Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
X
IP PBX / Gateway
Administrator Guide
(Com.X revision 1.3 software release)
Document History
Version
Date
Description of Changes
3.0.0
26/07/2013
3.0.1
01/08/2013
3.0.2
26/08/2013
3.0.3
20/01/2014
3.0.4
26/02/2014
Added VPN and VLAN and network QoS configuration sections. Added
Campon Callback and Autoprovisioning of phones on a VLAN.
3.0.5
09/01/2015
Table of Contents
1 INTRODUCTION...............................................................................................................................13
1.1 OVERVIEW........................................................................................................................................13
2 MANAGING THE UNIT...................................................................................................................14
2.1 ACCESSING THE UNIT..........................................................................................................................14
2.1.1. Factory network configuration............................................................................................ 14
2.1.2. Authentication......................................................................................................................14
2.1.3. Remote web login.................................................................................................................14
2.2 CONFIGURATION MANAGEMENT............................................................................................................15
2.2.1. GUI layout............................................................................................................................15
2.2.2. Configuration status.............................................................................................................15
2.2.3. Applying and reverting a configuration...............................................................................16
2.2.4. Changing the default administrator's password..................................................................16
2.2.5. Rebooting and Shutting down..............................................................................................17
2.3 SYSTEM MAINTENANCE......................................................................................................................18
2.3.1. Backup and Restore.............................................................................................................18
2.3.1.1 Backup contents........................................................................................................................... 18
2.3.1.1.1 Factory default configurations............................................................................................. 18
2.3.1.1.2 Configuration, Recordings................................................................................................... 18
2.3.1.1.3 Voicemail............................................................................................................................ 18
2.3.1.1.4 CDR..................................................................................................................................... 19
2.3.1.1.5 Excluded from backup......................................................................................................... 19
2.3.1.2 Immediate backup........................................................................................................................ 19
2.3.1.3 Scheduled backup........................................................................................................................ 19
2.3.1.4 Managing existing archives.......................................................................................................... 20
2.3.1.5 Restoring an archive onto the same system .................................................................................. 20
2.3.1.6 Restoring an archive onto a replacement system.......................................................................... 21
2.3.2. Licensing..............................................................................................................................23
2.3.2.1 Adding a License......................................................................................................................... 23
3.3.3. Rules.....................................................................................................................................55
3.3.3.1 Port Forward................................................................................................................................ 55
3.3.3.2 Inbound Redirect......................................................................................................................... 57
3.3.3.3 Inbound Access............................................................................................................................ 58
3.3.3.4 Ping.............................................................................................................................................. 59
3.3.3.5 Blacklist....................................................................................................................................... 60
3.3.4. Advanced..............................................................................................................................60
3.3.5. Failed Rules ........................................................................................................................ 60
3.3.6. Network Quality of Service..................................................................................................61
3.3.6.1 Loading network QoS defaults .................................................................................................... 61
3.3.6.2 Editing classification and priority................................................................................................ 62
3.5.6. Codecs..................................................................................................................................78
3.5.7. Removing an association to an extension............................................................................79
3.5.7.1 Unassigning Extensions............................................................................................................... 79
3.5.7.2 Deleting Extensions..................................................................................................................... 79
4 ADVANCED CONFIGURATION..................................................................................................137
4.1 ANNOUNCEMENTS............................................................................................................................137
4.2 CALLBACK......................................................................................................................................137
4.3 CONFERENCES.................................................................................................................................139
4.4 DAY / NIGHT CONTROL.................................................................................................................... 140
4.5 FEATURE CODES..............................................................................................................................141
4.6 GENERAL SETTINGS.........................................................................................................................143
4.6.1. Dial command options.......................................................................................................143
4.7 IVR..............................................................................................................................................148
4.8 MUSIC ON HOLD..............................................................................................................................151
4.8.1. Configuring streaming music.............................................................................................151
4.8.2. Playback configuration......................................................................................................151
4.8.3. Adding a music category....................................................................................................152
4.8.4. Adding a streaming category.............................................................................................152
4.9 OUTBOUND ROUTES..........................................................................................................................153
4.10 PAGING........................................................................................................................................154
4.11 INTERCOM.....................................................................................................................................155
4.12 PARKING LOT............................................................................................................................... 156
4.13 PHONEBOOK..................................................................................................................................156
4.14 PIN SETS......................................................................................................................................157
4.15 QUEUES....................................................................................................................................... 158
4.16 RING GROUPS...............................................................................................................................161
4.17 SYSTEM RECORDINGS.....................................................................................................................163
4.18 TIME CONDITIONS......................................................................................................................... 164
4.19 TIME GROUPS...............................................................................................................................165
4.20 VOICEMAIL BLASTING....................................................................................................................166
4.21 DISA......................................................................................................................................... 166
4.22 LISTENING IN ON CALLS / SPY FEATURE.............................................................................................167
5 MONITORING THE SYSTEM......................................................................................................168
5.1 GUI STATUS PAGE......................................................................................................................... 168
5.1.1. Status Display....................................................................................................................168
5.1.2. Services menu.....................................................................................................................168
5.2 DETAILED LOGGING..........................................................................................................................168
5.3 CALL DETAIL RECORDS (CDR)........................................................................................................169
5.3.1. Reviewing Call Detail Records..........................................................................................169
5.3.2. Enabling logging to CSV....................................................................................................170
5.3.3. Accessing the CDR database............................................................................................. 170
5.4 MONITORING OF REMAINING CAPACITY ON THE UNIT..............................................................................170
5.4.1. Deleting of call recordings................................................................................................171
5.4.2. Changing the memory consumption threshold...................................................................171
5.4.3. Auto-removal of audio files................................................................................................171
5.5 RETRIEVING MONITORING INFORMATION...............................................................................................171
5.5.1. Monitoring functions..........................................................................................................171
6 ADVANCED ADMINISTRATION................................................................................................175
6.1 CONSOLE ACCESS.............................................................................................................................175
6.1.1. Authentication....................................................................................................................175
6.1.2. Accessing the unit...............................................................................................................175
6.1.2.1 Serial access............................................................................................................................... 175
6.1.2.2 Secure shell access..................................................................................................................... 175
6.20 NAGIOS........................................................................................................................................202
6.20.1. Hosts.................................................................................................................................203
2010 2014 Far South Networks
Index of Tables
Table 1: Default network interface configuration.......................................................14
Table 2: Global settings............................................................................................30
Table 3: Com.X Firewall default policies. .................................................................53
Table 4: Comma device configuration.......................................................................65
Table 5: Generic device configurationSip Handset Provisioning...............................66
Table 6: FXO port configuration................................................................................83
Table 7: FXS port configuration................................................................................83
Table 8: BRI port configuration.................................................................................84
Table 9: PRI port configuration.................................................................................85
Table 10: Extension configuration.............................................................................92
Table 11: Advanced extension configuration............................................................93
Table 12: Follow-me configuration............................................................................96
Table 13: Trunk group configuration (addition)..........................................................99
Table 14: Trunk group configuration (editing)..........................................................100
Table 15: SIP trunk basic configuration...................................................................102
Table 16: SIP trunk advanced configuration...........................................................105
Table 17: IAX trunk basic configuration...................................................................107
Table 18: IAX trunk advanced configuration...........................................................107
Table 19: Outbound route configuration..................................................................111
Table 20: Inbound route configuration.....................................................................115
Table 21: FlexPath route types...............................................................................117
Table 22: FlexPath destinations..............................................................................118
Table 23: FlexPath configuration............................................................................119
Table 24: FlexPath route configuration...................................................................119
Table 25: Ring-back behavior.................................................................................135
Table 26: Announcement configuration...................................................................137
Table 27: Callback configuration.............................................................................138
Table 28: Conference configuration........................................................................139
Table 29: Day/night configuration...........................................................................141
Table 30: Feature code configuration......................................................................142
Table 31: General PBX configuration settings.........................................................147
Table 32: Interactive voice response configuration.................................................150
Table 33: Playback configuration............................................................................152
Table 34: Music category configuration...................................................................152
Table 35: Streaming music category configuration.................................................153
Table 36: Outbound route configuration..................................................................154
Table 37: Paging configuration...............................................................................155
Table 38: Parking lot configuration..........................................................................156
Table 39: Phone book entry configuration options..................................................157
Table 40: Pin set configuration................................................................................157
Table 41: Queue configuration options...................................................................161
Table 42: Ring group configuration oprions............................................................163
Table 43: System recording configuration...............................................................163
Table 44: Time condition configuration...................................................................164
Table 45: Time group configuration.........................................................................165
Table 46: Voicemail blasting configuration..............................................................166
2010 2014 Far South Networks
Illustration Index
Figure 1: Com.X web portal......................................................................................19
Figure 2: Remote web login......................................................................................19
Figure 3: GUI layout and configuration status...........................................................19
Figure 4: Review / apply task list...............................................................................20
Figure 5: Start menu options.....................................................................................20
Figure 6: Start menu options.....................................................................................21
Figure 7: System maintenance - backup...................................................................22
Figure 8: The new backup is listed under the appropriate section.............................23
Figure 9: Backups can be scheduled to back up the Com.X settings automatically. 23
Figure 10: The schedule (if configured) is displayed on the title bar. ........................23
Figure 11: Managing individual backup archives. .....................................................24
Figure 12: Save the backup archive to an external location......................................24
Figure 13: Restore the selected backup....................................................................24
Figure 14: Tasks to be executed are listed with an option to cancel.........................25
Figure 15: Submit the desired archive for upload. ....................................................25
Figure 16: Updating the MAC address of a replacement unit....................................26
Figure 17: Manage Licenses via the GUI..................................................................27
Figure 18: Select the appropriate license type before uploading the license.............27
Figure 19: File retrieved and ready for upload...........................................................27
Figure 20: Licenses submitted for authentication......................................................28
Figure 21: Only system maintenance options available from the GUI of a system with
no active licenses......................................................................................................28
Figure 22: Select the Packages tab..........................................................................29
Figure 23: Managed packages listed with version and status...................................29
Figure 24: Options available for managing packages...............................................29
Figure 25: The comx-base-1.2-mpx packages is selected. ......................................30
Figure 26: Global Settings........................................................................................31
Figure 27: Options available for global network configurations. ...............................33
Figure 28: Interface list, status is boldly indicated by colour highlighting...................34
Figure 29: Ethernet LAN port configuration options..................................................35
Figure 30: DHCP and Comma server configuration options. ....................................36
Figure 31: Adding a route to all addresses in the 10.0.0.X range by declaring the
subnet, /24............................................................................................................... 37
Figure 32: Managing IP routes on an interface. .......................................................38
Figure 33: PPPoE interface configuration options. ...................................................39
Figure 34: VLAN and PVC port creation. .................................................................40
Figure 35: VLAN Configuration Options....................................................................41
Figure 36: Ports can be allocated a particular zone into which they fall. ..................42
Figure 37: Ports can be allocated into one of four default zones. .............................42
Figure 38: Policies are listed showing source and destination zones. ......................43
Figure 39: Add the default firewall policies to your configuration. .............................44
Figure 40: Policy Management and preference manipulation. .................................45
Figure 41: Editing an existing Firewall policy. ...........................................................45
Figure 42: Logging Options for firewall policies. .......................................................45
2010 2014 Far South Networks
1 Introduction
1.1 Overview
This document is intended for Com.X PBX and Gateway administrators and details
access to, commissioning, management and monitoring of the Com.X range of
products, release 1.3, including the Com.X5, Com.X10 and Com.X2 products. It
forms part of a suite of manuals and guides for the Com.X product range, which also
includes the Com.X End User manual, the Com.X Installation guide and the Com.X
Trouble-shooting guide release 1.2
Note: Com.X systems running 1.2 software can be upgraded to 1.3 software and
licensed.
Com.X gateway products can also be remotely licensed and upgraded to fully
functional 1.3 PBX systems.
Please contact your distributor for pricing and other details.
Models
DHCP?
IP
Netmask
lan1 / eth0
DHCP Client
lan2 / eth1
No
192.168.101.1
255.255.255.0
lan3 / eth2
No
192.168.102.1
255.255.255.0
lan4 / eth3
X5
No
192.168.103.1
255.255.255.0
internal / eth3
X1, X10
No
192.168.103.1
255.255.255.0
wan
X5
No
Note: Com.X5 systems utilize an internal PCI bus and offer external connection to
the lan4/eth3 network interface.
Warning: Changing the configuration of the internal eth3 interface may result in loss
of service on Com.X1/Com.X10.
2.1.2. Authentication
Web login has been pre-configured with the default administrator username 'admin'
and password 'admin'. It is advisable to change this password directly after
installation.
Note: Should your GUI eventually time out rather than loading correctly, you can
now select to Restart the GUI and to restart the system directly from the web portal
log in.
Note: changing the administrator's password on the GUI also changes the
underlying advanced FreePBX GUI's password accordingly.
Note: changing the administrator's password does not change the SSH login
password for the system, the ARI call monitor password or the MySQL database
password. Please see section 3.15 for more information on securing the system.
NFS configuration
Mail relay configuration Third party module / service configuration (e.g. P$X,
FOP, Queue statistics, PPPoE, TNG, Man3000, device mount configurations,
etc)
Figure 10: The schedule (if configured) is displayed on the title bar.
The list of steps to be executed during the restore are displayed. Select Continue to
restore, or cancel.
2010 2014 Far South Networks
Reboot the system once restore has completed (please see 2.2.5).
To restore from a data file saved at an external location, first upload the archive to
the Com.X and then follow the procedure above. Select Upload from the options
menu on the appropriate backup set in order to upload an archive.
2.3.1.6 Restoring an archive onto a replacement system
In case of hardware failure, it might be necessary to restore the configuration of a
system onto a replacement unit.
to restore from a data file saved at an external location, first upload the backup to the
Com.X.
Select upload in the options menu of the relevant section. Enter or browse to, the
location of the backup archive and submit.
Then follow the procedure in 2.3.1.5 to restore the backup onto the system.
Note: After a configuration has been restored, you will be required to apply the
changes. This gives the opportunity to change any settings (network configurations
in particular may need changing, to avoid loss of service) before they become active
on the system.
Note: Updating of the MAC address is necessary only on iTA devices. Units that
contain only MPX telephony devices (such as a Com.X 5 with no external iTA's ) will
not require MAC addresses to be updated.
These archives contain the relevant licenses for Farsouth (gateway or PBX) and third
party software.
Note: If a configuration back up is made on a system featruing budget trunks, the
remaining minutes field is set to the minutes remaining on the system at the time the
back up is made. If this back up is then restored to the system, the trunk will be
created with the remaining minutes field already set. This field should be manually
reset after any configuration archive restoration.
2.3.2. Licensing
Licenses are used to enable functionality on 1.2 systems. Licenses are available for
full PBX functionality, gateway and PBX major release upgrades and for certain third
party installations, like ViBE (see section 2.3.4 for more information on ViBE
licensing) and FOP2 (see section 6.19 for further information on FOP2).
2.3.2.1 Adding a License
License archives of the form <serialnumber>_XXXXXXXXXXXXXXXXXXX .zip
obtained from Far South Networks are uploaded to the system via the GUI. These
archives contain the relevant licenses for Farsouth (gateway or PBX) and third party
software. These licenses will only work on the unit for which they are issued.
From the system maintenence page, select the packages tab, and then options,
licensing, and Add License.
This will allow you to upload a license from your computer. Select they type of
License you would like to add and then Browse your computer for the correct license
file.
As the license file is retrieved the status bar will turn blue. Accepting will upload the
selected file.
The .zip folder is then submitted for authentication. After which the GUI restarts.
After uploading a license to the Com.X, allow a few seconds for the GUI to update
and refresh. If the license is accepted the appropriate GUI functionality will be
available.
Note: It may be necessary to manually restart the GUI from the command line after
adding a license: sudo /etc/init.d/comma-gui restart
The State column provides information comparing the version of the installed
package to the version of the latest package available on the Far South Networks
repository.
2010 2014 Far South Networks
With one or more packages selected, click Options and then Download updates.
This will pull the latest packages from the Far South Networks repository and store
them on the Com.X, however it will not install the updates until requested to do so.
This allows updates to be retrieved immediately, but installed at a convenient time,
when service can be interrupted.
Note: If no packages are selected, the GUI will ask if you would like to download
updates for the two top-level packages, comx-base and comx-gui
2.3.5.2.3 Install/Upgrade
Select individual packages or multiple packages as in section 2.3.5.2.2 and then click
on the Install/Upgrade option in the Options list. This will install any updates to the
selected package that have been downloaded but not installed. If there are no
dowloaded updates, then the Com.X will download and install the updated packages
from the Far South Networks repository.
Note: Installation of updates may incur a brief loss of service.
Field
Content
External Address
External is
Dynamic
When true, indicates that the SIP source host specified should
be treated as a dynamic host. This informs the remote peer to
resolve the address of the host for each dialog, in case the
2010 2014 Far South Networks
Content
address has changed.
Additional local
subnet
Jitter Buffer
Enabled
Jitter Buffer
Adaptive
Match Digit
Timeout
Notification email
SMTP host
SMTP port
Masquerading
domain
SMTP user
SMTP password
Gateway
recording
If enabled, all calls on all trunks via the Com.X will be recorded.
Gateway
recording
encryption
FOP only
If set to true, this will restrict access to the Flash operator panel
Content
available to
Operator
Ringback on
transfer busy
Ringback on
Enabled by default. If enabled, calls that are transferred to an
transfer no answer extension and then unanswered, will ring back to the
transferring extension.
Ringback on
transfer voice
prompt
3.2.1. Connections
The connections page allows for configuration of some global networking
parameters.
Double-click a field to edit the field and enter required information.
Content
Host Name
Domain
Primary DNS
Server
Secondary DNS
Server
DNS Associated
Interface
Content
Name
Description
DHCP Client
Enabled
IP Address
Network Mask
Gateway
Default Metric
Content
Content
Field
Content
Name
Description
Automatic IP
Enabled
IP Address
Network Mask
Gateway Peer IP
PPP Username
PPP Password
PPP Authorization
Default Route
Default Metric
As with other network interfaces, the interface configuration may be edited by doubleclicking the list entry. The availability of the different fields will depend on the Serial
Protocol chosen.
The fields are described in the table below. Note that only PPP mode supports
Automatic IP configuration.
Field
Contents
serial0
Description (not
editable)
X21-1
Serial Protocol
Enabled
IP Address
Network Mask
Gateway/Peer IP
PPP username
PPP password
PPP authorization
Default metric
PVCs are added by selecting Options New PVC... The screenshot below shows
the configuration of a new PVC.
Field
Contents
DLCI
IP Address, Network
mask, Gateway,
Default metric
To edit a PVC, double-click its interface entry as usual. To delete a PVC, right-click
on the interface entry and select the Delete option in the menu.
Field
Contents
VLAN Physical
Interface
The actual physical LAN interface through which this virtual port
connects to the rest of the virtual network. This could be any of
the LAN ports, or the internal dsl router on certain Com.X5
models.
VLAN ID
Use 802.1p priority If checked (the default), the VLAN priority field on the incoming
inward
packet will be mapped to a network queue priority on the
Com.X device
Use 802.1p priority If checked (the default), the QoS priority setting of the traffic
outward
source will be set in the VLAN priority field of the outgoing
packets
DHCP Client
IP Address
Network Mask
Gateway
Default Metric
VLAN ports can be configured to act as DHCP and Comma servers , as in section
3.2.2.3 . Individual and specific IP routes can be associated to the VLAN interface in
a similar was as described in section 3.2.2.2.
Field
Contents
Name
Description
DHCP Client
Enabled
IP Address
Gateway
N/A
Default Metric
Field
Contents
Port Number
Transport
VPN Public IP
3.2.5.2.1.1Routes
Routes are added by selecting the Routes tab once configuring the interface. Routes
on VPN interfaces are added as with any other network interface as described in
Section 3.2.6
3.2.5.2.1.2Generating certificates for clients
To generate authentication certificates for client devices, right-click on the interface in
the interfaces list, and select VPN Clients. Select New and enter the name of the
client. Review and apply your changes to create the client.
Figure 40: Select VPN Clients to generate licenses for client devices.
Once a client is created and the configuration applied, a certificate pack and/or
configuration pack for the client can be generated. Right-click the client in the clients
list, and select Get Configuration.
Select your desired certificate packaging and save the file to a location on your
desktop/laptop computer.
Note: Changes must be applied after the creation of a client before requesting
configuration. No client configuration is created before the changes are applied, and
so no configuration will available for unapplied clients.
Field
Contents
Port Number
Transport
Remote Server
Address
HTTP proxy IP
address
HTTP proxy
username:
HTTP proxy
password
Note: After applying network configuration changes, the unit needs to be rebooted
or the networking service restarted.
3.2.6.1 Removing IP Routes from an Interface
Configured routes can be removed from interfaces by selecting the routes tab of the
associated interface, selecting the route, and then clicking the Remove button.
Accept and apply your changes.
Multiple routes can be deleted at once, by using CTRL-click to select all routes
marked for deletion.
3.3.1. Zones
The Com.X allows separation of its interfaces into different zones, each of which is
authorized to access only portion s of the available network. The access provided to
devices in each zone is configured through firewall policies (See section 3.3.2)
Figure 45: Ports can be allocated a particular zone into which they fall.
Figure 46: Ports can be allocated into one of four default zones.
Zone
Access
Com.X
LAN
Interfaces placed in the LAN zone have access only to the internal
network. The internet and any external destination is only reachable
through another device in the DMZ.
DMZ
The De-militarized zone has access both to the internet and a limited
partition of the internal network. Interfaces in this zone are typically
used to provide services to users on the external network.
Internet
3.3.2. Policies
Policies are used to control the access available to each firewall zone (see section
3.3.1) Policies are explicitly configured to provide a standard way of dealing with
traffic moving from one zone to another.
Figure 47: Policies are listed showing source and destination zones.
Action
2010 2014 Far South Networks
Accept
Drop
Reject
Reject any packets sent from the source zone to the destination
zone with a rejection message.
Default Policies:
Destination Zone
Action
Com.X
Internet
Accept
Com.X
LAN
Accept
Com.X
DMZ
Accept
LAN
Com.X
Accept
LAN
Internet
Accept
LAN
DMZ
Accept
DMZ
Com.X
Accept
DMZ
Internet
Accept
DMZ
LAN
Drop
Internet
All Zones
Drop
All Zones
All Zones
Reject
3.3.3. Rules
Rules are very specific exceptions to the configured policies. Rules allow the
forwarding of ports. Rules allow for traffic to move from particular ports or addresses
in a manner that would normally be prevented by the policies.
To configure a new rule, select Rule Wizard from the options menu of the Firewall
page and select the type of rule you wish to configure.
Each Rule type makes use of the same rules parameter sheet, with certain fields preconfigured depending on the type of rule.
3.3.3.1 Port Forward
To forward a single port or a range of ports to the firewall, you can use the port
forwarding rule wizard.
Field
Description
Source Zone
Source IP address
Destination Zone
Destination IP address
Protocol
Loglevel
Description
Field
Description
Source Zone
Source IP address
Destination Zone
Protocol
Loglevel
Description
Field
Description
Source Zone
Source IP address
Destination Zone
Protocol
Loglevel
Description
3.3.3.4 Ping
A ping rule allows the Com.X device to receive and respond to pings sent from
particular devices in the internet zone (i.e. not on the local network, but rather on the
external internet).
Field
Description
Source Zone
Source IP address
Destination Zone
Protocol
Loglevel
Enable
Description
Field
Description
Source Zone
Source IP address
Destination Zone
Loglevel
Enable
Description
3.3.4. Advanced
Should you require some behaviour that can not be achieved with the rule-types
already listed, configuring an advanced rule allows you to manually configure each
field of the rules sheet. This allows for advanced port-by-port traffic routing of your
choice of protocols. We suggest consulting
the shorewall documentation before configuring a rule of this type.
http://www.shorewall.net/
Figure 59: This rule features an unknown interface and so has been disabled and
marked in red.
Accept that all user changes will be over written, and Review/Apply your
configuration.
2010 2014 Far South Networks
Field
Contents
Class Name
Class Description
Description of above
DSCP Value
802.1p priority
Managed SIP devices supported IP phone types that are fully managed by
the Com.X
For each device, the device name, type, model, MAC address and Auto IP values are
listed. Where available, the device IP address and current status are also listed.
Figure 64: The network can bge scanned for devices from the Hardware panel.
The number of devices detected is displayed in the top right corner of the Hardware
panel. To add detected devices to the configuration, select the Add menu item
followed by the Detected menu item.
Figure 65: The number of detected devices is displayed on the Hardware panel.
Scanning the network increases the number of detected devices.
This results in a list of detected devices from which one can be selected for
configuration. Where available, the existing MAC address, device type, model, IP
address and vendor information is listed.
Content
Device Name
Model Type
Auto IP
Content
matching the configured MAC address.
IP Address
An IP address unique to the device on the network. Autoassigned if Auto IP Client is enabled.
Network Mask
The network mask the device should be configured with. Autoassigned if Auto IP is enabled.
Gateway
Content
Device Name
Model Type
The type of the device. In most cases this will remain blank for
manually added generic devices.
Auto IP
MAC
IP Address
An IP address unique to the device on the network. Autoassigned (leave empty) if Auto IP Client is enabled.
Network Mask
The network mask the device should be configured with. Autoassigned if Auto IP is enabled.
Note: If the phone connects to a network with a DHCP server other than the Com.X
present, the DHCP server should configure option 66 to refer to the Com.X when
responding to phone DHCP requests.
Much like a firewall is able to block unwanted traffic by forwarding selected ports on
the Com.X to be visible from the internet, the Com.X is able to port-forward traffic to
the handsets so that they sit behind the Com.X, but can still be safely accessible
from the internet. This allows for the installation of unconfigured phones on site, to be
configured remotely at a later stage.
This means that an array of phones can sit behind a firewall, and be configured
remotely.
Note: If a phone is featured on the hardware list, either as a managed SIP phone, or
a generic device, the GUI of the phone can be accessed through the GUI of the
Com.X. This is done by forwarding ports, ensuring that all hardware is available
remotely, even if it is behind a firewall.
Select Options New and then select either the manufacturer of your handset.
Field
Description
Device Name
Model Type
Auto IP
Mac Address
The Mac address of the device being added. This field is used
to identify the device when it is physically connected to the
network.
IP Address
An IP address unique to the device on the network. Autoassigned if Auto IP Client is enabled.
Network Mask
Attached Network
Configuration Path
Autoprovision
Firmware
If a .rom firmware file has been added to the Com.X via the
file manager, selecting the .rom will install the selected
firmware on the handset.
You will notice the number of detected devices (displayed in the top right hand corner
of the GUI) increase.
Select Options, and then Detected to see a list of detected phones. Select a
Managed SIP Device.
When configuring an auto-detected device the Com.X automatically detects and
populates all fields with appropriate settings. The name of the device is defaulted to
the Mac address of the unit, and this is the only field that should require (optional)
editing.
Field
Description
Device Name
Model Type
Auto IP
Mac Address
IP Address
Network Mask
Attached Network
Configuration Path
Autoprovision
Note: The fields listed in the spreadhseet can vary and not all options need be
configured. It is recommended that anyone using spreadhseets to configure phones
first manually add a few managed sip phones to a unit and then export a
spreadhseet of the configuration, which can be used as a template for all future
configurations. See Section 3.5.1.3.2 for details on exporting a spreadsheet.
For a variety of security and performance reasons, it may be desireable to host SIP
handsets on a virtual LAN.
In order to configure a managed SIP device to reside on a VLAN, a VLAN interface
needs be configured as in Section 3.2.5.1.
In order for the DHCP server on the VLAN interface to provide DHCP to the handset,
the phone needs first to be configured to connect to the VLAN. This can be easily
achieved by configuring DHCP server on both the physical interface and the VLAN,
as per Section 3.2.2.3.
Connect your handset to the physical LAN port (most likely through a switch) and
power up the phone.
Ensure that auto-detection of hardware is enabled, and add the handset from
deteced devices, as in Section 3.4.3.
The phone should then detect the changes to it's network settings and reboot itself, if
this does not happen automatically, reset the handset to factory default settings from
the GUI. On reboot, the phone will retrieve it's updated configuration.
Note: Upon the phone booting, the review/apply button on the GUI may become
bold. If this occurs, REVERT your configuration, to update the IP address field on
the managed SIP phone. Only apply from the review/apply button once the
managed SIP phone shows both the correct VLAN interface and IP address.
Figure 79: This shows one handset residing on a network on LAN2, whilst another
phone, connected to the same physical LAN port, resides on the virtual network hosted
by VLAN2.50.
Note: With certain handsets, the DHCP settings remain set until the interface goes
down, so it may be necessary to physically remove and replace the network cable,
or induce a power break cycle before the phone reconfigures itself to the VLAN.
2010 2014 Far South Networks
Note: It is recommended that any phones that are added be factory defaulted as a
part of their initial configuration. It is not possible to reassign lines on devices if they
are already assigned to extensions, the association to the extension must first be
deleted. Factory defaulting phones as you install them deletes any extensions
configured in a previous installation and ensures that the Com.X is able to configure
all lines seamlessly.
Note: Due to changes in more recent Yealink firmware, It is not possible to factory
default of restart Yealink handsets featuring firmware of version 72.25 and more
recent. For these handsets you can connect to the phone's GUI through the Com.X
GUI and manually restart or default the handset.
Multiple extensions, with consecutive DID numbers can be assigned to multiple lines
on the device by holding 'Ctrl' while selecting individual lines, then right-clicking and
selecting assign.
Enter the DID of the starting extension, this extension will be assigned to the first
selected line on the handset. The other selected lines on the device will be assigned
extensions with consecutive numbers.
Figure 84: Click and drag the desired line over the desired free extension. Note the
green tick icon on the line being dragged.
DESCRIPTION
Enable
Local Extension If enabled, SIP Server, Register Login and Register Password
Port
fields will be automatically populated. Disable this option to
manually enter configuration details and register an extension on a
remote system.
Label on Phone Enter the label you would like to see on the phones display.
Register Login
Register
Password
SIP Server
SIP Server Port If Local Extension Port is disabled, this field can be edited to
contain the port on which the extension should register on the
remote system.
Use Outbound
Proxy
Outbound proxy The address of the outbound proxy through which the extension
registers with the remote system.
Outbound
Proxy port
NAT Traversal
If enabled, the phone will use NAT to locate its remote host.
3.5.6. Codecs
By default extensions created in the above manner, will be configured to support an
alaw codec. To add or remove supported codecs to the extension, right-click the
extension and select Edit. Select the Codecs tab. This will present a list of
available Codecs. To select multiple Codecs, hold Ctrl and click on the desired
Codecs.
2010 2014 Far South Networks
Right-click the particular key you wish to edit, and select a destination.
If the user of the managed SIP Device is on a call, pushing the key will transfer the
call to that destination. If no call is in progress, pressing the key will initiate a call to
the destination.
By default, the DSS key will also show the status of the destination through the Busy
Lamp Field. If the destination is available, the lamp next to the DSS key will be green.
If the destination is busy, the lamp will be red and if the extension is ringing, the light
will flash red.
3.5.8.3 Configuring Multiple DSS keys to map to consecutive extensions.
It is possible to simultaneously configure multiple keys to map to extensions. Rightclick the Managed SIP Device in the hardware list. Navigate to Advanced>Switchboard and then select multiple soft keys by left clicking the first key you
would like to edit and then holding shift while left clicking the last key in the range. To
select non-consecutive keys, hold Ctrl while selecting the desired keys.
Select the Extension option and choose the first extension in the range. The first
highlighted key will then be set to the first extension selected and the subsequent
keys set to the next extensions featured in the list.
3.5.8.4 Adding an Extension Module
To add an extension module, simply click Add. Navigate to the correct EXT tab to
configure the soft keys of the extension module. Multiple extension modules can be
added to handsets that support them.
The EXT keys are configured as per section 3.5.8.1.
Note: Applying any changes to Managed SIP Devices from the Com.X GUI will
cause the handset to reboot. The device will reboot,and then update configuration
upon startup. This process results in the phone being unavailable for around one
minute after a Review/Apply.
Content
Input gain
Output gain
Echo canceler
Detect Fax
DID number
DID description
Detect caller ID
Hangup
detection
Content
Note: if a country tone-set is not available for the country of
deployment and as a result on of the available duty cycles is
configured, it is possible that different exchanges routing
inbound calls to the system might have different end-of-call
tones.
This may result in FXO port lockup if the varying tones cannot
be detected using the configured duty cycle. If this is the case,
use the 'Any regular pattern' setting to detect such tones.
For more information on the options available to detect end-ofcall under such conditions, please see the Com.X Troubleshooting guide.
Content
Input gain
Output gain
Echo canceller
Allow transfer
Immediate mode When enabled, ring tone is not provided when the phone goes off
hook and the Com.X is required to take immediate action, such
as dialing an emergency number. Please see section 3.12.11.7
for more detail on using FlexPath with his feature.
Fax channel
Indicates that this port is to be used for fax. Enabling this setting
disables echo cancellation on the port. Please see section 3.6.8
Content
Link Type
Act as NT
Bus termination
Echo canceler
Detect Fax
When enabled, all BRI ports in all trunk groups to which this BRI
port belongs will detect fax tones and disable echo cancellation
for the duration of a fax call. We recommend enabling this feature
on all BRI ports that are likely to support fax calls.
Note: This option is not available if the port is not part of at least
one BRI trunk group.
Content
Physical interface The service offering, either 23B+D T1 or 30B+D E1. For E1,
double frame or CRC4 multi-frame can be enabled, and for T1
framing can be either Super Frame (D4) or Extended Super
Frame (ESF, using CRC-6) The physical interface configuration
must match that of the PRI peer.
Switch type
Signaling role
Overlap dialing
Please note that echo heard by users of the Com.X (as opposed to external parties)
is typically caused by the remote party. The Com.X does attempt to cancel the echo
from the remote party on BRI, PRI and FXO connections to the telco, but the
effectiveness of this cancellation is highly dependent on external conditions which
are impossible to predict or control.
Note also that SIP connections (including local SIP phones) are never echo
cancelled (it is not technically feasible) therfore, this is the responsibility of the SIP
phone itself or of the upstream service provider.
The default configuration of Com.X SIP is constant latency (i.e. fixed jitter
buffer)
Com.X VoIP does not use Comfort Noise Generation or Voice Activity
Detection
The SDP negotiation extensions (V.152 clause 7.1) are not supported in
Com.X. However, a switch to G.711 A-law on re-invite accomplishes the clear
channel requirement for voice band data, as described above.
Note that a SIP phone may have more than one line and hence more than one
extension port.
Extension Ports are created when Comma or Managed SIP devices are added in the
Hardware Panel, and when Generic SIP extensions are added in the Extension
Panel.
An Extension and an Extension Port can be associated, either by configuration as
described below or by hot-desking user login.
Content
Number
Friendly name
Port
The device and port the extension has been assigned to, if any.
This can only be changed by unassigning and re-assigning the
extension (please see 3.7.9 and 3.7.8)
Content
Voicemail
Pin
Call waiting
Pickup group
Account code
Use NAT
When enabled, the system ignores the SIP and SDP headers'
address and port and replies to the sender's address and port.
Outboud CID
Content
Disable
Ring strategy
Follow-me list
Content
Announcement
Play Music on
Hold?
Alert info
Confirm calls
Remote announce A message to be played to the person answering the call in the
case where call confirmation is required. Please see section
4.17 for more detail on system recordings.
Too-late announce A message to be played to a person answering the call in the
case where they have picked up the call, have not pressed 1 to
confirm yet, and in the interim someone else has picked up and
confirmed. Please see section 4.17 for more detail on system
recordings.
Note: It is recommended that a too-late announcement is
configured on all follow-me's. Without such an announcement
the person answering the extension too late might interpret the
engaged tone as a dropped call.
Destination if no
answer
Note: In order to log in dynamically to a free device using a free extension, the
extension must have a user pin configured.
Content
Name
Unique identifier for this group. Analogue groups (FXO) may only
be numbers from 1 62, and BRI groups may be any unique
combination of alpha-numeric characters.
Type
The group type. Only trunks of this type may be included in the
group. Allowed types are:
Analogue trunk (FXO)
ISDN BRA (BRI)
When the group was created from a selection of trunks, the type
will automatically be selected
After creation, the new group and any ports belonging to it will be listed under the
Trunk Groups node.
3.8.2.2 Editing trunk groups
Trunk groups can be edited by right-clicking on the trunk group in the group list and
selecting edit.
Content
Enable trunk
Outbound caller ID
The caller ID to present for call placed via this trunk group.
Round robin
Content
Name
Description
SIP Server
Port
Username
Password
Act as Provider
When enabled, this trunk allows other SIP users to register with
it. An UNKNOWN peer will be created and the IP address of
the peer will be associated with this trunk on registration.
Note: When configuring a Com.X to Com.X SIP trunk, if the
registering trunk is configured and applied on the registering
Com.X before the SIP provider configuration is applied on the
Provider Com.X, the registering box will need a 'sip reload' to
initiate registration. We therefore recommend configuring and
applying the provider trunk before the registering trunk. SIP
can be reloaded from the Monitoring Reload menu
Register with
Provider
Identify by
username
Content
Proxy
Proxy port
The port on which the SIP proxy service resides (defaults to 5060)
From user
From domain
Auth user
NAT
When enabled, the system ignores the SIP and SDP headers'
address and port and replies to the sender's address and port. This
should be enabled when the Com.X is located behind a NAT router.
Secure
Skype
Retry
registration
Qualify
connection
Contact # for
incoming
Content
Maximum #
channels
T.38 fax mode Configures the trunk as a T.38 end-point, allowing faxes to be sent
and received using UDP over IP using the T.38 fax protocol. Also
configures UDPTL and datagram settings accordingly.
Max datagram Fine-tuning for T.38
size
Table 16: SIP trunk advanced configuration
Codecs supported by a SIP trunk can be selected by using the Codecs button. Use
Ctrl-Left-Click (holding Ctrl down) to select multiple codecs. Individual codecs can be
moved up and down the codec priority list by selecting the codec entry, and selecting
the Up or Down buttons.
When negotiating a SIP call, the codec with the highest priority (at the top of the list)
will be attempted first, then the second and so on. Codecs may specify the
integration time in milliseconds after the codec name in the form codec:integration
time, e.g. 'g729:40'
Note: Com.X systems support dynamic RTP payloads in the range 96-127. These
are set up per-call by the peer using the SDP a:rtpmap parameter.
Content
Name
Description
Registrar
Username
Password
Act as Provider
When enabled, this trunk allows other IAX users to register with
it. An UNKNOWN peer will be created and the IP address of
the peer associated with this trunk on registration.
Note: When configuring a Com.X to Com.X IAX trunk, if the
registering trunk is configured and applied on the registering
Com.X before the IAX provider configuration is applied on the
Provider Com.X, the registering box will need a 'iax2 reload' to
initiate registration. We therefore recommend configuring and
applying the provider trunk before the registering trunk.
Register with
Provider
Field
Content
Qualify
connection
Contact # for
incoming
Maximum #
channels
Codecs supported by an IAX trunk can be selected by using the Codecs button. Use
Ctrl-Left-Click (holding Ctrl down) to select multiple codecs. Individual codecs can be
moved up and down the codec priority list by selecting the codec entry, and selecting
the Up or Down buttons.
2010 2014 Far South Networks
Content
Budget Mode
Reload Period
Reload day/date
Current Minutes
Note: Budget trunk configurations are backed up as a part of the configuration back
up. If a backup is made whilst a trunk has minutes remaining, these minutes will be
set as the Current Minutes field when the backup is restored. For accurate budget
trunking, this field needs to be manually reset to zero after a configuration back up
has been restored.
Content
Name
Pin
If set, after a user has dialed a number that matches the dial
pattern of this route, the user will be prompted to enter the pin
code in order for the call to proceed.
Pin sets
If more than one pin should allow access to this route, leave the
Route password field empty and specify a pin set here. The pin
set needs to exist before referring to it here. Please see section
4.14 for details on configuring pin sets.
Time Limit
Emergency
Intra-company
When enabled, the CID sent with the call information is the
internal, local CID, and not the outbound CID of the extension
or trunk.
Note: If changes are applied while an outbound route has no associated trunk, the
dial patterns for that route will be lost after the apply.
Content
DID
CID
Description
Destination Type
Destination
FXS, SIP phone port routed as internal extensions, i.e. access to internal
destinations and Outbound routes.
FXO, BRI, PRI, VoIP trunks routed as inbound, i.e. access to Inbound
routes and DID mapped extensions only
In order to change the default routing, one or more FlexPaths are created, and one or
more extension ports or trunks are placed into the FlexPath. A port that is mapped
to a flexpath is indicated in the tree on the right as <port name> -> <flexpath name>
instead of <port name> -> default. Right clicking on the port text allows selection of
default or any of the configured FlexPaths.
An extensions port or trunk assigned to a particular FlexPath follows the routing rules
of that FlexPath instead of the default routing as described above.
FlexPaths are also available as destinations for Inbound routes (on the Inbound
panel) i.e. custom FlexPath routing can be applied after initial Inbound routing. In
this case, the trunk port will typically be assigned to the default routing context to
enable normal Inbound handling.
Each FlexPath has the following:
Include the selected routing set is simply included (routing sets include
Inbound, Internal, other FlexPaths and Outbound routes)
Start a route set is selected for calls with no dialled number information
Description
Inbound DID
Inbound Direct
Internal
Description
FlexPath
Other
Outbound
Content
Name
Unique name for the FlexPath. Spaces are not allowed in the
name.
Description
Account Code
Lookup Caller ID
Allow Directed
Pickup
Content
Routing mode
Pattern
CID
Description
Transform
Destination
3.12.11.
Scenario
Extension 301 is required to have access to internal and national dialing only.
Configuration:
Extensions:
national access
international access
Two FlexPaths:
2010 2014 Far South Networks
pathNational includes the national outbound route and the Internal include.
Port assignments:
Extensions ports (both FXS and SIP) are assigned the appropriate extension
numbers for each company.
Fixed incoming DID 8000 is routed to Company A's reception. This DID will
be assigned to BRI calls originating from Company A's BRI channels in a
FlexPath
Fixed incoming DID 9000 is routed to Company B's reception. This DID will
be assigned to BRI calls originating from Company B's BRI channels in a
FlexPath
FlexPaths:
companyA-in: Add a Start route that transforms incoming BRI calls without
DIDs to the reception extension and forward these to the Inbound routes.
companyA-in: Add a Match route that transforms incoming BRI calls with any
DID to the reception extension and forward these to the Inbound routes.
companyB-in: Add a Start route that transforms incoming BRI calls without
DIDs to the reception extension and forward these to the Inbound routes.
companyB-in: Add a Match route that transforms incoming BRI calls with any
DID to the reception extension and forward these to the Inbound routes.
Note: Inter-company calls are facilitated by default and can be accessed by directly
dialing a company's extensions (e.g. the receptionist for Company B could dial 8000
to reach the receptionist for Company A.) To disable this, create empty FlexPaths
that terminate service for cross-company numbers:
Note: This is a simplified example. FlexPath could also be used to match incoming
DID ranges and route these to separate inbound routes for different partitions.
Note: The incoming CID can also be prefixed with a custom name for inbound
routes. To configure this, access the FreePBX Inbound Route configuration (please
see section 6.5) and configure the 'CID name prefix' field.
3.12.11.3 Simple partitioned DID routing:
If DIDs are provided by the telco, the use of inbound FlexPaths are unnecessary and,
provided the extension numbers created for each company matches the DIDs
provided over by the Telco, calls will automatically route to the correct extensions.
Scenario:
DID ranges routed by the Telco as follows:
Company A: 5559000 5559049 -> ports d1 and d2
Company B: 5559050 - 5559099 -> ports d3 and d4
Telco communicates the last 4 digits of DID across channels during call setup.
Configuration:
Creating extensions 9000 9049 for Company A and 9050 9099 for Company B
assigned to the appropriate FXS and SIP ports will result in automatic call routing to
the correct extensions for incoming calls.
3.12.11.4 Trunk to Trunk gateway
Scenario:
2010 2014 Far South Networks
Ensure that Proxy, NAT, connection qualification and codec selection options
are configured appropriately.
Head office outbound route routes calls to branch extensions across the SIP
trunk
Branch office outbound route routes all calls (including calls to head office
extensions) to head office across the SIP trunk
FlexPath:
Head office configured with a FlexPath that places calls originating from the
SIP trunk either internally or routes them trunk-to-trunk to the PSTN outbound
route.
At the branch, create a FlexPath with a Match rule that matches head-office
extensions with an outbound route as destination and the following transform:
CD.
At the head-office, add FlexPaths with Match rules that match the DIDs
transformed by the branch and routes them based on the received CID
number in the DIDs to the correct FXO port.
At the head office, assign DIDs to the Com.X1 FXO ports and add a FlexPath
that pre-pends this DID to the dialed number before routing to the branch
across the SIP trunk.
At the branch, add FlexPaths with Match rules that routes to the appropriate
extensions based on the DIDs received from the head-office.
From the Hardware panel, edit the port to which the device is connected and
enable Immediate mode.
FlexPath:
Create a FlexPath that includes a Start route, configured to transform the DID
to 911
3.12.11.8 Transformations
The Com.X allows both outgoing and incoming dialing numbers to be transformed.
To transform, create a FlexPath and add a Start or Match route to the path, with the
required transform specified.
Transforms may contain digits 0 9 and special placeholders D, which is replaced
with the current DID and C, which is replaced with the current CID.
Scenario:
All outgoing calls must be prepended with 08 and followed by 55 and the CID, if any.
Configuration:
Add a FlexPath with a Match rule with an outbound route as destination and
the following transform: 08D55C
Scenario:
All calls incoming on a SIP trunk needs to be prepended with 77.
Configuration:
Add a FlexPath with a match rule that includes inbound DID routing
transforms as follows: 77D
When DIDs are not provided over BRI channels, DIDs can be associated directly with
BRI ports in the Com.X to facilitate call routing.
Scenario:
DIDs 9001 9004 need to be associated with 4 BRI ports.
Configuration:
Create a Trunk Group for each BRI port. BRI ports cannot be assigned to
FlexPaths directly.
Add Start routes to the FlexPaths that transform to the required DIDs
Set the destinations of the Start routes to Inbound DIDs for inbound call
routing.
Add two SIP trunks, with distinct IP address end-points (in this scenario
10.0.0.1 and 10.0.0.2) These may be two proxies with the same provider, but
for IP routing capability, the IP addresses must be different. When routing
across telco interfaces, one would replace the SIP trunks here with trunk
groups that contain the trunks to be used.
Create two outbound routes, one using the first SIP trunk and the other the
second SIP trunk (or the appropriate telco trunk groups).
Create two FlexPaths, and add an Include rule that includes the appropriate
outbound route for each. Point the first FlexPath to the first outbound route
and the second to the second outbound route.
For network load-balanced scenarios, log into the Com.X using ssh and
configure two routes for routing the traffic across the two network paths in
/etc/network/interfaces:
auto eth0
iface eth0
post-up ip
post-up ip
post-up ip
inet dhcp
route flush dev eth0
route add 10.0.0.1 via 192.168.0.1
route add 10.0.0.2 via 192.168.0.2
create an outbound route called 'trunk-tester' with dial pattern '99!' and the
trunk of interest included in the trunks list
Dial 99
create a FlexPath called 'trunk-tester' and use the Include mode to include the
'trunk-tester' outbound route
select the extension port in the Hardware panel and enable Immediate mode
Pick up the handset. If the service is active you'll hear dial-tone or the service
prompt.
Note: If immediate mode is not set for the automatic test configuration, the Com.X
will still provide dial-tone on the extension as usual, which might be incorrectly
perceived as an external trunk service, so be sure to enable Immediate mode on the
extension port.
Monitor the UPS Report in /var/log/syslog when mains power goes down or is
restored.
The UPS will automatically switch on again (after some short delay) when
power is restored. If present, it is recommended to connect applicable ADSL
routers and related network switches to the same UPS as the Com.X.
Note: If the restart fails, as a result of failing to create the /var/run/nut/ directory, you
can manually create the directory, and then restart the service again.
Proline B1000
Proline B600
3.15.1. General
Ensure that access to the unit is restricted. Install the Com.X in a secure
server room or locked cabinet. This prevents unauthorized access to the unit
using the serial port or USB keyboard, as well as physical damage to the unit
or its power supply.
Regularly check the system log files for unauthorized activity (/var/log/auth* and
/var/log/syslog*)
3.15.2. Network
Preferably allow remote (external) access (VoIP and data) to the Com.X only
by means of a Virtual Private Network (VPN)
Configure the Com.X and telephony devices (e.g. iTA or VoIP phones) on a
separate network partition on a managed switched, or a physically separate
network.
Assign IP addresses and services on the VoIP network based on a white list
of approved MAC addresses.
Limit administrator access (SSH and web GUI) to a white list of MAC
addresses, IP addresses or networks.
3.15.3. VoIP
Configure the firewall to block all incoming VoIP traffic except that from a
white-list of remote extensions.
Ensure that all VoIP extensions and trunks have strong (generated)
passwords, different from the extension number.
3.15.4. PBX
Use pins and pin sets on international and high-cost outbound routes,
requiring the caller to know the pin in order to place a call.
Disable feature codes for administrative features, or change the feature codes
to access those features to something other than the default. (E.g. ChanSpy,
ZapBarge).
Require all users to set their voicemail pin and user portal login passwords to
something other than the default.
If direct database access is configured for CDR access, limit the access to a
white list of MAC addresses, IP addresses or networks.
3.16.4. Ring-back
In the event that a call is transferred to a destination extension that is busy, or
unanswered, the ringback mechanism will send the call back to the transferring party,
with a modification to the CID. The new CID presented to the transferring party will
be prefixed by Ret: to indicate that the call is returning, as well as a the extension
number of the destination extension to which the original call was transferred. The
Ringback caller id will have the form :
Ret: [original intended destination extension]CID
Note that Ringback functionality is only activated on destination extensions with
follow me or voicemail enabled. Transferred calls to extensions with neither
configured will ring indefinitely if unanswered, or fail with an engaged tone should the
extension be unavailable.
Note that the follow me of the destination extension will be evoked before the
ringback occurs, so a transfer to an extension with follow me enabled, will only ring
back to the intermediary extension if the destination extension and all extensions in
its follow me list, are unavailable or unanswered.
If the ringback mechanism sends the call back to the transferring extension and this
extension is no longer available, or the call is unanswered, the destination will be as
in the table below:
Destination
Follow me
Enabled
Ringback
Occurs
Ringback
Failover
Destination
N/A
Destination
extension Follow
me failover
Destination
extension
voicemail
Destination
extension Follow
me failover.
N/A
Destination
extension Follow
me failover.
Destination
extension
voicemail
Destination
extension Follow
me failover.
N/A
Destination
extension Follow
me failover.
Destination
extension Follow
me failover.
N/A
Destination
extension
voicemail
Destination
Follow me
Enabled
Destination
extension Follow
me failover.
Destination
extension
voicemail
Destination
extension Follow
me failover.
Ringback
Occurs
Destination
After
Ringback
Destination
Destination
Follow me
Enabled
Ringback
Occurs
Destination
After
Ringback
extension
voicemail
Destination
extension
Follow me
failover.
N/A
Destination
extension
Follow me
failover.
Destination
extension
voicemail
Destination
extension
Follow me
failover.
Note: Users need to be informed as to what to expect. With ring-back enabled their
phones should 'ring by itself' once available. If the hand-set it picked up, they should
hear ringing while the initial calling party is being contacted.
If the other party is now on the phone and also has neither follow-me nor voicemail
enabled, when the handset of the phone on which ring-back was initiated is picked
up, the user would hear a busy tone. A second round of ring-back will then be
initiated. I.e. once the original caller (now on the phone) ends the call, his phone will
ring, and picking it up, the initial called user would be attempted again.
4 Advanced configuration
Access to a variety of advanced features is provided via the Advanced menu.
Selecting a function from this menu opens a new window, which can be maximized
with detailed configuration options for the feature. Once configured, select Submit at
the bottom of the configuration page. Also remember to review and apply the
updated configuration to the underlying system when ready.
4.1 Announcements
Announcements added as destinations allow messages to be played on inbound
calls before transferring the calls to appropriate destinations. Announcements can
play recordings created or uploaded as detailed in 4.17.
Field
Content
Description
Recording
Repeat
Allow skip
Return to IVR
Don't answer
channel
Destination after
playback
Destination to transfer this call to. Please see 3.11.4 and 4 for
destination options and configuration.
4.2 Callback
This feature allows users to dial into the system and hang up while ringing, after
which the system will call the user back.
Content
Callback description
Callback number
Destination
4.3 Conferences
This feature allows multiple users to join a conference with two-way audio on all
devices. Conference features include join and leave announcements, passwords,
conference administration, in-conference menus, etc.
Field
Content
Conference number
Conference name
User PIN
Admin PIN
Join message
Leader wait
If enabled, the conference will not start until the leader has
joined by entering the Admin pin.
Quiet mode
User count
User join/leave
Music on hold
Allow menu
When enabled, users and the admin user can access their
menus by pressing *
Record conference
Content
Feature code index The index of this day/night mode. The index is the day-night
feature code (please see section 4.5 for more detail on feature
codes), with the last digit of the feature code (e.g. 280)
replaced by this day/night's index (e.g.283, 284, 288, etc.) Up
to 10 day/night entries are available, 0-indexed.
Description
Current mode
This sets the initial and current mode for this day/night control.
I.e. if Day is currently active, and Night is selected here, night
will become active, and on system restart night will be the
initial value for this day/night control.
Optional password
Day destination
Night destination
Field
Content
Name
Code
Use default
Enabled
Content
Extension recording
override
Recording location
Content
Ringtime default
Optional voicemail
recording gain
Timeout/#-press default
Content
options during a voicemail call. This should remain the
default unless requested otherwise for test purposes
by Far South Networks.
Timeout VM Msg
Direct VM
Msg Timeout
Msg Play
Error Re-tries
Announce Extension
Operator Extension
Country Indications
Content
24-hour format
Update email
4.7 IVR
The Interactive Voice Response feature allows the creation and chaining together of
interactive voice announcements and corresponding menu selections to facilitate
user call transfer in the Com.X system.
Content
Change Name
Changes the name used to identify this IVR from the default
(Unnamed). This entry will be displayed in selection lists that
support IVR.
Announcement
Timeout
Enable directory
VM Return to IVR
Directory Context
Loop before t-dest If enabled, the IVR loops as described in the 'Repeat loops
field' when user selection times out.
Timeout message
Content
Loop before i-dest If enabled, the IVR loops as described for the 'Repeat loops
field' when user a user selects an invalid option.
Invalid message
Repeat loops
The number of times the IVR should be played if the user does
not provide an option before timeout, or if the option is invalid.
The IVR will only loop on invalid input if the 'Loop before i-dest'
option is enabled. The IVR will only loop on timeout if the 'Loop
before t-dest' option is enabled.
If the number of repeats has been reached and another timeout
or invalid selection occurs, the relevant timeout 't' or invalid 'i'
destination is used. If these destinations are not configured, the
call terminates.
Destinations
For each valid selection in this IVR, enter the digit(s) to activate
the selection and the call destination to transfer the caller to.
A special 't' destination is used to configure a destination on
user selection timeout.
A special 'i' destination is used to configure a destination on
invalid user selection.
For each destination, if the Return to IVR option is enabled, the
destination will be ignored and the user returned to the parent
IVR of this IVR.
Note: It is possible that the last IVR was not the transfer directly
before this IVR, but some steps removed. The Return to IVR option
will cause the call to return to the last previous IVR, regardless of
how many non-IVR transfers may have taken place in the interim.
Content
Upload
Volume
Enable random
play
Content
Category name
Content
Category name
Application
Optional format
Content
Route name
Route password
Pin set
Emergency Dialing
Music on hold
Dial patterns
Trunk sequence
4.10 Paging
Paging allows groups of extensions to be created that will receive calls (provided the
phones for the specified extensions allow paging).
Content
Paging extension
Group description
Device list
Force if busy
Duplex
4.11 Intercom
The intercom feature allows for a call to be placed to phones supporting the feature,
and for such phones to automatically answer the call and play the audio on speaker.
To enable intercom (disabled by default), navigate to the GUI, then Start
Configuration Advanced and Feature Codes.
Enable the Intercom Prefix feature code and change the feature code to a code that
will not conflict with existing codes (e.g. *93). Apply.
The list of phones known to support Intercom and Paging include: Aastra,
Grandstream, Linksys/Sipura, Mitel, Polycom, SNOM, and possibly other SIP
phones. ATAs are not supported. If your phone is set to auto-answer, it should also
support intercom.
The phone must be configured to support the feature. On a Snom for example,
configuration would involve turning on Auto Connect Indication, setting the Auto
Connect Type to Handsfree and enabling the Intercom feature.
Please contact your phone manufacturer or consult the phone manuals for specifics
on configuring your phone and model for intercom support.
Content
Parking lot
extension
Number of slots
Parking timeout
The number of seconds after which the call is removed from the
parking bay. The call is then transferred back to the extension
from which the call was transferred into the parking bay.
Parking lot context The dialplan context for parked calls. Changing this setting
might result in parked calls no longer functioning.
Parking Alert-Info
Destination
4.13 Phonebook
The phonebook feature allows names and speed dialing codes to be matched with
extension and outbound numbers. It allows a user to dial numbers by phoning the
phonebook feature code (please see section 4.5 for more detail on feature codes)
and entering the first three letters of a desired phonebook entry's name, after which
2010 2014 Far South Networks
Content
Name
Number
The speed dial entry will be added to the database if this field is
enabled.
File
Note: If the delimiter is something other than ';' the import will
fail. Please see your operating system / application help for
configuring ';' as the CSV export delimiter.
Table 39: Phone book entry configuration options
Content
Description
Record in CDR
If enabled, when this Pin set is used in call routing, the Call
Detail Record includes the Pin set details.
Pin list
4.15 Queues
Queues are a powerful feature of the Com.X system, allowing callers to be placed on
hold and transferred according to a number of strategies and based on priority.
Callers waiting in the queue are provided with their position in the queue, projected
waiting time and the option to use self-service menus to exit the queue and transfer
to other destinations.
Agents servicing queues are allowed to log in by dialing the queue number followed
by *, and log out out of queues by dialing the queue number followed by **, are
provided with information re: callers waiting in the queue, and queues can be
configured in flexible manners to transfer calls to agents.
Content
Queue number
Queue name
Queue password
If set to yes, prefixes the CID name of all callers in the queue
with the total time, in minutes, for which they were in the queue.
Alert info
Static agents
Extension quick
pick
Agent
announcement
Join
announcement
Music on hold
class
Join empty
Leave when empty If set to Yes, callers will be removed from the queue if there are
no longer any agents logged in. If set to strict, callers will be
removed from the queue if there are no agents logged in or if all
of the agents are unavailable.
Ring strategy
Retry
Wrap up time
Call recording
Event when called If set to Yes, a call will trigger the AgentCalled,
AgentDump,AgentConnect and AgentComplete manager (AMI)
events.
Member status
Queue weight
Autofill
The frequency with which their position and estimated hold time
is announced to the caller.
Announce position If set to Yes, the annoucements will tell the caller their position
in the queue.
Announce hold
time
Repeat frequency
Destination
The destination for any failover calls (i.e. Calls that are
removed from the queue without being answered by an agent).
Content
Ring group
number
Group description
Ring strategy
Ring time
The time, in seconds, for which each extension in the list will
ring.
Extension list
Extension quick
pick
Announcement
Play music on
hold?
Alert info
Confirm calls
Remote announce A message to be played to the agent receiving the call if the
Confirm calls feature is enabled.
Too late announce A message to be played to agents who have answered a call,
but were too slow in confirming the call. i.e. Another agent
answered and confirmed before the initial agent confirmed.
Destination if no
answer
Field
Content
Name of this
recording
Content
Name
Time group
The Time Group that specifies the time range that results
in a match for this time condition. If the current system
time does not match this time group, the call will be routed
to the no match destination. Please see 4.19 for detail on
Time Groups.
Associate with
Destination if matches
Destination it no match
Content
Name
Time to start
The start time for the block of time this time group specifies.
Time to finish
The end time for the block of time this time group specifies.
The start day for the block of time this time group specifies.
The end day for the block of time this time group specifies.
The start day in the month for the block of time this time group
specifies.
The end day in the month for the block of time this time group
specifies.
Month start
The start month for the block of time this time group specifies.
Month finish
The end month for the block of time this time group specifies.
Content
Voicemail blast
number
Group description
Audio label
Password
Default voicemail
blast group
4.21 DISA
A DISA destination allows for an outbound dial tone to be configured as a destination
on the unit. This could be used to allow particular external callers to make outbound
calls through the outbound routes on the Com.X.
Field
Content
DISA Name
Pin
The user will be prompted to enter this pin before a call can
be placed from the DISA tone destination. Mulitiple pins
can be entered, with each separated by a comma.
Response Timeout
Digit Timeout
Caller ID
Context
Allow Hangup
Note: Services that are essential to operation can not be disabled in real time, or at
start up.
Changing the status of services should not normally be necessary. Please ensure
that you understand the consequences of disabling or restarting a service before
using these functions.
Description
debug
Source code level debug reports. Enabling this level results in a large
volume of logging data.
notice
warning
error
verbose
For each record, the date, channel, call source, caller ID, destination, the disposition
and duration of the call is logged.An additional UUID field is provided for each call,
containing the unique identifier, or a recording of the call, if one exists.
Note: If the outbound CID on a trunk has been configured with an override (or as
'hidden'), the override CID will be stored in the caller ID field, not the original CID, as
well as in the Source field (empty if the override is 'hidden').
If the extension number or a specific account code should rather be stored in the
CDR when the trunk CID has been over-ridden, configure the Account code field
2010 2014 Far South Networks
A results summary is displayed at the bottom of the list, where navigation of the list is
also facilitated. CDR records are stored in a database on the Com.X and can be
backed up. Please see 2.3.1.1.4 for more detail on backing up the CDR database.
Call reports can also be exported to Portable Document Format (PDF) or in Comma
Separated Values (CSV) format for further processing.
4. Log into the mysql server as root from the Com.X console:
mysql -u root
6. ConfigurX your SQL client to point to the server, with username cdruser and
the password as configured, on the default port 3306, and with database
schema asteriskcdrdb.
Function
Description
Asterisk Events
Asterisk Messages
Asterisk Queues
Channels
Asterisk
Function
Description
in use and active calls.
Database
Dahdi channels
Day/Night
Extensions
IAX peers
IAX registrations
Network interfaces
SIP peers
SIP registrations
mISDN ports
Function
Description
Reload IAX
Reload SIP
Reload mISDN
Reload Dahdi
Apache
MySQL
Audit
Disk usage
Network status
Performance
System log
Dahdi channels
Restart
System
Telephony
Function
Description
or a Comma device might not be reachable.
Dahdi statistics
Device discovery
IAX peers
IAX registry
Manager log
SIP peers
SIP registry
misdn channels
Access
Errors
Client Log
Web Server
GUI
6 Advanced Administration
6.1 Console access
Note: Any customisation or third party integration not explicitly endorsed and
supported by Far South Networks will result in the software warranty becoming void.
6.1.1. Authentication
Default username: comma
Default password: farsouth
It is advisable to change the authentication information from the default if the unit is
accessible over the network via secure shell.
The DHCP-assigned IP address can be obtained from the serial console using the
ifconfig command, or from the external DHCP server's administration application.
Figure 101: 'sudo asterisk -rx "stop when convenient" ' stops the asterisk service, so
that no calls are cut off, then 'sudo reboot' reboots the Com.X system.
mailrelay
mailrelay.local
tail -f /var/log/mail.info
(real-time monitoring)
To stop the Asterisk PBX software, waiting until there are no longer any active calls,
without allowing new calls in the interim:
sudo asterisk -rx stop gracefully
The login username is 'admin' and the password is the same as the password
configured for the Com.X GUI.
The five flags indicate whether the following components should be backed up, listed
in order from left to right as presented on the command line:
voicemail, system recordings, system configuration, CDR, operator panel
To confirm successful backup or to restore a backup manually, you can view the
backups list on the FreePBX restore page:
http://<host>/freepbx/config.php?type=tool&display=backup&action=restore
Alternatively you can view the list of backups from the command shell:
sudo ls /var/lib/asterisk/backups
4. Set the date / time using the 'sudo hwclock' command and the format
mm/dd/ccyy hh:mm:ss
5. For example, to set the date to 10 Mar 2011 and the time to 18:12:
sudo hwclock --set --date="3/10/2011 18:12"
7. Confirm that both the hardware clock and the operating system time matches:
8. Ensure that the commamgr is logging using the correct time. Warning: this
will disrupt service on all iTAs and analogue interfaces:
sudo /etc/init.d/commamgr restart
Run the TCPIP2MAN3000 software and configure it with the IP address of the
Com.X PBX, using port 8989
For Man3000 releases post 11.02:
Activate the Man3000 TCP/IP configuration by enabling Soft Online Authentication,
or your Man3000 USB software dongle:
Configure the TCP/IP settings with the IP address of the Com.X PBX:
Configure the MAN3000 software to use the Far South Networks Inbound PBX
format for PABX format 1 and Outbound PBX format for PABX format 2:
Time
Channel
Source
Destination
Bill
Account Code
Content
Type / Line
In the first column, a value of 'I' indicates that the record is for
an incoming call. Any other value indicates the line number as
defined in /etc/commagui/man3000.patterns for an outgoing
call, or 9 in case the channel for the outgoing call was not
pattern matched.
Type / Line
Time
Channel
The channel from which the call originated in the inbound case
or over which the call was placed in the outbound case. The
values of this field will be pattern matched against the entries in
/etc/commagui/man3000.patterns to determine the line number.
If a match cannot be made, the line number is set to 9.
Source
The originating number for the call. This can be the CID of the
caller for an incoming call, or the CID (extension number) of the
caller for an outgoing call.
Note: If the CID on the trunk used to place the outgoing call
overrides the caller's CID (e.g. extension number), the trunk's
override CID will be logged here.
Destination
Bill
Content
(ring) time.
Account Code
9905
*97
37
9906
*98
13
0000
9906
*98
0000
9906
*98
0000
9930
9905
*97
0000
18
20
0000
0000
9905
0000
9901
22
0000
01154XXXXX
01266YYYYY
9901
12
26
0000
0000
01154XXXXX
02159ZZZZZ
37
0000
01154XXXXX
01231AAAAA
25
0000
For example:
mISDN/=1
Zap/=2
SIP/hookd=3
Pattern matching matches the <pattern> if it is part of the outgoing call record
channel field. If more than one entry matches, the last entry matched determines the
line number. The same line number may be assigned to multiple patterns.
In this example, all calls placed after 10:15 and 35 seconds on 4 May 2010 will be
streamed to MAN3000.
By default the commaman3000 server module will only output new CDR
entries every 10 seconds. To disable this back-off and deliver data on every
request, edit the file /usr/bin/commaman3000srv and remove the sleep 10 statement at
the end of the file
Downloading and parsing the Master.csv file (please see section 5.3.2)
Configure the music location, port and other options by editing the following
configuration file, then run the server:
sudo vi /etc/gnump3d/gnump3d.conf
sudo /usr/bin/gnump3d
Configure the music collection on the streaming server by pointing your browser to:
http://<ip>:<port>
6.16.1. Outcall
Outcall supports only SIP extensions, but in addition to making outbound calls also
pops up contact details for incoming calls. Outcall has been tested with the Com.X
using Outlook 2000 and Outlook 2007.
Download the Outcall installer from http://code.google.com/p/outcall/downloads/list
Install the application and configure as follows:
Tab
Field
Value
Server
Server
IP address of Com.X
Server
Username
Server
Password
Server
Port
5038
Dialing Rules
Outgoing context
Add the extension to be used for the PC running outlook. This must be a SIP
extension:
In Outlook, select the contact to call and select the Outcall button. When a call is
received by the Com.X, the calling contact, or a new contact window should appear
in Outlook.
6.16.2. asttapi
asttapi allows dialing from both analogue and SIP extensions, but does not pop up
contact details on incoming calls like Outcall.
Download and install the asttapi setup program from
http://sourceforge.net/projects/asttapi/files/asttapi/
Select Start Control panel Phone and modem options
Select the Advanced tab and select 'Omnis TAPI Driver for Asterisk', then Configure
Field
Value
Host
IP address of Com.X
Port
5038
User
Password
User Channel
Line name
Context
Called ID
Select the correct line name. You may have to scroll down the list if the line is not
visible.
6.17.1. Configuration
The default configuration blocks the source IP address of 4 consecutive SSH access
failures for 10 minutes and 10 consecutive SIP failures for 1 hour:
Note: Ensure that fail2ban is running by checking the Services screen under the
Status tab.
6.18
ViBE
The ViBE application from Voipex addresses the common issue of limited ADSL
upstream bandwidth. With many small offices relying on an ADSL line for both data
and VOIP traffic, typically, the upstream link becomes a limiting factor in the number
of simultaneous calls the network can support.
The audio stream of a typical VOIP call is only 8kbit/s, however the protocol and
network overheads introduced during transmission can often exceed a further
34kbits/s bandwidth requirements.
The ViBE application creates a tunnel between two ViBE end points, significantly
reducing protocol overheads on multiple packets and dynamically optimizing voice
compresssion, resulting in a much higher permissible call density over a single ADSL
link.
Where a typical upstream ADSL link of 256kbits/s can support a maximum of 6
simultaneous G729 VOIP calls, a ViBE-enabled line of the same bandwidth can
support a maximum of approximately 28 similar simultaneous calls.
For further details on ViBE configuration and integration, please see the white paper
located at :
http://farsouthnet.com/wp-content/uploads/2011/05/Runway-X-ViBE.pdf
Note: The White paper referenced above describes the integration of a Runway
branded Com.X PBX with ViBE. The document is, however, relevant for Runway
and Com.X products.
Figure 118: FOP access can be limited to the operator only, if required.
A log in page will be presented. Enter the extension number and the associated
(voicemail) pin of that extension to gain access.
Figure 121: Extension 1000 logged in. Notice the nine icons above the
extensions each of which performs a function.
Figure 122: Extension 2000 is logged in on this operator panel. Notice only
four function buttons above the listed extensions.
Trunks, parking lot slots and queues are shown also displayed on the Flash operator
panel, and also offer visual indications of their busy state.
Figure 123: Trunks, queues and parking slots are also displayed. Notice the Sip Trunk
has one active call, indicated by the orange colour and the external caller, 5000.
Figure 124: Dialling extension 2000 from extension 1000. Notice the blue outline
around extension 2000.
This first causes extension 1000 to ring, and upon a user answering, dials extension
2000 from extension 1000.
Figure 125: Notice the change of colour of extension 1000, as well as the incoming call
from "1000" shown on extension 2000.
Figure 126: Picking up a call to extension 1003. Pushing the "Call Pickup" button will
connect the caller to the extension of the FOP user.
The call pickup feature on the Flash operator panel is available to operator and
regular FOP users.
Figure 127: The call between extension 1000 and external caller 5000 will be transferred
to extension 1001.
The dynamic agents serving a queue are displayed in the button for the queue.
Figure 129: The SIP/ extension shows the port hosting the dynamic
agent.
After clicking Listen the operators extension will ring, and on answer will play the
audio of the selected call. The operator extension is muted and neither party of the
call is informed of the operator listening.
6.19.11.2 Listen and Whisper
The listen and whisper feature allows the operator to listen in on a call in which they
are not involved. Further,any audio from generated on the operator handset is
audible only to the internal extension, and not to the external party. To listen and
whisper, select the local extension involved in the call (notice again, the blue outline)
and then click the Listen and Whisper feature button.
Figure 132: The Listen and whisper feature allows the operator to listen in on other
calls, and talk to the local user on the call.
6.20 Nagios
The Nagios application provides an expandable and highly customisable platform for
monitoring of system services and network health. Com.X units are shipped with a
Nagios Core suite preconfigured to monitor the state of selected services and
interfaces on the system.
6.20.1. Hosts
Nagios can be configured to monitor network and service status on mulitple hosts.
The Nagios application on the Com.X system has the localhost defined as the only
host, however more hosts can be defined and monitored, if required.
Please consult the Nagios Core administrator guide for more details:
http://nagios.sourceforge.net/docs/nagioscore-3-en.pdf
6.20.3. Services
The installed Nagios Core package is preconfigured to monitor an assortment of
sevices and features as listed in Table 206. To access feedback on all monitored
services and click the Services button under the Current Status heading.
What is monitored?
Current Load
Current Users
Disk Space
Ethernet LAN
Interfaces
Ethernet Vibe
Interface
Ethernet WAN
Interface
FXO ports
HTTP
PRI Spans
SIP TRUNKS
SSH
Total Processes
Services for which a warning is detected are highlighted in yellow, whilst services that
are in error are highlighted in red.Healthy services feature a green highlight.
Select Disable active checks of this service . This will prevent the Nagios
application from monitoring the service or port.
Thereafter, select Submit passive check result for this service and set the check
result to OK. This will set the status to OK until such time as active checks are reenabled and provide a different result.
Illustration 3: The
Documentation link
provides a link to the
documentation page of the
nagios website.
7 Troubleshooting
Please refer to the Com.X Troubleshooting Guide for trouble-shooting information.
This guide can be accessed from http://farsouthnet.com/support/