the service is to run If a port number range is specified in the second field enter the last port of the port range ...

Page 324: ...specified port number is verified If a port range is to be checked enter the upper limit here Possible values are to D C Type Only for Protocol 6 The Type field shows the class of ICMP messages the Code field specifies the type of message in greater detail Possible values default value 1 3 I 6 6 1 1 1 O 1 0 O 0 1 Code Selection options for the ICMP codes are only available for Type Possible values...

Page 325: ...se the New button to set up additional service groups The menu Firewall Services Groups New consists of the following fields Fields in the Basic Parameters menu Field Description Description Enter the desired description of the service group Members Select the members of the group from the available service ali ases To do this activate the Fields in the Selection column Gigaset Communications GmbH...

Page 326: ...P network is usually located by its IP address Because host names are often used in networks to reach different devices it is necessary for the asso ciated IP address to be known This task can be performed by a DNS server which re solves the host names into IP addresses Alternatively name resolution can also take place over the HOSTS file which is available on all PCs Your device offers the follow...

Page 327: ...eried and then the secondary DNS server If one of the DNS servers can resolve the name the information is forwarded and a dynamic entry created in the cache 4 Otherwise if a suitable Internet or dialin connection is selected as the standard inter face the relevant DNS server is asked depending on the configuration of the Inter net or dialin connections if necessary by setting up a WAN connection a...

Page 328: ...tored in the cache The function is activated by selecting The function is enabled by default Negative Cache Select whether the negative dynamic cache is to be activated i e whether queried names for which a DNS server has sent a negative response are stored as negative entries in the cache The function is activated by selecting The function is enabled by default Cache Size Enter the maximum total ...

Page 329: ...lt value is i e a one time connection is set up to the first suitable connection partner configured in the system Fields in the IP address to use for DNS WINS server assignment menu Field Description As DHCP Server Select which name server addresses are sent to the DHCP cli ent if your device is used as DHCP server Possible values No name server address is sent 8 6 default value The address of you...

Page 330: ...ifferent providers have been set up via different interfaces and load balancing is be ing used The Local Services DNS DNS Servers New menu consists of the following fields Fields in the Basic Parameters menu Field Description Admin Status Select whether the DNS server should be enabled The function is activated by selecting The function is enabled by default Description Enter a description for DNS...

Page 331: ...ng For Interface Mode 3 A DNS server is configured for all interfaces with the setting Primary DNS Server Only if Interface Mode Enter the IP address of the first name server for Internet ad dress name resolution Secondary DNS Server Only if Interface Mode Optionally enter the IP address of an alternative name server 15 1 3 Static Hosts A list of all configured static hosts is displayed in the Loc...

Page 332: ...s 4 A DNS request for DNS Hostname gets a negat ive response 6 4 default value A DNS request for DNS Host name is answered with the related IP Address A DNS request is ignored no answer is given IP Address Only if Response 6 4 Enter the IP address assigned to DNS Hostname TTL Enter the validity period of the assignment from DNS Host name to IP Address in seconds only relevant for Response 6 4 tran...

Page 333: ...r the name of the domain to be forwarded The entry can also start with the wildcard e g bintec elmeg com If a name is entered without a full stop you complete with OK Default Domain is added Forward to Select the forwarding destination requests to the name defined in Host or Domain Possible values default value The request is forwarded to the defined Interface 3 3 4 The request is forwarded to the...

Page 334: ...d Description Received DNS Packets Shows the number of received DNS packets addressed direct to your device including the response packets for forwarded requests Invalid DNS Packets Shows the number of invalid DNS packets received and ad dressed direct to your device DNS Requests Shows the number of valid DNS requests received and ad dressed direct to your device Cache Hits Shows the number of req...

Page 335: ... of the backed up configuration connection via HTTPS The Local Services HTTPS HTTPS Server menu consists of the following fields Fields in the HTTPS Parameters menu Field Description HTTPS TCP Port Enter the port via which the HTTPS connection is to be estab lished Possible values are to D C The default value is C Local Certificate Select a certificate that you want to use for the HTTPS connec tio...

Page 336: ...you of the task of answer ing all DNS requests concerning the host K 1 4 with the dynam ic IP address of your device To ensure that the provider always knows the current IP address of your device your device contacts the provider when setting up a new connection and propagates its present IP address 15 3 1 DynDNS Update In the Local Services DynDNS Client DynDNS Update menu a list of all configure...

Page 337: ...3 Enable update Select whether the DynDNS entry configured here is to be ac tivated The function is activated by selecting The function is disabled by default The menu Advanced Settings consists of the following fields Fields in the Advanced Settings menu Field Description Mail Exchanger MX Enter the full host name of a mail server to which e mails are to be forwarded if the host currently configu...

Page 338: ...ovider Name Enter a name for this entry Server Enter the host name or IP address of the server on which the provider s DynDNS service runs Update Path Enter the path on the provider s server that contains the script for managing the IP address of your device Ask your provider for the path to be used Port Enter the port at which your device is to reach your provider s server Ask your provider for t...

Page 339: ... time it sends a DHCP request with its MAC address to the available DHCP server as a network broadcast The client then receives its IP address from bintec elmeg as part of a brief exchange You therefore do not need to allocate fixed IP addresses to PCs which reduces the amount of configuration work in your network To do this you set up a pool of IP ad dresses from which your device assigns IP addr...

Page 340: ...ess from this pool Secondary Optionally enter the IP address of an alternative DNS server 15 4 2 DHCP Configuration To activate your device as a DHCP server you must first define IP address pools from which the IP addresses are distributed to the requesting clients A list of all configured IP address pools is displayed in the Local Services DHCP Server DHCP Configuration menu In the list for each ...

Page 341: ...e IP pool is used for DHCP requests in the same subnet or for DHCP requests that have been forwarded to your device from another subnet In this case it is possible to define IP addresses from another network Possible values G default value The DHCP pool is only used for DH CP requests in the same subnet The DHCP pool is only used for DHCP requests for warded from other subnets G A The DHCP pool is...

Page 342: ...ter the DNS domain to be sent to the client 3A 3 3 4 Enter the IP address of the WINS NBNS server to be sent to the client 3A 1 Select the type of the WINS NBT node to be sent to the client 5 6 3 4 Enter the IP address of the TFTP server to be sent to the client 6 6 Enter the IP address of the CAP WAP controller to be sent to the client G 1 4 4 This option enables you to send a client any URL Use ...

Page 343: ...ver Possible values 3 default value Provisioning Server code 3 Your device does not currently use this parameter Enter which manufacturer value shall be transmitted For the setting Select vendor 3 the default value 1 is displayed You can complete the IP address of the desired server 15 4 3 IP MAC Binding The Local Services DHCP Server IP MAC Binding menu displays a list of all clients that receive...

Page 344: ... assigned MAC Address Enter the MAC address to which the IP address specified in IP Address is to be assigned 15 4 4 DHCP Relay Settings If your device for the local network does not distribute any IP addresses to the clients by DHCP it can still forward the DHCP requests on behalf of the local network to a remote DHCP server The DHCP server then assigns the your device an IP address from its pool...

Page 345: ... to receive and send faxes Note All incoming calls to the CAPI are offered to all registered and eavesdrop ping CAPI applications in the LAN In the ex works state a user with the user name and no password is entered for the CAPI subsystem Once you ve created your intended users with password you should delete the user without password 15 5 1 User A list of all configured CAPI users is displayed in...

Page 346: ...g fields Fields in the Basic Parameters menu Field Description Enable server Select whether your device is to be enabled as a CAPI server The function is activated by selecting The function is enabled by default Faxheader Select whether the fax header should be printed at the top of outgoing faxes The function is activated by selecting The function is disabled by default CAPI Server TCP Port The f...

Page 347: ...e to set up every MIB variable as initiator with any value To take the event scheduler live enable the Schedule Interval under Options This inter val species the time gap in which the system checks whether at least one event has oc curred This event is used as the initiator for a configured action Caution The configuration of actions that are not available as defaults requires ex tensive knowledge...

Page 348: ...n Only for Event List 8 Enter your chosen designation for the event list Event Type Select the type of event Possible values default value The operations configured and as signed in Actions are initiated at specific points in time A3 6 The actions configured and assigned in Actions are initiated when the defined MIB variables assumes the as signed values 3 Operations configured and assigned in Act...

Page 349: ...e Only for Event Type A3 6 Enter the value of the MIB variable Index Variables Only for Event Type A3 6 Where required select MIB variables to uniquely identify a spe cific data set in the MIB Table e g The unique identification of a particular table entry is derived from the com bination of Index Variable usually an index variable which is flagged with and Index Value Use Index Variables to creat...

Page 350: ...t Type Enter the desired value in kBytes for the data traffic to serve as comparison The default value is Destination IP Address Only for Event Type 6 Enter the IP address whose accessibility is to be checked Source IP Address Only for Event Type 6 Enter an IP address to be used as sender address for the ping test Possible values default value The IP address of the interface over which the ping is...

Page 351: ...e G Enter the desired value for the remaining validity of the certific ate in percentage Fields in the menu Select time interval Field Description Time Condition For Event Type only First select the type of time entry in Condition Type Possible values 0 Select a weekday in Condition Settings 6 default value In Condition Settings select a particular period Select a specific day of the month in Con ...

Page 352: ...or is to be deactivated De activation is carried on the next scheduling interval If you do not enter a Stop Time or set a Stop Time Start Time the initiator is activated and deactivated after 10 seconds 15 6 2 Actions In the Local Services Scheduling Actions menu is displayed a list of all operations to be initiated by events or event chains configured in Local Services Scheduling Trig ger 15 6 2 ...

Page 353: ... Scheduling Trigger Event List Condition For the selected chains of events select how many of the con figured events must occur for the operation to be initiated Possible values default value The operation is initiated if all events oc cur The operation is initiated if a single event occurs The operation is triggered if no event occurs The operation is triggered if one of the events does not occur...

Page 354: ...ble usually an index variable which is flagged with and Index Value Use Index Variables to create more entries with Add Trigger Status Only if Command Type A3 6 Select what status the event must have in order to modify the MIB variable as defined Possible values 4 default value The value of the MIB variable is modified if the initiator is active 4 The value of the MIB variable is modified if the i...

Page 355: ... status should be changed Set interface status Only if Command Type 3 Select the status to be set for the interface Possible values 1 default value 8 Source Location Only if Command Type 3 8 1 Select the source for the software update Possible values 3 8 1 3 4 default value The latest software will be downloaded from the up date server 6 3 4 The latest software will be downloaded from an HTTP serv...

Page 356: ...e backed up File Name For Command Type 3 8 1 Enter the file name of the software version Where Command Type with Action 1 Enter the file name of the certificate file Action For Command Type Select which operation is to be performed on a configuration file Possible values 1 default value 1 1 For Command Type Select which operation you wish to perform on a certificate file Possible values 1 default ...

Page 357: ...x cel for example The function is enabled by default Remote File Name Only if Command Type For Action 1 Enter the name of the file under which it is saved on the server from which it is to be retrieved For Action 1 Enter the file name under which it should be saved on the serv er Local File Name Only where Command Type and Action 1 or 1 At import renaming or copying enter a name for the configura ...

Page 358: ...ration are to be imported or exported The function is disabled by default Encrypt configuration Only where Command Type and Action 1 or 1 Define whether the data of the selected Action are to be en crypted The function is disabled by default Reboot after execution Only if Command Type Select whether your device should restart after the intended Action The function is disabled by default Version Ch...

Page 359: ...atically entered as sender address 31 Enter the desired IP address in the input field Interval Only if Command Type 6 Enter the time in Seconds after which a ping must be resent The default value is second Count Only if Command Type 6 Enter the number of ping tests to be performed until Destina tion IP Address is considered unreachable The default value is C Server Address Only where Command Type ...

Page 360: ...The function is disabled by default Write certificate in configuration Only where Command Type and Action 1 Select whether to integrate the certificate in a configuration file and if so select the desired configuration file The function is disabled by default Certificate Request Description Only where Command Type and Action 3 6 Enter a description under which the SCEP certificate on your device i...

Page 361: ...ion authority here Key Size Only where Command Type and Action 3 6 Select the length of the key to be created Possible values are default value E and BD Autosave Mode Only where Command Type and Action 3 6 Select whether your device automatically stores the various steps of the enrolment internally This is an advantage if enrol ment cannot be concluded immediately If the status has not been saved ...

Page 362: ...Scheduling Options menu consists of the following fields Fields in the Scheduling Options menu Field Description Schedule Interval Select whether the schedule interval is to be enabled for the in terface Enter the period of time in seconds after which the system checks whether configured events have occurred Possible values are to D C The value C is recommended 5 minute accuracy 15 7 Surveillance ...

Page 363: ... not yet been created a new group is created using the 8 option If entries have been created you can se lect one from the list of created groups Each host to be monitored must be assigned to a group The operation configured in Interface is only executed if no group member can be reached Fields in the Trigger menu Field Description Monitored IP Address Enter the IP address of the host to be monitor...

Page 364: ...y for example when a host is deemed to be accessible once more and used again instead of a backup device Possible values are to D CD The default value is C Unsuccessful Trials Specify how many pings need to be unanswered for the host to be regarded as inaccessible You can use this setting to specify for example when a host is deemed to be inaccessible and that a backup device should be used Possib...

Page 365: ...t up monitoring for other interfaces The menu Local Services Surveillance Interfaces New consists of the following fields Fields in the Basic Parameters menu Field Description Monitored Interface Select the interface on your device that is to be monitored Trigger Select the state or state transition of Monitored Interface that is to trigger a particular Interface Action Possible values 1 default v...

Page 366: ...s Surveillance Ping Generator New consists of the follow ing fields Fields in the Basic Parameters menu Field Description Destination IP Address Enter the IP address to which the ping is automatically sent Source IP Address Enter the source IP address of the outgoing ICMP echo re quest packets Possible values The IP address is determined automatically 31 default value Enter the IP address in the a...

Page 367: ...this the UPnP function on the PC must be enabled The pre configured port used for UPnP communication between LAN UPnP clients and the gateway is DFE The LAN UPnP client acts as a so called service control point i e it recognizes and controls the UPnP devices on the network The ports assigned dynamically by for example MSN Messenger lie in the range from to D C The ports are released internally to ...

Page 368: ...mine whether the NAT configuration of this interface is controlled by UPnP The function is enabled with The function is disabled by default 15 8 2 General In this menu you make the basic UPnP settings The Local Services UPnP General menu consists of the following fields Fields in the General menu Field Description UPnP Status Decide how the gateway processes UPnP requests from the LAN The function...

Page 369: ...otspot server When a new user connects with the Hotspot he she is automatically assigned an IP ad dress via DHCP As soon as he attempts to access any Internet site with a browser the user is redirected to the home login page After the user has entered the registration data user password these are sent to the central RADIUS server Hotspot server as RADIUS registration Following successful registrat...

Page 370: ... for customers by customer dealer Walled Garden Network Individually set for customers by customer dealer Walled Garden Server URL Individually set for customers by customer dealer Terms Conditions URL Individually set for customers by customer dealer Access data for configuration of the Hotspot server Admin URL https hotspot bintec elmeg com Username Individually set by bintec elmeg Password Indi...

Page 371: ...reasons you cannot configure your device over an interface that is configured for the Hotspot Therefore take care when selecting the interface you want to use for the Hotspot If you select the interface over which the current configuration session is running the current con nection will be lost You must then log in again over a reachable interface that is not configured for the Hotspot to configur...

Page 372: ...y if Walled Garden is enabled In the Terms Conditions input field enter the address of the general terms and conditions on the intranet server or public server e g http www webserver de agb htm The page must lie within the address range of the walled garden network Additional freely ac cessible Domain Names Only if Walled Garden is enabled Add further URLs or IP addresses with Add The web pages ca...

Page 373: ...two frames When the function is enabled the login form displays on the left hand side When the function is disabled only the website with informa tion advertising and or links to freely accessible websites is displayed The function is enabled by default Pop Up window for status indication Specify whether the device uses pop up windows to display the status The function is enabled by default Defaul...

Page 374: ... computer is switched off You can use filters and rule chains to define the condi tions that need to be met to send the so called magic packet and select the interfaces that are to be monitored for the defined rule chains Configuring the filters and rule chains is largely like configuring filters and rule chains in the menu Access Rules 15 10 1 Wake On LAN Filter The menu Local Services Wake On LA...

Page 375: ...1 1 1 See RFC 792 The default value is Connection State With Protocol 6 you can define a filter that takes the status of the TCP connections into account Possible values All TCP packets that would not open any new TCP connection on routing over the gateway match the filter default value All TCP packets match the filter Destination IP Ad dress Netmask Enter the destination IP address of the data pa...

Page 376: ...ination port 31 1 Enter a destination port range DSCP TOS Filter Layer 3 Select the Type of Service TOS Possible values default value The type of service is ignored 3 6 Differentiated Services Code Point according to RFC 3260 is used to signal the priority of IP packets indicated in binary format 6 bit 3 6 Differentiated Services Code Point according to RFC 3260 is used to signal the priority of I...

Page 377: ...ies Choose the New button to enter additional rules The Local Services Wake On LAN WOL Rules New menu consists of the following fields Fields in the menu Basic Parameters Field Description Wake On LAN Rule Chain Select whether to create a new rule chain or to edit an existing one Possible values 8 default value You can create a new rule chain with this setting Shows a rule chain that has already b...

Page 378: ...the next one in the chain is examined Type Select whether the Wake on LAN magic packet is to be sent as a UDP packet or as an Ethernet frame via the interface spe cified in Send WOL packet via interface Send WOL packet via interface Select the interface which is to be used to send the Wake on LAN magic packet Target MAC Address Only where Action 4 0 G and 4 0 Enter the MAC address of the network d...

Page 379: ...signment menu 15 10 3 1 Edit or New Choose the icon to edit existing entries Choose the New button to create other entries The Local Services Wake On LAN Interface Assignment New menu consists of the following fields Fields in the menu Basic Parameters Field Description Interface Select the interface for which a configured rule chain is to be assigned Rule Chain Select a rule chain Gigaset Communi...

Page 380: ...AN or an internet ad dress can be reached The Output field displays the ping test messages The ping test is launched by entering the IP address to be tested in Test Ping Address and clicking the Go button 16 1 2 DNS Test The DNS test is used to check whether the domain name of a particular host is correctly resolved The Output field displays the DSN test messages The ping test is launched by enter...

Page 381: ...rrupted update e g power failure during the update could be that your gateway no longer boots Do not turn your device off dur ing the update An update of BOOTmonitor and or Logic is recommended in a few cases In this case the release notes refer expressly to this fact Only update BOOT monitor or Logic if bintec elmeg GmbH explicitly recommends this Flash Your device saves its configuration in conf...

Page 382: ...ntial configuration data can be protected fully if required You can save or import files with the actions Export configuration Export configuration with status information and Load configuration If you want to save a configuration file with the action Export configuration or Export configuration with status information you can choose whether the configuration file is saved encrypted or without enc...

Page 383: ... 1 The configuration file in the Source File Name field is saved as Destination File Name The configuration in the Select file field is deleted The configuration file in the Se lect file field is renamed to New File Name 0 1 Only if under Save configuration with the setting 3 4 0 1 1 4 the current configuration was saved as boot configuration and the previ ous boot configuration was also archived ...

Page 384: ...he files to be imported must be in CSV format 1 You can import additional language versions of the GUI into your device You can download the files to your PC from the download area at www gigasetpro com and from there import them to your device 1 8 You can launch an update of the system software the ADSL logic and the BOOTmonitor 1 The configuration file Current File Name in Flash is transferred t...

Page 385: ...Only for Action 1 1 1 8 Define whether the data of the selected Action are to be encrypted The function is activated by selecting The function is disabled by default If the function is enabled you can enter the Password in the text field Filename Only for Action 1 1 1 8 Enter the path and name of the file or select the file with Browse via the explorer finder Source Location Only for Action 1 8 Se...

Page 386: ...tes and keys The function is activated by selecting The function is enabled by default Source File Name Only for Action 1 Select the source file to be copied Destination File Name Only for Action 1 Enter the name of the copy Select file Only for Action or 8 A 8 Select the file or configuration to be renamed or deleted New File Name Only for Action Enter the new name of the configuration file 16 3 ...

Page 387: ...on control Note Note that immediate software updates for DECT multi cell systems are only available via the system s web configurator and that they cannot be initiated by the elmeg hybird GUI Values in the list Gigaset Phones Field Description Description Displays the description entered for the system telephone Phone Type Displays the system telephone type MAC Address Shows the system telephone s...

Page 388: ... line or select them all using the Select all button or the Deselect all button Update immediately Displays whether the system telephone software should be up dated immediately This function is enabled on an individual device by setting a checkmark The function is disabled by default You can use the Select all and Deselect all buttons for all the devices displayed 16 3 2 Firmware Files In the Main...

Page 389: ...tware You can save a telephone number that may be used in case a system software update has failed You can dial this number with the telephone in order to update the system software once the telephone is in boot mode fol lowing a failed update The Maintenance Phone Update Settings menu consists of the following fields Fields in the menu Time Settings for System Phone Firmware Update Field Descript...

Page 390: ...rigger an immediate reboot of your device Once your system has restarted you must call the GUI again and log in Pay attention to the LEDs on your device For information on the meaning of the LEDs see the Technical Data chapter of the manual Note Before a reboot make sure you confirm your configuration changes by click ing the Save configuration button so that these are not lost when you re boot If...

Page 391: ...mitted to one or more external PCs for storage and processing e g to the system administrator s PC The syslog messages saved internally on your device are lost when you reboot Warning Make sure you only pass syslog messages to a safe computer Check the data regularly and ensure that there is always enough spare capacity avail able on the hard disk of your PC Syslog Daemon All Unix operating system...

Page 392: ...ch syslog messages are passed Level Select the priority of the syslog messages that are to be sent to the host Possible values highest priority default value lowest priority Syslog messages are only sent to the host if they have a high er or identical priority to that indicated i e at syslog level all messages generated are forwarded to the host Facility Enter the syslog facility on the host This ...

Page 393: ... is often collected for commercial reasons This in formation is extremely important for Internet Service Providers that bill their customers by data volume However there are also non commercial reasons for detailed network accounting If for example you manage a server that provides different kinds of network services it is use ful for you to know how much data is generated by the individual servic...

Page 394: ...ages The messages can contain character strings in any order sequences separated by a slash e g U or U or defined tags Possible format tags Format tags for IP Accounting messages Field Description d Date of the session start in the format DD MM YY t Time of the session start in the format HH MM SS a Duration of the session in seconds c Protocol i Source IP Address r Source Port f Source interface ...

Page 395: ... The entry is limited to 40 characters Message Compression Select whether the text in the alert E mail is to be shortened The e mail then contains the syslog message only once plus the number of relevant events Enable or disable the field The function is enabled by default Subject You can enter a subject Matching String You must enter a Matching String This must occur in a sys log message as a nec...

Page 396: ...g messages that must be reached before an E mail can be sent for this case If timeout is con figured the mail is sent when this expires even if the number of messages has not been reached Possible values are to BB the default value is 17 3 2 Alert Settings The menu External Reporting Alert Service Alert Settings consists of the following fields Fields in the Basic Parameters menu Field Description...

Page 397: ...ogs in with the correct user name and password 3 6 6 6 The server requires that e mails are called via POP3 by the sending IP with the correct POP3 user name and password before sending an e mail User Name Only if SMTP Authentication 3 6 or 3 6 6 6 Enter the user name for the POP3 or SMTP server Password Only if SMTP Authentication 3 6 or 3 6 6 6 Enter the password of this user POP3 Server Only if...

Page 398: ...7 4 1 SNMP Trap Options In the event of errors a message known as a trap packet is sent unrequested to monit or the system In the External Reporting SNMP SNMP Trap Options menu you can configure the sending of traps The menu External Reporting SNMP SNMP Trap Options consists of the following fields Fields in the Basic Parameters menu Field Description SNMP Trap Broadcast ing Select whether the tra...

Page 399: ... Trap Hosts In this menu you specify the IP addresses to which your device is to send the SNMP traps In the External Reporting SNMP SNMP Trap Hosts menu a list of all configured SN MP trap hosts is displayed 17 4 2 1 New Select the Newbutton to create additional SNMP trap hosts The menu External Reporting SNMP SNMP Trap Hosts New consists of the follow ing fields Fields in the Basic Parameters men...

Page 400: ...ys the user s internal number Name Displays the name assigned to the user If a voicemail system is active 3 is dis played Current Class of Ser vice Displays the all of the authorisation classes assigned to the user The currently enabled authorisation class is marked ap propriately with a green arrow Terminal Displays the interface assigned to this subscriber Charges Displays calculated charges for...

Page 401: ...e button you display detailed statistics for the respective team Values in the Team Status list Field Description Name Displays the name assigned to the team Number Displays the team s internal number Users assigned Users logged on Displays the users assigned to the team and how many of these users are logged in Call Forwarding Displays current call forwarding for this team Values in the System Se...

Page 402: ... Internal Log System Messages menu a list of all internally stored system messages is displayed Above the table you will find the configured vales for the Maximum Number of Syslog Entries and Maximum Message Level of Syslog Entries fields These values can be changed in the System Management Global Settings System menu Values in the System Messages list Field Description No Displays the serial numb...

Page 403: ...of the IPSec tunnel by clicking the button or the button in the Action column By clicking the button you display detailed statistics on the IPSec connection Values in the IPSec Tunnels list Field Description Description Shows the description of the peer Local IP Address Shows the WAN IP address of your device Remote IP Address Shows the WAN IP address of the connection partner Local ID Shows the I...

Page 404: ... 2 IPSec Statistics In the Monitoring IPSec IPSec Statistics menu statistical values for all IPSec con nections are displayed The Monitoring IPSec IPSec Statistics menu consists of the following fields Fields in the Licences menu Field Description IPSec Tunnels Shows the IPSec licences currently in use In Use and the maximum number of licenses usable Maximum Fields in the Peers menu Field Descript...

Page 405: ...ng In or outgoing Out packets Encrypted Shows the number of all incoming In or outgoing Out pack ets protected by IPSec Errors Shows the number of incoming In or outgoing Out packets for which processing led to errors 18 4 Interfaces 18 4 1 Statistics In the Monitoring Interfaces Statistics menu current values and activities of all device interfaces are displayed With the filter bar you can select...

Page 406: ... interfaces in detail Values in the Statistics list Field Description Description Displays the name of the interface MAC Address Displays the interface text IP Address Netmask Shows the IP address and the netmask NAT Indicates if NAT is activated for this interface Tx Packets Shows the total number of packets sent Tx Bytes Displays the total number of octets sent Rx Packets Shows the total number ...

Page 407: ...he user Logon Displays the time of the notification Interface Shows the interface used 18 6 QoS In the Monitoring QoS menu statistics are displayed for interfaces on which QoS has been configured 18 6 1 QoS A list of all interfaces for which QoS was configured is displayed in the Monitoring QoS QoS menu Values in the QoS list Field Description Interface Shows the interface for which QoS has been c...

Page 408: ...r of rejected packets with the corresponding packet class in case of overloading Queued Shows the number of waiting packets with the corresponding packet class in case of overloading 18 Monitoring Gigaset Communications GmbH 396 hybird 120 Gigaset Edition ...

Page 409: ...l 93 Address Mode 180 Address Range 310 Address Type 310 Address List 309 Address Subnet 310 Addresses 69 309 Admin Password 118 122 Administration 185 Administrative Status 253 318 Administrative Access 24 ADSL Logic 370 Agents 163 Agents assigned 160 Agents in Wrap up 160 Agents logged on 160 Alarm Signalling Period 170 Alarm Calls 169 Alarm Input 9 Alert Service 383 Alert Service 384 Alert Reci...

Page 410: ...one Detection 59 Busy when 162 Bytes 391 C CA Certificate 44 CA Certificates 270 CA Name 340 Cache 322 Cache Hitrate 322 Cache Hits 322 Cache Size 316 Calendar 141 Calendar for status Out of Office 173 Call Forwarding extern SIP 302 65 Call Number 247 Call Switching 148 Call Through 90 96 153 Call Waiting 96 128 Call Forwarding 388 389 Call Waiting 388 Call Forwarding 133 Call Distribution 112 Cal...

Page 411: ...06 250 Controlled Interfaces 249 COS Filter 802 1p Layer 2 201 214 362 Costs 157 Count 340 Country 46 Country Profile 7 CPU Usage 3 Create NAT Policy 234 238 242 287 293 CRLs 49 CSV File Format 340 Currency 8 Current Class of Service 388 Current File Name in Flash 370 Current Local Time 13 Current Speed Mode 52 Custom 46 D D Channel Mode 264 Data Packets Sequence Numbers 285 Date 12 157 157 390 Da...

Page 412: ...32 Direct Call Number 133 Direction 203 Display Language 7 Displayed Description 86 88 118 122 Displayed Name 79 DNS 314 DNS Hostname 320 DNS Negotiation 235 239 247 289 295 DNS Server 249 279 298 321 328 DNS Requests 322 DNS Servers 318 DNS Test 368 Do not Disturb 128 Do not Disturb 388 Domain 61 321 Domain Forwarding 320 Domain at the HotSpot Server 359 Domain Name 316 Doorcom Access 103 Doorcom...

Page 413: ...nections 16 F Facility 380 Fallback interface to get DNS server 316 Faxheader 334 Features 94 File Encoding 48 49 File Name 340 File Name in Flash 340 Filename 370 Filter 203 Filter Rules 306 Filter Rules 303 Firewall 302 Firewall Status 307 Firmware Update 377 Firmware Files 376 First Timeserver 14 First External Number 171 Flash Time for DTMF Dialling 129 Force certificate to be trusted 42 Forwa...

Page 414: ...mber 296 Incoming Phone Number 264 Index Variables 336 340 Info Message UUS1 170 Inhibited number 136 Int No 157 157 Interconnect external calls 6 Interface 24 24 126 127 157 157 165 169 184 186 192 192 195 206 219 226 250 306 318 321 324 329 340 353 356 359 367 395 395 Interface Action 353 Interface Mode 180 318 Interface Status 336 Interface Traffic Condition 336 Interface Description 23 Interfa...

Page 415: ...ronisation 55 ISDN External 54 ISDN Internal 55 ISDN Login 24 ISDN Ports 53 K Key Size 340 Key Value 299 L L2TP 282 LAN 179 Language 173 177 Language for login window 359 Last configuration stored 2 Last Member Query Interval 226 Layer 4 Protocol 189 LCP Alive Check 235 239 288 294 LDAP URL Path 50 Lease Time 329 Level 380 390 Level No 38 Licence Key 19 Licence Serial Number 19 License Allocation ...

Page 416: ...between Retries 285 Maximum TTL for Negative Cache Entries 316 Maximum TTL for Positive Cache Entries 316 Maximum Upload Speed 206 209 250 Members 309 313 Memory Usage 3 Memory Card 3 Message 390 Message Compression 383 Message Timeout 383 Messages 391 Metric 188 192 255 MIB Variables 340 MIB SNMP Variable to add edit 340 Min queue size 212 Mini Call Center 159 Minimum Time between Retries 285 Mis...

Page 417: ...ional Rerouting 88 Options 37 192 227 279 290 297 307 334 350 362 369 382 Organization 46 Organizational Unit 46 OSPF Mode 247 289 295 Other Inactivity 308 Other phones 123 Outbound Interface 209 Outgoing 156 Outgoing Signalisation 62 77 86 Outgoing Signalisation 86 Outgoing Services 132 Outgoing ISDN Number 296 Outgoing Phone Number 264 Overbooking allowed 209 Overview 131 Overwrite similar certi...

Page 418: ...ress Mode 239 PPTP Ethernet Interface 237 PPTP Mode 291 Preshared Key 253 Primary DHCP Server 332 Primary DNS Server 318 Prioritisation Algorithm 206 Prioritize TCP ACK Packets 235 239 288 294 Priority 31 35 209 304 318 Priority Number 136 Priority Numbers 136 Priority Queueing 209 Privacy Number Truncation 158 Project Code 157 157 Propagate PMTU 275 Proposals 266 273 Protocol 196 201 214 258 311 ...

Page 419: ...ddressHost Name 291 Remote User for Dialin only 241 Repeat after 170 Reporting Method 219 Rerouting 145 Rerouting Application 88 113 Rerouting Function 162 Rerouting Applications 149 Rerouting Functions 145 Rerouting of Incoming Distribution 9 Rerouting on no response 111 162 Rerouting on no response 389 Rerouting to Number 115 Rerouting to Number 6 Response 320 Restore Default Settings 24 Retries...

Page 420: ...me 128 Show incoming Name CNIP 128 Show incoming Number CLIP 128 Show incoming waiting Number CLIP off Hook 128 Show new Messages MWI 129 Show Outgoing Number CLIP 93 Show passwords and keys in clear text 12 Signal remote caller number 62 77 Signal fixed out number 62 77 Signalling 110 167 389 Silent Deny 219 Silent Deny 193 Simultaneous on no response 107 167 Single Number MSN 79 SIP Provider 61 ...

Page 421: ...witch Port 52 Switch call signalling 106 149 161 Switch call signalling 389 Switch signalling variants manually 96 Switch to SNMP Browser 38 Switching Points 142 143 Sync SAs with ISP interface state 280 Syslog 379 Syslog Servers 379 System 4 System Logic 370 System Name 4 System Licences 19 System Messages 390 System Reboot 378 System Management 2 System Date 2 System Parked Enquiry 17 System Par...

Page 422: ...le 286 Tunnel Profiles 283 Tx Bytes 393 394 Tx Errors 393 Tx Packets 393 394 Type 69 201 214 311 362 393 Type of Messages 380 Type of Number 78 79 Type of Rerouting Application 149 Type of traffic 195 Type of Call Forwarding 134 Type of Rerouting Function 145 U UDP Inactivity 308 UDP Destination Port 284 UDP Destination Port 291 UDP Port 32 UDP Source Port 284 UDP Source Port Selection 291 Unchang...

Page 423: ...251 W Waiting Calls 160 Wake On LAN 362 Wake On LAN Filter 362 Wake On LAN Filter 365 Wake On LAN Rule Chain 365 Walled Garden 359 Walled Garden URL 359 Walled Network Netmask 359 WAN 230 Wave Files 151 Wave File 170 Web Access Password 156 158 164 Web Access Username 156 158 164 Weight 209 Wildcard 325 WINS Server 316 WOL Rules 365 Wrap up Time 164 Wrap up Timer 107 Write certificate in configura...

Reviews: