Zed-3 GA90 User Manual Download Page 57

54

GA90 Modular Gateway User’s Manual

Internet Protocol (IP). 

A network layer protocol that sends datagram packets between Internet

nodes. IP is a connection-less protocol, implying that there is no continuing connection between

communicating endpoints. IP provides addressing, type-of-service (ToS) specification, security,

fragmentation and reassembly features. The most widely used IP version is Internet Protocol

Version 4 (IPv4). The ZIP 4x4 phone supports IP as defined in RFC 791.

Internet Protocol Version 6 (IPv6).  

The latest level of the IP that is included in many projects,

including the major computer operating systems. The most obvious improvement in IPv6 over

IPv4 is the lengthening of IP addresses from 32 bits to 128 bits. All servers that support IPv6 will

also support Internet Protocol Version 4.

Intranet. 

A restricted-access network that works like the Web, but isn’t on it. Usually owned and

managed by a corporation, an intranet enables a company to share its resources with its

employees without making available confidential information to everyone with Internet access. 

IP Address (version 4). 

A 32-bit number that identifies each sender or receiver of information sent

across the internet. An IP address has two parts: the network identifier and the identifier of a

specific device on the network. On the Internet itself – between the router that moves packets

between points along the route – only the network part of the address is examined.

IP Security (IPSec). 

Security standard produced by the Internet Engineering Task Force (IETF). a

protocol suite that provides all necessary elements for secure communications-authentication,

integrity, and confidentiality-and makes key exchange practical even in larger networks. 

Jitter. 

Jitter is the deviation in some aspect of the pulses in a high-frequency digital signal or the

period frequency displacement of the signal from its ideal location. The SE system utilizes Jitter

Buffers to compensate for jitter.

Key Management. 

The management and handling private keys used for signing or encryption.

The only reasonable way to protect the integrity and privacy of information is to rely upon the

secure use of these keys, including the activities of selection, exchange, storage, certification,

expiration, revocation, changing, and transmission. Most of the work in managing information

security systems lies in the key management.

Lightweight Directory Access Protocol (LDAP). 

A software protocol that enables anyone to locate

organizations, individuals, and other resources such as files and devices in a network, whether

on the public Internet or on a corporate intranet. LDAP is a “lightweight” (smaller amount of

code) version of Directory Access Protocol (DAP), which is part of X.500, a standard for directory

services in a network. LDAP is lighter because, in its initial version, it did not include security

features. Described by RFC 2251.

Load balancing. 

The mapping (or re-mapping) of work to processors, with the intent of

improving the efficiency of a concurrent computation.

Local Area Network (LAN). 

A group of computers and associated devices that share a common

communications line and the resources of a single processor or server within a limited geographic

area, such as an office building. 10BaseT Ethernet is the most commonly used form of LAN. A

hardware device called a hub serves as the common wiring point, enabling data to be sent from

one machine to another over the network. LANs are typically limited to distances of less than 500

meters and provide low-cost, high-bandwidth networking capabilities within a small

geographical area.

Media Access Control (MAC) Address. 

A hardware number that uniquely identifies a computer or

other device. Within an Ethernet configuration, the MAC address is a 6-octet address assigned to

the network interface card. When your computer is connected to the Internet, a correspondence

Summary of Contents for GA90

Page 1: ...GA90 Modual Gateway User s Manual Manual Part Number 96 00559 00 Zed 3 501 Valley Way Milpitas CA 95035 USA 1 408 587 9333 http www zed 3 com...

Page 2: ...ciated software are the property of Zed 3 and all rights are reserved No part of this document may be photocopied reproduced stored in any computer format translated to another language or publicly di...

Page 3: ...b Management System 9 3 1 Login 9 3 2 Web Management System Main Interface 11 3 3 Menu Structure 12 Monitor 13 4 1 System Info 13 4 2 Line Status 14 4 3 Active Calls 15 4 4 Call Records 16 4 5 T1 E1 S...

Page 4: ...s Manual Contents 7 2 Network Setting 44 7 3 Time Setting 45 Maintenance 47 8 1 System Reboot 47 8 2 Reset to Default 47 8 3 Config Management 48 8 4 Auto Attendant 48 8 5 Upgrade Firmware 49 8 6 Diag...

Page 5: ...ication and business extension for enterprises GA90 permits flexible call routing and call restricting to provide users calling strategy based on their own requirements The web based management platfo...

Page 6: ...ots Interface card capacity 4 extended slots Available interface card types 8 ports FXO interface card 8 ports FXS interface card 1 port E1 T1 interface card Network interface 1 10 100M LAN port 1 10...

Page 7: ...mber transform includes head trim tail trim replacement and number segment ways General calling strategy management you may set call schedules based on different time segments Cascade and extend capac...

Page 8: ...tup indicator is on when that channel is used after off hook light is off when the channel is idle 1 4 3 Back View All ports are on the back panel of GA90 the interface type and descriptions are WAN p...

Page 9: ...sales immediately and save all packages for the repackaging if need 2 1 Installation Requirements 2 1 1 Power Requirements Power off before installation dismantlement or movement The electric outlet...

Page 10: ...dity will make insulating gasket shrink loose the fixed bolts and scrape up static Long period of high temperature will accelerate components aging lower the reliability and reduce the useful time dra...

Page 11: ...ary if you want to call PSTN phones from GA90 connect its FXO port with PSTN with a cable 2 2 5 Other Soft switch Accounts Ask for soft switch accounts and register information like phone number passw...

Page 12: ...analog telephones Prepare a 2 core telecommunication cable plug one end into FXS port of GA90 and another end into a phone a fax or a PBX s trunk line port 2 3 3 Power Connection 1 Connect the power...

Page 13: ...ut password 23646 when you hear the dialing tone of AA after calling in through FXO port of GA90 and the equipment will show you the IP address The SpreeCode and password used here are default you may...

Page 14: ...t login to the system if your PC s IP address does not belong to the same network segment as the equipment s So the simplest way is to change your PC s IP address to set GA90 s configurations As below...

Page 15: ...tem with the new IP address 3 2 Web Management System Main Interface There are six main menus on the top of the web management system s main page they are Monitor Line Settings Call settings Administr...

Page 16: ...12 GA90 Modular Gateway User s Manual The system supports Chinese and English Here is the English version 3 3 Menu Structure Figure 3 3 Web Management System main interface Figure 3 4 Menu Structure...

Page 17: ...ers are Basic Model GA90 Product ID the unique number of GA90 equipment Firmware version the current version of the equipment like 1 0 6 7 Performance CPU Usage the current usage of CPU Memory Usage t...

Page 18: ...all external lines only when trunk lines set on GA90 The system will monitor all these lines status automatically once these trunk lines have been set and provides monitor information to the administr...

Page 19: ...d to this line Status the status of the line including Avaialbe Invalid Register Fails etc 4 3 Active Calls Active Calls means the calls are in conversations The system provides real time monitor of c...

Page 20: ...r remove these records 4 4 Call Records The system generates a detailed record CDR for every call The CDR file will be saved automatically every day The system will keep the newest 500 records when th...

Page 21: ...vity of each T1 E1 interface card and D channel s status automatically when GA90 has T1 E1 interface card For example slot2 means the card in the second slot is T1 E1 card PhysicalLineState shows norm...

Page 22: ...gister expiration NAT traverse home domain maximum connections and AA switch etc For Unregister type P2P IP Line you need to set the counterpart s address and port the maximum amount of calls NAT trav...

Page 23: ...You need to set these when Register is Enable Proxy the IP address and port of the proxy Note The default port is 5060 if you set only IP address Register Server the IP address and port of register s...

Page 24: ...t port is 5060 if you set only IP address Max Connections maximal simultaneous call number supported Enable AA if enter AA Auto Attendant when dial in via this line 5 1 2 2 Unregister IP Line Set thes...

Page 25: ...a or modify the backup configuration 3 click Modify and save it The list is updated immediately 5 1 6 Remove IP Line 1 Select a record on the list 2 click Remove and save it 5 2 FXS Line If the IP PBX...

Page 26: ...interface card on the 1st slot is FXSmodule Phone Number the phone number of this line Note Unset FXS module is only shown FXS module s interface number in this list You should set phone number for c...

Page 27: ...list You should set phone number for corresponding ports when using them 1 Choose one line in FXS line list 2 set phone number for this line 3 click Modify to save it 5 3 FXO Line If GA90 has FXO card...

Page 28: ...T1 E1 module on GA90 T1 is North America standard and E1 is European standard Slot1 n Active if the T1 E1 card is available on this slot You need to set these if available Note Pay attension to the co...

Page 29: ...digits count in second AA State if enable AA for this line Note If enabled the dialed number after calling in is invalid user should operate as AA s prompts Phone Number Begin combined with Phone Num...

Page 30: ...5 Line Settings 27 Figure 5 5 Line Settings T1 E1 Line Setting page...

Page 31: ...es of numbers are one base of call routing number transform and call filtration So let s begin with these matching rules The definition of these rules which we used refers to Digit Map refers to RFC34...

Page 32: ...digit from this and following digits d match one digit if Caller Pattern is empty choose a higher level route in the results 3 compare Callee Pattern if there are more than 1 routes after 2 the rules...

Page 33: ...ource Line Destination Line configuration the system will not show you FXS lines 6 3 1 Call Routing List The list shows a group of configured routes based on the creation time The system will match th...

Page 34: ...here is no route Description the decription of this route Source Line the type of source device includes FXO FXS T1 E1 IP and ports available multi chosen For example Slot1 2 means the 2nd port of the...

Page 35: ...ng multi number based on one matching mode Description the description of this transform strategy Type the execute mode of this strategy pre routing or post routing Source the type of source device an...

Page 36: ...cludes FXO GSM IP and ports available can be multi chosen for example Slot1 2 means the 2nd port of the 1st card Caller Pattern the number pattern of caller see 6 1 Matching Rules No setting means all...

Page 37: ...909 to 02088786688 so the final number is 1790902088786688 Add a postfix to caller or callee number add a N digits postfix on the tail of caller or callee number and make a new number N must be equal...

Page 38: ...not care the carry For example the old extension numbers are from 7001 to 7050 another system has a segment from 2301 to 2350 you may execute I 4700 to reflect these two segments For example 1 Redirec...

Page 39: ...ce and ports available Destination the type of destination device and ports available Caller Pattern caller number needs to be matched for this call Default ALL means all caller numbers are valid Call...

Page 40: ...st card Caller Pattern the pattern of caller number pattern s rule see 6 1 Matching Rules Blank means all patterns are valid Callee Pattern the pattern of callee number pattern s rule see 6 1 Matching...

Page 41: ...a Schedule There is no record in time segment list here when you first set it click Add to create a schedule and specify details of the schedule Note Create a group before you add a schedule and set...

Page 42: ...e type of date by day by week by month by year work day or every day Time range the specific time range 2 Click Add to save it 6 6 3 Schedule Management Use Modify Remove to change or delete existing...

Page 43: ...des Dial End String Dial Timeout or Both Dial End String the default is Dial Timeout expiration time of dialing count in second Query IP how to get GA90 s IP address composed by 12 keys 0 9 the defaul...

Page 44: ...6 Call Settings 41 Figure 6 10 Call Setings System Settings page...

Page 45: ...omain and maximal call number etc Note If it s register type FXS line you do not need to set call routing for it If it s register type you should set User name and Password for that enabled FXS line i...

Page 46: ...7 1 Change Password Change the administrator s password here other users passwords are set in Administration Change Password Current Password the password now used New Password the new password New Pa...

Page 47: ...atic mode you need to set these parameters IP Address the local IP address Net Mask the netmask of subnet Default Gateway the default gateway of subnet Primary Secondary DNS the IP address of primary...

Page 48: ...set NTP Enable to use this function It also provides time zone function Note If the equipment synchronizes time with NTP server please set right time zone and NTP server with domain or IP address to...

Page 49: ...6 GA90 Modular Gateway User s Manual 7 3 3 Change Time Set time by yourself The format is YYYY MM DD HH MM SS Note Be carefule about the format Figure 7 4 Administration Time Settings Time Setting pag...

Page 50: ...ervice the device will close all callings before restart service Reboot System reboot the operating system of the equipment which will cut off all calls then start the OS of the server and reload all...

Page 51: ...iguration Download click Download button to download system configuration as ga90_config tgz file to local machine 8 4 Auto Attendant GA90 provides voice file uploading function on the page of Mainten...

Page 52: ...pe for uploading file 3 Press Upload to upload the file 8 4 3 Recovery to default prompts Click Reset on the page of Reset all voice prompts to default to recovery prompts to the defaults which means...

Page 53: ...fy the connection with remote machine a Input IP address and domain in address filed b click Ping button and show this Traceroute Confirm the route to objective machine by tracking a message from sour...

Page 54: ...n The process of ensuring that digital data transmissions are delivered to the intended receiver Authentication also assures the receiver of the integrity of the message content and source The simples...

Page 55: ...S Also known as Rijndael this is a block cipher adopted as an encryption standard by the U S government and developed by two Belgian cryptographers Joan Daemen and Vincent Rijmen It has been analyzed...

Page 56: ...An application layer protocol that defines a set of rules for exchanging files text images sound video and other multimedia files on the Internet Described by RFC 2068 Incoming call A call originated...

Page 57: ...iod frequency displacement of the signal from its ideal location The SE system utilizes Jitter Buffers to compensate for jitter Key Management The management and handling private keys used for signing...

Page 58: ...a caching service and ensure security and administrative control for the enterprise The proxy server is invisible to the workstation all Internet requests and returned responses involving the worksta...

Page 59: ...other computers Session Description Protocol SDP An ASCII based protocol that describes multimedia sessions and their related scheduling information including information transport session participan...

Page 60: ...1350 Trunk Port A device that allows a switch to bundle traffic from several VLANs through a single physical port sorting the various packets by the VLAN identifier VID in their frame headers Trusted...

Page 61: ...P to transfer a data unit between computers without dividing it into packets and reassembling it at the other end Because UDP does not provide the sequencing of packets the application program that us...

Reviews: