manualshive.com logo in svg
background image

 
 

 

 

NeoGate TA400/800 

User Manual 

 

Version 41.18.0.8 

 

 

 

 

 

 

 

 

 

Yeastar Information Technology Co. Ltd 

Содержание NeoGate TA400

Страница 1: ...NeoGate TA400 800 User Manual Version 41 18 0 8 Yeastar Information Technology Co Ltd...

Страница 2: ...ce 12 3 1 3 VLAN Settings 12 3 1 4 VPN Settings 14 3 1 5 DDNS Settings 15 3 1 6 Static Route 15 3 2 Security Center 16 3 2 1 Security Center 16 3 2 2 Alert settings 18 3 2 3 AMI Settings 20 3 2 4 Cert...

Страница 3: ...odes 50 4 3 3 Speed Dial Settings 53 4 4 Audio Settings 53 4 4 1 Custom Prompts 53 4 4 2 Music on Hold Prompts 54 4 4 3 System Prompts Settings 55 4 5 Advanced Settings 56 4 5 1 Tone Zone Settings 56...

Страница 4: ...elephone system and reduce communication costs significantly with the true benefits of VoIP Features 4 8 FXS ports Fully compliant with SIP and IAX2 Dial Pattern of outgoing calls Hunt Group Configura...

Страница 5: ...obtain the NeoGate IP address How to check NeoGate TA IP address 1 Pick up the analog phone then access the voice menu prompt by dialing 2 Dial 1 to check the IP address 3 Dial 2 for web access addres...

Страница 6: ...NeoGate TA400 800 User Manual 6 62 Figure 1 2 Login NeoGate TA...

Страница 7: ...A Status Description Port Status Up Down Description Up The FXS module works well Down The FXS module is broken Voice Mail New Old Showing the number of unread voicemail and old voicemail Only when th...

Страница 8: ...y 2 1 2 Network status In this page the IP address of LAN port will appear with their status Figure 2 2 Network Status If your VLAN or VPN are configured you can check the status in this page also 2 1...

Страница 9: ...gs The call log captures all call details including call time caller number callee number call type call duration etc An administrator can search and filter call data by call date caller callee trunk...

Страница 10: ...ebug information up to 2 log files 2 2 3 Packet Tool This feature is used to capture packets for technician Integrate packet capture tool Wireshark in NeoGate Users also could specify the destination...

Страница 11: ...ecommended that you configure a static IP address for NeoGate TA Subnet Mask Set the subnet mask for NeoGate TA Gateway Set the gateway for NeoGate TA Primary DNS Set the primary DNS for NeoGate TA Se...

Страница 12: ...is 21 TFTP TFTP access The default port is 23 HTTP HTTP web access The default port is 80 HTTPS HTTPS web access it is disabled by default and you can enable it to get safer web access 3 1 3 VLAN Sett...

Страница 13: ...s a unique value you assign to each VLAN on a single device VLAN IP Address Set the IP Address for NeoGate TA VLAN over LAN VLAN Subnet Mask Set the Subnet Mask for NeoGate TA VLAN over LAN Default Ga...

Страница 14: ...ormation between remote locations or between a remote location and a business home network A VPN can provide secure information transport by authenticating users and encrypting data to prevent unautho...

Страница 15: ...name the DDNS server provides you Password User account s password Host Name The host name you have got from the DDNS server Note DDNS allows you to access your network using domain names instead of...

Страница 16: ...teway Define which gateway NeoGate TA will go through when accessing the destination network Metric The cost of a route is calculated by using what are called routing metric Routing metrics are assign...

Страница 17: ...he relevant button Service Figure 3 10 Service In Service tab you can check AMI SSH FTP TFTP HTTP HTTPS status You can enter the configuration page directly by clicking the relevant button Port Figure...

Страница 18: ...ple 500 9911 if the extension has configured Follow Me Settings the call would go to the forwarded number directly Attempts The attempts to dial a phone number when there is no answer Interval The int...

Страница 19: ...ontent supports predefined variables Variable names and corresponding instructions are as follows gateway hostname HOSTNAME attack source ip address SOURCEIP attack dest mac DESTMAC attack source port...

Страница 20: ...t allows live monitoring of events that occur in the system as well enabling you to request that Asterisk perform some action The actions that are available are wide ranging and include things such as...

Отзывы: