4 Mi Voice MXONEIntegration Guide
4 Mi Voice MXONEIntegration Guide
Optional Installations
Release 7.3
September 16, 2020
Notice
The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks™
Corporation (MITEL®). The information is subject to change without notice and should not be construed in any way as a commit-
ment by Mitel or any of its affiliates or subsidiaries. Mitel and its affiliates and subsidiaries assume no responsibility for any errors
or omissions in this document. Revisions of this document or new editions of it may be issued to incorporate such changes.No
part of this document can be reproduced or transmitted in any form or by any means - electronic or mechanical - for any purpose
without written permission from Mitel Networks Corporation.
Trademarks
The trademarks, service marks, logos and graphics (collectively “Trademarks”) appearing on Mitel's Internet sites or in its publi-
cations are registered and unregistered trademarks of Mitel Networks Corporation (MNC) or its subsidiaries (collectively "Mitel")
or others. Use of the Trademarks is prohibited without the express consent from Mitel. Please contact our legal department at
[email protected] for additional information. For a list of the worldwide Mitel Networks Corporation registered trademarks, please
refer to the website: http://www.mitel.com/trademarks.
Chapter: 2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Brief Description of Mitel Performance Analytics . . . . . . . . . . . . . 9
Supported Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Chapter: 3 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Chapter: 6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Chapter: 7 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Chapter: 13 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Chapter: 14 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
MiCollab Integration
This topic discusses the MiCollab integration with MX-ONE. For information on the MiCollab integration
with MX-ONE see MiCollab Platform Integration Guide.
Prerequisites
• Configure MX-ONE for MiCollab integration (see MX-ONE integration chapter in MiCollab Customer
Documentation).
– Configure PBX group and members in MX-ONE to be used for AWV.
– Configure SIP trunk in MX-ONE using profile NuPoint (remember to use remote port=5058).
– Configure csta link in MX-ONE.
1
CONFIGURATION OF MICOLLAB
CHAPTER 1 MICOLLAB INTEGRATION
5. Set Administrator's password (this is the same for both root and admin user).
6. Select Timezone - (e.g. CET).
7. Enter primary domain - (e.g. mydomian.com).
8. Enter system name - (e.g. micollab).
19. Enter ARID and IP address (Important use correct address) of the FMC and then select PBX type.
20. Login through the console interface as admin.
21. Select 9. Manage Trusted Networks.
22. Select 2. Add IPv4 trusted network.(e.g the internal corporate ip network segments).
23. Enter the subnetmask.
24. Enter the router to use for the trusted network - normally the same router as for the server.
25. Select Next, then Back to the menu.
26. Login to https://<fqdn>/server-manager with admin and password configured during installation.
Configuration of MiCollab
In the main window and from the left menu you administrate the configuration of the MiCollab, see
below.Complete all configurations before start using PM to deploy users.
2
CONFIGURATION OF MICOLLAB
CHAPTER 1 MICOLLAB INTEGRATION
Menu: Configuration
• Select and start the MiCollab Client Integration Wizard.
• Select MiCollab Language Settings and set the System Language and Other NuPoint UM Prompt.
• Select E-mail settings. If required, configure settings for outbound SMTP server and userid.
3
CONFIGURATION OF MICOLLAB
CHAPTER 1 MICOLLAB INTEGRATION
Menu: Security
• Select Remote Access. If required, change Secure Shell Settings to allow SSH access for later diag-
nostics.
Menu: Administration
• Select System Users. For the account micollab api. select Reset password and enter a new password.
You will require this user account and password when configuring the MiCollab subsystem in PM.
Menu Application
Menu application options are discussed in this section.
• Premium
– Password = Use this value = "Strong Password"
– Select TUI Passcode
– TUI Passcode = Same as Primary Phone Extension (can only be used if extension length is 4 digits
or more)
– TUI Passcode = Use this value = 4-10 digits (if extension is less than 4 digits)
– Attendant Extension: 09
– Message Waiting #1 = DTMF to PBX
• Standard
4
CONFIGURATION OF MICOLLAB
CHAPTER 1 MICOLLAB INTEGRATION
• Standard - Mobile
– Password = Use this value = Enter a strong Password
– Select TUI Passcode
– TUI Passcode = Same as Primary Phone Extension (can only be used if extension length is 4 digits
or more)
– TUI Passcode = Use this value = 4-10 digits (if extension is less than 4 digits)
– Attendant Extension: 09
– Message Waiting #1 = DTMF to PBX
PBX Nodes.
• Select the PBX Node and configure.
• Set length: 5 ( internal number length in the MiVoice MX-ONE).
Enterprise
• Select Enterprise and then Default Account Settings.
• Select appropriate Country from the drop-down list
5
CONFIGURATION OF MICOLLAB
CHAPTER 1 MICOLLAB INTEGRATION
System Options
Select and configure System Options:
• Platform - MiVoice MX-ONE
• Dial -in phone number 1: 8003 (Internal number to AVW)
• Dial - in Phone Number 1 Label: internal
• Dial-in Phone number 2: 8468003 (corporate number to AWV)
• Dial- in Phone number 2 Label: corporate
• Dial -in number 3 +4684428003 (Public number to AWV)
• Dial- In Phone number 3 Label: Public
• Webserver admin E-mail [email protected]
• Generate Alert E-mail system [email protected]
• Prompt for Access Code first: Enable checkbox
• Allow HD Video Resolutions: Enable checkbox
• Prompt to extend conference 5 minutes prior to its end time: Enable checkbox
Offline Configuration
Select Offline configuration/Edit Offline configuration and Duplicate Active Configuration - yes
Then select and configure following items:
1. Network Elements/Add
a. Type = SIP GATEWAY
b. Name = Mxone
c. IP Address = 192.168.222.100
d. Number of Ports = 20
2. Dialers (Pagers) (for Request playback call feature in UCA client) and select:
a. Add a "dialer"
b. Number: Select Next Available
c. Enter a name - Dialer
d. Acces code: T
e. Hold Time : 20
f. Add
3. Line Groups/Add
6
CONFIGURATION OF MICOLLAB
CHAPTER 1 MICOLLAB INTEGRATION
• Number of lines = 15
• PBX = MX-ONE
• Mapping = 1 (0 must not be used, see Online help - “add at Line Group)
• "Save"
• Pilot Number = 6001
• Dialling Plan
• Length of extensions starting with...
• 4 = 5 digits
• Voicemail
• System Attendent's extension = 09
• Save
b. Add a line group for Message Waiting indication:
• Line Group Number = 2
• Name = MWI
• Application = DTMF to PBX Dialler
• User Interface = NuPoint Voice
• Lines/Add
• Line Triplet - next Available
• Number of lines = 1
• PBX = MX-ONE
• Mapping = 16
• Add
• Pilot number = 6001
• DTMF to PBX Dialler/DTMF to PBX Dialer
• Pre-DN On Dial String = 1
• Pre-DN Off Dial String = 0
• Save
7
TEST ACCESS TO AWV AND NUPOINT
CHAPTER 1 MICOLLAB INTEGRATION
• 4 = 5 digits
• Select the Dialer(Pagers) created in step b) by selecting the checkbox
• Save
8
BRIEF DESCRIPTION OF MITEL PERFORMANCE ANALYTICS
CHAPTER 2 INTRODUCTION
Supported Scenarios
For an MX-ONE system with a single Service Node, the MPA shall of course be connected to that Service
Node.
The MPA can be connected in a couple of different ways to a multi-server MX-ONE system.
The primary multi-server scenario is that each Service Node server is connected to a MPA probe.
9
SUPPORTED SCENARIOS
CHAPTER 2 INTRODUCTION
Figure 2.1: Primary scenario, direct connection to all MX-ONE servers in a 4-server MiVoice
MX-ONE system
Another possibility is that one Service Node can act as a proxy for several other Service Nodes (and other
entities), in which case only the proxy Service Node will be connected to the MPA probe.
The second scenario is not recommended, since it has certain resiliency problems, due to the fact that
the monitoring function will be fully dependent on the proxy, so if the proxy goes down, the status of the
other nodes will not be reported.
You can also have a mix of the primary and secondary scenarios.
10
SUPPORTED SCENARIOS
CHAPTER 2 PREREQUISITES
Figure 2.2: Secondary scenario, connection by proxy, connection only to one MX-ONE
Service Node
Prerequisites
MPA consists of a number of web services running on either a cloud-hosted computing platform or
on-premises computing platform. There are several components to MPA. The remote ‘Probe’ installed in
non-Internet accessible networks maintains databases of status and events, and provides a web portal
with access security. Additionally, MPA has a Remote Access Service that provides a secure
“cross-connect” for remote access to the customer network.
MPA 2.1 or later version shall be used.
The MiVoice MX-ONE system(s) shall be up and running on Linux (SLES), either on a cloud-hosted
computing platform or on-premises computing platform. Appropriate MIB shall be active.
11
HOW TO INTEGRATE WITH MIVOICE MX-ONE
CHAPTER 2 MITEL PERFORMANCE ANALYTICS SNMP INTEGRATION WITH MIVOICE MX-ONE
(The Martello MPA probe has been assigned IP-address 192.168.157.128. To limit the access the
“rocommunity” setting can be set to only allow access from a certain subnet or even a single IP-address).
Useful information
• Please see /usr/share/doc/packages/net-snmp/EXAMPLE.conffor a more complete example and
snmpd.conf(5).
• Writing is disabled by default for security reasons. If you would like to enable it, uncomment the rwcom-
munity line and change the community name to something nominally secure (keeping in mind that this
is transmitted in clear text).
NOTE: do not use '< > in strings for syslocation or syscontact.
NOTE: If you define the following here you will not be able to change them with:
12
USEFUL INFORMATION
CHAPTER 2 CO-EXISTENCE WITH SIMILAR TOOLS
MX-ONE alarm traps can trigger snmptrapd to sent mail and textmessages rapcommunity:
Default trap sink community to use trapcommunity private
trap2sink: A SNMPv2c trap receiver
trap2sink 192.168.157.128
References
For further reading regarding MPA and its features and configuration options, please see MPA System
Guide, Release 2.1 or later.
13
GENERAL
CHAPTER 3 INTRODUCTION
General
Integration of MiVoice MX-ONE with Skype for Business Server 2019 is supported as a complementary
solution providing end-user services, such as instant messaging and conferencing.
Microsoft Partner Program has certified the integration between MX-ONE communications system
running the MX-ONE Service Node software 5.0 SP4 and Skype for Business Server 2019 through a
Direct SIP connection. Also, later versions of MX-ONE can be integrated with Skype for Business Server
2019.
Scope
This guide describes the basic integration between MiVoice MX-ONE and Skype for Business Server
2019. The following sections describe the solution integration that has been certified through the Microsoft
Partner Program and covers only the Direct SIP Integration. For more information about how this integra-
14
DIRECT SIP
CHAPTER 3 INTEGRATION DESCRIPTION
tion is set up and functions, refer to the relevant CPI documentation for MX-ONE, or go to the Microsoft
UC product websites.
We recommend that you check the latest products documentation.
Integration Description
The integration of MiVoice MX-ONE and Skype for Business Server 2019 described in this guide is
achieved via a Direct SIP that is specified by Microsoft. It means that a SIP trunk is used to connect
MX-ONE and Skype for Business Server 2019 (Mediation Server). The SIP trunk connection between the
systems can be deployed with or without encryption. MX-ONE supports TLS for signaling and SRTP for
media encryption when connected with Mediation Server.
This guide covers only the components that are required in the integration between MX-ONE 5.0 SP4 or
a later version, and Skype for Business Server 2019 via Direct SIP to offer the functionality required by
the Microsoft UC Open Interoperability Program for enterprise telephony services and infrastructure.
At least the following Skype for Business Server 2019 components are required to support this integration:
• Server Infrastructure
– Microsoft infrastructure (Domain Controller, Active Directory, DNS and so on)
– Skype for Business Server 2019 Standard or Enterprise Edition
– Microsoft Mediation Server
• Client
– Microsoft Lync 2019
Direct SIP
In Direct SIP Integration, referred to as Enterprise Voice by Microsoft Lync 2019, users will have dedi-
cated phone numbers that differ from those used in the MX-ONE.
15
DIRECT SIP SIGNALING OVERVIEW
CHAPTER 3 INTEGRATION DESCRIPTION
This enables the Microsoft Lync 2019 client to make and receive external calls through a PC. The calls
are routed from the Skype for Business Server 2019 by the SIP trunk to the MX-ONE and further to the
PSTN and vice-versa. MX-ONE and Skype for Business Server 2019 will behave as networked PBXs, as
typically is the case with all external trunks in the MX-ONE.
In addition to this, MX-ONE also supports media encryption (SRTP) when connected with Microsoft Lync
2019 Server when TLS is used. The media encryption is done between MX-ONE media gateway unit
(MGU) and Microsoft Mediation Server or between MX-ONE media gateway unit (MGU) and Microsoft
Lync client when Media Bypass is configured in Microsoft Lync 2019 Server.
• Media bypass (also known as direct media between MX-ONE and Microsoft Lync clients). Encryption
(TLS and SRTP) is required for this functionality.
– Inbound call from MX-ONE user device to Microsoft Lync client
– Outbound call from Microsoft Lync client to MX-ONE user device
– Outbound call: Call Forward All (CFA) to another Microsoft Lync client
16
SKYPE FOR BUSINESS SERVER 2019
CHAPTER 3 INTEGRATION DESCRIPTION
– Outbound call from Microsoft Lync to another Lync user; with bypass enabled and CFA enabled
• Outbound call: PBX CFB (Call Forward on Busy) to another Microsoft Lync user
– Outbound call from Microsoft Lync to another Lync user; with bypass enabled and CFB enabled
• Conference
• Failover (to secondary Mediation Server - Lync gateway)
• Security (support for TLS/SRTP encryption)
Prerequisites
For proper integration between MiVoice MX-ONE and Skype for Business Server using Direct SIP, there
are some prerequisites on both sides that must be fulfilled.
Main Components
At least, the following MX-ONE components are required:
• MX-ONE communications system
– MX-ONE Service Node
• 5.0 SP4 or a later version
• Supported media gateways with the latest firmware compatible with 5.0 SP4, or a later version, which
can be:
– MX-ONE Classic - 7U 19-inch chassis, MGU board, or
– MX-ONE Lite - 3U 19-inch chassis, using MGU board
– MX-ONE Slim – 1U 19-inch chassis, using MGU board
• Terminals
– All current MX-ONE terminal types are supported with this integration: SIP, H.323, analog, digital,
DECT, and mobile extension
Licenses
The MX-ONE licenses needed for this integration are:
• SIP trunk licenses–note that the quantity of licenses depend on how the system is deployed).
• Encryption licenses are required if encryption (TLS/SRTP) is used.
Always check with your Mitel partner that your system has the required licenses, before beginning the
integration deployment.
17
INSTALLATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
installation and integration according to the MX-ONE configuration guidelines for the interface between
the systems.
Main Components
The main Microsoft components that are required to interconnect with MiVoice MX-ONE are Skype for
Business Server 2019, Mediation Server, and Lync clients. The Lync requirements are described in the
Microsoft Lync Serve documentation. See the chapter References at the end of this guide.
NOTE: In Mitel´s lab validation, a single Skype for Business Server Standard Edition with a co-located
Mediation Server was used. For testing load balancing and failover, two stand-alone Mediation
Servers were added to the topology.
Licenses
Microsoft licenses needed for this integration are described as they are beyond the scope of this guide.
Contact Microsoft or a qualified Microsoft partner to obtain the proper license requirements for each
component of the Skype for Business Server solution.
Installation
Microsoft Infrastructure
Ensure that Microsoft infrastructure and Skype for Business Server are installed in the customer environ-
ment by a qualified engineer.
For Microsoft infrastructure and Skype for Business Server requirements, check the appropriate Microsoft
documentation.
18
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
Configuration
The following information was used in Mitel’s laboratory setup during the validation of the solution. The
setup may change depending of the customer specific needs.
NOTE: Fully Qualified Domain Name (FQDN) needs to be properly specified in the Domain Name System
(DNS).
• MX-ONE 5.0 SP4 (or a later version)
– Domain: lab.moon.galaxy Note that MX-ONE is part of a sub-domain
– IP address: 192.168.222.10
FQDN: mx-one-lync.lab.moon.galaxy
• Microsoft Domain Controller, Active Directory, Certification Authority, and DNS Server
– Domain: moon.galaxy
– IP address: 192.168.222.2
FQDN: lync-infra.moon.galaxy
• Skype for Business Server Standard Edition and Mediation pool
– Domain: moon.galaxy
– IP address: 192.168.222.3
FQDN: lync-2019-se.moon.galaxy
NOTE: Mitel recommends that complex scenarios be validated in the partner labs before customer deploy-
ment.
19
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
The following setup needs to be done in MX-ONE for configuring Direct SIP. Note that only SIP Route
definitions are shown.
1. Use the following command to view more details regarding the SIP Profile Lync_TCP:
sip_route -print -profile Lync_TCP
2. Define SIP Route category:
ROCAI:ROU=99,SEL=7110000000000010,SIG=0111110000A0,TRAF=03151515,TRM=4,
SERV=3100000001,BCAP=001100;
3. Define SIP Route data:
RODAI:ROU=99,TYPE=TL66,VARC=00000000,VARI=00000000,VARO=00000000;
4. Define SIP trunk data specific:
sip_route -set -route 1 -profile Lync_TLS_SRTP -uristring0 "sip:[email protected]" -re-
moteport 5067 -accept REMOTE_IP -match "mxoneskype.skypebusi-
ness.com,10.211.62.165,skype.skypebusiness.com,10.211.62.175" -codecs PCMA,PCMU -protocol
tls -service PRIVATE;
5. Verify your configuration:
sip_route -print –route 99 –short
6. Define the SIP Route equipment initiate; for example:
ROEQI:ROU=99,TRU=1-1&&1-30;
7. Define external destination SIP Route data:
RODDI:ROU=99,DEST=99,ADC=0005000000000250000001010000,SRT=3;
20
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
Define PSTN Gateway in the Skype for Business Server 2019 Topology Builder
1. Open Skype for Business Server 2019, Topology Builder, and define a PSTN gateway to be used
between Lync and MX-ONE.
2. To define the PSTN gateway, expand Shared Components, right-click PSTN gatewaysoption.
21
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
3. Click New IP/PSTN Gateway. The dialog box opens the Gateway FQDN or IP Address. Specify the
MX-ONE IP Address or FQDN and click Next.
4. Define the IP address: in this example, the default is retained. Click Next.
22
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
23
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
3. Define Normalization rules that fits your organization needs. A rule for Lync users to dial to MX- ONE
terminals and another to dial to PSTN (ensure that MX-ONE is connected to PSTN) are required. If
needed, contact Microsoft for the appropriate setup for your requirement.
Figure 3.1: New Normalization Rule, five digits example
24
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
25
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
26
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
27
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
Conclusion
Now the setup is complete, assign users to the Policy created previously and test the integration by
making calls between the systems.
See the topic Enable users for Enterprise Voice in Skype for business Server at the following link:
http://technet.microsoft.com/en-us/library/gg413011.aspx
MiVoice MX-ONE Direct SIP with Security and Media Bypass Setup
The following setup needs to be done in MX-ONE in order to configure Direct SIP with security (encryp-
tion). Note that only Route definitions are shown.
NOTE: MX-ONE FQDN needs to be properly defined in the DNS Server.
When using security, the appropriate certificate must be installed in MX-ONE in addition to the encryption
licenses. Check Certificate Management on MX-ONE CPI documentation for more details regarding
certificates.
NOTE: TLS/SRTP security is required for Media bypass functionality. It means that the proper encryptions
licenses must be loaded in the MX-ONE system.
1. Use the following command to view more details regarding the SIP Profile Lync_TLS_SRTP:
sip_route -print -profile Lync_TLS_SRTP
2. Define SIP Route category:
ROCAI:ROU=98,SEL=7110000000000010,SIG=0111110000A0,TRAF=03151515,TRM=4,
SERV=3100000001,BCAP=001100;
3. Define SIP Route data:
RODA I:ROU=98,TYPE=TL66,VARC=00000000,VARI=00000000, VARO=00000000;
28
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
29
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
5. Click OK. The following screen appears to select a file or directory where the signed certificate is
stored.
30
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
6. Specify the path where the forMXONE.pfx certificate is stored as shown in the following screen.
7. Click OK to store the imported certificate. Next, you install the certificate that you have imported and
click OK.
31
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
8. Enable the TLS in MX-ONE > Manage TLS in MX-ONE -> Configure MX-ONE to use TLS. Refer to
the 132/154 31-ANF 901 14 document for more detail.
9. Enable Media Encryption in the route:
media_encryption_enable -type route
media_encryption_enable -type extension
media_encryption_enable -type intermgw
media_encryption_print
2. To define the PSTN gateway, expand Shared Components and right-click the PSTN gateway.
3. Click New IP/PSTN Gateway. The Define the PSTN Gateway FQDN dialog box appears.
32
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
4. Enter the FQDN or the IP address: specify the MX-ONE IP Address or FQDN and click Next.
5. Define the IP address: in this example, the default is retained. Click Next.
33
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
34
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
4. Keep the default Encryption support level, which in this case is Required.
Now that the setup is concluded, assign users with the policy created previously and test the integration
making calls between the systems.
35
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
Load Balancing
Mitel MX-ONE 5.0 and later versions support load balancing setup when connected with more than one
Mediation Server. In such scenario, the Microsoft DNS Load Balancing functionality can be used.
MX-ONE 5.0 and later versions support DNS SRV and multiple A-record query where a list with multiple
entries can be used. When properly configured, MX-ONE will attempt to send an INVITE to the entries in
the list until the call is successful. No answer or 503 Service Unavailable from one entry will trigger
MX-ONE to try the next entry.
For more details, see MX-ONE SIP Route command description in CPI or sip_route –help, parameter
remote port.
Failover
The failover feature also uses the Microsoft DNS Load Balancing functionality. When integrating MX-
ONE and Mediation Server, the same configuration is valid for both failover and load balancing.
In a scenario, where two Mediation servers are used and if one of the servers is unavailable, then the first
call will be attempted to set up to the first server, but it will be redirected after a few seconds and
answered; and all subsequent calls will be redirected and answered in the second Mediation Server.
The reason it takes some seconds before getting an answer from the second server, is that after the
INVITE is sent to the first server, the system waits four seconds for an answer, and if no answer is
received, the host is grey-listed for 32 seconds and an INVITE is sent to the second server after this.
For additional details, see the MX-ONE SIP Route command description in CPI or sip_route – help,
parameter remote port.
The following is a description of the setup that was verified in Mitel´s lab.
For this scenario, two standalone Mediation servers are used. In the MX-ONE side, only one MX-ONE
Service Node is used, and it is configured with the Mediation Pool entry.
36
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
DNS Setup
Microsoft DNS needs to be configured to support Round Robin as described in the TechNet article
“Configure DNS for Load Balancing”. Follow the link and see the item “To enable round robin for Windows
Server”.
http://technet.microsoft.com/en-us/library/gg398251.aspx
The following figure shows the setup when Round Robin option is enabled.
To test your configuration, use the command ping to check the setup.
37
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
MX-ONE Direct SIP with Load Balancing and Failover Setup - TCP
The following setup needs to be done in MX-ONE for configuring Direct SIP with load balancing and
failover setup. Note that only Route definitions are shown.
NOTE: MX-ONE FQDN needs to be properly defined in the DNS Server.
1. Use the following command to view more details regarding the Profile Lync_TCP:
sip_route -print -profile Lync_TCP
2. Define SIP Route category:
RO-
CAI:ROU=97,SEL=7110000000000010,SIG=0111110000A0,TRAF=03151515,TRM=4,SERV=3100
0000 01,BCAP=00110;
3. Define SIP Route data:
RODAI:ROU=97,TYPE=TL66,VARC=00000000,VARI=00000000, VARO=00000000;
4. Define SIP trunk data specific:
sip_route -set -route 1 -profile Lync_TLS_SRTP -uristring0 "sip:[email protected]" -re-
moteport 5067 -accept REMOTE_IP -match "mxoneskype.skypebusi-
ness.com,10.211.62.165,skype.skypebusiness.com,10.211.62.175" -codecs PCMA,PCMU -protocol
tls -service PRIVATE;
5. Verify the configuration:
sip_route -print –route 97 -short
6. Define the SIP Route equipment initiate:
ROEQI:ROU=97,TRU=1-1;
7. Define external destination SIP Route data:
38
CONFIGURATION
CHAPTER 3 INSTALLATION AND CONFIGURATION
RODDI:ROU=97,DEST=97,ADC=0005000000000250000001010000,SRT=3;
To set up the PSTN gateways, refer the Skype for Business Server 2019 configuration - TCP.
Execute calls between MX-ONE and Microsoft Lync and check that the calls are distributed between the
systems.
MX-ONE Direct SIP with Load Balancing and Failover Setup - TLS
The following setup needs to be done in MX-ONE in order to configure Direct SIP with load balancing and
failover setup, please note that only Route definitions are showed.
NOTE: MX-ONE FQDN needs to be properly defined in the DNS Server.
1. Use the following command to check more details regarding SIP Profile Lync_TLS sip_route -print
-profile Lync_TLS
2. Define SIP Route category:
ROCAI:ROU=96,SEL=7110000000000010,SIG=0111110000A0,TRAF=03151515,TRM=4,
SERV=3100000001,BCAP=00110;
3. Define SIP Route data:
RODAI: ROU=96,TYPE=TL66,VARC=00000000,VARI=00000000, VARO=00000000;
4. Define SIP trunk data specific:
39
CONFIGURATION
CHAPTER 3 INTEGRATION NOTES
Integration Notes
The latest software and firmware versions of MX-ONE components must be used.
NOTE: Mitel recommends that complex scenarios shall be validated in the partner labs before to customer
deployment.
40
CONFIGURATION
CHAPTER 3 REFERENCES
References
Always check the latest documentation. The links below are the ones available for reference. Mitel CPI
Documentation – Mitel MX-ONE 5.0 SP4 or a later version.
Skype for Business Server Deploying Enterprise Voice
Enable Users for Enterprise Voice
Revision History
41
CHAPTER 4 INTRODUCTION
Prerequisites
When planning the number series in the branch office following must be considered:
42
NUMBER ANALYSIS
CHAPTER 4 SETTING UP MX-ONE FOR GX CONTROLLER
• The extension range must be coherent and matching the local DID number series (if local presence is
used).
• MX-ONE SW must be at least version 7.0.
• The firmware level of the EX-Controller and GX-Gateway shall be at least Dgw 42.3.1032-MT with
profile S100-MT-D2000-45 for GX-Gateway and STNL-MT-D2000-65 for EX-Controller.
Other considerations/restrictions:
• A SIP outbound proxy address must be assigned in the startup.cfg file, that is, the SIP outbound proxy
address is the local address of the EX-Controller / GX-Gateway.
Number Analysis
Number Analysis Data
43
EXTENSION DATA
CHAPTER 4 SETTING UP MX-ONE FOR GX CONTROLLER
Extension Data
Figure 4.2: Directory Number Profile
MDSH>
44
LEAST COST ROUTING DATA
CHAPTER 4 SETTING UP MX-ONE FOR GX CONTROLLER
00013443111 8 N
00031325 8 N
00040598 8 N
00084226 7 N
000856867 7 N
END
Least Cost Destination Data
Table 4.2: Number Length Table (Sheet 1 of 2)
001 0 N 6 18 Y
002 0 N 6 18 Y
003 0 N 6 18 Y
004 0 N 6 18 Y
005 0 N 6 18 Y
006 0 N 6 18 Y
45
LEAST COST ROUTING DATA
CHAPTER 4 SETTING UP MX-ONE FOR GX CONTROLLER
007 0 N 6 18 Y
008 0 N 6 18 Y
009 0 N 6 18 Y
Entry TRC PRE ACCT FRCT TOLL CBCS BTON TNS OSA
5 0 1 1111111 0
1111111
1
5 0 2 1111111 0
1111111
1
5 0 3 1111111 0
1111111
1
4 0 4 1111111 0
1111111
1
END
Least Cost Destination Data
Table 4.4: Fictitious Destination Table
1 1 081
2 1 083
3 1 085
4 1 088
END
46
ROUTE DATA
CHAPTER 4 SETTING UP MX-ONE FOR GX CONTROLLER
Route Data
ROCAP
Route Category Data
Figure 4.3: Route Category Data
RODAP
Route Data
SIP ROUTE
One SIP route to each branch node is specified.
Route 81 towards BO#1 (Linköping)
route : 81
protocol = tcp
profile = Default
service = PUBLIC
uristring0 = sip:[email protected]
fromuri0 = sip:[email protected]
47
ROUTE DATA
CHAPTER 4 SETTING UP THE GX GATEWAY
remoteport = 5070
accept = TRUNK_INFO
match = user=trunk
register = NO_REG
Route 83 towards BO#2 (Göteborg)
route : 83
protocol = tcp
profile = Default
service = PUBLIC
uristring0 = sip:[email protected]
fromuri0 = sip:[email protected]
remoteport = 5070
accept = TRUNK_INFO
match = user=trunk
register = NO_REG
Route 211 towards BO#3 (Malmö)
route : 211
protocol = udp
profile = MXONE-tieline
service = PRIVATE_SERVICES
uristring0 = sip:[email protected];tgrp=BO3
fromuri0 = sip:[email protected];tgrp=BO3
accept = ALL
register = SET_BY_PROFILE
trusted = TRUST_BY_PROFILE
NOTE: BO#3 is only reached by SIP trunks as it is an EX controller system running an own instance of
MX-ONE.
48
LOGON
CHAPTER 4 SETTING UP THE GX GATEWAY
Logon
This section describes how to setup BO#1.
Factory Reset the EX Controller and plug in the network cable to the ETH1 port on EX Controller (If DHCP
is running in the network).
NOTE: If DHCP is not running into the network then, plug in the network cable to the ETH2 port on EX
Controller and use the default IP address of 192.168.0.10 to open the EX Controller Interface.
Figure 4.4: Login page
2. Plug in the analog phone in the FXS port 1 of the EX Controller and dial *#*0 to know the IP address
of the EX Controller assigned by using DHCP server.
3. Log into the EX Controller by using the above-mentioned IP address and navigate as described below
to configure.
Network Settings
Host
1. Select Network > Host and keep the default configuration interface as mentioned below.
Figure 4.5: Host settings - 1
49
NETWORK SETTINGS
CHAPTER 4 SETTING UP THE GX GATEWAY
3. Change to static DNS server and enter IP-address or FQDN to DNS server.
Figure 4.8: Changing static DNS server
50
INTERFACES
CHAPTER 4 SETTING UP THE GX GATEWAY
Interfaces
1. Go to Network > Interface.
Figure 4.11: Interface
2. Change Uplink to IpStatic (IPv4 Static) and enter the static IP-address and Static Default Gateway.
Figure 4.12: Changing Uplink to IpStatic
Local Firewalls
1. Go to Network > Local Firewall.
Figure 4.13: Local firewalls
51
SESSION BOARD CONTROLLER (SBC)
CHAPTER 4 SETTING UP THE GX GATEWAY
Configuration
1. Go to SBC > Configuration. The following Call Agents are present.
Figure 4.16: Call agent - 1
52
SESSION BOARD CONTROLLER (SBC)
CHAPTER 4 SETTING UP THE GX GATEWAY
2. Insert A-Number prefix and B-number prefix. These numbers are to be added in front of the numbers
in when the GW is in survivable mode, that is, the call is routed to PSTN and thus needs to be prefixed.
3. Enter the number range that is allowed in the branch in the PATTERN parameter. For example,
111[0-9][0-9]$ means that the allowed number range in this branch is 11100 – 11199.
Figure 4.19: Parameters screen
Local_users_ca
• Enter the IP-address of MX-ONE to the DOMAIN variable.
• Enter the number range that is allowed in the branch in the PATTERN parameter. For example,
111[0-9][0-9]$ means that the allowed number range in this branch is 11100 – 11199.
• Insert A-Number prefix and B-number prefix. These numbers are to be added in front of the numbers
in when the GW is in survivable mode, that is, the call is routed to PSTN and thus needs to be prefixed.
53
SESSION BOARD CONTROLLER (SBC)
CHAPTER 4 SETTING UP THE GX GATEWAY
54
SESSION BOARD CONTROLLER (SBC)
CHAPTER 4 SETTING UP THE GX GATEWAY
This is the prefix for the usernames connected with shared appearance. In this example we have two:
“SCA-“ and “EDN-“
Ruleset: MX-ONE_Remove_Outbound_Appearance (ACTIVE ONLY IN SURVIVAL MODE)
PATTERN=111[0-9][0-9]$
This rule will remove any prefix used for Shared Call Appearance. The pattern for the internal range of
numbers, in this example the internal range would be 11100 – 11199
Ruleset: MX-ONE_outbound_A_Number_prefix (ACTIVE ONLY IN SURVIVAL MODE)
PATTERN=111[0-9][0-9]
This defines the local numbers.
A_PRFX=013443
This is the prefix for the local numbers used on outgoing calls to the PSTN (in this example we received
a number block 013443xxxxx from the PSTN provider and add the prefix on outgoing calls, so that the
calling party number sent to the PSTN is correct)
PSTN_PREFIX=00
Dial this prefix to break out to the PSTN. Here we have configured the “00” (not to be mixed up with the
“00” for international calls!)
Ruleset: MX-ONE_outbound_B_Number_prefix (ACTIVE ONLY IN SURVIVAL MODE)
This ruleset applies to calls to numbers defined in BNUMBER and will add B_PRFX to the called party
number.
BNUMBER=67[0-9][0-9]$
Applies to calls to the specific range of extensions,
B_PRFX=08568
This is the prefix for the Called Party Number. In this case it was build like: National Prefix (08) + Main
part of the HQ’s local number: (568), in case somebody dials an extension in the HQ
Ruleset: MX-ONE_outbound_B_Number_Override (ACTIVE ONLY IN SURVIVAL MODE)
This ruleset applies to calls to numbers defined in BNUMBER and will use the BOVERRIDE as Called
Party Number.
BNUMBER=330[0-9][0-9]$
Applies to calls to the specific range
BOVERRIDE=0856867000
Calls to extensions like BNUMBER will be sent to BOVERRIDE, in this example they will be sent to
0856867000
Ruleset: MX-ONE_local_reg_users_with_survivability
(Builds the registration cache for survivability purpose)
EXT_DIGIT_LENGTH=5
55
SESSION BOARD CONTROLLER (SBC)
CHAPTER 4 SETTING UP THE GX GATEWAY
The length of the internal numbers, in this case set to “5”, for numbers like “00001 – 99999”
1. Click Save when done.
56
SESSION BOARD CONTROLLER (SBC)
CHAPTER 4 SETTING UP THE GX GATEWAY
Ruleset: MX-One_remove_prefix
PSTN_PREFIX=00
This is the prefix used to dial out to the PSTN
Ruleset: MX-One_trunk_lines_to_reception_survivability
An incoming call in survival mode will be sent to MAIN_EXT destination if not reachable
MAIN_EXT=11104
This will receive the incoming call in case the original destination is not reachable (not defined or not regis-
tered)
PATTERN=111[0-9][0-9]$
The pattern for the internal range of numbers, in this example the internal range would be 11100 – 11199
DOMAIN=192.168.17.44
The IP of the headquarter (the main PBX), in this case 192.168.17.44
Ruleset: MX-One_Set_RURI_User_Type_Parameter
Set RURI User Type Parameter
USER_TYPE=trunk
1. Click Save when done.
MX-ONE_Lim1
1. Enter the IP-address of the MX-ONE in the Peer Host field.
Figure 4.24: Peer Host field
57
SESSION BOARD CONTROLLER (SBC)
CHAPTER 4 SETTING UP THE GX GATEWAY
Ruleset: rewrite_RURI_host
Customize RURI host
RURI_HOST= 192.168.17.81. This is the local IP address.
3. When all the changes for call agents are done, a yellow field is shown indicating that configuration has
been modified.
4. Click Save when ready.
MX-ONE_TRUNK
1. Enter the IP-address of the MX-ONE in the Peer Host field.
Figure 4.26: MX-ONE Trunk
58
ISDN
CHAPTER 4 SETTING UP THE GX GATEWAY
2. When all the changes for call agents are done, a yellow field is shown indicating that configuration has
been modified.
3. Click Save when ready.
4. If the indication is not removed there are some error in the configuration.
5. Double check changes described above and correct them.
ISDN
Figure 4.29: ISDN tab
If ISDN trunks are used, press Start Sensing. The system automatically detects certain parameters, for
example, number of channels.
59
ISDN
CHAPTER 4 SETTING UP THE GX GATEWAY
1. When sensing is done for several markets, specific parameters can be changed.
60
ISDN
CHAPTER 4 SETTING UP THE GX GATEWAY
61
ISDN
CHAPTER 4 SETTING UP THE GX GATEWAY
62
ISDN
CHAPTER 4 SETTING UP THE GX GATEWAY
Interop
Figure 4.32: Interop
63
ISDN
CHAPTER 4 SETTING UP THE GX GATEWAY
Services
Figure 4.34: Services
64
POTS
CHAPTER 4 SETTING UP THE GX GATEWAY
POTS
Config
Figure 4.36: Config
FXS Configuration
Figure 4.38: FXS Configuration
65
SIP
CHAPTER 4 SETTING UP THE GX GATEWAY
SIP
Gateways
Following gateways and port numbers are pre-defined.
Figure 4.41: Gateways
NOTE:A SIP route must be defined in MX-ONE to handle traffic to and from the ‘trunks_MX-ONE’
gateway.
Figure 4.42: trunks_mx-one
66
SIP
CHAPTER 4 SETTING UP THE GX GATEWAY
Servers
Figure 4.43: Servers
1. Enter IP-address to MX-ONE in both Registrar Host and Proxy Host fields.
Figure 4.44: Default Servers
67
SIP
CHAPTER 4 SETTING UP THE GX GATEWAY
Registrations
Figure 4.48: Registrations
68
SIP
CHAPTER 4 SETTING UP THE GX GATEWAY
Authentication
Figure 4.50: Authentication
2. Indicate for which Endpoint and Criteria the changes are to apply.
3. Enter the Auth Code, in the Password field.
4. In the Validate Realm field, select Disable.
69
SIP
CHAPTER 4 SETTING UP THE GX GATEWAY
5. Click Apply or Apply and Refresh Registration when done and restart service. The result after
‘Registration’ and ‘Authentication’ should be like as follows:
Figure 4.53: Endpoints Registration Status
Transport
Figure 4.54: Transport
Interop
Figure 4.56: Interop
70
SIP
CHAPTER 4 SETTING UP THE GX GATEWAY
Misc
Figure 4.58: Misc
1. Enter the IP-address of MX-ONE in the SIP Domain Override field for trunk_lines_gw.
Figure 4.59: Gateway Configuration field
71
MEDIA
CHAPTER 4 SETTING UP THE GX GATEWAY
Media
Codecs
Figure 4.60: Codecs
72
CALL ROUTER
CHAPTER 4 SETTING UP THE GX GATEWAY
Call Router
Route Config
Figure 4.62: Route Config
1. Click for index 1. This is used if the received B-number contains a full number. That is, more digits
3. Click Save.
4. Click in the first Call Property Transformation and enter the same name as above.
5. Use Called E164 for both Criteria Based On and Transformation Applies To fields.
73
CALL ROUTER
CHAPTER 4 SETTING UP THE GX GATEWAY
7. Click in the second Call Property Transformation and enter the same name as above.
8. The ‘Criteria Rule’ in this case is 443 (111..)$ and the transformation rule is ‘\1. This means that if a
B-number is received containing 44311104, then the 3 first digits (443) are removed before the call is
sent to MX-ONE for further processing. (111..)$ means that the number can only be 5 digits starting
with 111.
Figure 4.66: Configure Transformation Rule 1 screen
9. Click Save or Save and Insert Rule. Now, the ‘Call Property Transformations’ looks like this as shown
below.
Figure 4.67: Transformations screen
74
MANAGEMENT
CHAPTER 4 SETTING UP THE GX GATEWAY
10. Click Save if the yellow indication on top of the page is ON.
Management
Backup/Restore
1. Click Activate .......
Figure 4.68: Image Configuration screen
75
MANAGEMENT
CHAPTER 4 SETTING UP THE GX GATEWAY
File
Figure 4.69: Internal files screen
76
LOGON
CHAPTER 4 SETTING UP MX-ONE FOR AN EX CONTROLLER
Setting up EX Controller
Logon
This section describes how to setup BO#1.
Factory Reset the EX Controller and plug in the network cable to the ETH1 port on EX Controller (If DHCP
is running in the network).
NOTE: If DHCP is not running into the network then, plug in the network cable to the ETH2 port on EX
Controller and use the default IP address of 192.168.0.10 to open the EX Controller Interface.
77
NETWORK SETTINGS
CHAPTER 4 SETTING UP EX CONTROLLER
2. Plug in the analog phone in the FXS port 1 of the EX Controller and dial *#*0 to know the IP address
of the EX Controller assigned by using DHCP server.
3. Log into the EX Controller by using the above-mentioned IP address and navigate as described below
to configure.
Network Settings
Host
1. Select Network > Host and keep the default configuration interface as mentioned below.
Figure 4.72: Host screen
78
NETWORK SETTINGS
CHAPTER 4 SETTING UP EX CONTROLLER
3. Change to static DNS server and enter IP-address or FQDN to DNS server.
Figure 4.75: DNS Configuration screen
79
INTERFACES
CHAPTER 4 SETTING UP EX CONTROLLER
Interfaces
1. Go to Network > Interface.
Figure 4.78: Interfaces screen
2. Change Uplink to IpStatic (IPv4 Static) and enter the static IP-address and Static Default Gateway.
Local Firewalls
1. Go to Network > Local Firewall.
Figure 4.80: Local Firewall screen
80
SBC
CHAPTER 4 SETTING UP EX CONTROLLER
SBC
Configuration
1. Go to SBC > Configuration. The following Call Agents are present.
Figure 4.83: SBC Configuration screen
81
SBC
CHAPTER 4 SETTING UP EX CONTROLLER
2. Insert A-Number prefix and B-number prefix. These numbers are to be added in front of the numbers
when the GW is in survivable mode. That is, the call is routed to PSTN and thus needs to be prefixed.
3. Enter the number range that is allowed in the branch in the PATTERN parameter. For example,
321[0-9][0-9]$ means that the allowed number range in this branch is 32100 – 32199.
Figure 4.85: Routing Rulesets screen
Local_users_ca
• Enter the IP-address of MX-ONE to the DOMAIN variable.
• Enter the number range that is allowed in the branch in the PATTERN parameter. For example,
321[0-9][0-9]$ means that the allowed number range in this branch is 32100 – 32199.
• Insert A-Number prefix and B-number prefix. These numbers are to be added in front of the numbers
when the GW is in survivable mode. That is, the call is routed to PSTN and thus needs to be prefixed.
82
SBC
CHAPTER 4 SETTING UP EX CONTROLLER
83
SBC
CHAPTER 4 SETTING UP EX CONTROLLER
Trunk_Lines_ca
• Enter the IP-address of MX-ONE to the DOMAIN variable (in two places).
84
SBC
CHAPTER 4 SETTING UP EX CONTROLLER
• Enter the number range that is allowed in the branch in the PATTERN parameter. For example,
321[0-9][0-9]$ means that the allowed number range in this branch is 32100 – 32199.
• Insert a main extension number in MAIN_EXT parameter, this is could be the local answering position
when dialling a vacant number, and so on.
• Enter the PSTN_PREFIX and STRIPNDIGTS, this is used to remove the public access code when
dialling PSTN calls in survivable mode.
Figure 4.88: Configure Call Agent screen
Ruleset: MX-One_remove_prefix
PSTN_PREFIX=00
This is the prefix used to dial out to the PSTN
Ruleset: MX-One_trunk_lines_to_reception_survivability
An incoming call in survival mode will be sent to MAIN_EXT destination if not reachable
MAIN_EXT=11104
This will receive the incoming call in case the original destination is not reachable (not defined or not regis-
tered)
PATTERN=321[0-9][0-9]$
The pattern for the internal range of numbers, in this example the internal range would be 32100 – 32199
85
SBC
CHAPTER 4 SETTING UP EX CONTROLLER
DOMAIN=192.168.17.94
The IP of the headquarter (the main PBX), in this case 192.168.17.94
Ruleset: MX-One_Set_RURI_User_Type_Parameter
Set RURI User Type Parameter
USER_TYPE=trunk
1. Click Save when done.
MX-ONE_Lim1
1. Enter the IP-address of the MX-ONE in the Peer Host field.
Figure 4.90: Peer Host field
Ruleset: rewrite_RURI_host
Customize RURI host
86
ISDN
CHAPTER 4 SETTING UP EX CONTROLLER
MX-ONE_TRUNK
1. Enter the IP-address of the MX-ONE in the Peer Host field.
Figure 4.92: Call Agent Parameters
2. When all the changes for call agents are done, a yellow field is shown indicating that configuration has
been modified.
3. Click Save when ready.
Figure 4.94: Configuration Modified screen
4. If the indication is not removed there are some error in the configuration.
5. Double check changes described above and correct them.
ISDN
Figure 4.95: ISDN Screen
87
ISDN
CHAPTER 4 SETTING UP EX CONTROLLER
If ISDN trunks are used the first action to do is to click Start Sensing. The system automatically detects
certain parameters, for example, number of channels.
88
ISDN
CHAPTER 4 SETTING UP EX CONTROLLER
1. When sensing is done for several markets, specific parameters can be changed.
89
ISDN
CHAPTER 4 SETTING UP EX CONTROLLER
90
ISDN
CHAPTER 4 SETTING UP EX CONTROLLER
91
ISDN
CHAPTER 4 SETTING UP EX CONTROLLER
Interop
Figure 4.97: Interop screen
Services
Figure 4.99: ISDN Services screen
92
POTS
CHAPTER 4 SETTING UP EX CONTROLLER
POTS
Config
Figure 4.101: Config screen
FXS Configuration
Figure 4.103: POTS FXS Configuration screen
SIP
Gateways
Following gateways and port numbers are pre-defined.
93
SIP
CHAPTER 4 SETTING UP EX CONTROLLER
NOTE:A SIP route must be defined in MX-ONE to handle traffic to and from the ‘trunks_MX-ONE’
gateway.
Figure 4.107: Gateway Configuration screen
Servers
Figure 4.108: Servers screen
1. Enter IP-address to MX-ONE in both Registrar Host and Proxy Host fields.
Figure 4.109: Default Servers screen
94
SIP
CHAPTER 4 SETTING UP EX CONTROLLER
Registrations
Figure 4.113: Registrations screen
95
SIP
CHAPTER 4 SETTING UP EX CONTROLLER
Authentication
Figure 4.115: SIP Authentication screen
5. Click Apply or Apply and Refresh Registration when done and restart service. The result after
‘Registration’ and ‘Authentication’ should be like as follows.
96
SIP
CHAPTER 4 SETTING UP EX CONTROLLER
Transport
Figure 4.119: Transport screen
Misc
Figure 4.121: Misc screen
1. Enter the IP-address of MX-ONE in the SIP Domain Override filed for trunk_lines_gw.
Figure 4.122: Gateway Configuration screen
97
MEDIA
CHAPTER 4 SETTING UP EX CONTROLLER
Media
Codecs
Figure 4.123: Codecs screen
98
CALL ROUTER
CHAPTER 4 SETTING UP EX CONTROLLER
Call Router
Route Config
Figure 4.125: Route Config screen
1. Click for index 1. This is used if the received B-number contains a full number. That is, more digits
3. Click Save.
4. Click in the first Call Property Transformation and enter the same name as above.
5. Use Called E164 for both Criteria Based On and Transformation Applies To fields.
99
CALL ROUTER
CHAPTER 4 SETTING UP EX CONTROLLER
7. Click in the second Call Property Transformation and enter the same name as above.
8. Use Called E.164 for both Criteria Based On and Transformation Applies To fields.
11. The Criteria Rule in this case is 443(111..)$ and the transformation rule is ‘\1.
12. This means that if a B-number is received containing 44311104, then the 3 first digits (443) are
removed before the call is sent to MX-ONE for further processing. (111..)$ means that the number
can only be 5 digits starting with 111.
Figure 4.130: Configure Transformation Rule 1
13. Click Save or Save and Insert Rule. Now, the ‘Call Property Transformations’ looks like this as shown
below.
100
MANAGEMENT
CHAPTER 4 SETTING UP EX CONTROLLER
14. Click Save if the yellow indication on top of the page is ON.
Management
Figure 4.132: Management screen
Backup/Restore
1. Click the Activate unsecure script transfers through web browser link.
Figure 4.133: Image Configuration screen
File
Figure 4.134: File screen
101
PREREQUISITES
CHAPTER 4 CONFIGURE TLS ON AN EX/GX CONTROLLER
Prerequisites
Before you configure the TLS on the controller, ensure that the following requirements are met:
• The EX/GX controller setup is complete without TLS before you configure TLS on the controller. See
the previous chapters in this document for the setup information.
102
CREATING TLS CERTIFICATE WITH SAN
CHAPTER 4 CONFIGURE TLS ON AN EX/GX CONTROLLER
• The EX/GX controller setup is fully loaded and the virtual machine on which MX-ONE has been setup
is switched on.
• The FXS extensions are registered. You can view the registration status in the path SIP > Registra-
tions.
• The FXS extensions need to be in the SBC registration cache. You can view in the path SBC > Regis-
tration.
• The TLS certificate authority is generated and is available in the path
/etc/opt/eri_sn/certs/root with:
– Certificate authority file: /etc/opt/eri_sn/certs/root/CA.pem
– Private key: /etc/opt/eri_sn/certs/root/private_key.pem
103
CREATING TLS CERTIFICATE WITH SAN
CHAPTER 4 CONFIGURE TLS ON AN EX/GX CONTROLLER
104
CREATING TLS CERTIFICATE WITH SAN
CHAPTER 4 CONFIGURE TLS ON AN EX/GX CONTROLLER
The certificate must be generated on the MX-ONE server using the following procedure:
1. Create a directory for the unit certificates.
mkdir -p /etc/opt/eri_sn/certs/units
cd /etc/opt/eri_sn/certs/units
2. Create a configuration file for the uplink (10.211.162.127.cnf) to provide SAN options. Replace the
uplink IP (10.211.162.127) with the IP address of the EX and GX controller.
cat << EOF > 10.211.162.127.cnf
[req]
distinguished_name = req_distinguished_name
req_extensions = v3_req
prompt = no
[req_distinguished_name]
CN = 10.211.162.127
[v3_req]
basicConstraints = CA:false
keyUsage = digitalSignature, keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth, clientAuth
subjectAltName = @alt_names
[alt_names]
DNS.1 = 192.168.0.10
DNS.2 = 127.0.0.1
DNS.3 = 10.211.162.127
IP.1 = 192.168.0.10
IP.2 = 127.0.0.1
IP.3 = 10.211.162.127
EOF
3. Generate a Private Key for the EX and GX controller unit. The first command will generate a key with
password, the second one will convert the key so it requires no password (required by the following
steps):
openssl genrsa -aes256 -out 10.211.162.127.key.protected 2048
openssl rsa -in 10.211.162.127.key.protected -out 10.211.162.127.key
4. Generate a CSR for the Unit.
openssl req -new -key 10.211.162.127.key -out 10.211.162.127.csr -sha256
-config 10.211.162.127.cnf
5. Verify the CSR:
openssl req -text -noout -verify -in 10.211.162.127.csr
6. Sign the CSR and generate a new certificate:
105
CONFIGURING THE EX/GX FOR TLS
CHAPTER 4 CONFIGURE TLS ON AN EX/GX CONTROLLER
106
CONFIGURING THE EX/GX FOR TLS
CHAPTER 4 CONFIGURE TLS ON AN EX/GX CONTROLLER
107
CONFIGURING THE EX/GX FOR TLS
CHAPTER 4 CONFIGURE TLS ON AN EX/GX CONTROLLER
5. Restart required services and log in to the EX/GX controller user interface again.
Setting the TLS version, Cipher Suite, and Certificate Validation Level
For SIP gateways on the EX/GX to communicate with the SBC service, configure the TLS version to 1.2
and the Cipher Suite to CS3.
NOTE: It is recommended to disable the certificate validation until the setup is complete.
1. Navigate to Management > Configuration Scripts and click Execute.
2. Select Activate unsecure script transfers and execution through web browser.
3. In Execute inline script, copy and paste the following:
108
CONFIGURING THE EX/GX FOR TLS
CHAPTER 4 CONFIGURE TLS ON AN EX/GX CONTROLLER
SipEp.TransportTlsVersion=TLSv1_2
SipEp.TransportTlsCipherSuite=CS3
SipEp.InteropTlsCertificateValidation=NoValidation
Sbc.CertificateValidation=NoValidation
Scm.RestartRequiredServices
2. In Call Agent Configuration, edit trunk_lines_ca by clicking on the Edit icon next to it.
4. Repeat the above steps for local_users_ca and MX-ONE_LIM1 call agents.
109
CONFIGURING THE EX/GX FOR TLS
CHAPTER 4 CONFIGURE TLS ON AN EX/GX CONTROLLER
6. Restart the required services. It takes about 30 seconds for the SBC service to restart.
7. Clear cache registration by navigating to SBC > Registration.
2. Configure the general configuration details as shown in the above figure and click Apply.
3. Restart the required services. It takes about 30 seconds for the service to restart.
110
CONFIGURING THE EX/GX FOR TLS
CHAPTER 4 KNOWN LIMITATIONS
6. Navigate to SBC > Registration, validate all endpoints are registered using TLS.
Known Limitations
Below are some known limitations when using the EX-Controller or GX-Gateway:
111
CONFIGURING THE EX/GX FOR TLS
CHAPTER 4 KNOWN LIMITATIONS
• When MX-ONE is installed as a virtual machine in the EX-Controller, Provisioning Manger is not
allowed to be installed.
• When EX-Controller is used in a multi-server configuration the EX-controller can never be the master
server.
• Maximum 5 servers can exist in a multi-server configuration, where at least one of the servers is an
EX-controller.
• When deploying a MX-ONE as a virtual machine the maximum amount of RAM is 7168 Mbytes.
112
SCOPE
CHAPTER 5 INTRODUCTION
Scope
The intent of this guide is to describe the setup tasks to integrate MiVoice MX-ONE and Microsoft Lync
Server 2013 for Remote Call Control.
For more details regarding components of this integration, we refer to the relevant MX-ONE CPI docu-
mentation or, please, go to the Microsoft Lync Server 2013 product website.
113
MIVOICE MX-ONE
CHAPTER 5 SOLUTION DESCRIPTION
Solution Description
Integration of MX-ONE 6.0 with Microsoft Lync Server 2013 for Remote Call Control as a complementary
solution, provides users enabled for remote call control to use Lync 2013 client to control calls on their
MX-ONE phones.
MiVoice MX-ONE
MiVoice MX-ONE has a built-in CSTA III server that is an interface that other applications can use to
remotely control a phone. Examples of operations that can be performed with CSTA Phase III are: make
call, answer call, dial a number and terminate a call.
MX-ONE 6.0 supports CSTA method that is based on European Computer Manufacturers Association
(ECMA) Technical Report-87 (TR-87), called Using CSTA for SIP Phone User Agents (uaCSTA).
MX-ONE implements a subset of the capabilities and methods proposed in TR-87 specification.
In TR-87 (Using CSTA for SIP Phone User Agents (uaCSTA)):
SIP is used to establish a CSTA application session
CSTA service request and response messages are transported over SIP
CSTA monitor is started and CSTA events are transported over SIP
Integration
CSTA III (XML) is required to provide the integration between MX-ONE and Lync Server for Remote Call
Control as shown in the figure below.
The telephony feature commands are sent from the Lync 2013 client through the Microsoft Lync Server
2013 to the internal MX-ONE CSTA server as CSTA III messages over SIP, so called user agent CSTA
(uaCSTA). The internal MX-ONE CSTA server analyzes the requests and maps them to the corre-
sponding CSTA commands towards MX-ONE, which will then carry out the requests.
114
INTEGRATION
CHAPTER 5 REQUIREMENTS AND SETUP
RCC user
r
ve
I II o 8 7) SI P
TA R - MX-ONE
C S P (T device
SI
Lync Server
2013 – MiVoice MX-ONE 6.0
Standard
Edition
Figure 1 - Integration via Remote Call Control (RCC) between MX-ONE and Lync Server 2013
With Microsoft Lync Server 2013 integration, it is possible from Lync 2013 client (Remote Call Control
Only) to manage calls and talk using any fixed and remote extensions within the MX-ONE.
The features that a Lync 2013 client can manage when integrate with MX-ONE using RCC are:
Make an outgoing call
Answer an incoming call
Transfer a call to another user (monitored transfer with current conversations)
Single step transfer
Forward an incoming call to an internal number (internal and private network extensions)
Forward an incoming call to an external number
Redirect an incoming call
Place calls on hold
Alternate (toggle) between multiple concurrent calls
Answer a second call while already in a call.
Dial dual-tone multi-frequency (DTMF) digits
115
MIVOICE MX-ONE REQUIREMENTS
CHAPTER 5 REQUIREMENTS AND SETUP
Note! Multi terminal extensions cannot be monitored via CSTA and therefore it does not work
in the Remote Call Control scenario.
MX-ONE was validated with Microsoft Lync 2013 Remote Call Control with only one Lync Front End
server.
Microsoft Lync 2013 requires load balancer when more than one Front End is used. Please note that this
setup was not validated with MX-ONE.
Note! The latest Lync Client (Lync 2013 update: April 2014) needs to be installed in the end
user computers, please see that article below.
http://support.microsoft.com/kb/2880474
116
INTEGRATION SETUP - TCP
CHAPTER 5 REQUIREMENTS AND SETUP
Lync Server
MiVoice MX-ONE 6.0
IP: 192.168 .222 .197
IP: 192.168.222.156
FQDN: lync-enter.domain .com
FQDN: mx-one -156.mx-one.domain .com
Note! Mitel recommends that complex scenarios shall be validated in the partner labs prior to
customer deployment.
117
INTEGRATION SETUP - TCP
CHAPTER 5 REQUIREMENTS AND SETUP
118
ENABLE LYNC USERS FOR REMOTE CALL CONTROL
CHAPTER 5 REQUIREMENTS AND SETUP
119
LYNC 2013 CLIENT FEATURES
CHAPTER 5 HOW TO VERIFY THE SETUP
120
LYNC 2013 CLIENT FEATURES
CHAPTER 5 HOW TO VERIFY THE SETUP
If there is small icon in the lower right side of the Lync 2013 client, showing a phone with an error, check
the setup, because the CSTA monitoring could not be established.
Use the MiVoice MX-ONE command “csta -p --lim all --devices” to check the devices that are monitored.
121
MAKE AN OUTGOING CALL USING THE LYNC 2013 CLIENT
CHAPTER 5 HOW TO VERIFY THE SETUP
In the use cases below two Lync clients were used and three MX-ONE extensions.
1. Alice.RCC controls the extension 27001, which is a SIP extension in MX-ONE.
2. Bob.RCC controls the extension 27010, which is a SIP extension in MX-ONE.
122
TRANSFER A CALL BETWEEN CURRENT CONVERSATIONS (MONITORED TRANSFER)
CHAPTER 5 HOW TO VERIFY THE SETUP
Using the client, put extension B on hold and make a second call to extension C (27002), and wait until
the extension C answers.
Once speech is established, initiate the transfer of extension B (Bob RCC) using the Current Conversa-
tions option as shown below.
123
SINGLE STEP TRANSFER
CHAPTER 5 HOW TO VERIFY THE SETUP
124
SINGLE STEP TRANSFER
CHAPTER 5 HOW TO VERIFY THE SETUP
125
FORWARD AN INCOMING CALL
CHAPTER 5 HOW TO VERIFY THE SETUP
126
PLACE CALLS ON HOLD
CHAPTER 5 HOW TO VERIFY THE SETUP
127
ALTERNATE BETWEEN MULTIPLE CONCURRENT CALLS
CHAPTER 5 HOW TO VERIFY THE SETUP
128
DIAL DUAL-TONE MULTI-FREQUENCY (DTMF) DIGITS
CHAPTER 5 HOW TO VERIFY THE SETUP
Presence
In order to verify presence, establish a call using Lync client (RCC) as below.
129
PRESENCE
CHAPTER 5 HOW TO VERIFY THE SETUP
From extension A use the Lync client (RCC) to dial extension B, pick up your handset as soon as you
hear the ring back tone, wait until the extension B answers, check if there is speech.
130
PRESENCE
CHAPTER 5 HOW TO VERIFY THE SETUP
From another Lync client, for example Bob, RCC that is monitoring Alice RCC, check if the presence
status is now “In a Call”.
Disconnect the call from extension A (Alice RCC) and check if the Alice RCC presence status goes to
Available in the Bob RCC.
131
PRESENCE
CHAPTER 5 LIMITATIONS
Limitations
The integration supports Lync 2013 clients configured with “Remote Call Control only” option. The option
“Remote Call Control” is not supported.
The secure transport mechanism using TLS is not supported in MX-ONE 6.x.
The features listed below are not supported in this integration, when initiated by the Lync client:
Do not disturb (it is not supported by Lync client)
Note! Although these features may not be possible from the client, they may be invoked
directly on the terminal instead.
Good to Know
MX-ONE and Lync Server cannot be part of the same domain.
Latest Lync client needs to be installed.
DNS needs to be properly configured.
132
PRESENCE
CHAPTER 5 REVISION HISTORY
Conference can be invoked via Lync client using MX-ONE procedure (normally dialing 3). However, the
Lync client will merge all other screens with the first one and that will be presented until the last member
disconnects.
Revision History
133
CHAPTER 6 GENERAL
Application Requirements
You must meet the minimum software level requirements for each application listed below so that the
applications function correctly with this Release.
134
LICENSING
CHAPTER 6 INSTALLATION NOTES
Installation Notes
The principle used here is to configure MBG to have secure communication on the outside towards the
home worker terminals and insecure communication on the inside towards MX-ONE.
Licensing
The only licensing required is a MiVoice Border Gateway base kit (physical or virtual) and Teleworker
licenses (1 per 68xxi device + a few floater licenses).
Firewall Configuration
If MBG is deployed in a demilitarized zone, the following ports need to be opened (above ports needed
for communication with the AMC).
• TCP port 5061 between the Internet and MBG for SIP TLS
• TCP port 5060 between MBG and MX-ONE
• TCP port 22223 between the Internet and MBG for SIP XML
• TCP port 22222 between MBG and MX-ONE for SIP XML
• TCP port 4431 between the Internet and MBG for Configuration Server Access (Optional)
• TCP port 80 between MBG and the Configuration Server
• UDP port 20000-31000 between the Internet and MBG and between MBG and the LAN for voice
• TCP port 22 between LAN and MBG for secure shell access
135
MSL CONFIGURATION
CHAPTER 6 INSTALLATION NOTES
• UDP port 53 between MBG and the LAN for DNS resolution to a Corporate DNS server
NOTE: Do not enable TCP port 5060 or UDP port 5060 between the Internet and MBG.
MSL Configuration
1. Configure your MSL server to use a Corporate DNS server that can resolve any FQDN associated
with MX-ONE.
2. Configure your MSL server to allow Remote Access for secure shell from a local network. This access
will be needed to run a special setup script.
3. Navigate to Remote Access under MSL Server Manager.
4. Select “Allow access only from trusted and remote management networks” to setup secure shell
access.
5. Select “Yes” for administrative command line access over secure shell.
6. Select “Yes” to allow secure shell access using standard passwords.
MBG Configuration
From a new installation of Release 11.0, access the MiVoice Border Gateway User Interface from MSL
server-manager and perform the following steps:
1. Go to System Configuration > Network Profile.
a. Select Profile and Apply.
2. Go to System Configuration > Settings.
a. Under SIP options, increase the Set-side registration expiry time to 360 from the default of 240.
b. Enable SIP support for TCP/TLS and TCP.
c. Change Codec support to Unrestricted.
d. Change Set-side RTP security to Require (to enforce SRTP between the phone and MBG).
NOTE: Optionally, you can disable support for all protocols under Minet Support.
136
MBG CONFIGURATION
CHAPTER 6 INSTALLATION NOTES
certificate and key files for set are /root/aastra_tftp/mbg_mxone_cert.pem and /root/aastra_tftp/mb-
g_mxone_key.pem
done.
137
MBG CONFIGURATION
CHAPTER 6 INSTALLATION NOTES
Example #2:MBG Public IP is 1.1.1.1, MBG local IP is 192.168.100.10, modify an existing mitel.cfg
(transferred to /root
certificate and key files for set are /root/aastra_tftp/mbg_mxone_cert.pem and /root/mitel_tftp/mb-
g_mxone_key.pem
creating mitel.cfg from template, configured with MBG's CN ip
sip proxy ip
sip proxy port
sip registrar ip
sip registrar port
sip outbound proxy
sip outbound proxy port
tftp server
sips trusted certificates
sips root and intermediate certificates
sips local certificate
sips private key
https validate certificates
138
PHONE CONFIGURATION
CHAPTER 6 INSTALLATION NOTES
Phone Configuration
1. Phone must be staged in the office.
2. Using WinSCP, copy the /root/aastra_tftp/mbg_mxone_cert.pem and /root/aastra_tftp/mbg_mxon-
e_key.pem to a special folder (ex: athome) on your configuration server.
3. Append the settings listed in “Appendix – mitel.cfg Settings” to your mitel.cfg file or used the modified
mitel.cfg also available under /root/aastra_tftp.
If needed, update all other files (ex: <model.cfg>) to use https/22223 instead of http/22222.
Limitations
A list of known limitations shared with the InGate solution.
1. Phones must be staged in the office.
2. Phone firmware must be done in the office as a phone firmware upgrade will remove the certificate
loaded.
3. Access to internal configuration server cannot be limited/controlled/blocked from the outside.
4. 68xxi must have access to a NTP server for certificate validation.
5. Corporate directory access must be setup with port forwarding on MSL (server-gateway configuration)
or the DMZ firewall.
6. If MX-ONE is setup to like lim1.mysystem.com, the MSL server must point to a Corporate DNS to
allow proper DNS resolution.
139
KNOWN ISSUES
CHAPTER 6 INSTALLATION NOTES
Known Issues
None.
Issues Resolved
Here is a list of issues resolved in 9.2.0.22 in conjunction with 68xx 4.2 SP1 firmware and workaround is
not longer required:
1. MN00609195 MBG 11.0: SIP 68xxi/MX-One/SRTP one way audio after “set side” session timer
re-invite (decrypt failure).
2. Conditions: Session timers are configured on TW 68xxi AND greater than 1310 (default in MX-ONE
sample is 1800).
3. Root Cause: 68xxi do NOT increment SDP version but changes SRTP keys in re-invite and MBG
falsely detects the SDP as a duplicate.
4. Workaround: Select a value less than 1200 for session timers in mitel.cfg for TW 68xxi.
5. MN00616730 MBG 11.0: SIP 68xxi/MX-One/SRTP one way audio after “ICP side” session timer
re-invite.
6. Conditions: Session timers are configured on LAN 68xxi AND greater than 1300 AND the codec list
is different between LAN and TW set but 1st selection is the same.
7. Root Cause: Still under investigation.
8. Workaround #1: Same codec selection list on TW 68xxi as LAN 68xxi (MX-ONE sample has G.722,
G711a, G.711u, G.729. Updates are used instead of re-invite.
9. Workaround #2: Disable session timers in mitel.cfg for LAN 68xxi or reduce the value to 1200 or less.
Upgrade Notes
Trials sites that have deployed based on earlier versions of this document, need to run the following
command on their system to ensure that all required files are part of a backup.
[root@mysystem ~]# db tug setprop config backuplist
/etc/tug/tug.ini.certificates.ini,/etc/tug/tugcerts.ini,/etc/tug/ca-bundle.crt,/etc/tug/mbg_mxone.ini
140
APPENDIX - MITEL.CFG SETTINGS
CHAPTER 6 INSTALLATION NOTES
mbg_wan_ip=
mbg_lan_ip=
configure_tftp=false
generate_certificate=false
force=false
----------
--mbg_lan_ip parameter must be specified
----------
Usage: /usr/sbin/configure_68xx_mbg_support.sh --mbg_wan_ip ip_address --mbg_lan_ip ip_address
[--tftp] [--generate_certificate] [--force] [--modify_cfg_template aastra_cfg_file_template] [--ntp_server
fqdn/ip] [--time_zone_name aastra_name_string]
--mbg_wan_ip - MBG public address
sets connect to this address and MBG certificate will contain this
--mbg_lan_ip - MBG private address
used for SIP udp and tcp communications with ICP
(udp and tcp are disabled on MBG's public address)
--tftp - configure this MBG to supply configuration files via tftp
--generate_certificate - create a certificate using the value supplied for 'mbg_wan_ip'
--force - override 'certificate already exists' check
--modify_cfg_template - If set, specified file will be modified.
Cfg settings dealing with certs/sip will be adjusted
--ntp_server - If set, specified fqdn will be used for ntp settings.
otherwise 'pool.ntp.org' will be used.
--time_zone_name - If set, specified time zone string will be used for ntp settings.
otherwise 'SE-Stockholm' will be used.
141
APPENDIX - MITEL.CFG SETTINGS
CHAPTER 6 INSTALLATION NOTES
142
Main window 3
Primary scenario, direct connection to all MX-ONE servers in a 4-server MiVoice MX-ONE sys-
tem 10
Secondary scenario, connection by proxy, connection only to one MX-ONE Service Node 11
New Normalization Rule, five digits example 24
EX and GX Controller Gateways 42
Directory Number Profile 44
Route Category Data 47
Login page 49
Host settings - 1 49
Host settings - 2 49
Changing static IP address 50
Changing static DNS server 50
Changing to static SNTP server 50
Setting static time zone 51
Interface 51
Changing Uplink to IpStatic 51
Local firewalls 51
Changing default policy 52
Enter network traffic 52
Call agent - 1 52
Call agent - 2 52
Call agent - 3 53
Parameters screen 53
Configure Call Agent screen 54
Call Agent Rulesets screen 54
Trunk_Lines_ca 56
Trunk_Lines_ca Parameters 56
Peer Host field 57
RURI_HOST Parameter 58
MX-ONE Trunk 58
MX-ONE_TRUNK Parameters 58
Configuration Modified 59
ISDN tab 59
Primary Rate Interface 60
Interface Configuration 61
Interop 63
Interop Configuration screen 63
Services 64
Services Configuration screen 64
Config 65
General Configuration screen 65
FXS Configuration 65
FXS Configuration screen 65
Country Customisation screen 66
Gateways 66
trunks_mx-one 66
Servers 67
Default Servers 67
trunk_lines_gw 67
Outbound Proxy Host field 67
Alternate Destination for trunks_mx-one 68
Registrations 68
Endpoints Registration screen 68
Authentication 69
Authentication Screen 69
Validate Realm field 70
Endpoints Registration Status 70
Transport 70
Protocol Configuration screen 70
Interop 70
SIP URI User Parameter Value field 71
Misc 71
Gateway Configuration field 71
Codecs 72
Changing Codecs 72
Route Config 73
Routes screen 73
Transformations field 73
Configure Transformation 1 Screen 74
Configure Transformation Rule 1 screen 74
Transformations screen 74
Image Configuration screen 75
Internal files screen 76
Backup image 77
Logon screen 78
Host screen 78
Automatic Configuration Interface 78
Default Gateway Configuration 79
DNS Configuration screen 79
SNTP Configuration 79
Time Configuration screen 80
Interfaces screen 80
Network Interface Configuration 80
Local Firewall screen 80
Local Firewall Configuration screen 81
Local Firewall Rules screen 81
SBC Configuration screen 81
Call Agent Configuration screen 81
Routing Rulesets screen 82
Configure Call Agent screen 83
Call Agent Rulesets 83
Configure Call Agent screen 85
Call Agent Rulesets 85
Peer Host field 86
RURI_HOST parameter 86
Call Agent Parameters 87
Call Agent Rulesets 87
Configuration Modified screen 87
ISDN Screen 87
Primary Rate Interface screen 89
Interop screen 92
Interop Configuration screen 92
ISDN Services screen 92
Services Configuration screen 92
Config screen 93
General Configuration screen 93
POTS FXS Configuration screen 93
FXS Configuration screen 93
Country Customisation screen 93
Gateways screen 94
Gateway Configuration screen 94
Servers screen 94
Default Servers screen 94
Registrar Servers screen 94
Proxy Servers screen 94
Keep Alive Destination screen 95
Registrations screen 95
Endpoints Registration screen 95
SIP Authentication screen 96
Authentication screen 96
Validate Realm screen 96
Endpoints Registration screen 97
Transport screen 97
Protocol Configuration screen 97
Misc screen 97
Gateway Configuration screen 97
Codecs screen 98
Changing Codecs 98
Route Config screen 99
Routes screen 99
Configure Route screen 99
Configure Transformation screen 100
Configure Transformation screen 1 100
Configure Transformation Rule 1 100
Transformations screen 101
Management screen 101
Image Configuration screen 101
File screen 101
Internal files screen 102
Backup image 102