background image

innovaphone gateway

Page 101

(often http or ftp) and the location of the resource in computer networks. 
The name of the URI schema is therefore normally derived from the network 
protocol used for this. Examples here are HTTP or FTP.

UTC

UTC (

U

niversal 

T

ime 

C

oordinated) is the current (coordinated) world time, 

replacing in this function GMT time (

G

reenwich 

M

ean 

T

ime). It is a 

combination of the international atomic time TAI (

T

empus 

A

tomique 

I

nternational) and the UT (

U

niversal 

T

ime). The time zones are specified as 

a positive or negative time difference from UTC (for example, UTC+2 
corresponds to MEST). UTC combines the physical atomic time (TA) with the 
astronomical time (UT), and is also called civil time.

µ-law

The µ-law method is a digitization method for analogue audio signals, which 
is standardised in the G.711 recommendation of the ITU (

I

nternational 

T

elecommunication 

U

nion). Like the A-law method, the µ-law method uses a 

logarithmic quantisation characteristic curve to achieve a better signal-to-
noise ratio. With this method, 8-bit values are likewise generated. However, 
the quantisation characteristic curve for low levels is steeper. In addition, the 
encoding is not designed to generate continuous sequences of 0s, but 
continually changing bit states. In this way, a particular method for timing 
recovery on the side of the receiver of the digital signal is simplified. The µ-
law method is used by the PCM technique in North America and Japan.

V

VLAN

VLANs (

V

irtual 

L

ocal 

A

rea 

N

etwork) are a technological concept for 

implementing logical workgroups within a network. This kind of network is 
implemented using LAN switching or virtual routing on the data link layer or 
on the network layer. Virtual networks are set up through a number of 
switching hubs, which are connected together through a backbone.

VPN

The term VPN (

V

irtual 

P

rivate 

N

etwork) is used with different meanings. 

Very generally, one refers to a VPN if customer-specific, logical subnetworks 
are being created within a public switched network. They may be networks 
for voice communication, or X.25, Frame Relay or ISDN networks. The usual 

Summary of Contents for IP1200

Page 1: ...P u r e I P T e l e p h o n y IP gateway IP1200 Administrator Manual ...

Page 2: ... by any other means or processed duplicated or distributed using electronic systems without explicit approval Texts and illustrations have been compiled and software created with the utmost care However errors cannot be completely ruled out This documentation is therefore supplied under exclusion of any liability or warranty of suitability for specific purposes innovaphone reserves the right to im...

Page 3: ...ease 6 0 3rd edition April 2007 PDF version available for download at http www innovaphone com Copyright 2001 2007 innovaphone AG Böblinger Str 76 71065 Sindelfingen Germany Phone 49 7031 73009 0 Fax 49 7031 73009 99 http www innovaphone com ...

Page 4: ...densing Storage temperature 10 C to 70 C The equipment must not be installed and operated under the following conditions In damp dusty vibrating rooms or in rooms where an explosion may occur At temperatures over 40 C or under 0 C Malfunctions There is no need to open the device if it is used as intended and serviced as specified But if the device is opened for some reason it must be ensured that ...

Page 5: ...eneral Info 15 4 1 1 2 Configuration General Admin 16 4 1 1 3 Configuration General Licence 16 4 1 1 4 Configuration General Update 18 4 1 1 5 Configuration General NTP 18 4 1 1 6 Configuration General HTTP Server 19 4 1 1 7 Configuration General HTTP Client 20 4 1 1 8 Configuration General Logging 20 4 1 1 9 Configuration General SNMP 22 4 1 1 10 Configuration General Telnet 22 4 1 2 Configuratio...

Page 6: ...4 4 Configuration LDAP Replicator Status 41 4 1 5 Configuration DECT 42 4 1 5 1 Configuration DECT System 42 4 1 5 2 Configuration DECT Master 43 4 1 5 3 Configuration DECT Features 44 4 1 5 4 Configuration DECT Radio 48 4 2 Administration 49 4 2 1 Administration DECT 49 4 2 1 1 Administration DECT Statistics 49 4 2 1 2 Administration DECT Users 50 4 2 1 3 Administration DECT Unknown 51 4 2 1 4 Ad...

Page 7: ...tion Reset Reset 61 4 2 5 3 Administration Reset TFTP 61 Appendix A Connectors and control elements 62 Indicators and connectors 62 The serial number label 64 Appendix B Troubleshooting 65 Typical problems 65 NAT and firewalls 66 VoIP and heavily loaded WAN links 68 Appendix C Support 70 Firmware upload 70 innovaphone homepage 70 Appendix D Configuration of the update server 71 System requirements...

Page 8: ...Download 79 Result 79 License Manager 79 Appendix G DECT coverage 80 Appendix H Glossary 81 Keyword index 103 ...

Page 9: ... An extension with a repeater increases the reception range and thus achieves better coverage but does not increase the number of channels 1 1 Standards The system on the IP side is fully H 323 compatible It supports echo cancellation and several codecs for voice compression On the DECT side the system is GAP compatible The IP50 IP52 and IP54 handsets from innovaphone are especially suited however...

Page 10: ...Caution All instructions in this manual should be followed carefully and the device should only be used as intended The manufacturer assumes no responsibility for any personal injury damage to property or subsequent damage that can be attributed to improper use of the device ...

Page 11: ...since Auto MDX support is provided 2 1 Establish administrator access There are two ways of putting the device into service When shipped from the factory the device is in so called DHCP Automatic mode In this mode the device once switched on tries to obtain an IP address from a DHCP server To determine which IP address was assigned to the device it is possible under Windows to execute the nbtstat ...

Page 12: ...ey If an IP address was not explicitly configured the IP address 192 168 0 1 is specified as standard Caution The IP address cannot be displayed with nbtstat if the NetBIOS environment is configured exclusively for the name resolution via WINS If the nbtstat command does not find the device then the NetBIOS name resolution must be configured accordingly Caution Once the device has been put into se...

Page 13: ... device settings are made The main menus in the left area of the browser are divided into two categories Configuration Administration A main menu in turn can be split into several submenus In the Configuration category everything that is necessary for initial operation for example the setting of the ETH0 ETH1 network interfaces is carried out In the Administration category the settings for active ...

Page 14: ... in the respective submenu always using the OK button Some changes to settings require a device restart to become effective In this case reset required is shown in the respective menu More detailed information on restarting the device is contained in the chapter entitled Administration Reset Caution To raise the security of the VoIP device the standard user and the standard password should always ...

Page 15: ...d here Version The software version 6 00 Gateway firmware Die bootcode version Boot code firmware The hardware version HW no The memory size Flash Ram Serialno The serial number or MAC address Media Access Control of the device 6 digit hexadecimal number Coder The number and type of voice channels HDLC The number of HDLC channels High level Data Link Chan nels Sync The physical interface TEL PPP B...

Page 16: ...the activation of an analogue channel Gatekeeper LIC Enables the activation of a gatekeeper function This is always necessary if you wish to use a central gatekeeper for trunking with several media gateways It is not required if you only connect an innova phone PBX with home users who use the IP110 IP200 IP230 telephones but it is advisable if you wish to manage external users who are registered w...

Page 17: ...ayed In the lower section additional licences can be loaded By entering the location of the licence text file described above in the File field or by selecting the location using the Browse button and then clicking Upload additional licences can be loaded onto the device With this upload procedure the licences are saved in the configuration of the de vice and are available after a short restart Th...

Page 18: ...2 168 0 1 update script ip800 txt pointing to a file whose commands are executed If the URL ends with a slash for example http 192 168 0 1 update the device is adding the file name update ipxxx htm automatically deduced from the device short name for example update ip800 htm Furthermore the placeholder h and m can be used in the URL String h will be replaced by the device short name for example IP...

Page 19: ...ync Displays the data and time of the last synchronisation Disable HTTP basic authentica tion The logon data is transmitted in plain text as standard and is thus susceptible to recording and eavesdropping To avoid this weak point it is recommended that you disable standard authentication with user name and password and use digest hash authentication instead Password protect all HTTP pages Apart fr...

Page 20: ...g to a file in a password protec ted directory whose commands are executed If the URL ends with a slash for example http 192 168 0 1 update the device is adding the file name update ipxxx htm automatically deduced from the device short name for example update ip800 htm The placeholder h and m can be used in the URL String for HTTP Clients too h will be replaced by the device short name for example...

Page 21: ...og entries is entered The syslog class is a numeric value between 0 and 7 HTTP The syslog entries are transferred to a Web server where they can be further processed Each individual syslog entry is trans ferred as form data to the Web server in HTTP GET format In the Address field the IP address of the Web server that carries out further processing of the transmitted data is entered In the Path fi...

Page 22: ...nt community name can be entered in this field Device Name For more detailed information a device name can be specified here for the SNMP agent Contact As can a contact person Contact Location As can a location Location Authentica tion Trap Access via SNMP is only possible if the correct community name is entered If this check box is checked a trap is genera ted in the case of access with an incor...

Page 23: ...ort numbers of port This entry restricts the range of ports in which UDP RTP voice data User Datagram Protocol Real time Transport Protocol is received for H 323 or SIP calls The port range 16384 to 32767 is used as standard 128 ports are the smallest range For a voice connection an RTP port and an RTCP port are used See also the notes contained in Appendix B Troubleshooting section Port settings ...

Page 24: ...guration is always referred to to find out whether the Calling Party Number and the Called Party Number are located in the same IP network If nothing is entered here it is assumed that both par ties are located in the public network The media relay function is not used and RTP packets are exchanged directly between the end points If a private network is specified RTP packets are not passed directl...

Page 25: ... tion H 323 authentication is obligatory if the check box is checked This setting protects against externals attacks on the private network H 323 messages without authentication are not rou ted to the private network H 225 RAS destination IP address of the server in the private network to which inco ming H 225 RAS messages are routed H 225 Signalling destination IP address of the server in the pri...

Page 26: ...ss to the remote party in order to integrate it in the local network Auto dial after boot Results in the relevant PPP connection of the device being set up and kept open immediately after start up Allow inbound con nections If the server is configured as a PPP server a checked check box allows PPP dial up connections to the device inbound No DNS on this interface When a PPP connection to the remot...

Page 27: ...of voice data along the PPP link using the RTP header compression method RFC 2508 2509 This drastically reduces the requi red bandwidth for VoIP calls To suppress this the No IP Header compression check box must be enabled Adapt to Cisco PPP peers Try the Adapt to Cisco PPP peers option if a Cisco router is used at the remote location and problems arise in the trans mission of voice data Outbound ...

Page 28: ... to play the role of a PPTP server then no IP address has to be entered here Route to Interface Here connection setup inquiries can be forwarded directly to a particular interface For example ETH0 1 PPP0 31 Enable MPPE Encryption Enables the Microsoft Point To Point Encryption Protocol MPPE RFC 3078 uses the RSA RC4 algorithm Stateless Operation Here the key is modified after every transferred pac...

Page 29: ...the same call number as for the first channel is to be used Outbound Connections Here the ISDN interface can be configured for outbound PPP dial up connections Called Party Number The call number MSN to be used for the outgoing call 2nd Called Party Num ber The call number MSN to be used for the outgoing call on the second B channel Inbound Connections Here the ISDN interface can be configured for...

Page 30: ... the case of PPP using an ISDN channel one of the ISDN interfaces State Displays the current state of the interface Possible states Connecting Up or Down Since The time as of when the connection exists is specified here Action connect establishes a connection to the selected inter face clear deletes the current connection to the selected inter face info displays relevant connection data for the se...

Page 31: ...on ETH0 1 DHCP The DHCP function can either be disabled in DHCP Disabled mode or operated in DHCP Client or in DHCP Server mode The DHCP function of the Ethernet interface has four operating modes in total auto Automatic selection of the transmission speed 10m hdx Corresponds to 10 MBit Half Duplex 10m fdx Corresponds to 10 MBit Full Duplex 100m hdx Corresponds to 100 MBit Half Duplex 100m fdx Cor...

Page 32: ...as not explicitly configured see chapter Configuration ETH0 1 IP the IP address 192 168 0 1 is specified as standard Caution DHCP Automatic mode should not be used for normal operation since an accidental restart switches the operating mode IP Address The IP address of the network adapter Network Mask The subnet mask of the network adapter Default Gateway The standard router of the LAN DNS Server ...

Page 33: ...ackets for sending can be sent to all devices in a network Data packets are sent to all devices in a network as standard The Multicast check box is therefore checked Network Destination The network address of the destination route Network Mask The relevant subnet mask of the destination route Gateway The standard gateway of the network being routed Include Interface in NAT A checked check box enab...

Page 34: ... port to the innovaphone gateway happens to be configured to a different ID the same value must be entered here to allow the Ethernet packets to be prioritised A priority va lue between 0 and 7 is entered here configuration on the Ether net switch Lease Time min The validity period of the DHCP lease in minutes Check Interval min The interval in minutes at which a check is made whether the DHCP lea...

Page 35: ... Server The Time server address Timezone String Here new time zones can be added to the devices in accor dance with the IEEE POSIX standard using a particular charac ter string for example CET 1CEST 2 M3 5 0 2 M10 5 0 3 TFTP Server The TFTP server address WINS Ser ver The WINS server address Primary Gatekeeper The primary gatekeeper IP address Secondary Gatekeeper The alternative Gatekeeper IP add...

Page 36: ...an time format is displayed as standard dd mm yy hh mm 24 hour clock If a 1 is entered in this field the English time format mm dd hh mm xm 12 hour am pm clock is displayed LDAP Direc tory To allocate a functioning LDAP configuration to all VoIP devices integrated via DHCP a configuration character string can be entered in the LDAP Directory field You obtain this configuration character string by ...

Page 37: ...Quality of Service off according to 802 1q ab If the switch at the port to the innovaphone device happens to be configu red to a different VLAN ID the same value must be specified here to allow a prioritisation from the Ethernet To be able to distinguish between the VLANs the Ethernet packet is exten ded by 4 bytes of which 12 bits are intended for the inclusion of the VLAN ID making 4094 VLANs po...

Page 38: ...t The number of successfully sent broadcast packets tx multi cast The number of successfully sent multicast packets tx lostcar rier The number of lost carrier signals Indicates a defective medium for example cable tx deferred The number of deferred packets tx collision The number of colliding packets max 16 tx excesscol The number of colliding packets if tx collision 16 tx latecol The number of co...

Page 39: ... mission rx collision The number of colliding packets max 16 rx overrun err The number of buffer overrun errors when receiving data pak kets rx queue overrun The number of queue overrun errors when receiving data pak kets rx no buf fer The number of no buffers when receiving data packets rx tx 64 The total number of sent and received packets of 64 Bytes rx tx 64 127 The total number of sent and re...

Page 40: ...e user database of a remote innovaphone PBX Username The LDAP user name Password The relevant LDAP user password Write Access Write authorisation is granted if the check box is checked connections Total number of all connections to the LDAP server write con nections Number of connections with write authorisation rx search Number of received search inquiries rx modify Number of received change requ...

Page 41: ...replicate only the objects of a particular location in the sense of a partial replication the name of the location PBX name can be specified here User Password The LDAP user and password Is stored on the LDAP server under the chapter Configuration LDAP Server Enable A replication only takes place if the Enable check box is chek ked Server IP address and port of the remote LDAP server Full Repli ca...

Page 42: ...repeater can be used AC The access code that must be specified when logging on the DECT handset This specification is only required if the value With user AC only is selected in the Subscriptions list box Subscrip tions The type of handset registrations subscriptions With User AC only Subscriptions are allowed that have been configured in the user input screen with specifica tion of an IPEI number...

Page 43: ... is used for all external calls If the remote VoIP device does not support the configured encoding an encoding supported by both parties is negotiated Frame The frame size of the voice data in ms Exclusive A checked check box enables the selected coder as exclusive In this way use of the configured encoding coder is forced This can result in call failure in the event that this device and the remot...

Page 44: ...s for example a telephone number and the x character for a fixed number of characters of length x Principally actions will be initialized with the character and with the character actions will be cancelled Forwarding options The IP devices supports three different types of call forwardings Prot The protocol to be used for the communication There is a choice between H 323 RFC 1889 which is the reco...

Page 45: ...etting muted The caller still can hear the free tone CFNR Activate Deactivate 61 61 Activates deactivates call forwarding if there is no answer The character stands for the destination number Activity Code Description Lock Phone Unlock 33 33 Activates deactivates the phone s keylock The character stands for the PIN Activity Code Description Set PIN 99 Stores a PIN for the telephone The first chara...

Page 46: ... 42 42 No calls are put through if the check box is checked Do not Disturb Int On Off 421 421 No internal calls are put through if the check box is checked Do not Disturb Ext On Off 422 422 No external calls are put through if the check box is checked ...

Page 47: ...schreibung Clear Local Settings 00 Deletes all Feature Code settings made Aktivität Code Beschreibung Pickup Group Directed 0 0 Pickup Group picks up a call of a pickup group With Directed a particular call can be picked up through specification of the call number Aktivität Code Beschreibung Park Unpark R 16 1 16 1 With Park a call can be parked by pressing the R key and then entering the Feature ...

Page 48: ...tivität Code Beschreibung Group Join Leave 31 31 With Group Join you join a group With Leave you leave it again Not implemen ted for IP DECT Aktivität Code Beschreibung Call Comple tion Cancel 37 37 With Call Completion a callback can be initiated if the called subscriber happens to be busy Not implemented for IP DECT Disable A checked check box disables the DECT radio cell Master The IP address o...

Page 49: ...e IPEI number is automatically entered in this user object 4 2 1 Administration DECT DECT related administrative settings of the IP1200 are made here 4 2 1 1 Administration DECT Statistics Detailed information about the DECT master and the DECT radios is displayed Radio ID In Singlecell operation the radio ID 0 must be specified In Multicell operation every radio must have a unique ID The ID must ...

Page 50: ...All handovers that took place on the DECT master If a mobile phone is located in the transmitting range of the DECT master and switches to a different transmitting range DECT radio a handover to the next transmitting range must take place so that the DECT master knows how the voice data is to be routed Handover Failed All failed handovers in the DECT master range Abnormal Call Release All other fa...

Page 51: ...Unknown subscriptions can dial the call number of a free user to register with this object 4 2 1 4 Administration DECT Radios All registered unregistered DECT base stations are displayed row by row here A row contains the following information Name ID Address Sync Lost Busy Product Long Name Long Name registered in the PBX No Call number registered in the PBX Name Name registered in the PBX Displa...

Page 52: ...this number is output in red Lost The first value in the Lost column relates to the sync master and specifies how often synchronisation to the DECT master was lost The second value relates to the alt sync master and specifies how often synchronisation to the alter native DECT master was lost and therefore was entirely lost LDAP Displays the status of the respective DECT device Possible states Up D...

Page 53: ... the respective value is displayed with a A Sender Calling subscriber B Receiver Called subscriber State Calling Alerting Connected Incomplete Disconnecting Call is being set up Call is being signalled Call connected Call incomplete Call is being disconnected Radio IP1200 xx xx xx The DECT system used Local Media xxx xxx xxx xxx xxxx The IP address and port of the DECT system used Remote Media xxx...

Page 54: ...e Download link a popup page opens in which it can be specified whether to save the configuration file as a txt file or immediately open it with an editor 4 2 3 Administration Upload There are several ways to update the VoIP device RPN Radio Part Number The Radio Part Number is the radio ID of the DECT radio RSSI Radio Signal Strength Indication The Radio Signal Strength Indication is the field st...

Page 55: ...ns can be obtained from a certified innovaphone dealer or directly via the innovaphone ho mepage http www innovaphone com By specifying path and file name of the configuration file to be loaded in the Firmware File field and then clicking the Upload button the configuration file is loaded into the device Whilst loading the new firmware you are advised not to interrupt the loading procedure under a...

Page 56: ...d to activate the new version The immediate reset and reset when idle links are provided for this purpose More detailed information on resetting the device is contained in the chapter entitled Administration Reset 4 2 3 4 Administration Upload Boot This function can be used to load a new boot code version onto the VoIP device New boot code versions can be obtained from a certified innovaphone deal...

Page 57: ...sages that were enabled in the Logging submenu are displayed The following settings can be enabled TCP All TCP connections PPP All PPP connections Relay Calls All calls that go via the Relay only visible for devices with S0 or S2m interface Relay Routing All calls that must be routed via the Relay only visible for devices with S0 and S2m interface DECT master All DECT master connections only visib...

Page 58: ...rds out of the window For both trace variants only messages that were enabled in this menu are dis played Not every section and not every setting is visible this will depend on which device is being used DECT section Interfaces section VOIP section BRI1 n All BRI1 n connections only visible for devices with BRI interface PRI1 n All PRI1 n connections only visible for devices with PRI interface Sys...

Page 59: ...T 30 Information on H 323 T 30 SIP Mes sages Information on SIP messages SIP Events Information on SIP events SIP T 38 Information on SIP T 38 DSP Information on DSP DSP con trol mes sages Information on DSP control messages DSP data messages Information on DSP data messages PPP Information on the PPP protocol PPTP Information on the PPTP protocol PPoE0 1 Information on the PPoE0 1 protocol DHCP0 ...

Page 60: ...a ping command directly from the VoIP device This makes it possible to check whether a network address PC printer telephone etc is accessible If an address is accessible Reply from host is displayed to the sender If the address is not accessible No Reply from host is displayed 4 2 5 Administration Reset In addition to reset the device by the hardware reset button there are three more ways given by...

Page 61: ...All active calls are lost 4 2 5 3 Administration Reset TFTP With a TFTP Reset the VoIP device is transferred to TFTP mode In this mode the device can only be accessed with the GWLoad tool and thus allocated an IP address Further information on the innovaphone GWLoad tool may be found in the innovaphone Knowledgebase ...

Page 62: ...Mbps Ethernet 10 100Base T auto sense 2 100 LED to indicate that the 100 Mbps network for the ETH0 1 interface is active 3 LINK LED to indicate that data is being sent or received on the ETH0 1 interface 4 POWER Socket for connecting an external plug in mains adapter 5 ALARM LED LED to indicate that the IP1200 is carrying out a restart or that a malfunction error exists 6 READY LED LED to indicate...

Page 63: ...y LED will blink 4 6 times and change to red If loosing the hold on the reset button now the deletion of the con figuration is beginning The Ready LED will be dis played 5 seconds in red and after that it will start to blink very fast in red green and delete the display of all ISDN LEDs The device will go into TFTP Mode and the Ready LED will be displayed in orange Power Cycle Means to disrupt the...

Page 64: ...he MAC address is also the serial number of your IP1200 The first three constant hexadecimal digits separated by a hyphen are innovaphone s manufacturer identification code 009033 or 00 90 33 whilst the last three hexadecimal digits 0F06DA or 0F 06 DA are the consecutive serial number of your IP1200 MAC address Fig 2 Serial number label of the IP1200 ...

Page 65: ...nd Link LEDs are on 100M LED flashes during attempted access The VoIP device has an incorrect IP address configured Set the IP parameters correctly In the as shipped state the VoIP device does not assign an IP address to the PC When the device is turned on the DHCP client is active Press the Reset button briefly Have an IP address assigned to the PC again Calls can be established to a remote VoIP ...

Page 66: ...of the route leading to this gateway to force en bloc dialling The VoIP device loses its configuration after it has been disconnected from the power supply The configuration has not been saved in the non volatile memory Save the configuration to the non volatile memory each time you make any changes The VoIP device is connected to the network behind a firewall and the configuration is not working ...

Page 67: ...e firewall for all required data to and from the VoIP device Although this solution is usually not well received by network administrators it does not present a security problem since the VoIP device as a dedicated device does not perform any services other than Voice over IP No security gaps are caused in a network by opening the path to and from the device The number of ports to be released can ...

Page 68: ...y be achieved by the routers used Direct use can be made of the Prioritisation of H 323 voice data function if it is supported by your router If you router is able to prioritise on the basis of the ToS field Type of Service you can use this function The VoIP device sets the ToS Priority field to the value 0x10 for all IP packets that it sends This value can be changed if necessary under the chapte...

Page 69: ... able to prioritise but are unable to interrupt the transmission of larger packets once it has started This can result in poor quality in spite of prioritisation In such a case you should check whether this interruption can be separately enabled Some routers refers to this function somewhat confusingly as interleaving ...

Page 70: ...the welcome page of the device see Appendix B Connectors and control elements or chapter Configuration General Info Firmware upload The innovaphone VoIP devices are not delivered with the latest firmware which means that a firmware upload is usually necessary New firmware versions can be obtained in the download area http download innovaphone com of the innovaphone homepage innovaphone homepage Th...

Page 71: ...UP1 to perform the requested updates System requirements One or more Web server s accessible by the devices The Web servers tested were MS IIS and the Apache server It should however also work with all other common Web servers For best results the Web server should be able to manage a large number of simultaneous HTTP sessions MS Personal Web Server for example is not a suitable Web server since i...

Page 72: ...specifications note that some Web servers differentiate between upper case and lower case letters Running maintenance The update file is immediately read and also immediately executed After a device restart the update server is automatically queried periodically in accordance with the interval set When the maintenance file has been successfully received it is executed sequentially Theoretically al...

Page 73: ...ot a function Time command Often it is preferred to perform such changes at particular times for example at night when no work is being done This can be achieved with the times command mod cmd UP1 time allow hours The time command compares the current time with the content of hours hours is a comma separated list of specified hours within which execution of the maintenance file is possible If the ...

Page 74: ... executed innovaphone devices have an internal variable that is initially empty or empty if the device was reset with the standard settings called UPDATE PROT The prot command compares the content of build serial with the UPDATE PROT variable If both match no firmware is downloaded If the UPDATE PROT variable is not set new devices or after a device restart the content of build serial is compared ...

Page 75: ... overwritten with the version number of the downloaded boot code 205 and finally the device is reset as soon as it is not being actively used SCFG command If the UP0 interface is being used then the device configuration can be stored on a Web server mod cmd UP0 scfg url This command instructs the device to upload its current configuration to the url This can be achieved with the HTTP PUT command T...

Page 76: ...time allow 23 0 1 2 3 4 mod cmd UP0 prot http 192 168 0 10 configs 04 5679 ser 04 5679 This example demonstrates how the configuration of a device is stored on a Web server all IP1200 devices are then instructed to load update the firware version 04 5679 in the time period 23 00 hrs to 04 59 hrs New devices are updated after a restart and after the specified six minutes have elapsed The devices ar...

Page 77: ...ound worldwide on the Internet at http www eecis udel edu mills ntp Timezone strings TZ string Time services always provide the coordinated world time UTC Universal Time Coordinated which corresponds to GMT Greenwich Mean Time not however the correct time zone and summer time It is therefore possible to specify the time difference between the time zone and the world time in the String field The di...

Page 78: ...r Central European Summer Time or MES for Middle European Summer Time The optional second Offset parameter gives the offset of the summer time in respect of UTC An hour before normal time is assumed if no entry is made Date Time Date Time define the start and end of summer time The format for a time entry is Mm n d signifying the d th day of the n th week of the m th month Day 0 is Sunday If the f...

Page 79: ...per part of the screen The following text appears Welcome you are logged in as Name e mail address Beneath this in the empty Serial number field the serial number MAC address of the device for which licences are required can be entered and searched for Clicking the Download Licence button downloads the licences Result If clicking the download link an Open With Save As dialog box opens in which it ...

Page 80: ...is tool can be lent or leased and is thus a cost effective way to bring a professional DECT environment into operation Further information on DECT coverage may be found in the following articles in the innovaphone knowledgebase Rules for successful IP1200 deployment http www innovaphone com inno kb article aspx id 10531 Debugging tools for DECT deployment http www innovaphone com inno kb article a...

Page 81: ...µ law method This method is characterised by a dynamic characteristic curve that in the low level range is even steeper than that of the A law method Alt sync master An alternative synchronisation source ARI An ARI Access Rights Identifier is a unique identifier for a DECT system ARP The ARP protocol Address Resolution Protocol is a typical ES IS protocol End System Intermediate System Protocol us...

Page 82: ...eously in a network the possibilities of multicast or broadcast exist In local networks a broadcast is a message that is sent to all devices in all networks It is forwarded by every router to all connected networks If all terminals in a particular network are to be addressed one refers to multicast or network broadcast C CCFP CCFP Central Controller Fixed Part is a unit that controls all base stat...

Page 83: ...SDN feature CFNR Call Forwarding No Response an incoming call is forwarded to a particular extension if the call is not accepted after a configured time CFU With the ISDN feature CFU Call Forwarding Unconditional an incoming call is forwarded to a particular extension immediately CHI An information element in GSM networks that specifies the channel to be used on the user network interface CR Becau...

Page 84: ... IP DECT telephone and the innovaphone PBX DECT controller Short for CCFP Central Controller Fixed Part DECT system A collection of DECT radios with a control device All DECT radios in this system share a usual identifier the so called ARI A handover between DECT radios is only possible within the same IP DECT systems DHCP The DHCP protocol Dynamic Host Configuration Protocol enables the dynamic a...

Page 85: ...es for the international call numbers The call numbers in E 164 comprise a maximum of 15 decimal places which can be evaluated by public networks Subscriber specific call numbers and services can have a further 40 decimal places added These are recorded only by private branch exchanges and end systems however E DSS1 The DSS1 protocol Digital Subscriber Signalling System No 1 is at times referred t...

Page 86: ...imple file handling FTP is based on the TCP transport protocol Transmission Control Protocol and supports the transfer of character coded information and of binary data In both cases the user must have the possibility to specify the format in which the data is to be stored on the respective destination system The file transfer is controlled from the local system access authorisation for the destin...

Page 87: ...l Telecommunication Union Telecommunications which is used in H 323 networks and which supports the transfer of data voice and video The protocol is used for the connection setup and shutdown as well as for connection control Within the protocol signalling is based on Q 931 H 225 uses the RTP protocol for the real time transfer of the multimedia data H 323 H 323 is an international ITU standard In...

Page 88: ...association of American engineers dedicated to standardisation tasks Work group 802 for example is driving forward the standardisation of local networks IP The task of the IP Internet Protocol is to transport data packets from a sender to a receiver across several networks The transmission is packet oriented connectionless and non guaranteed Even in the case of identical senders and receivers the ...

Page 89: ...rganisation operating worldwide in which governments and the private telecommunications sector coordinate the setting up and operation of telecommunication networks and services J Jitter Jitter refers to the phase fluctuations in data transmission and therefore changes in time of signal frequencies It concerns fluctuations of fixed points in time for example the time when a digital signal passes f...

Page 90: ...ata link layer with the network layer in the case of Ethernet for example the ARP protocol Address Resolution Protocol is used MIB A MIB Management Information Base is a kind of table which defines which information can be called up The MIB of an agent host router access point etc is specified by the manufacturer The task of this MIB is to store and save the transmitted information and data in the...

Page 91: ...scarded WANs generally have smaller MTU sizes than LANs Multicast Multicast is a mode of transmission from a single point to a group In relation to multicast one also refers to a multipoint connection The benefit of multicast is that messages are transferred simultaneously to several subscribers or closed user groups via one address As well as the multicast connection there is the point to point c...

Page 92: ... control data since the two protocols do not support a separate D channel Furthermore many of these accesses have only one B channel NMBLOOKUP With nmblookup NetBIOS names can be queried under Linux using NetBIOS over TCP IP NTP The NTP protocol Network Time Protocol is a standard for synchronising clocks in computer systems over packet based communication networks NTP uses the connectionless netw...

Page 93: ...imes per second and is converted to an 8 bit number so that a sample value arises every 125 µs The resulting transfer speed is 64 kbit s the transferable voice frequency 4 kHz For the dynamisation of voice the ITU within G 711 has defined two methods for the dynamic compression the µ law method and the A law method PING The ping program Packet Internet Grouper can be used to check whether a partic...

Page 94: ...is a protocol developed by a vendor consortium Ascend Communications Microsoft Corporation 3Com inter alia for the creation of a VPN Virtual Private Network It allows the PPP Point to Point Protocol to be tunnelled through an IP network the individual PPP packets in turn are encapsulated in GRE packets Generic Routing Encapsulation To secure the data transfer PPTP has a 40 bit or 128 bit RC4 algor...

Page 95: ... Euro ISDN It is used for the connection setup and shutdown as well as for connection control R Radio A DECT radio is either a DECT base station or a repeater RC4 The encryption algorithm RC4 Rivest Cipher is a symmetric encryption method in which the key is generated by a random number generator RC4 works with a secret key that is know to the sender and receiver The variable key length can be up ...

Page 96: ...tion cabling and in jumpering With improved HF transmission properties High Frequency RJ connector systems are used both in telecommunications and for networks including ATM Asynchronous Transfer Mode and Gigabit Ethernet RJ 45 The best known RJ connectors are RJ 10 RJ 11 RJ 12 and RJ 45 which differ in the number of contacts Roaming The ability of a DECT telephone to operate in more than one IP D...

Page 97: ...S SC A telephone call is made up for the most part of pauses It would be unnecessary to operate at the full data rate in these time slots Codecs such as the G 723 1 or the G 729 therefore contain an SC feature Silence Compression Essentially this feature consists of three components VAD DTX and CNF The task of VAD Voice Activity Detector is to determine when a subscriber is speaking and when he sh...

Page 98: ...synchronisation can be obtained In an IP1500 system only the repeaters must be created within the coverage of a DECT radio Of course this also applies in an IP1200 system Synchronisation chain In a closed system every IP1200 DECT radio must be synchronised with all other IP1200 DECT radios This presupposes that every DECT radio apart from one has a different one configured as the synchronisation s...

Page 99: ...on to configure the sync source of the DECT radios Sync source A DECT radio which serves as the synchronisation source for other DECT radios T TCP The TCP protocol Transmission Control Protocol is a connection oriented transport protocol for use in packet switched networks The protocol builds on the IP protocol it supports the functions of the transport layer and establishes a secure connection be...

Page 100: ...hermore the priority handling of datagrams the type of throughput and the reservation of resources in the routers can be defined Trace A trace is a sequence of instructions which begins with any start point and in which the program branches and their path selection are defined It allows the program flow to be traced step by step A trace is primarily used in troubleshooting and debugging U UDP Unli...

Page 101: ...haracteristic curve to achieve a better signal to noise ratio With this method 8 bit values are likewise generated However the quantisation characteristic curve for low levels is steeper In addition the encoding is not designed to generate continuous sequences of 0s but continually changing bit states In this way a particular method for timing recovery on the side of the receiver of the digital si...

Page 102: ...ceived for data transmission services ATM Frame Relay and Fast Packet Switching are also worth naming in this connection WINS WINS Windows Internet Naming Service is a method for converting computer names in Windows networks to IP addresses The WINS method takes into account that two computers with the same name or the same IP address are never logged into the network With WINS which uses the UDP ...

Page 103: ...cknowledged 37 Action 17 Active 43 Active Calls 25 Adapt to Cisco PPP peers 27 Add 41 Address 52 Address Ranges 34 Administrator access 11 16 Administrator name 16 Administrator password 16 Administrator user ID 19 Alarm LED 62 A law 81 Allow Anonymous 42 Allow inbound connections 26 Allowed networks 22 Alt GK 43 Alt Master 48 Alt sync master 52 81 Alt Sync Source 49 AM PM Clock 36 Announcements 2...

Page 104: ...FU 83 CFU Activate 44 Check command 72 CHI 83 Class 21 Cleanup 38 Clear All Leases 38 Clear Dynamic Leases 38 Clear Local Settings 47 Clear Reserved Leases 38 Client 31 Coder 15 35 43 Cold start 15 Collision 38 Command File URL 18 Community name 22 Config Changes 57 Config Show 59 Configuration 15 Configuration file 54 55 Configuration of the update server 79 Configuration of the VoIP device 54 Co...

Page 105: ... 32 DHCP client 31 32 DHCP Client mode 31 DHCP Disabled mode 32 DHCP function 31 DHCP lease 34 37 38 DHCP server 11 12 31 34 37 DHCP Server mode 31 Diagnostics 57 Dial tone 35 Dial Tones 35 Dialling Location 36 Digest hash authentication 19 Directed 47 Disable 42 48 Disable HTTP basic authentication 19 Disabled 31 Display 51 Disposal 4 DMS100 84 DNS 84 DNS server 32 35 DNS Server 1 35 DNS Server 2...

Page 106: ...rt 23 First UDP RTP port numbers of port 23 Frame 43 Frame size 43 Frequency 16 FTP 86 FTY 86 Full Replication 41 G Gatekeeper 35 43 Gatekeeper ID 35 43 Gatekeeper Identifier 35 Gatekeeper IP address 35 Gateway 29 30 33 General 15 General information 15 GK 43 GK ID 43 GMT 77 87 Group Join 48 GWLoad 61 H H 87 H 225 87 H 225 signalling destination 25 H 225 RAS destination 25 H 245 88 H 245 tunneling...

Page 107: ...ovaphone news 70 innovaphone PBX 40 50 53 Installation and connection 4 Interface 30 Interleaving 69 Introduction 9 IP 88 IP Address 32 34 37 IP Address for Remote Party 26 IP address range 22 IP configuration 31 IP master 88 IP parameters 31 IP protocol 22 IP Routes 29 IP Routing 35 IP settings 23 IPEI 42 49 51 88 IPxxx 14 ISDN 28 30 89 ITU 89 J Jitter 89 K Known subscription 49 L LAN 89 Language...

Page 108: ...rol 15 Media relay 24 Memory size 15 MES 78 Message class 21 MET 78 MIB 22 90 Check Interval 34 Interval 18 19 Lease Time 34 Mode 43 Modify 41 MoH 20 90 MPPE 28 90 MS IIS 71 MSN 91 MTU 91 MTU size 68 Multicast 33 91 Multicell 49 N Name 17 42 51 52 NAT 24 26 33 66 91 NAT mode 68 Nbtstat 11 92 Network Address 29 Network Address Translation 33 Network Destination 33 Network Mask 29 30 32 33 34 Networ...

Page 109: ...PL 93 PoE 4 11 93 Poll direction 41 Popup page 54 Port 19 Port specific Forwardings 24 POSIX 93 POSIX timezone strings 77 Power 62 Power LED 63 Power over Ethernet 4 11 Power supply 4 11 PP 94 PPP 25 57 94 PPP connection 26 PPP interface 32 PPP Interface PPPn 25 PPP0 31 30 PPPoE 27 94 PPTP 27 94 PRI 94 PRI LIC 16 PRI1 x 58 Primary Gatekeeper 35 Prioritisation 34 37 68 Priority 34 Private networks ...

Page 110: ...y from 60 Require authentication 25 Reserve IP Address 37 Reserved 37 Reset 55 56 61 63 Reset button 32 Reset required 14 Reset when idle 56 Restart 32 RFC 96 RFC 1889 44 RFC 3261 44 RFP 96 RJ 96 RJ45 11 Roaming 96 Route 30 Route to Interface 28 RPN 54 RSA 96 RSSI 54 RT 96 RTP 97 Running maintenance 72 Rx 38 Rx abandon 40 Rx add 40 Rx align err 39 Rx broadcast 38 Rx collision 39 Rx crc err 39 Rx d...

Page 111: ...unity name 22 Standard configuration 74 Standard file name 72 Standard firmware file name 74 Standard MIB II 22 Standard router 32 Standard settings 73 74 Standard user name 14 Standard user password 14 Standby 43 Standby master 48 Standby PBX 41 Starting 41 52 State 30 53 Stateless Operation 28 Static IP routes 33 35 Statistics 38 Status 25 31 52 Std 78 StdOffset 78 Stop 41 Stopped 52 Storage tem...

Page 112: ...r 58 Trace continuous 58 Trace information 58 Trace variants 58 Transmission mode 31 Transmission speed 31 Trap 22 Trap destinations 22 Trap messages 22 Troubleshooting 65 66 Tunneling 36 Twisted pair cable 11 Tx 38 Tx broadcast 38 Tx collision 38 Tx deferred 38 Tx error 40 Tx error 49 40 Tx error 50 40 Tx excesscol 38 Tx good 38 Tx latecol 38 Tx lostcarrier 38 Tx multicast 38 Tx notify 40 Tx unic...

Page 113: ...2 Version details 70 Virtual Local Area Network 33 VLAN 33 101 VLAN ID 34 37 VLAN priority 37 voice 15 Voice channels 15 Voicemail 20 Voicemail LIC 17 VoIP gatekeeper 35 VPN 27 101 W WAN 102 WAN connection 32 WAN links 68 Warm start 15 Waste Electrical and Electronic Equipment 4 Web server 21 71 WEEE guidelines 4 Windows server 77 WINS 102 WINS server 35 Winter time 77 With User AC only 42 World t...

Page 114: ......

Reviews: