Abilis CPX Tutorial
Abilis CPX Tutorial
4
Draft Draft
Table of Contents
What's new . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx
About this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
I. Abilis CPX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1. About Abilis CPX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1. General description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2. Abilis CPX structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2. Abilis hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1. Abilis hardware structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2. Abilis Base-K . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.3. Abilis Base-J . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.3.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.4. Abilis VMX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.4.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.5. Compact Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.5.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6. Micro Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6.1. Led indications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.6.2. Number of pluggable usb devices to the same USB 1.1 OHCI/UHCI controller . . . . . . . . . . . . . . . 13
2.6.3. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.7. Nano Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.7.1. Led indications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.7.2. Number of pluggable usb devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.7.3. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.8. MFIDE module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.8.1. Watchdog Processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.8.2. Status LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.8.3. Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.9. Abilis PCI boards and extension boards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.9.1. ESB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.9.2. CTI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.9.3. QPRIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.9.4. QPRI2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.9.5. PB44X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.9.6. PB44 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.9.7. BRI-HFC4 / BRI-HFC8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.9.8. BRIO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.9.9. POTS 4/8/16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.9.10. POTS protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.9.11. VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.9.12. ETH100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.10. USB devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.10.1. ADSL modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.10.2. UMTS-BOX2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.10.3. GSM Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.10.4. UMTS-Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.10.5. Citobox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.10.6. Simbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.10.7. RJ Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
3. Physical connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.1. Numbering of the physical ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.2. ISDN Basic Rate Interface (BRI) connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
3.2.1. Emergency connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.3. Importance of the impedance matching adapters (ISDN Adapter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
3.4. Connecting pots cards to patch panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
3.5. ADSL modem connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
3.6. POTS protection connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
3.7. UMTS-BOX connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
3.8. Citobox connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
iii
Draft Abilis CPX tutorial, release 7.4 Draft
iv
Draft Abilis CPX tutorial, release 7.4 Draft
v
Draft Abilis CPX tutorial, release 7.4 Draft
vi
Draft Abilis CPX tutorial, release 7.4 Draft
vii
Draft Abilis CPX tutorial, release 7.4 Draft
viii
Draft Abilis CPX tutorial, release 7.4 Draft
ix
Draft Abilis CPX tutorial, release 7.4 Draft
x
Draft Abilis CPX tutorial, release 7.4 Draft
xi
Draft Abilis CPX tutorial, release 7.4 Draft
xii
Draft Abilis CPX tutorial, release 7.4 Draft
xiii
Draft Abilis CPX tutorial, release 7.4 Draft
xiv
Draft Abilis CPX tutorial, release 7.4 Draft
xv
Draft Abilis CPX tutorial, release 7.4 Draft
xvi
Draft Abilis CPX tutorial, release 7.4 Draft
52.9. How to access IP hosts and services which are behind a NAT manager (port forwarding) . . . . . . . . . . . . 938
52.10. How to setup DDNS service on Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939
52.10.1. How to setup DDNS service using dyndns.org . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939
52.10.2. How to setup DDNS service on Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 948
52.11. How to configure a Remote Access Server (RAS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 949
52.11.1. How to configure a RAS using IPSEC VPN server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 949
52.11.2. How to configure a RAS using IPSEC VPN server with iPHONE . . . . . . . . . . . . . . . . . . . . . . . . . 950
52.11.3. How to configure a RAS using PPPoE connections with an Ethernet/WiFi network . . . . . . . 952
52.11.4. How to configure a RAS using ISDN network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953
52.12. How to configure an ISDN PPP Dial-UP connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954
52.13. How to configure a VPN tunnel between two Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954
52.13.1. How to configure a VPN tunnel where both Abilis have a static public IP address . . . . . . . . 955
52.13.2. How to configure a VPN tunnel where one Abilis has a dynamic public IP address or
is placed behind a router doing NAT/PAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 956
52.13.3. How to configure a VPN tunnel with the “backup over ISDN” option . . . . . . . . . . . . . . . . . . . . . 957
52.13.4. How to configure a VPN tunnel with the “double path” option . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959
52.14. How to configure a voice tunnel between two Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 961
52.14.1. How to configure a voice tunnel where both Abilis have a static public IP address . . . . . . . . 962
52.14.2. How to configure a voice tunnel where one Abilis has a dynamic public IP address or
is placed behind a router doing NAT/PAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 963
52.14.3. How to configure a voice tunnel with the “backup over ISDN” option . . . . . . . . . . . . . . . . . . . . 964
52.14.4. How to configure a voice tunnel with the “double-path” option . . . . . . . . . . . . . . . . . . . . . . . . . . . 965
52.15. How to activate the DHCP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966
52.15.1. How to activate the DHCP in relay mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967
52.15.2. How to activate the DHCP in server mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 968
52.15.3. How to activate the DHCP in client mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969
52.16. How to activate the FTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 970
52.17. How to activate the HTTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 970
52.17.1. How to activate the HTTP over SSL server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971
52.18. How to activate the TRFA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 972
52.19. How to use state detection of IP interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
52.20. How to activate the SNTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
52.20.1. How to activate the SNTP client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
52.20.2. How to activate the SNTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 974
52.21. How to activate the SNMP agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 974
52.22. How to publish the users on the Abilis LDAP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975
53. HowTo - CTI system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977
53.1. How to configure ISDN ports to connect PBX or ISDN lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977
53.2. How to configure FXS (POTS) ports for analog telephones or fax machines . . . . . . . . . . . . . . . . . . . . . . . . . 979
53.3. How to program a group of telephone lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980
53.4. How to configure fax modem relay parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 981
53.5. How to create a VoIP tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982
53.6. How to register an IAX telephone onto Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
53.7. How to register a SIP telephone onto Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
53.7.1. How to register a SIP telephone onto Abilis when the telephone is behind a NAT . . . . . . . . . . 985
53.8. How to register Abilis as a client of Asterisk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987
53.9. How to register Abilis as a client of a SIP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
53.10. How to configure the speedlimit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
53.11. How to configure opc to collect call information from a remote abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
53.12. How to activate the Accounting service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
53.13. How to enable pickup service for a POTS/ISDN port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 990
53.14. How to enable pickup service for a SIP account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 990
53.15. How to configure CTIDISA to implement a responder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
53.15.1. Implementing a responder using MODE:INTRO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
53.15.2. Implementing a responder using MODE:DISA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
53.15.3. Getting a call on phones while the responder is active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992
53.16. How to configure Last Calling Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993
53.17. How to configure DATA CALL BACK using an UMTS Key, calling an ISDN number . . . . . . . . . . . . 994
53.18. How to configure CTISMS to send sms using the web interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
53.19. How to configure CTISMS to send sms via emails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
53.19.1. Instructions to send emails through sms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997
53.19.2. Instructions to send sms through emails using a client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997
xvii
Draft Abilis CPX tutorial, release 7.4 Draft
xviii
Draft Abilis CPX tutorial, release 7.4 Draft
xix
Draft Draft
What's new
New features of the release 7.1:
• Alarm resource;
• Tftp server;
• d ipre command;
xx
Draft Draft
• CTI (Computer Telephony Integration) system containing: VoIP gateway, ISDN switch, Soft-PBX, POTS adapter, GSM/
UMTS Gateway;
This book is an introduction to Abilis CPX installation, programming and usage. How to get diagnostic information and how
to solve problems, too, are described but all details are not provided (this book is not a “technical reference”).
Expected readers
This book is intended for people who want to train themselves as Abilis systems planners and integrators. The underlying
requisite is a general knowledge of telecommunication networks and protocols, especially IP and ISDN.
Book structure
This book is composed of five parts.
• Part III, “Software resources” explains ways to configure basic Abilis services.
• Part IV, “CTI System” describres how to configure CTI System and related resources.
• Part II, “Hardware configuration” provides information about the configuration of Abilis hardware.
• Part VI, “Separate software tools” documents additional programs related to Abilis CPX.
• Part V, “HowTo” contains short descriptions of how to accomplish a particular task or make use of a particular feature of
Abilis CPX.
• Part VII, “References” contains references like Log Messages or Disconnection codes.
Typographic conventions
Communication with Abilis CPX is illustrated in this way:
[18:06:39] ABILIS_CPX: d t
Current Local Time : Saturday 11/08/2007 18:06:41 (GMT+2.00)
Local Time Zone : CET - Central Europe (Rome, Paris, Berlin, Prague...
Currently Observing : Daylight Savings Time (DST)
The communication starts with a prompt, issued by the Abilis, in the above example called “ABILIS_CPX”. User commands
follow on the same line (d t is a command to display date and time information). The text after the d t command is
information output by the “ABILIS_CPX”.
If commands are present in normal text, they look like this: d d telnet. Names of configuration paremeters, diagnostic fields
or statistic counters look like this: KEEPALIVE (uppercase configuration parameters can be modified in run time, that is,
while ABILIS is running, while lowercase parameters require a reboot). Named values for configuration parameters look like
this: YES.
A Sidebar
Additional information, which is not directly related to the main text, is provided in sidebars.
1
http://www.abilis.net/
xxi
Draft About this book Draft
Note
Reasonable typographic conventions facilitate reading.
Tip
Reading the Abilis tutorial is the most reliable way to learn the Abilis features.
Actions which may produce unwished effects are marked with “Caution”:
Caution
Before entering IPACL instructions, double check not to make yourself filtered out!
Information about actions that can potentially lead to data loss or hardware damage are marked as “Warning”:
Warning
Don't pour water into Abilis CPX, its behaviour cannot be guaranteed in this case.
Contributors
This tutorial is the result of a collaborative effort of the following contributors (in alphabetical order):
• Luigi Demuro
• Tomáš Klinkovský
• Leo Mantovani
• Angelo Pignoli
• Marco Bellesia
• Nicola Trevisani
xxii
Draft Draft
Table of Contents
1. About Abilis CPX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1. General description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2. Abilis CPX structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2. Abilis hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1. Abilis hardware structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2. Abilis Base-K . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.3. Abilis Base-J . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.3.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.4. Abilis VMX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.4.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.5. Compact Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.5.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6. Micro Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6.1. Led indications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.6.2. Number of pluggable usb devices to the same USB 1.1 OHCI/UHCI controller . . . . . . . . . . . . . . . . . . . . . . 13
2.6.3. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.7. Nano Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.7.1. Led indications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.7.2. Number of pluggable usb devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.7.3. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.8. MFIDE module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.8.1. Watchdog Processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.8.2. Status LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.8.3. Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.9. Abilis PCI boards and extension boards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.9.1. ESB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.9.2. CTI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.9.3. QPRIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.9.4. QPRI2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.9.5. PB44X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.9.6. PB44 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.9.7. BRI-HFC4 / BRI-HFC8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.9.8. BRIO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.9.9. POTS 4/8/16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.9.10. POTS protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.9.11. VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.9.12. ETH100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.10. USB devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.10.1. ADSL modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.10.2. UMTS-BOX2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.10.3. GSM Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.10.4. UMTS-Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.10.5. Citobox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.10.6. Simbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.10.7. RJ Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
3. Physical connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.1. Numbering of the physical ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.2. ISDN Basic Rate Interface (BRI) connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
3.2.1. Emergency connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.3. Importance of the impedance matching adapters (ISDN Adapter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
3.4. Connecting pots cards to patch panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
3.5. ADSL modem connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
3.6. POTS protection connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
3.7. UMTS-BOX connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
3.8. Citobox connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
3.8.1. Connection examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
3.9. Simbox connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
3.10. RJS connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
2
Draft Abilis CPX Draft
3
Draft Abilis CPX Draft
4
Draft Draft
Table of Contents
1.1. General description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2. Abilis CPX structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
• Abilis is a PC based product featuring high modularity, flexibility and scalability. It can be the only telecom appliance in
the branch offices, as well at the headquarters.
• Abilis has been planned to optimize corporations' networks (telephone-data integration), reducing costs and improving
services.
• Abilis is the ideal product for multi-site entities. Thanks to Abilis systems they can use VPN (Virtual Private Network),
transfer secret data (coded connections) and make VolP calls (for free!), reducing drastically the cost of inter-company
calls.
• Abilis can support any protocol and can be installed between the customer systems (IP net and switchboard) and the
telecommunication lines (PSTN, ISDN, GSM, ADSL, xDSL, X25, Internet FrameRelay, radio link, …) in a completely
transparent way, without the need to change existing equipment.
5
Draft About Abilis CPX Draft
Hardware is composed by devices which provide an interface to different kinds of network (Internet, ISDN, GSM,...).
The storage device is used to keep the operating system, the configuration and log files; generally it is a Compact Flash, or
optionally a Hard Disk.
The software is made up of different modules (or resources) providing a full scale of services.
• using the Control Port that allows configuration and supervising functions;
• using the Web Interface which allows to do many but not all operations;
• using the config.exe utility program which is a console mode Windows application which precisely reproduces the same
Control Port interface and command language available on a working Abilis CPX.
Note
Simplest operations, like software installation or recovery, can also be done using the front panel of MFIDE
module.
It is also possible to configure Abilis CPX without connecting to the Control Port, using the config.exe utility program.
6
Draft Draft
Table of Contents
2.1. Abilis hardware structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2. Abilis Base-K . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.3. Abilis Base-J . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.3.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.4. Abilis VMX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.4.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.5. Compact Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.5.1. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6. Micro Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6.1. Led indications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.6.2. Number of pluggable usb devices to the same USB 1.1 OHCI/UHCI controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.6.3. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.7. Nano Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.7.1. Led indications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.7.2. Number of pluggable usb devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.7.3. Physical and electrical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.8. MFIDE module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.8.1. Watchdog Processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.8.2. Status LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.8.3. Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.9. Abilis PCI boards and extension boards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.9.1. ESB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.9.2. CTI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.9.3. QPRIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.9.4. QPRI2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.9.5. PB44X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.9.6. PB44 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.9.7. BRI-HFC4 / BRI-HFC8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.9.8. BRIO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.9.9. POTS 4/8/16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.9.10. POTS protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.9.11. VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.9.12. ETH100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.10. USB devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.10.1. ADSL modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.10.2. UMTS-BOX2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.10.3. GSM Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.10.4. UMTS-Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.10.5. Citobox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.10.6. Simbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.10.7. RJ Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
• Base unit: PC platform with 4 PCI-slots for interface adapters, 2 RS-232 ports, 4 USB ports, 1 ethernet;
7
Draft Abilis hardware Draft
• MFIDE module with Watchdog microprocessor, 5 control buttons and 2x20 characters LCD;
• Mass Memory:
Abilis Base-K is an expandable device. Below there are the hardware characteristics of the base unit:
• 1024 MB RAM
• PC platform with 4 PCI-slots, 4 USB ports (optionally expandable up to 8) for expansion modules and 1 ethernet
• 2 RS-232 ports
• up to 8 ISDN-2 ports (up to 16 simultaneous calls to the ISDN public network). Refer to the following chapters:
Section 2.9.3, “QPRIX”, Section 2.9.5, “PB44X”, Section 2.9.7, “BRI-HFC4 / BRI-HFC8”,Section 2.9.8, “BRIO”
• up to 48 analogue extensions (for “internal” telephones or fax). Refer to the following chapter:Section 2.9.9, “POTS
4/8/16”
• up to 128 VoIP telephones (SIP or IAX2 protocol). Refer to the following chapter:Section 2.9.11, “VoIP”
8
Draft Abilis hardware Draft
• up to 8 xDSL concurrent connections to the Internet. Refer to the following chapter:Section 2.10.1, “ADSL modem”
• up to 8 GSM/UMTS gateways (up to 16 simultaneous calls between the fixed and the mobile network). Refer to the
following chapter:Section 2.10.2, “UMTS-BOX2”
Abilis Base-K includes all licences but VMX and Data Comp ones, because it's a class 6 device. Refer to Section 6.1.1,
“ABILIS ID and the class of product” to know more about licencing.
Weight:7,5 Kg;
Abilis Base-J is an expandable device. Below there are the hardware characteristics of the base unit:
• 512 MB RAM
• PC platform with 4 PCI-slots and 4 USB (optionally expandable up to 8) ports for expansion modules and 1 ethernet
• 2 RS-232 ports
• up to 8 ISDN-2 ports (up to 16 simultaneous calls to the ISDN public network). Refer to the following chapters:
Section 2.9.3, “QPRIX”, Section 2.9.5, “PB44X”, Section 2.9.7, “BRI-HFC4 / BRI-HFC8”,Section 2.9.8, “BRIO”
• up to 48 analogue extensions (for “internal” telephones or fax). Refer to the following chapter:Section 2.9.9, “POTS
4/8/16”
• up to 128 VoIP telephones (SIP or IAX2 protocol). Refer to the following chapter:Section 2.9.11, “VoIP”
• up to 8 xDSL concurrent connections to the Internet. Refer to the following chapter:Section 2.10.1, “ADSL modem”
• up to 8 GSM/UMTS gateways (up to 16 simultaneous calls between the fixed and the mobile network). Refer to the
following chapter:Section 2.10.2, “UMTS-BOX2”
Abilis Base-j doesn't includes all licences, because it's a class 3 device. Refer to Section 6.1.1, “ABILIS ID and the class of
product” to know more about licencing.
9
Draft Abilis hardware Draft
Weight:7,5 Kg;
Abilis VMX supports multi-core CPUs: one core is dedicated to Abilis and the remaining to virtual machines managed
by a modified version of XEN1.There's no perfomance degradation because both router and Hypervisor can access to not
simulated hardware resources.
Abilis VMX is an expandable device. Below there are the hardware characteristics of the base unit:
• 2048 MB RAM
• 2 RS-232 ports
• up to 8 ISDN-2 ports (up to 16 simultaneous calls to the ISDN public network). Refer to the following chapters:
Section 2.9.3, “QPRIX”, Section 2.9.5, “PB44X”, Section 2.9.7, “BRI-HFC4 / BRI-HFC8”,Section 2.9.8, “BRIO”
• up to 48 analogue extensions (for “internal” telephones or fax). Refer to the following chapter:Section 2.9.9, “POTS
4/8/16”
• up to 128 VoIP telephones (SIP or IAX2 protocol). Refer to the following chapter:Section 2.9.11, “VoIP”
• up to 8 xDSL concurrent connections to the Internet. Refer to the following chapter:Section 2.10.1, “ADSL modem”
• up to 8 GSM/UMTS gateways (up to 16 simultaneous calls between the fixed and the mobile network). Refer to the
following chapter:Section 2.10.2, “UMTS-BOX2”
1
http://en.wikipedia.org/wiki/Xen
10
Draft Abilis hardware Draft
Weight:7,5 Kg;
• 1 Gigabit ethernet
• 3 Ethernet 10/100
• 4 ISDN BRI
• 8 POTS
• 8 USB ports
• MFPCI watchdog
The device equipped with 4 BRI + 8 POTS has to be configured as BS48 device. Add it using the command A DEV:BS48-1.
This two core device dedicates one core to Abilis CPX and the other to the Hypervisor. The Hypervisor can run only Linux
OS virtual machines.
Weight:3,5 Kg;
11
Draft Abilis hardware Draft
All Microabilis have three ethernet ports, two USB ports, 4 BRI, one COM port and a power out connector useful to supply
UMTS BOX2.
• 4 BRI + 4 POTS
• 4 BRI only
Warning
the version with only 4BRI still mounts 4 POTS ports. These ports ARE NOT connected so they are NOT
working!
Between the BRI ports and the POTS ports there are four integrated impedance matching adapters, so there's no more need to
use ISDN adapters. Each BRI port has two correspondig switches: one for output twisted pair and one for input twisted pair.
The default position is “ON” with the ISDN impedance activated (see figure below).
Note
All BRI ports are TE and not NT, so:
12
Draft Abilis hardware Draft
2.6.2. Number of pluggable usb devices to the same USB 1.1 OHCI/
UHCI controller
This table shows the number of starmodems and UMTS/GSM boxes which can be connected to a Micro Abilis, depending on
adsl lines download bandwitdth.
The limit is caused by the isochronous mode. The condition to satisfy is (n. of lines) x (line download bandwidth) + (n. of
UMTS BOXes)< 9.6Mb.
Table 2.1. Table of the number of usb devices related to adsl lines download bandwidth
Tip
Type the following command to know which devices are connected to a certain USB controller:
13
Draft Abilis hardware Draft
In the previous example, the usb DISK 2.0 is connected to the UCHI controller because the first number of
the UsbPortId is 0 (the same of UHCI controller).
Weight:1.5 Kg;
Power supply:
All Nano abilis have three ethernet ports, two USB ports, one COM port and a power out connector useful to supply UMTS
BOX2.
The version with one BRI is equipped with an integrated impedance matching adapter (on the right side of the BRI port) so
there's no more need to use ISDN adapters. The BRI port has two correspondig switches: one for output twisted pair and one
for input twisted pair. The default position is “ON” with the ISDN impedance activated (see figure below).
14
Draft Abilis hardware Draft
Note
The BRI port is TE and not NT, so:
Note
Nano abilis has no DSPs so transcoding is not allowed (there's no Packet Voice bandwidth optimization)
Weight: 1.20Kg;
Power supply:
15
Draft Abilis hardware Draft
• Watchdog Processor;
• Status LED;
• 5 buttons: allow to administrate/diagnose the system (Compact-Flash formatting, up/downloading software, saving/
restoring configuration…);
• LCD display shows information about Abilis menu and the system status;
• Compact-Flash with 32/64/128/256 MB: contains the abilis object machine, the configuration and backup files, the
system's logs.
• When the cycle is regular, the LIVE signal is reset every second and the Watchdog sends every second a flashing signal on
the green LED (on the right end).
• If the cycle is not regular, the Watchdog issues a cold-reset of the motherboard, hence restarting the Abilis. The event text
I: WDL1 or I: WDL2 is added in the system log.
During the startup process (“boot”), the Watchdog stands by for one minute to permit loading the operating system and
initializing all the software modules.
The MFIDE uses 4 state LEDs (RED, RED, GREEN,GREEN), controlled by the Watchdog.
16
Draft Abilis hardware Draft
2.8.3. Buttons
Figure 2.12. MFIDE buttons
MFIDE includes 5 push buttons: “OK”, “Up”, “Down”, “Right”, “Left”. Their use is explained in the following table.
Button Action
OK Pressing the “OK” button it is possible to access information
about the menu currently showed on the LCD display. For
menus that require a confirmation, an affirmative answer will
be given to the request showed on the LCD display.
Up Every time the “Up” button is pressed, the display will show
the previous menu. By pressing it a lot of times, all the
menus will be shown in a cyclic way.
Down Every time the “Down” button is pressed, the display will
show the next menu. By pressing it a lot of times, all the
menus will be shown in a cyclic way.
Right Every time the “Right” button is pressed, the display will
show the sub-menu.
Left Every time the “Left” button is pressed, the display will go
back to the menu.
17
Draft Abilis hardware Draft
2.9.1. ESB2
ESB2 card supplies Abilis with 4 synchronous ports you can configure up to 2,5 Mbps. They are generally used for CDN or
HDSL connections.
• RS232/V24
18
Draft Abilis hardware Draft
• V35
• V11
• X21
• E1/G.703
The modules are plug-to-plug compatible and can be hold in any arrangement. The external devices are connected to
an “octopus” cable connected to the ESB2 card. This cable has 4 DB15 female connectors numbered from 0 to 3 which
19
Draft Abilis hardware Draft
correspond to the 1 to 4 modules and a HDB-62 female connector to connect the card. These connectors will be connected to
the corresponding adaptation cables V24/V35/X21/E1.
Each DB15 connector has 15 pins. The HDB-62 connector has 62 pins.
Note
Pins 21 and 42 are not connected and can be used for the insertion key.
The port pins will have different meaning in fuction of the interface modules installed as shows in the following table:
20
Draft Abilis hardware Draft
HW Module SW Resource
mod. 0 SYNC-1
mod. 1 SYNC-2
mod. 2 SYNC-3
mod. 3 SYNC-4
Tip
Interesting chapters:Section 52.5, “How to configure HDSL/SHDSL connections using V.35/G.703
synchronous ports”
21
Draft Abilis hardware Draft
22
Draft Abilis hardware Draft
Weight: 0.15Kg;
Power supply:
23
Draft Abilis hardware Draft
2.9.2. CTI
The CTI boards are machines to deal with ISDN and VoIP phone communications. They provide TDM and VoIP switching,
voice codification and packetization, echo cancellation.
2.9.2.1. CTI-HA
CTI-HA cards are obsolete.
CTI-HA cards host 4 slots for DSP modules, each of them can hold 0, 1, 2 or 4 DSP (Digital Signal Processor, chip for voice
compression/packetization). On the right side of the card there is a slot for a daughterboard (QPRI, BRI-4 or BRI8 modules ,
respectively for ISDN Primary Rate Interface (PRI) or Basic Rate Interface (BRI) support).
On the upper side of the CTI card there is a H.100 interface, which enables the connection of several CTI cards between each
other (besides through PCI bus) . The H.100 bus creates a system with a capacity of up to 2048 simultaneous calls.
Tip
Interesting chapters:Section 3.2, “ISDN Basic Rate Interface (BRI) connection”
For the ISDN-PRI (S2M) ports there is no standard physical interface. The Abilis cards use RJ45 sockets with the same
signal arrangement as the one used to access to BRI NT:
24
Draft Abilis hardware Draft
Pin Signal
1 N.C.
2 N.C.
3 Rx + (inbound)
4 Tx + (outbound)
5 Tx - (outbound)
6 Rx - (inbound)
7 N.C.
8 N.C.
Warning
Although only one PCI slot is used for the electrical connection on the external part of the cabinet, the eight
BRI ports take as much place as two slots (mechanical connection).
The BRI8 and BRI4 modules mount four RJ45 sockets with the following pinout:
25
Draft Abilis hardware Draft
You can configure every port at logical level like NT (Network Termination) or TE (Terminal Equipment).
Tip
Interesting chapters:
Section 53.1, “How to configure ISDN ports to connect PBX or ISDN lines”;
2.9.3. QPRIX
The QPRIX is a stand-alone card, it has 4 primary interfaces (ISDN-PRI) and supports up to 16 DSP for 64 compressed calls.
Besides echo canceller (EC) is available up to 32 ms but it can raise up to 128 ms in the version with the additional Octasic
chip (EEC).
The maximal number of HDLC B-channels is greater then the QPRI2 and it has been extended from 32 to 60.
Through H.100 bus it can also be connected to other cards of the CTI category.
26
Draft Abilis hardware Draft
For the ISDN-PRI (S2M) interfaces no standard physical port is specified. The Abilis QPRIX use RJ45 sockets with the same
signal arrangement as the one used to access to BRI NT.
Pin Signal
1 N.C.
2 N.C.
3 Rx + (inbound)
4 Tx + (outbound)
5 Tx - (outbound)
6 Rx - (inbound)
7 N.C.
8 N.C.
Each interface presents a 120 ohm balanced impedance. Each port can be configured as NT (Network Termination) or TE
(Terminal Equipment).
Weight: 0.20Kg;
27
Draft Abilis hardware Draft
2.9.4. QPRI2
The QPRI2 is a stand-alone card, it has 4 primary interfaces (ISDN-PRI) and supports up to 6 DSP for 24 compressed calls.
Through H.100 bus it can also be connected to other cards of the CTI category.
For the ISDN-PRI (S2M) interfaces no standard physical port is specified. The Abilis QPRI2 use RJ45 sockets with the same
signal arrangement as the one used to access to BRI NT.
28
Draft Abilis hardware Draft
Pin Signal
1 N.C.
2 N.C.
3 Rx + (inbound)
4 Tx + (outbound)
5 Tx - (outbound)
6 Rx - (inbound)
7 N.C.
8 N.C.
Each interface presents a 120 ohm balanced impedance. Each port can be configured as NT (Network Termination) or TE
(Terminal Equipment).
Weight: 0.20Kg;
Power supply:
2.9.5. PB44X
The PB44X card has 4 primary interfaces (ISDN-PRI) and, by means of a daugtherboard (BRI4ADD, see photo), 4 ISDN
Basic Rate (ISDN-BRI) interfaces. All interfaces are freely configurable as NT / TE.
It supports up to 16 DSP for 64 compressed calls and can be connected to other CTI cards through the H.100 bus.
Tip
For information about the connection between Abilis and ISDN Basic Rate Interface (BRI) lines refer to
Section 3.2, “ISDN Basic Rate Interface (BRI) connection”.
29
Draft Abilis hardware Draft
The PB44X cards use RJ45 plugs with the following pinout, either on the main board (4 PRI ports) or on the extension (4
BRI ports).
Pin Signal
1 N.C.
2 N.C.
3 Rx + (inbound)
4 Tx + (outbound)
5 Tx - (outbound)
6 Rx - (inbound)
7 N.C.
8 N.C.
Each PRI interface presents a 120 ohm balanced impedance. Each port can be configured as NT (Network Termination) or
TE (Terminal Equipment). The BRI ports have to use an impedance matching adapter.
Warning
Although only one PCI slot is used for the electrical connection on the external part of the cabinet, the
additional 4 BRI ports occupy an additional slot (for mechanical connection only).
Weight: 0.20Kg;
Power supply:
30
Draft Abilis hardware Draft
2.9.6. PB44
The PB44 card has 4 primary interfaces (ISDN-PRI) and, by means of a daugtherboard (BRI4ADD, see photo), 4 ISDN
Basic Rate (ISDN-BRI) interfaces. All interfaces are freely configurable as NT / TE.
It supports up to 6 DSP for 24 compressed calls and can be connected to other CTI cards through the H.100 bus.
Tip
For information about the connection between Abilis and ISDN Basic Rate Interface (BRI) lines refer to
Section 3.2, “ISDN Basic Rate Interface (BRI) connection”.
The PB44 cards use RJ45 plugs with the following pinout, either on the main board (4 PRI ports) or on the extension (4 BRI
ports).
31
Draft Abilis hardware Draft
Pin Signal
1 N.C.
2 N.C.
3 Rx + (inbound)
4 Tx + (outbound)
5 Tx - (outbound)
6 Rx - (inbound)
7 N.C.
8 N.C.
Each PRI interface presents a 120 ohm balanced impedance. Each port can be configured as NT (Network Termination) or
TE (Terminal Equipment). The BRI ports have to use an impedance matching adapter.
Warning
Although only one PCI slot is used for the electrical connection on the external part of the cabinet, the
additional 4 BRI ports occupy an additional slot (for mechanical connection only).
Weight: 0.20Kg;
Power supply:
The DSPs now supports g.729 codec; besides all BRI-HFC cards are equipped with H100 bus.
Tip
For information about the connection between Abilis and ISDN Basic Rate Interface (BRI) refer to
Section 3.2, “ISDN Basic Rate Interface (BRI) connection”.
32
Draft Abilis hardware Draft
The BRI-HFC cards use RJ45 plugs with the following pinout :
Pin Signal
1 N.C.
2 N.C.
3 Rx + (inbound)
4 Tx + (outbound)
5 Tx - (outbound)
6 Rx # (inbound)
7 N.C.
8 N.C.
Each is freely configurable (at the logical level) like NT (Network Termination) or TE (Terminal Equipment). The BRI ports
require an impedance matching adapter.
Tip
Interesting chapters: Section 51.9, “How to know which kind of hardware is mounted on Abilis”.
Power supply:
33
Draft Abilis hardware Draft
Unlike BRI-HFC4/BRI-HFC8, the DSPs doesn't support g.729 codec; besides all old model of BRI-HFC cards are available
in two versions:
Tip
For information about the connection between Abilis and ISDN Basic Rate Interface (BRI) refer to
Section 3.2, “ISDN Basic Rate Interface (BRI) connection”.
The BRI-HFC cards use RJ45 plugs with the following pinout :
34
Draft Abilis hardware Draft
Pin Signal
1 N.C.
2 N.C.
3 Rx + (inbound)
4 Tx + (outbound)
5 Tx - (outbound)
6 Rx # (inbound)
7 N.C.
8 N.C.
Each is freely configurable (at the logical level) like NT (Network Termination) or TE (Terminal Equipment). The BRI ports
require an impedance matching adapter.
Tip
Interesting chapters: Section 51.9, “How to know which kind of hardware is mounted on Abilis”.
2.9.8. BRIO
The card ISDN BRIO supports only one BRI TE port. It is mainly used for VPN data backup on ISDN lines.
Tip
For information about the connection between Abilis and ISDN lines refer to Section 3.2, “ISDN Basic Rate
Interface (BRI) connection”.
This card uses only one RJ45 plug with a pinout inverted (TE) respect to BRI4/BRI8 modules :
35
Draft Abilis hardware Draft
Pin Signal
1 N.C.
2 N.C.
3 Tx + (outbound)
4 Rx + (inbound)
5 Rx - (inbound)
6 Tx - (outbound)
7 N.C.
8 N.C.
Can be connected to a NT1 network termination unit through a straight “cat 5” cable. The BRI ports require an impedance
matching adapter.
Tip
Interesting chapters: Section 3.2, “ISDN Basic Rate Interface (BRI) connection”; Chapter 42, CTI System.
Weight: 0.05Kg;
Power supply:
36
Draft Abilis hardware Draft
POTS cards have four RJ45 sockets. Each socket is to be used with an octopus cable (one RJ45 plug <-> four RJ11 plugs).
Each RJ11 is for one telephone.
37
Draft Abilis hardware Draft
Note
A variable delay to the start of ring signals is used to prevent a current overload in case of multicast groups
with large number of Pots ports. The delay is in range of 20 to 140 msec.
Tip
Interesting chapters:
Section 53.2, “How to configure FXS (POTS) ports for analog telephones or fax machines”.
Weight: 0.27Kg;
Power supply:
38
Draft Abilis hardware Draft
Tip
Interesting chapters:
Section 53.2, “How to configure FXS (POTS) ports for analog telephones or fax machines”.
2.9.11. VoIP
The VoIP cards belong to the CTI family, too. They are used to connect two analogue terminals to the Abilis. They have two
RJ11 sockets with FXS electrical interface and they support two VoIP calls.
Pin Signal
1 N.C.
2 Analog signal (ring)
3 Analog signal (tip)
4 N.C.
Tip
VoIP card is an analog device, so on signals pinout is not requested a specific polarity.
Tip
Interesting chapters:
39
Draft Abilis hardware Draft
Section 53.2, “How to configure FXS (POTS) ports for analog telephones or fax machines”.
Weight: 0.1Kg;
Power supply:
2.9.12. ETH100
The ETH100 card provides a Fast Ethernet interface with Auto-Mode (10–100 Mbps) and Auto-TP (signals polarity)
features. Several ETH100 cards can be installed into the same CPX.
Tip
Interesting chapters: Section 19.3, “IP Resources”; Section 52.2, “How to activate a new ethernet port”.
40
Draft Abilis hardware Draft
Weight: 0.04Kg;
Power supply:
• Aethra Starmodem which uses the USB isochronous mode for the downstream. (Supported from 7.0.3 and from 6.5.11);
• Thomson Speedtouch.
41
Draft Abilis hardware Draft
Warning
The number of ADSL StarModem which can be connected to the same USB 1.1 OHCI/UHCI controller is
limited. Refer to Section 2.10.1.3, “Isochronous mode” to havo more information about isochronous mode.
Tip
Interesting chapters:
42
Draft Abilis hardware Draft
• USB 1.1 interfaces are handled with one OHCI/UHCI controller every 2 ports. Usually the ports that are close each other
belongs to the same UHCI/OHCI controller;
• USB 2.0 interfaces are handled with one EHCI controller for all the ports. In some rare cases, or when a PCI add on card is
used, more EHCI controllers can be present;
• isochronous mode reserves bandwidth on each USB controller. This means that the bandwidth is permanently robbed to
other devices connected to the same controller;
• the maximal theoretical USB bandwidth on USB 1.1. FULL SPEED is 12 Mbit/sec;
• the maximal theoretical USB bandwidth on USB 2.0. HIGH SPEED is 480 Mbit/sec;
• some bandwidth must be left free for interrupt and bulk transaction;
• in Abilis CPX the maximal isochronous bandwidth limit for USB 1.1 is 9.6 Mbit/sec;
• in Abilis CPX the maximal isochronous bandwidth limit for USB 2.0 is 384 Mbit/sec;
• in Abilis CPX the isochronous bandwidth is dynamically reserved depending on the actual downstream (RX) speed, in 8
discrete step which are roughly 1,2,3,4,5,6,7,8 Mbit/sec.
As a result there is a limitation to the number of ADSL StarModem which you can connect to the same USB 1.1 OHCI/UHCI
controller, as well as combination of StarModem with GSM-BOX and UMTS-BOX/BOX2, for example:
• one StarModem at maximal speed and one UMTS-BOX/BOX2 are supported within a OHCI/UHCI controller;
• two StarModem connected to 4 mbit/sec lines and one UMTS-BOX/BOX2 are also supported.
2.10.2. UMTS-BOX2
Figure 2.37. UMTS-BOX2
UMTS-BOX2 is a device which provides two independent interfaces to the GSM/UMTS mobile network. It can be connected
to ABILIS router through an USB cable and supports full Voice, Data and SMS service.
Generally UMTS-BOX2 works with a SIM inserted in it, but using the sim remotization the device can use a sim located
anywhere in the world.
• centralization of the SIM when a number of UMTS-BOX2 are dispersed in branch offices;
• the management of sims is very malleable because the association between SIM and UMTS-BOX2 can be changed using
software commands;
• the association between SIM and UMTS-BOX2 can be changed by external applications that follow arbitrary customer
rules.
2. once UMTS-BOX2 gets connected, the communication with Abilis starts after 5 seconds;
3. If Abilis doesn't drive UMTS-BOX2, UMTS-BOX2 waits 40 seconds and then resets itself. After the reset, the procedure
starts from point #1.
4. If Abilis drives UMTS-BOX2 and the sim-container is inside the module and a sim isn't in the container, the module resets
itself. If the sim is remote this doesn't happen;
5. a module resets itself every time a remote sim is connected. If the UMTS-BOX2 is connected to a UHCI controller,
the reset can cause the disconnection of the other module. Sim-remotization must not be used when UMTS-BOX2 is
connected to an UCHI controller.
43
Draft Abilis hardware Draft
Tip
Interesting chapters:
Weight: 1.20Kg;
Power is provided both via USB to HUB, CODEC and PIC and with the additional power cable to SimCom modules.
SimCom modules absorpt some current from the USB anyway, because of an internal -USB-powered- USB-to-serial
converter interface chip.
44
Draft Abilis hardware Draft
Thanks to the Abilis GSM Box mobile phones can be considered as “mobile extensions” of the company's telephone system.
Additionally, the Abilis “Least Cost Router” permits to select the cheapest route for any call.
The GSM Box is connected to the Abilis by means of an USB interface (see Section 3.7, “UMTS-BOX connection”), thus
requiring no additional telecom port in the ABILIS router and preservinging digital voice quality.
• high-fidelity voice;
• call-back;
• SMS to e-mail;
• One channel device (doesn't require an external power supply.Power is supplied by usb cable);
45
Draft Abilis hardware Draft
Tip
Interesting chapters: Chapter 11, GSM-UMTS BOX.
Weight:
Power supply:
46
Draft Abilis hardware Draft
2.10.4. UMTS-Key
This device allows to exchange data and sms using an UMTS key. It can be used as backup line when the main one fails, or
to establish a connection toward Internet when calling an ISDN number (data call back).
Tip
Interesting chapters:
Section 53.17, “How to configure DATA CALL BACK using an UMTS Key, calling an ISDN number”.
2.10.5. Citobox
Figure 2.40. Citobox - Front view
47
Draft Abilis hardware Draft
Citobox allows to connect Abilis to a doorphone system integrating it with your computer telephony system.
It provides 8 digital inputs and 4 digital outputs which can be used to drive other hardware (to open a gate, to switch on
lights, etc.).
• connect one outdoor system and one indoor system, or two outdoor systems;
• get a call when person at the door presses the ring button;
Note
The communication is cut off when the called party hangs up or when the interface timer expires. This
timer is not programmable and its default value is 10 minutes.
• order the door opening by pressing a key that produces DTMF on your phone;
• use the inputs for up to 8 additional ring buttons. Each input will cause to dial a different number;
• view the state of inputs/output through the GPIO module, which allows interfacing with an external application through
HTTP/XML.
• 2 interfaces (each interface can be used to connect a doorphone system (indoor + outdoor, outdoor + outdoor, indoor +
indoor);
• 8 digital inputs;
• 2 analog inputs (each analog input can be configured by installing an analog adaptation module inside the CITOBOX.
When no module is present, the analog inputs are not usable).
Tip
Interesting chapters:
The trimmers allow to regulate the volume of the microphone and the speaker (clockwise: rise the volume, counterclockwise:
lower the volume).
The following picture shows the trimmers and the connector pinout.
48
Draft Abilis hardware Draft
Each doorphone interface contains two relays, RA and RB, whose "normally close" pins are closed and "normally open" pins
are open when there is no active communication on the interface (default state).
49
Draft Abilis hardware Draft
50
Draft Abilis hardware Draft
The digital inputs are general purpose, so they can be used to connect any kind of hardware (additional ring buttons, digital
sensors, etc.). Refer to Section 13.3, “CTI port configuration” to have more information about their configuration.
Pin Description
IN_X (a) Negative
IN_X (b) Positive
The digital outputs can drive any kind of device, accordingly with the electrical specifications.
The digital outputs are relay-based and have 3 volt free contacts (i.e. dry contacts, i.e. clean contacts): common, normally
open and normally closed.
The OUT_NO is the normally open pin. When the DIG_OUT is set to 0, OUT_COM and OUT_NO are disconnected, while
when DIG_OUT is set to 1 they are short-circuited.
The OUT_NC is the normally closed pin. When the DIG_OUT is set to 0, OUT_COM and OUT_NC are short-circuited,
while when DIG_OUT is set to 1 they are disconnected.
Warning
Output relays support:
• a maximum switching current of 1 A (the moment when the relay is turned into CLOSED);
Pin Description
OUT_COM Common pin
OUT_NO Normally opened digital out
OUT_NC Normally closed digital out
51
Draft Abilis hardware Draft
The CITO part offers two completely separated interfaces for doorphones. The IO part offers 8 digital inputs, 4 digital
outputs (clean contacts) and two analog inputs (available only if an analog adaptation module is present).
Each interface of the CITO part is mainly composed of 4 analog pins: SPKR, MIC, GND, CALL, which must be connected
respectively to the speaker, microphone, ground and call button signals of the doorphone.
When a continuous or alternate voltage (voltange range 2.5V - 12V, frequency range: 0Hz - 100Hz) is applied to the CALL
pin, the CITOBOX informs the Abilis, which activates the voice communication on the corresponding interface. The status
of the relays RA and RB follows the one of the communication. RA_NC and RB_NC are closed when the communication is
inactive and open when the communication is inactive, being the status of no communication the "normal" status. RA_NO
and RB_NO follow the opposite behaviour.
The volume of the microphone and the speaker can be manually regulated with the corresponding trimmers, all of which are
externally accessible on the front. The speaker and the microphone are decoupled by a transformer.
Each digital output of the IO part is a volt free contact (clean contact) and can be driven separately by the Abilis. Each output
is available both as normally closed and normally open. It supports a maximum switching current of 1 A (transition current
during the relay closure), a maximum carrying current of 2 A (after the relay closure, when the relay is stable), 220V DC
max. voltage and 250V AC max. voltage.
Each input of the IO part is separated. It can be configured as clean contact input (default) or optoisolated input (use voltages
in the range 5V - 12V). Each input can be manually configured through its corresponding couple of jumpers.
52
Draft Abilis hardware Draft
53
Draft Abilis hardware Draft
54
Draft Abilis hardware Draft
Weight: 1.20Kg;
Power supply:
2.10.6. Simbox
The potential of this device significantly increases if used with UMTS-BOX2 because of sim remotization.
55
Draft Abilis hardware Draft
Sim remotization allows to use remote sim cards inserted in a Simbox with an UMTS BOX2 via IP network.
Note
Simbox is not equipped with any GSM/UMTS modem, so it cannot replace an UMTSBOX. Simbox works
togheter with one or more UMTSBOXes.
Tip
Interesting chapters:
Communication between FPGA and PIC is implemented on the PIC's Streaming Parallel Port (SPP) peripheral. This port
provides a fast 8-bit bus, where it is possible to connect more slave peripherals.
56
Draft Abilis hardware Draft
57
Draft Abilis hardware Draft
Tip
Interesting chapters:
Weight:
2.10.7. RJ Switch
This device checks the keepalive, so if the master (Mx) doesn't reply to the keepalive signal, the link is assumed to be down
and the line is switched to the backup device (Bx) until the link is up again.
58
Draft Abilis hardware Draft
Note
Only the central pins 4,5 and 3,6 are switched! Pins 1,2 and 7,8 are not connected. Refer to chapter
Section 3.10.1, “Connection examples” to have more information about connection.
Warning
Connecting a power supply providing more than 5V-DC damages the device!
Tip
Interesting chapters:
This board contains a watchdog which must be driven by the main Abilis via USB; when the main Abilis stops sending LIVE
signals to the board, the PIC understands that the main Abilis is failing and switches the line to the backup Abilis. The board's
switch core/watchdog is based on a Microchip PIC18F2450.
59
Draft Abilis hardware Draft
Tip
Interesting chapters:
Weight:
60
Draft Abilis hardware Draft
61
Draft Draft
Table of Contents
3.1. Numbering of the physical ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.2. ISDN Basic Rate Interface (BRI) connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
3.2.1. Emergency connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.3. Importance of the impedance matching adapters (ISDN Adapter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
3.4. Connecting pots cards to patch panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
3.5. ADSL modem connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
3.6. POTS protection connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
3.7. UMTS-BOX connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
3.8. Citobox connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
3.8.1. Connection examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
3.9. Simbox connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
3.10. RJS connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
3.10.1. Connection examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
3.10.2. Connection cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
• Ports numeration.
The connections usually are made on the Abilis rear panel. The chart below shows the different ports and their connection
possibilities:
62
Draft Physical connections Draft
• To connect the ports to “Terminal Equipment” systems (telephone switchboards, TA, ISDN modem, FAX, …) you must
use a straight cable cat. 5. Set up the ports at a logical level as NT (Network Termination) in the Abilis configuration.
• To connect the ports with the Telecom lines, you must use a “cross-cable (crossed) cat.5” (usually provided with red
shells). Set up the ports at a logical level as TE (Terminal Equipment) in the Abilis configuration.
Warning
The ports which are configured at a logical level as NT must always be connected to a 100 ohm impedance
matching adapter.
63
Draft Physical connections Draft
Tip
Interesting chapters:
Section 53.1, “How to configure ISDN ports to connect PBX or ISDN lines”.
• Disconnect the cable between the PBX switchboard and the impedance matching adapter
• Disconnect the cable between the Telecom line and the Abilis port, keeping the impedance matching adapter.
• Connect the straight cable from the switchboard to the Telecom one using the impedance matching adapter.
64
Draft Physical connections Draft
Tip
To restore the telephone connections we suggest to write down precise instructions about the emergency
procedure and keep them at hand in the switchboard room, available to technicians.
3.2.1.1. Switch
To make the by-pass easier Antek provides Section 2.10.7, “RJ Switch” on request.
Tip
Interesting chapters:
The telecom NT1 Network-termination units and most of the PBX (switchboards) usually have already a line termination
resistor. Abilis BRI port doesn't have any.
65
Draft Physical connections Draft
• Point-to-Point (only one device can be connected): an impedance matching adapter is ALWAYS necessary.
• Point-to-Multipoint :
• If Abilis is the only device to be connected to the network-termination unit of the S0 bus or if Abilis is the farthest
device from the NT unit, the impedance matching adapter MUST be inserted.
• If Abilis is not the farthest device, the impedance matching adapter MUST NOT be inserted.
Warning
The impedance matching adapter MUST be connected near the ISDN port of the Abilis (you can use the 10
cm cables provided with the Abilis).
Warning
Improper connection of line terminations may cause disturbances like noisy conversations, data loss, line
drops, and in general a poor and unstable service.
Tip
Interesting chapters: Section 53.1, “How to configure ISDN ports to connect PBX or ISDN lines”.
Use an octopus cable to connect a port of a pots card to the first type of patch panel.
The second type is more popular than the third so in most cases you can't plug a RJ11 plug into a RJ45 socket of your patch
panel. Connecting a RJ11 plug into a RJ45 socket of a non compatible patch panel can cause a defective contact.
Besides, a RJ45 socket can be used to connect up to 4 pots phones. In this case an adapter cable must be used to connect a
pots card to patch panel, following the scheme below.
Warning
Using the “straight” scheme of connection, crosstalk issues occurr in the part of cable from patch panel to
phones.
66
Draft Physical connections Draft
Using a “straight” cable crosstalk issues occur because pair #3 couples conductors #3,6 and pair #1 couples conductors #4,5.
Crosstalk issues are located in the part of cable from patch panel to phones.
67
Draft Physical connections Draft
• Power on Abilis;
68
Draft Physical connections Draft
Tip
Interesting chapters:
69
Draft Physical connections Draft
Warning
The metal case must be connected to the Abilis metal case or to the earth of the electrical system.
Tip
Interesting chapters:
Section 53.2, “How to configure FXS (POTS) ports for analog telephones or fax machines”.
1. Insert the bracket with power connectors in the Abilis base unit.
70
Draft Physical connections Draft
2. Connect the internal power connector of the bracket to the power supply connector.
3. Connect the USB cable to the USB port and the power supply cable to the bracket.
71
Draft Physical connections Draft
5. Connect the USB cable to the USB port and the power supply cable to the connector.
Tip
Interesting chapter: Chapter 11, GSM-UMTS BOX.
72
Draft Physical connections Draft
Tip
Click here to view the front panel pinout.
• Power on Abilis;
Tip
Interesting chapters:
73
Draft Physical connections Draft
• use a RJ45 plug to connect the door phone interface and the digital output on the front panel to the digital bus adapter
following the scheme below;
• connect the digital bus Adapter for CITO-BOX to the doorphone system using 2-wire bus as explained in the following
scheme.
Tip
Click here to view the front panel pinout.
74
Draft Physical connections Draft
75
Draft Physical connections Draft
CTIP:241 DESCR:
Act card:CB-1<1>
Run OPSTATE:UP LOG:NO TYPE:USER
signalling:CITO
mode:CITO NUM:999901
MORE-BUTTONS:1,2,3,4
L1-ON: L1-OFF: L1-PULSE: L1-PULSE-T:1000 L1-PULSE-GAP:250
L2-ON: L2-OFF: L2-PULSE: L2-PULSE-T:1000 L2-PULSE-GAP:250
L3-ON: L3-OFF: L3-PULSE: L3-PULSE-T:1000 L3-PULSE-GAP:250
L4-ON: L4-OFF: L4-PULSE: L4-PULSE-T:1000 L4-PULSE-GAP:250
CITO-GAIN-IN:SYS CITO-GAIN-OUT:SYS
CITO-ES:SYS
CITO-ES-RISE-OUT:SYS CITO-ES-FALL-OUT:SYS CITO-ES-THR-OUT:0
• configure the CITOBOX section of the CTISYS resource in the following way:
RES:CtiSys --------------------------------------------------------------------
Run DESCR:CTI_System_general_properties
...
- CITOBOX defaults -----------------------------------------------------
CITO-GAIN-IN:0 CITO-GAIN-OUT:0
CITO-ES:NO
CITO-ES-RISE-OUT:20 CITO-ES-FALL-OUT:200 CITO-ES-THR-OUT:-12
...
• connect the Abilis to Citobox using the usb port on the rear;
• check that you have an adapter cable like the one shown in the picture below, with a RJ45 plug at one end and two terminal
blocks at the other end. This cable is necessary to connect the doorphone interface and the digital output on the front panel
to the digital bus adapter;
Tip
Click here to view the front panel pinout.
76
Draft Physical connections Draft
77
Draft Physical connections Draft
• connect the digital bus adapter for the CITO-BOX to the doorphone system using a 2-wire bus as explained in the
following scheme.
• Power on Abilis;
78
Draft Physical connections Draft
Tip
Interesting chapters:
• Power on Abilis;
79
Draft Physical connections Draft
Tip
Interesting chapters:
• a main Abilis
• a backup Abilis
The backup device is always in idle unless the master crashes. The following is the scheme to use:
80
Draft Physical connections Draft
81
Draft Physical connections Draft
When Abilis MAIN is up the isdn line is connected to M1 and so to ctip port #33 of Abilis MAIN. A call is routed through
the port #31 connected to M2, so it reaches the PBX (L2).
When Abilis MAIN is down, L1 is automatically switched on B1 (which is connected to ctip port #33 of Abilis BACKUP)
and L2 is switched on B2. A call is routed through the port #31 (of Abilis BACKUP) connected to B2, so it reaches the PBX
(L2).
Tip
Interesting chapter: Section 3.10.2, “Connection cables”.
82
Draft Physical connections Draft
A call from the ISDN line reaches Abilis which routes it through the port #31, so the call reaches the PBX.
83
Draft Physical connections Draft
• the isdn line is connected directly to PBX, because L1 is switched on B1 and L2 is switched on B2
Tip
Interesting chapters:
Section 53.1, “How to configure ISDN ports to connect PBX or ISDN lines”.
Note
There must be one ADSL modem for one line and one ADSL modem for each Abilis (MAIN and
BACKUP). So four modems are needed to connect two adsl lines to RJS having two Abilis (MAIN and
BACKUP).
84
Draft Physical connections Draft
85
Draft Physical connections Draft
When Abilis MAIN is up, the ADSL lines are connected to M1, so they are used by Abilis MAIN.
When Abilis MAIN us down, the ADSL lines are switched to B1 and they are connected to Abilis BACKUP.
Caution
RJS is not suitable to connect HDSL lines with V35 interfaces.
Tip
Interesting chapters:
• ethernet cables which use pins 1,2 and 7,8 can't be connected
The adapter cable must be made so that pins 1,2 are connected to pins 3,6 and pins 4,5 remain connected to pins 4,5.
86
Draft Physical connections Draft
When Abilis MAIN is up, the cross cable is switched on M1 and so Abilis MAIN is connected to router.
When Abilis MAIN is down, the cross cable is switched to B1 and so Abilis BACKUP is connected to router.
87
Draft Physical connections Draft
Tip
Interesting chapters:
88
Draft Physical connections Draft
89
Draft Draft
Table of Contents
4.1. Abilis firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
4.1.1. Firmware versioning numbering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
4.1.2. Configuration files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
4.1.3. Compatibility of drivers.cfg files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
The Abilis firmware is just one executable file which is loaded at every bootstrap along with the configuration data
(drivers.cfg) and several other items (mainly firmware which is to be downloaded into programmable chips present in
the Abilis HW adapters).
• Hard Disk, used as a backup of the Compact-Flash Disk, or when a large mass-memory is required.
The same mass memory may contain several versions of the Abilis Firmware. The choice of which version is to be loaded
can be done using an appropriate command.
Tip
Interesting chapters:
• build number
• release number
Every Abilis version has a build number, while only the official releases have a release number. “Build” versions are
special or not yet official versionswhich can be released to provide solutions to urgent needs.
There is also a different version for videosurveillance applications that is recognizable from /VID suffix after the release
number.
COM
90
Draft Abilis firmware Draft
[15:02:22] ABILIS_CPX:
COM
[16:04:39] CPX_208:
The drivers.bck is loaded in the event that drivers.cfg can't be loaded for some reason.This measure enhances the
system's reliability.
• drivers.cfg: the current configuration (in case of changes, not yet loaded);
The drivers.cfg and drivers.bck files can be updated with save conf and save conf backup commands.
91
Draft Abilis firmware Draft
Tip
Interesting chapters:
For example, drivers.cfg files of the releases 5.6.6 and 5.8.9 aren't compatible because the second number code is
different; instead, drivers.cfg files of the release 6.0.3 and 6.0.6 are compatible because the first two numbers code are
the same.
Every Abilis firmware release has a corresponding config.exe utility that creates and reads drivers.cfg files
compatible with the releases having the same major and minor version numbers.
Every release also provides a Configuration converter (convcfg.exe or convcfgw.exe files) that allows to update the
file format of previous versions to the current one.
Tip
If the major and minor version numbers are the same, it is better to use the config.exe utility of a more
recent patch version. In some very rare cases, you could find a new parameter, that was previously hidden in
an older patch version.
Tip
Interesting chapters:
92
Draft Draft
Table of Contents
5.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.2. Command Line Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.3. Help online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.4. System accessing commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
5.4.1. LOGIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
5.4.2. LOGOUT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
5.4.3. CLOSE / EXIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
5.5. Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
5.5.1. D DEV (Display Devices) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
5.5.2. A DEV (Add Device) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
5.5.3. S DEV (Set Device) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
5.5.4. C DEV (Clear Device) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
5.6. Resources or Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
5.6.1. D P (Display Parameters) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
5.6.2. A RES (Add Resource) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
5.6.3. S P (Set Parameters) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
5.6.4. C RES (Clear Resource) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
5.7. Initialization/activation/deactivation commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
5.7.1. INIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
5.7.2. D ACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
5.7.3. S ACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
5.7.4. D INACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
5.7.5. S INACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
5.7.6. D RUN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
5.7.7. D TREE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
5.7.8. ALARM VIEW and ALARM RESET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
5.7.9. CALL RES and DISC RES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
5.8. General and system information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
5.8.1. D G (Display General) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
5.8.2. D I (Display Information) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
5.8.3. D VER (Display Versions) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
5.8.4. CPU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
5.8.5. Date and Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
5.8.6. D DESCR (Display Descriptions) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
5.8.7. D PSTACK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
5.9. Users Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
5.9.1. D USER (Display User) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
5.9.2. A USER (Add User) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
5.9.3. C USER (Clear User) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
5.9.4. S USER (Set User) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
5.10. Address book management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
5.10.1. CONTACT EXPORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
5.10.2. CONTACT IMPORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
5.10.3. CONTACT RELOAD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
5.11. Lists management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
5.11.1. LIST CREATE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
93
Draft Command language Draft
5.1. Introduction
This chapter describes the main rules that set up the command language of the Control Port commands interpreter.
It is also possible to configure Abilis CPX without connecting to the Control Port, using the config.exe utilty program.
It is possible to log into the Control Port by using three different privileges:
• User login level (USER). Simple users may read statistics and diagnostic information but cannot do programming.
Commands allowed include “display commands” (parameters, statistics and log) and “init commands”.
94
Draft Command language Draft
• Administrator login level (ADMIN). Administrators may perform the same functions permitted to users, and may do
programming and system management (reboot, change and save configuration, and so on). Administrators are only not
allowed to deal with cryptography keys, passwords and changes of the user privileges.
Tip
Interesting chapters:
[*] Complete list of system commands is available in Section 59.1, “Complete list of On-line Commands”.
95
Draft Command language Draft
The help function is contextual, this means the help message displayed depends on the ? character position in the command
line.
[11:08:39] ABILIS_CPX:?
Inserting the ? character in a more advanced position in the command line, only those key words and their description,
allowed by the command language to be place in that position and after on, will be displayed.
[11:19:17] ABILIS_CPX:alarm ?
96
Draft Command language Draft
The following example shows how it is possible, through the digitation of ? character in successively different positions, to
have a complete description of “Add CTI routing” command:
[11:19:17] ABILIS_CPX:a ?
97
Draft Command language Draft
98
Draft Command language Draft
99
Draft Command language Draft
SP: Voice compression bit rate [5300, 6000, 6300, 6400, 7200, 8000,
8800, 9600, 11200, 13200, 13340, 15200, 16000, 18400, 24000,
24800, 32000, 40000, 64000 bps]
<Only for TYPE:VtoCHISD/CtoVCHISD/HtoVCIHSD/ItoVCHISD/StoVCHISD/
DtoVCHISD/*toVCHISD>
SC: Silence compression [NO, YES, Sys]
<Only for TYPE:VtoCHISD/CtoVCIHSD/HtoVCHISD/ItoVCHISD/StoVCHISD/
DtoVCHIDS/*toVCHISD>
DJ: Default jitter buffer size.
<Only for TYPE:VtoCHISD/CtoVCHISD/HtoVCHISD/ItoVCHISD/StoVCHISD/
DtoVCHIDS/*toVCHISD>
- For TYPE:VtoCHISD/HtoVCHISD/ItoVCHISD/StoVCHISD/DtoVCHIDS: [Sys,
0..1000 msec]
- For TYPE:CtoVCHISD/*toVCHISD: [*, Sys, 0..1000 ms]
It must be minor or equal to MJ:.
MJ: Maximum jitter buffer size.
<Only for TYPE:VtoCHISD/CtoVCHISD/HtoVCHISD/ItoVCHISD/StoVCHISD/
DtoVCHIDS/*toVCHISD>
- For TYPE:VtoCHISD/HtoVCHISD/ItoVCHISD/StoVCHISD/DtoVCHIDS: [Sys,
0..1000 msec]
- For TYPE:CtoVCHISD/*toVCHISD: [*, Sys, 0..1000 ms]
It must be major or equal to DJ:.
CODERS: Allowed coders.
<Only for TYPE:VtoCHISD/CtoVCHISD/HtoVCHISD/ItoVCHISD/StoVCHISD/
DtoVCHISD/*toVCHISD>
- For TYPE:CtoCHISD/HtoCHISD/ItoCHISD/DtoCHISD/*toCHISD: [* or Sys
or NONE or a list of one or more coder values (see below)].
- For TYPE:VtoCHISD/CHISDtoV/*toV: [Sys or NONE or a list of one or
more coder values (see below)]
The available coders are [Transp, G.711, G.726, G.727, GSM6.10,
Spirit, G.723.1, G.729A, ILBC, SPEEX, G.711A, G.711u]. Values can be
joined using "," operator. The position in the list defines the
preference order. The right-most value is the one with the lowest
preference.
SPOUT: Maximum preferred/allowed bit rate for the audio coder on output
side of direct transcoding [*, 5300, 6000, 6300, 6400, 7200, 8000,
8800, 9600, 11200, 13200, 13340, 15200, 16000, 18400, 24000,
24800, 32000, 40000, 64000 bps]
<Only for TYPE:CtoCHISD/HtoCHISD/ItoCHISD/StoCHISD/DtoCHISD/
*toVCHISD>
SCOUT: Silence compression output [NO, YES, Sys, *]
<Only for TYPE:CtoCHISD/HtoCHISD/ItoCHISD/StoCHISD/DtoCHISD/
*toVCHISD>
DJOUT: Default jitter buffer size output [*, Sys, 0..1000 ms]
It must be minor or equal to MJOUT:.
<Only for TYPE:CtoCHISD/HtoCHISD/ItoCHISD/StoCHISD/DtoCHISD/
*toVCHISD>
MJOUT: Maximum jitter buffer size output [*, Sys, 0..1000 ms]
It must be major or equal to DJOUT:.
<Only for TYPE:CtoCHISD/HtoCHISD/ItoCHISD/StoCHISD/DtoCHISD/
*toVCHISD>
CODERSOUT: Preferred list of coders for THIS routing offered to called side
[* or Sys or NONE or *,Sys or a list of one or more coder values
(see below) or *,list]
The available coders are [Transp, G.711, G.726, G.727, GSM6.10,
Spirit, G.723.1, G.729A, ILBC, SPEEX, G.711A, G.711u]. Values can be
joined using "," operator. The position in the list defines the
preference order. The right-most value is the one with the lowest
preference.
<Only for TYPE:CtoCHISD/HtoCHISD/ItoCHISD/StoCHISD/DtoCHISD/
*toVCHISD>
TI1:..TI5: Time interval in the format "day,hh:mm-hh:mm", where 'day' can be:
100
Draft Command language Draft
- a single day of the week [MO, TU, WE, TH, FR, SA, SU] or
- a set of days of the week (E.g.: MO+TH or TU+TH+SU) or
- an interval of days of the week (E.g.: MO-WE or TH-SU) or
- "ALL".
Use "#" to disable the time interval.
Note
The ? character has to be separated by one or more spaces from the previous word.
A filter can be applied when asking help to semplify the search of information about a single parameter:
[20:00:25] ABILIS_CPX:
User's parameter(s):
SIP-BUSY-NOCHAN: Return BUSY cause instead of NOCHAN [NO, IN, OUT, BOTH]
[14:13:23] ABILIS_CPX:help ?
Defined topics:
[14:13:36] ABILIS_CPX:help ss ?
101
Draft Command language Draft
[11:38:04] ABILIS_CPX:login
On the contrary, if an access level is specified, the command will login the User to the Control Port using the requested
privilege.
Password:
Logged as SUPERUSER
5.4.2. LOGOUT
This command closes the current configuration session and prompts the login request.
If in the current configuration session the configuration was modified but not saved, the command displays a warning
message and queries the User for proceeding with configuration saving or not.
[11:38:04] ABILIS_CPX:logout
SAVE EXECUTED
In case of negative answer, the configuration session is closed but the configuration is not saved.
[11:38:04] ABILIS_CPX:logout
Any other answer makes the command to be aborted and the Control Port prompt to be shown again.
[11:38:04] ABILIS_CPX:logout
If the User was connected to the Control Port through a TELNET port, then the command interpreter of the TELNET port
will be prompted.
If the User executed this command through the off-line configurator, it will terminate the configurator and go back to the MS-
DOS prompt.
If in the current configuration session the configuration was modified but not saved, the command displays a warning
message and queries the User for proceeding with configuration saving or not.
102
Draft Command language Draft
[11:38:04] ABILIS_CPX:close
CLR 00 00
[192.168.0.201] TELNETS>
5.5. Devices
5.5.1. D DEV (Display Devices)
This command shows cards and hardware devices configured and their state (active/inactive).
103
Draft Command language Draft
Tip
Interesting chapters:
Tip
Interesting chapter:
104
Draft Command language Draft
- PCI devices:
ESB From 1 to 4 synchronous serial ports.
ASY Asynchronous serial port.
ETH Ethernet 10/100/1000 Mbit/sec.
CTIHA Card for HDLC controllers and DSPs. No PRI/BRI ports.
QPRI 4 Primary Rate E1 Interfaces (PRI).
PB44 4 PRI and 4 BRI interfaces.
BRI1 1 Basic Rate Interfaces (BRI).
BRI4 4 Basic Rate Interfaces (BRI).
BRI8 8 Basic Rate Interfaces (BRI).
BRIO Basic Rate Interface, data only.
POTS From 2 to 16 interfaces for analog telephones.
BS44 4 BRI and 4 POTS interfaces.
BS48 4 BRI and 8 POTS interfaces.
WL Wireless card 11 mbit/sec.
UG UMTS and GSM fake device for 32 GSM/UMTS devices.
CB CITOBOX device for 8 ports.
- USB devices:
ADSLUSB ADSL modem with USB interface.
CELL UMTS or GSM device.
CODEC Audio codec for every 2 UMTS or GSM devices.
SIMEMU SIM emulator for GSM or UMTS devices.
CELLBOX Container device for 2 CELL, 1 CODEC, 1 SIMEMU.
UMTSKEY UMTS 1 port device.
RJS RJ45 Switchboard USB device.
SIMBOX Sim Box USB device.
GPS GPS USB device.
GPIO General purpose input/output USB device.
BLUSB USB Boot Loader device.
CITO Signalling part of CITOBOX
AUDIO Audio part of CITOBOX
CITOBOX Container device for 1 CITO, 1 AUDIO.
COMMAND EXECUTED
Tip
Adding an ISDN card (QPRI, BRI8, BRI4, BRIO, POTS,…) or synchronous card (ESB), also the correlated
ports will be activated.
105
Draft Command language Draft
COMMAND EXECUTED
The “Not Saved (SAVE CONF)” message is displayed every time the configuration is modified but not
saved with the save conf command. The “Not Refreshed (INIT)” message is displayed every time the port
configuration is modified but not refreshed with the init res:ctisys command. These messages will disappear
after save conf or init res:ctisys commands.
For PCI devices, the command allows the user to set the PCI slot identifier of the board, i.e. SLOTID parameter.
For ISA devices, the command sets the memory address (ADDR parameter) and interrupt (IRQ parameter) of the device.
For USB devices, the command allows the user to set the USB port identifier of the device, i.e. USBPORTID parameter.
106
Draft Command language Draft
For example:
COMMAND EXECUTED
THE SELECTED DEVICE AND THE RELATED PHYSICAL RESOURCE(s) WILL BE DELETED.
PROCEED (N/Y)?y
COMMAND EXECUTED
[16:36:49] ABILIS_CPX:d p ?
Configuration parameters are displayed using lower case and upper case characters. This kind of visualization is used to point
out that configuration parameters are grouped into two sets:
• parameters identified by lower case characters can be activated only by restarting the system;
• parameter identified by upper case characters can be activated by executing the initialization command init res:.
RES:Ssh -----------------------------------------------------------------------
Run DESCR:Secure_Shell_Protocol
LOG:NO MCAU:NO ps:128
KEEPALIVE:30 LOGIN-TOUT:60
WDIR:C:\APP\SSH\
- Server ---------------------------------------------------------------
PSER:SSHS> ser:3 tcp-locport:22
AC:YES PWD: DT:15
107
Draft Command language Draft
CTIP:101 DESCR:
Act card:POTS-1<1>
Run OPSTATE:UP LOG:NO TYPE:USER
signalling:POTS HOLD:YES CT:ICT SS:YES
mode:Pots NUM:11
CTIP:101 DESCR:
Act card:POTS-1<1>
Run OPSTATE:UP LOG:NO TYPE:USER
signalling:POTS HOLD:YES CT:ICT SS:YES
mode:Pots NUM:11
LOOP:NO TEST:NO
CLIP:SYS CLIP-STD:SYS CLIP-TAS:SYS MIN-FLASH:SYS
SENSING:SYS ABF:SYS HPF:SYS DEBOUNCE:SYS MAX-FLASH:SYS
COUNTRY:SYS IN-GAIN-ADJ:SYS OUT-GAIN-ADJ:SYS
AT:SYS AT-CODE:SYS AT-DURATION:SYS BC:SYS
DT:SYS DT-CODE:SYS DT-DURATION:SYS OUT-DIAL-TONE:SYS
SS-PICKUP:GROUP SS-PRES-CG:YES NP-CT:SYS
SS-CF-DND:YES
The following command allows to have a complete list of the available resources:
- System resources:
Arc ARCHIVE service
Ssl Secure Socket Layer
MfIde Abilis Multi Function IDE Interface
X509 X509 certificate manager
UPnPC Universal Plug and Play Client
UPnPS Universal Plug and Play Server
- Management resources:
Cp Control port
Snmp Simple Network Management protocol
108
Draft Command language Draft
109
Draft Command language Draft
COMMAND EXECUTED
If the resource is already present in the configuration, but not active, it is possible to activate it with the command:
COMMAND EXECUTED
Tip
A lot of resources are automatically activated at the resource adding operation (i.e. Eth100, Adsl, Sync…)
[17:41:05] ABILIS_CPX:s p ?
The parameter list, defined in the command, is left to right evaluated: the parameters are set one after the other, starting from
the leftmost. Command evaluating will terminate if one the following events will occur:
All the parameters evaluated, before the error occurrence, will get the new value; the other ones will not be changed.
COMMAND EXECUTED
RES:Ssh -----------------------------------------------------------------------
Run DESCR:Secure_Shell_Protocol
LOG:NO MCAU:NO ps:128
KEEPALIVE:30 LOGIN-TOUT:60
WDIR:C:\APP\SSH\
- Server ---------------------------------------------------------------
PSER:SSHS> ser:3 tcp-locport:22
AC:YES PWD:**************** DT:15
CDO:00 UDO:CP PROFILE:NORMAL
IPSRC:* IPSRCLIST:# MAXAUTH:6
KEYLEN:768 KEYREGENT:60 HOSTKEYLEN:1024
S-VER:1,2 S-AUTH-1:PWD S-AUTH-2:PWD
110
Draft Command language Draft
S-CIPHERS-1:ALL
S-CIPHERS-2:ALL
- Client ---------------------------------------------------------------
PCLI:SSHC> cli:3 MAXPROMPT:3
CDI:* UDI:*
C-VER:1,2 C-AUTH-1:PWD C-AUTH-2:PWD
C-CIPHERS-1:ALL DFT-CIPHER-1:3DES
C-CIPHERS-2:ALL DFT-CIPHER-2:3DES
COMMAND EXECUTED
Tip
The “Not Saved (SAVE CONF)” message is displayed every time the resource configuration is modified but
not saved with the save conf command. The “Not Refreshed (INIT)” message is displayed every time the
port configuration is modified but not refreshed with the init res: command. These messages will disappear
after save conf or init res: commands.
Tip
To activate changes made on the parameters displayed by upper case characters, it is enough to execute the
initialization command init res:; for changes made on parameters displayed by lower case characters, it is
needed to restart the system with the command warm start.
For example:
COMMAND EXECUTED
THE COMMAND WILL DELETE ALL THE REFERENCES TO THE SELECTED RESOURCE.
PROCEED ANYWAY (N/Y)?y
COMMAND EXECUTED
111
Draft Command language Draft
[12:45:38] ABILIS_CPX:init ?
COMMAND EXECUTED
The command init res: initializes the specified resource(s), if it is currently active and running. At the same time the
command updates configuration parameters that have been modified, activating them. The following command allows to
display the command syntax:
The command will work on present, active and running resources only; otherwise the error message “RESOURCE NOT
PRESENT OR INACTIVE” will be displayed.
5.7.2. D ACT
This command displays all the cards and resources currently configured and active. Cards and resources are active, if they are
configured (present), but not necessarily running.
Setting changes and visualization are allowed only for active card and resources. Cards and resources are running only if they
are configured (present) and active when the system starts.
112
Draft Command language Draft
113
Draft Command language Draft
5.7.3. S ACT
These commands set active the specified card(s) or resource(s). The following command allows to display the command
syntax:
Warning
Activating a card or a resource does not mean to make it run. Activation makes possible to show card's/
resource's parameters and to modify them. To have a running card/resource or activate the changes made on
the card/resource, it is needed to save the configuration and restart the system.
5.7.4. D INACT
This command shows all the cards and resources currently configured but inactive. A card (resource) is inactive (or not
active) when it is present but it is not running.
Setting changes and visualization are not allowed for inactive cards/resources. Moreover configured but inactive cards/
resources are ignored when the system starts.
114
Draft Command language Draft
5.7.5. S INACT
These commands set inactive the specified card(s) or resource(s).
115
Draft Command language Draft
Warning
Deactivating a board or a port does not mean to make it not run, if it was running after the system start.
Deactivation makes not possible to show card's/resource's parameters and to modify them. To make a card/
port not running, it is needed to save the configuration and restart the system.
5.7.6. D RUN
This command shows all the currently running resources and cards. The running resources and cards are the ones which are
configured and active when at the system start.
A resource/card is still running even if it has been deactivated through the command s inact.
Running resources:
+------------+-----+----------------------------------------------------------+
| Resource | Act | Description |
+------------+-----+----------------------------------------------------------+
| Async-1 | Yes | |
| Blusb-1 | Yes | USB_Boot_Loader |
| Eth-1 | Yes | |
| Eth-2 | Yes | |
| Eth-3 | Yes | |
| Eth-4 | Yes | |
| Adsl-1 | Yes | |
| Adsl-2 | Yes | |
| Adsl-3 | Yes | |
| Rjs-1 | Yes | |
| SimBox-1 | Yes | |
| Gps-1 | Yes | |
| Gpio-1 | Yes | |
| Cp | Yes | Control_Port |
| Snmp | Yes | Simple_Network_Management_Protocol |
| Sntp | Yes | Simple_Network_Time_Protocol |
| Acnt | Yes | Accounting_Service |
| Trfa | Yes | Traffic_Analyzer |
| SysLog | Yes | System_Log_protocol |
| Opc | Yes | Operator_Panel_Collector |
| X25-50 | Yes | |
| X25-51 | Yes | |
| X25-52 | Yes | |
| X25-53 | Yes | |
| X25-54 | Yes | |
| X25-55 | Yes | |
| X25-56 | Yes | |
| X25-57 | Yes | |
| X25-58 | Yes | |
| X25-59 | Yes | |
| X25-999 | Yes | Resource_for_remote_maintenance |
| Pad-1 | Yes | |
| Xtp-1 | Yes | |
| Sim-50 | Yes | |
| Sim-51 | Yes | |
| Sim-52 | Yes | |
| Sim-53 | Yes | |
| Sim-54 | Yes | |
| Sim-55 | Yes | |
| Sim-56 | Yes | |
| Sim-57 | Yes | |
| Sim-58 | Yes | |
116
Draft Command language Draft
| Sim-59 | Yes | |
| CtiX25D | Yes | X.25_Over_ISDN_D-Channel |
| CtiSLink | Yes | HDLC_Over_ISDN_B-Channel |
| CtiVsp | Yes | Virtual_Synchronous_Port |
| CtiSys | Yes | CTI_System_general_properties |
| CtiIax | Yes | IAX2 |
| CtiDisa | Yes | Direct_Inward_System_Access |
| CtiSip | Yes | Session_Initiation_Protocol |
| CtiSms | Yes | Short_Message_Service |
| CtiAs | Yes | Cti_AS |
| Iprtr | Yes | IP_Router_general_properties |
| Tcp | Yes | Transmission_Control_Protocol |
| Udp | Yes | User_Datagram_Protocol |
| Telnet | Yes | Telnet_Server_and_Client_entities |
| Rip | Yes | Routing_Information_Protocol |
| Dns | Yes | Domain_Name_System |
| Http | Yes | HyperText_Transfer_Protocol |
| Nat | Yes | Network_Address_Translator |
| Ssh | Yes | Secure_Shell_Protocol |
| Ospf | Yes | Open_Shortest_Path_First_Routing_Protocol |
| Dhcp | Yes | Dynamic_Host_Configuration_Protocol |
| Ftp | Yes | File_Transfer_Protocol_Server |
| IpSec | Yes | IP_Security_Protocol |
| Ike | Yes | Internet_Keys_Exchange_Protocol |
| Smtp | Yes | Simple_Mail_Transfer_Protocol |
| Pop3 | Yes | Post_Office_Protocol_Ver3 |
| Radius | Yes | Remote_Authentication_Dial_In_User_Service |
| Vrrp | Yes | Virtual_Router_Redundancy_Protocol |
| DhcpC | Yes | Dynamic_Host_Configuration_Protocol_Client |
| DDns | Yes | Dynamic_DNS_Protocol_Client__antekdyndns-abilisantek |
| RSim-1 | Yes | |
| Fr-1 | Yes | |
| Fr-2 | Yes | |
| Pv-1 | Yes | |
| Pv-2 | Yes | |
| Pv-5 | Yes | |
| Pv-10 | Yes | |
| Pv-11 | Yes | |
| Pv-200 | Yes | |
| PoeAc-1 | Yes | |
| PoeCli-1 | Yes | |
| PoeCli-2 | Yes | |
| Ip-1 | Yes | |
| Ip-2 | Yes | |
| Ip-3 | Yes | |
| Ip-4 | Yes | |
| Ip-35 | Yes | |
| Ip-50 | Yes | ADSL |
| Ip-51 | Yes | |
| Ip-52 | Yes | |
| Ip-53 | Yes | |
| Ip-55 | Yes | |
| Ip-60 | Yes | |
| Ip-61 | Yes | |
| Ip-62 | Yes | |
| Ip-63 | Yes | |
| Ip-71 | Yes | |
| Ip-131 | Yes | |
| Ip-150 | Yes | |
| Ip-160 | Yes | |
| Ip-200 | Yes | |
| Ip-201 | Yes | |
117
Draft Command language Draft
| Ip-250 | Yes | |
| Bridge-1 | Yes | |
| Ssl | Yes | Secure_Socket_Layer |
| MfIde | Yes | Abilis_Multi_Function_IDE_Interface |
| UPnPS | Yes | Universal_Plug_and_Play_Server |
+------------+-----+----------------------------------------------------------+
+------+----------+-----+-----------------------------------------------------+
| CTIP | Card | Act | Description |
+------+----------+-----+-----------------------------------------------------+
| 31 | BRI8-1 | Yes | |
| 32 | BRI8-1 | Yes | |
| 33 | BRI8-1 | Yes | |
| 34 | BRI8-1 | Yes | |
| 35 | BRI8-1 | Yes | |
| 36 | BRI8-1 | Yes | |
| 37 | BRI8-1 | Yes | |
| 38 | BRI8-1 | Yes | |
| 101 | POTS-1 | Yes | test_port_101 |
| 102 | POTS-1 | Yes | |
| 103 | POTS-1 | Yes | |
| 104 | POTS-1 | Yes | |
| 117 | POTS-2 | Yes | |
| 118 | POTS-2 | Yes | |
| 201 | UG-1 | Yes | SIM |
| 202 | UG-1 | Yes | |
| 203 | UG-1 | Yes | |
| 204 | UG-1 | Yes | |
| 208 | UG-1 | Yes | |
| 241 | CB-1 | Yes | |
| 242 | CB-1 | Yes | |
+------+----------+-----+-----------------------------------------------------+
+-----+--------------+-----+------+-----------+
| Ind | Device | Act | Type | Connected |
+-----+--------------+-----+------+-----------+
| 2 | ASY-1 | Yes | ISA | - |
| 3 | ADSLUSB-1 | Yes | USB | Yes |
| 4 | ADSLUSB-2 | Yes | USB | No |
| 5 | ADSLUSB-3 | Yes | USB | No |
| 7 | ETH-1 | Yes | PCI | - |
| 8 | POTS-1 | Yes | PCI | - |
| 9 | UG-1 | Yes | PCI | - |
| 10 | CELL-1 | Yes | USB | No |
| 11 | CELL-2 | Yes | USB | No |
| 12 | CODEC-1 | Yes | USB | No |
| 15 | RJS-1 | Yes | USB | No |
| 16 | GPS-1 | Yes | USB | No |
| 17 | POTS-2 | Yes | PCI | - |
| 18 | CELL-3 | Yes | USB | No |
| 19 | CELL-4 | Yes | USB | No |
| 20 | CODEC-2 | Yes | USB | No |
| 21 | SIMEMU-2 | Yes | USB | No |
| 22 | SIMEMU-1 | Yes | USB | No |
| 23 | ETH-2 | Yes | PCI | - |
| 26 | BRI8-1 | Yes | PCI | - |
| 27 | BLUSB-1 | Yes | USB | No |
| 28 | GPIO-1 | Yes | USB | No |
118
Draft Command language Draft
5.7.7. D TREE
This command shows the real status of the connections among protocol resources and the physical link. Resources can be
split into 7 groups:
• System Resource(s)
• Management Resource(s)
• IP Resource(s)
• CTI Resource(s)
Before showing the resources connections, the command automatically executes a validation of the current configuration. If
the validation is successful, the command will be executed, otherwise it won't.
For more details on the configuration validation procedure see the section Section 5.12, “Configuration validating and
saving”.
119
Draft Command language Draft
X25-50
\---CtiSLink
X25-51
\---CtiSLink
X25-52
\---CtiSLink
X25-53
\---CtiSLink
X25-54
\---CtiSLink
X25-55
\---CtiSLink
X25-56
\---CtiSLink
X25-57
\---CtiSLink
X25-58
\---CtiSLink
X25-59
\---CtiSLink
X25-999
\---CtiSLink
Pad-1
\---Async-1
Xtp-1
\---Tcp
Sim-50
Sim-51
Sim-52
Sim-53
Sim-54
Sim-55
Sim-56
Sim-57
Sim-58
Sim-59
120
Draft Command language Draft
\---PoeAc-1
\---Eth-1
\---Ip-63
\---PoeAc-1
\---Eth-1
\---Ip-71
\---PoeCli-1
\---Eth-4
\---Ip-131
\---Ip-150
\---CtiSLink
\---Ip-160
\---Ip-200
\---Fr-1
\---Sync-3
\---Ip-201
\---Fr-2
\---Sync-4
\---Ip-250
Tcp
Udp
Telnet
\---Tcp
Rip
\---Udp
Dns
\---Udp
Http
\---Tcp
Nat
Ssh
\---Tcp
Ospf
Dhcp
\---Udp
Ftp
\---Tcp
IpSec
Ike
\---Udp
Smtp
\---Tcp
Pop3
\---Tcp
Radius
\---Udp
Vrrp
DhcpC
\---Udp
DDns
\---Tcp
RSim-1
\---Udp
121
Draft Command language Draft
CtiSys
\---CTIP:101..116 (POTS-1)
\---CTIP:201..232 (UG-1)
\---CTIP:117..132 (POTS-2)
\---CTIP:133..148 (POTS-3)
\---CTIP:1..4 (QPRI-1)
\---CTIP:31..38 (BRI8-1)
\---CTIP:241..248 (CB-1)
\---CTIP:49..52 (QPRI-13)
\---(CTIL: 1) Pv-1
\---CtiSLink
\---Udp
\---(CTIL: 2) Pv-2
\---CtiSLink
\---Udp
\---(CTIL: 5) Pv-5
\---Udp
\---(CTIL: 10) Pv-10
\---Udp
\---(CTIL: 11) Pv-11
\---Udp
CtiIax
\---Udp
CtiDisa
CtiSip
\---Tcp
\---Udp
CtiSms
CtiAs
122
Draft Command language Draft
- Link -----------------------------------------------------------------
+--------+--- Global ----+------- P-Link -------+------- S-Link -------+
| STATE: | DOWN | DOWN1 | LINK-NOT-PRESENT |
+--------+---------------+----------------------+----------------------+
If there are no alarmed resources when the command is executed, the message “NO ALARMED RESOURCES” will be
shown.
Resources alarms are detected by a proper procedure, which is executed every 30 seconds and is activated setting the A
option in the LLOG parameter. If the L option is also set in the LLOG parameter, on alarm detection, acoustic signal and
message on the LCD display are generated.
The command alarm reset activates a reset procedure of error conditions that generated the alarm.
COMMAND EXECUTED
The command can work only on MLM and PPP resource types, otherwise the message “COMMAND NOT ALLOWED
FOR 'RES:type-nnn” is generated.
COMMAND EXECUTED
If the command has been already executed on the specified resource, while the disc res: one was not, then the message
“CONNECTION ALREADY OPENED” will be displayed. The command will work only on present, active and running
resources; otherwise the error message “RESOURCE NOT PRESENT OR NOT RUNNING” will be displayed.
COMMAND EXECUTED
Not all the shown parameters can be changed; the note “<Read Only>” refers the not modifiable ones.
[11:38:04] ABILIS_CPX:d g
123
Draft Command language Draft
-------------------------------------------------------------------------------
listitems: 4000 (390 Kb)
dbgsize: 20 (Kb)
DBGF: ALL
DBGSYSLOG: ALL
CONTACT:
SYSNAME: cpx-test-208
LOCATION:
SYSUPTIME: 0 days 03:02:37 (Thursday 16/12/2010 13:05:38) <Read Only>
SYSRBTIME: # (System Reboot time not set)
DATE&TIME: Thursday 16/12/2010 16:08:15 (UTC+1.00) <Read Only>
TIMEZONE: CET - Central Europe (Rome, Paris, Berlin, Prague, Brussels)
ABILIS-ID: 2001 <Read Only>
[11:38:04] ABILIS_CPX:d i
ABILIS-ID: 2349
124
Draft Command language Draft
The first part of the output is dedicated to the information about version and release date of the software.
The second one shows information about Abilis CPX serial number, system memory and disk.
The third part of the output displays information related to system relevant files, i.e. files used by Abilis during its working
(e.g. configuration and configuration backup files, System Log file, ...).
The “Other system relevant files” section displays information about any other system relevant additional files (e.g. DHCP
bindings file, ...).
The “Other files:” section shows information about any other additional file that is found on the disk, in the current working
version directory.
Eventual detected errors are highlighted with the string “ERR[xx]”, where “xx” is the error code detected; it should be
eventually told to the Abilis CPX assistance.
125
Draft Command language Draft
The first part is dedicated to the information about version and release date of the software.
In the second one, there is a list of all the Abilis CPX software modules. The string “Module not present” refers to the
modules that do not belong to the Abilis CPX software currently in use.
5.8.4. CPU
The command d cpu estimates the average CPU load over a given time interval. It gives an estimated percentage load for the
last 1 second, 15 seconds and 5 minutes.
+----------+--------------+--------------+--------------+
| | Last 1 sec. | Last 15 sec. | Last 5 min. |
+----------+--------------+--------------+--------------+
| CPU Load | 6% | 6% | 6% |
+----------+--------------+--------------+--------------+
The command d cpuid shows general information about the CPU of the Abilis CPX.
126
Draft Command language Draft
Intel-specific functions:
Version 000006B1
Type 0 - Original OEM
Family 6 - Pentium Pro
Model 11 -
1002MHz processor (estimate)
Stepping 1
Reserved 0
[11:38:04] ABILIS_CPX:d t
127
Draft Command language Draft
The command d te shows date and system local time, current time referred to the GMT time zone, the local time zone,
modality of “Standard” or “Daylight Savings” time currently in use and information about the date it will change.
[11:38:04] ABILIS_CPX:d te
128
Draft Command language Draft
Pv-6 IP Internal_Cluster_2
Pv-7 IP To_Abilis_2
Pv-10 IP Internal_Cluster_1
Pv-11 IP Internal_Cluster_2
PoeAc-1
Ip-1 LAN
Ip-2 DL dmz-test
Ip-3 AIPT-BCK
Ip-4 AIPT-BCK
Ip-8 AIPT
Ip-9 AIPT To_Abilis_2
Ip-20 LAN
Ip-21 LAN
Ip-23 LAN
Ssl Secure_Socket_Layer
MfIde Abilis_Multi_Function_IDE_Interface
129
Draft Command language Draft
223
224
225
226
227
228
229
230
231
232
241
242
243
244
245
246
247
248
5.8.7. D PSTACK
This command displays the association between resources and its related ports.
+------------+---------------+------------------------------------------------+
| Resource | Act/Run | Port(s) |
+------------+---------------+------------------------------------------------+
| Sync-1 | Act/NotRun | 54(Sync) |
| Sync-2 | Act/NotRun | 65(Sync) |
| Sync-3 | Act/NotRun | 67(Sync) |
| Sync-4 | Act/NotRun | 68(Sync) |
| Async-1 | Act/Run | 23(Async) |
| Blusb-1 | Act/Run | 171(Blusb) |
| Eth-1 | Act/Run | 24(Eth) |
| Eth-2 | Act/Run | 28(Eth) |
| Eth-3 | Act/Run | 179(Eth) |
| Eth-4 | Act/Run | 180(Eth) |
| Adsl-1 | Act/Run | 30(Adsl) |
| Adsl-2 | Act/Run | 31(Adsl) |
| Adsl-3 | Act/Run | 33(Adsl) |
| Adsl-4 | NotAct/NotRun | 48(Adsl) |
| Rjs-1 | Act/Run | 160(Rjs) |
| SimBox-1 | Act/Run | 177(SimBox) |
| Gps-1 | Act/Run | 159(Gps) |
| Gpio-1 | Act/Run | 172(Gpio) |
| Cp | Act/Run | 1(Cp) |
| Snmp | Act/Run | 2(Snmp) |
| Sntp | Act/Run | 3(Sntp) |
| Acnt | Act/Run | 15(Acnt) |
| Trfa | Act/Run | 52(Trfa) |
| SysLog | Act/Run | 167(SysLog) |
| Opc | Act/Run | 142(Opc) |
| X25-1 | NotAct/NotRun | 69(X25) |
| X25-2 | NotAct/NotRun | 72(X25) |
| X25-3 | NotAct/NotRun | 75(X25) 76(LapB) 77(Mlm) |
| X25-4 | NotAct/NotRun | 78(X25) 79(LapB) 80(Mlm) |
| X25-5 | NotAct/NotRun | 103(X25) |
| X25-6 | NotAct/NotRun | 104(X25) |
| X25-7 | NotAct/NotRun | 42(X25) |
| X25-8 | NotAct/NotRun | 59(X25) |
| X25-10 | NotAct/NotRun | 94(X25) 95(LapB) 96(Mlm) |
130
Draft Command language Draft
131
Draft Command language Draft
Tip
Interesting chapter: Section 51.19, “How to trace the internal events for debugging purposes”.
132
Draft Command language Draft
• PPP
• FTP
• HTTP
• MAIL
• IAX
• SIP
Two default users exist: admin and guest: they can't be removed and are disabled by default.
Admin user can be activated only with a password not empty, while guest user can't have a password.
• d user:<username> : shows the Users Table entry identified by the “user:<username>” in a synthetic format, i.e. the
parameters of the services which are not enabled are omitted.
USER: PWD: ACT: CTIP: CLUS: PPP: FTP: HTTP: MAIL: IAX: SIP:
--------------------------------+--------------+-------------------------------
admin NO # # YES YES YES NO NO NO
guest NO # # NO NO NO NO NO NO
Parameter: | Value:
------------------+------------------------------------------------------------
USER: admin
ALIAS: admin
ID: 1 <Read Only>
PWD:
ACT: NO
GROUP:
CTIP: #
CLUS: #
OPC-MONITOR: NONE
PPP: YES
PPP-AUTH: CHAP
PPP-RES: ANY
PPP-NEIGH: #
PPP-MASK: 255.255.255.255
PPP-ROUTE: #
FTP: YES
FTP-HOMEDIR:
FTP-PROT: PLAIN,SSL
HTTP: YES
HTTP-PROT: PLAIN,SSL
-------------------------------------------------------------------------------
133
Draft Command language Draft
• d usere:<username> : shows the content of the Users Table in extended format, i.e. all users defined with their full set of
configuration information are displayed.
Parameter: | Value:
------------------+------------------------------------------------------------
USER: admin
ALIAS: admin
ID: 1 <Read Only>
PWD:
ACT: NO
GROUP:
CTIP: #
CLUS: #
OPC-MONITOR: NONE
OPC-ROLE: USER
OPC-VIEW: *
OPC-HIDE-NUMBERS: NO
OPC-PRIVACY: NO
PPP: YES
PPP-AUTH: CHAP
PPP-RES: ANY
PPP-NEIGH: #
PPP-MASK: 255.255.255.255
PPP-ROUTE: #
FTP: YES
FTP-HOMEDIR:
FTP-PROT: PLAIN,SSL
HTTP: YES
HTTP-PROT: PLAIN,SSL
MAIL: NO
MAIL-MB-MAXSIZE: SYS
MAIL-MB-MAXMAILS: SYS
MAIL-MSG-LIFETIME: SYS
MAIL-AUTH: SYS
IAX: NO
IAX-HOST: DYNAMIC
IAX-SRCADD: SYS
IAX-PORT: (DYNAMIC)
IAX-IP-PERMIT: *
IAX-MAXSES-BID: 2
IAX-MAXSES-IN: 0
IAX-MAXSES-OUT: 0
IAX-NUMBER:
IAX-CG-NUM: AUTO
IAX-FWD-CG-NUM: CALLER
IAX-CTIP-TYPE: SYS
IAX-RG-IN: SYS
IAX-ROUTE-BY-SD: NO
IAX-PROVIDE-SG: NO
IAX-CLIP-RULE: SYS
IAX-BUSY-NOCHAN: NO
IAX-LCS-GROUP: NONE
IAX-CPO: SYS
IAX-CPO-STATE: SYS
IAX-CPO-DROP: SYS
IAX-SS: NO
IAX-SS-PICKUP: NO
IAX-SS-PRES-CG: YES
IAX-SS-CF-DND: YES
IAX-CONTEXT:
134
Draft Command language Draft
IAX-PROVIDE-NAME: BLANK
IAX-AUTH: SYS
IAX-NETSTATS: SYS
IAX-TRUNK: SYS
IAX-TRUNK-FREQ: SYS
IAX-TRUNK-TS: SYS
IAX-CHAN-FREQ: SYS
IAX-TRANSFER: SYS
IAX-DISC-AUDIO: SYS
IAX-HTML-IN: SYS
IAX-HTML-OUT: SYS
IAX-REM-USER:
IAX-REM-PASS:
IAX-REM-AUTH: SYS
IAX-REM-REG: NO
SIP: NO
SIP-TYPE: PHONE
SIP-DOMAIN: SYS
SIP-HOST: DYNAMIC
SIP-TCP-PORT: (DYNAMIC)
SIP-UDP-PORT: (DYNAMIC)
SIP-SRCADD: SYS
SIP-PROT-IN: TCP,UDP
SIP-PROT-OUT: UDP
SIP-IP-PERMIT: *
SIP-MAXSES-BID: 2
SIP-MAXSES-IN: 0
SIP-MAXSES-OUT: 0
SIP-NUMBER:
SIP-CG-NUM: AUTO
SIP-FWD-CG-NUM: CALLER
SIP-CTIP-TYPE: SYS
SIP-RG-IN: SYS
SIP-ROUTE-BY-SD: NO
SIP-PROVIDE-SG: NO
SIP-CLIP-RULE: SYS
SIP-BUSY-NOCHAN: NO
SIP-LCS-GROUP: NONE
SIP-CPO-RTP: SYS
SIP-CPO-SIGNALLING: SYS
SIP-SS: NO
SIP-SS-PICKUP: NO
SIP-SS-PRES-CG: YES
SIP-SS-CF-DND: YES
SIP-AUTH: SYS
SIP-CHAN-FREQ: SYS
SIP-REMOTE-NAT: NO
SIP-LOCAL-NAT: NO
SIP-EXTERNAL-IP: SYS
SIP-KEEPALIVE: ENABLED
SIP-DTMF-MODE: SYS
SIP-DISC-AUDIO: SYS
SIP-BC-TRANSP: UDI
SIP-T38: SYS
SIP-T38-G711: SYS
SIP-T38-PACKING: SYS
SIP-SS-PRES-CG: YES
SIP-SS-CF-DND: YES
SIP-AUTH: SYS
SIP-CHAN-FREQ: SYS
SIP-REMOTE-NAT: NO
SIP-LOCAL-NAT: NO
135
Draft Command language Draft
SIP-EXTERNAL-IP: SYS
SIP-KEEPALIVE: ENABLED
SIP-DTMF-MODE: SYS
SIP-DISC-AUDIO: SYS
SIP-BC-TRANSP: UDI
SIP-T38: SYS
SIP-T38-G711: SYS
SIP-T38-PACKING: SYS
SIP-T38-REDUND: SYS
SIP-T38-REDUND-PCK: SYS
SIP-UA: SYS
SIP-UA-PERMIT: *
SIP-REM-USER:
SIP-REM-PASS:
SIP-REM-AUTH: SYS
SIP-REM-REG: NO
-------------------------------------------------------------------------------
COMMAND EXECUTED
Note
A restricted user name character set can be used. Avoided those characters that are not valid in file names '\',
'/', ':', '*', '?', '"', '>', '<', '|'.
User's parameters:
...
CTI CALLs LOGs AND ADDRESS BOOK CONTACTs OF THIS USER WILL BE DELETED.
PROCEED ANYWAY (N/Y)?y
136
Draft Command language Draft
COMMAND EXECUTED
COMMAND EXECUTED
User's parameters:
...
137
Draft Command language Draft
COMMAND EXECUTED
CONTACT IMPORT PUB <filename> Import public contacts from the specified
file in CSV format
COMMAND EXECUTED
NAME,OUTDIAL,NUMBER
Test,,10
Test2,,11
Test3,,12
Tip
The upload of the csv file can be done using FTP or file put command:
Upload Zmodem
pub_addrbook.csv
138
Draft Command language Draft
NO CHECK DONE.
COMMAND EXECUTED
Within the Abilis CPX, the following element types have been referred as relevant:
• call routings by accepting and/or refusing calls depending on the source numbers;
• security by accepting and/or refusing packets depending on the IP source address or protocol.
COMMAND EXECUTED
139
Draft Command language Draft
Type List type [IN, IS, EC, XN, XU, IP, IR, DN, CR, <Mandatory>
TUP, IPT, MAC, SAP, H323ID, CLNUM, INR, IN2T, TXT,
OPC, ICAUSE, RU, MR]
Description List description. Max. 70 alphanumeric, no spaces. <Optional>
COMMAND EXECUTED
Caution
A list, to be deleted, must not be referred in any resource or table.
the command list description changes or adds the field description of the list.
COMMAND EXECUTED
COMMAND EXECUTED
By typing list rename ? or list description ? it is possible to display the command syntax:
140
Draft Command language Draft
LIST:Home - IN
List_of_Home_numbers
0234865852 0269548947
• d list:a : shows the content of all the list present in the configuration
COMMAND EXECUTED
141
Draft Command language Draft
LIST:Home - IN
List_of_Home_numbers
0234865852 0269548947
142
Draft Command language Draft
COMMAND EXECUTED
LIST:Home - IN
List_of_Home_numbers
0269548947
143
Draft Command language Draft
5.11.7. D ITEM
This command shows the elements table. Lists table can store up to 2000 definitions (indexed from 1 to 2000).
Elements identifiers are sequential and they run only into the system, so they can't be used by the user in no one of the list
manipulation commands.
If the elements table is empty, the message “NO ITEMS DEFINED” is generated.
• in input fields (CDI, CGI, SDI, SGI) (in this case the match is done against the Number field);
• in output fieds to change CD or CG numbers, when the called number of the original call matches the Number field.
COMMAND EXECUTED
144
Draft Command language Draft
8 NumIax IN Automatically_generated_CT... R 0 0 0
6 NumSip IN Automatically_generated_CT... R 0 9 4
5 SgiAllowed IS Sub-Adresses_diretti_al_CPX 1 7 2
7 OkTelnet IR Reti_Abilitate_al_Telnet 1 13 6
3 PPP_list CR List_of_PPP_Resources 1 6 1
4 NumClus CLNUM Automatically_generated_CT... R 0 0 0
9 inr INR inr_test 0 19 1
-------------------------------------------------------------------------------
IN:ISDN Numbers, IS:ISDN Sub Addresses, EC:CTI Clusters,
XN:X25 NUAs, XU:X25 UDFs, IP:IP Addresses,
IR:IP Addresses Ranges, DN:Dialing Numbers, CR:CPX resources,
TUP:TCP and UDP ports ranges, IPT:Internet Protocols, MAC:MAC Addresses,
SAP:SAP values, H323ID:H.323 ID aliases, CLNUM:CTICL Numbers,
INR:ISDN Numbers Replacements, IN2T:ISDN Numbers to Text, TXT:Text,
OPC:OPC Unique User IDs, ICAUSE:ISDN Cause codes,
RU:Rules, MR:Master Rules.
-------------------------------------------------------------------------------
Now add an item to the list, indicating that it will be used to check the CDI number (Chk:CDI).
COMMAND EXECUTED
[13:58:55] ABILIS_CPX:a ctir pr:22 descr:test_inr type:stos cdi:'inr' cdo:''inr'' cgo:''inr'' sp:64
COMMAND EXECUTED
-------------------------------------------------------------------------------
PR:22 DESCR:
ACT:YES EDT:NO
TYPE:StoS POI:CtiSip POO:CtiSip EEC:NO
NEXT:NO CDI:'inr' CDO:''inr''
LAST:ANY CGI:* CGO:''inr''
T301:Dft SDI:* SDO:*
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:64000 SC:Sys DJ:Sys MJ:Sys ECM:Sys
CODERS:G.711
SPOUT:64000 SCOUT:* DJOUT:* MJOUT:*
CODERSOUT:G.711
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
The following is the log of a call from number 10 calling number 1. The log shows that the called number is 111 even if the
real called number is 1. Besides the calling number has been changed because it has become 110.
145
Draft Command language Draft
Start Debug Log content real-time logging (Type CTRL+C + ENTER to stop):
-------------------------------------------------------------------------------
ID:11 TYPE:StoS ST:ALERT PR:22 STI:07/00 STO:04/00 EEC:NO
START:14/12/2010 14:11:40 DURATION:0 REMAINING:-
POI:Sip GI:# SR:# POO:Sip GO:# DS:#
CDI:ue1 CDO:ue111
CGI:uxq10 CGO:uxq110
SDI: SDO:
SGI: SGO:
RGI: RGO:
CODER:Unk SP:0 FMRLY:NO FAXSP:0 DJ:0 FMDJ:0
BW:0 SC:NO MODSP:0 MJ:0 FMMJ:0
Another possibility is to indicate the field of inr list to be used in a certain cti routing:
COMMAND EXECUTED
-------------------------------------------------------------------------------
PR:22 DESCR:test_sip
ACT:YES EDT:NO
TYPE:StoS POI:CtiSip POO:CtiSip EEC:NO
NEXT:NO CDI:'inr' CDO:''inr.CG''
LAST:ANY CGI:* CGO:''inr.CD''
T301:Dft SDI:* SDO:*
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:64000 SC:Sys DJ:Sys MJ:Sys ECM:Sys
CODERS:G.711
SPOUT:64000 SCOUT:* DJOUT:* MJOUT:*
CODERSOUT:G.711
146
Draft Command language Draft
In this case, CDO is equal to CG item of the inr list and CGO is equal to CD item of the same list. The following is the log of
the speed dial:
Start Debug Log content real-time logging (Type CTRL+C + ENTER to stop):
-------------------------------------------------------------------------------
ID:15 TYPE:StoS ST:ALERT PR:22 STI:07/00 STO:04/00 EEC:NO
START:14/12/2010 14:21:25 DURATION:0 REMAINING:-
POI:Sip GI:# SR:# POO:Sip GO:# DS:#
CDI:ue1 CDO:ue110
CGI:uxq10 CGO:uxay111
SDI: SDO:
SGI: SGO:
RGI: RGO:
CODER:Unk SP:0 FMRLY:NO FAXSP:0 DJ:0 FMDJ:0
BW:0 SC:NO MODSP:0 MJ:0 FMMJ:0
Configuration validating has been introduced to ensure correct Abilis CPX configurations.
• positive without demanding modifications to the configuration (if the command is successful the message “VALIDATION
SUCCESSFULLY EXECUTED” will be also shown);
• negative if the validation detects some incongruencies or imprecision in it (if the command is unsuccessful the message
“VALIDATION FAILED” wil be shown).
[11:28:08] ABILIS_CPX:validate
147
Draft Command language Draft
If the validation and saving are both successful the message “SAVE EXECUTED” will be shown. If the validation fails, the
saving is NOT executed and the message “SAVE NOT EXECUTED” will be shown.
SAVE EXECUTED
The configuration is saved and marked with a configuration state of “configuration saved but not yet loaded”. On next restart,
if the settings of the saved configuration were correct, the configuration state will become “valid configuration”.
Checking the current configuration state is done through the command d i. In correspondence of the drivers.cfg file, in
the notes dedicated section, the string “Saved” will appear.
After the system restart, in correspondence of the loaded drivers.cfg file, in the notes dedicated section, the string “Ok”
will appear.
[16:23:01] ABILIS_CPX:d i
ABILIS-ID: 2001
Save Conf command can be also used with the syntax: save conf <version>.
It allows to create a copy of the configuration file DRIVERS.CFG of the specified version directory. The <version> string
must correspond to an existing version directory in the form 'X.Y.Z' or 'X-Y-Z' or 'Y.Z' or 'Y-Z' or 'Y', where X, Y and Z are
decimal digit [0 - 9] (E.g. 6-0-6)
It can be useful after a system update and the installation of a compatible release.
SAVE EXECUTED
The command save conf backup is used to create a backup copy (file drivers.bck) of the configuration saved on disk.
The backup configuration is loaded at the Abilis CPX start, every time the one, saved in drivers.cfg, is not valid or the
same file is missing or corrupted.
Indeed, it is very important that the User makes backup only of those configuration correctly working.
148
Draft Command language Draft
With conf and conflog commands it is possible to copy, restore or save configuration and Log files. Below there's the
commands syntax:
[15:43:26] ABILIS_CPX:conflog ?
[15:43:26] ABILIS_CPX:conf ?
Tip
Interesting chapter: Section 51.8, “How to copy files using a removable drive”.
With file commands it is possible to copy/delete a file or to transfer a file from and to Abilis CF/HD. Abilis supports
XMODEM, XMODEM-1K, ZMODEM protocols for file transfer, from and to Abilis (use a terminal emulator which is
compatible with the protocols mentioned above, to transfer files or system releases).
[15:43:26] ABILIS_CPX:file ?
[15:43:26] ABILIS_CPX:sys ?
149
Draft Command language Draft
The <version> string must correspond to an existing version directory in the form 'X.Y.Z' or 'X-Y-Z' or 'Y.Z' or 'Y-Z' or 'Y',
where X, Y and Z are decimal digit [0 - 9] (E.g.: 6-0-8).
With the command conf backup it is possible to copy only configurations file.
YOU ARE GOING TO BACKUP CONFIGURATION AND LOG FILES OF CURRENT VERSION
TO 'D:\__Abilis_Cpx_Backup_And_Restore__'.
PROCEED (N/Y)?y
COMMAND COMPLETED
Tip
Interesting chapter: Section 51.8, “How to copy files using a removable drive”.
The <version> string must correspond to an existing version directory in the form 'X.Y.Z' or 'X-Y-Z' or 'Y.Z' or 'Y-Z' or 'Y',
where X, Y and Z are decimal digit [0 - 9] (E.g.: 6-0-8).
COMMAND COMPLETED
Tip
Interesting chapter: Section 51.8, “How to copy files using a removable drive”.
150
Draft Command language Draft
The “srcname” must be a file name. If the path is omitted the source file is assumed to be located in the current running
version directory.
The “dstname” can either a path or a file name. If the path is omitted the destination directory is assumed to be the current
running version directory.
Wildcards characters are not accepted either in the source file name nor in the destination name.
Log files (Cpx.log, Cpx.dbg and Cpx.xcp) and Cpx.rtb file cannot be overwritten.
The “filename” must be a file name. If the path is omitted the source file is assumed to be located into the current running
version directory.
Configuration files, log files (Cpx.log, Cpx.dbg and Cpx.xcp) and any other system file cannot be deleted from the
current running version directory.
FILE GET [X] fname [<ver>][1K] Send a file using XMODEM or XMODEM-1K
FILE GET Z fname [<ver>] Send a file using ZMODEM
151
Draft Command language Draft
The transfer procedure signals its availability to send the file by the message:
After pressing the Enter button, if the transfer was successful, the following message will be shown.
FILE PUT [X] fname [<ver>] Receive a file using XMODEM or XMODEM-1K
FILE PUT Z fname [<ver>] Receive a file using ZMODEM
The transfer procedure signals its availability to receive the file by the message:
After pressing the Enter button, if the transfer was successful, the following message will be shown.
Once the file is received, it is submitted to a congruence control for checking its content validity. The User is informed
through the message:
CHECK PASSED
152
Draft Command language Draft
Note
This command copies all used directory entries to the start of the directory and zeros out all slack space. If
the slack space is larger than one cluster, the slack space is freed, reducing the allocated size of a directory.
THIS OPERATION MAY TAKE FEW MINUTES AND LOCKS ACCESS TO DISK c:
PROCEED ANYWAY (N/Y)?y
Note
This command copies all used directory entries to the start of the directory and zeros out all slack space. If
the slack space is larger than one cluster, the slack space is freed, reducing the allocated size of a directory.
153
Draft Command language Draft
• By receiving from a remote source the package file holding the updated software and installing it on the CF/HD in a proper
version directory.
The transfer procedure signals its availability to receive the package file by the following messages:
154
Draft Command language Draft
Once the Enter button is pressed by the User, if the transfer was successful, an informative message will be shown and the
system will start the received package integrity check procedure. If the received package passes the validation procedure,
the software extraction and installation takes place.
• By a package file already present in the 'C:\PKG' directory, installing it on the HD/CF in a proper version directory.
In this case the package file name specification is required by the User on the command line: sys update <package>. The
<package> string must be the name of a package file located in 'C:\PKG' or an absolute package file name (i.e. the full path
is required). If the specified package file is not present, the message “FILE 'C:\PKG\<package> NOT FOUND” will be
shown.
The procedure starts with a package integrity check. If the package passes the validation phase, the software extraction and
installation takes place.
If the package verifications and extraction is successful, the package file is always deleted.
If the procedure fails for any reason, the package deletion takes place only after the User confirmation.
The list of currently available package files can be displayed by the command sys display packages; while a package file can
be deleted by the command sys delete package.
Once a new software version is installed on the system, it can be set to be loaded at next system startup by the command
sys set boot version. The list of currently available versions can be displayed by the command sys display versions. Old
versions, not longer useful, can be deleted by the command sys delete version.
Tip
Interesting chapter: Section 51.4, “How to remotely upgrade the Abilis firmware”.
155
Draft Command language Draft
Drv Disk Label FAT Free space Used space Total space
Interface Sectors per block Cluster size Bootable
-------------------------------------------------------------------------------
C: HD-0 16 72 MB 52 MB 124 MB
IDE-PIO-32 1 2,048 Bytes YES
-------------------------------------------------------------------------------
D: HD-4 USB_DRIVE 32 976 MB 2 KB 976 MB
USB 2,048 Bytes YES
-------------------------------------------------------------------------------
THIS OPERATION MAY TAKE FEW MINUTES AND LOCKS ACCESS TO ALL DISKS.
PROCEED ANYWAY (N/Y)?y
THIS OPERATION WILL DELETE ALL EXISTING DATA FROM DRIVE 'D:'.
PROCEED ANYWAY (N/Y)?y
ENTER VOLUME LABEL (MAX. 11 CHARACTERs, PRESS <ENTER> FOR NO LABEL): udisk
COMMAND COMPLETED
156
Draft Command language Draft
ENTER VOLUME LABEL (MAX. 11 CHARACTERs, PRESS <ENTER> FOR NO LABEL): usb_drive
COMMAND EXECUTED
Drv Disk Label FAT Free space Used space Total space
Interface Sectors per block Cluster size Bootable
-------------------------------------------------------------------------------
C: HD-0 16 72 MB 52 MB 124 MB
IDE-PIO-32 1 2,048 Bytes YES
-------------------------------------------------------------------------------
D: HD-4 USB_DRIVE 32 976 MB 2 KB 976 MB
USB 2,048 Bytes YES
-------------------------------------------------------------------------------
157
Draft Command language Draft
PLEASE ENTER THE SIZE YOU WANT TO RESERVE FOR PARTITION 1 ('D:'),
THE REMAINING SPACE WILL BE ASSIGNED TO THE NEW PARTITION,
IN MBytes (0 TO EXIT): 400
WAITING THAT ALL FILES GET CLOSED (TYPE CTRL+C + ENTER TO STOP)... DONE.
158
Draft Command language Draft
ENTER VOLUME LABEL (MAX. 11 CHARACTERs, PRESS <ENTER> FOR NO LABEL): usb_drive
DO YOU REALLY WANT TO DELETE ALL EXISTING PARTITIONs ON HARD DISK '4' (N/Y)?y
WAITING THAT ALL FILES GET CLOSED (TYPE CTRL+C + ENTER TO STOP)... DONE.
ENTER VOLUME LABEL (MAX. 11 CHARACTERs, PRESS <ENTER> FOR NO LABEL): drive1
COMMAND COMPLETED
The list of available versions can be displayed by sys display versions command; while the current/new Boot Manager
configuration is displayed by sys display boot command.
159
Draft Command language Draft
COMMAND EXECUTED
[14:14:57] ABILIS_CPX:_d t
...
...
Caution
Releases above 7.0.0 of Abilis CPX stores in the RTC (The Real-Time-Clock chip) the UTC time rather than
the Local time. Boot Manager should be updated to the new version in order to manage the time correctly.
Unfortunately this cannot be done remotely, it requires a reinstallation of the Abilis CPX software (please
160
Draft Command language Draft
refer to How to prepare an Abilis Compact-Flash using a PC1). If BM is not reinstalled Abilis CPX 7.0
will work anyway but the time you see with SYS DISPLAY BOOT LOG will be UTC time, it will not be
adjusted to the Local Time as the new BM would do.
...
[12:32:42] ABILIS_CPX:_d t
Warning
Abilis CPX 7.0.0 is not compatible with very old BM. If your CF has been created from scratch with a
version 6.0.0 or later you will not have problems If your CF has been created with a version 5.x.x or earlier
you may have problems, in this situation we strongly suggest a complete reinstallation (please refer to How
to prepare an Abilis Compact-Flash using a PC2).
• If in the current session the configuration was modified but not saved, the command displays a warning message and
queries the User for proceeding with configuration saving or not.
In case of affirmative answer, the save conf command is executed, the reset of the Abilis CPX is not executed and the
Control Port prompt is shown.
VALIDATION IN PROGRESS...
VALIDATION SUCCESSFULLY EXECUTED
SAVE EXECUTED
• If a different version from the currently running one was set to be loaded at next system start up (sys set boot version), the
command displays a warning message and queries the User for proceeding with system restart.
161
Draft Command language Draft
Note
The -f option, force system warm start interrupting any operation that is in progress (e.g. configuration
saving, system updating, file uploading/downloading and so on).
ATTENTION!
FORCING "WARM START" IS DANGEROUS BECAUSE ANY OPERATION IN PROGRESS
WILL BE SUDDENTLY INTERRUPTED, SIMILARLY TO A POWER OFF EVENT.
THIS ACTION CAN CAUSE FILES CORRUPTION.
PROCEED ANYWAY WITH WARM START (N/Y)?y
In case of affirmative answer, the reset of the Abilis CPX is executed, while in case of negative answer the
Control Port prompt is shown.
[12:43:19] ABILIS_CPX:d d ?
162
Draft Command language Draft
The tunnel above is working correctly: Primary Link is READY, so the VPN is UP. In the screen-shot below, the Primary
Link is not working, so ISDN backup is guarantying the VPN working.
[12:43:19] ABILIS_CPX:d de ?
For example, here below is displayed the diagnostic of a Frame Relay resource:
163
Draft Command language Draft
This diagnostic shows the state of LMI and the state of the link.
This diagnostic display the state of LMI and DLCI, the troughput incoming and outcoming, etc..
[12:43:19] ABILIS_CPX:d s ?
164
Draft Command language Draft
A lot of information are available: number of characters sent and received, number of missing packets, number of P-Link
interruptions, number of seconds of ISDN backup calls, packets time arrival, and so on.
[12:43:19] ABILIS_CPX:d se ?
165
Draft Command language Draft
range [1..256]
D SE CTIP[:xxx] Display extended statistics of any
CTI port, where 'xxx' is a CTI port
identifier in the range [1..300]
Type the following command to show the extended statistics of a Packet Voice IP tunnel:
166
Draft Command language Draft
BAD-FORM | 0| 0| |
RESYNC | 0| 0| 0|
------------------------------------------------------------------------
-- Time arrival variation of voice frames after reordering (msec.) -----
------------------------------------------------------------------------
0- 20 | 0 ( 0% ) | 151-200 | 0 ( 0% ) |
21- 50 | 0 ( 0% ) | 201-300 | 0 ( 0% ) |
51-100 | 0 ( 0% ) | 301-600 | 0 ( 0% ) |
101-150 | 0 ( 0% ) | 601-xxx | 0 ( 0% ) |
------------------------------------------------------------------------
The following command allows have a complete list of the allowed options of the command:
[18:01:34] ABILIS_CPX:ping ?
Usage: ping <address> [-a] [-n count] [-l size] [-i TTL] [-v TOS] [-r count]
[-w timeout] [-z delay] [-f] [-p] [-m] [-s src_address]
[-t] [-ts] [-st nnn] [-std nnn]
Options:
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-t Echo requests are sent until interrupted by user.
-l size Send buffer size.
-f Set IP header "don't fragment" flag (DF).
-i TTL Time To Live.
-v TOS Type of service [use number or D, T, R, C].
-r count Record route for count hops.
-s src_address Set source address for outgoing requests.
-w timeout Timeout to wait for each reply [10..30000 msec].
-z delay Set time delay between consecutive ping requests
[0..300000 msec].
-p Show in/out interface of ping message [IP-xxx or INTERNAL].
-m Show MAC address of the response (host or gateway).
-ts Show timeStamp.
-st nnn Show IP-nnn resource char-in/out statistics.
-std nnn Show IP-nnn resource char-in/out differential statistics.
167
Draft Command language Draft
1 6 ms 6 ms 6 ms 192.168.11.253
Trace complete.
[18:01:34] ABILIS_CPX:tracert ?
Usage: tracert/traceroute <address> [-a] [-h max_hops] [-w timeout] [-z delay]
[-p] [-m] [-s src_address]
Options:
-a Resolve addresses to hostnames.
-h max_hops Maximum number of hops to search for target.
-s src_address Set source address for outgoing requests.
-w timeout Wait timeout for each reply [max. 30000 msec].
-z delay Set time delay between consecutive hosts [max. 300000 msec].
-p Show in/out interface of trace message [IP-xx or INTERNAL].
-m Show MAC address of the response (host or gateway).
5.15.3. Pingstat
This command pings a destination and retrieves the increments in CHAR-INPUT and CHAR-OUTPUT of the resource(s) used
to transmit and receive, and some statistics useful for making line performances analysis (easily importable in a spreadsheet).
168
Draft Command language Draft
[18:01:34] ABILIS_CPX:pingstat ?
Usage: pingstat <address> [-a] [-n count] [-l size] [-i TTL] [-v TOS] [-t]
[-w timeout] [-z delay] [-f] [-m] [-s src_address]
Options:
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-t Echo requests are sent until interrupted by user.
-l size Send buffer size.
-f Set IP header "don't fragment" flag (DF).
-i TTL Time To Live.
-v TOS Type of service [use number or D, T, R, C].
-s src_address Set source address for outgoing requests.
-w timeout Timeout to wait for each reply [10..30000 msec].
-z delay Set time delay between consecutive ping requests
[10..300000 msec].
-m Show MAC address of the response (host or gateway).
Outputs:
date Date when PING request is transmitted.
time Time when PING request is transmitted.
timeStamp Time elapsed from first request (milliseconds).
diffIn Number of incoming byte since the previous request.
diffOut Number of outgoing byte since the previous request.
RTT Round Trip Time of PING request and response (in msec).
BRI4-1
DSP:0 - good
POTS-1
skipped (no DSP present)
UG-1
skipped (no DSP present)
CB-1
skipped (no DSP present)
COMMAND COMPLETED
[11:58:24] ABILIS_CPX:d l
169
Draft Command language Draft
TEST DSP [card] [method] [action] [output] [msec] Executes DSPs test
Note
DSPs test is always performed at startup and it's logged. If the test detects a problem it attempts up to two
times to recover by resetting the DSP and repeating the test.
[18:01:34] ABILIS_CPX:trace ??
170
Draft Command language Draft
Tip
Interesting chapter: Section 51.19, “How to trace the internal events for debugging purposes”.
If no parameter is specified, the following message is displayed: “NO PARAMETER SPECIFIED: USING SAVED
VALUES...”, so the trace function is activated using the setting already saved through the commands trace param set and
trace param save. The first one modifies the trace parameters that will be used for further activations of the trace, while the
second saves, in the configuration file drivers.cfg, the parameters previously activated.
The trace param command shows the parameters settings of the internal events trace and its working mode; the information
shown will depend on the trace state.
• PO sets the list of ports (minimum 1, maximum 50) which can be traced; their values must be in the interval [0 - 999].
Ports to be traced, must be “RUNNING”, if not, the following message will be displayed “RES:xxx PORT NOT
PRESENT OR NOT RUNNING” and the trace function won't be activated; “xxx” stands for the identifier of the not
present or not running port. Refer to Section 5.8.7, “D PSTACK” to have more information about ports;
• SIZE sets the maximum allocable memory size for the trace function. If the parameter is not specified, all the available
memory will be used by the system for trace activating, except the needed quantity for system management. If the system
memory is not enough for activating the trace function, it won't be activated and the following message will be displayed
“NOT ENOUGH MEMORY TO RUN TRACE”;
• DATA sets the maximum allocable memory size for saving the single event, remaining optional parameters CMD, LSN and
TYPE make possible the activation of filters on the events traced.
Tip
It is possible to enable the automatic trace activation at system start-up, if the parameter tact, in general
system block, is set to YES.
171
Draft Command language Draft
[18:01:34] ABILIS_CPX:d g
If in the command row is not indicated any additional parameter, the trace will start using the settings defined during its
activation. The following optional parameters can be specified LSN, DATA, TYPE, CMD. In this way trace parameters setting
may be edited again.
If the trace is not active the following message will be displayed “TRACE INACTIVE”. By typing the following command,
an informative message about the command syntax and options will be shown.
By default, the whole content of the trace, starting from the beginning of the saving, it is transferred. It is also possible, by
using the proper optional parameter, to transfer only a part of the content:
If the trace buffer is empty or got empty by the command trace clear, the message “TRACE EMPTY” will be shown.
Before executing this command, the trace function has to be stopped, by using the command trace stop, otherwise the
message “TRACE RUNNING” will be displayed. If the trace is not active, the message “TRACE INACTIVE” will be
shown.
172
Draft Command language Draft
The transfer procedure signals its availability to transfer the trace file by the message “READY TO SEND TRACE
BUFFER...” When the transfer is completed the following message is shown: “TRACE BUFFER TRANSFER ENDED,
PRESS <ENTER> TO CONTINUE...”, after pressing the <ENTER> button, an informative message, “TRACE BUFFER
TRANSFER SUCCESSFULLY COMPLETED”, will be shown if it was successful.
The trace can also be transferred from the memory to a file with the command trace save <filename>. The file can be
downloaded with the command file get and deleted from disk with trace delete <filename>. For example:
COMMAND EXECUTED
[21:22:34] ABILIS_CPX:d i
173
Draft Command language Draft
Tip
The automatic tracer saving feature can be activated, if the parameter TSAVE, in general system block, is set
to YES. If the CTISYS port is traced and a FRMWR (Firmware warning) event occurs, all drivers which are
part of CTISYS (CTIDISA, CTIIAX, CTISIP, CTIH323, CTIGKC) autosave the trace. Up to 5 traces are
kept on disk, subsequent traces causes the older to be deleted. Each trace stores up to 900 kbytes before the
event, and up to 100 kbytes or 2 minutes after the event. Also system and debug log are saved in addition to
trace.
[18:01:34] ABILIS_CPX:d g
174
Draft Command language Draft
Note
Shown information is strictly technical and meaningless for the user; Abilis CPX technicians could need it
for detecting and solving eventual problems.
[12:43:19] ABILIS_CPX:debug ?
Additional parameters:
LAYER: Select resource lower layer [L2, LINK, LAN, IP, IPT, PPP, PPPOE]
<Optional, only if PROT: not specified>
PROT: Select protocol layer [LAPB, MLM, ML, IPLAN, PLINKE, PPP, POECLI]
<Optional, only if LAYER: not specified>
SIZE: Select debug buffer size [7..63 Kbytes] <Optional>
LSN: Lsn value [0..65534(dec) or 0000..0FFFE(hex), A] <Optional>
CMD: Command string. Strings holding spaces must be written
between quotation marks (e.g. CMD:"str1 str2 ...") <Optional>
Data are stored in a 6 KB size buffer. Depending on the resource type, where the command is executed on, this buffer could
not be enough and at the end of the visualization the following message will be displayed “INCOMPLETE INFORMATION:
BUFFER SIZE TOO SHORT”. By using the option SIZE, the user can eventually increase the maximum buffer size used by
the command. The indicated value (in KB) must be in the interval [7 - 63].
By using the options LSN and CMD it is possible to select the type of debugging information to be displayed.
For example, to show debugging information of an ADSL line, type the command debug res:ip-xx prot:ppp, where xx
is the number of the ip resource associated to the ADSL line. With the options LSN, it is possible to select the type of
debugging information to be displayed; if it is set to 0, it will be displayed the command help.
175
Draft Command language Draft
Usage:
LSN:0 == This help
LSN:1 == Complete debug
LSN:2 == Upper/Lower NCB status
LSN:3 == Layer states
LSN:4 == Link status
LSN:5 == Negotiated options
LSN:6 == Echo information
LSN:7 == RADIUS information
LSN:10 == Show CALL log
LSN:11 == Show PPP Negotiation log
LSN:20 == Clear CALL log
LSN:21 == Clear PPP Negotiation log
Possible events:
176
Draft Command language Draft
...
12/05/2011 10:48:15 [00221] I: DEBUG SIMULATE EXCEPTION
12/05/2011 10:48:16 [00029] E: PO1
12/05/2011 10:48:16 [00032] AUTO WARM START
12/05/2011 10:48:52 [00103] -------------------- NEW RUN --------------------
...
...
12/05/2011 10:52:26 [00222] I: DEBUG SIMULATE WDLIVE-1
12/05/2011 10:53:19 [00103] -------------------- NEW RUN --------------------
...
The log shows the following information after using this command:
[14:53:25] ABILIS_CPX:d l
...
11/05/2011 14:39:10 [00092] I: Pv-6 PLink:d2 SLink:ln
11/05/2011 14:39:28 [00092] I: Pv-5 PLink:RD SLink:ln
11/05/2011 14:39:28 [00092] I: Pv-6 PLink:RD SLink:ln
11/05/2011 14:52:23 [00394] I: DEBUG SIMULATE WDG RESET
11/05/2011 14:53:00 [00103] -------------------- NEW RUN --------------------
11/05/2011 14:53:02 [00362] I: WATCHDOG MFIDE3 FW Rev. 11
11/05/2011 14:53:02 [00163] I: SYSTEM RESET
...
If the reset does not take place, the only way to restart abilis is using the warm start command:
******************************************************************************
177
Draft Command language Draft
ATTENTION!
THE SYSTEM MUST BE RESTARTED WITH 'WARM START' COMMAND.
ALLOWED COMMANDs: 'CLOSE', 'EXIT', 'WARM START'.
******************************************************************************
...
12/05/2011 10:54:50 [00365] I: DEBUG SIMULATE BLOCKAGE
12/05/2011 10:55:53 [00103] -------------------- NEW RUN --------------------
...
COMMAND EXECUTED
...
12/05/2011 11:02:39 [00284] I: DEBUG SIMULATE TRACE AUTO SAVE
12/05/2011 11:04:39 [00275] I: TRACE AUTO SAVE: STARTED (TOUT)
12/05/2011 11:04:39 [00279] I: TRACE AUTO SAVE: TRACE STOPPED
12/05/2011 11:04:39 [00280] I: TRACE AUTO SAVE: TRACE SAVED
...
...
12/05/2011 11:06:44 [00079] I: DEBUG SIMULATE HEAP OVERFLOW
12/05/2011 11:06:44 [00030] E: P02
12/05/2011 11:06:44 [00135] MEMORY SUMMARY:
12/05/2011 11:06:44 [00136] TOT: 134,217,728
12/05/2011 11:06:44 [00137] FREE:59,870,240
178
Draft Command language Draft
179
Draft Draft
Chapter 6. Licencing
Luigi Demuro
Table of Contents
6.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
6.1.1. ABILIS ID and the class of product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
6.1.2. Managing licences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
6.1. Introduction
The introduction of licencing has been done by taking into consideration the products already purchased by our customer so
that they can upgrade their products with the latest release without loosing any functionality present up to release 6.5.x.
Note
This is only partially valid for Mini-Abilis equipped with FPanel watchdog that does not provide the
ABILIS-ID, where some functionalities will not be available after the upgrade to 7.0.
It's easy to retrieve this identifier from a remote Abilis using the commands d i or d g. The identifier is named ABILIS-ID.
[16:02:36] ABILIS_CPX:d i
ABILIS-ID: 2001
[16:04:14] ABILIS_CPX:d g
...
ABILIS-ID: 2001 <Read Only>
The ABILIS-ID parameter is used to know the class of the product, which is used to select which features are available out-
of-the-box.
Other features may be added purchasing additional licences and installing them using the steps in the chapter Section 6.1.2,
“Managing licences”.
180
Draft Licencing Draft
Examples:
Note
If there's no ABILIS-ID, it means that Abilis is not equipped with MFIDE device and so it belongs to FP
class.
Class Product
FP Former Mini-Abilis with FPANEL
0 Former Abilis Base-x with MFIDE2/MFIDE3
1 New Micro-Abilis (with BRI4-POTS4 board and MFLPC)
2 New Nano-Abilis (with MiniBRI1 board and MFLPC)
3 New Abilis Base-J with MFIDE3
4 New Mini-Abilis with MFIDE3
5 New Compact-Abilis (with ETH3-BRI4-POTS8 and MFPCI)
6 New Abilis Base-K with MFIDE3
181
number
service
SOFTPBXSoft- YES YES YES YES
Draft Licencing Draft
PBX
service
(OPC,
Table 6.3.Address
Licenced features
Book,
Click&Call, ...)
GPS GPS YES YES
resources
ACNT Accounting YES YES YES YES
service
TRFA Traffic YES YES YES YES YES
Analyzer
OSPF Open YES YES
Shortest
Path
First
protocol
FTPSRV FTP YES YES YES YES YES YES YES YES YES YES
server
SMTP SMTP YES YES YES YES YES
resource
POP3 POP3 YES YES YES YES YES
resource
RADIUS RADIUS YES YES YES YES
resource
VRRP VRRP YES YES
resource
POEAC PPP YES YES YES YES
Over
Ethernet
Access
Concentrator
ARCHIVEArchive YES YES YES YES
resource
CTIDISA CTI YES YES YES YES YES
DISA
service
CTIIAX CTI IAX YES YES YES YES YES YES YES YES YES YES
service
CTISIP CTI SIP YES YES YES YES YES YES YES YES YES YES
service
CTISMS CTI YES YES YES YES
SMS
service
AIPT Number 4 250 2 2 4 2 4 250 32 32
of AIPT
(Abilis
tunnel)
resources
[0,
1..250]
IKEHOSTS
Number 2 128 1 1 2 1 1 128 4 4
of IKE
hosts [0,
1..128]
(IPSEC/
IKE
resources)
182
Draft Licencing Draft
• Upload the text file in the directory C:\LICENCE of the Abilis CPX compact flash using FTP (please refer to FTP
protocol1)
• Upload the text file in the directory C:\LICENCE of the Abilis CPX compact flash using the command licence put for
XMODEM or the command licence put z for ZMODEM (please refer to chapter put command2)
• Copy and paste the licence text using the command licence set
Please enter the licence data and terminate with CTRL+Z + ENTER
(type CTRL+C + ENTER to abort):
Tcvk+otc1AmdPyqOXloJj0oZ3LXR/dkJrv1rQl0YyA6lG6by5rvyqdOYTxDoi1i8
ul2pW0BE9sOG1ansjjDAqInA0AoNZ19FgkzJAAi5StsLOsYze/OJZ13Bh+J9Zj/9
M/lCIepQJY4jvcALWddkVlY1O0I4xfCzOdNyTnODhsVl9wpl5fibZvaLnG+c5Jnt
prsOHu+xhfnnoBXyTjkt0SHvg0druqg39SVzKtOxd4YGSO646NfhgXrYLcjVPgPl
eRFmluzTTZtUQpQGYFmh5QWel6cyvVj9Ka5MxrSoStiOdeAnte71D8N6CluJxPYY
iS1KHVzl4zGfp2ADXE778Q==
[19:49:48] ABILIS_CPX:
Managing licences is easy trough the Abilis CP using the following commands:
[19:49:48] ABILIS_CPX:licence ?
183
Draft Licencing Draft
You can display the enabled features by the current licence using the command:
ACTIVE PERMISSIONS:
-----------|-----------|-------------------------------------------------------
Name |Value |Description
-----------|-----------|-------------------------------------------------------
ABILISID |2001 |Abilis CPX serial number
EXPIRY |NONE |Licence expiration date YYYY-MM-DD
DATACOMP |YES |Data compression service
IPLB |YES |IP Load Balancing service
LCS |YES |Last Calling number service
MULTILINK |YES |Resources over Multi-Links
SOFTPBX |YES |Soft-PBX service (OPC, Address Book, Click&Call, ...)
VMX |YES |VMX system
GPS |YES |GPS resources
ACNT |YES |Accounting service
TRFA |YES |Traffic Analyzer
OSPF |YES |Open Shortest Path First protocol
FTPSRV |YES |FTP server
SMTP |YES |SMTP resource
POP3 |YES |POP3 resource
RADIUS |YES |RADIUS resource
VRRP |YES |VRRP resource
POEAC |YES |PPP Over Ethernet Access Concentrator
ARCHIVE |YES |Archive resource
CTIDISA |YES |CTI DISA service
CTIIAX |YES |CTI IAX service
CTISIP |YES |CTI SIP service
CTISMS |YES |CTI SMS service
AIPT |250 |Number of AIPT (Abilis tunnel) resources [0, 1..250]
IKEHOSTS |128 |Number of IKE hosts [0, 1..128] (IPSEC/IKE resources)
184
Draft Draft
Table of Contents
7.1. System Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
7.2. Debug Log (Events Log) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
7.2.1. Displaying Log Debug saved on disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
7.2.2. Displaying ERR codes (D CODE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
7.3. Exceptions Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
7.4. LOG parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
The System Log is saved on the HD/CF in the file CPX.LOG (fixed size is 50 Kbytes) and updated every time
that an event to save occurs. New events are stored and the oldest ones are progressively deleted.
The System Log can be displayed in a running Abilis using the following command. The command d l ? shows the syntax.
[18:01:34] ABILIS_CPX:d l
185
Draft Logging functionalities Draft
Tip
Interesting chapters: Section 60.1, “System Log messages”.
System Log events can be simultaneously sent to the current Control Port session typing the following command.
[18:01:34] ABILIS_CPX:start l
Start System Log content real-time logging (Type CTRL+C + ENTER to stop):
Tip
The command allows to display the log file of another version:
[09:22:13] ABILIS_CPX:_d l ?
Information provided by Debug log can be sent to technical support using email address [email protected].
Events registered in the Debug Log are grouped in the following classes:
Events are stored in buffer of fixed length that is kept in memory. The buffer maintains the more recent events, eliminating
the oldest.
1
mailto:[email protected]
186
Draft Logging functionalities Draft
Note
Usually the Debug Log can store events for few days; however this time interval depends on the number and
the type of events to record, which can also change from customer to customer.
The Debug Log content is transferred from the memory to the file CPX.DBG in two cases: in correspondence to the user
request.
Note
The command is available also from MFIDE panel.
187
Draft Logging functionalities Draft
Tip
Refer to Chapter 61, Disconnection codes to know more about the list of ISDN and X.25 disconnection
codes.
The d ldme command displays the information in extended mode (i.e. the ISDN disconnection causes are decoded).
188
Draft Logging functionalities Draft
Debug Log can be simultaneously sent to the current Control Port session using start ldm or start ldme commands. Events
are displayed in the same time that they occurs and that they are recorded into the buffer in memory.
Start Debug Log content real-time logging (Type CTRL+C + ENTER to stop):
189
Draft Logging functionalities Draft
The Debug Log content can be cleared through the command c ldm.
Example:
Error codes are shown in the debug log and they are automatically decoded:
...
190
Draft Logging functionalities Draft
When an exception happens, detailed information are saved in the Exceptions Log file CPX.XCP.
[18:01:34] ABILIS_CPX:d le
LOG EMPTY
Tip
The command allows to display a log file of another version:
[09:22:28] ABILIS_CPX:_d le ?
The Events Log content can also be cleared through the command c le.
Note
The Exceptions Log contains a lot of information that are meaningless for the user, but that are very useful
for the Abilis CPX technicians for solving eventual problems.
• system log;
• drivers.cfg file;
• TRACE.CPX file.
191
Draft Logging functionalities Draft
Option Meaning
NO All the logging functionalities, alarms detection and
generation, above mentioned, are disabled.
ALL All the logging functionalities, alarms detection and
generation, above mentioned, are enabled.
+E The value ALL+E activates all the options and extended Log
of state changes. The value NO+E is meaningless so it is
ignored.
• setting LOG:DS+E, activates the extended logging functions for Debug Log and System Log;
• setting LOG:STA, activates the extended logging functions for System Log, SNMP traps generation and periodic detection
of alarm states.
Adding or deleting one or more functionalities without setting from the scratch the value of the parameters can be done using
+ and - characters.
Some examples:
• suppose the current value of is LOG:DSTA. By setting LOG:-A, the periodic detection of eventual alarm states is removed,
leaving unchanged all the remaining options; the final value is LOG:DST;
• suppose the current value of the parameter is LOG:ST. By setting LOG:+DA, the logging function of the events on the
Events Log and the periodic alarm detection are added to the already activated options; the final value is LOG:DSTA.
Note
The changes made on this parameter are immediately activated, without the need of initialization commands.
192
Draft Draft
Table of Contents
8.1. Console configurator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
8.2. Example of an off-line configuration creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
8.3. Console configurator options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
8.3.1. Example of an off-line input file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
8.3.2. Example of an off-line output file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Go to http://abilis.antek.it/downloads/cpx2k/download.html and click the System and tools link of the firmware Release
which you want to use; in the following page, download the “Console configurator” utility (config.exe).
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
Note
Some command are meaningless and they cannot be used, as for example statistics and diagnostic
commands.
193
Draft Console configurator Draft
• If in the folder where config.exe is saved exists a drivers.cfg file, it will be loaded.
• If in the folder where config.exe is saved there isn't a drivers.cfg file, the utility will ask to create a new one, as
follow:
By answering Y and pressing Enter a new drivers.cfg will be created with a basic configuration.
Logged as SUPERUSER
[10:17:57] ABILIS_CPX:
3. At the end of the configuration writing, save the changes with save conf command.
194
Draft Console configurator Draft
SAVE EXECUTED
Warning
Every software release has its own config.exe file that creates and reads drivers.cfg files;
config.exe and drivers.cfg are compatible for releases that differs only by the last digit.
Converting drivers.cfg files of previous releases version to the current one can be done using the
utilities convcfg.exe or convcfgw.exe. These utilities can be downloaded from Abilis technical
website - download section1.
Tip
This options are available by executing the program from a MS-DOS shell.
d r
a r pr:1 in:telnet out:telnet cdi:* udi:tln
a r pr:2 in:* out:telnet cdi:* udi:tln
d r
quit
y
The example shows how to have the config.exe program to execute the previously listed commands, stored in the
BatchCom.txt file:
195
Draft Console configurator Draft
Logged as SUPERUSER
[10:24:29] ABILIS_CPX:d r
---+--------+--------+---------------+---------------+------------+------------
PR |IN |OUT |CDI |CDO |UDI |UDO
|NEXT |CGI |CGO |PIDI |PIDO
| |IPSRC |IPDEST |FFO
-------------------------------------------------------------------------------
0 * Cp * * CP *
-------------------------------------------------------------------------------
COMMAND EXECUTED
COMMAND EXECUTED
[10:28:36] ABILIS_CPX:d r
[17:29:15] ABILIS_CPX:quit
SAVE EXECUTED
[17:29:21] ABILIS_CPX:
Program exits.
Suppose to enter the d ver command to the off-line configurator command line interpreter after the previous line execution.
A copy of the program output will be saved in text format in the specified file. Here it is the contents of Output.txt file:
196
Draft Console configurator Draft
Logged as SUPERUSER
[17:44:46] ABILIS_CPX:exit
Program exits.
197
Draft Draft
Table of Contents
9. Voip card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
9.1. Voip card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
9.2. POTS-X device activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
9.3. CTI routing configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
9.3.1. CTI Routing table configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
10. ADSL modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
10.1. ADSL modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
10.2. ADSL-X device activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
10.3. ADSL-X resource diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
10.3.1. ADLS-X resource diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
10.3.2. ADSL-X resource statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
11. GSM-UMTS BOX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
11.1. GSM-BOX and UMTS-BOX devices activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
11.1.1. UG device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
11.1.2. CELLBOX fake device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
11.1.3. CELL device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
11.1.4. CODEC device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
11.1.5. SIMEMU device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
11.2. CTI Routing configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
11.2.1. CTI Routing table configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
11.3. LCS - Last Calling number Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
11.3.1. LCSG - Last Calling number Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
11.3.2. LCST - Last Calling number Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
11.4. Connecting UMTS-BOX2 to Simbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
11.5. UMTS-BOX2 sim remotization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
11.6. CTI GSM/UMTS ports diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
11.6.1. Diagnostics of CTI GSM/UMTS ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
11.6.2. Statistics of CTI GSM/UMTS ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
11.7. How to update UMTSBOX-2 firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
12. Simbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.1. Simbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.2. Simbox device activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.3. Connecting UMTS-BOX2 to Simbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
12.4. UMTS-BOX2 sim remotization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
12.5. How to update Simbox firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
13. Citobox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.1. Citobox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.2. Citobox and GPIO devices activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.3. CTI port configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
13.4. CTI routing configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
13.4.1. CTI Routing table configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.5. Diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.5.1. Citobox diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.5.2. Citobox Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.6. How to update Citobox firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
14. RJS - RJ Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
14.1. RJS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
14.2. RJS device activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
14.3. How to update RJS firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
15. UMTS Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
15.1. UMTS Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
199
Draft Draft
Table of Contents
9.1. Voip card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
9.2. POTS-X device activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
9.3. CTI routing configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
9.3.1. CTI Routing table configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
COMMAND EXECUTED
Caution
After adding or setting the device active, you must restart the Abilis to make the device running (use the
command warm start to reboot the Abilis).
200
Draft Voip card Draft
• Abilis has the following CTI ports configuration: ports 101 and 102 are toward the PBX;
[18:22:32] ABILIS_CPX:a ctir pr:3 type:ctov sr:clus2 poo:g1 coders:g.711 sp:64000 cdi:* sc:no dj:0
COMMAND EXECUTED
[18:22:56] ABILIS_CPX:a ctir pr:4 type:vtoc poi:g1 ds:clus1 coders:g.711 sp:64000 cdi:3* next:u sc:
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
3 CtoV Clus2 G1 * *
NO ANY NO Dft * *
64000 NO 0 40 Sys Sys * *
NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
201
Draft Voip card Draft
-------------------------------------------------------------------------------
4 VtoC G1 Clus1 1* *
UNLIMITED ANY NO Dft * *
64000 NO 0 40 Sys Sys * *
NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
5 TR G1 G2 * u*
-------------------------------------------------------------------------------
6 TR G2 G1 * *
-------------------------------------------------------------------------------
The routing PR:4 routes calls coming from G1 ports to internal cluster Clus1, while the routing PR:3 accepts calls from
internal cluster Clus2 and forwards them to toward the other VoiP port.
202
Draft Draft
Table of Contents
10.1. ADSL modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
10.2. ADSL-X device activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
10.3. ADSL-X resource diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
10.3.1. ADLS-X resource diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
10.3.2. ADSL-X resource statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Tip
Interesting chapters:
Warning
The number of ADSL StarModem which can be connected to the same USB 1.1 OHCI/UHCI controller is
limited. Refer to Section 2.10.1.3, “Isochronous mode” to havo more information about isochronous mode.
COMMAND EXECUTED
203
Draft ADSL modem Draft
Caution
After adding or setting the device active, you must restart the Abilis to make the device running (use the
command warm start to reboot the Abilis).
RES:Adsl-1 --------------------------------------------------------------------
Run DESCR:
LOG:DS max-vc:1 aal5-max-payload:2100 aal5-payload-rxbuf:30
usb-rx-bufsize:1728 usb-rx-buf:1 usb-tx-bufsize:3200
The default parameters are sufficient to make the device working properly.
COMMAND EXECUTED
204
Draft ADSL modem Draft
Caution
Remember to save the configuration to save changes permanently (save conf).
Tip
Interesting chapters:
Section 52.8, “How to share a single Internet connection among multiple computers”;
Section 52.3, “How to assign several IP addresses to the same LAN port”.
d d adsl-x / d de adsl-x Shows diagnostic information, such as the state of the resource, the modem MAC
address, S/N ratio and loop attenuation, the bandwidth of download and upload, the
input and output throughput.
RES:Adsl-1 --------------------------------------------------------------------
Adsl-EDT-"Only-Voice"
MODEM-STATE:CONNECTED MODEM-TYPE:StarModem-UM1050
MODEM-FAILURE:NONE MODEM-USB-RX-MODE:ISO
MODEM-MAC:00-30-0A-4B-BF-C1 MODEM-USB-RX-BW:2120000
------------------------------------------------------------------------
ADSL-STATE:UP ADSL-TYPE:Annex-A
ADSL-TX-SPEED:320000 ADSL-RX-SPEED:1504000
ADSL-TX-SN-MARGIN:31 ADSL-RX-SN-MARGIN:33
ADSL-TX-ATTENUATION:10 ADSL-RX-ATTENUATION:15
- ATM level virtual channel diagnostics --------------------------------
VPI VCI State Bw-Out Bw-In 5sec-Thr-Out 5sec-Thr-In
5min-Thr-Out 5min-Thr-In
------------------------------------------------------------------------
8 35 UP 289811 1362113 1584 2536
1016 1664
------------------------------------------------------------------------
Note
Additional diagnostics about S/N ratio and loop attenuation are shown only if a Starmodem is used.
Tip
Interesting chapter: Section 54.3.3, “Why the xDSL line is slow?”.
d s adsl-x / d se adsl-x Shows statistics information, such as the number of adsl down/start, the number of
modem disconnection/connection, the number of errors on the adsl line, ecc.
205
Draft ADSL modem Draft
RES:Adsl-1 --------------------------------------------------------------------
Adsl-EDT-"Only-Voice"
--- Cleared 0 days 12:19:27 ago, on 13/12/2010 at 21:12:53 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
ADSL-DOWN | 0| |MODEM-DISC | 0| |
ADSL-UP | 1| |MODEM-CONN | 1| |
AUTORST-A | 0| |AUTORST-U | 0| |
MANUALRST | 0| |MISALIGNED | 0| |
ATM-INV-CEL| 0| |ATM-VC-UNK | 0| |
------------------------------------------------------------------------
VPI:8 VCI:35
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CELLS | 610007| 366324|AAL5-SDU | 371548| 313908|
AAL5-CHAR | 15136608| 12397702|ERRORS | 0| 0|
------------------------------------------------------------------------
Tip
Interesting chapter: Section 54.3.3, “Why the xDSL line is slow?”.
206
Draft Draft
Table of Contents
11.1. GSM-BOX and UMTS-BOX devices activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
11.1.1. UG device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
11.1.2. CELLBOX fake device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
11.1.3. CELL device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
11.1.4. CODEC device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
11.1.5. SIMEMU device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
11.2. CTI Routing configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
11.2.1. CTI Routing table configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
11.3. LCS - Last Calling number Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
11.3.1. LCSG - Last Calling number Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
11.3.2. LCST - Last Calling number Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
11.4. Connecting UMTS-BOX2 to Simbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
11.5. UMTS-BOX2 sim remotization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
11.6. CTI GSM/UMTS ports diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
11.6.1. Diagnostics of CTI GSM/UMTS ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
11.6.2. Statistics of CTI GSM/UMTS ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
11.7. How to update UMTSBOX-2 firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
GSM-BOX and UMTS-BOX activation are based on four devices: UG, CELL, CODEC and SIMEMU.
In addition there is a fake device named CELLBOX which acts as a container of all the devices that belongs to a GSM-BOX
or UMTS-BOX; easily it permits to activate CELL, CODEC and SIMEMU devices with a single command.
Tip
Interesting chapters:
11.1.1. UG device
The activation of the UG device adds in the Abilis system CTI ports from 201 to 232. Every CTI port corresponds to a SIM
card which is managed by a GSM/UMTS modem.
Add the device to the Abilis system with the following command.
207
Draft GSM-UMTS BOX Draft
COMMAND EXECUTED
The device may already exist in the system, but may not yet be active. Set it active with the command:
Caution
After adding or setting the device active, you must restart the Abilis to make the device running (use the
command warm start to reboot the Abilis).
s p ctip:<port_number> <parameter>:<value>
CTIP:201 DESCR:
Act card:UG-1<1>
Run OPSTATE:UP LOG:NO TYPE:NET-PUBLIC
signalling:CELL
mode:CELL VOICE-ROAMING:DISABLED NUM:*
PDN-MODE:AUTO PDN-ROAMING:DISABLED
PDN-APN:
RSIM:NO
CTIP:202 DESCR:
208
Draft GSM-UMTS BOX Draft
Act card:UG-1<2>
Run OPSTATE:UP LOG:DS TYPE:USER
signalling:CELL
mode:CELL VOICE-ROAMING:DISABLED NUM:*
PDN-MODE:AUTO PDN-ROAMING:DISABLED
PDN-APN:tre.it
LOOP:NO PIN:# GAIN-IN:SYS CODEC-GAIN-IN:SYS
DIALT:5 PIN2:# GAIN-OUT:SYS CODEC-GAIN-OUT:SYS
RSIM:NO
LCS-GROUP:NONE
OPSTATE operative state [DOWN: the port is inoperative (it refuses incoming calls and doesn't allow outgoing
calls); UP: the port is fully operative].
TYPE Sets the port type with respect to the customer's network [USER, NET-PUBLIC].
signalling Selects the port signalling protocol; only the AT-protocol is available for GSM/UMTS devices so a
fixed value is used [CELL].
mode Selects the layer 1 protocol mode; for GSM/UMTS is used a fixed value [CELL].
NUM Phone number assigned to CTI port. The available values are:
• r*: enforces the presentation restricted: the Calling Number is not passed to the device;
• nnnn: exactly this number is passed as Calling Number to the device; attributes can be specified as
number prefixes
• nnnn*: the Calling Number received from CTIR is modified by replacing first four digits with
nnnn; attributes can be specified as number prefixes
• nnnn??: similar to nnnn* with the difference that only an exact number of digits as many ? is
passed after nnnn;
• ????: only an exact number of digits as many ? is passed after the nnnn.
PDN-MODE Locks the PDN mode or leaves HC15 to choose the better available [AUTO, GPRS, UMTS]
209
Draft GSM-UMTS BOX Draft
Caution
To activate the changes made on the upper case parameters, execute the initialization command init ctisys;
while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required
(i.e. with warm start command).
Caution
In order to avoid that the SIM card gets blocked It is ALWAYS better to remove the PIN code and all
additional services (e.g.: messagebox)
Tip
Typically, the default configuration of CTI GSM/UMTS port already allows the GSM-BOX or UMTS-BOX
to work properly.
Add the device to the Abilis system with the following command.
The device may already exist in the system, but may not yet be active. Set it active with the command s act dev:cellbox-1.
COMMAND EXECUTED
210
Draft GSM-UMTS BOX Draft
Caution
After adding or setting the device active, you must restart the Abilis to make the device running (use the
command warm start to reboot the Abilis).
Add the device to the Abilis system with the following command.The device may already exist in the system, but may not yet
be active: set it active with the command s act dev:cell-1.
COMMAND EXECUTED
COMMAND EXECUTED
Caution
After adding or setting the device active, you must restart the Abilis to make the device running (use the
command warm start to reboot the Abilis).
Tip
It is recommended to use the CELLBOX command to add all devices needed with a single instruction
211
Draft GSM-UMTS BOX Draft
Add the device to the Abilis system with the following command; the device may already exist in the system, but may not
yet be active: set it active with the command s act dev:codec-1. This command associate the CODEC-1 to the CELL-1 and
CELL-2 devices.
COMMAND EXECUTED
Caution
After adding or setting the device active, you must restart the Abilis to make the device running (use the
command warm start to reboot the Abilis).
Tip
It is recommended to use the CELLBOX command to add all devices needed with a single instruction
Add the device to the Abilis system with the following command; the device may already exist in the system, but may not
yet be active: set it active with the command s act dev:simemu-1. This command associate the SIMEMU-1 to the CODEC-1
device.
212
Draft GSM-UMTS BOX Draft
COMMAND EXECUTED
Caution
After adding or setting the device active, you must restart the Abilis to make the device running (use the
command warm start to reboot the Abilis).
Tip
It is recommended to use the CELLBOX command to add all devices needed with a single instruction
• Abilis has the following CTI ports configuration: ports 31 and 32 are toward the PBX, ports 33 and 34 toward the ISDN
lines and ports 201 and 202 toward GSM/UMTS gateway.
213
Draft GSM-UMTS BOX Draft
Tip
Interesting chapters:
Warning
At this moment GSM or UMTS gateway supports only G.711 coder. Other codecs are supported by
transcoding through additional ISDN cards.
[18:22:32] ABILIS_CPX:a ctir pr:3 type:ctov sr:clus2 poo:g3 coders:g.711 sp:64000 cdi:* sc:no dj:0
COMMAND EXECUTED
[18:22:56] ABILIS_CPX:a ctir pr:4 type:vtoc poi:g1 ds:clus1 coders:g.711 sp:64000 cdi:3* next:u sc:
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
3 CtoV Clus2 G3 * *
NO ANY NO Dft * *
214
Draft GSM-UMTS BOX Draft
-------------------------------------------------------------------------------
5 TR G1 G2 * u*
-------------------------------------------------------------------------------
6 TR G2 G1 * *
-------------------------------------------------------------------------------
The routing PR:4 routes calls coming from G1 ports to internal cluster Clus1, while the routing PR:3 accepts calls from
internal cluster Clus2 and forwards them to GSM/UMTS gateway.
The NEXT parameter in the routing PR:4 is set to UNLIMITED; if call fails, it would try to use next routings.
Tip
Interesting chapter: Section 42.6, “CTI Router”.
215
Draft GSM-UMTS BOX Draft
[18:33:54] ABILIS_CPX:a ctir pr:3 type:ctoc sr:Abilis2 ds:clus1 cdi:3* coders:g.711 sp:64000 sc:no
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
...
216
Draft GSM-UMTS BOX Draft
-------------------------------------------------------------------------------
3 CtoC Abilis2 Clus1 3* *
NO ANY NO Dft * *
64000 NO * * Sys Sys * *
* * 0 40 NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO
G.711
-------------------------------------------------------------------------------
4 CtoV Clus2 G3 * *
NO ANY NO Dft * *
64000 NO 0 40 Sys Sys * *
NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
5 VtoC G1 Clus1 3* *
UNLIMITED ANY NO Dft * *
64000 NO 0 40 Sys Sys * *
NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
6 TR G1 G2 * u*
-------------------------------------------------------------------------------
7 TR G2 G1 * *
-------------------------------------------------------------------------------
The routing PR:3 accepts the calls coming from the remote cluster Abilis2 toward numbers starting with 3 and forward
them to internal cluster Clus1. The call will be intercepted by the routing PR:4 and forwarded to GSM gateway.
Tip
Interesting chapters:
[18:46:24] ABILIS_CPX:a ctir pr:3 type:vtoc poi:g3 ds:clus2 cdi:* coders:g.711 sp:64000 cdo:711 sc:
COMMAND EXECUTED
[18:49:41] ABILIS_CPX:a ctir pr:3 type:ctov sr:clus1 poo:g1 cdi:711 coders:g.711 sp:64000 sc:no dj:
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
217
Draft GSM-UMTS BOX Draft
-------------------------------------------------------------------------------
0 DATA * CtiSLink * u*
NO ANY NO Dft NO * *
* *
'SgiAllowed' *
-------------------------------------------------------------------------------
1 DATA CtiSLink G2 * u*
-------------------------------------------------------------------------------
2 CtoV * G1 'Nodo' n'CDI.S2'
-------------------------------------------------------------------------------
3 CtoV Clus1 G1 711 *
NO ANY NO Dft * *
64000 NO 0 40 Sys Sys * *
NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
4 VtoC G3 Clus2 * 711
NO ANY NO Dft * *
64000 NO 0 40 Sys Sys * *
NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
5 CtoC Abilis2 Clus1 3* *
NO ANY NO Dft NO * *
64000 NO * * Sys Sys * *
* * 0 40 NO Sys * *
Sys AUTO AUTO Sys Sys
G.711
-------------------------------------------------------------------------------
6 CtoC Abilis2 Clus1 3* *
NO ANY NO Dft NO * *
64000 Sys * * Sys Sys * *
* * * * NO Sys * *
Sys AUTO AUTO Sys Sys
G.711
-------------------------------------------------------------------------------
7 CtoV Clus2 G3 * *
NO ANY NO Dft NO * *
64000 NO 0 40 Sys Sys * *
NO Sys * *
Sys AUTO AUTO Sys Sys Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
8 VtoC G1 Clus1 3* *
UNLIMITED ANY NO Dft NO * *
64000 NO 0 40 Sys Sys * *
NO Sys * *
Sys AUTO AUTO Sys Sys Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
9 TR G1 G2 * u*
218
Draft GSM-UMTS BOX Draft
-------------------------------------------------------------------------------
10 TR G2 G1 * *
-------------------------------------------------------------------------------
The routing PR:4 accepts the calls directed to GSM gateway and forward them to internal cluster Clus2, setting as Called
Number Output (CDO) the number 711 (it supposes that this is the Post Operator number). The call generated, will be
intercepted by routing PR:3 and forwarded to G1 group (ISDN ports of PBX).
Tip
Interesting chapters:
219
Draft GSM-UMTS BOX Draft
• ctip 101 (for example number 200) make a call toward a cell phone (number 320123456)
• the call is routed through the UMTS BOX using port #201 (which corresponds to a sim whose number is 320654321)
• the LCS saves calling and called numbers in the lcs table
• a call is received by UMTS BOX: the called number is 320654321, the calling number is 320123456
• the call is automatically routed toward ctip 101 (number 200)
• CTISYS resource
• LCSG - last calling number group
• LCS-GROUP parameter of the ctip resource
• IAX-LCS-GROUP parameter for iax users
• SIP-LCS-GROUP parameter for sip users
• LCS and LCST parameters of CTIR resource
• LCST - Last Calling number Table
LCSG configuration holds all the rules required to manipulate the TON for CD and CG.
----+--------------------------------------------------------------------------
ID: |[DESCR:]
|CPS-LIST: NAT-PREFIX: INT-PREFIX: COUNTRY-CODE:
|CB-PERMIT-CD:
|CB-UNK-CDO: CB-NAT-CDO: CB-INT-CDO:
|CB-SDO: CB-SGO: CB-CDO-DFT:
|[CTI Ports, CTI Clusters, IAX users, SIP users]
----+--------------------------------------------------------------------------
*** NO LCS GROUPs DEFINED ***
220
Draft GSM-UMTS BOX Draft
-----+----------------------+----------------------+---------------------+-----
Group| Called | Calling | Updated on (GMT) |Tout
| | | [Expiry on (GMT)] |
-----+----------------------+----------------------+---------------------+-----
1 ux12345678 ux01 16/04/2009 16:02:59 6
16/04/2009 22:02:59
-----+----------------------+----------------------+---------------------+-----
1 ux99999999 ux02 16/04/2009 16:03:20 NONE
-----+----------------------+----------------------+---------------------+-----
Allowed filters:
221
Draft GSM-UMTS BOX Draft
Sim remotization can be used only with UMTS Box2 (old devices like GSM BOX and UMTS BOX don't support sim
remotization).
Note
The minimal version number of the UMTS-BOX2 in order to use SIM remotization is 19.The version is
visible through the command D USBDEV:
The most important parameter to manage SIM remotization is RSIM. It can have different values:NO, PERMANET and
DYNAMIC. Other parameters must be configured if PERMANENT value is chosen.
Value Meaning
NO SIM remotization disabled
PERMANENT the SIM remotization is enabled with configured values (see
below)
DYNAMIC the SIM remotization is enabled with configured values in
ctip preferences (see below)
Assuming that the ctip port assigned to UMTS-BOX2 is 201, use the following command to show its configuration.
CTIP:201 DESCR:
Act card:UG-1<1>
Run OPSTATE:UP LOG:NO TYPE:NET-PUBLIC
signalling:CELL
mode:CELL VOICE-ROAMING:DISABLED NUM:*
PDN-MODE:AUTO PDN-ROAMING:DISABLED
PDN-APN:
RSIM:NO
In the example above, sim remotization is disabled. Use the following command to set the rsim parameter to permanent:
222
Draft GSM-UMTS BOX Draft
COMMAND EXECUTED
Note that some additional parameters are now visible. The following table shows their meaning:
Use the command s ctip:xxx parameter:value to set a specific parameter. For instance use s p ctip:201 rsim-res:rsim-1 to
set the rsim resource to rsim-1 value.
The following example shows how to set the rsim parameter to dynamic:
COMMAND EXECUTED
Note that the only parameter to configure in this case is RSIM-RES (rsim resource). The same parameters used for
PERMANENT mode can be configured for the DYNAMIC mode. Use the command s s ctip:xxx rsim:set par:val [par:val]
to configure them. They are stored automatically as CTIP preferences rather than being normal configuration parameters.
223
Draft GSM-UMTS BOX Draft
COMMAND EXECUTED
Caution
The loading time of the remote SIM is not predictable. The full SIM load can take less than a minute or
several minutes, it depends on network speed and round trip time.
PDN-STATE The overall state of the PDN (Packet Data Network) connection.
SIGNAL Signal quality (0 = -113 dBm or less, 1..30 = -111.. -53 dBm, 31 =
-51 dBm, or greater 99 = not known or not detectable, 100 = N/A
value when device isn't connected)
RXQUAL The value of BER (bit error rate) of the existing call.
224
Draft GSM-UMTS BOX Draft
PWR-CONS-mA The value of the current power consumption of the GSM module.
CELL-STATE Shows the state of the USB interface of the GSM USB module.
CODEC-STATE Shows the state of the USB interface of the CODEC module.
SIMEMU-STATE Shows the state of the USB interface of the SIMEMU (PIC)
module.
SIMEMU-ERR Shows the reason of the not READY GSM SIMEMU (PIC).
CTIP:202 ----------------------------------------------------------------------
SIM_3204748405_(EX_RETENOI_3276270837)
OPSTATE:UP STATE:UP
------------------------------------------------------------------------
CH: STATE: [Q932-STATE:] CG: [SG:] CD: [SD:]
------------------------------------------------------------------------
*** All channels disconnected ***
------------------------------------------------------------------------
VOICE-STATE:READY PDN-STATE:READY SMS-STATE:READY
------------------------------------------------------------------------
NET:H3G ROAMING:NO NET-MODE:UMTS
SIGNAL:17 SIGNAL-dbm:-79 RXQUAL:0
IMEI:35739601224756 IMSI:22299220520719 SIM:N/A
SMSC:+393916263333
PWR-CONS-mA:N/A TEMP-Celsius:N/A CODEC-ISO-BW:1304000
CELL:CONNECTED CELL-STATE:READY CELL-ERR:NONE
CODEC:CONNECTED CODEC-STATE:READY CODEC-ERR:NONE
SIMEMU:CONNECTED SIMEMU-STATE:READY SIMEMU-ERR:NONE
CTIP:202 ----------------------------------------------------------------------
SIM_xxxxxxxxxx
OPSTATE:UP STATE:UP
------------------------------------------------------------------------
CH: STATE: [Q932-STATE:] CG: [SG:] CD: [SD:]
------------------------------------------------------------------------
1 07-LOC-ALERT 779 xxxxxxxxxx
------------------------------------------------------------------------
225
Draft GSM-UMTS BOX Draft
Tip
CODEC-ISO-BW shows the USB Isochronous bandwidth reserved on the USB controller to serve the CTIP.
The audio codec always reserve the bandwidth of TWO CTIP even if one is disabled.
This is what appears in the CTIR Connection (from PBX port group to GSM gateway):
ID Type Input Output PR State Cgi (Calling In) Cdo (Called Out)
----- ---- -------- -------- --- ------ ------------------ --------------------
1999 VtoC 31 G1 Clus1 7 ACTIVE 711 3482233445
2000 CtoV Clus2 202 G3 5 ACTIVE 711 3482233445
d s ctip / d se ctip Shows the statistics of all the CTI ports such as the number of calls (successfull and
unsuccessfull), the duration of the calls, the number of connection/disconnection of
the GSM/UMTS device, the number of connection/disconnection of the audio-codec
device and the number of CELL packets exchanged.
CTIP:201 ----------------------------------------------------------------------
SIM-3883634235
--- Cleared 1 days 20:30:24 ago, on 25/10/2010 at 21:36:22 -------------
Layer 3 Q.931
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FAIL-CALL | 0| 0|SUCC-CALL | 0| 0|
TIME-CALL | 0| 0|
------------------------------------------------------------------------
Layer 2 PDN
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
PDN-CALL | | 0|PDN-CHAR | 0| 0|
PDN-TIME | | 0|PDN-FRM | 0| 0|
PDN-TIME-15| | 0|PDN-LOST | 0| 0|
| | |PDN-LONG | 0| 0|
------------------------------------------------------------------------
Layer 2 SMS
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SMS | 0| 0|SMS-FAIL | 0| 0|
------------------------------------------------------------------------
Layer 1 CELL (GSM/UMTS)
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CELL-DISC | 0| |CODEC-DISC | 0| |
CELL-CONN | 1| |CODEC-CONN | 1| |
CELL-MANRST| 0| |CODEC-RST | 0| |
CELL-AUTRST| 0| |CODEC-UND | | 0|
226
Draft GSM-UMTS BOX Draft
CELL-HWRST | 0| |CODEC-HWRST| 0| |
CELL-OVR | 0| |CODEC-OVR | 0| |
CELL-PCK | 62814| 31405|CODEC-PCK | 160264475| 160265051|
------------------------------------------------------------------------
SIMEMU-DISC| 0| | | | |
SIMEMU-CONN| 1| | | | |
SIMEMU-RST | 0| | | | |
SIMEMU-PCK | 5| 3| | | |
SIMEMU-PCKH| 0| 0| | | |
------------------------------------------------------------------------
RSIM CELL (UMTS)
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RSIM-SUCC | | 0|RSIM-PCK | 0| 0|
RSIM-FAIL | | 0|RSIM-CHAR | 0| 0|
RSIM-DISC | 0| 0|SIM-RESET | 0| |
------------------------------------------------------------------------
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
The UMTSBOX-2 firmware can be upgraded only if the current version is equal or greater than 9. Use the following
command to check the current version of firmware. In the example below firmware version is equal to 19.05.
[15:44:26] ABILIS_7.0:_
if the above condition is met, you can add the BLUSB device typing the following command and then restart abilis1.
COMMAND EXECUTED
Updating steps:
1
http://www.abilis.net/fileadmin/tutorial/en/ch36s07.html
227
Draft GSM-UMTS BOX Draft
• Upload the file umtsbox2.bin into the execution version directory (for example c:\7-0-2) without changing the file name.
The upload can be done using the file put command2 or the FTP resource3.
• use the command usbdev fw upload id:xx, where xx stands for the ID of the “USB UMTS-BOX2” (11 in the example
above).
The updating procedure can last for minutes and the result can be displayed typing D L. If the update is successful, next log
will be displayed, otherwise an error log is generated.
Caution
In case of failure of updating procedure, the previous version of firmware can be restored unplugging and
plugging in the usb cable of UMTSBOX
228
Draft Draft
Table of Contents
12.1. Simbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.2. Simbox device activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.3. Connecting UMTS-BOX2 to Simbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
12.4. UMTS-BOX2 sim remotization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
12.5. How to update Simbox firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
12.1. Simbox
Simbox is a device which holds up to 32 sims. It allow to use sim remotization only having an UMTS BOX2 device.
Refer to chapter Section 2.10.6, “Simbox” to have more information about the hardware.
Tip
Interesting chapters:
COMMAND EXECUTED
229
Draft Simbox Draft
Caution
After adding or setting the device active, you must restart the Abilis to make the device running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
Caution
The resource must be initialized using init res:simbox-1.
The default parameters are sufficient to make the device working properly.At most a password may be configured to protect
the access, but of course the same password must be used in all UMTS-BOX2 which need to connect to the SIMBOX.
Tip
Interesting chapter:
Use the classic Abilis CPX commands syntax to set the password (RSIM-PWD parameter):
COMMAND EXECUTED
230
Draft Simbox Draft
Caution
The resource must be initialized using init res:simbox-1.
COMMAND EXECUTED
COMMAND EXECUTED
Remember to save the configuration1 and that on a working Abilis, a system restart2 is required. Below there's a short
description of the most important parameters:
1
http://www.abilis.net/fileadmin/tutorial/en/ch05s11.html#ch.commands.save
2
http://www.abilis.net/fileadmin/tutorial/en/ch36s07.html
231
Draft Simbox Draft
LOG: State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E]
(D: Debug Log; S: System Log; A: Alarm view; L: Local audible alarm;
T: SNMP traps; +E: Extended Log of state changes, see ref. manual)
ACT: Operation activation [NO, YES]
mxps: Maximal size of packets exchanged with upper driver (UMTS or SIMBOX)
[300..2048]
sesnum: Number of sessions [1..250]
sess-buf: Number of buffers in each channel receiver [1..10]
udp-locport: Local UDP port [1..65535]
TOS: Type Of Service octet or Differentiated Services Field (DS):
-' p-t', i.e. PRECEDENCE and TOS values, where 'p' can be [0..7]
and 't' can be [N=None, D=Min. Delay, T=Max. Throughput, R=Max.
Reliability, C=Min. Monetary Cost]
- 'bbbbbb', i.e. DS value bit by bit, where 'b' can be [0, 1]
RP1-DLY: Time to wait between the first transmission and the first repetition
of a packet [NO, 50..1000 msec.]
RP2-DLY: Time to wait between the first and second repetition of a packet
[NO, 50..1000 msec.]
ACK-TOUT: Maximal time to wait for ACK after transmission of a packet
[1000..5000 msec.]
MAX-RETRY: Maximal number of consecutive retries when ACK-TOUT expires [0..5]
POLLTIME: Inactivity interval after which a POLL packet is sent [15..300 sec.]
---------- - Server -----------------------------------------------------------
IP-FILTER: IP addresses filter for incoming sessions [*, 1-126.x.x.x,
127.0.0.1, 128-223.x.x.x, 'list']
---------- - Client -----------------------------------------------------------
SRCADD: Source IP address used in outgoing requests [R-ID, OUT-IP,
1-126.x.x.x, 127.0.0.1, 128-223.x.x.x]
Type on the CP the following commands to add the Simbox device and to activate it:
COMMAND EXECUTED
...
------------------ Active USB Devices and Physical Resources: -----------------
Device(s) Run Con Physical Resource(s) or CTI Port(s) USBPORTID
-------------------------------------------------------------------------------
...
SIMBOX-1 Yes No SimBox-1 . . . . . . . . . . . . . . . 1.2
...
Remember to save the configuration3 and that on a working Abilis, a system restart4 is required
RES:SimBox-1 ------------------------------------------------------------------
Run DESCR:
LOG:NO ACT:YES mxps:512
RSIM-RES:NONE
RSIM-PWD:
Now the parameter RSIM-RES must be configured to use the rsim resource activated above.
3
http://www.abilis.net/fileadmin/tutorial/en/ch05s11.html#ch.commands.save
4
http://www.abilis.net/fileadmin/tutorial/en/ch36s07.html
232
Draft Simbox Draft
COMMAND EXECUTED
Normally there's no need to change the default remaining parameters, at most a password can be set to protect access. Type s
p simbox-1 rsim-pwd:testpwd to set the word testpwd as password.
The same password must be used in all UMTS-BOX2 that need to connect to this Simbox (the parameter RSIM-PWD).
Remeber to save the configuration5 and to initialize the resource using init res:simbox-1
Assuming that:
type the command s p ctip:201 rsim-simbox-id:1 to associate the UMTS-BOX2 to Simbox. Refer to UMTS-BOX2
remotization to learn more about UMTS-BOX2 configuration. Remeber to save the configuration6 and to initialize the
CTISYS resource using init res:ctisys.
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
The Simbox firmware can be upgraded only if the current version is equal or greater than 8. Use the following command to
check the current version of firmware. In the example below firmware version is equal to 9.01.
[15:44:26] ABILIS_7.0:_
Add the BLUSB device typing the following command and then restart abilis7.
5
http://www.abilis.net/fileadmin/tutorial/en/ch05s11.html#ch.commands.save
6
http://www.abilis.net/fileadmin/tutorial/en/ch05s11.html#ch.commands.save
7
http://www.abilis.net/fileadmin/tutorial/en/ch36s07.html
233
Draft Simbox Draft
COMMAND EXECUTED
Updating steps:
• Upload the file simbox.bin into the execution version directory (for example c:\7-0-2) without changing the file name. The
upload can be done using the file put command8 or the FTP resource9.
• use the command usbdev fw upload id:xx, where xx stands for the ID of the “USB SIM-BOX” (5 in the example above).
The updating procedure can last for minutes and the result can be displayed typing D L.
Caution
In case of failure of updating procedure, the previous version of firmware can be restored unplugging and
plugging in the usb cable of Simbox.
234
Draft Draft
Table of Contents
13.1. Citobox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.2. Citobox and GPIO devices activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.3. CTI port configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
13.4. CTI routing configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
13.4.1. CTI Routing table configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.5. Diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.5.1. Citobox diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.5.2. Citobox Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.6. How to update Citobox firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
13.1. Citobox
Citobox allows to connect Abilis to a doorphone system integrating it with your computer telephony system. The connection
between Abilis and Citobox is done via USB cable. Citobox activation is based on two devices: CITOBOX and GPIO.
Tip
Interesting chapters:
COMMAND EXECUTED
Add the citobox and GPIO devices to abilis using the following commands. The devices status shows now two CTIP in the
range 241 .. 248.
COMMAND EXECUTED
235
Draft Citobox Draft
COMMAND EXECUTED
...
------------------ Active USB Devices and Physical Resources: -----------------
Device(s) Run Con Physical Resource(s) or CTI Port(s) USBPORTID
-------------------------------------------------------------------------------
GPIO-1 Yes Yes Gpio-1 . . . . . . . . . . . . . . . . 0.3.0
CITOBOX-1 241..242 . . . . . . . . . . . . . . .
CITO-1 Yes Yes . . . . . . . . . . . . . . . . . . . 0.3.2
AUDIO-1 Yes Yes . . . . . . . . . . . . . . . . . . . 0.3.1
...
Caution
Remember to save the configuration using save conf and that on a working Abilis, a system restart1 is
required.
Since Citobox appears as two devices (one Citobox and one GPIO which manages outputs), the GPIO device needs to be
configured setting it active with the command:
COMMAND EXECUTED
Initialize the device and save the configuration with init res:gpio-1 and save conf.
GPIO resource allows to view the state of each digital input/output line and to read values from analog inputs.
RES:Gpio-1 --------------------------------------------------------------------
STATE:UP USB-STATE:CONNECTED
- Digital Input Lines State --------------------------------------------
1..16| off off off off ON off off off off off . . . . . .
17..32| . . . . . . . . . . . . . . . .
33..48| . . . . . . . . . . . . . . . .
49..64| . . . . . . . . . . . . . . . .
------------------------------------------------------------------------
- Digital Output Lines State -------------------------------------------
1..16| off off off off off off off off off off off off off off off off
17..32| off off off off off off off off off off off off off off off off
33..48| off off off off off off . . . . . . . . . .
49..64| . . . . . . . . . . . . . . . .
------------------------------------------------------------------------
- Analog Input Lines State ---------------------------------------------
1.. 8| . . . . . . . .
9..16| . . . . . . . .
------------------------------------------------------------------------
236
Draft Citobox Draft
....
Tip
Interesting chapter: Section 42.2, “CTI Ports configuration”.
Example: additional ring buttons are connected to inputs 1,2,3,4, where the number assigned to the CTIP is 999901 (used as
calling number) and where DTMF 5 is used to drive an output which generates a 1 second pulse used to open the door.
COMMAND EXECUTED
...
---------- CITOBOX ------------------------------------------------------------
MORE-BUTTONS: Digital input lines of additional buttons [1..8]. Line values
can be joined using ',' character or grouped using '-' character.
237
Draft Citobox Draft
Initialize the CTISYS resource with the command init res:ctisys and save the configuration.
RES:CtiSys --------------------------------------------------------------------
Run DESCR:CTI_System_general_properties
- CITOBOX defaults -----------------------------------------------------
CITO-GAIN-IN:0 CITO-GAIN-OUT:0
CITO-ES:NO
CITO-ES-RISE-OUT:20 CITO-ES-FALL-OUT:200 CITO-ES-THR-OUT:-12
Note
DTMF can be simulated by means of subaddress called field (SD). Digital output can be driven using DTMF
tones. Configure the SD parameter of the rule which routes calls toward a Citobox CTIP port. Assigning
the string DTMF=x (x is the desired dtmf in range 0..9 and A..D) to the SD parameter. The call will not be
answered and will remain in ALERTING state. The call with be either dropped on T301 timeout or on abort
from caller.
Tip
Interesting chapters:
238
Draft Citobox Draft
• Abilis has the following CTI ports configuration: ports 31 and 32 are toward the PBX, ports 33 and 34 toward the ISDN
(grouped as BRI4_ports) and ports 101/102/103/104/105 are used to connect POTS phones.
--------------------------------------+--------------------+-------------------
[DESCR:]
ID: PICKUP: SCAN: RULE: |P1 P2 P3 P4 P5 |P6 P7 P8 P9 ...
|... P62 P63 P64
--------------------------------------+--------------------+-------------------
PBX_group
1 NO R ST |31 32 . . . |. . . . .
--------------------------------------+--------------------+-------------------
ISDN_line_group
2 NO R ST |33 34 . . . |. . . . .
--------------------------------------+--------------------+-------------------
POTS_phones
3 NO R ST |101 102 103 104 105 |. . . . .
--------------------------------------+--------------------+-------------------
...
Tip
Interesting chapter: Section 42.6, “CTI Router”;
[18:22:32] ABILIS_CPX:a ctir pr:1 type:ctov sr:clus1 poo:g3 cdi:* sdi:CITOBOX241 sp:64000
COMMAND EXECUTED
[18:22:56] ABILIS_CPX:a ctir pr:3 type:vtoc poi:241 ds:clus2 cdi:00 sdo:CITOBOX241 sp:64000
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
239
Draft Citobox Draft
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * u*
-------------------------------------------------------------------------------
1 CtoV GSM1 G3 * *
NO ANY NO Dft * *
64000 Sys * * Sys Sys CITOBOX241 *
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
3 VtoC 241 GSM2 00 *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * CITOBOX241
-------------------------------------------------------------------------------
...
The routing PR:3 routes calls coming from port 241 to internal cluster Clus2 introducing the label CITOBOX241 for SDO
parameter.
Tip
Interesting chapter: Section 42.6, “CTI Router”;
The routing PR:1 accepts calls from internal cluster Clus1 and forwards them to the group of POTS phones G3 only if SDI
parameter is equal to CITOBOX241. Using SDO/SDI parameters make the admin sure that the routing PR:1 catches calls
generated from PR:3.
The following routing allows to route calls originated by the external door phone unit toward a remote cluster (e.g.
Abilis2).
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
240
Draft Citobox Draft
Tip
Interesting chapter:
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
4 CtoV Abilis1 PBX 00 100
NO ANY NO Dft * *
6400 Sys * * Sys Sys CITOBOX241 *
-------------------------------------------------------------------------------
This route catch a call incoming from remote cluster Abilis1 and route it to a pots phone whose number is 100. The figure
below shows the route of the call:
241
Draft Citobox Draft
Warning
At this moment GSM or UMTS gateway supports only G.711 coder. Other codecs are supported by
transcoding through additional ISDN cards.
---------+----------------------+---------+-----+-----------+------------------
CLUS: |[DESCR:]
[Int] |CG-IN-REWRITE: |RG-IN: |SS: |LCS-GROUP: |CLIP-RULE:
|NUM: |CPO:
|NUMx:
---------+----------------------+---------+-----+-----------+------------------
...
-------------------------------------------------------------------------------
loop1 - DISABLE NO NONE PRIVATE
242
Draft Citobox Draft
[ 1] * NO
-------------------------------------------------------------------------------
loop2 - DISABLE NO NONE PRIVATE
[ 2] * NO
-------------------------------------------------------------------------------
COMMAND EXECUTED
[11:23:15] ABILIS_CPX:_a ctir pr:5 type:ctoc sr:loop2 ds:loop1 cdi:* sdi:CITOBOX241 SDO:CITOBOX2412
COMMAND EXECUTED
[11:25:22] ABILIS_CPX:_a ctir pr:6 type:ctov sr:loop2 poo:g3 sdi:CITOBOX2412 cdi:* coders:g.711 sp:
COMMAND EXECUTED
243
Draft Citobox Draft
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
PR:4 DESCR:
ACT:YES EDT:NO
TYPE:VtoC POI:241 DS:loop1 EEC:NO
NEXT:NO CDI:00 CDO:*
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:CITOBOX241
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
IG:Sys OG:Sys SG:Sys DL:Sys DH:Sys
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:64000 SC:Sys DJ:Sys MJ:Sys ECM:Sys
CODERS:Sys
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
-------------------------------------------------------------------------------
PR:5 DESCR:
ACT:YES EDT:NO
TYPE:CtoC SR:loop2 DS:loop1 EEC:NO
NEXT:NO CDI:* CDO:*
LAST:ANY CGI:* CGO:*
T301:Dft SDI:CITOBOX241 SDO:CITOBOX2412
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:64000 SC:Sys DJ:* MJ:* ECM:Sys
CODERS:*
SPOUT:* SCOUT:* DJOUT:* MJOUT:*
CODERSOUT:*
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
-------------------------------------------------------------------------------
PR:6 DESCR:
ACT:YES EDT:NO
TYPE:CtoV SR:loop2 POO:G3 EEC:NO
NEXT:NO CDI:* CDO:32999999999
LAST:ANY CGI:* CGO:*
T301:Dft SDI:CITOBOX2412 SDO:*
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
IG:Sys OG:Sys SG:Sys DL:Sys DH:Sys
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:64000 SC:NO DJ:0 MJ:40 ECM:Sys
CODERS:G.711
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
The rule PR:4 route a call incoming from Citobox to internal cluster loop1 adding a label 'CITOBOX241' to SDI parameter.
Next rule (PR:5) route the call from internal cluster loop2 to loop1 keeping the SDO parameter equal to SDI one, while
rule number 6 accepts calls from internal cluster loop1 and forwards them to GSM/UMTS gateway.
Tip
Interesting chapter: Section 42.6, “CTI Router”;
244
Draft Citobox Draft
d d ctip:n / d de ctip:n (where n is They inform about the overall state of the port (STATE), if the hot-pluggable device
241 or 242) is connected or not (CITO), the bandwidth of the AUDIO-CODEC ISO interface
(CODEC-ISO-BW), etc...
CTIP:241 ----------------------------------------------------------------------
OPSTATE:UP STATE:UP
------------------------------------------------------------------------
CH: STATE: [Q932-STATE:] CG: [SG:] CD: [SD:]
------------------------------------------------------------------------
*** All channels disconnected ***
------------------------------------------------------------------------
STATE:DOWN AUDIO-ISO-BW:N/A
CITO:DISCONNECTED CITO-STATE:INIT CITO-ERR:UNKNOWN
AUDIO:DISCONNECTED AUDIO-STATE:INIT AUDIO-ERR:UNKNOWN
245
Draft Citobox Draft
CTIP:241 ----------------------------------------------------------------------
--- Cleared 0 days 00:15:17 ago, on 11/03/2011 at 15:07:53 -------------
Layer 3 Q.931
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FAIL-CALL | 0| 0|SUCC-CALL | 0| 0|
TIME-CALL | 0| 0|
------------------------------------------------------------------------
B-CHANNELs STATISTICs NOT AVAILABLE
D-CHANNELs STATISTICs NOT AVAILABLE
CITOBOX
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CITO-CONN | 0| |CITO-DISC | 0| |
CITO-PCK | 0| 0|CITO-OVR | 0| |
CITO-UND | | 0|CITO-RST | 0| |
AUDIO-CONN | 0| |AUDIO-DISC | 0| |
AUDIO-PCK | 0| 0|AUDIO-OVR | 0| |
AUDIO-UND | | 0|AUDIO-RST | 0| |
CITO-CMD | | 0|CITO-RSP | 0| |
CITO-IND | 0| |
------------------------------------------------------------------------
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
Citobox is composed of two devices: GPIO and Citobox. The correct procedure includes updating both GPIO and Citobox
firmwares.
The Citobox firmware can be upgraded only if the current version is equal or greater than 18. Use the following command
to check the current version of firmware. In the example below firmware version is equal to 19.01.
246
Draft Citobox Draft
[15:44:26] ABILIS_7.0:_
Add the BLUSB device typing the following command and then restart abilis2.
COMMAND EXECUTED
Updating steps:
• Upload the files ctbgpio.bin and ctbcito.bin into the execution version directory (for example c:\7-0-2) without changing
the file name. The upload can be done using the file put command3 or the FTP resource4.
• use the command usbdev fw upload id:xx, where xx stands for the ID of the “USB CITO-BOX - GPIO” (8 in the example
above).
• use the command usbdev fw upload id:yy, where yy stands for the ID of the “USB CITO-BOX - CITO” (12 in the
example above).
The updating procedure can last for minutes and the result can be displayed typing D L.
Caution
In case of failure of updating procedure, the previous version of firmware can be restored unplugging and
plugging in the usb cable of Citobox.
2
http://www.abilis.net/fileadmin/tutorial/en/ch36s07.html
247
Draft Draft
Table of Contents
14.1. RJS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
14.2. RJS device activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
14.3. How to update RJS firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
14.1. RJS
This device is a switch of ISDN/ADSL/Ethernet lines which allows to manage up to 8 lines. The activation of the resource is
done through RJS device.
Tip
Interesting chapters:
COMMAND EXECUTED
248
Draft RJS - RJ Switch Draft
Caution
After adding or setting the device active, you must restart the Abilis to make the device running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
COMMAND EXECUTED
RES:Rjs-1 ---------------------------------------------------------------------
Run DESCR:
LOG:NO ACT:YES LIVE-EXPIRY:120 REBOOT-PROTECTION:YES
L1:AUTO L1-DESCR:
L2:AUTO L2-DESCR:
L3:AUTO L3-DESCR:
L4:AUTO L4-DESCR:
L5:AUTO L5-DESCR:
L6:AUTO L6-DESCR:
L7:AUTO L7-DESCR:
L8:AUTO L8-DESCR:
Caution
The resource must be initialized using init res:rjs-1.
Tip
It's recommended to use a description for each line (Lx-DESCR parameters).
249
Draft RJS - RJ Switch Draft
L1: Define state of Line 1 at boot or upon INIT [AUTO, MAIN, BACKUP]
L1-DESCR: Description for Line 1. Up to 70 alphanumeric extended characters.
Spaces are not allowed, case is preserved.
L2: Define state of Line 2 at boot or upon INIT [AUTO, MAIN, BACKUP]
L2-DESCR: Description for Line 2. Up to 70 alphanumeric extended characters.
Spaces are not allowed, case is preserved.
L3: Define state of Line 3 at boot or upon INIT [AUTO, MAIN, BACKUP]
L3-DESCR: Description for Line 3. Up to 70 alphanumeric extended characters.
Spaces are not allowed, case is preserved.
L4: Define state of Line 4 at boot or upon INIT [AUTO, MAIN, BACKUP]
L4-DESCR: Description for Line 4. Up to 70 alphanumeric extended characters.
Spaces are not allowed, case is preserved.
L5: Define state of Line 5 at boot or upon INIT [AUTO, MAIN, BACKUP]
L5-DESCR: Description for Line 5. Up to 70 alphanumeric extended characters.
Spaces are not allowed, case is preserved.
L6: Define state of Line 6 at boot or upon INIT [AUTO, MAIN, BACKUP]
L6-DESCR: Description for Line 6. Up to 70 alphanumeric extended characters.
Spaces are not allowed, case is preserved.
L7: Define state of Line 7 at boot or upon INIT [AUTO, MAIN, BACKUP]
L7-DESCR: Description for Line 7. Up to 70 alphanumeric extended characters.
Spaces are not allowed, case is preserved.
L8: Define state of Line 8 at boot or upon INIT [AUTO, MAIN, BACKUP]
L8-DESCR: Description for Line 8. Up to 70 alphanumeric extended characters.
Spaces are not allowed, case is preserved.
LIVE-EXPIRY How much time the live signals from the Abilis CPX must be absent prior to switch to BACKUP.
The default value of 120 seconds is intentionally large to avoid problematic flapping of the lines.
REBOOT-PROTECTION When you reboot the Abilis CPX, the live signal will disappear for the period needed to have the
Abilis functional again. In some cases this may take longer that LIVE-EXPIRY.
When REBOOT-PROTECTION:YES and WARM START or RESTART SYSTEM is done, a special signal is sent to RJ45
switch that temporary increase the LIVE-EXPIRY to 10 minutes. In this way the lines are not switched during a normal
system reboot.
Note
If the RJ45 switch is POWERED OFF all the lines are switched to BACKUP.
AUTO This is the normal way. The line is switched to BACKUP when the RJ45 box is not driven (e.g. Abilis powered
off), and switched to MAIN when the RJ45 box is driven.
MAIN Line is forced to MAIN as soon as the RJS is powered on, and will stay MAIN.
BACKUP Line is forced to BACKUP as soon as the RJS is powered on, and will stay BACKUP.
The state of the lines can be temporary forced using the S S RES:RJS-x Lx:AUTO | MAIN | BACKUP | DEFAULT
command.
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
The RJS firmware can be upgraded only if the current version is equal or greater than 12. Use the following command to
check the current version of firmware. In the example below firmware version is equal to 8.01.
250
Draft RJS - RJ Switch Draft
[15:44:26] ABILIS_7.0:_
Add the BLUSB device typing the following command and then restart abilis1.
COMMAND EXECUTED
Updating steps:
• Upload the file rjs.bin into the execution version directory (for example c:\7-0-2) without changing the file name. The
upload can be done using the file put command2 or the FTP resource3.
• use the command usbdev fw upload id:xx, where xx stands for the ID of the “SwitchBoard” (8 in the example above).
The updating procedure can last for minutes and the result can be displayed typing D L.
Caution
In case of failure of updating procedure, the previous version of firmware can be restored unplugging and
plugging in the usb cable of RJS.
1
http://www.abilis.net/fileadmin/tutorial/en/ch36s07.html
251
Draft Draft
Table of Contents
15.1. UMTS Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
The activation of UMTSKEY device on Abilis is needed to use UMTS-Key. Type the following command on the CP. This
will create a CTIP port which overlaps with those created with the CELLBOX.
COMMAND EXECUTED
CTIP:201 DESCR:
Act card:UG-1<1>
Run OPSTATE:UP LOG:NO TYPE:NET-PUBLIC
signalling:CELL
mode:CELL VOICE-ROAMING:DISABLED NUM:*
PDN-MODE:AUTO PDN-ROAMING:DISABLED
PDN-APN:
RSIM:NO
Tip
Interesting chapter: Section 53.17, “How to configure DATA CALL BACK using an UMTS Key, calling an
ISDN number”.
252
Draft Draft
Table of Contents
16. CP - Control Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
16.1. CP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
16.1.1. Access levels to the Control Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
16.1.2. CP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
16.2. CP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
16.2.1. CP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
16.2.2. CP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
16.2.3. CP sessions status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
16.3. Connecting to the Control Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
16.3.1. Connecting through a TCP/IP network using TELNET/SSH protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
16.3.2. Connecting through the serials-asynchronous ports of the Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
17. TELNET - TELecommunication NETwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
17.1. TELNET resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
17.1.1. TELNET resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
17.2. TELNET diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
17.2.1. TELNET diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
17.2.2. TELNET statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
17.2.3. TELNET session status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
17.3. TELNET commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
17.3.1. TELNET from Abilis to Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
18. SSH - Secure SHell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
18.1. SSH resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
18.1.1. Activating the SSH resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
18.1.2. SSH resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
18.2. SSH diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
18.2.1. SSH diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
18.2.2. SSH statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
18.2.3. SSH sessions status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
18.3. SSH commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
18.3.1. SSH from Abilis to Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
19. IPRTR - IP Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
19.1. IPRTR resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
19.1.1. IPRTR resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
19.2. IP Routings table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
19.2.1. D IPR (Display IP Routing) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
19.2.2. A IPR (Add IP Routing) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
19.2.3. C IPR (Clear IP Routing) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
19.2.4. S IPR (Set IP Routing) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
19.2.5. IP Source Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
19.3. IP Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
19.3.1. D P IP (Display Parameter IP resource) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
19.3.2. A RES:IP (Add IP Resource) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
19.3.3. C RES:IP (Clear IP Resource) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
19.3.4. S P IP (Set Parameter IP Resource) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
19.3.5. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
19.4. Administrative Distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
19.4.1. D IPAD (Display IP Administrative Distance) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
19.4.2. A IPAD (Add IP Administrative Distance) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
19.4.3. C IPAD (Clear IP Administrative Distance) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
19.4.4. S IPAD (Set IP Administrative Distance) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
19.5. IP Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
19.5.1. D IPLB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
19.5.2. A IPLB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
19.5.3. C IPLB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
19.5.4. S IPLB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
19.6. IPRTR diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
19.6.1. IPRTR diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
19.6.2. IPRTR statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
19.7. IPFLOW Tracer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
254
Draft Software resources Draft
255
Draft Software resources Draft
256
Draft Software resources Draft
257
Draft Software resources Draft
258
Draft Software resources Draft
259
Draft Draft
Table of Contents
16.1. CP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
16.1.1. Access levels to the Control Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
16.1.2. CP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
16.2. CP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
16.2.1. CP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
16.2.2. CP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
16.2.3. CP sessions status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
16.3. Connecting to the Control Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
16.3.1. Connecting through a TCP/IP network using TELNET/SSH protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
16.3.2. Connecting through the serials-asynchronous ports of the Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
16.1. CP resource
The Control Port allows to access configuration and supervising functions. The Control Port is not a physic port, that is there
is no connector, but it is a “virtual” port of the Abilis CPX.
• User login level: “USER” is allowed to execute only some operations for supervising the Abilis CPX working mode; the
executon of “USER” not allowed commands will cause the message “COMMAND NOT ALLOWED FOR USER LOGIN
LEVEL” to be displayed.
• Administrator login level: “ADMINISTRATOR” is allowed, with some restrictions, to execute all the operations for
configuring and supervising the Abilis CPX; execution of “ADMINISTRATOR” not allowed commands will cause the
message “COMMAND NOT ALLOWED FOR ADMINISTRATOR LOGIN LEVEL” to be displayed.
• Super-User login level: SUPERUSER is able to completely manage the system.
Once the CP has been accessed, it is possible to check or modify the privilege level by using the command login.
Here is an example on how to access the Control Port through the telnet port, with USER privileges:
[192.168.0.1] TELNETS>00-CP
COM
[11:29:21] ABILIS_CPX:
The User is asked to specify the requested access level (USER, ADMINISTRATOR or SUPERUSER) and then to insert the
correspondent password. If the password is wrong, it will be asked again. After the third wrong try the connection will be
cleared.
[192.168.0.1] TELNETS>00-CP
COM
260
Draft CP - Control Port Draft
INVALID PASSWORD
Password:
INVALID PASSWORD
Password:
CLR F0 AE
[192.168.0.1] TELNETS>
[11:09:16] ABILIS_CPX:d p cp
RES:Cp ------------------------------------------------------------------------
Run DESCR:Control_Port
LOG:NO PI:ABILIS_CPX: bsvc:3 ps:512
PWDU:**************** PWDA:**************** PWDS:****************
X29A:02010102010302040006050C010D000E000F011008111812121302
X29B:020100020003000402050006000700080009000A000C000D000E000F001500
PI This parameter set the command interpreter prompt of the Control Port. Information about current local time
“[hh:mm:ss]” always precedes the user defined prompt. It is possible to use from 0 up to 16 ASCII characters
[33..126], spaces are not allowed. No differences between low and high case characters are made.
bsvc It sets the maximum number of connections that can be opened at the same time with the Control Port.
PWD-U It sets the access password to the CP of the USER level. Once it is configured, the new password will be saved on
the Abilis CPX CF/HD, in a encrypted way, using the command save conf.
PWD-A It sets the access password to the CP of the ADMINISTRATOR level. Once it is configured, the new password will
be saved on the Abilis CPX disk, in a encrypted way, using the command save conf.
PWD-S It sets the access password to the CP of the SUPER-USER level. Once it is configured, the new password will be
saved on the Abilis CPX disk, in a encrypted way, using the command save conf.
The following command allows the administrator to change the configuration of the resource:
s p cp parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init res:cp;
while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required
(i.e. with warm start command).
261
Draft CP - Control Port Draft
d d cp Shows the current state of the driver, the session privilege level actually in use and the current operative state of
the CP session (the last two parameters are shown only if the session is in the CONNECTED state).
d de cp Shows the same information displayed by d d cp command along with the last command typed.
[11:09:16] ABILIS_CPX:d d cp
RES:Cp ------------------------------------------------------------------------
Control_Port
STATE:UP
Ses State AccessLevel Action
------------------------------------------------------------------------
1 CONNECTED SUPERUSER COMMAND-MODE
2 READY
3 READY
[11:09:16] ABILIS_CPX:d de cp
RES:Cp ------------------------------------------------------------------------
Control_Port
STATE:UP
Ses State AccessLevel Action
[Last Command]
------------------------------------------------------------------------
1 CONNECTED SUPERUSER COMMAND-MODE
d de cp
2 READY
3 READY
16.2.2. CP statistics
To display the statistics of the CP resource the following commands are used:
d s cp Shows the number of data segments sent/received and the number of characters sent/received.
d se cp Shows statistic information in an extended format: the same information listed for d s cp command are shown
for each session.
[11:09:16] ABILIS_CPX:d s cp
RES:Cp ------------------------------------------------------------------------
Control_Port
--- Cleared 0 days 00:47:57 ago, on 14/01/2011 at 09:52:54 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 200| 17|CHAR | 10738| 105|
------------------------------------------------------------------------
[11:09:16] ABILIS_CPX:d se cp
RES:Cp ------------------------------------------------------------------------
Control_Port
--- Cleared 0 days 00:48:50 ago, on 14/01/2011 at 09:52:55 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 209| 18|CHAR | 11252| 113|
------------------------------------------------------------------------
- Sessions statistics --------------------------------------------------
Ses:1
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 209| 18|CHAR | 11252| 113|
------------------------------------------------------------------------
Ses:2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 0| 0|CHAR | 0| 0|
------------------------------------------------------------------------
262
Draft CP - Control Port Draft
Ses:3
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 0| 0|CHAR | 0| 0|
------------------------------------------------------------------------
[11:09:16] ABILIS_CPX:d c cp
[11:09:16] ABILIS_CPX:d ce cp
RES:Cp
SES:1 CONN FROM RES:Ssh SES:4
CG: CD:00 PID:01000000 UD:CP
SES:2 UP CLR:00,00
SES:3 UP CLR:F0,B0
The TELNET (or SSH) Client application makes a TCP/IP call to the Abilis CPX IP address. The TELNET (or SSH)
Server of the Abilis CPX receives the call, establishes the TCP connection, calls the Control Port and sends back the packet
containing the configured prompt (for example ABILIS_CPX:).
Note
This is the default auto-connection procedure. Refer to Section 17.1.1, “TELNET resource parameters” to
learn to configure telnet server.
COM
[11:29:21] ABILIS_CPX:
The Control Port needs at least one X.25 routing to be reached: the default X.25 routing table has got a routing (PR:0) for
connection to the Control Port.
[11:56:53] ABILIS_CPX:d r
263
Draft CP - Control Port Draft
---+--------+--------+---------------+---------------+------------+------------
PR |IN |OUT |CDI |CDO |UDI |UDO
|NEXT |CGI |CGO |PIDI |PIDO
| |IPSRC |IPDEST |FFO
-------------------------------------------------------------------------------
0 * Cp * * CP *
-------------------------------------------------------------------------------
• 9600 bit/sec;
• 8 bit;
• 1 stop bit;
• no parity check;
• no flow control.
Steps to follow:
• press the key <Enter> to get the PAD local port prompt, after switching on the terminal;
• digit 00-CP and the command interpreter of the local CPX Control Port will appear.
Tip
Interesting chapter:
264
Draft Draft
Table of Contents
17.1. TELNET resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
17.1.1. TELNET resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
17.2. TELNET diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
17.2.1. TELNET diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
17.2.2. TELNET statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
17.2.3. TELNET session status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
17.3. TELNET commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
17.3.1. TELNET from Abilis to Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
RES:Telnet --------------------------------------------------------------------
DESCR:Telnet_Server_and_Client_entities
LOG:NO MCAU:NO ps:128
KEEPALIVE:30
- Server ---------------------------------------------------------------
tcpport:23 PSER:TELNETS> ser:3
AC:YES PWD: DT:15
CDO:00 UDO:CP PROFILE:NORMAL
IPSRC:* IPSRCLIST:#
- Client ---------------------------------------------------------------
PCLI:TELNETC> cli:3
CDI:* UDI:*
KEEPALIVE Activates and sets the value of the “Keep-Alive” time-out; the “Keep-Alive” procedure, by sending the
simple packets, keeps the TCP connection “alive” even if any data is not exchanged.
PSER The prompt of the commands interpreter of the Server TELNET resource.
265
Draft TELNET - TELecommunication NETwork Draft
AC Autoconnection mode for the TELNET Server; the default value is YES. The TELNET Server automatically
generates a connection request, using information configured in CDO and UDO, whenever it receives a login
request from a Client TELNET process.
DT Idle time interval (in minutes) after which the connection is closed.
CDO Called address field of the TELNET Server outgoing call. The parameter's default value (CDO:00).
UDO User data field of the TELNET Server outgoing call. The parameter's default value (CDO:CP).
PCLI The prompt of the command interpreter of the Client TELNET resource.
The following command allows the administrator to change the configuration of the resource:
s p telnet parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:telnet; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
d d telnet / d de telnet Shows diagnostic information, such as the state of the client and server, the local and
the remote addresses-ports connected to the resource, etc..
RES:Telnet --------------------------------------------------------------------
Telnet_Server_and_Client_entities
STATE:READY
- Telnet Channels ------------------------------------------------------
CH TYPE X25-State TCP-State LocAdd-LocPort RemAdd-RemPort
------------------------------------------------------------------------
1 CLNT READY READY
2 CLNT READY READY
3 CLNT READY READY
4 SERV CONNECTED CONNECTED 192.168.000.251-23 192.168.000.029-3113
5 SERV READY LISTEN 000.000.000.000-23
6 SERV READY LISTEN 000.000.000.000-23
d s telnet Shows statistic information, such as number of segments received/sent, number of characters received/
sent, number of packets received/sent, number of calls sent/received and number of resets sent/received.
d se telnet Shows statistic information in an extended format: the same information listed for d s telnet command are
shown for each session.
266
Draft TELNET - TELecommunication NETwork Draft
RES:Telnet --------------------------------------------------------------------
Telnet_Server_and_Client_entities
--- Cleared 009:23:37:23 ago, on 20/10/2006 at 18:29:17 ----------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 710| 89|CHAR | 41057| 829|
PCK | 181| 88|CALL | 3| 26|
RESET | 0| 0|
------------------------------------------------------------------------
RES:Telnet --------------------------------------------------------------------
Telnet_Server_and_Client_entities
--- Cleared 009:23:37:32 ago, on 20/10/2006 at 18:29:17 ----------------
- Telnet Channels ------------------------------------------------------
CH TYPE X25-State TCP-State LocAdd-LocPort RemAdd-RemPort
------------------------------------------------------------------------
1 CLNT READY READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 11| 48|CHAR | 44| 258|
PCK | 11| 48|CALL | 3| 0|
RESET | 0| 0|
------------------------------------------------------------------------
2 CLNT READY READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 0| 0|CHAR | 0| 0|
PCK | 0| 0|CALL | 0| 0|
RESET | 0| 0|
------------------------------------------------------------------------
3 CLNT READY READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 0| 0|CHAR | 0| 0|
PCK | 0| 0|CALL | 0| 0|
RESET | 0| 0|
------------------------------------------------------------------------
4 SERV CONNECTED CONNECTED 192.168.000.251-23 192.168.000.029-3113
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 376| 22|CHAR | 22301| 332|
PCK | 85| 22|CALL | 0| 9|
RESET | 0| 0|
------------------------------------------------------------------------
5 SERV READY LISTEN 000.000.000.000-23
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 260| 14|CHAR | 15251| 146|
PCK | 66| 14|CALL | 0| 8|
RESET | 0| 0|
------------------------------------------------------------------------
6 SERV READY LISTEN 000.000.000.000-23
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 74| 6|CHAR | 4104| 105|
PCK | 22| 5|CALL | 0| 9|
RESET | 0| 0|
------------------------------------------------------------------------
267
Draft TELNET - TELecommunication NETwork Draft
RES:Telnet
SES:1 UP CLR:F0,B0
SES:2 UP CLR:F0,B0
SES:3 CONN TO RES:Cp SES:1
CG: CD:00 PID:01000000 UD:CP
IPSRC:192.168.000.025
SES:4 UP CLR:F0,D0
SES:5 UP CLR:00,00
SES:6 UP CLR:F0,D0
As a consequence of this action, the prompt of the TELNET Server, configured in the parameter PSER , will be displayed.
The user can leave the command exchange procedure and start the data exchange one by pressing again the combination
Ctrl+P.
The available commands for the command interpreter of the TELNET resource are:
open This command, available only on TELNET client processes, allows the User to open a connection with
the TELNET Server process, hosting on the remote equipment identified by the specified IP.
268
Draft TELNET - TELecommunication NETwork Draft
COMMAND EXECUTED
COMMAND EXECUTED
[10:38:36] ABILIS_CPX:d r
---+--------+--------+---------------+---------------+------------+------------
PR |IN |OUT |CDI |CDO |UDI |UDO
|NEXT |CGI |CGO |PIDI |PIDO
| |IPSRC |IPDEST |FFO
-------------------------------------------------------------------------------
0 * Cp * * CP *
-------------------------------------------------------------------------------
1 Telnet Telnet * * TLN *
-------------------------------------------------------------------------------
2 * Telnet * * TLN *
-------------------------------------------------------------------------------
The routing with pr:1 allows to transfer an incoming TELNET session to an outgoing TELNET session, while routing with
pr:2 allows to transfer any incoming session to an outgoing TELNET session.
RES:Telnet --------------------------------------------------------------------
Run DESCR:Telnet_Server_and_Client_entities
LOG:NO MCAU:NO ps:128
KEEPALIVE:30
- Server ---------------------------------------------------------------
tcpport:23 PSER:TELNETS> ser:6
AC:YES PWD: DT:15
CDO:00 UDO:CP PROFILE:NORMAL
IPSRC: IPSRCLIST:#
- Client ---------------------------------------------------------------
PCLI:TELNETC> cli:3
CDI:* UDI:*
[192.168.1.1] TELNETS>clr
CLR 00 00
[192.168.1.1] TELNETS>
269
Draft TELNET - TELecommunication NETwork Draft
[192.168.1.1] TELNETS>clr
CLR 00 00
Password: *********
COM
[10:53:59] ABILIS_CPX_2:
270
Draft Draft
Table of Contents
18.1. SSH resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
18.1.1. Activating the SSH resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
18.1.2. SSH resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
18.2. SSH diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
18.2.1. SSH diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
18.2.2. SSH statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
18.2.3. SSH sessions status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
18.3. SSH commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
18.3.1. SSH from Abilis to Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
• a ssh client: it processes create the login request and provide the connection establishment with the remote unit;
• a ssh server: it processes are hosted on the remote system and provide the login service to the request of the clients.
Tip
Interesting chapter: Section 18.3, “SSH commands”.
The SSH resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the SSH active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
271
Draft SSH - Secure SHell Draft
RES:Ssh -----------------------------------------------------------------------
Run DESCR:Secure_Shell_Protocol
LOG:NO MCAU:NO ps:128
KEEPALIVE:30 LOGIN-TOUT:60
WDIR:C:\APP\SSH\
- Server ---------------------------------------------------------------
PSER:SSHS> ser:3 tcp-locport:22
AC:YES PWD:**************** DT:15
CDO:00 UDO:CP PROFILE:NORMAL
IPSRC:* IPSRCLIST:# MAXAUTH:6
KEYLEN:768 KEYREGENT:60 HOSTKEYLEN:1024
S-VER:1,2 S-AUTH-1:PWD S-AUTH-2:PWD
S-CIPHERS-1:ALL
S-CIPHERS-2:ALL
- Client ---------------------------------------------------------------
PCLI:SSHC> cli:3 MAXPROMPT:3
CDI:* UDI:*
C-VER:1,2 C-AUTH-1:PWD C-AUTH-2:PWD
C-CIPHERS-1:ALL DFT-CIPHER-1:3DES
C-CIPHERS-2:ALL DFT-CIPHER-2:3DES
KEEPALIVE Activates and sets the value of the “keep-alive” time-out; the “keep-alive” procedure, by sending the simple
packets, keeps the TCP connection “alive” even if any data is not exchanged.
PSER The prompt of the commands interpreter of the Server SSH resource.
AC Auto-connection mode for the SSH Server; the default value is YES. The SSH Server automatically
generates a connection request, using information configured in CDO and UDO parameters, whenever it
receives a login request from a Client SSH process.
DT Idle time interval after which the connection is closed (in minutes).
CDO Called address field of the SSH Server outgoing call. The parameter's default value (CDO:00), along with
AC setting to YES, allows to connect to the Control port.
UDO User data field of the SSH Server outgoing call. The parameter's default value (CDO:CP), along with AC
setting to YES, allows to connect to the Control port.
S-CIPHERS Cryptographic algorithms supported by the SSH Server [ALL, IDEA, DES, 3DES, BF].
PCLI The prompt of the commands interpreter of the Client SSH resource.
272
Draft SSH - Secure SHell Draft
DFT-CIPHER Default cipher type of SSH Client [IDEA, DES, 3DES, BF, AUTO].
MAXPROMPT Maximum number of unsuccessful inputs of password for the SSH client.
C-CIPHERS Cryptographic algorithms supported by the SSH Client [ALL, IDEA, DES, 3DES, BF].
The following command allows the administrator to change the configuration of the resource:
s p ssh parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init res:ssh;
while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required
(i.e. with warm start command).
d d ssh / d de ssh Shows diagnostic information, such as the state of the client and server, the local and
the remote addresses-ports connected to the resource, etc..
RES:Ssh -----------------------------------------------------------------------
Secure_Shell_Protocol
STATE:READY
- Ssh Channels ---------------------------------------------------------
CH TYPE X25-State TCP-State LocAdd-LocPort RemAdd-RemPort
------------------------------------------------------------------------
1 CLNT READY READY
2 CLNT READY READY
3 CLNT READY READY
4 SERV READY LISTENING 000.000.000.000-22
5 SERV READY LISTENING 000.000.000.000-22
6 SERV CONNECTED CONNECTED 192.168.000.201-22 192.168.000.025-40868
d s ssh Shows statistic information, such as number of segments received/sent, number of characters received/sent,
number of packets received/sent, number of calls sent/received and number of resets sent/received.
d se ssh Shows statistic information in an extended format: the information listed for d s ssh command are shown for
each session.
RES:Ssh -----------------------------------------------------------------------
Secure_Shell_Protocol
--- Cleared 0 days 02:56:16 ago, on 28/12/2007 at 10:27:32 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 49| 5|CHAR | 2665| 42|
PCK | 14| 5|CALL | 0| 1|
RESET | 0| 0|
------------------------------------------------------------------------
273
Draft SSH - Secure SHell Draft
RES:Ssh -----------------------------------------------------------------------
Secure_Shell_Protocol
--- Cleared 0 days 02:56:21 ago, on 28/12/2007 at 10:27:32 -------------
- Ssh Channels ---------------------------------------------------------
CH TYPE X25-State TCP-State LocAdd-LocPort RemAdd-RemPort
------------------------------------------------------------------------
1 CLNT READY READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 0| 0|CHAR | 0| 0|
PCK | 0| 0|CALL | 0| 0|
RESET | 0| 0|
------------------------------------------------------------------------
2 CLNT READY READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 0| 0|CHAR | 0| 0|
PCK | 0| 0|CALL | 0| 0|
RESET | 0| 0|
------------------------------------------------------------------------
3 CLNT READY READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 0| 0|CHAR | 0| 0|
PCK | 0| 0|CALL | 0| 0|
RESET | 0| 0|
------------------------------------------------------------------------
4 SERV READY LISTENING 000.000.000.000-22
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 0| 0|CHAR | 0| 0|
PCK | 0| 0|CALL | 0| 0|
RESET | 0| 0|
------------------------------------------------------------------------
5 SERV READY LISTENING 000.000.000.000-22
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 0| 0|CHAR | 0| 0|
PCK | 0| 0|CALL | 0| 0|
RESET | 0| 0|
------------------------------------------------------------------------
6 SERV CONNECTED CONNECTED 192.168.000.201-22 192.168.000.025-40868
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SEG | 60| 6|CHAR | 3302| 51|
PCK | 17| 6|CALL | 0| 1|
RESET | 0| 0|
------------------------------------------------------------------------
274
Draft SSH - Secure SHell Draft
RES:Ssh
SES:1 UP CLR:F0,B0
SES:2 UP CLR:F0,B0
SES:3 UP CLR:F0,B0
SES:4 UP CLR:F0,B0
SES:5 UP CLR:F0,B0
SES:6 CONN TO RES:Cp SES:1
CG: CD:00 PID:01000000 UD:CP
IPSRC:192.168.000.025
As a consequence of this action, the prompt of the SSH Server, configured in the parameter PSER, will be displayed.
The user can leave the command exchange procedure and start the data exchange by typing again the combination Ctrl+P.
The available commands for the command interpreter of the SSH resource are:
open This command, available only on SSH client processes, allows the User to open a connection with the
SSH Server process, hosting on the remote equipment identified by the specified IP.
COMMAND EXECUTED
COMMAND EXECUTED
[10:38:07] ABILIS_CPX:d r
---+--------+--------+---------------+---------------+------------+------------
PR |IN |OUT |CDI |CDO |UDI |UDO
|NEXT |CGI |CGO |PIDI |PIDO
| |IPSRC |IPDEST |FFO
-------------------------------------------------------------------------------
0 * Cp * * CP *
-------------------------------------------------------------------------------
1 Telnet Telnet * * TLN *
-------------------------------------------------------------------------------
2 * Telnet * * TLN *
-------------------------------------------------------------------------------
3 Ssh Ssh * * SSH *
-------------------------------------------------------------------------------
4 * Ssh * * SSH *
-------------------------------------------------------------------------------
The routing with pr:3 allows to transfer an incoming SSH session to an outgoing SSH session, while routing with pr:4
allows to transfer any incoming session to an outgoing SSH session.
275
Draft SSH - Secure SHell Draft
RES:Ssh -----------------------------------------------------------------------
Run DESCR:Secure_Shell_Protocol
LOG:NO MCAU:NO ps:128
KEEPALIVE:30 LOGIN-TOUT:60
WDIR:C:\APP\SSH\
- Server ---------------------------------------------------------------
PSER:SSHS> ser:3 tcp-locport:22
AC:YES PWD:**************** DT:15
CDO:00 UDO:CP PROFILE:NORMAL
IPSRC:* IPSRCLIST:# MAXAUTH:6
KEYLEN:768 KEYREGENT:60 HOSTKEYLEN:1024
S-VER:1,2 S-AUTH-1:PWD S-AUTH-2:PWD
S-CIPHERS-1:ALL
S-CIPHERS-2:ALL
- Client ---------------------------------------------------------------
PCLI:SSHC> cli:3 MAXPROMPT:3
CDI:* UDI:*
C-VER:1,2 C-AUTH-1:PWD C-AUTH-2:PWD
C-CIPHERS-1:ALL DFT-CIPHER-1:3DES
C-CIPHERS-2:ALL DFT-CIPHER-2:3DES
[192.168.1.1] SSHS>clr
CLR 00 00
[192.168.1.1] SSHS>
276
Draft SSH - Secure SHell Draft
[192.168.1.1] SSHS>clr
CLR 00 00
Coding is 3DES
COM
[10:51:59] ABILIS_CPX_2:
277
Draft Draft
Table of Contents
19.1. IPRTR resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
19.1.1. IPRTR resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
19.2. IP Routings table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
19.2.1. D IPR (Display IP Routing) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
19.2.2. A IPR (Add IP Routing) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
19.2.3. C IPR (Clear IP Routing) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
19.2.4. S IPR (Set IP Routing) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
19.2.5. IP Source Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
19.3. IP Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
19.3.1. D P IP (Display Parameter IP resource) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
19.3.2. A RES:IP (Add IP Resource) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
19.3.3. C RES:IP (Clear IP Resource) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
19.3.4. S P IP (Set Parameter IP Resource) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
19.3.5. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
19.4. Administrative Distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
19.4.1. D IPAD (Display IP Administrative Distance) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
19.4.2. A IPAD (Add IP Administrative Distance) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
19.4.3. C IPAD (Clear IP Administrative Distance) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
19.4.4. S IPAD (Set IP Administrative Distance) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
19.5. IP Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
19.5.1. D IPLB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
19.5.2. A IPLB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
19.5.3. C IPLB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
19.5.4. S IPLB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
19.6. IPRTR diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
19.6.1. IPRTR diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
19.6.2. IPRTR statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
19.7. IPFLOW Tracer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
19.7.1. List of commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
19.7.2. Activating the IPFLOW tracer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
19.7.3. Deactivating the IPFLOW tracer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
19.7.4. Starting the IPFLOW tracer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
19.7.5. Stopping the IPFLOW tracer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
19.7.6. Display of IPFLOW parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
19.7.7. Setting IP packet filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
19.7.8. IPFLOW trace display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
IP Datagram transport on LAN is carried out using Ethernet or Token Ring protocols.
278
Draft IPRTR - IP Router Draft
IP Datagram transport on WAN is carried out using X.25 resource (obsolete) or non-X.25 resources (SYNC, Frame-Relay,
LAPB, IP Tunnel or PPP links).
RES:Iprtr ---------------------------------------------------------------------
Run DESCR:IP_Router_general_properties
- General --------------------------------------------------------------
R-ID:080.080.080.080 NAT:OUTSIDE
maxroute:500 DFTTTL:64 ps:2048
DEF-LOCAL-AD:0 DEF-STATIC-AD:1 DEF-OSPF-AD:110 DEF-RIP-AD:120
pvc:0 bsvc:0 LINKS:9 virtual:1
- IP Access List -------------------------------------------------------
ACL:EXT ACLBYPASS:#
COS:ENABLED COSDFT:NORMAL
COSBALANCE:NO NORMRATE:50 LOWRATE:50
- IP Trace -------------------------------------------------------------
tracerec:100
- Ppp-Dns --------------------------------------------------------------
PPP-DNS-PRI:000.000.000.000 PPP-DNS-SEC:000.000.000.000
R-ID It shows the Router ID address [AUTO: it is the default value and it's obtained considering the first IP resource of the
homonym table, whose address is not 0.0.0.0; 1-126.x.x.x, 128-223.x.x.x: it is used a specific IP].
NAT It indicates the side of the IPRTR when remote hosts connect to R-ID IP address. This information is required by
NAT in order to determine if the IP address must be translated or not. This parameter can be set only when R-ID is
not set to AUTO [NO: NAT is not configured; INSIDE: the R-ID address is in the INSIDE IP resource; OUTSIDE:
the R-ID address is in the OUTSIDE IP resource, VPN: the R-ID address is in the VPN IP resource, DMZ: the R-ID
address is in the DMZ IP resource].
ACL It activates the IP Access List service and choose the operating mode [NO: the service IP access list is disabled; STD
(Standard): datagrams are filtered by their source and destination addresses (address filtering); EXT (Extended):
datagrams are filtered by their source and destination addresses but also by the internet protocol. For TCP and UDP
protocols the logic port number is also checked (that is the service requested)].
The following command allows the administrator to change the configuration of the resource:
s p iprtr parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:iprtr; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
The command save conf saves onlys tatic routings inside the table.
The maximum size of the IP routings table can be configured through the parameter MAXROUTE of the IP Router resource,
whose default value is 500.
In the configuration files up to 255 static routings are saved, while the connected routings are derived from the configurations
of IP ports. See Section 19.3.5.1, “Examples of REDIS parameter use” to have more information about connected routings.
279
Draft IPRTR - IP Router Draft
The available commands for managing the IP routings table are the following:
• d ipr
• a ipr
• c ipr
• s ipr
B (Best) This parameter has only an informative value and it cannot be modified. In case that
two or more routings with the same NET value are present, it identifies the best one.
P (Provenience) This parameter has only an informative value and it cannot be modified. It shows the
origin of the routing [S: static; R: obtained from the RIP protocol; O: obtained from the
OSPF protocol; C: obtained from the configuration table of the IP ports (this kind of
routing is referred as directly connected)].
S (Status) It indicates the state of the single routing. Every time some changes occurs to IPRTR
table, routings could change their state [Empty Field: normal state; A: Added state:
routing is just added into the table and is going to be accepted. Once confirmed by
IPRTR, it will go into normal state; C: Changed state: routing has changed some
parameters and is going to be accepted. Once confirmed by IPRTR, it will go into
normal state; D: Deleted state: routing is just requested for being deleted from table.
Once request is confirmed by IPRTR, routing will be removed from the table; H:
Hidden state: routing hidden parameter is changed from NO to YES. Once request is
confirmed by IPRTR, routing will go into normal state].
H (Hide) It sets whether the static routing has to be hidden to the other dynamic routing
protocols like RIP and OSPF [NO: the field will be empty and the routing will be
inserted in the RIP and OSPF local table; YES: the character * will be shown, meaning
that the routing won't be inserted in the RIP and OSPF local table].
NET/MASK It sets the destination network of the routing; it's shown in Slash Notation.
MASK/ or SRNET/SRMASK It sets the mask related to the destination network shown in DDN (Dotted Decimal
Notation), but can also indicate address and mask (in Slash Notation) of the source
network that make true the routing.
IP It sets the IP resource where to route the IP datagram. If, at the moment of the
visualization, the IP resource that is referenced by the routing is in DOWN state,
beside the port index, the character D will appear. The value NONE stands for “no IP
resource”; it can be used for deactivating the IP routing without cancelling it. The
280
Draft IPRTR - IP Router Draft
value R-ID stands for “Router-ID”; it cannot be manually set and it means that the
specified routing is the Router ID.
AD (Administrative Distance) Distance used for route priority into IP Routing table. This is a particular metric used
to indicate priorities between routings of the same and different protocol. Routings
with the minor AD value have a major priority.
Tip
Use the command d ipre to show the routings descriptions:
Tip
The -FD option can be optionally specified to force routing duplication, i.e. the addition of two routings
with the same destination network and mask, but with different destination IP resource.
COMMAND EXECUTED
COMMAND EXECUTED
281
Draft IPRTR - IP Router Draft
COMMAND EXECUTED
282
Draft IPRTR - IP Router Draft
COMMAND EXECUTED
The available commands for managing the IP source routings are the following:
• d ipsr
• a ipsr
• c ipsr
• s ipsr
+-----+--------------------+--------------------+-----------------+------+----+
| ID: | NET:/MASK: | SRNET:/SRMASK: | GW: | IP: | UN:|
+-----+--------------------+--------------------+-----------------+------+----+
| 0 | 001.001.001.001/32 | 005.005.005.005/32 | 000.000.000.000 | NONE | NO |
| 1 | 002.002.000.000/16 | 005.005.005.005/32 | 000.000.000.000 | 0 | NO |
| 2 | 002.002.000.000/16 | 005.005.005.005/32 | 000.000.000.000 | NONE | NO |
| 3 | 002.002.000.000/16 | 005.005.005.005/32 | 000.000.000.000 | 2 | YES|
| 4 | 002.002.000.000/16 | 005.005.005.005/32 | 000.000.000.000 | 1 | YES|
+-----+--------------------+--------------------+-----------------+------+----+
The meaning of the fields are the same of the IP Routing table.
A routing can be set to Unconditional (UN:YES) or Conditional (UN:NO).When it is set to Unconditional, it's moved on the
top of the generic routing table, in order to give it the highest priority.
IP Source routing can be displayed also in the IP routing table; in the example below they are represented with bold
characters:
283
Draft IPRTR - IP Router Draft
+-+-+-+-+--------------------+--------------------+-----------------+----+---+
|B|P|S|H| NET:/MASK: | MASK: or | GW: |IP: |AD:|
| | | | | | SRNET:/SRMASK: | | | |
+-+-+-+-+--------------------+--------------------+-----------------+----+---+
|*|C| | | 001.001.001.001/32 | 255.255.255.255 | |R-ID| 0|
|*|C| | | 001.001.001.001/24 | 255.255.255.000 | | 1| 0|
|*|C| | | 002.002.002.002/24 | 255.255.255.000 | | 2| 0|
|*|C| | | 003.003.003.003/24 | 255.255.255.000 | | 3| 0|
|*|S| | | 000.000.000.000/0 | 000.000.000.000 | | 3| 1|
| | | | | | 002.002.002.000/24 | | 4| |
+-+-+-+-+--------------------+--------------------+-----------------+----+---+
The meaning of the route above is that the default gateway for IP source 2.2.2.0/24 is the IP resource “ip-4”.
COMMAND EXECUTED
COMMAND EXECUTED
284
Draft IPRTR - IP Router Draft
COMMAND EXECUTED
19.3. IP Resources
The IP Router of Abilis CPX can manage up to 256 IP resources. The IP configuration of each resource is stored into the
routing table.
The available commands for managing the IP resources are the following:
• d p ip
• a res:ip
• c res:ip
• s p ip
[08:32:56] ABILIS_CPX:d p ip
285
Draft IPRTR - IP Router Draft
TRFA:YES TRFA-MODE:TOTALS
TRFA-IPADD:LOCALNET (192.168.000.000:192.168.000.255)
- Lan ------------------------------------------------------------------
LOG:NO arpcache:200 CACHETIMER:120
rxbuf:4 txbuf:14
Note
The “Not Saved (SAVE CONF)” message is displayed every time the table is modified but not saved with
the save conf command.
Note
The “Not Refreshed (INIT)” message is displayed every time the table is modified but not refreshed with the
initialization command init res:ip.
By specifying IP resource identifier, the command will show the definition of the requested port. IP resource identifier must
be in the interval [0 - 255]. If does not exist any resource with that identifier, an error message is generated: “RESOURCE
NOT PRESENT OR INACTIVE”.
286
Draft IPRTR - IP Router Draft
IPLOG State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E] (D: Debug Log; S: System Log;
A: Alarm view; L: Local audible alarm; T: SNMP traps; +E: Extended Log of state changes, see ref.
manual)
STATE-DETECT Select IP resource state detection method [NORMAL, PING]: - NORMAL: the state depends on lower
interface only. - PING: the state depends on lower interface state and on result of the PING procedure.
Enabling the PING procedure, the parameters of PING section are shown.
Refer to chapter Section 52.19, “How to use state detection of IP interfaces” to view a how to.
DHCP-DNS Retrieve primary and secondary DNS server through DHCP [NO, YES] <Only for IPADD:DHCP>
DHCP-GW Retrieve default gateway through DHCP [NO, YES] <Only for IPADD:DHCP>
REDIS Create the related connected routing [NO: no route is created; YES: a destination route is added to IPR
table, EXT: a source route is added to IPR table]
287
Draft IPRTR - IP Router Draft
OUTSP Output speed limitation value [64..100000 Kbit/sec] <Only for OUTSPL: not equal to NO>
LOG State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E] (D: Debug Log; S: System Log;
A: Alarm view; L: Local audible alarm; T: SNMP traps; +E: Extended Log of state changes, see ref.
manual)
TRFA section:
TRFA-MODE Select traffic analysis mode [TOTALS: saves the total global traffic; PROT: subdivides the registration for
the main protocol models; IP: saves the totals for every single IP address; IP-PROT: subdivides the traffic
by protocol, for every single crossing IP address];
IP-RESERVE Reserves records in the traffic analysis data base: it represents the maximum IP number trace.
TRFA-SIDE Selects IP address type [LOCAL: filters the traffic by destination IP address; REMOTE: filters the traffic by
source IP address].
Link section:
LCOMP Set the compression type to use for an ip resource with subtype AIPT[-BCK], DL[-BCK], ML, BCH. Data
Compression is available only under licence.[NO: compression not active, LZO1X: is often the best choice of all,
LZO1B: is good with a large blocksize or with very redundant data, LZO1F: s good with a small blocksize or with
binary data]
PPP section:
PING section:
P-LOC Source IP address used for PING request (ECHO REQUEST) [1-126.x.x.x, 127.0.0.1, 128-223.x.x.x] or
"R-ID" or "IPADD".
P-TOUT Timeout for the reply reception (ECHO REPLY) [100..10000 msec].
P-BURST-DLY Interval between requests pertaining to the same attempt [0..1000 msec].
P-TTL TTL value when transport layer doesn't provide one [DFT, 1..255].
Type the following command to display all the available types of IP resource.
288
Draft IPRTR - IP Router Draft
Ip resource subtypes:
COMMAND EXECUTED
COMMAND EXECUTED
289
Draft IPRTR - IP Router Draft
- IP Tunnel ------------------------------------------------------------
TLOG:NO MODE:STD D-TOS:0-N V-TOS:0-D C-TOS:0-D
MPX:NO
LOCPORT:2111 REMPORT:2100 CR:NO CRKEY:DFT
OUT-IP:AUTO
LOCIPADD:R-ID (192.168.000.201) REMIPADD:#
COMMAND EXECUTED
Caution
After adding a new IP resource, you must restart the Abilis to make the resource running (use the command
warm start to reboot the Abilis).
Tip
Interesting chapters:
Section 52.3, “How to assign several IP addresses to the same LAN port”.
Caution
It's not possible to remove an IP resource on a running CPX with this command! It's needed to follow this
sequence:
290
Draft IPRTR - IP Router Draft
COMMAND EXECUTED
SAVE EXECUTED
At next reboot:
THE COMMAND WILL DELETE ALL THE REFERENCES TO THE SELECTED RESOURCE.
PROCEED ANYWAY (N/Y)?y
COMMAND EXECUTED
Warning
Deleting an IP resource also its references in IPR, IPACL , IPAD and RIP EXTERNAL will be deleted!!
291
Draft IPRTR - IP Router Draft
s p ip-x [par:val...]
In the example below description, neighbour IP (NEIGH), subnet mask (MASK), LOCIPADD and REMIPADD parameters will
be modified.
COMMAND EXECUTED
19.3.5. Examples
The following paragraphs contain some examples to explain the meaning of REDIS parameter.
292
Draft IPRTR - IP Router Draft
Note
REDIS:NO can be always used, but every route must be created by hand.
Examples:
The parameter REDIS of ip-2 i set to NO, so in the ipr table there's no entry automatically generated and related with this ip
address. If you want to use the ip-2 as gateway you must add a route by hand.
293
Draft IPRTR - IP Router Draft
The parameter REDIS of ip-2 is set to YES, so in the ipr table there's an entry with provenience equal to C (refer to
Section 19.2.1, “D IPR (Display IP Routing)”). The route automatically created is a destination route.
294
Draft IPRTR - IP Router Draft
| | | | | | SRNET:/SRMASK: | IPLB: | | |
+-+-+-+-+--------------------+--------------------+-----------------+----+---+
|*|C| |*| 127.000.000.001/32 | 255.255.255.255 | |LOOP| 0|
|*|C| | | 192.168.030.001/32 | 255.255.255.255 | |R-ID| 0|
|*|C| | | 010.000.000.000/29 | 255.255.255.248 | | 12| 0|
|*|C| | | 192.168.000.000/24 | 255.255.255.000 | | 11| 0|
|*|C| | | 192.168.001.000/24 | 255.255.255.000 | | 2| 0|
|*|S| | | 192.168.008.000/24 | 255.255.255.000 | |D 10| 1|
|*|C| | | 192.168.030.000/24 | 255.255.255.000 | | 1| 0|
|*|C| | | 000.000.000.000/0 | 000.000.000.000 | 192.168.001.001 | 2| 0|
+-+-+-+-+--------------------+--------------------+-----------------+----+---+
The parameter REDIS of ip-2 is set to EXT, so in the ipr table there's an entry with provenience equal to C (refer to
Section 19.2.1, “D IPR (Display IP Routing)”). Two routes are automatically created: a destination route and a default route
for that ip address.
Setting REDIS:EXT is useful to automatically generate a route when using two or more ADSL lines.
295
Draft IPRTR - IP Router Draft
| | | | | | SRNET:/SRMASK: | IPLB: | | |
+-+-+-+-+--------------------+--------------------+-----------------+----+---+
|*|C| |*| 127.000.000.001/32 | 255.255.255.255 | |LOOP| 0|
|*|C| | | 192.168.030.001/32 | 255.255.255.255 | |R-ID| 0|
|*|C| | | 010.000.000.000/29 | 255.255.255.248 | | 12| 0|
|*|C| | | 192.168.000.000/24 | 255.255.255.000 | | 11| 0|
|*|C| | | 192.168.001.000/24 | 255.255.255.000 | | 2| 0|
|*|S| | | 192.168.008.000/24 | 255.255.255.000 | |D 10| 1|
|*|C| | | 192.168.030.000/24 | 255.255.255.000 | | 1| 0|
|*|C| | | 000.000.000.000/0 | 000.000.000.000 | 192.168.001.001 | 2| 0|
| |C| | | |[192.168.001.100/32]| 192.168.001.001 | 2| |
+-+-+-+-+--------------------+--------------------+-----------------+----+---+
The Administrative Distance table contains information about rules for routes priority into IP Routing table. The commands
for managing the IP Routing Administrative Distances table are the following:
• d ipad
• a ipad
• c ipad
• s ipad
+--------------------+---------+-----------+---------+
| NET: | PROT: | DISTANCE: | IP: |
+--------------------+---------+-----------+---------+
| 192.168.006.002/32 | RIP | 110 | |
| 192.168.006.000/24 | RIP | 120 | |
| 192.168.006.000/24 | OSPF | 100 | |
| 010.000.000.000/8 | STATIC | 10 | NONE |
| 000.000.000.000/0 | LOCAL | 5 | |
+--------------------+---------+-----------+---------+
NET It indicates the destination network IP address and the mask used for setting administrative distance, in Slash
Notation (i.e. x.x.x.x/yy).
PROT This parameter defines a routing protocol for which this distance will be applied.
DISTANCE This parameter defines the distance that will be used for route priority into IP Routing table.
IP This parameter defines the IP resource value. It is allowed only when PROT parameter is set to STATIC.
[NONE: no IP resource; *: all IP resources; 1..250: it is used the specified IP resource].
Here an example.
296
Draft IPRTR - IP Router Draft
COMMAND EXECUTED
+--------------------+---------+-----------+---------+
| NET: | PROT: | DISTANCE: | IP: |
+--------------------+---------+-----------+---------+
| 000.000.000.000/00 | STATIC | 180 | 4 |
+--------------------+---------+-----------+---------+
Caution
Changes made on the IP Routing Administrative distance table are NOT immediately active, they can be
activated by executing the initialization command init ipad.
COMMAND EXECUTED
Note
The option “-fd” has been used because a static routing towards network 0.0.0.0/0 was already present.
The “Best” route for network 0.0.0.0/0 is the ip-2 resource; the alternative way it is the ip-4 resource that will be considered
only if the primary route is down. In normal conditions the route towards ip-4 resource is ignored.
Here an example.
COMMAND EXECUTED
+--------------------+---------+-----------+---------+
| NET: | PROT: | DISTANCE: | IP: |
+--------------------+---------+-----------+---------+
*** NO IP ROUTING ADMINISTRATIVE DISTANCEs DEFINED ***
297
Draft IPRTR - IP Router Draft
Caution
Changes made on the IP Routing Administrative distance table are NOT immediately active, they can be
activated by executing the initialization command init ipad.
COMMAND EXECUTED
+--------------------+---------+-----------+---------+
| NET: | PROT: | DISTANCE: | IP: |
+--------------------+---------+-----------+---------+
| 000.000.000.000/00 | STATIC | 180 | 5 |
+--------------------+---------+-----------+---------+
• RR: Round Robin. The packets are sequentially sent through the IP resources of the group.
• WQ: Weighted Queue. The IP resource of the group with the shorter transmission queue of the same priority is used for the
transmission of the packet under processing, otherwise packets are sent sequentially on the resources of the group.
19.5.1. D IPLB
Use the command d iplb to display the ip load balancing table.
• RULE: ip resources scanning rule [RR: Round Robin, WQ: weighted queue]
• RESx: ip resources in the group [# or NONE, Ip-nnn] , where 'nnn' is an IP resource index [1..250].
19.5.2. A IPLB
This command allows to add an entry into the IPLB table.
298
Draft IPRTR - IP Router Draft
COMMAND EXECUTED
Caution
Changes made on the IP Load Balancing table are NOT immediately active, they can be activated by
executing the initialization command init iplb. Then, remeber to save the configuration (save conf).
A routing which uses an IPLB indicates this condition by showing the IPLB in the “GW: or IPLB:” field of the D IPR output.
19.5.3. C IPLB
This command allows to remove an entry of the iplb table.
299
Draft IPRTR - IP Router Draft
COMMAND EXECUTED
Caution
Changes made on the IP Load Balancing table are NOT immediately active, they can be activated by
executing the initialization command init iplb. Remeber to save the configuration (save conf).
19.5.4. S IPLB
This command allows to change the parameters of an entry inside the iplb table:
COMMAND EXECUTED
Caution
Use command init iplb to activate changes on the IP Load BalancingThen, remeber to save the
configuration (save conf).
300
Draft IPRTR - IP Router Draft
d d iprtr / d de iprtr Shows diagnostic information, such as the state of the resource and the routings table,
the current percentage of routings present into routing table, the current number of
routings present into the table, the maximum number of routings reached from start-
up into the table and the maximum number of routings present into the table (this
information indicate the MAXROUTE parameter).
RES:Iprtr ---------------------------------------------------------------------
IP_Router_general_properties
STATE:READY
ROUTINGs TABLE Diagnostics
-----------|---State---|-Current%--|--Current--|---Peak----|----Max----|
ROUTINGS |NORMAL | 5| 29| 29| 500|
------------------------------------------------------------------------
d s iprtr / d se iprtr Statistic information are divided into two groups: one dedicated to IP Router (the
number of IP datagrams sent/received, number of IP datagrams discarded due to
header errors and to wrong destination address, etc..), the other one to the ICMP (the
number of ICMP messages sent/received, the number of bad ICMP messages received,
the number of “Unreachable destination” ICMP messages, etc..).
RES:Iprtr ---------------------------------------------------------------------
IP_Router_general_properties
--- Cleared 23 days 13:45:07 ago, on 03/12/2007 at 03:20:52 ------------
ROUTER Statistics
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
DGM | 30476317| 3759615|HDR-ERR | 52| |
ADDR-ERR | 0| |FRW-DGM | | 26743001|
UNK-PROT | 394| |DISCARDS | 0| 1813|
LOCAL-DGM | 3479964| |NO-ROUT | | 0|
REAS-TOUT | 0| |REAS-REQD | 28| |
REAS-OK | 28| |REAS-FAIL | 0| |
FRAG-OK | | 145|FRAG-FAIL | | 23|
FRAG-CREATE| | 290|ROUT-DISC | 0| |
------------------------------------------------------------------------
ICMP Statistics
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
MSG | 5294| 37497|ERR | 334| |
DEST-UNRICH| 1382| 33732|T-EXCEED | 23| 573|
PARM-PROB | 0| 0|SRC-QUENCH | 1| 0|
REDIRECT | 615| 0|ECHO | 3176| 16|
ECHO-REP | 97| 3176|TSTAMP | 0| 0|
TSTAMP-REP | 0| 0|ADMASK | 0| 0|
ADMASK-REP | 0| 0|
------------------------------------------------------------------------
Each IP packet makes a list of several steps inside IPRTR (not all steps are made by all packets, this could depend by
configuration and by packet type):
301
Draft IPRTR - IP Router Draft
IPSEC DECODE packet received in IPSEC format is decoded from ciphered to plain format;
For each step, IPFLOW displays some information related to IP packet and some others related to step itself. For example,
during PACKET IN step we can have:
Packet IN:
SA:192.168.000.005 DA:192.168.000.200 PROT:tcp SPO:2768 DPO:23 LEN:40
SIP:4 SRC-MAC:00-1E-8C-D5-5E-16 DST-MAC:00-0C-42-07-47-97 DST-MAC-TYPE:U
In the previous example we can see 2 rows. First row is related to IP packet and contain information about its fields, like
source IP address (SA), destination IP address (DA), IP protocol (PROT), source and destination protocol port (SPO and
DPO, shown only for TCP/UDP protocols) and packet length (LEN). This row can be present for each step if current values
differ from information printed on previous step.
Second row contains information related only to Packet IN step like source IP interface (SIP), source MAC address (SRC-
MAC), destination MAC address (DST-MAC), destination MAC type (DST-MAC-TYPE). Each step contain specific
information related to its purpose.
[18:48:37] ABILIS_CPX:ipflow ?
Trace parameter(s):
Caution
When activating IPFLOW tracer, is possibile that abilis system doesn't have enough memory to allocate
required buffer. In this case, will be printed a COMMAND FAILURE message. See below:
302
Draft IPRTR - IP Router Draft
COMMAND FAILURE
IPFLOW tracer cannot be activated if it was already activated previously. If IPFLOW needs to be re-activated (e.g. in
case that SIZE or RECIRCLE value must be changed), it must be deactivated first. This is what happen when IPFLOW is
activated twice before deactivating it.
Setting recircle to NO will make IPFLOW service to trace only first SIZE packets. Once that limit is reached, no more
packets will be traced until tracer is stopped and started again. If recircle is set to YES, once reached SIZE packets number
during tracing, the olders packet will be removed to allow tracing of the new one.
During activation command, in case that parameters are set with an invalid value, a specific error message code will be
printed about. For example:
COMMAND EXECUTED
Caution
Once IPFLOW is no more active, all the IP packets traced previously will be lost.
There are some situation where IPFLOW cannot be deactivated. This could happen in case that IPFLOW wasn't activated
before, or in case that IPFLOW is started but not stopped yet. In this case some related error message will be printed.
COMMAND EXECUTED
303
Draft IPRTR - IP Router Draft
When IPFLOW is started, all the packet that matches with specified filtering parameters will be traced and stored into tracer
list. Up to SIZE packets can be store at the same time.
There are some situation where IPFLOW cannot be started. This could happen in case that IPFLOW wasn't activated before,
or in case that IPFLOW is already started but not stopped yet. In this case some related error message will be printed.
Everytime trace is started, all the previous counters and IP packets traced will be automatically erased.
COMMAND EXECUTED
When IPFLOW is stopped, no other packets will be analyzed and traced (in case that they matches with filter configured).
There are some situation where IPFLOW cannot be stopped. This could happen in case that IPFLOW wasn't activated and
started before. In this case some related error message will be printed.
To display IPFLOW tracer parameters and status, ipflow param command is used.
SIZE and RECIRCLE fields contain values previously set during ipflow act command. In case that ipflow act is executed
without specifying them, value used will be that indicated by ipflow param command.
304
Draft IPRTR - IP Router Draft
Status field indicates the IPFLOW tracing state. It can have several values:
ACTIVE tracer is activated but not started yet. Resources are currently allocated but tracing is not performed;
RUNNING tracer is activated and started. All IP packets that matches filtering rules are stored into tracer list;
ANALYZED and CAPTURED fields can increase their number only during RUNNING status. ANALYZED field indicates
all the IP packets being analyzed by IPFLOW that could be tracer or not depending on filtering options. CAPTURED
contains only all that IP packets that after being analyzed by IPFLOW, they matched with filtering rules and then were stored
into tracer list. These fields are initialized everytime that IPFLOW tracer is started.
Up to 32 filters can be set using a fixed identifier. Each filter record can be added, removed and set in every tracing moment,
but the values really used by IPFLOW will be during the execution of ipflow start command. In fact, we can distinguish
between 2 different display commands:
IPFLOW FILTER [DISPLAY] all filters present will be loaded and used by IPFLOW after ipflow start command;
305
Draft IPRTR - IP Router Draft
IPFLOW FILTER USED filter displayed in this command are exactly filters used during tracing phase
(RUNNING state);
Using ipflow filter used command when IPFLOW is not in running state will display empty information:
-------------------------------------------------------------------------------
ID: SNET:/NET: DNET:
SIP: PROT:
SPO:/PO: DPO:
-------------------------------------------------------------------------------
0 192.168.000.005 192.168.000.200
4 tcp
telnet(23)
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
ID: SNET:/NET: DNET:
SIP: PROT:
SPO:/PO: DPO:
-------------------------------------------------------------------------------
*** NO USED FILTERS ***
If ipflow filter used command is executed during running state, will be shown filters currently in use by IPFLOW:
-------------------------------------------------------------------------------
ID: SNET:/NET: DNET:
SIP: PROT:
SPO:/PO: DPO:
-------------------------------------------------------------------------------
0 192.168.000.005 192.168.000.200
4 tcp
telnet(23)
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
ID: SNET:/NET: DNET:
SIP: PROT:
SPO:/PO: DPO:
-------------------------------------------------------------------------------
0 192.168.000.005 192.168.000.200
4 tcp
telnet(23)
-------------------------------------------------------------------------------
In order to reset ipflow filter used display, user must be execute ipflow inact command.
--------------------------------------------------------------------------------
REC: 1
Packet IN:
SA:192.168.000.200 DA:192.168.000.005 PROT:tcp SPO:23 DPO:2768 LEN:552
SIP:INTERNAL
NAT:
306
Draft IPRTR - IP Router Draft
IncomingSide:OUTSIDE
DstRC:NONE
SrcRC:NONE
External destination:
DIP:4 DST-GW:DIRECT
Packet OUT:
DIP:4 SRC-MAC:00-00-00-00-00-00 DST-MAC:00-00-00-00-00-00
DST-GW:192.168.000.005
Main return Code: GOOD
--------------------------------------------------------------------------------
REC: 2
Packet IN:
SA:192.168.000.200 DA:192.168.000.005 PROT:tcp SPO:23 DPO:2768 LEN:552
SIP:INTERNAL
NAT:
IncomingSide:OUTSIDE
DstRC:NONE
SrcRC:NONE
External destination:
DIP:4 DST-GW:DIRECT
Packet OUT:
DIP:4 SRC-MAC:00-00-00-00-00-00 DST-MAC:00-00-00-00-00-00
DST-GW:192.168.000.005
Main return Code: GOOD
--------------------------------------------------------------------------------
REC: 3
Packet IN:
SA:192.168.000.005 DA:192.168.000.200 PROT:tcp SPO:2768 DPO:23 LEN:40
SIP:4 SRC-MAC:00-1E-8C-D5-5E-16 DST-MAC:00-0C-42-07-47-97 DST-MAC-TYPE:U
NAT:
IncomingSide:OUTSIDE
DstRC:NONE
SrcRC:NONE
Internal destination:
Packet forwarded to internal tcp upper layer
Main return Code: GOOD (TCP)
IPFLOW Display usually is made after ipflow stop command, but it can be done also during running state.
Caution
During display command on running state, ABILIS system can generate IP packets by its own (commonly
TELNET/SSH packet if user is connected remotely by such protocols). If these packets match with IPFLOW
filter, we'll have that IPFLOW trace its own packets generated. In such situation, ipflow display command
will terminate with a "IPFLOW TRACER BUFFER UNDERRUN" message.
Each IP packet record stored has the complete flow of packet inside IPRTR. As written previously, there are several steps
that a packet can follow. Here we have them in detail.
For each step of the record (e.g. PACKET IN, IPACL, NAT...) there are present some information about IP packet. These
information are displayed in a single row. If packet information is the same of previous step (data is still unchanged)
this information will be omitted. Usually IP packet information can change during IPSEC or NAT steps. Basic IP packet
information indicates:
307
Draft IPRTR - IP Router Draft
SA Source IP address;
DA Destination IP address;
19.7.8.2. PACKET IN
Packet IN:
SA:192.168.000.005 DA:192.168.000.200 PROT:tcp SPO:2768 DPO:23 LEN:40
SIP:4 SRC-MAC:00-1E-8C-D5-5E-16 DST-MAC:00-0C-42-07-47-97 DST-MAC-TYPE:U
SIP Source IP resource. It is the IP resource where packet come from. It can have several values indicating
incoming interface or INTERNAL in case that packet has been generated internally by ABILIS system;
SRC-MAC This is the source MAC address of the sender of the packet. MAC address is related to ETHERNET
layer;
DST-MAC This is the destination MAC address of the receiver of the packet. MAC address is related to
ETHERNET layer (in this step the receiver MAC address will be the one present on the ABILIS ethernet
card);
DST-MAC-TYPE MAC destination type of the packet received. This information is detected by lower layer and can
indicate 3 different types;
B Broadcast: packet: is for all the receivers present on that specific network;
Caution
First description row about IP packet fields will be hidden in case that all the fields will be the same of
previous step.
IPACL Contain the number of IPACL matched by IP packet. In case of no match, there will be printed NO-MATCH and
all the following fields will be omitted;
HIGH High priority, packet will be threated with the highest priority;
LOW Low priority, packet will be threated with the lowest priority;
308
Draft IPRTR - IP Router Draft
CRKEY This field is present only in case that CRDIR is set as ENCRYPT/DECRYPT. It contains the CRKEY used for
ciphering algorithm;
Caution
First description row about IP packet fields will be hidden in case that all the fields will be the same of
previous step.
RetCode Contain the result of the IPSEC management of the IP packet. It can have several results:
REASS IP packet is only a fragment of a bigger packet. It needs to be reassembled before being managed
by IPSEC service;
BYPASSED IP packet has been analyzed and bypassed. No additional IPSEC operations were done to packet;
DROPPED IP packet has been analyzed and discarded. Due to IPSEC rules, IP packet cannot be forwarded;
NatSide Upon decoding an IP packet from tunnel, it can have different side types:
NP Side not present. This situation happens when IPSEC return code is not good;
IntDst This is simply a flag indicating if packet decoded by IPSEC will have ABILIS system as final destination;
19.7.8.5. NAT
NAT:
SA:192.168.000.005 DA:192.168.000.200 PROT:tcp SPO:2768 DPO:23 LEN:40
IncomingSide:OUTSIDE
DstRC:GOOD OutgoingIPRes:IP-4 OutgoingSide:INSIDE Added:YES
SrcRC:GOOD OutgoingIPRes:IP-4 OutgoingSide:INSIDE Added:YES
IPSecOutgoingSide:INSIDE
Caution
First description row about IP packet fields will be hidden in case that all the fields will be the same of
previous step.
IncomingSide Contains the NAT side of the interface where IP packet comes from. It can be:
309
Draft IPRTR - IP Router Draft
DstRC/SrcRC Contain the return code of the NAT processing phase to IP packet (processes are separated
between source and destination):
TCPRESET TCP session cannot be opened, a RESET message will be sent to the originator of
the TCP packet;
This field will be hidden in case that DstRC/SrcRC are set to NONE.
OutgoingSide Contain the NAT side of the interface where IP packet is going to be sent. It can be:
This field will be hidden in case that DstRC/SrcRC are set to NONE.
Added Indicates that current IP packet has made NAT to add a translation rule into its dynamic table
(this value is present only in case that translation is created. In all other situation this field will be
hidden);
IPSecOutgoingSide Is possible that a packet could be encoded by IPSEC into a tunnel In case of IPSEC tunnel, it can
have following values:
NP Side not present. This situation happens when IPSEC return code is not good;
Caution
First description row about IP packet fields will be hidden in case that all the fields will be the same of
previous step.
310
Draft IPRTR - IP Router Draft
This step hasn't additional information to show. Only a single descriptive row is present to indicate that IP packet destination
is ABILIS itself, indicating which IP protocol will manage it.
Caution
First description row about IP packet fields will be hidden in case that all the fields will be the same of
previous step.
DST-GW This indicated which is the IP gateway where IP packet will be forwarded. If the receiver host is directly
on the same network and there is no need of a gateway, will be printed DIRECT instead;
LoadBalance In case of load-balancing, this will indicate which is the pool of IP resources where IP packet could be
sent. In case of no load-balancing detected, this row will be missing;
Caution
First description row about IP packet fields will be hidden in case that all the fields will be the same of
previous step.
RetCode Contain the result of the IPSEC management of the IP packet. It can have several results:
REASS IP packet is only a fragment of a bigger packet. It needs to be reassembled before being managed
by IPSEC service;
BYPASSED IP packet has been analyzed and bypassed. No additional IPSEC operations were done to packet;
DROPPED IP packet has been analyzed and discarded. Due to IPSEC rules, IP packet cannot be forwarded;
NatSide Upon encoding an IP packet for IPSEC tunnel, it can have different side types:
NP Side not present. This situation happens when IPSEC encoding return code is not good;
311
Draft IPRTR - IP Router Draft
Caution
First description row about IP packet fields will be hidden in case that all the fields will be the same of
previous step.
SRC-MAC This is the source MAC address of the sender of the packet. MAC address is related to ETHERNET layer (in
this step the sender MAC address will be the one generated by ABILIS. Usually it will be 00-00-00-00-00-00
except for specific protocol usage, e.g. like DHCP);
DST-MAC This is the destination MAC address of the receiver of the packet. MAC address is related to ETHERNET layer
(in this step the receiver MAC address will be the one present on the outgoing interface network. Usually it will
be 00-00-00-00-00-00 except for specific protocol usage, e.g. like DHCP);
312
Draft Draft
Table of Contents
20.1. NAT resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
20.1.1. Frequently used expression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
20.1.2. Activating the NAT resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
20.1.3. NAT resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
20.2. NAT Aliases table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
20.2.1. D NAT (Display NAT alias) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
20.2.2. A NAT (Add NAT alias) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
20.2.3. C NAT (C NAT alias) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
20.2.4. S NAT (Set NAT Alias) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
20.2.5. M NAT (Move NAT Alias) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
20.2.6. INIT RES:NAT and INIT NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
20.3. NAT diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
20.3.1. NAT diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
20.3.2. NAT statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
20.3.3. Debug of the NAT resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
20.4. Examples of NAT configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
20.4.1. Suggest an access from inside workstations to outside networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
20.4.2. Suggest an access from outside networks to internal servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
20.4.3. Configuring a DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
By properly specifying:
Note
Abilis is not a Firewall! It implements basic firewall function, but evolved features must be commissioned to
a “real” firewall. Abilis and firewall can coexist with no problems.
1
http://en.wikipedia.org/wiki/Network_address_translation
2
http://en.wikipedia.org/wiki/Port_address_translation
313
Draft NAT - Network Address Translation Draft
• Outside. All other networks, usually “public” addresses located on the Internet.
• Inside local IP address. The IP address which was assigned to a host on the inside network.
• Inside global IP address. The IP address of an inside host as it appears to the outside networks. If, as usual, the outside
network is the Internet, the address must be one of the “public” addresses which the ISPs have assigned to user's router for
those connections. In the table of NAT Aliases this term called as ANET:.
• Processed IP packet. It mean in this packet was changed a source or destination address in some cases a source or
destination port was changed too.
• Ignored IP packet. It mean that this packet was not changed.
• Static Address Translation. The user can establish a one-to-one mapping between the inside local and global addresses,
which happens when the number (netmask) of inside local and global addresses are identical.
• Dynamic Source Address Translation. The user can establish dynamic mapping between the inside and global addresses,
which happens when the number (netmask) of inside local and global addresses are different.
• Port Address Translation (PAT). The user can save addresses in the global address pool by allowing source ports in TCP
connections or UDP conversations to be translated. Different local addresses will be mapped to the same global address,
with port translation providing the necessary uniqueness for TCP/UDP and other tricks providing uniqueness for ICMP.
• Extended filtering in PAT mode. The purpose of this feature is to allow a selective activation of the PAT translation
based on the destination TCP/UDP port and on the IP protocol, with the result that network managers can empower their
control of the network by:
• Granting access only to some service, e.g. web and ftp.
• Blocking access only to specific services, e.g. realaudio / realvideo servers
• Precisely distinguishing inbound connections from outbound ones
• Allowing internal users to access ANY service on the Internet while outside users may access only a restricted set
• Destination port mapping. This behaviour is very useful in many situations, the most frequents are:
• The user has just one public IP address and on the internal LAN there are more computers on several IP addresses
running different services that must be reached from outside, e.g. FTP, HTTP, SMTP and so on
• The user has just one public IP address and on the internal LAN there are more computers on several IP addresses
running the same service with different contents, e.g. a commercial web, a technical web, a restricted access web.
The NAT resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the NAT active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
314
Draft NAT - Network Address Translation Draft
TCP-RST:YES PPTP-CONN:360
INSIDE-MIL:300 OUTSIDE-MIL:50 VPN-MIL:NOLIMIT DMZ-MIL:NOLIMIT
MIL-TIME:2
RES:Nat -----------------------------------------------------------------------
Run DESCR:Network_Address_Translator
LOG:DS ACT:YES dimtable:1000
DNS-ALG:NO SNMP-ALG:NO PPTP-ALG:NO IKE-AWARE:YES
- Not PAT mode parameters ----------------------------------------------
TOUT:3600
- PAT mode parameters --------------------------------------------------
FRAG:5 ICMP:5 DNS:5 SNMP:5 SNTP:5
UDP-OPENING:5 UDP-CONN:180
TCP-OPENING:5 TCP-CONN:360 TCP-CLOSING:15 TCP-CLOSED:1
TCP-RST:YES PPTP-CONN:360
INSIDE-MIL:300 OUTSIDE-MIL:50 VPN-MIL:NOLIMIT DMZ-MIL:NOLIMIT
MIL-TIME:2
dimtable It specifies how many translations can be created at the same time.
IKE-AWARE Enable/disable IKE awareness. Minimise remap of UDP ports 500 and 4500 [NO, YES]
TOUT This value sets the timeout of static and dynamic translations, i.e. those created without the PAT mode. If
the translation is not used for the specified time (i.e. no packets need it), it times out and it has removed by
the translation table.
INSIDE-MIL Maximal number of links that same IP address on INSIDE interface can open at the same time
[NOLIMIT, 1..10000]
315
Draft NAT - Network Address Translation Draft
OUTSIDE-MIL Maximal number of links that same IP address on OUTSIDE interface can open at the same time
[NOLIMIT, 1..10000]
VPN-MIL Maximal number of links that same IP address on VPN interface can open at the same time [NOLIMIT,
1..10000]
DMZ-MIL Maximal number of links that same IP address on DMZ interface can open at the same time [NOLIMIT,
1..10000]
MIL-TIME Resync time used for maximal initiator links procedure [2..30 sec]
The following command allows the administrator to change the configuration of the resource:
s p nat parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init res:nat;
while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required
(i.e. with warm start command).
The entry priority index sets the entries verification order and must be sequential. The priority index for NAT Aliases is used
as a reference for operations of insertion, modification and deletion.
Commands for handling the table of NAT Aliases are the following:
• d nat
• a nat
• c nat
• s nat
• m nat
Changes made in the table are activated by executing the command init nat without needing to restart Abilis CPX.
Configured maps
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC 192.168.000.000/24 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
1 IN SRC 192.168.001.000/24 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
2 IN SRC 010.100.100.000/24 * OUT-IP
OUT * * AUTO YES
316
Draft NAT - Network Address Translation Draft
-------------------------------------------------------------------------------
3 OUT DST * 083.211.161.025/32 083.211.161.025/32
IN * * * YES
-------------------------------------------------------------------------------
NAT supports 4 divided zones: INSIDE, OUTSIDE, DMZ, VPN (an ip resource can be assigned freely to one of these
zones).
Meaning of parameters:
INAT Input NAT [NONE, IN (or INSIDE), OUT (or OUTSIDE), VPN, DMZ] Values can be joined using ',' character.
<Optional>
ONAT Output NAT [NONE, IN (or INSIDE), OUT (or OUTSIDE), VPN, DMZ] Values can be joined using ',' character.
<Optional>
SNET Source Network IP address [0.0.0.0, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x] and mask length [0-32] or "*" or the
name of an IP/IR/RU/MR list for network IP addresses between primes or "Ip-nnn", where 'nnn' is an IP resource
index in [1..250]. (E.g.: * or 192.168.0.1/32 or 'ListName' or Ip-23)
SPO Allowed source TCP/UDP port(s): <Only for PROT:TCP/UDP> a single port mnemonic or decimal value [1..65535]
or two port values separated by ':' (colon) or "*" (Any port) or the name of a TUP/RU/MR list between primes (E.g.:
22 or SSH or 1:1024 or * or 'List')
PROT Allowed IP protocols [ICMP, TCP, UDP, *, NONE]. <Only for PAT:YES> Values can be joined using ',' character.
DNET Destination Network IP address [0.0.0.0, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x] and mask length [0-32] or "*" or the
name of an IP/IR/RU/MR list for network IP addresses between primes or "Ip-nnn", where 'nnn' is an IP resource
index in [1..250]. (E.g.: * or 192.168.0.1/32 or 'ListName' or Ip-23)
DPO Allowed destination TCP/UDP port(s): <Only for PROT:*|TCP|UDP> a single port mnemonic or decimal value
[1..65535] or two port values separated by ':' (colon) or "*" (Any port) or the name of a TUP/RU/MR list between
primes (E.g.: 22 or SSH or 1:1024 or * or 'List')
ANET Alias network IP address [0.0.0.0, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x] and mask length [0-32] or "OUT-IP" or "Ip-
nnn", where 'nnn' is an IP resource index in [1..250]. (E.g.: 192.168.0.1/32 or OUT-IP or Ip-1)
APO Alias source or destination TCP/UDP port: <Only for PROT:*|TCP|UDP> a single port mnemonic or decimal value
[1..65535] or "*" (leaves the port unchanged) or AUTO (for ADD:SRC assigns a dynamic and currently unused port
number, for ADD:DST behaves like "*") (E.g.: SSH or 22 or * or AUTO) The aliased port is 'SPO' for ADD:SRC
records and 'DPO' for ADD:DST.
317
Draft NAT - Network Address Translation Draft
Configured maps
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
[17:29:36] ABILIS_CPX:a nat pr:1 inat:in onat:out add:src snet:192.168.5.0/24 anet:217.1.1.1/32 pat
COMMAND EXECUTED
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
1 IN SRC 192.168.005.000/24 * 217.001.001.001/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
Tip
Interesting chapters:
Section 52.9, “How to access IP hosts and services which are behind a NAT manager (port forwarding)”.
c nat pr:xxx
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
318
Draft NAT - Network Address Translation Draft
COMMAND EXECUTED
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
1 IN SRC 192.168.005.000/24 * 217.001.001.001/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
1 IN SRC 192.168.005.000/24 * 217.001.001.001/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
319
Draft NAT - Network Address Translation Draft
COMMAND EXECUTED
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
1 IN SRC 192.168.003.000/24 * 217.001.001.002/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
Tip
Interesting chapters:
Section 52.9, “How to access IP hosts and services which are behind a NAT manager (port forwarding)”.
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
1 IN SRC 192.168.003.000/24 * 217.001.001.002/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
2 IN SRC 192.168.005.000/24 * 217.001.001.001/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
320
Draft NAT - Network Address Translation Draft
COMMAND EXECUTED
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
1 IN SRC 192.168.005.000/24 * 217.001.001.001/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
2 IN SRC 192.168.003.000/24 * 217.001.001.002/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
• init nat: it refreshes the NAT static table and clears the NAT dynamic table content.
• init res:nat: it refreshes the NAT static table but DOESN'T clear the NAT dynamic table content.
The “Not Refreshed (INIT)” message is displayed every time the table is modified but not refreshed.
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
1 IN SRC 192.168.005.000/24 * 217.001.001.001/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
2 IN SRC 192.168.003.000/24 * 217.001.001.002/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
COMMAND EXECUTED
321
Draft NAT - Network Address Translation Draft
Configured maps
- Not Saved (SAVE CONF) -------------------------------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
1 IN SRC 192.168.005.000/24 * 217.001.001.001/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
2 IN SRC 192.168.003.000/24 * 217.001.001.002/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
d d nat / d de nat Shows diagnostic information, such as the state of the resource, the current number of
translations present into NAT table, the maximum number of translations reached from
start-up into the NAT table and the maximum number of translations present into the
table (this information indicate the dimtable parameter).
RES:Nat -----------------------------------------------------------------------
Network_Address_Translator
STATE:READY
-----------|--- CUR ---|-- PEAK ---|--- MAX ---|
LINKS | 68| 417| 1000|
------------------------------------------------
d s nat / d se nat Shows statistic information, such as the number of processed ICMP/TCP/UDP/FTP/
DNS/SNMP/SNTP packets, the number of processed FRAGMENT ID/FRAGMENT
POINTER packets, etc..
RES:Nat -----------------------------------------------------------------------
Network_Address_Translator
--- Cleared 0 days 02:44:37 ago, on 03/11/2010 at 14:16:24 -------------
REQ:1427707 SUCCESS:692528 IGNORED:734527
OVERFLOW:0 TCP-RST:230647 ERROR:0
FTP-OVR:0 DNS-OVR:0 SNMP-MF:0
FTP-BCT:0 DNS-EF:0 PPTP-MT:0
------------------------------------------------------------------------
-----------|---INSIDE--|--OUTSIDE--|----VPN----|----DMZ----|
BLOCKED | 649| 0| 0| 0|
------------------------------------------------------------------------
ICMP-ERR | 0| 0| 0| 0|
322
Draft NAT - Network Address Translation Draft
TCP-ERR | 0| 0| 0| 0|
UDP-ERR | 0| 0| 0| 0|
------------------------------------------------------------------------
ICMP-SRC | 0| 0| 0| 0|
ICMP-DST | 0| 673| 0| 0|
TCP-SRC | 111815| 0| 0| 0|
TCP-DST | 0| 97366| 0| 0|
UDP-SRC | 226209| 0| 0| 0|
UDP-DST | 0| 256465| 0| 0|
GRE-SRC | 0| 0| 0| 0|
GRE-DST | 0| 0| 0| 0|
OTHERS-SRC | 0| 0| 0| 0|
OTHERS-DST | 0| 0| 0| 0|
------------------------------------------------------------------------
ONATDISCARD| 0| 0| 0| 0|
------------------------------------------------------------------------
FRAG-ID:0 FRAG-POINTER:0
FRAG-UNRESOLVED:0 FRAG-HEADER-FOUND:0
------------------------------------------------------------------------
RES:Nat -----------------------------------------------------------------------
Network_Address_Translator
BufferLength:1824 Date/Time:03/11/2010 17:06:51 TraceTime:10227853
Usage:
LSN:0 - This help (default).
LSN:1 - Debug unavailable: use D NAT MAPS instead.
LSN:2 - View statistics and information.
LSN:3 CMD:DISPLAY - Show current NAT trace (default).
LSN:3 CMD:ACT[,param,...] - Activate the trace.
323
Draft NAT - Network Address Translation Draft
To view the current NAT sessions type (the command debug res:nat lsn:1 is no more available):
Meaning of parameters:
S (SIDE) it's composed by two letters. The first shows the input side and the second the translation side ( I :
INSIDE, O: OUTSIDE, V: VPN, D: DMZ).
A it shows if the translation must be applied to the suorce address or to the destination one(S: SOURCE D:
DESTINATION).
TYPE it shows the packets protocol. The translation is applied only if TYPE matches with the protocol of the
packets to analyse. (ICMP, UDP, DNS, SNTP, SNMP, TCP, FTPc, FTPd, FRAG, PPTc, PPTd).
SRC-ADDRESS it shows the applied filter on the source address. If the received packet source address doesn't match with
SRC-ADDRESS, the translation is not applied.
SP/ID If TYPE is FRAG, PPT or ICMP, it shows the packet ID used to verify if the translation matches. If TYPE
is TCP or UDP, it shows the packet source port.
DST-ADDRESS it shows the applied filter on the destination address. If the received packet destination address doesn't
match with DST-ADDRESS, the translation is not applied.
DP/ID If TYPE is FRAG, PPT or ICMP, it shows the packet ID used to verify if the translation matches. If TYPE
is TCP or UDP, it shows the packet destination port.
ALS-ADDRESS if TYPE, SRC-ADDRESS, SP/ID, DST-ADDRESS, DP/ID, ALS-ADDRESS match, it shows the new ip
address which will be assigned to the one in the packet. If A:S, the source address is replaced with ALS-
ADDRESS. if A:D, the destination address is replaced with ALS-ADDRESS.
ALIAS if TYPE, SRC-ADDRESS, SP/ID, DST-ADDRESS, DP/ID, ALS-ADDRESS match, it shows the new
DP/ID which will be assigned to the one in the packet. If A:S, the current SP/ID is replaced with ALIAS.
if A:D, the DP/ID is replaced with ALIAS.
324
Draft NAT - Network Address Translation Draft
TM it's the translation lifetime. When TM reaches 0, the translation is deleted. Each time the translation is
matched, the TM is initialized to a specific value depending of NAT resource configuration.
Type the following command to allow the “inside” network 192.168.1.0/24 to reach the “outside” network 10.0.0.0/24 by
using the CPX IP address (10.0.0.1) as “alias” and allowing the Port Address Translation.
Configured maps
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
[08:57:46] ABILIS_CPX:_a nat pr:1 inat:in onat:out add:src snet:192.168.1.0/24 anet:10.0.0.1/32 pat
COMMAND EXECUTED
325
Draft NAT - Network Address Translation Draft
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
1 IN SRC 192.168.001.000/24 * 010.000.000.001/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
COMMAND EXECUTED
After applying this rule, a host “inside” network 192.168.1.0/24 can reach the “outside” network 10.0.0.0/24:
ubuntu@ubuntu:~$ ifconfig
eth0 Link encap:Ethernet HWaddr 20:cf:30:42:36:9c
inet addr:192.168.1.3 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::22cf:30ff:fe42:369c/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5511 errors:0 dropped:0 overruns:0 frame:0
TX packets:3044 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:5509729 (5.5 MB) TX bytes:255424 (255.4 KB)
Interrupt:47
326
Draft NAT - Network Address Translation Draft
327
Draft NAT - Network Address Translation Draft
328
Draft NAT - Network Address Translation Draft
Three of our servers are described in outside network (for example Internet) as :
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
0 IN SRC Ip-1 * OUT-IP
OUT * * AUTO YES
-------------------------------------------------------------------------------
1 OUT DST * 192.168.001.100/32 192.168.030.011/32
IN * 81 http(80) YES
* * TCP SYS
-------------------------------------------------------------------------------
2 OUT DST * 192.168.001.100/32 192.168.030.012/32
IN * 82 http(80) YES
* * TCP SYS
-------------------------------------------------------------------------------
3 OUT DST * 192.168.001.100/32 192.168.030.013/32
IN * 83 http(80) YES
* * TCP SYS
-------------------------------------------------------------------------------
COMMAND EXECUTED
329
Draft NAT - Network Address Translation Draft
330
Draft NAT - Network Address Translation Draft
331
Draft NAT - Network Address Translation Draft
332
Draft NAT - Network Address Translation Draft
• servers located in the DMZ can be reachable from the external interface
333
Draft NAT - Network Address Translation Draft
Assuming to have the ip address already assigned to network interfaces, IP resources must be configured in the following
way:
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
334
Draft NAT - Network Address Translation Draft
335
Draft NAT - Network Address Translation Draft
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
SAVE EXECUTED
COMMAND EXECUTED
[08:34:23] ABILIS_CPX:a nat pr:2 inat:out onat:dmz add:dst snet:* dnet:192.168.0.201/32 danet:192.
COMMAND EXECUTED
COMMAND EXECUTED
Configured maps
- Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------------------
-------------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO: PAT:
SIP: DIP: PROT: TOUT:
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
1 IN SRC 192.168.030.000/24 192.168.031.000/24 192.168.031.001/32
DMZ * * AUTO YES
-------------------------------------------------------------------------------
2 IN SRC 192.168.030.000/24 * 192.168.000.201/32
OUT * * AUTO YES
-------------------------------------------------------------------------------
3 OUT DST * 192.168.000.201/32 192.168.031.100/32
DMZ * * AUTO YES
-------------------------------------------------------------------------------
COMMAND EXECUTED
336
Draft NAT - Network Address Translation Draft
COMMAND EXECUTED
The rule PR:1 is useful to allow LAN to reach servers located in the DMZ, the rule PR:2 allows to reach a server with ip
address 192.168.31.100 located in the DMZ from Internet, while PR:3 allows LAN to reach Internet.
337
Draft Draft
Table of Contents
21.1. IPSH resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
21.1.1. IPSH resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
21.2. IP Flow table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
21.2.1. D IPSH FLOW (Display IP Shaping Flow) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
21.2.2. A IPSH FLOW (Add IP Shaping Flow) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
21.2.3. C IPSH FLOW (Clear IP Shaping Flow) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
21.2.4. S IPSH FLOW (Set IP Shaping Flow) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
21.3. IP Rule table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
21.3.1. D IPSH RULE (Display IP Shaping Rule) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
21.3.2. A IPSH RULE (Add IP Shaping Rule) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
21.3.3. C IPSH RULE (Clear IP Shaping Rule) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
21.3.4. S IPSH RULE (Set IP Shaping Rule) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
21.4. IP User table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
21.4.1. D IPSH USER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
21.5. IPSH diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
21.5.1. IPSH diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
21.5.2. IPSH statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
These criteria are configured using a specific flow table. Once the criteria is matched, a specific traffic shaping rule will
define the behaviour to use for those packets.
RES:IpSh ----------------------------------------------------------------------
Run DESCR:IP_Shaping_service
LOG:NO ACT:YES buf:2000 maxuser:500
MAXUSER-EXCEED:BYPASS
Note
The “Not Saved (SAVE CONF)” message is displayed every time the port is modified but not saved with
the save conf command.
Note
The “Not Refreshed (INIT)” message is displayed every time the port is modified but not refreshed with the
initialization command init res:ipsh or init ipsh.
338
Draft IPSH - IP Shaping Draft
LOG State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E] (D: Debug Log; S:
System Log; A: Alarm view; L: Local audible alarm; T: SNMP traps; +E: Extended Log of
state changes, see ref. manual).
buf Maximum number of packets which can be hold in shaping queues [500..10000].
MAXUSER-EXCEED Behaviour to adopt when maxuser limit is exceeded [DROP, BYPASS, LIMIT].
MAXUSER-EXCEED- Throughput limitation for packets that exceeds maxuser limit [64..100000 kbit/sec]
LIMIT
Note
Only for MAXUSER-EXCEED:LIMIT.
The following command allows the administrator to change the configuration of the resource:
s p ipsh parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:ipsh; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are
required (i.e. with warm start command).
The command save conf saves all flows inside the table. In the configuration files up to 255 flows are saved.
The available commands for managing the IP flow table are the following:
• d ipsh flow
• a ipsh flow
• c ipsh flow
• s ipsh flow
---+---------------------------------------------------------------------------
PR:|[DESCR:]
|DIR:|RULE:| LOWBW:|HIGHBW:|CHECK: |IP:
---+----+-----+-------+-------+----------+-------------------------------------
0 IN 1 64 350 PRE-NAT 192.168.000.000/24
1 OUT 1 256 5000 POST-NAT 192.168.000.000/24
Note
The “Not Saved (SAVE CONF)” message is displayed every time the table is modified but not saved with
the save conf command.
339
Draft IPSH - IP Shaping Draft
Note
The “Not Refreshed (INIT)” message is displayed every time the table is modified but not refreshed with the
initialization command init res:ipsh or init ipsh.
DESRC Entry description. From 0 up to 70 Alphanumeric extended characters. Case is preserved. Spaces are allowed.
Strings holding spaces must be written between quotation marks (E.g. "str1 str2").
DIR Flow direction [IN, OUT] When 'IN', the shaping in made by checking the source IP of packets received by Abilis
CPX. When 'OUT', the shaping in made by checking the destination IP of packets transmitted by Abilis CPX.
RULE Rule assigned to current flow [#, LOWBW, HIGHBW, 1..32] When '#', rule is not assigned. When 'LOWBW',
bandwidth is limited to LOWBW: value. When 'HIGHBW', bandwidth is limited to HIGHBW: value. When
1..32, identifier of a dynamic rule in the IPSH RULE table.
LOWBW Lower bandwidth limit [64..100000 kbit/sec]. The actual bandwidth limit will be modulated between LOWBW:
and HIGHBW: according to the RULE: algorithm.
HIGHBW Higher bandwidth limit [64..100000 kbit/sec] The actual bandwidth limit will be modulated between LOWBW:
and HIGHBW: according to the RULE: algorithm.
IP IP address filter. For DIR:IN the filter is applied on SOURCE IP. For DIR:OUT the filter is applied on
DESTINATION IP. Single Ip address [0.0.0.1-255.255.255.255] or subnet [x.x.x.x/y] or Ip addresses range
separated by ':' (colon) or the name of an IP/IR/RU/MR list between primes or "#" or "*".
COMMAND EXECUTED
[14:00:15] ABILIS_CPX:a ipsh flow pr:1 dir:out rule:1 lowbw:256 highbw:4096 check:post-nat ip:192.1
COMMAND EXECUTED
---+---------------------------------------------------------------------------
PR:|[DESCR:]
|DIR:|RULE:| LOWBW:|HIGHBW:|CHECK: |IP:
---+----+-----+-------+-------+----------+-------------------------------------
0 IN 1 512 8192 PRE-NAT 192.168.000.005
2 OUT 1 256 4096 POST-NAT 192.168.000.000/24
340
Draft IPSH - IP Shaping Draft
---+---------------------------------------------------------------------------
PR:|[DESCR:]
|DIR:|RULE:| LOWBW:|HIGHBW:|CHECK: |IP:
---+----+-----+-------+-------+----------+-------------------------------------
0 IN 1 512 8192 PRE-NAT 192.168.000.005
1 IN 1 256 4096 PRE-NAT 192.168.000.000/24
2 OUT 1 256 4096 POST-NAT 192.168.000.000/24
COMMAND EXECUTED
---+---------------------------------------------------------------------------
PR:|[DESCR:]
|DIR:|RULE:| LOWBW:|HIGHBW:|CHECK: |IP:
---+----+-----+-------+-------+----------+-------------------------------------
0 IN 1 512 8192 PRE-NAT 192.168.000.005
1 OUT 1 256 4096 POST-NAT 192.168.000.000/24
---+---------------------------------------------------------------------------
PR:|[DESCR:]
|DIR:|RULE:| LOWBW:|HIGHBW:|CHECK: |IP:
---+----+-----+-------+-------+----------+-------------------------------------
0 IN 1 512 8192 PRE-NAT 192.168.000.005
1 IN 1 256 4096 PRE-NAT 192.168.000.000/24
COMMAND EXECUTED
---+---------------------------------------------------------------------------
PR:|[DESCR:]
|DIR:|RULE:| LOWBW:|HIGHBW:|CHECK: |IP:
---+----+-----+-------+-------+----------+-------------------------------------
0 IN 1 512 8192 PRE-NAT 192.168.000.005
1 OUT 1 256 4096 POST-NAT 192.168.000.000/24
The command save conf saves all rules inside the table. In the configuration files up to 32 rules are saved.
341
Draft IPSH - IP Shaping Draft
The available commands for managing the IP rule table are the following:
• d ipsh rule
• a ipsh rule
• c ipsh rule
• s ipsh rule
ID:1 DESCR:
TI1:ALL,00:00-23:59 TI2:#
TYPE:VARIANCE PERIOD:300 THRESHOLD:10
STEP-DOWN:50 STEP-UP:200
Note
The “Not Saved (SAVE CONF)” message is displayed every time the table is modified but not saved with
the save conf command.
Note
The “Not Refreshed (INIT)” message is displayed every time the table is modified but not refreshed with the
initialization command init res:ipsh or init ipsh.
DESCR Entry description. From 0 up to 70 Alphanumeric extended characters. Case is preserved. Spaces are allowed.
Strings holding spaces must be written between quotation marks (E.g. "str1 str2"). It is displayed only when
not empty.
TI1 Time interval indicating rule enable. The format used to specify the interval is: "day,hh:mm-hh:mm", where
'day' can be: a single day [MO, TU, WE, TH, FR, SA, SU] or a set of days (E.g.: MO+TH or TU+TH+SU
etc.) or an interval.(E.g.: MO-WE or TH-SU etc. or ALL).
TI2 Time interval indicating rule enable. The format used to specify the interval is: "day,hh:mm-hh:mm", where
'day' can be: a single day [MO, TU, WE, TH, FR, SA, SU] or a set of days (E.g.: MO+TH or TU+TH+SU
etc.) or an interval.(E.g.: MO-WE or TH-SU etc. or ALL).
• When 'VARIANCE-WH', rule must follow variance algorithm. Bandwidth range is affected by working
hours (WH-TI).
PERIOD Time interval used for algorithm rule calculation [30..1800 sec].
THRESHOLD Variance threshold: above or equal threshold the traffic is interactive, below it is stream. [0..20].
STEP- Reduction percentage for each reduction step, calculated respect to current bandwidth limit. [0..90].
DOWN
STEP-UP Increasing percentage for each increase step, calculated respect to current bandwidth limit. [110..500].
WH-TI1 Time interval during which the WH-LOWBW: and WH-HIGHBW: reductions take place. The format used
to specify the interval is: "day,hh:mm-hh:mm", where 'day' can be: a single day [MO, TU, WE, TH, FR,
342
Draft IPSH - IP Shaping Draft
SA, SU] or a set of days (E.g.: MO+TH or TU+TH+SU etc.) or an interval.(E.g.: MO-WE or TH-SU etc. or
ALL).
Note
Only for TYPE:VARIANCE-HW.
WH-TI2 Time interval during which the WH-LOWBW: and WH-HIGHBW: reductions take place. The format used
to specify the interval is: "day,hh:mm-hh:mm", where 'day' can be: a single day [MO, TU, WE, TH, FR,
SA, SU] or a set of days (E.g.: MO+TH or TU+TH+SU etc.) or an interval.(E.g.: MO-WE or TH-SU etc. or
ALL).
Note
Only for TYPE:VARIANCE-HW.
WH- Reduction percentage during working hours applied to LOWBW: value specified in the IPSH FLOW that
LOWBW references this rule. [10..90].
Note
Only for TYPE:VARIANCE-HW.
WH- Reduction percentage during working hours applied to HIGHBW: value specified in the IPSH FLOW that
HIGHBW references this rule. [10..90].
Note
Only for TYPE:VARIANCE-HW.
COMMAND EXECUTED
ID:1 DESCR:
TI1:ALL,00:00-23:59 TI2:#
TYPE:VARIANCE PERIOD:300 THRESHOLD:10
STEP-DOWN:50 STEP-UP:200
ID:1 DESCR:
TI1:ALL,00:00-23:59 TI2:#
TYPE:VARIANCE PERIOD:300 THRESHOLD:10
STEP-DOWN:50 STEP-UP:200
343
Draft IPSH - IP Shaping Draft
ID:2 DESCR:
TI1:ALL,00:00-23:59 TI2:#
TYPE:VARIANCE-WH PERIOD:300 THRESHOLD:10
STEP-DOWN:50 STEP-UP:150
WH-TI1:ALL,00:00-23:59
WH-TI2:#
WH-LOWBW:50 WH-HIGHBW:50
COMMAND EXECUTED
ID:1 DESCR:
TI1:ALL,00:00-23:59 TI2:#
TYPE:VARIANCE PERIOD:300 THRESHOLD:10
STEP-DOWN:50 STEP-UP:200
ID:1 DESCR:
TI1:ALL,00:00-23:59 TI2:#
TYPE:VARIANCE PERIOD:300 THRESHOLD:10
STEP-DOWN:50 STEP-UP:200
COMMAND EXECUTED
ID:1 DESCR:
TI1:MO-FR,08:30-12:30 TI2:MO-FR,14:00-18:00
TYPE:VARIANCE PERIOD:60 THRESHOLD:10
STEP-DOWN:50 STEP-UP:200
344
Draft IPSH - IP Shaping Draft
192.168.000.029 NA 4096 NA 0 NA 0 NA NA
192.168.000.034 NA 4096 NA 0 NA 0 NA NA
192.168.000.035 NA 4096 NA 0 NA 0 NA NA
192.168.000.066 NA 4096 NA 0 NA 0 NA NA
192.168.000.082 NA 4096 NA 0 NA 0 NA NA
192.168.000.113 NA 4096 NA 0 NA 0 NA NA
192.168.000.114 NA 4096 NA 0 NA 0 NA NA
192.168.000.126 NA 4096 NA 0 NA 0 NA NA
192.168.000.131 NA 4096 NA 0 NA 0 NA NA
192.168.000.134 NA 4096 NA 0 NA 0 NA NA
192.168.000.139 NA 4096 NA 0 NA 0 NA NA
192.168.000.150 NA 4096 NA 0 NA 0 NA NA
192.168.000.152 NA 4096 NA 0 NA 0 NA NA
192.168.000.160 NA 4096 NA 0 NA 0 NA NA
192.168.000.168 NA 4096 NA 0 NA 0 NA NA
192.168.000.169 NA 4096 NA 0 NA 0 NA NA
192.168.000.171 NA 4096 NA 0 NA 0 NA NA
192.168.000.248 NA 4096 NA 0 NA 0 NA NA
192.168.000.249 NA 4096 NA 0 NA 0 NA NA
d d ipsh / d de ipsh Shows diagnostic information, such as the state of the resource, the current and
maximum number of buffers reached from start-up into the IPRTR's incoming/
outgoing FIFOs and the maximum number of users present into the user table (this
information indicate the maxuser parameter).
RES:IpSh ----------------------------------------------------------------------
IP_Shaping_service
STATE:READY
MAX-BUF:2000 CUR-BUF:23 PEAK-BUF:952
MAX-S-BUF:10000 CUR-S-BUF:0 PEAK-S-BUF:339
MAX-USER:500 CUR-USER:19 PEAK-USER:39
d s ipsh / d se ipsh Show statistic information, such the number of IP datagrams analyzed sent/received,
number of IP datagrams shaped due to ip shaping flow matching and those ignored
345
Draft IPSH - IP Shaping Draft
because don't match. There are also dropped packets due to MAXUSER-EXCEED set
with DROP or out-of-buffer due to buf parameter.
RES:IpSh ----------------------------------------------------------------------
IP_Shaping_service
--- Cleared 4 days 18:57:29 ago, on 16/09/2011 at 17:42:18 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
ANALYZED | 92348416| 92328825|SHAPED | 17811290| 26150576|
IGNORED | 74537126| 66178249|DROPPED | 0| 0|
OUTBUF | 0| 0|MAXUSERS-EX| 0| 0|
------------------------------------------------------------------------
346
Draft Draft
Table of Contents
22.1. IP Access Control List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
22.1.1. TOS (Type Of Service) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
22.1.2. Activating IPACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
22.2. IPACL management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
22.2.1. D IPACL (Display IP Access Control List) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
22.2.2. A IPACL (Add IP Access Control List filter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
22.2.3. C IPACL (Clear IP Acces Control List filter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
22.2.4. S IPACL (Set IP Access Control List filter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
22.2.5. M IPACL (Move IP Access Control List filter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
22.2.6. F IPACL (Find IP Access Control List filter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
22.3. Examples of IPACL configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
22.3.1. IP packets blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
22.3.2. Giving High Priority to VoIP packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
• STD (Standard): in this case the such called “address filtering” procedure is executed; only IP source and destination
addresses of the packet are checked.
• EXT (Extended): in this case the “service filtering” procedure is executed; IP source, IP destination addresses of the
packet, the internet protocol version and, for TCP, UDP protocols, the logical port numbers (indeed also the requested
service).
Filters also allow assigning each datagram data flow a different service class:
Usually the service classes are also called “priorities” so that it is possible to speak of “the traffic prioritisation”.
Tip
This feature is very important when VoIp and Data applications use the same link. In these cases, voice
packets must have the highest priority.
347
Draft IPACL - IP Access Control List Draft
Caution
“Packet filtering” definitions must be added carefully cause the access to the Abilis by IP may be
blocked!
The Type of Service is used to indicate the quality of the service desired.
It's abstract set of parameters characterizing the service choices provided in the networks which make up the internet.
• N = None;
• D = Minimize Delay;
• T = Maximize Throughput;
• R = Maximize Reliability;
• C = Minimize Monetary Cost.
RES:Iprtr ---------------------------------------------------------------------
DESCR:IP_Router_general_properties
- General --------------------------------------------------------------
R-ID:AUTO (192.168.001.001)
maxroute:500 DFTTTL:64 ps:2048
DEF-LOCAL-AD:0 DEF-STATIC-AD:1 DEF-OSPF-AD:110 DEF-RIP-AD:120
pvc:0 bsvc:0 LINKS:4 virtual:0
- IP Access List -------------------------------------------------------
ACL:NO ACLBYPASS:#
COS:DISABLED COSDFT:NORMAL
COSBALANCE:NO NORMRATE:50 LOWRATE:50
- IP Trace -------------------------------------------------------------
tracerec:100
- Ppp-Dns --------------------------------------------------------------
PPP-DNS-PRI:062.094.000.001 PPP-DNS-SEC:062.094.000.002
The highlight parameters manages the IPACL activation and functionality mode.
ACL It activates the IP Access List service and chooses the operating mode [NO, STD, EXT].
ACLBYPASS It sets the IP address of the IP datagram received that will be managed without considering filters eventually
defined in the IP Access List [*: stands for “any IP address”, that is the IP access list service will be applied
to any IP datagrams; #: stands for “no IP address”, that is the IP access list service will NOT be applied to
any IP datagrams; 1-126.x.x.x, 128-223.x.x.x].
348
Draft IPACL - IP Access Control List Draft
COS It activates/deactivates the IP classes of service. Class of service is a feature used to assign different
priorities to specific paths of IP datagrams. The assignment of this priority is done by IPRTR upon
reception of every IP datagram, using the information present in the IPACL.
COSDFT It sets the Class of IP service default value [LOW, NORMAL, HIGH].
COSBALANCE It activates/deactivates the balance functionality of the IP classes of service. This procedure provides an
acceptable service to each class by avoiding that higher priority classes are too prevalent respect the lower
ones. The user, through the parameters NORMRATE and LOWRATE, can set the percentage balance ratio.
NORMRATE It sets the percentage balance ratio between resources allocated for the classes with “NORMAL” priority
and the ones with “HIGH” priority.
LOWRATE It sets the percentage balance ratio between resources allocated for the classes with “LOW” priority and the
ones with “NORMAL” priority.
For example, the command for enable the IPACL in Extended mode and the COS Management is:
COMMAND EXECUTED
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:iprtr; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
In this section will be described the commands for the IP Access Control List management.
• d ipacl
• a ipacl
• c ipacl
• s ipacl
• m ipacl
• f ipacl
349
Draft IPACL - IP Access Control List Draft
Every filter is identified by a priority index which is used to add, modify and delete IPACL entries.
Priority indexes, every time a filter is added or deleted, are automatically kept in sequential order.
Changes to IPACL are immediately active, so there's no need to restart Abilis CPX.
Tot-IPACL-Number:0
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
*** NO IP ACCESS LISTS DEFINED ***
PR The priority index sets the filter verifying order. The verifying procedure is executed on each datagram. It
starts from the filter with priority 0 and continues until the suitable datagram is found or the list ends. If the IP
datagram doesn't match any filter, it will be routed; if the IP services class functionality is activated, the Router
will assign to the datagram the default priority set in the parameter COSDFT of the port IPRTR.
TYPE This command sets whether the datagram, matching the filter, have to be routed (filter matched type PERMIT)
or discarded (filter matched type DENY).
IPCOS This parameter is displayed and configurable only for PERMIT filters type. It is considered only if the IP classes
service are activated (COS:ENABLED) [DFT (default); HIGH; NORMAL; LOW].
SA It sets the IP address which the datagrams source address has to match (or be contained in). It may be expressed
as:
• a single value, using the Dotted Decimal Notation (E.g.: 150.200.192.192).
• an interval, by separating the two IP addresses with : (colon) character (E.g.: 192.168.0.0:192.168.0.100).
• the name of an Elements List of type IP or IR or RU or MR, written between primes (E.g.: 'My_List').
• the * (asterisk) string, that stands for “any IP address”.
DA It sets the IP address (IP interval of addresses) which the datagrams destination address has to match (or be
contained in). It may be expressed as:
• a single value, using the Dotted Decimal Notation (E.g.: 150.200.192.192).
• an interval, by separating the two IP addresses with : (colon) character (E.g.: 192.168.0.0:192.168.0.100).
• the name of an Elements List of type IP or IR or RU or MR, written between primes (E.g.: 'My_List').
• the * (asterisk) string, that stands for “any IP address”.
PROT It sets the Internet protocol where the filter can be applied on. It may be expressed as:
• mnemonic or numeric identifier [1 - 254] of an Internet Protocol (E.g.: tcp or 6).
• the name of an Elements List of type IPT or RU or MR, written between primes (E.g.: 'My_List').
• the tcpudp string, that stands for “tcp and/or udp protocols”.
• the * (asterisk) string, that stands for “any Internet protocol”.
SPO This parameter is used only for TCP and UDP protocols type. It sets the source port (interval of ports) that the
datagrams source port has to match (or be contained in). It may be expressed as:
• mnemonic or numeric identifier [1 - 65535] of a TCP/UDP port (E.g.: telnet or 23).
• an interval, by separating the two TCP/UDP ports value with : (colon) character (E.g. 23:161 or telnet:snmp).
• the name of an Elements List of type TUP or RU or MR, written between primes (E.g.: 'My_List').
350
Draft IPACL - IP Access Control List Draft
DPO This parameter is used only for TCP and UDP protocols type. It sets the destination port (interval of ports) that
the datagrams destination port has to match (or be contained in). It may be expressed as:
• mnemonic or numeric identifier [1 - 65535] of a TCP/UDP port (E.g.: telnet or 23).
• an interval, by separating the two TCP/UDP ports value with : (colon) character (E.g. 23:161 or telnet:snmp).
• the name of an Elements List of type TUP or RU or MR, written between primes (E.g.: 'My_List').
• the * (asterisk) string, that stands for “any TCP/UDP port”.
PO This parameter is used only for TCP and UDP protocols type, in alternative to the parameters SPO and DPO. It
sets the port value (or an interval of values) which the datagram source or destination port has to match (or be
contained in).
• mnemonic or numeric identifier [1 - 65535] of a TCP/UDP port (E.g.: telnet or 23).
• an interval, by separating the two TCP/UDP ports value with : (colon) character (E.g. 23:161 or telnet:snmp).
• the name of an Elements List of type TUP or RU or MR, written between primes (E.g.: 'My_List').
• the * (asterisk) string, that stands for “any TCP/UDP port”.
TOS-IN Input Type of Service octet or Differentiated Services Field. It may be expressed as:
• * or *-* means “don't change”.
• p-t, PRECEDENCE and TOS values, where p can be [0..7, *] and t can be [combination of N: None; D:
Minimize Delay; T: Maximize Throughput; R: Maximize Reliability; C: Minimize Monetary Cost; *].
• bbbbbb, DS value bit by bit, where b can be [0, 1, x] and x means “don't care”.
TOS-OUT Output Type of Service octet or Differentiated Services Field. It may be expressed as:
• * or *-* means “don't change”.
• p-t, PRECEDENCE and TOS values, where p can be [0..7, *] and t can be [combination of N: None; D:
Minimize Delay; T: Maximize Throughput; R: Maximize Reliability; C: Minimize Monetary Cost; *].
• bbbbbb, DS value bit by bit, where b can be [0, 1, x] and x means “don't care”.
SIP It sets the IP port from where the datagrams have to come in for matching the filter [* (any IP port): it allows
to accept any IP resource; INT (internal IP resource): it allows to accept datagrams routed to any internal IP
resource].
DIP It sets the IP port where the datagrams have to be routed to for matching the filter [* (any IP port): it allows
to accept any IP resource; INT (internal IP resource): it allows to accept datagrams routed to any internal IP
resource].
CRDIR It specifies whether the datagrams, matching the filter, have to be routed transparently (value NONE) or they
have to be encrypted (value ENCRYPT) or decrypted (value DECRYPT).
CRKEY It defines the cryptographic key to be used for datagrams matching the filter.
TI Time interval; this parameters allows to specify a time band for which the IPACL can be used. The time band
must be indicated in the following form:
ggg-hh1:mm1-hh2:mm2
where
• ggg: is the indication of the day/s of the week in which the routing can be utilized and can assume the
following values:
• single day: [MO, TU, WE, TH, FR, SA, SU].
• a set of days: (es.: MO+TH or TU+TH+SU etc.).
• an interval: (es.: MO-WE or TH-SU etc. or ALL).
• hh1:mm1: is the indication of the beginning of the hourly interval of the validity of the routing.
• hh2:mm2: is the indication of the end of the hourly interval of the validity of the routing.
351
Draft IPACL - IP Access Control List Draft
Tot-IPACL-Number:2
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 PERMIT 192.168.000.001:192.168.000.010 *
DFT * *
* * 2 5 NONE
-------------------------------------------------------------------------------
1 DENY * *
* *
* * 2 5 NONE
-------------------------------------------------------------------------------
[11:56:38] ABILIS_CPX:a ipacl pr:1 type:permit sa:192.168.0.50:192.168.0.60 da:* prot:tcp spo:* dpo
COMMAND EXECUTED
Tot-IPACL-Number:3
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 PERMIT 192.168.000.001:192.168.000.010 *
DFT * *
* * 2 5 NONE
-------------------------------------------------------------------------------
1 PERMIT 192.168.000.050:192.168.000.060 *
DFT tcp * http(80)
* * 2 5 NONE
-------------------------------------------------------------------------------
2 DENY * *
* *
* * 2 5 NONE
-------------------------------------------------------------------------------
c ipacl pr:xx
352
Draft IPACL - IP Access Control List Draft
Tot-IPACL-Number:3
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 PERMIT 192.168.000.001:192.168.000.010 *
DFT * *
* * 2 5 NONE
-------------------------------------------------------------------------------
1 PERMIT 192.168.000.050:192.168.000.060 *
DFT tcp * http(80)
* * 2 5 NONE
-------------------------------------------------------------------------------
2 DENY * *
* *
* * 2 5 NONE
-------------------------------------------------------------------------------
COMMAND EXECUTED
Tot-IPACL-Number:2
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 PERMIT 192.168.000.001:192.168.000.010 *
DFT * *
* * 2 5 NONE
-------------------------------------------------------------------------------
1 DENY * *
* *
* * 2 5 NONE
-------------------------------------------------------------------------------
353
Draft IPACL - IP Access Control List Draft
Tot-IPACL-Number:2
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 PERMIT 192.168.000.001:192.168.000.010 *
DFT * *
* * 2 5 NONE
-------------------------------------------------------------------------------
1 DENY * *
* *
* * 2 5 NONE
-------------------------------------------------------------------------------
COMMAND EXECUTED
Tot-IPACL-Number:2
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 PERMIT 192.168.000.001:192.168.000.010 *
DFT tcp *
* * 2 5 NONE
-------------------------------------------------------------------------------
1 DENY * *
* *
* * 2 5 NONE
-------------------------------------------------------------------------------
354
Draft IPACL - IP Access Control List Draft
Tot-IPACL-Number:2
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 DENY * *
* *
* * 2 5 NONE
-------------------------------------------------------------------------------
1 PERMIT 192.168.000.001:192.168.000.010 *
DFT * *
* * 2 5 NONE
-------------------------------------------------------------------------------
COMMAND EXECUTED
Tot-IPACL-Number:2
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 PERMIT 192.168.000.001:192.168.000.010 *
DFT * *
* * 2 5 NONE
-------------------------------------------------------------------------------
1 DENY * *
* *
* * 2 5 NONE
-------------------------------------------------------------------------------
The command has two different ways of searching in the IP access list:
• Standard searching mode: the search is made by verifying the source and destination IP address fields, the Type Of
Service and source IP port value; optionally it can make a verification on the destination IP port;
• Extended searching mode: the search is made by verifying the source and destination IP address, the Type Of Service,
Internet protocol, source and destination ports (required only for TCP and UDP protocols); optionally it can make a
verification on the destination IP port;
355
Draft IPACL - IP Access Control List Draft
• f ipacl EXT SrcAddr DstAddr TOS Protocol SrcPort DstPort SrcIp [DstIp] [Time]
Tot-IPACL-Number:2
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 PERMIT * *
LOW * *
* * INT * NONE
-------------------------------------------------------------------------------
1 DENY * *
* *
* * 1 * NONE
-------------------------------------------------------------------------------
[12:44:12] ABILIS_CPX:f ipacl EXT 1.1.1.1 2.2.2.2 C tcp 1024 2000 INT
IP FORWARDING IS PERMITTED:
- OUTPUT TOS/DS: 0-TR/000011 (00001100 [0C])
- IP CLASS OF SERVICE: LOW
- ENCRYPTION/DECRYTPTION DIRECTION: NONE
[15:54:19] ABILIS_CPX:a ipacl pr:0 type:deny prot:tcp sa:192.168.20.1 spo:* da:192.168.20.253 dpo:8
COMMAND EXECUTED
Tot-IPACL-Number:1
356
Draft IPACL - IP Access Control List Draft
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 DENY 192.168.020.001 192.168.020.253
tcp * http(80)
-------------------------------------------------------------------------------
[16:16:35] ABILIS_CPX:a ipacl pr:0 type:permit ipcos:high tos-in:*-d prot:udp sa:* da:* sip:int spo
COMMAND EXECUTED
Tot-IPACL-Number:1
-------------------------------------------------------------------------------
PR: [DESCR:]
TYPE: SA: DA:
IPCOS: PROT: SPO:/PO: DPO:
TOS-IN: TOS-OUT: SIP: DIP: CRDIR: CRKEY:
TI:
-------------------------------------------------------------------------------
0 PERMIT * *
HIGH udp * *
*-D * INT * NONE
-------------------------------------------------------------------------------
This rule means that all the packets with any IP source address and any UDP port, marked as “Minimum Delay” (TOS-
IN:*-D) must be sent with HIGH priority, leaving the same value of TOS (TOS-OUT:*).
357
Draft Draft
Table of Contents
23.1. RIP Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
23.1.1. Activating the RIP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
23.1.2. RIP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
23.2. RIP External Routes filter table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
23.2.1. D RIP EXTERNAL (Display RIP External Routes filter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
23.2.2. A RIP EXTERNAL (Add RIP External Routes filter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
23.2.3. C RIP EXTERNAL (Clear RIP External Routes filter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
23.2.4. S RIP EXTERNAL (Set RIP External Routes filter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
23.3. RIP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
23.3.1. RIP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
23.3.2. RIP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
23.4. Examples of RIP configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
23.4.1. Activation of RIP resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
23.4.2. Configuration of RIP resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
23.4.3. Configuration of IP resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
23.4.4. Configuration of IP Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
23.4.5. Display IP routing tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
The RIP resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
358
Draft RIP - Routing Information Protocol Draft
Caution
After adding or setting the RIP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
RES:Rip -----------------------------------------------------------------------
Run DESCR:Routing_Information_Protocol
LOG:NO ACT:YES locport:520 fifo:15 max-routes:500 SH:PR
AUT:NO PWD: UT:30 LT:180 GT:120 ASBR:YES
- ASBR section ---------------------------------------------------------
LOCAL:YES STATIC:YES OSPF:NO
LOCAL-METRIC:* STATIC-METRIC:* OSPF-METRIC:*
DEF-METRIC:1
SH Split Horizon: this parameter sets the routing update mode used by the RIP resource [NO: update
information sent by the RIP resource on the net will include all the IP routings stored in the IP
routing table; YES: update information sent by the RIP resource on the net will only include those
routings not obtained from the interface where the information are sent to. This updating procedure
is referred as “Split Horizon”; PR: routings should not be included in the update information,
however they are sent as well but their metric is set to 16 hops. This updating procedure is referred
as “Split Horizon and Poison Reverse”].
AUT This parameter sets the authentication functionality of information received and forwarded by the
RIP resource [NO: no authentication is applied on the information exchanged by the Abilis CPX with
other routers; STD: authentication algorithm includes sending update messages of the password as it
is set in the parameter PWD; MD5: the algorithm MD5 is used for authenticating the update messages
jointly with the password set in the parameter PWD].
359
Draft RIP - Routing Information Protocol Draft
ASBR Autonomous System Boundary Router: the router locates in point where RIP AS connects with other
AS that does not use RIP routing protocol. An ASBR is used to distribute routes received from other
ASs throughout its own AS. Usually this parameter will set to YES, because only in this case RIP
can import external routing. In case that ASBR is set to NO, RIP table will be filled only by routings
obtained by other RIP routers in the network.
LOCAL, STATIC, Enables/disables usage of LOCAL, STATIC and OSPF routes for the redistribution into RIP [NO,
OSPF YES];
LOCAL-METRIC, Metric used to redistribute LOCAL, STATIC and OSPF routes imported from the IPRTR route table
STATIC-METRIC, into RIP [0..16, *]; the value * stands for “use default”, i.e. indicates to use the DEF-METRIC
OSPF-METRIC parameter value.
DEF-METRIC It sets the default metric value that will be used for redistribution routes, of any type, imported from
the IPRTR routing table into RIP. Used when a “protocol specific” value does not override it.
The following command allows the administrator to change the configuration of the resource:
s p rip parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init res:rip;
while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required
(i.e. with warm start command).
Normally you don't need to configure all the listed parameters. Many of them belong to the RIP protocol advanced options,
which are optional.
The basic options are LOG:YES to activate resource, and ASBR:YES to allow import of external routing.
This table is used only when this router is declared as ASBR (ASBR:YES).
3. A table with at least one “accept” record for a protocol becomes a “default ignore” for that protocol.
In the first case, the filtering is possible only “by protocol” (through the parameters LOCAL, STATIC and OSPF).
In the third case, all the routes for the protocol having at least one “accept” record are ignored, except those explicitly
accepted.
Commands for managing the table of RIP External Routes are the following:
• d rip external
• a rip external
• c rip external
• s rip external
360
Draft RIP - Routing Information Protocol Draft
----------------------------------------------
EXTERNAL: PROT: ACTION: METRIC:
----------------------------------------------
192.168.006.002/32 OSPF ACCEPT 5
192.168.006.000/24 LOCAL IGNORE 1
010.000.000.000/8 ANY ACCEPT 10
000.000.000.000/0 ANY ACCEPT *
----------------------------------------------
EXTERNAL It specifies the external IP network that can be imported (or not) into RIP resource.
PROT This parameter defines a routing protocol for which this filter will be applied [ANY, LOCAL, STATIC, OSPF];
ACTION This parameter indicates if the selected network EXTERNAL can be accepted or ignored by RIP resource
[IGNORE: do not distribute this IP addresses into RIP; ACCEPT: distribute this IP addresses into RIP]. This
means that all the routing present in the IP Routings table which matches with EXTERNAL will be imported to
RIP table in case that ACTION is set to ACCEPT (and then will be used also specified metric METRIC), and
will be not imported in case that it is set to IGNORE.
METRIC This parameter sets the metric value that will be used for redistribution routes, of LOCAL, STATIC or OSPF
type, imported from the IP Routings table into RIP. The value * stands for “use default metric”.
Example: add a rule for accept the RIP packets for the net 192.168.5.0/24 (static routing) and assign to it the exporting metric
value 5.
COMMAND EXECUTED
----------------------------------------------
EXTERNAL: PROT: ACTION: METRIC:
----------------------------------------------
192.168.005.000/24 STATIC ACCEPT 5
----------------------------------------------
361
Draft RIP - Routing Information Protocol Draft
----------------------------------------------
EXTERNAL: PROT: ACTION: METRIC:
----------------------------------------------
192.168.005.000/24 STATIC ACCEPT 5
----------------------------------------------
COMMAND EXECUTED
----------------------------------------------
EXTERNAL: PROT: ACTION: METRIC:
----------------------------------------------
*** NO RIP EXTERNAL ROUTEs DEFINED ***
----------------------------------------------
EXTERNAL: PROT: ACTION: METRIC:
----------------------------------------------
192.168.005.000/24 STATIC ACCEPT 5
----------------------------------------------
COMMAND EXECUTED
----------------------------------------------
EXTERNAL: PROT: ACTION: METRIC:
----------------------------------------------
192.168.005.000/24 STATIC ACCEPT 3
----------------------------------------------
362
Draft RIP - Routing Information Protocol Draft
d d rip / d de rip Shows diagnostic information, such as the state of the resource, the state of the RIP
routing table, the current percentage of routings present into routing table, the current
number of routings present into routing table, the maximum number of routings
reached from start-up into table, the MAX-ROUTES parameter present into RIP
resource.
RES:Rip -----------------------------------------------------------------------
Routing_Information_Protocol
STATE:READY
------------------------------------------------------------------------
RIP ROUTINGs TABLE Diagnostics
-----------|---State---|-Current%--|--Current--|---Peak----|----Max----|
ROUTINGS |NORMAL | 52| 260| 263| 500|
d s rip Shows statistic information, such as the number of RIP version 1 and version 2 messages sent/received, the
overall number of messages received with a bad RIP version/command, the overall number of messages
received with a bad routing and the overall number of messages lost during transmission.
d se rip Shows statistic information in an extended format: the information listed for d s rip command are shown along
with the number of update request received/sent, the number of responses (sent/received) to the update request,
the number of NORMAL/FLASH update messages sent/received, the number of datagrams with a REQUEST/
RESPONSE command and the number of datagrams sent/received with a command different from REQUEST
or RESPONSE sent/received.
RES:Rip -----------------------------------------------------------------------
Routing_Information_Protocol
--- Cleared 158:19:30:57 ago, on 21/07/2007 at 15:57:28 ----------------
CHANGES:0 QUERIES:0
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FRM-V1 | 197| 1880|FRM-V2 | 18510552| 9287082|
BAD-VER | 0| |BAD-CMD | 0| |
BAD-ROUT | 0| |LOST | | 0|
------------------------------------------------------------------------
RES:Rip -----------------------------------------------------------------------
Routing_Information_Protocol
--- Cleared 158:19:30:51 ago, on 21/07/2007 at 15:57:29 ----------------
CHANGES:0 QUERIES:0
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FRM-V1 | 197| 1880|FRM-V2 | 18510552| 9287071|
BAD-VER | 0| |BAD-ROUT | 0| |
REQ-UPD | 385| 26|RESP-UPD | | 3361|
NORM-UPD | | 8573150|FLASH-UPD | | 712414|
REQ-CMD | 387| 26|RESP-CMD | 18510362| 9288925|
OTHER-CMD | 0| 0|BAD-CMD | 0| |
LOST | | 0|
------------------------------------------------------------------------
363
Draft RIP - Routing Information Protocol Draft
• to ensure automatic switch to backup connection between two remote sites, when primary link is down; in one of the two
sites primary and backup connection are not managed by the same router.
• Site 1
• Site 2
• Abilis2: remote router connected to Site1 with a primary and backup link.
In this example is not required to analyze the kind of connection between the two sites.
In the following sections will be shown how to configure the Abilis of “Site 1”:
In this example won't be necessary to use the RIP External Routes filter table: it means that the general rule will be “accept”.
• Abilis-1P:
364
Draft RIP - Routing Information Protocol Draft
COMMAND EXECUTED
Caution
After adding or setting the RIP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
• Abilis-1B:
Abilis-1P is the Abilis that manage the primary link to Abilis2, so its metric default value must be the lowest one: it will be
leaved to default value 1. So, on this Abilis is enough to enable the resource.
• Abilis-1B:
Abilis-1B is the Abilis that manage the backup link to Abilis-2, so its metric default value must be higher the Abilis-1P
one: it will be set to the value 3.
COMMAND EXECUTED
With this command we have assigned to all the IP routings of Abilis-1B the metric value 3, so they will be exported with
this cost.
365
Draft RIP - Routing Information Protocol Draft
The Abilis-1P and Abilis-1B are connected on the same Ethernet LAN, so we have to active RIP on the correspondent IP
resources (res:ip-1).
RP It's used to activate/deactivate routing protocols on this interface; when RIP protocol is
selected, the specific parameter section will be activated.
RIPSEND It sets the protocol used for sending RIP updates [RIP1, RIP2B, NO];
RIPRECV It sets the protocol accepted for receiving RIP updates [RIP1, RIP2, BOTH, NO];
RIPNU (normal update) It sets whether RIP updates have to be sent regularly or only in case of variations;[NO:
updates are sent only if the routing table is changed,YES: updates are sent regularly
according to the RIP resource];
RIPMETRIC It sets the metric associated to IP port according to meant and the rules prescribed by the
routing algorithm RIP.
• Abilis-1P:
COMMAND EXECUTED
• Abilis-1B:
COMMAND EXECUTED
366
Draft RIP - Routing Information Protocol Draft
Caution
To initialize the resources, use the init res:ip-1 command (to set act the changes made on uppercase
parameters) and remember to save the configuration to preserve the modifications (save conf).
RES:Iprtr ---------------------------------------------------------------------
DESCR:IP_Router_general_properties
- General --------------------------------------------------------------
R-ID:AUTO (192.168.001.254)
maxroute:500 DFTTTL:64 ps:2048
DEF-LOCAL-AD:0 DEF-STATIC-AD:1 DEF-OSPF-AD:110 DEF-RIP-AD:120
pvc:0 bsvc:0 LINKS:1 virtual:0
- IP Access List -------------------------------------------------------
ACL:NO ACLBYPASS:#
COS:DISABLED COSDFT:NORMAL
COSBALANCE:NO NORMRATE:50 LOWRATE:50
- IP Trace -------------------------------------------------------------
tracerec:100
- Ppp-Dns --------------------------------------------------------------
PPP-DNS-PRI:000.000.000.000 PPP-DNS-SEC:000.000.000.000
The parameter DEF-RIP-AD sets the default value of the Administrative Distance for the routes received from RIP.
The parameter DEF-LOCAL-AD sets the default value of the Administrative Distance for local-connected routes.
When IPRTR gets routing from different routings protocol, must give them a specific priority. This parameter can be
overridden in case of current routing is present in administrative distance table.
By joining this two parameters it's possible to complete configurations: the DEF-LOCAL-AD parameter on Abilis-1B will
have a higher value than the Abilis-1P's one, so that the local-connected routes of Abilis-1B will have the lowest priority.
Remember that the aim is to ensure automatic switch to backup connection between two remote sites. When primary link
is down, the Abilis-1B must inform Abilis-1P that the better way to reach the “Site2” is through it, but during the normal
working Abilis-1B must know that the way to reach the “Site2” is through Abilis-1P.
On Abilis-1B:
COMMAND EXECUTED
367
Draft RIP - Routing Information Protocol Draft
Caution
To initialize the resources, use the init res:iprtr command (to set act the changes made on uppercase
parameters) and remember to save the configuration to preserve the modifications (save conf).
In this situation Abilis-1B receives from Abilis-1P the route for the Site2's network (192.168.2.0/24): the priority of this route
is higher than the route local-connected, so the RIP route will be considered the best.
Otherwise, this will be the routing table when backup link is operating.
368
Draft RIP - Routing Information Protocol Draft
In this situation Abilis-1P receives from Abilis-1B the route for the Site2's network (192.168.2.0/24): the IP resource 5 on
Abilis-1P is declared down (D 5), so the correspondent route won't be sent by RIP; the RIP route will be considered the best,
so the packets for the remote network will be sent through Abilis-1B.
In this way (supposing that Abilis-1P is the default gateway for the network 192.168.1.0/24), the users in Site1 could reach
the Site2's network through the backup link, without change anything on their terminals!
369
Draft Draft
Table of Contents
24.1. VRRP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
24.1.1. Activating the VRRP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
24.1.2. VRRP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
24.2. VRRP table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
24.3. VRRP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
24.3.1. VRRP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
24.3.2. VRRP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
24.4. Examples of VRRP configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
24.4.1. One-sided protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
24.4.2. Load sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
24.4.3. Multiple Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
24.4.4. Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
24.4.5. Virtual Routers Without Owner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
24.4.6. One Backup Protecting Two Masters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
24.4.7. Virtual Routers With Multiple IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
24.4.8. Two-sided protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
The VRRP resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the VRRP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
1
http://en.wikipedia.org/wiki/Vrrp
370
Draft VRRP - Virtual Router Redundancy Protocol Draft
COMMAND EXECUTED
RES:Vrrp ----------------------------------------------------------------------
Run DESCR:Virtual_Router_Redundancy_Protocol
LOG:NO ACT:NO mxps:256 TOS:0-N
mxps Sets the maximum size of the packets handled (expressed in bytes).
The following command allows the administrator to change the configuration of the resource:
s p vrrp parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:vrrp; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
-------------------------------------------------------------------------------
ID: NAME: IP: VRID: PRIO: PREEMPT:
ADVER-INT: INIT-STATE: AUTH: AUTH-DATA: DEP-RES:
IP1: IP2: IP3: IP4:
-------------------------------------------------------------------------------
*** NO VRRP ROUTERs DEFINED ***
Each record of the table allow to configure up to 4 virtual IP addresses. This is an example of master virtual router.
371
Draft VRRP - Virtual Router Redundancy Protocol Draft
VRID Virtual Router IDentifier: this is a number used to identify current router ID. Every different router which is
going to handle MASTER and BACKUP functionalities on the same IP addresses must have also the same
router ID.
PRIO Virtual router priority used when sending datagrams to the other virtual routers. High values means higher
priority.
INIT-STATE Initial state of the VRRP router. This value indicates if at start-up current virtual router must be MASTER
or BACKUP.
DEP-RES Virtual router dependency resource. Status of specified resource will affect status of virtual router: if the
resource goes down, also virtual router will goes down allowing another backup virtual router to become
active. Multiple resources can be specified separated by comma in DEP-RES: parameter, (e.g. S VRRP ID:0
DEP-RES:Ip-1,Ip-2,Ip-3,Ip-4).
Note
The VRRP entry can become active only if all the DEP-RES are UP.
The example below shows how to configure the Virtual router as BACKUP.
372
Draft VRRP - Virtual Router Redundancy Protocol Draft
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:vrrp; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
d d vrrp / d de vrrp Shows diagnostic information, such as the state of the resource, the number of VRRP
routers, the VRRP router name and identifier, the IP interface, the Virtual Router
identifier and priority, etc..
RES:Vrrp ----------------------------------------------------------------------
Virtual_Router_Redundancy_Protocol
STATE:DOWN ROUTERS-NUMB:0
- Routers diagnostics: -------------------------------------------------
Id: Name: Ip: VRId: Prio: Preempt:
Adver-Int: I-State: State: T-Stamp: Auth:
------------------------------------------------------------------------
*** NO VRRP ROUTERs ***
d s vrrp Shows statistic information of VRRP resource, such as the total number of received/sent advertisiment
packets, the total number of sent gratuitous ARP packets, the total number of dropped incoming
advertisiment packets, etc..
d se vrrp Shows statistic information of VRRP resource (the information listed for d s vrrp command) and the
statistics of VRRP router.
RES:Vrrp ----------------------------------------------------------------------
Virtual_Router_Redundancy_Protocol
--- Cleared 0 days 03:32:21 ago, on 27/12/2007 at 10:30:50 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
PKT | 0| 0|PKT-ARP | | 0|
DROP | 0| |LONG | 0| |
NO-BUF | 0| |BAD-CHK | 0| |
BAD-FORMAT | 0| |FIND | 0| |
------------------------------------------------------------------------
RES:Vrrp ----------------------------------------------------------------------
Virtual_Router_Redundancy_Protocol
--- Cleared 0 days 03:32:24 ago, on 27/12/2007 at 10:30:51 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
PKT | 0| 0|PKT-ARP | | 0|
DROP | 0| |LONG | 0| |
NO-BUF | 0| |BAD-CHK | 0| |
BAD-FORMAT | 0| |FIND | 0| |
------------------------------------------------------------------------
373
Draft VRRP - Virtual Router Redundancy Protocol Draft
The shape in the drawing labeled with VRID V1 (or 37 as an illustration that VRID is an integer) indicates that R1 and R2
are members of the VRRP virtual router V1. Router R1 is the master in virtual router V1 and R2 is the backup. As long as the
master is functional, all traffic destined to the external network gets directed to R1. But as soon as R1 fails, R2 takes over as
the master and starts handling packets forwarded to the interface associated with IP(R1).
374
Draft VRRP - Virtual Router Redundancy Protocol Draft
In such circumstances the network deployer may decide to assign R2 as a default router to some hosts on the LAN (H3
and H4), implementing a loadsharing scheme: the traffic coming from H1 and H2 is handled by R1, and H3-H4 traffic is
forwarded to R2.
However, the protection of R2 needs to be explicitly set up. To create this setup, we need to define two virtual routers, V1
and V2, and we need to define the opposite roles to our routers in V1 and V2. Figure 24.2, “Load sharing between VRRP
routers” illustrates this setup.
375
Draft VRRP - Virtual Router Redundancy Protocol Draft
In this setup R1 is defined as the master of the V1 and R2 as the backup. In V2, R2 is the master and R1 acts as the backup.
This configuration implements:
• a mutual protection setup by having two routers acting as backups for each other.
Note
In case of failure of one of the routers, one can suffer some degradation in the network service, unless the
network is engineered accordingly.
• network managers know when one fails: it is much easier to detect the failure of an active device than of equipment which
is in a passive monitoring mode;
• an active device is kept in a fully working state (software and hardware upgrades).
376
Draft VRRP - Virtual Router Redundancy Protocol Draft
377
Draft VRRP - Virtual Router Redundancy Protocol Draft
In this configuration R1 is designated as the default router for all the hosts and the master of the virtual router V1. R2, R3 are
redundant backups ready to take over the default router role if R1 fails. A mechanism for deciding which one of the routers,
R2 or R3, should become the master is needed.
• the value 0 has a special meaning to indicate that the current master is releasing its mastership responsibility;
• in case of failover the VRRP elects the router with the highest priority as the master.
If there are more routers having the same priority, VRRP uses a second criterion based on IP address:
• each VRRP router is associated with a set of IP addresses identifying its multiple (real) interfaces;
• using an algorithm (the smallest one, the first one in the list, etc.) a router selects one of its IP addresses as its primary IP
address;
• the router with the greater primary IP address becomes the master.
378
Draft VRRP - Virtual Router Redundancy Protocol Draft
24.4.4. Ownership
Take the configuration depicted in Figure 24.3, “Virtual router with multiple backups”. In this configuration the IP address
protected by the virtual router V1 is the IP address of the router R1, so R1 is at the same time the master and the owner of the
virtual router V1. VRRP requires the owner to assume the priority 255 and to become the master at the initialization.
Besides, as long as it is operational, an owner remains master regardless of the status of the other VRRP routers.
379
Draft VRRP - Virtual Router Redundancy Protocol Draft
When neither the current master nor the router that is in the process of becoming operational is an owner the result depends
on the priorities of the routers as well as on the value of preemption mode flag. The preemption flag regulates whether a new
operational nonowner can displace the current master based on its priority.
Let us call a master becoming operational after a failure a new contestant and use the term incumbent for the current
master from the perspective of its bid for a new election.
• Since the mastership of an owner is unconditional, a new contestant cannot displace an incumbent owner. By the same
token, a new contestant that is also an owner always displaces the incumbent.
• If the incumbent and the new contestant are not owners, in such cases the decision depends on the priorities and the
preemption mode. If the priority of the incumbent is higher than that of the new contestant, the incumbent stays in its
office.
• If the priority of the new contestant is higher than that of the incumbent and if the preemption mode is set to true, the new
contestant becomes the master. On the other hand, if the preemption mode is defined as false, in such cases the incumbent
keeps its office even if it were to have lower priority.
The main advantage of having a virtual router without an owner is the flexibility it gives to the network administrator. Since
the protected IP address is not the real address of any one of the participant routers, the administrator can change these
physical routers or their addresses without any need to reconfigure the virtual router itself or the hosts.
380
Draft VRRP - Virtual Router Redundancy Protocol Draft
192.032.005.010 # # #
NO NO NO NO
NONE
-------------------------------------------------------------------------------
Assumption: having three VRRP routers (R1, R2, and R3) into our local networks consisting of two segments.
Define two different virtual routers, V1 and V2, and designate R1 as the master of V1 and R3 as the master of V2. The VRRP
router R2 assumes the role of the backup both in V1 and V3. Figure 24.5, “One backup for two masters” illustrates this
configuration.
381
Draft VRRP - Virtual Router Redundancy Protocol Draft
Disadvantages:
• at the failure of R1, R2 assumes the responsibility of handling IP(R1), and if during that period R3 also fails, R2 also starts
handling packets forwarded toward IP(R2). This arrangement may lead to unacceptable service degradation unless the
network is overengineered and/or R2 is a mighty powerful box.
• The two virtual routers in our illustration are associated with two LAN segments. R1 is on A and R3 is on B, whereas R2 is
associated with both through its two interfaces: R2.1 and R2.2.
• The router backing up two masters is not protected.
• In the event of its failure, both R1 and R2 become unprotected.
Advantages:
• given the cost considerations for backup lines N-to-1 arrangements may be quite plausible from an economic point of
view.
382
Draft VRRP - Virtual Router Redundancy Protocol Draft
When a VRRP router has more than one address associated with its interface, it can have all its addresses protected by one
single virtual router. The router in question qualifies as the owner of all addresses, but only one of those addresses is used as
primary for the purposes of VRRP traffic.
These considerations are still true in case of multinetting. Figure 24.6, “Virtual router protecting multiple IP addresses”
depicts a virtual router protecting a default router configured for multinetting.
383
Draft VRRP - Virtual Router Redundancy Protocol Draft
Note that the LAN segment is partitioned into two subnets: 192.32.5.0 and 192.32.205.0. Router R2, the owner of both
addresses IP(R2)5 and IP(R2)205, is the master of the virtual router V1.
Router R1 is the backup and is similarly configured. Although the IP addresses are in different subnets, they are associated
with the same virtual router V1, and they are both protected by the same virtual router V1. One of the addresses designated
via configuration as primary would be picked for V1; in this example, 192.32.5.2 and router R1 would be the backup. The
VRRP mechanism and VRRP exchanges will be on this subnet 192.32.5.0, and 192.32.5.2 will be the primary IP address of
virtual router V1.
The other address, 192.32.205.2, would simply piggyback on the protection offered by VRRP to the primary address because
both of them are on the same interface.
As long as R2 is operational, R1 will stay in the backup status; but when R2 fails, VRRP will detect the failure and R1 will
become the master and route on behalf of 192.32.5.2 as well as 192.32.205.2, since R1 is configured accordingly. In other
words, all IP addresses in a multinetted interface will switch over to the backup. We do realize that it is possible to have one
virtual router, not multiple ones, to protect more than one IP address as long as all physical routers within a virtual router
have a multinetted configuration on the same set of subnets.
384
Draft VRRP - Virtual Router Redundancy Protocol Draft
NO NO NO NO
NONE
-------------------------------------------------------------------------------
385
Draft VRRP - Virtual Router Redundancy Protocol Draft
The shape in the drawing labeled with VRID V1 (or 37 as an illustration that VRID is an integer) indicates that R1 and R2
are members of the VRRP virtual router V1.
Each virtual router depends on the status of the other IP network it owns. For example, if IP1 (R1) goes down, it will force
also IP2 (R1) going down, allowing R2 to become the virtual master router for both interfaces it owns.
386
Draft VRRP - Virtual Router Redundancy Protocol Draft
DEP-RES:
-------------------------------------------------------------------------------
0 CPX_V1 1 37 100 YES
1 MASTER NONE
192.032.015.001 # # #
NO NO NO NO
Ip-2
-------------------------------------------------------------------------------
1 CPX_V2 2 73 100 YES
1 MASTER NONE
192.032.030.001 # # #
NO NO NO NO
Ip-1
-------------------------------------------------------------------------------
387
Draft Draft
Table of Contents
25.1. DHCP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
25.1.1. Activating DHCP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
25.1.2. DHCP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
25.2. DHCP Relay Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
25.3. DHCP Server Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
25.3.1. DHCP Server tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
25.3.2. Example of configuration of DHCP in Server mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
25.3.3. DHCP bindings table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
25.4. DHCP diagnostics, statistics and debug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
25.4.1. DHCP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
25.4.2. DHCP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
25.4.3. DHCP debug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
25.5. DHCPC resource (DHCP Client) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
25.5.1. Activating DHCPC resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
25.5.2. DHCPC resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
25.5.3. Example of configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
• BOOTP relay agent (Relay mode): internet host or router that passes DHCP messages between DHCP clients and DHCP
servers.
• DHCP Server: internet host that returns configuration parameters to DHCP clients.
• DHCP Client: internet host which retrieves configuration parameters from a server.
The DHCP resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
1
http://en.wikipedia.org/wiki/Dhcp
388
Draft DHCP - Dynamic Host Draft
Configuration Protocol
Caution
After adding or setting the DHCP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
RES:Dhcp ----------------------------------------------------------------------
Run DESCR:Dynamic_Host_Configuration_Protocol
LOG:DS ACT:YES srv-udp-locport:67 cli-udp-locport:68
msg-len:1472 mode:RELAY MAX-HOPS:4 SRV:#
LOCIPADD:R-ID (192.168.001.001)
WDIR:C:\APP\DHCP\
msg-len Maximum length of DHCP message, actually the UDP payload [548..2048];
SRV It specifies the DHCP Server to which requests must be forwarded; it can be set to an IP address, in Dotted
Decimal Notation, or the name of an IP list;
LOCIPADD It specifies the IP address that DHCP relay agent will use as “source address” in the requests relayed to the
server.
max-clients Maximum number of supported DHCP clients; it actually determines the size of the binding database on
disk and in memory.
ICMPCHK Enables ICMP checking of IP address. When it is set to YES, ICMP checking is enabled. Before sending
the DHCPOFFER message, the server sends two ICMP ping requests to check the IP address which was
allocated. If both timeouts expire, the server will send the DHCP offer message, otherwise it will mark this
IP address as abandoned and will not send response.
389
Draft DHCP - Dynamic Host Draft
Configuration Protocol
MAC-FILTER Enables/disables the selection of serviceable clients based on their MAC address. When it is set to YES,
MAC filtering is enabled. When DHCP receives an incoming request and before processing it, the DHCP
verifies that the sender's MAC address is allowed by using MAC-LIST and MAC-RULE parameters
current setting (MAC-LIST and MAC-RULE appear when MAC-FILTER is set to YES).
WDIR Selects the directory where DHCP.BND (BND stays for binding) file is saved. A binding is a collection of
configuration parameters, including at least an IP address, associated with or “bound to” a DHCP client.
Bindings are managed by DHCP servers.
The following command allows the administrator to change the configuration of the resource:
s p dhcp parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:dhcp; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
For example, to allow the relay of DHCP packets to the server 192.168.0.250, type the command:
COMMAND EXECUTED
COMMAND EXECUTED
2
http://en.wikipedia.org/wiki/Bootstrap_Protocol
390
Draft DHCP - Dynamic Host Draft
Configuration Protocol
Caution
To activate the changes made on the lowercase parameters a save conf and an Abilis restart are required (i.e.
with warm start command).
• DHCP Profiles table: table containing all the parameters to be distributed to clients (i.e. IP Address, Gateway, WINS,
DSN, Domain, …);
• DHCP Subnets: table containing the network IP address of the DHCP subnet, the subnet mask, the pools of addresses to
distribute and the “lease” time of the IP addresses;
• DHCP Hosts: allows to define a static association between a specific MAC-ADDRESS of a client and an IP address.
Tip
Interesting chapters:
The user can arbitrarily add/delete the definitions from the index 1 to 128. The profile with index 0 can't be deleted because
it's a default profile.
Changes made on the table can be activated by executing the initialization command init res:dhcp.
391
Draft DHCP - Dynamic Host Draft
Configuration Protocol
128-223.x.x.x]
DNS2: Secondary Domain Name server [0.0.0.0, 1-126.x.x.x, 127.0.0.1,
128-223.x.x.x]
SMTP: Simple Mail Transport Protocol (SMTP) server [0.0.0.0,
1-126.x.x.x, 127.0.0.1, 128-223.x.x.x]
POP3: Post Office Protocol (POP3) server [0.0.0.0, 1-126.x.x.x,
127.0.0.1, 128-223.x.x.x]
NNTP: Network News Transport Protocol (NNTP) server [0.0.0.0,
1-126.x.x.x, 127.0.0.1, 128-223.x.x.x]
WWW: World Wide Web (WWW) server [0.0.0.0, 1-126.x.x.x, 127.0.0.1,
128-223.x.x.x]
FINGER: Finger server [0.0.0.0, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x]
IRC: Internet Relay Chat server [0.0.0.0, 1-126.x.x.x, 127.0.0.1,
128-223.x.x.x]
NTP: NTP/SNTP server [0.0.0.0, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x]
TIME: TIME server [0.0.0.0, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x]
WINS1: First WINS server [0.0.0.0, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x]
WINS2: Second WINS server [0.0.0.0, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x]
TFTP: TFTP server name. From 0 up to 64 ASCII characters.
Spaces are not allowed. Case is preserved.
BOOTFILE: Bootfile name. From 0 up to 128 ASCII characters.
Spaces are not allowed. Case is preserved.
Changes made on the table can be activated by executing the initialization command init res:dhcp.
392
Draft DHCP - Dynamic Host Draft
Configuration Protocol
Changes made on the table can be activated by executing the initialization command init res:dhcp.
COMMAND EXECUTED
393
Draft DHCP - Dynamic Host Draft
Configuration Protocol
WDIR:C:\APP\DHCP\
COMMAND EXECUTED
PROF: |NAME:
-------------------------------------------------------------------------------
0 Default_profile
1 Private_LAN
Parameter: | Value:
-------------+-----------------------------------------------------------------
PROF: 1
NAME: Private_Lan
GW1: 192.168.000.232
DNS1: 192.168.000.232
DNS2: 192.168.000.251
SMTP: 192.168.000.250
POP3: 192.168.000.250
WINS1: 192.168.000.050
---------------------------------------------------
Configure the DHCP Subnets table setting the network address, the pool and the identifier of DHCP Profile.
COMMAND EXECUTED
Parameter: | Value:
-------------+-----------------------------------------------------------------
LAN: 1
NAME: Private_Lan
NET: 192.168.000.000/24
MASK: 255.255.255.000
POOL1: 192.168.000.131:192.168.000.179
PROF: 1
-------------------------------------------------------------------------------
394
Draft DHCP - Dynamic Host Draft
Configuration Protocol
Caution
To initialize the resource, use command init res:dhcp (to set act the changes made on uppercase parameters
and in the tables) and save the configuration with save conf command to make the changes permanent.
Caution
To set act changes made on lowercase parameters a save conf and an Abilis restart are needed (i.e. with
warm start command).
Tip
Interesting chapters: Section 52.15.2, “How to activate the DHCP in server mode”.
A binding record includes the information about allocated IP address, start time and end time of lease, profile which is
currently used by a DHCP client and some other information.
Tip
Refer to Section 25.3.3.1, “Appendix - how DHCP bindings table works” to have more information about
DHCP bindings tables functioning.
• c dhcp bind: this command allows to remove a DHCP binding entry from the DHCP bindings table identified by the
specified IP address.
------------------+----------------+------+-----------------+------------------
MAC: |IP: |PROF: |Last request(GMT)|Expiry on(GMT)
------------------+----------------+------+-----------------+------------------
00-0C-6E-DE-2B-C1 192.168.000.002 1 27/12/2007 14:26 07/02/2036 06:28
00-0C-6E-E9-DE-29 192.168.000.003 1 27/12/2007 11:56 07/02/2036 06:28
00-0C-6E-DE-2C-15 192.168.000.005 1 28/12/2007 09:46 07/02/2036 06:28
00-08-54-01-D5-B7 192.168.000.006 1 05/10/2007 06:27 07/02/2036 06:28
00-40-CA-63-34-E5 192.168.000.008 1 28/12/2007 07:45 07/02/2036 06:28
00-48-54-13-23-E7 192.168.000.009 1 28/12/2007 10:22 07/02/2036 06:28
00-48-54-13-22-78 192.168.000.010 1 27/12/2007 12:45 07/02/2036 06:28
00-40-CA-63-34-6A 192.168.000.011 1 20/12/2007 09:46 07/02/2036 06:28
00-40-CA-63-34-CD 192.168.000.012 1 11/12/2007 15:49 07/02/2036 06:28
00-03-93-D9-71-94 192.168.000.014 1 28/12/2007 10:23 07/02/2036 06:28
00-08-54-02-00-78 192.168.000.024 1 12/12/2007 18:19 07/02/2036 06:28
00-40-CA-63-35-15 192.168.000.025 1 28/12/2007 07:16 07/02/2036 06:28
00-40-CA-63-34-E3 192.168.000.029 1 28/12/2007 08:57 07/02/2036 06:28
00-0C-6E-DE-2B-FD 192.168.000.030 1 28/12/2007 08:12 07/02/2036 06:28
00-40-CA-63-34-F2 192.168.000.032 1 28/12/2007 08:36 07/02/2036 06:28
00-40-CA-63-34-F8 192.168.000.033 1 28/12/2007 08:14 07/02/2036 06:28
00-0C-6E-DE-2B-C8 192.168.000.034 1 13/12/2006 11:33 07/02/2036 06:28
00-40-CA-63-34-82 192.168.000.035 1 28/12/2007 08:12 07/02/2036 06:28
00-40-CA-63-34-97 192.168.000.158 1 28/12/2007 07:45 28/12/2007 17:45
00-09-45-52-65-5B 192.168.000.161 1 28/12/2007 10:07 28/12/2007 20:07
00-09-45-52-10-44 192.168.000.166 1 28/12/2007 08:34 28/12/2007 18:34
395
Draft DHCP - Dynamic Host Draft
Configuration Protocol
----+-----+-------------------+-----------------+-------+----------------------
O: | ST: | MAC: | IP: | PROF: | Last request(GMT)
| Expiry on(GMT)
----+-----+-------------------+-----------------+-------+----------------------
H ACT 00-0C-6E-DE-2B-C1 192.168.000.002 1 27/12/2007 14:26:45
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-0C-6E-E9-DE-29 192.168.000.003 1 27/12/2007 11:56:22
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-0C-6E-DE-2C-15 192.168.000.005 1 28/12/2007 09:46:46
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-08-54-01-D5-B7 192.168.000.006 1 05/10/2007 06:27:24
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-40-CA-63-34-E5 192.168.000.008 1 28/12/2007 07:45:54
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-48-54-13-23-E7 192.168.000.009 1 28/12/2007 10:22:51
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-48-54-13-22-78 192.168.000.010 1 27/12/2007 12:45:53
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-40-CA-63-34-6A 192.168.000.011 1 20/12/2007 09:46:24
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-40-CA-63-34-CD 192.168.000.012 1 11/12/2007 15:49:57
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-03-93-D9-71-94 192.168.000.014 1 28/12/2007 10:23:08
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-08-54-02-00-78 192.168.000.024 1 12/12/2007 18:19:31
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-40-CA-63-35-15 192.168.000.025 1 28/12/2007 07:16:40
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-40-CA-63-34-E3 192.168.000.029 1 28/12/2007 08:57:33
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-0C-6E-DE-2B-FD 192.168.000.030 1 28/12/2007 08:12:27
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-40-CA-63-34-F2 192.168.000.032 1 28/12/2007 08:36:31
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-40-CA-63-34-F8 192.168.000.033 1 28/12/2007 08:14:59
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-0C-6E-DE-2B-C8 192.168.000.034 1 13/12/2006 11:33:52
07/02/2036 06:28:15
-------------------------------------------------------------------------------
H ACT 00-40-CA-63-34-82 192.168.000.035 1 28/12/2007 08:12:12
07/02/2036 06:28:15
396
Draft DHCP - Dynamic Host Draft
Configuration Protocol
-------------------------------------------------------------------------------
P EXP 00-0C-0C-01-5C-81 192.168.000.131 1 29/11/2007 10:59:42
29/11/2007 20:59:42
-------------------------------------------------------------------------------
P EXP 00-0C-0C-01-5B-BE 192.168.000.132 1 07/12/2007 10:17:12
07/12/2007 20:17:12
-------------------------------------------------------------------------------
P EXP 00-40-CA-63-34-B8 192.168.000.133 1 11/12/2007 21:58:05
12/12/2007 07:58:05
-------------------------------------------------------------------------------
P EXP 00-0C-29-52-67-31 192.168.000.134 1 17/12/2007 17:59:25
18/12/2007 03:59:25
-------------------------------------------------------------------------------
P EXP 00-16-36-EA-44-84 192.168.000.135 1 19/12/2007 10:10:38
19/12/2007 20:10:38
-------------------------------------------------------------------------------
P EXP 00-E0-4C-03-27-BC 192.168.000.136 1 18/12/2007 17:29:46
19/12/2007 03:29:46
-------------------------------------------------------------------------------
P EXP 00-0D-60-CE-7D-1D 192.168.000.150 1 07/11/2007 13:53:53
07/11/2007 23:53:53
-------------------------------------------------------------------------------
P EXP 00-E0-00-9B-D5-BB 192.168.000.151 1 08/08/2007 14:24:57
09/08/2007 00:24:57
-------------------------------------------------------------------------------
P EXP 00-07-95-BF-3A-7E 192.168.000.152 1 02/10/2007 10:36:55
02/10/2007 20:36:55
-------------------------------------------------------------------------------
P EXP 00-02-3F-0D-D5-A0 192.168.000.153 1 28/09/2007 07:22:33
28/09/2007 17:22:33
-------------------------------------------------------------------------------
P EXP 00-90-33-0F-02-EE 192.168.000.154 1 05/11/2007 18:18:39
06/11/2007 04:18:39
-------------------------------------------------------------------------------
P EXP 00-0F-20-CC-22-3C 192.168.000.155 1 17/10/2007 16:09:36
18/10/2007 02:09:36
-------------------------------------------------------------------------------
P EXP 00-16-6F-41-4B-EE 192.168.000.156 1 26/10/2007 13:42:41
26/10/2007 23:42:41
-------------------------------------------------------------------------------
P EXP 00-18-41-08-A0-74 192.168.000.157 1 25/10/2007 12:39:59
25/10/2007 22:39:59
-------------------------------------------------------------------------------
P ACT 00-40-CA-63-34-97 192.168.000.158 1 28/12/2007 07:45:26
28/12/2007 17:45:26
-------------------------------------------------------------------------------
P EXP 00-15-F2-03-06-4C 192.168.000.159 1 03/10/2007 08:01:28
03/10/2007 18:01:28
-------------------------------------------------------------------------------
P EXP 00-4F-4E-12-42-B9 192.168.000.160 1 19/11/2007 07:29:56
19/11/2007 17:29:56
-------------------------------------------------------------------------------
P ACT 00-09-45-52-65-5B 192.168.000.161 1 28/12/2007 10:07:13
28/12/2007 20:07:13
-------------------------------------------------------------------------------
P EXP 00-A0-D1-38-A4-14 192.168.000.163 1 07/09/2007 14:59:33
08/09/2007 00:59:33
-------------------------------------------------------------------------------
P EXP 00-16-D4-F2-06-A3 192.168.000.164 1 26/10/2007 15:32:37
27/10/2007 01:32:37
-------------------------------------------------------------------------------
P REL 00-40-8C-80-40-C2 192.168.000.165 1 23/11/2007 10:40:17
397
Draft DHCP - Dynamic Host Draft
Configuration Protocol
23/11/2007 10:42:40
-------------------------------------------------------------------------------
P ACT 00-09-45-52-10-44 192.168.000.166 1 28/12/2007 08:34:23
28/12/2007 18:34:23
-------------------------------------------------------------------------------
P EXP 00-03-93-D9-71-94 192.168.000.167 1 14/09/2007 06:40:59
14/09/2007 16:40:59
-------------------------------------------------------------------------------
P EXP 00-40-CA-63-34-C7 192.168.000.169 1 16/11/2007 10:00:05
16/11/2007 20:00:05
-------------------------------------------------------------------------------
P EXP 00-15-F2-59-09-7C 192.168.000.170 1 20/11/2007 15:31:45
21/11/2007 01:31:45
-------------------------------------------------------------------------------
P ACT 00-07-85-51-F5-D6 192.168.000.171 1 28/12/2007 09:53:45
28/12/2007 19:53:45
-------------------------------------------------------------------------------
P EXP 00-11-D8-70-A6-1D 192.168.000.172 1 30/08/2007 08:00:15
30/08/2007 18:00:15
-------------------------------------------------------------------------------
P EXP 00-0C-0C-01-48-AA 192.168.000.173 1 26/09/2007 12:34:27
26/09/2007 22:34:27
-------------------------------------------------------------------------------
P ACT 00-40-CA-63-34-99 192.168.000.174 1 28/12/2007 09:45:49
28/12/2007 19:45:49
-------------------------------------------------------------------------------
P EXP 00-0C-0C-01-48-BE 192.168.000.175 1 26/09/2007 12:33:29
26/09/2007 22:33:29
-------------------------------------------------------------------------------
P EXP 00-09-45-63-97-70 192.168.000.176 1 03/09/2007 11:54:48
03/09/2007 21:54:48
-------------------------------------------------------------------------------
P EXP 00-16-36-3E-1B-CB 192.168.000.177 1 16/11/2007 16:00:02
17/11/2007 02:00:02
-------------------------------------------------------------------------------
P EXP 00-1D-60-70-BE-1A 192.168.000.178 1 16/10/2007 08:24:22
16/10/2007 18:24:22
-------------------------------------------------------------------------------
P EXP 00-40-F4-BC-F5-3D 192.168.000.179 1 07/12/2007 13:54:03
07/12/2007 23:54:03
-------------------------------------------------------------------------------
O Origin of the binding [H: allocated from host tables; P: allocated from IP pools of one of subnets
from subnets table; ?: origin unknown].
ST State of the binding [REL: released; ACT:active, EXP: expired, ABD: abandoned, UNK: unknown
(error state)].
IP The IP address assigned to the DHCP client with the MAC address.
Last request(GMT) The GMT date and time value when the lease was assigned/renewed the last time.
Expiry on(GMT) The GMT date and time value when the lease will expire.
YOU ARE GOING TO DELETE THE SPECIFIED DHCP BINDING ENTRY FROM THE DATA BASE IN MEMORY.
DO YOU WANT TO PROCEES (Y/N)? Y
398
Draft DHCP - Dynamic Host Draft
Configuration Protocol
COMMAND EXECUTED
YOU ARE GOING TO DELETE THE WHOLE CONTENT OF THE DHCP BINDINGS DATA BASE IN MEMORY.
DO YOU WANT TO PROCEES (Y/N)? Y
COMMAND EXECUTED
Every one minute the DHCP server checks the bindings table and saves all bindings to the file, if the table was changed since
the last time it was updated.
During Abilis CPX DHCP resource start-up, the DHCP driver executes the following operations:
• it tries to create it. If it can't, the server goes to the STOP state and it writes a warning message into the System Log (i.e.
“W: DHCP STOPPED”).
After loading the DHCP.BND file, the DHCP server checks the bindings according to the current configuration of the DHCP
driver. The records which don't conform to the current configuration will be marked as “not valid” and they will not be used
by the DHCP server.
The DHCP server makes the next checks when loading bindings and marks the binding as “invalid” in all the following
cases:
• The subnet record which is corresponding to the IP address from the binding is not found in the subnets table.
• The profile identifier from the binding is not found in the the profiles table.
• The host record with the IP and MAC addresses which are corresponding to the IP and MAC addresses from the loading
binding is not found in the hosts table.
• The IP address from the binding is found in one of the pools of the subnet record (i.e. if the corresponding subnet record
was found).
• The host record with the IP and MAC addresses which are corresponding to the IP and MAC addresses from the loading
binding is found in the hosts table;
• The IP address from the binding is not found in one of the pools of the subnet record (i.e. if the corresponding subnet
record was found).
d d dhcp / d de dhcp It informs about the MODE configuration [RELAY/SERVER], the STATE of the
resource [DOWN, INACT, STOP, ACTIVE, ERR] and the current bindings situation.
399
Draft DHCP - Dynamic Host Draft
Configuration Protocol
RES:Dhcp ----------------------------------------------------------------------
Dynamic_Host_Configuration_Protocol
MODE:SERVER STATE:ACTIVE
- Server Bindings ------------------------------------------------------
------- Summary -------|------- Types ---------|------- States ---------
MAX |300 |ACT-STATIC |20 |ACTIVE |35 |
USED |67 |ACT-DYNAMIC |15 |EXPIRED |32 |
FREE |233 | | |RELEASED |0 |
REUSABLE |32 |ALL-STATIC |20 |ABANDONED |0 |
| |ALL-DYNAMIC |47 |INCOMPLETE |0 |
| | | |INVALID |0 |
------------------------------------------------------------------------
d s dhcp / d se dhcp Statistics are divided between Server mode and Relay mode.
• REQUESTS: it shows the total number of packets sent from DHCP client to DHCP
server.
• RESPONSES: it shows the total number of packets sent from DHCP server to DHCP
client.
• CHAR: it shows the total number of received (INPUT) and sent (OUTPUT)
characters. UDP interface overhead excluded.
• PCK: it shows the total number of received (INPUT) and sent (OUTPUT) packets.
• LONG: it shows the total number of lost received (INPUT) and number of not sent
(OUTPUT) DHCP packets which are too long for the configured msg-len value from
configuration.
• BAD-FORMAT: it shows the total number of lost received DHCP packets with bad
format.
The other statistics are “simple” counters of the relative packets used by DHCP
protocols.
• REQUESTS: it shows the total number of good incoming requests received from
client which are suitable for relaying (INPUT) and the total number of requests
actually relayed to the servers (OUTPUT). In the case of multiple servers the counter
is increased for each of them.
• RESPONSES: it shows the total number of good incoming responses received from
server(s) which are suitable for relaying to the client (INPUT) and the total number
of responses actually relayed to the client (OUTPUT).
• BAD-GW: it shows the total number of discarded responses for “not matching”
gateway address ('giaddr' field in DHCP packet). Incremented for every server's
response packet whose 'giaddr' field value does not match any address of the router's
interfaces.
400
Draft DHCP - Dynamic Host Draft
Configuration Protocol
RES:Dhcp ----------------------------------------------------------------------
Dynamic_Host_Configuration_Protocol
--- Cleared 0 days 15:02:19 ago, on 27/12/2007 at 20:51:58 -------------
------------------------------------------------------------------------
Server mode
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
REQUESTS | 49| |RESPONSES | | 23|
CHAR | 14820| 6900|PCK | 49| 23|
LONG | 0| 0|BAD-FORMAT | 0| |
UNK-IPP | 0| | | | |
DISCOVER | 2| |OFFER | | 2|
REQUEST | 21| |ACK | | 21|
DECLINE | 0| |NAK | | 0|
RELEASE | 0| | | | |
INFORM | 26| |
------------------------------------------------------------------------
Relay mode
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
REQUESTS | 0| 0|RESPONSES | 0| 0|
HOP-EXCEED | 0| |BAD-GW | 0| |
------------------------------------------------------------------------
RES:Dhcp ----------------------------------------------------------------------
Dynamic_Host_Configuration_Protocol
BufferLength:454 Date/Time:04/03/2011 20:57:50 TraceTime:47980
Usage:
LSN:0 - This help
LSN:1 - Complete debug
LSN:2 - Statistics
LSN:3 - DHCP log
LSN:3 CMD:CLR - Clear DHCP log
LSN:4 - Incoming datagrams dump
LSN:4 CMD:CLR - Clear incoming datagrams dump
LSN:5 - Restore host table
LSN:6 CMD:<MAC> - Delete INV (invalid) bindings with specified MAC
LSN:6 CMD:ALL - Delete ALL INV (invalid) bindings
COMMAND EXECUTED
Caution
After adding or setting the DHCPC active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
401
Draft DHCP - Dynamic Host Draft
Configuration Protocol
COMMAND EXECUTED
RES:DhcpC ---------------------------------------------------------------------
Run DESCR:Dynamic_Host_Configuration_Protocol_Client
LOG:DS ACT:YES msg-len:1472
cli-udp-locport:68 srv-udp-remport:67 TOS:0-N
DHCP-SERVER:* DHCP-SERVER-LIST:#
Refer to Section 52.15.3, “How to activate the DHCP in client mode” to view a further example of configuration.
402
Draft DHCP - Dynamic Host Draft
Configuration Protocol
Configure the DHCPC and IP-2 resources so that Abilis retrieves the ip address from the ADSL router. The first step is to
activate the DHCPC resource and then optionally configure the DHCP-SERVER parameter:
COMMAND EXECUTED
Now IP-2 resource must be configured to use DHCP. Display diagnostics for IP-2 resource helps to view the retrieved ip
address:
COMMAND EXECUTED
403
Draft DHCP - Dynamic Host Draft
Configuration Protocol
There are three other parameters which can be used to fit the configuration to needs:
DHCP-GW Retrieve default gateway through DHCP [NO, YES]. Default value is YES.
DHCP-GW-AD Administrative distance assigned to the default route obtained from a DHCP server [0..255]. Default value
is 0.
DHCP-DNS Retrieve primary and secondary DNS server through DHCP [NO, YES]. Default value is YES.
For example, configure IP-2 resource in the following way to retrieve only ip address and default gateway:
COMMAND EXECUTED
COMMAND EXECUTED
404
Draft DHCP - Dynamic Host Draft
Configuration Protocol
+-+-+-+-+--------------------+--------------------+-----------------+----+---+
|B|P|S|H| NET:/MASK: | MASK: or | GW: or |IP: |AD:|
| | | | | | SRNET:/SRMASK: | IPLB: | | |
+-+-+-+-+--------------------+--------------------+-----------------+----+---+
|*|C| |*| 127.000.000.001/32 | 255.255.255.255 | |LOOP| 0|
|*|C| | | 192.168.030.001/32 | 255.255.255.255 | |R-ID| 0|
|*|C| | | 010.000.000.000/29 | 255.255.255.248 | | 12| 0|
|*|C| | | 192.168.000.000/24 | 255.255.255.000 | | 11| 0|
|*|C| | | 192.168.001.000/24 | 255.255.255.000 | | 2| 0|
|*|S| | | 192.168.008.000/24 | 255.255.255.000 | |D 10| 1|
|*|C| | | 192.168.030.000/24 | 255.255.255.000 | | 1| 0|
|*|C| | | 000.000.000.000/0 | 000.000.000.000 | 192.168.001.254 | 2| 0|
+-+-+-+-+--------------------+--------------------+-----------------+----+---+
COMMAND EXECUTED
COMMAND EXECUTED
405
Draft DHCP - Dynamic Host Draft
Configuration Protocol
Tip
Interesting chapters:
406
Draft Draft
Table of Contents
26.1. DNS Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
26.1.1. Activating the DNS resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
26.1.2. DNS resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
26.2. DNS Resolver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
26.3. DNS Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
26.3.1. Appendix - How DNS relay works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
26.4. DNS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
26.4.1. DNS Resource as Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
26.4.2. DNS Server Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
26.4.3. DNS Resolver Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
26.5. DNS diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
26.5.1. DNS diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
26.5.2. DNS statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
The DNS resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the DNS active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
1
http://en.wikipedia.org/wiki/Dns
407
Draft DNS - Domain Name System Draft
SERVERS Servers IP resource [AUTO, Ip-nnn, STATIC], where 'nnn' is an IP resource index [1..250]. [AUTO: DNS
resolver uses the servers retrieved by an IP resources that negotiates them e.g. IP-PPP. DNS: parameter of
IP resources must be set to RETRIEVE, Ip-nnn: DSN resolver uses the available servers through Ip-nnn
resource, STATIC: DNS resolver uses PRIMARY and SECONDARY servers].
PRIMARY Sets the IP address of the primary DNS server, which the Abilis CPX resource refers to for name resolution.
SECONDARY Sets the IP address of the secondary DNS server, which the Abilis CPX port refers to for name resolution.
DELAY Sets the maximum time (in seconds) to wait for a response from the DNS server.
RTY Sets how many times a request has to be sent to the DNS server if the DNS Resolver doesn't get any
response in the expected time interval fixed in the DELAY parameter.
408
Draft DNS - Domain Name System Draft
RELAY Activates/deactivates the DNS Relay feature for DNS resource. DNS relay allows the relay of external DNS
requests of DNS clients from CPX to DNS server.
relay-size Sets the maximum size of the relay table (expressed in bytes).
RELAY-TOUT Sets the time of life (in seconds) for a record in DNS relay table.
IPSRC Selects the IP address of the client from which the requests will be accepted.
IPSRCLIST Sets the list of DNS Client systems enabled to use the DNS Relay or Server services.
The following command allows the administrator to change the configuration of the resource:
s p dns parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init res:dns;
while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required
(i.e. with warm start command).
The example below shows how to configure the DNS Resouce as Resolver.
COMMAND EXECUTED
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:dns.; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are
required (i.e. with warm start command).
In the example above, CACHING is enabled (CACHE:YES): responses are stored in cache a period which depends on the size
of the cache (cache-size parameter).
409
Draft DNS - Domain Name System Draft
Tip
Refer to chapter Section 26.3.1, “Appendix - How DNS relay works” to know more information about DNS
realy functioning.
The example below shows how to configure the DNS Resouce as Relay.
COMMAND EXECUTED
Filters on the IP addresses allowed to the DNS service can be applied by combining the parameters IPSRC and
IPSRCLIST.
In the following example, the “DN_Allowed” list will be created and the range of IP from 192.168.1.10 to 192.168.1.50 will
be added; otherwise, the address 192.168.1.100 will be set as the IP address Source.
COMMAND EXECUTED
COMMAND EXECUTED
LIST:DNS_Allowed - IR
IP_Addresses_allowed_to_DNS_service
192.168.001.010:192.168.001.050
COMMAND EXECUTED
410
Draft DNS - Domain Name System Draft
PRIMARY:062.094.000.001 SECONDARY:062.094.000.002
DELAY:5 RTY:1
CACHE:YES cache-size:500
- Relay/Server ---------------------------------------------------------
RELAY:YES relay-size:500 RELAY-TOUT:10
SERVER:NO
IPSRC:192.168.001.100 IPSRCLIST:DNS_Allowed
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:dns.; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are
required (i.e. with warm start command).
• if it doesn't get any response, it forwards the same query to both primary and secondary server after 500 milliseconds;
• in case of no answer, the same procedure is repeated after 1 second and after 2 seconds;
• if the DNS Resolver doesn't get any answer within 4 seconds, it terminates the procedure.
This procedure is repeated for a number of times equal to the value set in the RTY parameter. The delay (in seconds) between
two subsequent queries can be set with the DELAY parameter.
COMMAND EXECUTED
Filters on the IP addresses allowed to the DNS service can be applied by combining the parameters IPSRC and
IPSRCLIST.
In the following example, the “DNS_Allowed” list will be created and the range of IP from 192.168.1.10 to 192.168.1.50 will
be added; otherwise, the address 192.168.1.100 will be set as the IP address Source.
COMMAND EXECUTED
411
Draft DNS - Domain Name System Draft
COMMAND EXECUTED
LIST:DNS_Allowed - IR
IP_Addresses_allowed_to_DNS_service
192.168.001.010:192.168.001.050
COMMAND EXECUTED
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:dns.; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are
required (i.e. with warm start command).
-------------------------------------------------------------------------------
ID: DIR: NAME: IP: TTL:
-------------------------------------------------------------------------------
*** NO DNS SERVER ENTRIES DEFINED ***
DIR Usage of the record [D (direct): domain names are translated into IP addresses; R (reverse): it is allowed the inverse
lookup of the DNS record; DR (direct and reverse): the two features are allowed].
IP IP address.
412
Draft DNS - Domain Name System Draft
TTL The Time To Live sets the duration storage into a DNS cache system before it's considered expired.
The previous DNS records Table can be managed with these commands:
• d dns filter:val [filter:val] : displays any Local DNS server table entry matching the specified filter(s);
• a dns id:val name:<name> ip:<ip> [par:val] : adds a Local DNS server table entry;
• s dns id:val [par:val] : sets parameters of a Local DNS server table entry.
Example: assign to the IP addresses 192.168.1.20 and 192.168.1.30 the domain names john.lan and frank.lan; the first entry
will be set as direct, while the second as “both” (direct+reverse).
COMMAND EXECUTED
COMMAND EXECUTED
Caution
Changes made in the DNS Server Table don't require initialization commands.
Set the PC DNS address to point to the IP address of the CPX. Now ping from a PC one of the domain names configured in
the DNS server table; the result will be:
413
Draft DNS - Domain Name System Draft
Use the following command to add a primary dns server (ip address 1.1.1.1) and a secondary dns server (ip address 2.2.2.2)
for the domain mydomain.test. The DNS resource uses these servers to resolve <any>.mydomain.test.
COMMAND EXECUTED
SAVE EXECUTED
Type the command s dns resolver domain id:1 [parameterN:valueN] to modify an existing entry.
COMMAND EXECUTED
SAVE EXECUTED
COMMAND EXECUTED
Use the following command to add a primary dns server (ip address 192.168.0.1) and a secondary dns server (ip address
192.168.0.2) for the ip network 10.10.10.0/24. The DNS resource uses these servers to do a reverse lookup for the net
10.10.10.0/24.
414
Draft DNS - Domain Name System Draft
COMMAND EXECUTED
SAVE EXECUTED
Displaying,modifying or clearing an entry can be done using the same command explained above, replacing domain with
reverse:
d d dns / d de dns It informs about the state of the resource, the state of the CACHE, the RELAY and the
SERVER mode, the number of records currently occupied with pending requests (for
CACHE,RELAY and SERVER), the maximum number of simultaneously pending
records ever reached (for CACHE, RELAY and SERVER) and the maximum number
of simultaneously pending requests (for CACHE, RELAY and SERVER).
RES:Dns -----------------------------------------------------------------------
Domain_Name_System
STATE:READY
-----------|-- STATE --|--- CUR ---|-- PEAK ---|--- MAX ---|
CACHE |READY | 11| 32| 500|
RELAY |READY | 16| 16| 500|
SERVER |READY | | | |
------------------------------------------------------------
d s dns / d se dns Statistics are divided between Resolver and Relay mode and between Primary
(PRI-) and Secondary (SEC-) DNS server. For Resolver mode are shown statistics
such as the number of queries, resolved hostname, unknown hostname, etc... For Relay
mode are shown statistics such as the number of total and succesfull clients' requests,
the number of clients' requests discarded because the table was full or the source IP
was not allowed, etc..
415
Draft DNS - Domain Name System Draft
RES:Dns -----------------------------------------------------------------------
Domain_Name_System
--- Cleared 0 days 18:35:33 ago, on 27/12/2007 at 20:51:58 -------------
- Resolver -------------------------------------------------------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
PRI-QUERIES| | 0|SEC-QUERIES| | 0|
PRI-RES | 0| |SEC-RES | 0| |
PRI-UNK | 0| |SEC-UNK | 0| |
PRI-RTY-OVR| 0| |SEC-RTY_OVR| 0| |
PRI-TOUT | 0| |SEC-TOUT | 0| |
PRI-ERRORS | 0| |SEC-ERRORS | 0| |
------------------------------------------------------------------------
- Relay ----------------------------------------------------------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
REQ-TOTAL | 175| |PRI-REQ-RSP| 162| 163|
REQ-SUCC | 174| |SEC-REQ-RSP| 1| 1|
REQ-BAD | 0| |PRI-NOMATCH| 1| |
OVERFLOW | 0| |SEC-NOMATCH| 0| |
DROP-ACCESS| 0| |RSP-BAD | 0| |
------------------------------------------------------------------------
416
Draft Draft
Table of Contents
27.1. Dynamic DNS (DDNS) resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
27.1.1. Activating the DDNS resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
27.1.2. DDNS resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
27.1.3. DDNS diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
COMMAND EXECUTED
SAVE EXECUTED
On a working Abilis, a system restart (warm start) is required to make the DDNS resource running.
COMMAND EXECUTED
COMMAND EXECUTED
417
Draft DDNS - Dynamic DNS Draft
SAVE EXECUTED
RES:DDns ----------------------------------------------------------------------
Run DESCR:Dynamic_DNS_Protocol_Client
LOG:NO ACT:YES sesnum:1 TOS:0-N
SERVICE:dyndns.org
SERVER:AUTO (members.dyndns.org)
PORT:80 RETRY-DELAY:60 UPDATE-PERIOD:AUTO
USER:abilistest PWD:********
• LOG: State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E] (D: Debug Log; S: System Log; A: Alarm
view; L: Local audible alarm; T: SNMP traps; +E: Extended Log of state changes, see ref. manual)
• TOS: Type Of Service octet or Differentiated Services Field (DS): -' p-t', i.e. PRECEDENCE and TOS values, where 'p'
can be [0..7] and 't' can be [N=None, D=Min. Delay, T=Max. Throughput, R=Max. Reliability, C=Min. Monetary Cost] -
'bbbbbb', i.e. DS value bit by bit, where 'b' can be [0, 1]
• SERVICE: DDNS service name [dyndns.com, dyndns.org, dyndns.it, no-ip.com, zoneedit.com, dtdns.com, minidns.net]
• SERVER: DDNS server FQDN. “AUTO” or from 0 up to 64 characters in the range ['0'..'9', 'a'..'z', '-', '.']. Case is not
preserved. When “AUTO”, the service's server is used.
• RETRY-DELAY: Delay between subsequent TCP reconnections [30..3600 sec.]. NOTE: There is no limit to the
reconenction attempt.
• UPDATE-PERIOD: Update period of dynamic DNS records on the server [AUTO, 1..60 days]. When AUTO the
provider's default rules are obeyed.
• USER: User identification on the server. From 0 up to 32 ASCII characters. Case is preserved. Spaces are allowed. Strings
holding spaces must be written between quotation marks (E.g.: “/aaa bbb/”)
• PWD: User password on the server. From 0 up to 32 ASCII characters. Case is preserved. Spaces are allowed. Strings
holding spaces must be written between quotation marks (E.g.: “/aaa bbb/”)
27.1.2.1. Example
418
Draft DDNS - Dynamic DNS Draft
Add the DDNS resource and configure it choosing the service name and inserting name and password of an active dyndns
account.
Tip
Please refer to chapter Section 52.10.1, “How to setup DDNS service using dyndns.org” to learn how to
create an account on dyndns.org.
COMMAND EXECUTED
RES:DDns ----------------------------------------------------------------------
Run DESCR:Dynamic_DNS_Protocol_Client
LOG:NO ACT:YES sesnum:1 TOS:0-N
SERVICE:dyndns.org
SERVER:AUTO (members.dyndns.org)
PORT:80 RETRY-DELAY:60 UPDATE-PERIOD:AUTO
USER:abilistest PWD:********
COMMAND EXECUTED
On a working Abilis, an initialization of DDNS and ip-24 resources is required (init res:ddns and init res:ip-24). Remeber
to save the configurations (save conf)
419
Draft DDNS - Dynamic DNS Draft
d d ddns / d de ddns It informs about the state of the resource, the ip address of the resource, the account used on
dyndns.org and the state of the authentication.
RES:DDns ----------------------------------------------------------------------
Dynamic_DNS_Protocol_Client
STATE:ACTIVE SESNUM:1 CLIENTS:3
SERVER:members.dyndns.org
PORT:80 CUR-QUERIES:0 PEAK-QUERIES:1
------------------------------------------------------------------------
RES STATE IP UPDATE-TIME
FQDN
SERVER-RESPONSE
------------------------------------------------------------------------
Ip-2 REGISTERED 192.168.001.100 03/11/2010 15:25:58
abilistest.dyndns.org
good 192.168.1.100
------------------------------------------------------------------------
d s ddns / d se ddns Statistics show many information like: tcp protocol errors, the number of requests, the
number of successful/wrong request, etc.
RES:DDns ----------------------------------------------------------------------
Dynamic_DNS_Protocol_Client
--- Cleared 0 days 01:14:07 ago, on 03/11/2010 at 14:16:25 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHAR | 284| 560|REQUESTS | | 2|
DNS-ERRS | 0| |SUCCESS | 1| |
TCP-ERRS | 0| |ERRORS | 1| |
DDNS-ERRS | 1| |
------------------------------------------------------------------------
420
Draft Draft
Table of Contents
28.1. SMTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
28.1.1. Activating the SMTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
28.1.2. SMTP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
28.2. Example of configuration of the SMTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
28.3. SMTP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
28.3.1. SMTP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
28.3.2. SMTP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
SMTP can be used with CTISMS resource in order to send/receive sms via email (if an UMTS-BOX is installed).
Tip
Refer to chapter Section 53.19, “How to configure CTISMS to send sms via emails” to have more
information about sending sms using emails.
The SMTP resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the SNMP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
421
Draft SMTP - Simple Mail Transfer Protocol Draft
RES:Smtp ----------------------------------------------------------------------
Run DESCR:Simple_Mail_Transfer_Protocol
LOG:NO ACT:YES tcp-locport:25 internal-mails:10
SRCADD:192.168.000.001 TOS:0-N
ses-tot:10 SES-RESERVED-IN:2 SES-RESERVED-OUT:2
DT:120 MAX-IP-SES:2 MAX-RCPT:100
IPSRC:127.000.000.001 IPSRCLIST:SmtpRelay
LOCAL-DOMAIN:sms.lan
HELOHOST:noname
wdir:C:\APP\MAIL\
max-fail-notif:50 MB-MAXSIZE:5000
MSG-MAXSIZE:65535 MB-MAXMAILS:1000 STORE-MB:NO
-- Local SMTP relay ----------------------------------------------------
RELAY-NET:192.168.000.000/24 RELAY-IPSRCLIST:#
RELAY-AUTH:DISABLED
QUEUE-LIFE-TIME:86400 MAIL-TRY-DELAY:300
-- External SMTP server for relay --------------------------------------
SERVER:mail.xx.it SERVER-AUTH:NO
SERVER-USER:
SERVER-PWD:
-- SMS Gateway ---------------------------------------------------------
SMS-GW:YES SMS-PERMIT:RELAY
SMS-IP:# SMS-SENDER:#
SRCADD Source IP address for outgoing requests [R-ID, OUT-IP, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x].
TOS Used to enstablish the frame priority. First field [default: 0] Second field specify the type of the
frame [N=None, D=Min. Delay, T=Max. Throughput, R=Max. Reliability, C=Min. Monetary
Cost].
MAX-IP-SES Maximum number of simultanous incoming sessions from the same IP address [1..255].
IPSRC Incoming requests: accepted source IP address [*, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x].
In the case that one needs to restrict the access, he has to set in IPSRC the ip address of a client
which must always have access, e.g. the IP address of the administrator console, and add further
IPs using IPSRCLIST.
IPSRCLIST Incoming requests: name of the IP/IR/RU/MR list for source IP address acceptance [#, 0..9, a..z,
A..Z, _].
422
Draft SMTP - Simple Mail Transfer Protocol Draft
LOCAL-DOMAIN Local domain for local mailboxes. From 0 up to 64 characters in the range ['0'..'9', 'a'..'z', '-', '.'].
Case is not preserved.
HELOHOST Name used by the Abilis SMTP server when executing the HELO/EHLO command while sending
an email. "noname" or from 1 up to 64 characters in the range ['0'..'9', 'a'..'z', '-', '.']. Case is
preserved.
wdir Working directory where the messages are stored. It cannot be empty. Physical full path in DOS
notation, i.e. starting with a drive letter in the range ['A'..'Z'] and ending with the '\' character. Max.
128 characters. Case is preserved. Spaces are allowed. Strings holding spaces must be written
between quotation marks (E.g.: "C:\My dir\").
max-fail-notif Maximum dimension of the mail failure notification, in the range [1 - 100] Kbytes.
STORE-MB Allow server to store message for local mailboxes [NO, YES].
RELAY-NET IP network allowed for mail relay. "#" or network address and mask in Slash Notation [x.x.x.x/yy],
[1-126.x.x.x, 127.0.0.1, 128-223.x.x.x]/[0..32].
RELAY-IPSRCLIST Name of an IP/IR/RU/MR list containing additional IP addresses allowed for SMTP relay [#, 0..9,
a..z, A..Z, _].
QUEUE-LIFE-TIME Amount of seconds before a deferred mail causes a mail failure notification. Range [300 - 1048576]
seconds.
MAIL-TRY-DELAY Amount of time between a mail sending try and another one, in the range [60 - 65535] seconds.
SERVER FQDN name of SMTP Relay server to which all the mails for not local domain are forwarded. From 0 up to 64
characters in the range ['0'..'9', 'a'..'z', '-', '.']. Case is not preserved.
SERVER- Authentication type to use logging in relay server [NO, LOGIN, DIGEST].
AUTH
This option set if authentication is allowed and what authentication types are allowed.
SERVER- Username of the account on the relay server. Up to 60 ASCII characters. Spaces are not allowed. Case is
USER preserved.
SERVER- Password of the account on the relay server. Up to 60 ASCII characters. Spaces are not allowed. Case is
PWD preserved.
SMS- Permitted method [NONE, RELAY, IP, SENDER]. Values can be joined using ',' character.
PERMIT
The command that allows the configuration of the resource to be modified has the following syntax:
423
Draft SMTP - Simple Mail Transfer Protocol Draft
s p smtp par:val...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:smtp; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
COMMAND EXECUTED
This configuration allows the 192.168.0.0/24 net to use Abilis as smtp relay for both local domain (test.lan) and non-local
domains (through server 209.85.229.109). Use your account username and password to use the external smtp server.
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:smtp; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
Note
The value of SERVER parameter can be the FQDN of external SMTP server configuring the DNS resource
or it's ip address.
Tip
Interesting chapter: Section 53.19, “How to configure CTISMS to send sms via emails”.
424
Draft SMTP - Simple Mail Transfer Protocol Draft
d de smtp Shows the state of the resource, and information about smtp sessions.
RES:Smtp ----------------------------------------------------------------------
Simple_Mail_Transfer_Protocol
STATE:ACTIVE CUR-SES:10 ACTIVE-IN:0 ACTIVE-OUT:0
MIX-IN:0 MIX-OUT:0 QUEUE-OUT:0 QUEUE-DEFER:0
------------------------------------------------------------------------
RES:Smtp ----------------------------------------------------------------------
Simple_Mail_Transfer_Protocol
STATE:ACTIVE CUR-SES:10 ACTIVE-IN:0 ACTIVE-OUT:0
MIX-IN:0 MIX-OUT:0 QUEUE-OUT:0 QUEUE-DEFER:0
- Smtp Sessions --------------------------------------------------------
CH TYPE TCP-State LocAdd-LocPort RemAdd-RemPort SMTP-State
------------------------------------------------------------------------
0 OUT READY READY
1 OUT READY READY
2 IN LISTEN 000.000.000.000-25 READY
3 IN LISTEN 000.000.000.000-25 READY
4 IN LISTEN 000.000.000.000-25 READY
5 IN LISTEN 000.000.000.000-25 READY
6 IN LISTEN 000.000.000.000-25 READY
7 IN LISTEN 000.000.000.000-25 READY
8 IN LISTEN 000.000.000.000-25 READY
9 IN LISTEN 000.000.000.000-25 READY
d s smtp Shows the statistics of the SMTP resource, such as the number of successful incoming TCP connections
(CALL-SUCC in), the number of successful outgoing TCP connections (CALL-SUCC out), the number
of unsuccessful incoming TCP connections (CALL-FAIL in), the number of unsuccessful outgoing TCP
connections (CALL-FAIL out), the number of accepted external mails (EXT-SUCC),etc..
d se smtp Shows the statistics of the SMTP resource for each session.
RES:Smtp ----------------------------------------------------------------------
Simple_Mail_Transfer_Protocol
--- Cleared 0 days 01:29:23 ago, on 04/02/2011 at 09:09:27 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL-SUCC | 7| 2|CALL-FAIL | 0| 0|
EXT-SUCC | 5| 0|EXT-FAIL | 2| 1|
NOTIFY | | 5|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 1|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 5| 0|RELAY-FAIL | 0| 2|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
425
Draft SMTP - Simple Mail Transfer Protocol Draft
------------------------------------------------------------------------
RES:Smtp ----------------------------------------------------------------------
Simple_Mail_Transfer_Protocol
--- Cleared 0 days 01:29:30 ago, on 04/02/2011 at 09:09:27 -------------
- Smtp Sessions --------------------------------------------------------
CH TYPE TCP-State LocAdd-LocPort RemAdd-RemPort SMTP-State
------------------------------------------------------------------------
0 OUT READY READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL-SUCC | 0| 1|CALL-FAIL | 0| 0|
EXT-SUCC | 0| 0|EXT-FAIL | 0| 1|
NOTIFY | | 5|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 0|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 0| 0|RELAY-FAIL | 0| 1|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
------------------------------------------------------------------------
1 OUT READY READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL-SUCC | 0| 1|CALL-FAIL | 0| 0|
EXT-SUCC | 0| 0|EXT-FAIL | 0| 0|
NOTIFY | | 0|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 1|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 0| 0|RELAY-FAIL | 0| 1|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
------------------------------------------------------------------------
2 IN LISTEN 000.000.000.000-25 READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL-SUCC | 1| 0|CALL-FAIL | 0| 0|
EXT-SUCC | 0| 0|EXT-FAIL | 1| 0|
NOTIFY | | 0|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 0|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 0| 0|RELAY-FAIL | 0| 0|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
------------------------------------------------------------------------
3 IN LISTEN 000.000.000.000-25 READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL-SUCC | 1| 0|CALL-FAIL | 0| 0|
EXT-SUCC | 1| 0|EXT-FAIL | 0| 0|
NOTIFY | | 0|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 0|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 1| 0|RELAY-FAIL | 0| 0|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
------------------------------------------------------------------------
4 IN LISTEN 000.000.000.000-25 READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL-SUCC | 1| 0|CALL-FAIL | 0| 0|
EXT-SUCC | 1| 0|EXT-FAIL | 0| 0|
NOTIFY | | 0|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 0|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 1| 0|RELAY-FAIL | 0| 0|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
------------------------------------------------------------------------
5 IN LISTEN 000.000.000.000-25 READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
426
Draft SMTP - Simple Mail Transfer Protocol Draft
CALL-SUCC | 1| 0|CALL-FAIL | 0| 0|
EXT-SUCC | 1| 0|EXT-FAIL | 0| 0|
NOTIFY | | 0|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 0|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 1| 0|RELAY-FAIL | 0| 0|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
------------------------------------------------------------------------
6 IN LISTEN 000.000.000.000-25 READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL-SUCC | 1| 0|CALL-FAIL | 0| 0|
EXT-SUCC | 0| 0|EXT-FAIL | 1| 0|
NOTIFY | | 0|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 0|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 0| 0|RELAY-FAIL | 0| 0|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
------------------------------------------------------------------------
7 IN LISTEN 000.000.000.000-25 READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL-SUCC | 1| 0|CALL-FAIL | 0| 0|
EXT-SUCC | 1| 0|EXT-FAIL | 0| 0|
NOTIFY | | 0|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 0|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 1| 0|RELAY-FAIL | 0| 0|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
------------------------------------------------------------------------
8 IN LISTEN 000.000.000.000-25 READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL-SUCC | 1| 0|CALL-FAIL | 0| 0|
EXT-SUCC | 1| 0|EXT-FAIL | 0| 0|
NOTIFY | | 0|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 0|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 1| 0|RELAY-FAIL | 0| 0|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
------------------------------------------------------------------------
9 IN LISTEN 000.000.000.000-25 READY
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL-SUCC | 0| 0|CALL-FAIL | 0| 0|
EXT-SUCC | 0| 0|EXT-FAIL | 0| 0|
NOTIFY | | 0|NOTIFY-LT | | 0|
NOTIFY-SUCC| | 0|NOTIFY-FAIL| | 0|
LOCAL-SUCC | 0| 0|LOCAL-FAIL | 0| 0|
RELAY-SUCC | 0| 0|RELAY-FAIL | 0| 0|
INT-SUCC | 0| 0|INT-FAIL | 0| 0|
------------------------------------------------------------------------
427
Draft Draft
Table of Contents
29.1. SNTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
29.1.1. Activating the SNTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
29.1.2. SNTP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
29.2. Examples of SNTP configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
29.2.1. SNTP client configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
29.2.2. SNTP server configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
29.3. SNTP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
29.3.1. SNTP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
29.3.2. SNTP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
SNTP client It loads time data from a remote SNTP server and sets the Abilis internal clock accordingly.
If the Client process is not active the server process operates as a primary reference source of synchronization; if the client
process is active the server process operates as a secondary reference source of synchronization.
1
http://en.wikipedia.org/wiki/SNTP
428
Draft SNTP - Simple Network Time Protocol Draft
The SNTP resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the SNTP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
RES:Sntp ----------------------------------------------------------------------
Run DESCR:Simple_Network_Time_Protocol
LOG:NO
- Client ---------------------------------------------------------------
CLIACT:YES udp-remport:123
HOST-1:# HOST-2:#
HOST-3:# HOST-4:#
SRCADD:R-ID (192.168.000.201)
POLLP:60 NRTY:3 TBW:30 TBD:30
- Server ---------------------------------------------------------------
SERVACT:NO udp-locport:123
IPSRC:* IPSRCLIST:#
HOST-x Sets the IP address of the SNTP Server host number x to which the Client process of the Abilis will send its
synchronization requests.
POLLP Sets the time interval (in minutes) after which to start the synchronization procedure of the SNTP Client of
Abilis.
NRTY Sets the maximum number of repetitions for each synchronization attempt.
TBW Sets the time interval (in seconds) after which the request sent by the SNTP Client of the Abilis will be
considered failed, if no answer from the SNTP Server is received.
TBD Sets the time interval (in seconds) between a failed synchronization request and its successive one.
udpport UDP port that is used by the SNTP port (Read Only parameter).
IPSRC Sets the IP address of the SNTP Client enabled to query the Server process of Abilis.
IPSRCLIST Sets the list of SNTP Client systems enabled to query the Server process of Abilis.
The command which allows the configuration of the resource to be modified has the following syntax:
s p sntp par:val...
429
Draft SNTP - Simple Network Time Protocol Draft
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:sntp; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are
required (i.e. with warm start command).
COMMAND EXECUTED
With this configuration, Abilis will send a synchronization request every 1440 minutes (POLLP parameter) to the host
129.132.2.21.
Tip
Interesting chapter: Section 52.20.1, “How to activate the SNTP client”.
COMMAND EXECUTED
430
Draft SNTP - Simple Network Time Protocol Draft
SERVACT:YES udpport:123
IPSRC:192.168.000.100 IPSRCLIST:SNTP_Allowed
Tip
Interesting chapter: Section 52.20.2, “How to activate the SNTP server”.
d d sntp / d de sntp It shows the status of the client and server, the IP address of the SNTP server and the
date and time of the last synchronization.
RES:Sntp ----------------------------------------------------------------------
Simple_Network_Time_Protocol
Local Clock Synchronized: External Clock Reference 129.132.002.021
Clock last synchronized on 29/12/2007 at 18:40:58 Delta:1 sec.
Server-STATE:INACTIVE
Client-STATE:READY
d s sntp / d se sntp It shows the statistic information, such as the number of packets sent/received by the
SNTP Server/Client, the number of invalid packets received by the SNTP Server/
Client, the number of packets received by the SNTP Server from a disabled SNTP
Client, the number of packets received with a IP address not valid, the number of
successful synchronizations or number of failed synchronizations.
RES:Sntp ----------------------------------------------------------------------
Simple_Network_Time_Protocol
--- Cleared 0 days 05:05:19 ago, on 29/12/2007 at 13:39:56 -------------
Server:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SER-PCK | 0| 0|SER-BADPCK | 0| |
SER-BADSRC | 0| |
------------------------------------------------------------------------
Client:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CLI-PCK | 6| 7|CLI-BADPCK | 0| |
CLI-BADSRC | 0| |CLI-TOUT | 1| |
SUCC-SYNC | 6| |FAIL-SYNC | 0| |
------------------------------------------------------------------------
431
Draft Draft
Table of Contents
30.1. ALARM resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
30.1.1. Activating the ALARM resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
30.1.2. ALARM resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
30.1.3. The ALARM table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
30.1.4. ALARM diagnostic and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
COMMAND EXECUTED
The ALARM resource may already exist in the system, but may not yet be active: set it active with the following command.
COMMAND EXECUTED
Caution
You must save the configuration and restart the Abilis to make the resource running (use the command
warm start to reboot the Abilis) after adding or setting the ALARM active.
COMMAND EXECUTED
Caution
Execute the initialization command init res:alarm to activate the changes made on the upper case
parameters; use save conf and warm start commands to set active the changes made on the lowercase
parameters.
432
Draft ALARM resource Draft
RES:Alarm ---------------------------------------------------------------------
Run DESCR:Alarms_manager
LOG:NO ACT:YES fifo-size:100
MAIL-ENABLE:YES
MAIL-FROM:SYS
LOG State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E] (D: Debug Log; S: System Log; A: Alarm
view; L: Local audible alarm; T: SNMP traps; +E: Extended Log of state changes).
MAIL-FROM Sender of e-mail. From 0 up to 128 ASCII printable characters. Spaces are not allowed. Case is preserved.
[SYS: the sender is the one configured in the MAIL-FROM parameter fo CTISYS resource]
The following command allows the administrator to change the configuration of the resource:
s p alarm parameter:value...
Caution
Execute the initialization command init res:alarm to activate the changes made on the upper case
parameters; use save conf and warm start commands to set active the changes made on the lowercase
parameters.
-------------------------------------------------------------------------------
ID: |ENABLED:|MONITOR:|RES: |ACTION:
|MAIL-RCPT:
|MAIL-RCPT-LIST:
-------------------------------------------------------------------------------
0 YES TRAP * MAIL
[email protected]
#
-------------------------------------------------------------------------------
Meaning of parameters:
ACTION Action to be executed when the monitored alarm/event occurs [NONE, MAIL]. Default is NONE.
MAIL-RCPT Default e-mail recipient(s). From 0 up to 128 ASCII printable characters. Spaces are not allowed.
Case is preserved. (Only for ACTION:MAIL). Default is <empty>.
433
Draft ALARM resource Draft
MAIL_RCPT-LIST TXT list of e-mail recipients [#, ListName] (Only for ACTION:MAIL). Default is <empty>.
COMMAND EXECUTED
Warning
Changes made on the ALARM table are immediately active. Remeber to save the configuration (save conf).
-------------------------------------------------------------------------------
ID: |ENABLED:|MONITOR:|RES: |ACTION:
|MAIL-RCPT:
|MAIL-RCPT-LIST:
-------------------------------------------------------------------------------
0 YES TRAP * MAIL
[email protected]
#
-------------------------------------------------------------------------------
COMMAND EXECUTED
Warning
Changes made on the ALARM table are immediately active. Remeber to save the configuration (save conf).
434
Draft ALARM resource Draft
COMMAND EXECUTED
Warning
Changes made on the ALARM table are immediately active. Remeber to save the configuration (save conf).
d d alarm it shows the state of the resource (STATE), the state of the email sending (MAIL-ENABLED), the number
of notifications inside the FIFO (CUR-FIFO), the maximum number of notifications inside the FIFO (PEAK-
FIFO), the maximum number of notifications which can be managed by the FIFO (MAX-FIFO).
RES:Alarm ---------------------------------------------------------------------
Alarms_manager
STATE:ACTIVE MAIL-ENABLED:YES
CUR-FIFO:0 PEAK-FIFO:1 MAX-FIFO:100
d s alarm it shows the statistics of the ALARM resource like: the number of received notifications (ALARM), the
number of notifications successfully inserted in the FIFO (ALARM-SUCC), the number of notifications
not inserted in the FIFO because the it's full (ALARM-OVR), the number of notifications not inserted in
the FIFO for any other reason, the number of trap notifications extracted from FIFO (TRAP), the number
of notifications successfully managed (TRAP-SUCC), the number of discarded notifications because they
don't match any rule (TRAP-DISC), the number of sent mails (MAIL), the number of successfully sent mails
(MAIL-SUCC), the number of mails (MAIL-FAIL) whose sendig is failed.
435
Draft ALARM resource Draft
RES:Alarm ---------------------------------------------------------------------
Alarms_manager
--- Cleared 0 days 00:39:03 ago, on 05/05/2011 at 11:36:38 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
ALARM | 1| 1|ALARM-OVR | 0| |
ALARM-SUCC | 1| 1|ALARM-FAIL | 0| 0|
TRAP | 1| |MAIL | | 1|
TRAP-SUCC | 1| |MAIL-SUCC | | 1|
TRAP-DISC | 0| |MAIL-FAIL | | 0|
------------------------------------------------------------------------
436
Draft Draft
Table of Contents
31.1. UPNPS resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
31.2. UPNPS configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
31.3. UPNPS diagnostic and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
31.4. How to configure UPNP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
The UPNPS resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
RES:UPnPS --------------------------------------------------------------------
Run Run DESCR:Universal_Plug_and_Play_Server
LOG:NO ACT:NO sesnum:5 udp-locport:1900 tcp-locport:1900
MAX-AGE:1800 TOS:0-N
IPSRC:* IPSRCLIST:#
WDIR:C:\APP\UPNP\
COMMAND EXECUTED
COMMAND EXECUTED
1
http://en.wikipedia.org/wiki/Universal_Plug_and_Play
437
Draft UPNP - Universal Plug and Play Draft
RES:UPnPS ---------------------------------------------------------------------
Run DESCR:Universal_Plug_and_Play_Server
LOG:NO ACT:YES sesnum:5 udp-locport:1900 tcp-locport:1900
MAX-AGE:1800 TOS:0-N
IPSRC:* IPSRCLIST:#
WDIR:C:\APP\UPNP\
LOG activates the logging and the generation of the alarms [NO, D (=Debug Log), S (=System Log), A (=Alarm
view), L (=Local audible alarm), T (=SNMP traps), ALL] [+E (=Extended Log of state changes)].
sesnum Number of sessions that the UPNP server module can support.
IPSRCLIST Incoming requests: name of the IP/IR/RU/MR list for source IP address acceptance.
The following command allows the administrator to change the configuration of the resource:
s p upnps name:value...
RES:UPnPS ---------------------------------------------------------------------
Universal_Plug_and_Play_Server
STATE:ACTIVE SESNUM:5
CUR-REQUESTS:0 PEAK-REQUESTS:2
- HTTP Channels --------------------------------------------------------
CH TCP-State LocAdd-LocPort RemAdd-RemPort
------------------------------------------------------------------------
0 LISTENING 000.000.000.000-0
1 LISTENING 000.000.000.000-0
2 LISTENING 000.000.000.000-0
3 LISTENING 000.000.000.000-0
4 LISTENING 000.000.000.000-0
RES:UPnPS ---------------------------------------------------------------------
Universal_Plug_and_Play_Server
--- Cleared 0 days 00:51:14 ago, on 13/12/2010 at 14:14:04 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SSDP-CHR | 3468| 10893|SSDP-FRM | 29| 39|
SSDP-LOST | 0| |SSDP-BADFMT| 0| |
SOAP-REQ | 17| |SOAP-RSP | | 14|
SOAP-ERR | 3| |TCP-CHR | 15900| 77380|
------------------------------------------------------------------------
438
Draft UPNP - Universal Plug and Play Draft
Assuming to have the above network, configure Abilis so that it can be used as a UPNP server only by the pc inside lan (to
avoid security issues).
The first step is to add and activate the UPNPS resource, then type the following commands:
COMMAND EXECUTED
COMMAND EXECUTED
439
Draft UPNP - Universal Plug and Play Draft
440
Draft Draft
Table of Contents
32.1. FTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
32.1.1. Activating the FTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
32.1.2. FTP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
32.2. FTP tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
32.2.1. Users table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
32.2.2. FTP Virtual Root Paths table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
32.2.3. FTP Virtual Paths Access Rights table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
32.3. FTP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
32.3.1. FTP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
32.3.2. FTP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
32.4. Example of FTP configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
32.4.1. Configuring the FTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
32.4.2. Activating the user “ftpuser” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
32.4.3. Creating the virtual path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
32.4.4. Giving access rights to user “ftpuser” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
32.4.5. Connecting to Abilis FTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
32.4.6. Access to the system version directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Virtual directories are used to limit the access to real file system.
• file names start with "/" without volume specification (such as A: in DOS-like notation).
The FTP resource may already exist in the system, but may not yet be active: set it active with the command:
1
http://en.wikipedia.org/wiki/Ftp
441
Draft FTP - File Transfer Protocol Draft
COMMAND EXECUTED
Caution
After adding or setting the FTP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
Run DESCR:File_Transfer_Protocol_Server
LOG:NO ACT:YES max-cli:4
tcp-locport-c:21 tcp-locport-d:20 TOS:0-N
IPSRC:* IPSRCLIST:#
DATA-TOUT:30 DT:300 REJ-1024:YES SAME-IP:YES SYSDRIVES:NO
MAX-PWD-FAIL:4 DELAY-PWD-FAIL:5
MAX-IP-SES:NOMAX MAX-USER-SES:2
ANONYMOUS-USER:DENY REGISTERED-USER:PERMIT
ANONYMOUS-HOMEDIR:
max-cli Maximum number of simultaneous client connections (every client needs 2 FTP connections).
DT Inactivity time-out.
REJ-1024 Enables/disables data connections to client's ports lower then 1024 (only for active mode).
SAME-IP Allows to restrict data connection to the same IP of the control connection (for both active and
passive mode).
SYSDRIVES Allows to create a /sysdrives/ virtual path from which it is possible to access to all system
drives and their subdirectories.
442
Draft FTP - File Transfer Protocol Draft
MAX-IP-SES Limits number of simultaneous CONTROL connections that can be established from a client's IP
address.
MAX-USER-SES Limits number of simultaneous CONTROL connections that an user can establish from the
SAME IP with the SAME USER login.
ANONYMOUS-HOMEDIR Anonymous home directory, initiating and terminated by the '/' (slash) character.
The following command allows the administrator to change the configuration of the resource:
s p ftp parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init res:ftp;
while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required
(i.e. with warm start command).
• creation of a access rights for that virtual Path in the FTP Virtual Paths Access Rights table.
Type the command d user:<user> to show the detailed user configuration parameters.
Parameter: | Value:
------------------+------------------------------------------------------------
USER: ftpuser
ALIAS: ftpuser
ID: 10 <Read Only>
PWD: ***
ACT: YES
GROUP:
CTIP: #
CLUS: #
OPC-ROLE: USER
OPC-VIEW: *
443
Draft FTP - File Transfer Protocol Draft
OPC-MONITOR: NONE
FTP: YES
FTP-HOMEDIR:
FTP-PROT: PLAIN,SSL
-------------------------------------------------------------------------------
The whole table can be shown with the follwoing command. By default the table contains the following entries:
Parameter: | Value:
------------+------------------------------------------------------------------
PATH: /pub/
PHYS-PATH: C:\USR\PUB\
-------------------------------------------------------------------------------
PATH: /pub2/
PHYS-PATH: D:\USR\PUB\
-------------------------------------------------------------------------------
PATH: /usr/
PHYS-PATH: C:\USR\
-------------------------------------------------------------------------------
PATH: /usr2/
PHYS-PATH: D:\USR\
-------------------------------------------------------------------------------
Parameter: | Value:
------------+------------------------------------------------------------------
PATH: /pub/
PHYS-PATH: C:\USR\PUB\
-------------------------------------------------------------------------------
PATH Specifies a directory virtual path with UNIX notation. Virtual path / needs not to be specified because /
does never refer to physical path, it is only the “container” of virtual paths. The maximum length is of 32
characters.
PHYS-PATH Specifies a directory physical path, with DOS notation (it starts with the disk letter and it ends with the
character \ ). The maximum length is of 128 characters.
Access rights for a specific virtual path can be added/set/displayed/cleared with the following commands.
444
Draft FTP - File Transfer Protocol Draft
s ftp rights path:<virtual sets rights and other parameters for an already existent user.
path> |id:<id> user:<user>
[file:<file rights> dir:<dir rights>
recur:yes|no mode:plain,ssl]
c ftp rights path:<virtual path> | deletes an existing user; if the user is the last one the path is not deleted.
id:<id> user:<user>
d ftp rights user:<user> displays rights that a user has on all paths; the paths for which the user is not defined
are skipped.
Example of the output (by default the table contains the following entries):
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /pub/
admin rwdn lcdn YES PLAIN,SSL
anonymous r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /pub2/
admin rwdn lcdn YES PLAIN,SSL
anonymous r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sysdrives/
admin rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
4 /usr/
admin rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
5 /usr2/
admin rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
The rights are split in “file rights” and “directory rights” and are configured/viewed with two different parameters: FILE and
DIR.
R W D N
Read Write Delete Rename
L C D N
List Create Delete Rename
445
Draft FTP - File Transfer Protocol Draft
FILE:[+|-R][+|-W][+|-D][+|-N] DIR:[+|-L][+|-C][+|-D][+|-N]
d d ftp / d de ftp Shows diagnostic information such as the state of the resource, the maximum number
of clients allowed, the number of current CONNECTED/LOGGED/DATA-SESSION
(for PLAIN o SSL mode), the maximum number of CONNECTED/LOGES/DATA-
SESSION reached from start-up (for PLAIN o SSL mode), the IP addresses and ports
of clients connected, etc..
RES:Ftp -----------------------------------------------------------------------
File_Transfer_Protocol_Server
STATE:ACTIVE MAX-CLI:4
-- Clients --------|--TOT CUR---|--TOT PEAK--|--SSL CUR---|--SSL PEAK--|
CONNECTED | 1| 1| 0| 0|
LOGGED | 1| | 0| |
DATA-SESSION | 0| 1| 0| 0|
------------------------------------------------------------------------
-- Sessions states -----------------------------------------------------
SES C-STATE C-REM C-LOC USER
D-STATE D-REM D-LOC
------------------------------------------------------------------------
4 LOGGED 192.168.002.010-3110 192.168.002.002-21 anonymous
READY 000.000.000.000-0 000.000.000.000-0
d s ftp Shows the number of sent/received characters and packets for both data and control sessions, the number of
received valid commands on control session and the number of sent responses.
d se ftp Shows statistic information in an extended format: the same information listed for d s ftp command are shown
for each session.
446
Draft FTP - File Transfer Protocol Draft
RES:Ftp -----------------------------------------------------------------------
File_Transfer_Protocol_Server
--- Cleared 000:03:02:24 ago, on 15/09/2007 at 15:59:39 ----------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CTRL-CHR | 211| 921|CTRL-PCK | 20| 27|
DATA-CHR | 0| 366|DATA-PCK | 0| 2|
COMMAND | 20| |REPLY | | 27|
------------------------------------------------------------------------
RES:Ftp -----------------------------------------------------------------------
File_Transfer_Protocol_Server
--- Cleared 000:03:02:53 ago, on 15/09/2007 at 15:59:40 ----------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CTRL-CHR | 211| 921|CTRL-PCK | 20| 27|
DATA-CHR | 0| 366|DATA-PCK | 0| 2|
COMMAND | 20| |REPLY | | 27|
------------------------------------------------------------------------
SES C-STATE C-REM C-LOC USER
D-STATE D-REM D-LOC
------------------------------------------------------------------------
4 LOGGED 192.168.002.010-3110 192.168.002.002-21 anonymous
READY 000.000.000.000-0 000.000.000.000-0
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CTRL-CHR | 74| 322|CTRL-PCK | 8| 9|
DATA-CHR | 0| 183|DATA-PCK | 0| 1|
COMMAND | 8| |REPLY | | 9|
------------------------------------------------------------------------
COMMAND EXECUTED
447
Draft FTP - File Transfer Protocol Draft
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Parameter: | Value:
------------+------------------------------------------------------------------
PATH: /pub/
PHYS-PATH: C:\USR\PUB\
-------------------------------------------------------------------------------
PATH: /pub2/
448
Draft FTP - File Transfer Protocol Draft
PHYS-PATH: D:\USR\PUB\
-------------------------------------------------------------------------------
PATH: /test1/
PHYS-PATH: c:\usr\pub\test1\
-------------------------------------------------------------------------------
PATH: /usr/
PHYS-PATH: C:\USR\
-------------------------------------------------------------------------------
PATH: /usr2/
PHYS-PATH: D:\USR\
-------------------------------------------------------------------------------
Note
Supposing: test1 directory has been created by an user with administrator's rights (e.g. user admin).
Caution
Execute the initialization command init res:ftp to activate changes.
[16:21:35] ABILIS_CPX:a ftp rights path:/test1/ user:ftpuser file:rwdn dir:lcdn recur:yes prot:plai
COMMAND EXECUTED
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /pub/
admin rwdn lcdn YES PLAIN,SSL
anonymous r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /pub2/
admin rwdn lcdn YES PLAIN,SSL
anonymous r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sysdrives/
admin rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
6 /test1/
ftpuser rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
4 /usr/
admin rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
5 /usr2/
admin rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
Give to ftpuser read-only rights on directory usr and its subdirectories (virtual path /usr/).
[16:29:04] ABILIS_CPX:a ftp rights path:/usr/ user:ftpuser file:r-w-d-n dir:l-c-d-n recur:yes prot:
COMMAND EXECUTED
449
Draft FTP - File Transfer Protocol Draft
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /pub/
admin rwdn lcdn YES PLAIN,SSL
anonymous r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /pub2/
admin rwdn lcdn YES PLAIN,SSL
anonymous r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sysdrives/
admin rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
6 /test1/
ftpuser rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
4 /usr/
admin rwdn lcdn YES PLAIN,SSL
ftpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
5 /usr2/
admin rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
The logged-in user accesses the directory /test1/ (c:\usr\pub\test1\) using the configured rights (create/rename/
delete new directories or files). Outside directories can only be viewed.
COMMAND EXECUTED
The access is enabled by default for the user “admin”; access rights to user “ftpuser” can be given with the following
command:
450
Draft FTP - File Transfer Protocol Draft
[15:19:20] ABILIS_CPX:a ftp rights path:/sysdrives/ user:ftpuser file:rwdn dir:lcdn recur:yes prot:
COMMAND EXECUTED
-------------------------------------------------------------------------------
1 /pub/
admin rwdn lcdn YES PLAIN,SSL
anonymous r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /pub2/
admin rwdn lcdn YES PLAIN,SSL
anonymous r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sysdrives/
admin rwdn lcdn YES PLAIN,SSL
ftpuser rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
6 /test1/
ftpuser rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
4 /usr/
admin rwdn lcdn YES PLAIN,SSL
ftpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
5 /usr2/
admin rwdn lcdn YES PLAIN,SSL
-------------------------------------------------------------------------------
451
Draft Draft
Table of Contents
33.1. TFTP - Trivial File Transfer Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
33.1.1. Activating the TFTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
33.1.2. TFTP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
33.2. TFTP diagnostic and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
33.2.1. TFTP diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
33.2.2. TFTP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
The TFTP resource may already exist in the system, but may not yet be active: set it active with the following command.
COMMAND EXECUTED
Caution
You must restart the Abilis to make the resource running (use the command warm start to reboot the
Abilis) after adding or setting the TFTP active.
RES:Tftp ----------------------------------------------------------------------
Run DESCR:Trivial_File_Transfer_protocol
LOG:NO ACT:NO udp-locport:69 srv-sess:10 TOS:0-N
RTY:5 TOUT:3 WRITE-PERMISSIONS:NO
IPSRC:* IPSRCLIST:#
WDIR:C:\APP\TFTP\
Caution
Execute the initialization command init res:tftp to activate the changes made on the upper case parameters;
use save conf and warm start commands to set active the changes made on the lowercase parameters.
COMMAND EXECUTED
1
http://en.wikipedia.org/wiki/Trivial_File_Transfer_Protocol
452
Draft TFTP - Trivial File Transfer Protocol Draft
SAVE EXECUTED
COMMAND EXECUTED
RES:Tftp ----------------------------------------------------------------------
Run DESCR:Trivial_File_Transfer_protocol
LOG:NO ACT:NO udp-locport:69 srv-sess:10 TOS:0-N
RTY:5 TOUT:3 WRITE-PERMISSIONS:NO
IPSRC:* IPSRCLIST:#
WDIR:C:\APP\TFTP\
LOG State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E] (D: Debug Log; S: System Log; A: Alarm
view; L: Local audible alarm; T: SNMP traps; +E: Extended Log of state changes).
TOS Type Of Service octet or Differentiated Services Field (DS): -' p-t', i.e. PRECEDENCE and TOS
values, where 'p' can be [0..7] and 't' can be [N=None, D=Min. Delay, T=Max. Throughput,
R=Max. Reliability, C=Min. Monetary Cost] - 'bbbbbb', i.e. DS value bit by bit, where 'b' can be
[0, 1]. Default is 0-N.
TOUT Time that TFTP waits for TFTP peer responses [1..15 sec.]. Default is 3.
WRITE-PERMISSIONS Specifies the write permissions [NO: write permission disabled, YES:write permission enabled,
IF-EXISTS:????]. Default is NO.
IPSRC Incoming requests: accepted source IP address [*, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x]. Default
is *.
IPSRC-LIST Incoming requests: name of the IP/IR/RU/MR list for source IP address acceptance [#, 0..9, a..z,
A..Z, _]. Default is #.
WDIR Directory where message files are located. It cannot be empty. Physical full path in DOS
notation, i.e. starting with a drive letter in the range ['A'..'Z'] and ending with the '\' character.
453
Draft TFTP - Trivial File Transfer Protocol Draft
Max. 128 characters. Case is preserved. Spaces are allowed. Strings holding spaces must be
written between quotation marks (E.g.: "C:\My dir\"). Default is C:\APP\TFTP\.
The following command allows the administrator to change the configuration of the resource:
s p tftp parameter:value...
Caution
Execute the initialization command init res:tftp to activate the changes made on the upper case parameters;
use save conf and warm start commands to set active the changes made on the lowercase parameters.
d d tftp it shows the state of the resource (STATE), the number of current used TFTP sessions (CUR-SESS), the peak
of used TFTP sessions (PEAK-SESS), the number of maximum TFTP sessions (MAX-SESS). The command
shows also the sessions and the clients ip addresses.
RES:Tftp ----------------------------------------------------------------------
Trivial_File_Transfer_protocol
STATE:ACTIVE
CUR-SESS:0 PEAK-SESS:0 MAX-SESS:10
------------------------------------------------------------------------
SES RemAdd-RemPort
------------------------------------------------------------------------
0 000.000.000.000-0
1 000.000.000.000-0
2 000.000.000.000-0
3 000.000.000.000-0
4 000.000.000.000-0
5 000.000.000.000-0
6 000.000.000.000-0
7 000.000.000.000-0
8 000.000.000.000-0
9 000.000.000.000-0
d s tftp it shows the statistics of the TFTP resource, such as the total number of incoming/outgoing characters
from UDP (CHR), the total number of incoming/outgoing packets from UDP (FRM), the total number of
lost incoming packets with too long length (LONG), the total number of lost incoming packets: buffer is
full (LOST), the total number of lost incoming packets with bad format (BAD-FMT), the total number
of lost incoming packets with source IP addreess which not allowed (BAD-SRC), the total number of
received packet with error opcode (ERRORS), the total number of timeouts (TOUT), the total number of
retransmissions (RETRANS).
d se tftp it shows the TFTP resource statitics shown by the previous command sorted by session.
RES:Tftp ----------------------------------------------------------------------
Trivial_File_Transfer_protocol
--- Cleared 0 days 00:11:25 ago, on 05/05/2011 at 11:36:38 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
454
Draft TFTP - Trivial File Transfer Protocol Draft
LONG | 0| 0|LOST | 0| 0|
BAD-FMT | 0| 0|BAD-SRC | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
RES:Tftp ----------------------------------------------------------------------
Trivial_File_Transfer_protocol
--- Cleared 0 days 00:11:30 ago, on 05/05/2011 at 11:36:38 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
LONG | 0| 0|LOST | 0| 0|
BAD-FMT | 0| 0|BAD-SRC | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
SES:0
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
SES:1
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
SES:2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
SES:3
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
SES:4
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
SES:5
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
SES:6
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
SES:7
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
455
Draft TFTP - Trivial File Transfer Protocol Draft
CHR | 0| 0|FRM | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
SES:8
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
SES:9
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
ERRORS | 0| |TOUT | 0| |
RETRANS | | 0|
------------------------------------------------------------------------
456
Draft Draft
Table of Contents
34.1. HTTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
34.1.1. Activating the HTTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
34.1.2. HTTP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
34.2. HTTP tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
34.2.1. Users table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
34.2.2. HTTP Virtual Root Paths Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460
34.2.3. HTTP Virtual Paths Access Rights Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460
34.3. HTTP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
34.3.1. HTTP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
34.3.2. HTTP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
34.4. HTTPS (HTTP over SSL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
34.4.1. Activating the SSL resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
34.4.2. HTTP resource configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
34.4.3. Connecting to Abilis using HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
34.5. Appendix - HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Abilis HTTP2 server supports both PLAIN and SSL operations. The securty level can be managed by:
Tip
Refer to Section 34.5, “Appendix - HTTP” to have more information about HTTP.
The HTTP resource may already exist in the system, but may not yet be active: set it active with the command:
1
http://en.wikipedia.org/wiki/HTTP
2
http://en.wikipedia.org/wiki/HTTP
457
Draft HTTP - HyperText Transfer Protocol Draft
COMMAND EXECUTED
Caution
After adding or setting the HTTP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
RES:Http ----------------------------------------------------------------------
Run DESCR:HyperText_Transfer_Protocol
LOG:NO ACT:NO LOGIN-COOKIE-TOUT:1440
WDIR:C:\APP\HTTP\
START-PAGE:SYS (/sys/pub/cpx.htm)
SYS-CSS:SYS (/sys/pub/cpx.css)
- HTTP plain -----------------------------------------------------------
ACT-P:YES locport-p:80 sesnum-p:12
IPSRC-P:* IPSRCLIST-P:#
- HTTP ssl -------------------------------------------------------------
ACT-S:NO locport-s:443 sesnum-s:0
IPSRC-S:* IPSRCLIST-S:#
458
Draft HTTP - HyperText Transfer Protocol Draft
IPSRCLIST-P Additional list of client IP addresses allowed to connect to HTTP server in PLAIN mode.
IPSRCLIST-S Additional list of client IP addresses allowed to connect to HTTP server in PLAIN mode in SSL
mode.
The following command allows the administrator to change the configuration of the resource:
s p http parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:http; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are
required (i.e. with warm start command).
• creation of a access right for that virtual Path in the FTP Virtual Paths Access Rights table.
USER: PWD: ACT: CTIP: CLUS: PPP: FTP: HTTP: MAIL: IAX: SIP:
--------------------------------+--------------+-------------------------------
admin NO # # YES YES YES NO NO NO
guest NO # # NO NO NO NO NO NO
httpuser YES # # NO NO YES NO NO NO
To show the detailed user configuration parameters, type the command d user:<username>.
Parameter: | Value:
------------------+------------------------------------------------------------
USER: httpuser
ALIAS: httpuser
ID: 3 <Read Only>
PWD:
ACT: YES
GROUP:
CTIP: #
CLUS: #
OPC-MONITOR: NONE
HTTP: YES
HTTP-PROT: PLAIN,SSL
-------------------------------------------------------------------------------
Tip
Interesting chapter: Section 5.9, “Users Table”.
459
Draft HTTP - HyperText Transfer Protocol Draft
The whole table can be shown with the following command. The table is empty by default:
Parameter: | Value:
------------+------------------------------------------------------------------
PATH: /test/
PHYS-PATH: c:\usr\pub\test\
-------------------------------------------------------------------------------
PATH: /trfafiles/
PHYS-PATH: c:\app\trfa\
-------------------------------------------------------------------------------
Parameter: | Value:
------------+------------------------------------------------------------------
PATH: /test/
PHYS-PATH: c:\usr\pub\test\
-------------------------------------------------------------------------------
PATH Specifies a directory virtual path with UNIX notation. Virtual path / needs not to be specified because /
does never refer to physical path, it is only the “container” of virtual paths. The maximum length is of 32
characters.
PHYS-PATH Specifies a directory physical path, with DOS notation (it starts with the disk letter and it ends with the
character \ ). The maximum length is of 128 characters.
Access rights for a specific virtual path can be added/set/displayed/cleared with the following commands.
s http rights path:<virtual sets rights and other parameters for an already existent user.
path> | id:<id> user:<user>
[file:<file rights> dir:<dir rights>
recur:yes|no mode:plain,ssl]
c http rights path:<virtual path> deletes an existing user; if the user is the last one the path is not deleted.
| id:<id> user:<user>
460
Draft HTTP - HyperText Transfer Protocol Draft
d http rights user:<user> displays rights which a user has on all paths; the paths for which the user is not defined
are skipped.
Tip
Access rights for a specific virtual path can be added/set/displayed/cleared specifying the path or the id: the
following commands are equivalent.
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /sys/
admin r--- l--- YES PLAIN,SSL
test2 r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /sys/
admin r--- l--- YES PLAIN,SSL
test2 r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
An example of the output is shown below (by default the table contains the following entries):
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /sys/
admin r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /sys/pub/
anonymous r--- ---- YES PLAIN,SSL
-------------------------------------------------------------------------------
The rights are split in “file rights” and “directory rights” and are configured/viewed with two different parameters: FILE and
DIR.
R W D N
Read Write Delete Rename
L C D N
List Create Delete Rename
461
Draft HTTP - HyperText Transfer Protocol Draft
FILE:[+|-R][+|-W][+|-D][+|-N] DIR:[+|-L][+|-C][+|-D][+|-N]
d d http / d de http Shows diagnostic information such as the state of the resource, the maximum number
of connections, the IP address-ports of clients connected, etc..
RES:Http ----------------------------------------------------------------------
HyperText_Transfer_Protocol
STATE:READY MAX-CONN:12
------------------------------------------------------------------------
CH State LocAdd-LocPort RemAdd-RemPort
------------------------------------------------------------------------
0 LISTENING 000.000.000.000-80
1 LISTENING 000.000.000.000-80
2 LISTENING 000.000.000.000-80
3 LISTENING 000.000.000.000-80
4 CONNECTED 192.168.000.231-80 192.168.000.029-1315
5 LISTENING 000.000.000.000-80
6 LISTENING 000.000.000.000-80
7 LISTENING 000.000.000.000-80
8 LISTENING 000.000.000.000-80
9 LISTENING 000.000.000.000-80
10 LISTENING 000.000.000.000-80
11 LISTENING 000.000.000.000-80
d s http Shows the number of sent/received characters, the number of received request from the resource and the
number of received GET, POST or PUT request from the resource.
462
Draft HTTP - HyperText Transfer Protocol Draft
d se http Shows statistic information in an extended format: the same information listed for d s http command are
shown for each session.
RES:Http ----------------------------------------------------------------------
HyperText_Transfer_Protocol
--- Cleared 000:00:00:00 ago, on 08/11/2006 at 15:59:02 ----------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 4228062| 42640997|REQ | 10402| |
REQ-GET | 10402| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
RES:Http ----------------------------------------------------------------------
HyperText_Transfer_Protocol
--- Cleared 000:00:00:00 ago, on 08/11/2006 at 15:59:14 ----------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 4228062| 42640997|REQ | 10402| |
REQ-GET | 10402| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:0
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|REQ | 0| |
REQ-GET | 0| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:1
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|REQ | 0| |
REQ-GET | 0| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 19512| 50419968|REQ | 48| |
REQ-GET | 48| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:3
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 2668171| 2598680832|REQ | 6564| |
REQ-GET | 6564| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:4
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 2361| 1880576|REQ | 6| |
REQ-GET | 6| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:5
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|REQ | 0| |
REQ-GET | 0| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:6
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|REQ | 0| |
463
Draft HTTP - HyperText Transfer Protocol Draft
REQ-GET | 0| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:7
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|REQ | 0| |
REQ-GET | 0| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:8
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 856243| 2207517696|REQ | 2107| |
REQ-GET | 2107| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:9
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 24058| 62927360|REQ | 59| |
REQ-GET | 59| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:10
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 657717| 1699701504|REQ | 1618| |
REQ-GET | 1618| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
CH:11
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|REQ | 0| |
REQ-GET | 0| |REQ-POST | 0| |
REQ-PUT | 0| |
------------------------------------------------------------------------
The SSL resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the SSL active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
464
Draft HTTP - HyperText Transfer Protocol Draft
Caution
Use the init res:ssl command to activate the changes made and save the configuration with the save conf
command to make the changes permanent.
COMMAND EXECUTED
Caution
Use the init res:http command to activate the changes made and save the configuration with the save conf
command to make the changes permanent.
The Virtual Paths Access Rights are the same of the HTTP protocol: verify that the SSL protocol is enabled in the table and
in the user's parameters with the following commands:
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /sys/
admin r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /sys/pub/
anonymous r--- ---- YES PLAIN,SSL
-------------------------------------------------------------------------------
465
Draft HTTP - HyperText Transfer Protocol Draft
Parameter: | Value:
---------------+---------------------------------------------------------------
USER: httpuser
PWD: *********
ACT: YES
HTTP: YES
HTTP-PROT: PLAIN,SSL
-------------------------------------------------------------------------------
Before connection, it will be requested to accept the digital certificate: click I understand the risk and then Add Exception.
The Abilis CPX Web Interface it is shown.
HTTP traffic is very insecure, all data is transferred in clear text; for this reason it was developed HTTPS (Hyper Text
Transfer Protocol Secure), a secure version of the HTTP. HTTPS is not a separate protocol, but refers to the combination
of a normal HTTP interaction over an encrypted Secure Sockets Layer4 (SSL) or Transport Layer Security5 (TLS) transport
mechanism based on digital certificates. Most typically HTTP data is sent over TCP/IP port 80, whereas SSL HTTP data is
sent over port 443.
3
http://en.wikipedia.org/wiki/HTTP
4
http://en.wikipedia.org/wiki/Transport_Layer_Security
5
http://en.wikipedia.org/wiki/Transport_Layer_Security
466
Draft Draft
Table of Contents
35.1. SYSLOG resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
35.2. SYSLOG configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
35.3. SYSLOG diagnostic and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
35.4. SYSLOG messages codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
35.5. Win2k SYSLOG server implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
35.5.1. Kiwi SYSLOG Daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
35.5.2. KLog win2k SYSLOG server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
35.6. Rsyslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
35.6.1. Rsyslog configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
35.6.2. Syslog resource configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
35.6.3. Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
35.7. Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
35.7.1. SYSLOG architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
• SYSLOG Device. Generates (by API function) and sends own SYSLOG messages.
• SYSLOG Relay. Receives the messages and forward it to another machine(s) (SYSLOG receivers).
Tip
Refer to chapter Section 35.7, “Appendix” to know more about syslog protocol.
The SYSLOG resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
RES:SysLog --------------------------------------------------------------------
467
Draft SYSLOG - The syslog protocol Draft
Run DESCR:System_Log_protocol
LOG:NO ACT:YES queue-size:64 udp-locport:514 RELAY:NO
LOCAL-SEVERITY:ALL
LOCAL-SOURCES:SYS
SRCADD:R-ID (192.168.000.201) TOS:0-N
HOSTNAME:
HOSTNAME-IP:R-ID (192.168.000.201)
IPSRC:* IPSRCLIST:#
RECEIVER1:# RECEIVER2:#
RECEIVER3:# RECEIVER4:#
Warning
After adding or setting the SYSLOG active, you must restart the Abilis to make the resource running (use
the command warm start to reboot the Abilis).
LOG activates the logging and the generation of the alarms [NO, D (=Debug Log), S (=System Log), A
(=Alarm view), L (=Local audible alarm), T (=SNMP traps), ALL] [+E (=Extended Log of state
changes)].
TOS enables Type Of Service (TOS) or Differentiated Services Field (DS) [-' p-t', i.e. PRECEDENCE
and TOS values, where 'p' can be [0...7] and 't' can be [N (=None), D (=Min. Delay), T (=Max.
Throughput), R (=Max. Reliability), C (=Min. Monetary Cost)] - 'bbbbbb', i.e. DS value bit by bit,
where 'b' can be [0, 1]].
LOCAL-SEVERITY Allowed message severities [EMERGENCY, ALERT, CRITICAL, ERROR, WARNING, NOTICE,
INFO, DEBUG, ALL]. Values can be joined using ',' character.
LOCAL-SOURCES Allowed message sources [SYS, DBG, ALL]. Values can be joined using ',' character.
IPSRC Selects the IP address of the client from which the requests will be accepted.
IPSRCLIST Sets the list of DNS Client systems enabled to use the SYSLOG relay service.
SRCADD Source IP address for outgoing messages [R-ID: the source IP address of the outgoing datagrams will
be set to the current RouterID value; OUT-IP: the source IP address of the outgoing datagrams will
be set on the base of the output IP interface; 1-126.x.x.x, 128-223.x.x.x: the source IP
address of the outgoing datagrams will be set to the selected value; Ip-nnn: use the current IPADD
of the specified IP resource].
HOSTNAME-IP IP form of HOSTNAME part of outgoing SYSLOG messages. [R-ID: HOSTNAME will be set to
the IP address of the current RouterID value; OUT-IP: HOSTNAME will be set to the IP address of
output IP interface; 1-126.x.x.x, 128-223.x.x.x: HOSTNAME will be set to the selected
IP address.
RECEIVERx IP address of SYSLOG receiver #x (collector or next relay) to forward SYSLOG messages [#,
1.0.0.0...126.255.255.255, 128.0.0.0...223.255.255.255]
The following command allows the administrator to change the configuration of the resource:
s p syslog name:value...
468
Draft SYSLOG - The syslog protocol Draft
d d syslog Shows diagnostic information, such as the state of the SYSLOG client and the ip address and ports of
SYSLOG servers which Abilis is connected to;
d s syslog Shows statistic information, such as number of characters received/sent, number of packets received/sent,
number of lost packets with too long length, bad format or with answer that doesn't match to request.
RES:SysLog --------------------------------------------------------------------
System_Log_protocol
STATE:READY RELAY-STATE:INACTIVE
----------------------|--- CUR ---|-- PEAK ---|
PENDING-REQUEST | 0| 2|
----------------------|--- CUR ---|-- PEAK ---|--- MAX ---|
PENDING-QUEUE (Kbytes)| 0| 0| 64|
-----------------------------------------------------------
RES:SysLog --------------------------------------------------------------------
System_Log_protocol
--- Cleared 0 days 15:02:15 ago, on 22/12/2010 at 20:47:04 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
USER | 161| |RELAY | 0| |
CHR | 0| 11238|PCK | 0| 161|
MODIFIED | 0| |LONG | 0| |
NO-QUEUE | 0| |
------------------------------------------------------------------------
• help syslog nnnnn: it shows help on the specified System Log event.
Example:
------+-----------+------------------------------------------------------------
Code | Severity | Description
------+-----------+------------------------------------------------------------
00212 | INFO | SYS SET BOOT VERSION COMMAND has been executed.
1
http://www.kiwisyslog.com/kiwi-syslog-daemon-overview/
469
Draft SYSLOG - The syslog protocol Draft
By default when Kiwi Syslog Daemon is installed it contains a single Rule that has no Filters. This means that all syslog
messages that arrive are processed by the Actions in this Rule. The Rule contains two separate Actions: a Display Action
which displays all information received to Display00 'in real time'; and a Log to File Action. This Action logs all the
information to a file called “SyslogCatchall.txt” which is located in the Logs directory of your Kiwi Syslog installations
folder.
This is a very basic initial setup for Kiwi Syslog Daemon. If this Rule is turned off or deleted, no messages will be displayed
or logged to file.
To manage your syslog messages, you can create further filters and actions that will allow you to process the messages to
your own requirements.
2
http://www.kiwisyslog.com/kiwi-syslog-daemon-download/
470
Draft SYSLOG - The syslog protocol Draft
To receive messages from Abilis SYSLOG driver you should select UDP transport. UDP port should be set to the 514.
471
Draft SYSLOG - The syslog protocol Draft
KLog can be downloaded from this address4. After installation it's fully ready to work.
3
http://kin.klever.net/klog/
4
http://kin.klever.net/klog/binaries
472
Draft SYSLOG - The syslog protocol Draft
35.6. Rsyslog
Rsyslog is a syslog daemon installed on Ubuntu. The purpose is to collect information and store them in /var/log/
syslog file.
Note
Rsyslog daemon can store information using databases like MySQL, SQlite, SyBase. Search documentation
on Internet to know how to configure it.
473
Draft SYSLOG - The syslog protocol Draft
$ModLoad imudp
$UDPServerRun 514
#################
#### MODULES ####
#################
$KLogPath /proc/kmsg
Type service rsyslog restart to restart syslog daemon and apply the new configuration.
Tip
If rsyslog is not installed, type sudo apt-get install rsyslog to install it.
COMMAND EXECUTED
474
Draft SYSLOG - The syslog protocol Draft
HOSTNAME:
HOSTNAME-IP:R-ID (192.168.000.201)
IPSRC:* IPSRCLIST:#
RECEIVER1:192.168.030.001 RECEIVER2:#
RECEIVER3:# RECEIVER4:#
COMMAND EXECUTED
SAVE EXECUTED
35.6.3. Results
The following are the information collected by linux syslog server.
35.7. Appendix
The SYSLOG5 protocol provides a transport to allow a machine to send event notification messages across IP networks to
event message collectors.
Syslog messages are not formatted, the protocol is simply designed to transport these event messages. The scenario includes:
SYSLOG uses the user datagram protocol (UDP). The UDP port that has been assigned to SYSLOG is 514. It is
recommended that the source port also be 514.
5
http://en.wikipedia.org/wiki/syslog
475
Draft SYSLOG - The syslog protocol Draft
• Senders send messages to relays or collectors with no knowledge of whether it is a collector or relay.
• Senders may be configured to send the same message to multiple receivers.
• Relays may send all or some of the messages that they receive to a subsequent relay or collector. In the case where they do
not forward all of their messages, they are acting as both a collector and a relay. In the following diagram, these devices
will be designated as relays.
• Relays may also generate their own messages and send them on to subsequent relays or collectors. In that case it is acting
as a device. These devices will also be designated as a relay in the following diagram.
476
Draft Draft
Table of Contents
36.1. Tunneling proprietary protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
36.1.1. Link check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
36.2. Configuring Packet Voice tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
36.2.1. Packet Voice over IP- Extended Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
36.2.2. IP Packet Voice - Extended-Server/Extended Client Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
36.2.3. IP-BCK Packet Voice - Extended Mode with ISDN backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
36.2.4. IP Packet Voice - Extended Mode with Double Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
36.3. Configuring Abilis Ip Tunnels (AIPT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
36.3.1. Abilis IP Tunnel over IP – Extended Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
36.3.2. Abilis IP Tunnel over IP - Extended-Server/Extended Client Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
36.3.3. Abilis IP Tunnel over IP - Extended Mode with ISDN backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
36.3.4. Abilis IP Tunnel over IP - Extended Mode with Double Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
36.4. Tunneling diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
36.4.1. Tunneling diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
36.4.2. Tunneling statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
36.5. Appendix - LN2 parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
• Tunnelling Mode
477
Draft Tunneling proprietary protocols Draft
• ART Protocol: “Abilis Redundant Tunneling” sends the same information on two different lines. The receiving Abilis
discards the packet which arrives second (out-of sequence). The probability that the same packet is lost on both links
equals the product of the original probabilities. Example: two links with 10% failure rate (a very high one!) ends up with
1%, which is normally negligible
Tip
It is avdisable to use ART ONLY with lines with the same speed. In case of lines with different speeds,
the packets are sent with the maximum speed of the slower line.
• Backup over ISDN: in case of failure of the permanent VPN connection, the Abilis PV or AIPT tunnels may be
instantaneously switched onto ISDN backup lines.
• Link Check: it is a procedure used to detect end-to-end link (or emulated p-link) real functioning, regardless of the lower
protocol layers states.
• Encryption: it activates the cryptography of the data sent on the virtual VPN and define up to 63 256 bit cryptography key
(exist also a default cryptography key that can be used in configuration).
• MPX (Multiplexing): this owner protocol allows to share the same link (VPN) for transmission of data and packetised
voice (also Link Check, if enabled).
• LOG: activates/deactivates logging functionalities of meaningful events of the VPNs. These functionalities can be applied
to IP tunnel or Link Level.
LMPX Activates the multiplexing of DATA, “Link-Check”, VOICE frames type [NO: Abilis MPX multiplexing is not
active; YES: Abilis MPX multiplexing is active only for the data protocols LAPB and LINK-FR; EXT: Abilis
MPX multiplexing is active for ANY data protocol]. The default value is YES;
LC Enables/disables the use of the “Link-Check” protocol, and consequently the transmission of “Link-check”
frames. The link-check protocol is automatically disabled when MPX:NO. Note:with LC:NO the “true link
backup” is disabled. The default value is YES;
478
Draft Tunneling proprietary protocols Draft
LCR Enables and selects the cryptography to be applied on the frames passing through the resource. Cryptography can
be selectively applied to the different traffic types (VOICE and DATA). [NO: no cryptography is applied; DATA:
cryptography is applied only on DATA traffic type; VOICE: cryptography is applied only on VOICE traffic type;
ALL: cryptography is always in use, whatever is the traffic data type].
LCRKEY Selects the key to be used for cryptography operations. Users can choose either the default key supplied by the
system (LCRKEY:DFT), or one of the keys defined in the cryptography keys table, in which case the numeric
value (from 1 to 63) corresponding to the desired LCRKEY has to be specified. If the configured value refers to
a missing LCRKEY it will be shown inside square brackets (e.g. CRKEY:[5] means that the key number 5 is not
present in the table). If the parameter LCR is set to NO, the value of LCRKEY is useless.
LT1 Maximum time to wait for a Link-Check “probe” acknowledge. If this time elapses without receiving the
acknowledge the “probe” is immediately repeated, as a result “not acknowldged probes” are repeated every LT1
milliseconds. The default is 3000;
LT3 This is the time interval between a correctly sent and acknowledged Link-Check “probe” and the next one to send
while the link is regularly working (e.g. P-LINK state is READY). It has relationships with the parameter LT1:
and it has to satisfy the simple rule: LT3 > LT1 * 2. The default is 9000;
LN2 Sets the maximum number of Link-Check “probes” retransmission. The default is 3.
Tip
Refer to chapter Section 36.5, “Appendix - LN2 parameter” to have more information about LN2
parameter.
LCOMP Set the compression type to use for an ip resource with subtype AIPT[-BCK], DL[-BCK], ML, BCH. Data
Compression is available only under licence.[NO: compression not active, LZO1X: is often the best choice of all,
LZO1B: is good with a large blocksize or with very redundant data, LZO1F: s good with a small blocksize or with
binary data]
Abilis sends a link-check every LT3 msec. If there's no response, Abilis sends it again every LT1 msec for LN2 times. Using
the default values it can take from 9 to 18 seconds to consider the link down.
479
Draft Tunneling proprietary protocols Draft
Tip
LT1 parameter has relationships with the parameter T1: and it has to satisfy the simple rule: T3 > T1 * 2.
a res:pv-<id> subtype:<value>
id is simply the identification number and subtype is the kind of resource to be used. The following command shows
supported subtypes.
Pv resource subtypes:
The following example considers two Abilis with a static public IP address each one.
COMMAND EXECUTED
480
Draft Tunneling proprietary protocols Draft
DESCR:
- Link -----------------------------------------------------------------
LLOG:DS LMPX:YES LC:YES LCOMP:NO LCR:NO
LT1:3000 LT3:9000 LN2:3 LCRKEY:DFT
- IP Tunnel ------------------------------------------------------------
TLOG:NO MODE:STD D-TOS:0-N V-TOS:0-D C-TOS:0-D
MPX:NO
LOCPORT:3101 REMPORT:3100 CR:NO CRKEY:DFT
OUT-IP:AUTO
LOCIPADD:R-ID (192.168.001.254) REMIPADD:#
COMMAND EXECUTED
Warning
Save the configuration with the command save conf and restart the Abilis with the command warm start.
• LOCPORT: UDP port number of the local Abilis (port used for the data exchange).
Tip
The above parameters must mirror each other (i.e. the value of LOCPORT on “Abilis 1” must be the same of
REMPORT on “Abilis 2” and vice versa; the same for LOCIPADD/REMIPADD).
COMMAND EXECUTED
481
Draft Tunneling proprietary protocols Draft
COMMAND EXECUTED
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES.
Tip
Activation of Link Check protocol is recommended (LC:YES): the parameter must be set at the same value
on both Abilis or the VPN will not work.
SAVE EXECUTED
482
Draft Tunneling proprietary protocols Draft
SAVE EXECUTED
Tip
Interesting chapter: Section 52.14.1, “How to configure a voice tunnel where both Abilis have a static public
IP address”.
Consider an Abilis with a static public IP address and the other one with dynamic public IP address:
COMMAND EXECUTED
483
Draft Tunneling proprietary protocols Draft
- IP Tunnel ------------------------------------------------------------
TLOG:NO MODE:STD D-TOS:0-N V-TOS:0-D C-TOS:0-D
MPX:NO
LOCPORT:3101 REMPORT:3100 CR:NO CRKEY:DFT
OUT-IP:AUTO
LOCIPADD:R-ID (192.168.000.254) REMIPADD:#
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
484
Draft Tunneling proprietary protocols Draft
Configuration of both Abilis must mirror each other. This the meaning of the “new” parameters:
• ID: on client side, is the identification IP address sent by the client to the server.
• CLI-ID: on server side, is the client identifier IP address. It can be also a “virtual value”, but it must set at the same value
of parameter ID on client side.
Tip
ID and CLI-ID can be also a “virtual values”, but they must set at the same value or the VPN will not
work!
• LOCPORT: UDP port number of the local Abilis (port used for the data exchange).
• LOCPORT: UDP port number of the local Abilis (port used for the data exchange).
COMMAND EXECUTED
485
Draft Tunneling proprietary protocols Draft
COMMAND EXECUTED
Tip
The OUT-IP value on LOCIPADD of “Abilis 2” means that it is used the IP address of the IP resource
through which the packet is sent out. It is mandatory because Abilis has a dynamic IP address.
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES.
Tip
Activation of Link Check protocol is recommended (LC:YES): the parameter must be set at the same value
on both Abilis or the VPN will not work.
SAVE EXECUTED
486
Draft Tunneling proprietary protocols Draft
SAVE EXECUTED
Tip
Interesting chapter: Section 52.14.2, “How to configure a voice tunnel where one Abilis has a dynamic
public IP address or is placed behind a router doing NAT/PAT”.
The following example considers two Abilis placed in remote sides, with a static public IP address and a backup ISDN line
each one :
COMMAND EXECUTED
487
Draft Tunneling proprietary protocols Draft
DESCR:
BCKRES:CtiSLink
- Link -----------------------------------------------------------------
LLOG:DS LMPX:YES LC:YES LCOMP:NO LCR:NO
LT1:3000 LT3:9000 LN2:3 LCRKEY:DFT
- IP Tunnel ------------------------------------------------------------
TLOG:NO MODE:STD D-TOS:0-N V-TOS:0-D C-TOS:0-D
MPX:NO
LOCPORT:3101 REMPORT:3100 CR:NO CRKEY:DFT
OUT-IP:AUTO
LOCIPADD:R-ID (192.168.000.254) REMIPADD:#
- Back-Up --------------------------------------------------------------
BRTY:LIN BNRTY:0 BTB:3 BAC:DOD
DDT:220 VDT:10 UDT:NOMAX
CDI:* CDO:#
CGI:* CGO:#
SDI:* SDO:#
SGI:DISABLED SGO:#
COMMAND EXECUTED
IP configuration of both Abilis remains the same shown in Section 36.2.1, “Packet Voice over IP- Extended Mode”.
The configuration of ISDN backup is realized in the Back-Up section. Generally, the following fields are used:
SGI and SGO are special ISDN's fields where users can insert alphanumeric string. Abilis uses them as a sort of password to
discriminate the backup calls: the field SGO of local Abilis is “inserted” in outgoing calls and verified in SGI field on remote
Abilis and vice versa (the values of SGI and SGO on both Abilis must mirror each other).
488
Draft Tunneling proprietary protocols Draft
• BTB: it defines the “base” time interval that the retry procedure set in BRTY: uses to calculate the delay between a call
attempt that fails and the next one
• NAILED-UP: the B-channel is spontaneously connected at boot, and reconnected in case of drop for any reason.
COMMAND EXECUTED
COMMAND EXECUTED
489
Draft Tunneling proprietary protocols Draft
SGI:ABILIS1-ABILIS2 SGO:ABILIS2-ABILIS1
COMMAND EXECUTED
COMMAND EXECUTED
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES.
Tip
Activation of Link Check protocol is recommended (LC:YES): the parameter must be set at the same value
on both Abilis or the VPN will not work.
SAVE EXECUTED
490
Draft Tunneling proprietary protocols Draft
OUT-IP:AUTO
LOCIPADD:217.001.001.001 REMIPADD:217.002.002.002
- Back-Up --------------------------------------------------------------
BRTY:US BNRTY:30 BTB:10 BAC:DOD
DDT:220 VDT:10 UDT:NOMAX
CDI:* CDO:01765432
CGI:* CGO:#
SDI:* SDO:#
SGI:ABILIS1-ABILIS2 SGO:ABILIS2-ABILIS1
SAVE EXECUTED
Tip
Interesting chapter: Section 52.14.3, “How to configure a voice tunnel with the “backup over ISDN”
option”.
Tip
It is avdisable to use ART ONLY with lines with the same speed. In fact, if ART is used with lines with
different speed, packets are sent with a maximum speed equal to that one of the slower line.
Warning
When double path is active the traffic is obviously duplicated: this could be very “dangerous” on pay per use
lines!
491
Draft Tunneling proprietary protocols Draft
The following example considers two Abilis: each one has two different Internet lines with static public IP addresses.
COMMAND EXECUTED
COMMAND EXECUTED
492
Draft Tunneling proprietary protocols Draft
COMMAND EXECUTED
COMMAND EXECUTED
Tip
The parameter PATH must be set ad the same value on both the CPX or the VPN will not work.
• OUT-IP2: second output IP resource (AUTO will send the packets to the default gateway specified in IP routing table; it's
also possible to specify the ID and the gateway of the outgoing IP resource).
• LOCIPADD2: second IP address that the local Abilis will use as “source address” for the path 2.
Configuration of other parameters of both Abilis must mirror each other; see Section 36.2.1, “Packet Voice over IP- Extended
Mode”.
COMMAND EXECUTED
493
Draft Tunneling proprietary protocols Draft
COMMAND EXECUTED
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES.
Tip
Activation of Link Check protocol is recommended (LC:YES): the parameter must be set at the same value
on both Abilis or the VPN will not work.
SAVE EXECUTED
494
Draft Tunneling proprietary protocols Draft
- IP Tunnel ------------------------------------------------------------
TLOG:NO MODE:EXT D-TOS:0-N V-TOS:0-D C-TOS:0-D
MPX:YES RS-BUF:10 D-TOUT:1000 V-TOUT:100 V-RED:NONE
PATH:DOUBLE LOCPORT:3101 REMPORT:3101 CR:NO CRKEY:DFT
OUT-IP:AUTO
LOCIPADD:217.001.001.001 REMIPADD:217.002.002.002
OUT-IP2:3 GW2:#
LOCIPADD2:080.080.080.080 REMIPADD2:081.081.081.081
SAVE EXECUTED
Tip
Interesting chapter: Section 52.14.4, “How to configure a voice tunnel with the “double-path” option”.
a res:ip-<id> subtype:<value>
id is simply the identification number and subtype is the kind of resource to be used. The following command shows
supported subtypes.
Ip resource subtypes:
495
Draft Tunneling proprietary protocols Draft
The following example considers two Abilis with a static public IP address each one.
COMMAND EXECUTED
COMMAND EXECUTED
496
Draft Tunneling proprietary protocols Draft
• LOCPORT: UDP port number of the local ABILIS (port used for the data exchange).
Tip
The above parameters must mirror each other (i.e. the value of LOCPORT on “Abilis 1” must be the same of
REMPORT on “Abilis 2” and vice versa; the same for LOCIPADD/REMIPADD).
COMMAND EXECUTED
497
Draft Tunneling proprietary protocols Draft
COMMAND EXECUTED
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES. Also LMPX will be changed from YES to EXT: it can be set
to YES only for data protocols LAPB and LINK-FR (this VPN is based on UDP protocol).
Tip
Activation of Link Check protocol is recommended (LC:YES): the parameter must be set at the same value
on both Abilis or the VPN will not work.
498
Draft Tunneling proprietary protocols Draft
Tip
Encryption of data packets has been activated (LCR:DATA) and the default Encryption Key has been used
(LCRKEY:DFT). Usage of encryption is useful to increase the security of data transmission.
Tip
Fragmentation has been activated (FRAG:FRF12 FRAGSIZE:800): it's recommended on VPN realized over
Internet lines.
SAVE EXECUTED
SAVE EXECUTED
499
Draft Tunneling proprietary protocols Draft
Tip
Interesting chapters:
Section 52.13.1, “How to configure a VPN tunnel where both Abilis have a static public IP address”;
Example: Abilis has a static public IP address and the other one has a dynamic public IP address:
COMMAND EXECUTED
500
Draft Tunneling proprietary protocols Draft
COMMAND EXECUTED
COMMAND EXECUTED
501
Draft Tunneling proprietary protocols Draft
COMMAND EXECUTED
Configuration of both Abilis must mirror each other. This the meaning of the “new” parameters:
• ID: on client side, is the identification IP address sent by the client to the server.
• CLI-ID: on server side, is the client identifier IP address. It can be also a “virtual value”, but it must set at the same value
of parameter ID on client side.
Tip
ID and CLI-ID can be also a “virtual values”, but they must set at the same value or the VPN will not
work!
• LOCPORT: UDP port number of the local Abilis (port used for the data exchange).
502
Draft Tunneling proprietary protocols Draft
• LOCPORT: UDP port number of the local Abilis (port used for the data exchange).
COMMAND EXECUTED
503
Draft Tunneling proprietary protocols Draft
CLI-ID:192.168.001.254
OUT-IP:AUTO
LOCIPADD:217.001.001.001 IP-FILTER:*
COMMAND EXECUTED
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES. Also LMPX will be changed from YES to EXT: it can be set
to YES only for data protocols LAPB and LINK-FR (this VPN is based on UDP protocol).
Tip
Activation of Link Check protocol is recommended (LC:YES): the parameter must be set at the same value
on both Abilis or the VPN will not work.
Tip
Encryption of data packets has been activated (LCR:DATA) and the default Encryption Key has been used
(LCRKEY:DFT). Usage of encryption is useful to increase the security of data transmission.
Tip
Fragmentation has been activated (FRAG:FRF12 FRAGSIZE:800): it's recommended on VPN realized over
Internet lines.
504
Draft Tunneling proprietary protocols Draft
SAVE EXECUTED
SAVE EXECUTED
505
Draft Tunneling proprietary protocols Draft
Tip
Interesting chapters:
Section 52.13.2, “How to configure a VPN tunnel where one Abilis has a dynamic public IP address or is
placed behind a router doing NAT/PAT”;
Example: two Abilis are placed in remote sides, each one has a with a static public IP address and a backup ISDN line:
COMMAND EXECUTED
506
Draft Tunneling proprietary protocols Draft
TRFA:NO
- Link -----------------------------------------------------------------
LLOG:DS LMPX:YES LC:YES LCOMP:NO LCR:NO
LT1:3000 LT3:9000 LN2:3 LCRKEY:DFT
- IP Tunnel ------------------------------------------------------------
TLOG:NO MODE:STD D-TOS:0-N V-TOS:0-D C-TOS:0-D
MPX:NO
LOCPORT:2105 REMPORT:2100 CR:NO CRKEY:DFT
OUT-IP:AUTO
LOCIPADD:R-ID (192.168.000.254) REMIPADD:#
- Back-Up --------------------------------------------------------------
BRTY:LIN BNRTY:0 BTB:3 BAC:DOD
DDT:220 VDT:10 UDT:NOMAX
CDI:* CDO:#
CGI:* CGO:#
SDI:* SDO:#
SGI:DISABLED SGO:#
COMMAND EXECUTED
IP configuration of both Abilis remains the same shown Section 36.3.1, “Abilis IP Tunnel over IP – Extended Mode”.
Consideration about ISDN Back-up configuration are the same reported here [488].
507
Draft Tunneling proprietary protocols Draft
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
508
Draft Tunneling proprietary protocols Draft
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES. Also LMPX will be changed from YES to EXT: it can be set
to YES only for data protocols LAPB and LINK-FR (this VPN is based on UDP protocol).
Tip
Activation of Link Check protocol is recommended (LC:YES): the parameter must be set at the same value
on both Abilis or the VPN will not work.
Tip
Encryption of data packets has been activated (LCR:DATA) and the default Encryption Key has been used
(LCRKEY:DFT). Usage of encryption is useful to increase the security of data transmission.
Tip
Fragmentation has been activated (FRAG:FRF12 FRAGSIZE:800): it's recommended on VPN realized over
Internet lines.
SAVE EXECUTED
509
Draft Tunneling proprietary protocols Draft
SAVE EXECUTED
510
Draft Tunneling proprietary protocols Draft
Tip
Interesting chapters:
Section 52.13.3, “How to configure a VPN tunnel with the “backup over ISDN” option”;
Tip
It is avdisable to use ART ONLY with lines with the same speed. In fact, if ART is used with lines with
different speed, packets are sent with a maximum speed equal to that one of the slower line.
Warning
When double path is active the traffic is obviously duplicated: this could be very “dangerous” on pay per use
lines!
Example: there are two Abilis. Each one has two different Internet lines with static public IP addresses.
COMMAND EXECUTED
511
Draft Tunneling proprietary protocols Draft
COMMAND EXECUTED
COMMAND EXECUTED
512
Draft Tunneling proprietary protocols Draft
OUTSPL:NO
INBUF:0 mru:1500 SRCV:NO
- TRFA section ---------------------------------------------------------
TRFA:NO
- Link -----------------------------------------------------------------
LLOG:DS LMPX:YES LC:YES LCOMP:NO LCR:NO
LT1:3000 LT3:9000 LN2:3 LCRKEY:DFT
- IP Tunnel ------------------------------------------------------------
TLOG:NO MODE:EXT D-TOS:0-N V-TOS:0-D C-TOS:0-D
MPX:NO RS-BUF:100 D-TOUT:1000 V-TOUT:100 V-RED:NONE
PATH:DOUBLE LOCPORT:2105 REMPORT:2100 CR:NO CRKEY:DFT
OUT-IP:AUTO
LOCIPADD:R-ID (192.168.000.254) REMIPADD:#
OUT-IP2:AUTO
LOCIPADD2:R-ID (192.168.000.254) REMIPADD2:#
COMMAND EXECUTED
Tip
The parameter PATH must be set ad the same value on both the CPX or the VPN will not work.
• OUT-IP2: second output IP resource (AUTO will send the packets to the default gateway specified in IP routing table; it's
also possible to specify the ID of the outgoing IP resource).
• LOCIPADD2: second IP address that the local Abilis will use as “source address” for the path 2.
Configuration of other parameters of both Abilis must mirror each other; see Section 36.3.1, “Abilis IP Tunnel over IP –
Extended Mode”.
513
Draft Tunneling proprietary protocols Draft
COMMAND EXECUTED
COMMAND EXECUTED
514
Draft Tunneling proprietary protocols Draft
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES. Also LMPX will be changed from YES to EXT: it can be set
to YES only for data protocols LAPB and LINK-FR (this VPN is based on UDP protocol).
Tip
Activation of Link Check protocol is recommended (LC:YES): the parameter must be set at the same value
on both Abilis or the VPN will not work.
Tip
Encryption of data packets has been activated (LCR:DATA) and the default Encryption Key has been used
(LCRKEY:DFT). Usage of encryption is useful to increase the security of data transmission.
Tip
Fragmentation has been activated (FRAG:FRF12 FRAGSIZE:800): it's recommended on VPN realized over
Internet lines.
SAVE EXECUTED
515
Draft Tunneling proprietary protocols Draft
SAVE EXECUTED
Tip
Interesting chapters:
Section 52.13.4, “How to configure a VPN tunnel with the “double path” option”;
516
Draft Tunneling proprietary protocols Draft
Global STATE Global current state [READY: the link is ready; DOWN: the link is down; ERR: software error].
P-Link STATE It reports the “P-Link” channel current state. P-Link stands for Permanent link and defines a permanent
connection toward the remote device.
S-Link STATE It reports the “S-Link” channel current state. S-Link stands for Switched link and defines a switched
connection toward the remote device. A switched connection is established only upon request.
517
Draft Tunneling proprietary protocols Draft
518
Draft Tunneling proprietary protocols Draft
d se pv-n path:m Shows the statistics of Packet Voice with id n about path number m[1,2] in extended mode.
d se ip-n path:m Shows the statistics of the Aipt resource with id n about path number m[1,2] in extended mode.
519
Draft Tunneling proprietary protocols Draft
V-NO-CRKEY | 0| 0|D-NO-CRKEY | 0| 0|
V-BAD-CIPH | 0| |D-BAD-CIPH | 0| |
------------------------------------------------------------------------
- IP Tunnel ------------------------------------------------------------
Tunnel payload
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 21550241| 25131358|FRM | 1430101| 1603487|
CHR-D | 0| 0|FRM-D | 0| 0|
CHR-V | 19841058| 23421755|FRM-V | 1145238| 1318538|
CHR-C | 1709183| 1709603|FRM-C | 284863| 284949|
------------------------------------------------------------------------
IP level counters (actual IP traffic)
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
IP-CHR | 52462968| 65112638|IP-FRM | 858383| 943384|
IP-CHR-D | 0| 0|IP-FRM-D | 0| 0|
IP-CHR-V | 42777621| 53714769|IP-FRM-V | 573520| 658435|
IP-CHR-C | 9685347| 11397869|IP-FRM-C | 284863| 284949|
------------------------------------------------------------------------
Errors
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
LONG-D | 0| 0|LOST-D | 0| |
LONG-V | 0| 0|LOST-V | 0| |
LONG-C | 0| 0|LOST-C | 0| |
BAD-SRC | 1| |NO-SERV | 0| |
NO-CRKEY | 0| 0|BAD-CIPH | 0| 0|
------------------------------------------------------------------------
Special counters for extended mode
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CLI-TOUT | 0| |CLI-REMAP | 0| |
V-CHR-NOPT | 58782024| 77481813|D-FRM-ENC | 0| 0|
V-CHR-OPT | 42777621| 54373204|V-FRM-ENC | 1145293| 1318538|
V-SAVED% | 27| 29|C-FRM-ENC | 284863| 284949|
V-FRM-OPT | 563888| 649165| | | |
-----------|--DATA IN--|-VOICE-IN--|-CHECK IN--|-----------------------|
MISSING | 0| 36| 0|
TOUT | 0| 9| 0|
NOBUF | 0| 0| 0|
OUT-SEQ | 0| 0| 0|
REORDERED | 0| 0| 0|
BAD-FORM | 0| 0| |
RESYNC | 0| 55| 0|
------------------------------------------------------------------------
-- Time arrival variation of voice frames after reordering (msec.) -----
------------------------------------------------------------------------
0- 20 | 1125539 ( 98% ) | 151-200 | 67 ( 0% ) |
21- 50 | 18492 ( 1% ) | 201-300 | 55 ( 0% ) |
51-100 | 794 ( 0% ) | 301-600 | 34 ( 0% ) |
101-150 | 171 ( 0% ) | 601-xxx | 2 ( 0% ) |
------------------------------------------------------------------------
520
Draft Tunneling proprietary protocols Draft
SHORT | 0| |LOST-LOOP | | 0|
LOST-BUF | 0| 1|LOST-OTH | | 0|
B-VER | 0| |B-ICMP | 0| |
B-LEN | 0| |NO-ROUTE | 0| |
B-FCS | 0| |UNK-PROT | 0| |
TTL-EXP | | 0|LOST-INC-DG| 207| |
LOST-ACC | 0| |B-ENC-HDR | 0| |
SLARP-FRM | 0| 0|SLARP-CHAR | 0| 0|
SLARP-KEEP | 0| 0|SLARP-DOWN | 0| |
IPP-DOWN | 0| |SP-LIM-OVFL| | 0|
------------------------------------------------------------------------
- Link -----------------------------------------------------------------
PLINK-DN1:0 PLINK-DN2:18
SLINK-ST1:0 SLINK-ST2:0 TIME-CUR-CALL:0
RTY:0 DDT:0 VDT:0 USRTY:0 TDEL:0 TREM:0
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FAIL-CALL | 0| 118|SUCC-CALL | 0| 451|
TIME-CALL | 0| 312251| | | |
V-NO-CRKEY | 0| 0|D-NO-CRKEY | 0| 0|
V-BAD-CIPH | 0| |D-BAD-CIPH | 0| |
------------------------------------------------------------------------
- IP Tunnel ------------------------------------------------------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 619979878| 2986895451|FRM | 11388167| 13914840|
IP-CHR | 902523376| 3345300110|IP-FRM | 8335792| 10811999|
BAD-SRC | 0| |NO-SERV | 0| |
NO-CRKEY | 0| 0|BAD-CIPH | 0| 0|
CLI-TOUT | 0| |CLI-REMAP | 0| |
-----------|--DATA IN--|-VOICE-IN--|-CHECK IN--|-----------------------|
MISSING | 1938| 1808| 0|
NOBUF | 0| 0| 0|
------------------------------------------------------------------------
-- Time arrival variation of voice frames after reordering (msec.) -----
------------------------------------------------------------------------
0- 20 | 6107220 ( 99% ) | 151-200 | 0 ( 0% ) |
21- 50 | 7160 ( 0% ) | 201-300 | 0 ( 0% ) |
51-100 | 64 ( 0% ) | 301-600 | 0 ( 0% ) |
101-150 | 0 ( 0% ) | 601-xxx | 0 ( 0% ) |
------------------------------------------------------------------------
521
Draft Tunneling proprietary protocols Draft
------------------------------------------------------------------------
- Link -----------------------------------------------------------------
PLINK-DN1:0 PLINK-DN2:18
SLINK-ST1:0 SLINK-ST2:0 TIME-CUR-CALL:0
RTY:0 DDT:0 VDT:0 USRTY:0 TDEL:0 TREM:0
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FAIL-CALL | 0| 118|SUCC-CALL | 0| 451|
TIME-CALL | 0| 312251| | | |
V-NO-CRKEY | 0| 0|D-NO-CRKEY | 0| 0|
V-BAD-CIPH | 0| |D-BAD-CIPH | 0| |
------------------------------------------------------------------------
- IP Tunnel ------------------------------------------------------------
Tunnel payload
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 619979938| 2986895511|FRM | 11388177| 13914850|
CHR-D | 503428075| 2869005065|FRM-D | 4137409| 6406663|
CHR-V | 109740277| 109806385|FRM-V | 6115512| 6118416|
CHR-C | 6811586| 8084061|FRM-C | 1135256| 1389771|
------------------------------------------------------------------------
IP level counters (actual IP traffic)
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
IP-CHR | 902523716| 3345300450|IP-FRM | 8335802| 10812009|
IP-CHR-D | 631689372| 3067611618|IP-FRM-D | 4137426| 6406663|
IP-CHR-V | 232235590| 230691183|IP-FRM-V | 3063120| 3015575|
IP-CHR-C | 38598754| 46997649|IP-FRM-C | 1135256| 1389771|
------------------------------------------------------------------------
Errors
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
LONG-D | 0| 0|LOST-D | 0| |
LONG-V | 0| 0|LOST-V | 0| |
LONG-C | 0| 0|LOST-C | 0| |
BAD-SRC | 0| |NO-SERV | 0| |
NO-CRKEY | 0| 0|BAD-CIPH | 0| 0|
------------------------------------------------------------------------
Special counters for extended mode
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CLI-TOUT | 0| |CLI-REMAP | 0| |
V-CHR-NOPT | 317674319| 317832529|D-FRM-ENC | 4137426| 6406663|
V-CHR-OPT | 232235590| 230691183|V-FRM-ENC | 6115639| 6118416|
V-SAVED% | 26| 27|C-FRM-ENC | 1135256| 1389771|
V-FRM-OPT | 2901720| 2985432| | | |
-----------|--DATA IN--|-VOICE-IN--|-CHECK IN--|-----------------------|
MISSING | 1938| 1808| 0|
TOUT | 1888| 968| 0|
NOBUF | 0| 0| 0|
OUT-SEQ | 0| 0| 0|
REORDERED | 0| 0| 0|
BAD-FORM | 0| 0| |
RESYNC | 17| 127| 0|
------------------------------------------------------------------------
-- Time arrival variation of voice frames after reordering (msec.) -----
------------------------------------------------------------------------
0- 20 | 6107220 ( 99% ) | 151-200 | 0 ( 0% ) |
21- 50 | 7160 ( 0% ) | 201-300 | 0 ( 0% ) |
51-100 | 64 ( 0% ) | 301-600 | 0 ( 0% ) |
101-150 | 0 ( 0% ) | 601-xxx | 0 ( 0% ) |
------------------------------------------------------------------------
522
Draft Tunneling proprietary protocols Draft
523
Draft Tunneling proprietary protocols Draft
524
Draft Tunneling proprietary protocols Draft
LONG-C | 0| 0|LOST-C | 0| |
BAD-SRC | 0| |NO-SERV | 0| |
NO-CRKEY | 0| 0|BAD-CIPH | 0| 0|
------------------------------------------------------------------------
Special counters for extended mode
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CLI-TOUT | 0| |CLI-REMAP | 0| |
V-CHR-NOPT | 0| 0|D-FRM-ENC | 0| 0|
V-CHR-OPT | 0| 0|V-FRM-ENC | 0| 0|
V-SAVED% | 0| 0|C-FRM-ENC | 0| 8|
V-FRM-OPT | 0| 0| | | |
V-RED-FM | | 0|V-RED-VOICE| | 0|
-----------|--DATA IN--|-VOICE-IN--|-CHECK IN--|-----------------------|
NOBUF | 0| 0| 0|
OUT-SEQ | 0| 0| 0|
DUPLICATED | 0| 0| 0|
BAD-FORM | 0| 0| |
RESYNC | 0| 0| 0|
------------------------------------------------------------------------
If this counter runs over, it means “N2” Link-Check “probes” have been sent without receiving any acknowledge, the P-Link
or S-Link channel are declared out of service.
In the case it occurs on the P-Link channel, the communication will be activated on the S-Link channel, providing that it is
properly configured.
In the case it occurs with the S-Link channel, the connection is closed with the code 80 90 80 8B; if it happens three times
consecutively the port will be placed in the “STOPPED2” state, without being able to receive or make further calls.
To recover from the error it is necessary to execute the init res: command. If alarm detection was enabled, i.e. if LOG is set
with the “A” option, it is also possible to recover from the error with the alarm reset command or using the analogous menu
available on the LCD display of the front panel. If the communication cannot go on any longer either on P-Link or S-Link,
the upper level driver will be advised of the error and point out a “Level 1 Down”.
525
Draft Draft
Table of Contents
37.1. IPSEC - Internet Protocol SECurity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526
37.2. IPSEC Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
37.2.1. Activating the IPSEC resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
37.2.2. IPSEC resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
37.2.3. IPSEC tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
37.3. IKE Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
37.3.1. Activating the IKE resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
37.3.2. IKE resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530
37.3.3. IKE tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
37.4. IPSEC and IKE diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
37.4.1. IPSEC diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
37.4.2. Statistics of the IPSEC resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
37.4.3. IKE diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
37.4.4. Statistics of the IKE resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
37.5. Example of IPSEC configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
37.5.1. Activating IPSEC parameter on the desired IP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
37.5.2. Configuration of the Host connections table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
37.5.3. Configuration of the Client connections table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
37.5.4. Configuration of the Pre-shard Key table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
37.5.5. Outgoing IP resource for IPSEC packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
37.6. Appendix - IPSEC protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
It uses a Diffie-Hellman key echange to set up a shared session secret from wich cryptographic keys are derived; a pre-shared
key is used to mutually authenticate the communicating parties.
• IPSEC resource;
• IKE resource;
• IKE tables (Host connections table, Client connections table, Pre-Shared key table);
Tip
Refer to chapter Section 37.6, “Appendix - IPSEC protocol” to have more information about IPSEC
protocol.
526
Draft IPSEC - Internet Protocol SECurity Draft
The IPSEC resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the IPSEC active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
Warning
To activate IPSEC reource 16 MB of free RAM are requested. Verify it with the command d i; for example:
[17:39:21] ABILIS_CPX:_d i
RES:IpSec ---------------------------------------------------------------------
Run DESCR:IP_Security_Protocol
LOG:DS ACT:YES MODE:IKE mxps:2048 IN-CHK:YES TTL:COPY
ECN:FORBIDDEN DF:CLEAR TCP-MSS-CLAMP:YES TCP-MSS-VALUE:1334
527
Draft IPSEC - Internet Protocol SECurity Draft
TTL Specifies the Time-To-Live field for the outer IP header in tunnel mode [COPY: TTL field will be
copied from the inner IP header to the tunnel one; 1..255].
ECN Specifies ECN (Explicit Congestion Notification) consideration mode on IPSEC tunnels in tunnel
mode. ECN is an experimental addition to the IP architecture that provides notification of onset of
congestion to delay- or loss-sensitive applications [ALLOWED; FORBIDDEN; NOCARE].
DF DF (Don't Fragment) bit manipulation in tunnel mode during encapsulation [CLEAR: clear DF bit on
outer IP header; SET: set DF bit on outer IP header; COPY: copy DF bit from inner to outer IP header].
TCP-MSS-CLAMP Activates/deactivates the TCP MSS (Maximum Segment Size) Clamping procedure used to control the
size of TCP segments.
The command that allows the configuration of the resource to be modified has the following syntax:
s p ipsec par:val...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:ipsec; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
The term “security association bundle” or “SA bundle” is applied to a sequence of SAs through which traffic must be
processed to satisfy a security policy. The order of the sequence is defined by the policy.
The Security Associations table can store up to 256 entries, indexed starting from 0 up to 255.
Changes made in the table are activated by executing the command init res:ipsec.
-------------------------------------------------------------------------------
SA: NAME: SPI: SRC-IP: PROT: AUTH: CIPHER:
BUNDLE: TUNNEL: IPRES: SIDE: DST-IP: AUTHKEY: ENCKEY:
-------------------------------------------------------------------------------
*** NO IPSEC SECURITY ASSOCIATIONS DEFINED ***
528
Draft IPSEC - Internet Protocol SECurity Draft
AUTH authentication method for the AH or ESP protocols [NONE, MD5, SHA].
AUTHKEY Authentication key for the AH or ESP protocols (only for AUTH not equal to NONE). ASCII printable string. For
MD5 authentication key: exactly 16 characters are required. For SHA authentication key: exactly 20 characters
are required.
CIPHER Encryption algorithm for the ESP protocol [NONE, DES, 3DES, IDEA, CAST, BLOWFISH, AES128, AES192,
AES256].
ENCKEY Encryption key for the ESP protocol (only for PROT:ESP and CIPHER not equal to NONE). For DES encryption
key: exactly 8 characters are required. For IDEA, CAST, BLOWFISH, AES128 encryption key: exactly 16
characters. For 3DES, AES192 encryption key: exactly 24 characters are required. For AES256 encryption key:
exactly 32 characters are required.
The Policy table can store up to 256 entries, indexed starting from 0 up to 255.
Changes made in the table are activated by executing the command init res:ipsec.
-------------------------------------------------------------------------------
POLICY: NAME: NET-SRC: PORT-SRC:
DIR: BUNDLE: RULE: NET-DST: PORT-DST:
-------------------------------------------------------------------------------
*** NO IPSEC SECURITY POLICIES DEFINED ***
DIR Direction for the policy record [OUT: outbound direction (used as packet filter); IN: inbound direction (used
for inbound policy check)].
RULE Rule for the policy record [BYPASS: packet will be bypassed by IPSEC (outbound direction only); DROP:
packet will be dropped by IPSEC (outbound direction only); IPSEC: packet will be processed by IPSEC].
529
Draft IPSEC - Internet Protocol SECurity Draft
The IKE resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the IKE active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
RES:Ike -----------------------------------------------------------------------
Run DESCR:Internet_Keys_Exchange_Protocol
LOG:DS ACT:YES mxps:2048 max-hosts:16
TOS:0-N NRTY:3 TB:10
NATT:AUTO NATT-N-IKE:YES NATT-PF:YES NATT-KA:20
MODE-CFG-DNS:#
WDIR:C:\APP\IKE\
ASN1-DN-SYS:
-' p-t', i.e. PRECEDENCE and TOS values, where 'p' can be [0..7] and 't' can be [N=None, D=Min.
Delay, T=Max. Throughput, R=Max. Reliability, C=Min. Monetary Cost]
- 'bbbbbb', i.e. DS value bit by bit, where 'b' can be [0, 1].
TB Retransmission delay.
WDIR Working directory; it cannot be empty (physical full path in DOS notation).
NATT NAT traversal activation. If NAT traversal is enabled, IPsec AH algorithm must be disabled.
530
Draft IPSEC - Internet Protocol SECurity Draft
MODE-CFG-DNS IP address of DNS server for the MODE-CFG mode [#, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x].
The command that allows the configuration of the resource to be modified has the following syntax:
s p ike par:val...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init res:ike;
while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required
(i.e. with warm start command).
• the Host connections table defines the mechanisms to establish the Security Association and the encryption algorithms;
• the Client connections table defines the characteristics and the security parameters for a single IPSec VPN;
• the Preshared Keys Table contains the secret key for mutual authentication.
Changes made in the table are activated by executing the command init res:ike.
-------------------------------------------------------------------------------
531
Draft IPSEC - Internet Protocol SECurity Draft
HASH: MD5
DH: MODP1024
CIPHER: 3DES
SIDE: INSIDE
XAUTH: NO
XAUTH-USER:
XAUTH-PWD:
MODE-CFG: NO
KEYING-TRIES: 3
LIFE-TIME: 3600
DPD-ENABLE: NO
DPD-DELAY: 30
DPD-TIMEOUT: 120
DPD-ACTION: STOP
ID-TYPE: IP
IP: 080.080.080.080
PEER-ID-TYPE: IP
PEER-IP: 192.168.101.001
-------------------------------------------------------------------------------
CIPHER Encryption algorithm for the ISAKMP/OAKLEY negotiation [DES, 3DES, IDEA, CAST, BLOWFISH,
AES128, AES192, AES256].
SIDE NAT side assigned to the tunnel [NONE, AUTO, INSIDE, OUTSIDE, VPN, DMZ].
MODE-CFG Type of Mode config [NO, SRV-PUSH, SRV-REQUEST] (for iphone compatibility).
KEYING-TRIES Specifies how many times IKE should try to negotiate an SA, either for the first time or for rekeying
[INFINITE, 1..100].
LIFE-TIME Specifies how long IKE will propose that an ISAKMP SA be allowed to live. The range is [600..86400]
sec.
DPD-ENABLE Enables/disables DPD (Dead peer detection) procedure support (the function must necessarily supported
by the IPSec client) [NO, YES]. DPD is a keepalive mechanism that enables the router to detect when the
connection between the router and a remote IPSec peer has been lost. DPD enables the router to reclaim
resources and to optionally redirect traffic to an alternate failover destination. If DPD is not enabled, the
traffic continues to be sent to the unavailable destination.
DPD-DELAY Time interval between DPD checks. It must be lower than DPD-TIMEOUT.
DPD-TIMEOUT Time interval of missing DPD replies after which peer is declared dead. It must be greater then DPD-
DELAY.
ID-TYPE Type of local host for the connection [AUTO: local ID will be set automatically in run-time as local
IP address; IP: local ID is local IP address; FQDN: local ID is fully-qualified domain name (FQDN);
USER-FQDN: local ID is fully-qualified user domain name (FQDN)].
532
Draft IPSEC - Internet Protocol SECurity Draft
Note
The FQDN and PEER-FQDN parameters are used as password and they do not have necessarily be referred
to existing domains.
Changes made in the table are activated by executing the command init res:ike.
533
Draft IPSEC - Internet Protocol SECurity Draft
PASSIVE Mode of negotiation. [NO: negotiation can be started as initiator and as responder; YES: negotiation can
be started as responder only; it is useful for a server]. If related host LOC-IP is set to an “IP resource”,
PASSIVE must be forced to NO; if related host REM-IP is set to *, PASSIVE must be forced to YES,
even if LOC-IP is set to an “IP resource” .
PERMANENT Mode of negotiation [NO: after driver starting or after init command (re-)negotiation will not be started
automatically as initiator; YES: after driver starting or after init command (re-)negotiation of this
connection will be started automatically as initiator].
TUNNEL Mode of IPSEC negotiation [NO: Transport mode, YES: Tunnel mode].
ESP-CIPHER Encryption algorithm for IPSEC ESP protocol [NONE, DES, 3DES, IDEA, CAST, BLOWFISH, AES128,
AES192, AES256].
ESP-AUTH Authentication algorithm for IPSEC ESP protocol [NONE, MD5, SHA].
LIFE-TIME Specifies how long IKE will propose that an IPSEC SA be allowed to live. The range is [600..86400]
sec.
PFS Enables/disables Perfect Forward Secrecy. PFS provides additional security by means of a Diffie-
Hellman shared secret value. With PFS, if one key is compromised, previous and subsequent keys are
secure because they are not derived from previous keys.
Note
More clients can be referred to a same IKE Host.
Changes made in the table are activated by executing the command init res:ike.
-------------------------------------------------------------------------------
PSK: KEY: ID-TYPE: IP: FQDN:
-------------------------------------------------------------------------------
1 ******** ANONYMOUS
IP Remote IP address.
534
Draft IPSEC - Internet Protocol SECurity Draft
d d ipsec / d de ipsec Shows the IPSEC resource diagnostics (the state of the resource, the working mode,
the inbound policy check flag, the inbound security policies, etc..) and the IPSEC
Security Associations diagnostics (the number of bundle of Security Association
record, the state of Security Association record, etc..).
RES:IpSec ---------------------------------------------------------------------
IP_Security_Protocol
STATE:ACTIVE MODE:IKE IN-CHK:YES
POLICY-IN :1 SA-IN :1 SA-BND-IN :1
POLICY-OUT:1 SA-OUT:1 SA-BND-OUT:1
- Security Associations diagnostics: -----------------------------------
SA Bundle State SPI SrcIp Auth SoftTime
Prot Tunnel DstIp Cipher HardTime
------------------------------------------------------------------------
0 0 MATURE C4DCB36E 192.168.006.002 MD5 INFINITE
ESP YES 192.168.006.001 3DES INFINITE
------------------------------------------------------------------------
1 1 MATURE 1969FC22 192.168.006.001 MD5 INFINITE
ESP YES 192.168.006.002 3DES INFINITE
------------------------------------------------------------------------
d s ipsec Shows the IPSEC resource statistics such as the total number of IP frames received/sent by IPSEC resource
from/to IP, the total number of characters received/sent by IPSEC port from/to IP, the total number of
bypassed incoming/outgoing IKE packets, etc..
d se ipsec Shows the IPSEC resource statistics and the IPsec Security Associations statistics (the total number of
incoming/outgoing characters processed by Security Association, the total number of incoming/outgoing IP
frames processed by Security Association, etc..).
RES:IpSec ---------------------------------------------------------------------
IP_Security_Protocol
--- Cleared 0 days 01:53:11 ago, on 05/12/2010 at 11:18:42 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FRM | 1922| 4729|CHR | 70005| 455647|
FRM-OK | 9| 0|CHR-OK | 1912| 0|
FRM-DROP | 0| 0|CHR-DROP | 0| 0|
FRM-BYPASS | 1913| 4729|CHR-BYPASS | 68093| 455647|
------------------------------------------------------------------------
FRM-IKE | 40| 40|NATT-KA | 0| 0|
NO-POLICY | 0| 4707|LONG | 0| 0|
BAD-SA | 0| 0|NO-SA | 0| 0|
BAD-FMT | 0| 0|AUTH-FAIL | 0| |
BAD-CBLK | 0| |BAD-CHK | 0| |
REP-CHK | 0| 0|BAD-ECN | 0| |
------------------------------------------------------------------------
RES:IpSec ---------------------------------------------------------------------
535
Draft IPSEC - Internet Protocol SECurity Draft
IP_Security_Protocol
--- Cleared 0 days 01:53:43 ago, on 05/12/2010 at 11:18:42 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FRM | 1934| 4760|CHR | 70648| 459620|
FRM-OK | 10| 0|CHR-OK | 2192| 0|
FRM-DROP | 0| 0|CHR-DROP | 0| 0|
FRM-BYPASS | 1924| 4760|CHR-BYPASS | 68456| 459620|
------------------------------------------------------------------------
FRM-IKE | 40| 40|NATT-KA | 0| 0|
NO-POLICY | 0| 4738|LONG | 0| 0|
BAD-SA | 0| 0|NO-SA | 0| 0|
BAD-FMT | 0| 0|AUTH-FAIL | 0| |
BAD-CBLK | 0| |BAD-CHK | 0| |
REP-CHK | 0| 0|BAD-ECN | 0| |
------------------------------------------------------------------------
- Security Associations statistics: ------------------------------------
SA:3 CHR:0 AUTH-FAIL:0 BAD-CBLK:0
FRM:0 REPLAY-CHK:0 BAD-ECN:0
------------------------------------------------------------------------
SA:2 CHR:560 AUTH-FAIL:0 BAD-CBLK:0
FRM:2 REPLAY-CHK:0 BAD-ECN:0
------------------------------------------------------------------------
d d ike / d de ike Shows diagnostic information such as the current state of the IKE resource and the
IPSEC resource, the current number of ISAKMP and IPSEC Security Associations, the
local and remote IP address-port, etc...
RES:Ike -----------------------------------------------------------------------
Internet_Keys_Exchange_Protocol
IKE-STATE:ACTIVE IPSEC-STATE:ACTIVE
CUR-MAX-HOSTS:16 CUR-HOSTS:2
ISAKMP-SA:0 ISAKMP-SA-EST:0 IPSEC-SA:0 IPSEC-SA-EST:0
- Security Associations diagnostics: -----------------------------------
SerialNo Name Type Side
LocIp-LocPort LocNet/LocMask State ReplaceTime
RemIp-RemPort RemNet/RemMask Pending ExpiryTime
------------------------------------------------------------------------
1 IPsec RESPONDER
192.168.006.001/500 192.168.006.001/32 QUICK-R2 3422
192.168.006.002/500 192.168.006.002/32 0 3542
------------------------------------------------------------------------
2 ISAKMP RESPONDER
192.168.006.001/500 000.000.000.000/00 MAIN-R3 3420
192.168.006.002/500 000.000.000.000/00 0 3540
------------------------------------------------------------------------
d s ike / d se ike Shows statistic information such as the total number of characters received/sent by IKE
resource from/to UDP, the total number of UDP datagrams received/sent by IKE port
from/to UDP, the total number of lost incoming UDP datagrams because buffer is full,
etc..
536
Draft IPSEC - Internet Protocol SECurity Draft
RES:Ike -----------------------------------------------------------------------
Internet_Keys_Exchange_Protocol
--- Cleared 7 days 05:47:11 ago, on 22/12/2007 at 16:36:57 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 13472| 12716|LONG | 0| 0|
FRM | 87| 89|BAD-FMT | 0| |
FRM-LOST | 0| |DUPLICATED | 0| |
------------------------------------------------------------------------
-----------|--ISAKMP---|---IPSEC---|
SA-R | 14| 19|
SA-I | 0| 0|
SA-EST-R | 14| 19|
SA-EST-I | 0| 0|
AUTH-FAIL | 0| 0|
NO-PROP | 0| 0|
------------------------------------------------------------------------
Caution
The IPSEC connection works ONLY if the LAN, where the PC client is connected to, is different from the
LAN of Abilis (e.g. in the previous case if the PC client IP address is belonging to the 192.168.1.0/24 the
IPSEC connection doesn't work!).
Tip
Interesting chapters:
537
Draft IPSEC - Internet Protocol SECurity Draft
Section 52.11.2, “How to configure a RAS using IPSEC VPN server with iPHONE”.
COMMAND EXECUTED
Caution
To activate the changes made, execute the initialization command init res:ip-2.
COMMAND EXECUTED
538
Draft IPSEC - Internet Protocol SECurity Draft
• Fully Qualified Name identification for the local and remote side.
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Caution
To activate the changes made, execute the initialization command init res:ike.
539
Draft IPSEC - Internet Protocol SECurity Draft
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Caution
To activate the changes made, execute the initialization command init res:ike.
COMMAND EXECUTED
-------------------------------------------------------------------------------
PSK: KEY: ID-TYPE: IP: FQDN:
540
Draft IPSEC - Internet Protocol SECurity Draft
-------------------------------------------------------------------------------
0 ******** ANONYMOUS
Caution
To activate the changes made, execute the initialization command init res:ike.
Add a static route for remote network (in our situation only for host 192.168.200.1/32) towards IP-2 resource (specifying
eventually the gateway).
COMMAND EXECUTED
• access control;
• connectionless integrity;
• data origin authentication;
• protection against replays;
• confidentiality (encryption);
• limited traffic flow confidentiality.
These services are provided at the network layer (layer 3 of the OSI model), offering protection for IP and/or upper layer
protocols. IPsec also includes protocols for cryptographic key estabilishment such as Internet Key Exchange2 (IKE).
IPsec uses two protocols that can be applied either separately or together to provide a desired set of security services:
• Authentication Header (AH): protects the IP packet header from third party interference and spoofing, by computing a
cryptographic checksum and hashing of the IP packet header fields with a secure hashing function. This is then followed
by an additional header that contains the hash, to allow the information in the packet to be authenticated.
• Encapsulating Security Payload (ESP): protects the IP packet data from third party interference, by encrypting the
contents using symmetric cryptography algorithms.
All implementations of AH and ESP must support the concept of a Security Association (SA). SA is simply the bundle of
algorithms and parameters (such as keys) that is being used to encrypt a particular flow. Two types of SAs are defined:
• Transport mode: only the payload of the original IP packet is encrypted because IPsec header appears immediately
after the IP header and before higher layer protocols (e.g., TCP or UDP). Transport mode is used for host-to-host
communications.
1
http://en.wikipedia.org/wiki/IPsec
2
http://en.wikipedia.org/wiki/IKE
541
Draft IPSEC - Internet Protocol SECurity Draft
• Tunnel mode: the entire IP packet is encrypted and it must be encapsulated into a new IP packet for routing to work.
Tunnel mode is used for network-to-network communications (secure tunnels between routers) or host-to-network and
host-to-host communications over the Internet.
542
Draft Draft
Table of Contents
38.1. PoEAC resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
38.1.1. Activating the POEAC resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
38.1.2. POEAC resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
38.2. PPP Users table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
38.3. POEAC diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
38.3.1. POEAC diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
38.3.2. POEAC statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
38.4. Example of POEAC configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
38.4.1. Configuring the POEAC resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
38.4.2. Configuring the IPRTR resource for DNS distribution to the clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
38.4.3. Activating and configuring the IP over PPP resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
38.4.4. Activating and configuring the PPP users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
38.5. Appendix - Point to Point protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
COMMAND EXECUTED
Caution
After adding the POEAC active, you must restart the Abilis to make the resource running (use the command
warm start to reboot the Abilis).
COMMAND EXECUTED
543
Draft POEAC - PPP Over Ethernet Draft
Access Concentrator
RES:PoeAc-1 -------------------------------------------------------------------
Run DESCR:
LOG:DS ACT:YES ethres:NONE max-ipres:12 ipres-rxbuf:2
ACNAME: max-links:0 links-rxbuf:50
EMPTY-EQ-ANY:NO ALL-SERVICES-OFFER:NO
TCP-MSS-CLAMP:YES TCP-MSS-VALUE:1414
- Links ----------------------------------------------------------------
*** NO LINKs CONFIGURED ***
ethres Lower Eth100 resource; the value NONE makes the POEAC unusable.
max-ipres Sets the number of PPPoE sessions the module can support. There can't be more than this
amount of external sessions connecting at once.
ipres-rxbuf Sets the number of PPPoE packets received from client a module can hold while sending other
packets to remote PPP.
ACNAME Access Concentrator name; the name of the Access Concentrator is sent along with responses
to hosts. This parameter can be left blank in case there is only one AC in the network for each
service-name requested.
EMPTY-EQ-ANY Select whether the EMPTY service specified in PADI and PADR has to be considered a
univocal service (more secure) or ANY service.
ALL-SERVICES-OFFER Select whether PADO will contain only the requested service (more secure) or the list of all
other available services too (less secure).
TCP-MSS-CLAMP Forces POEAC to change value of Maximum Segment Size in all TCP packets to one equal or
lower than set with TCP-MSS-VALUE option to avoid certain problems with PPP over Ethernet
“black hole”. Also can be used to reduce link latency at the cost of some bandwidth loss.
TCP-MSS-VALUE Specifies maximal allowed value for TCP Maximum Segment Size option. This option is only
visible if MSS clamping is allowed via TCP-MSS-CLAMP parameter.
The following command allows the administrator to change the configuration of the resource:
s p poeac-n parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:poeac; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
• Users with static IP: the parameter PPP-RES of the user must be set to the value of the correspondent IP resource.
544
Draft POEAC - PPP Over Ethernet Draft
Access Concentrator
• Users with dynamic IP: the parameter PPP-RES is not set to a specific IP resource, but to a “list of IP resources”.
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
LIST:PPP_list - CR
List_of_PPP_Resources
Ip-100 Ip-101 Ip-102
COMMAND EXECUTED
545
Draft POEAC - PPP Over Ethernet Draft
Access Concentrator
d d poeac / d de poeac Shows diagnostic information of the POEAC resource (the status of the resource, the
number of current sessions, the number of maximum sessions available, etc..) and the
diagnostics of the POEAC sessions (the status of the session, the remote MAC address,
the time time since session was connected., etc..).
RES:PoeAc-1 -------------------------------------------------------------------
STATE:READY CUR-IPRES:0 MAX-IPRES:12 CUR-LINKS:0 MAX-LINKS:0
------------------------------------------------------------------------
-- Session diagnostics -------------------------------------------------
SESNUM: RESOURCE: STATE: CLI-MAC: SES-ID: CONN-TIME:
TYPE: LINK: SERVICE-NAME:
------------------------------------------------------------------------
001 Ip-103 DISCONNECTED 00-13-D4-A1-4B-34 000A 0
IpRes user_3
------------------------------------------------------------------------
002 DISCONNECTED 00-00-00-00-00-00 0000 0
IpRes
------------------------------------------------------------------------
003 DISCONNECTED 00-00-00-00-00-00 0000 0
IpRes
------------------------------------------------------------------------
546
Draft POEAC - PPP Over Ethernet Draft
Access Concentrator
d s poeac Shows the statistics of the POEAC resource such as the number of successful connection establishments
with this Access Concentrator, the total number of attempts a connection was tried but failed, the total data
bytes received/sent, the total system bytes received/sent, etc..)
d se poeac Shows the statistics of the POEAC resource and the statistics of each session.
RES:PoeAc-1 -------------------------------------------------------------------
--- Cleared 1 days 04:15:20 ago, on 29/12/2007 at 13:39:44 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SUCC-CALL | 10| 0|FAIL-CALL | 0| 0|
CHR-PPP | 18690834| 506607701|CHR-SYS | 2064| 1896|
PCK-PPP | 207524| 372641|PCK-SYS | 32| 32|
LOST-PPP | 0| |LOST-SYS | 0| |
DROPPED-PPP| 0| |DROPPED-SYS| 0| |
------------------------------------------------------------------------
RES:PoeAc-1 -------------------------------------------------------------------
--- Cleared 1 days 04:15:25 ago, on 29/12/2007 at 13:39:44 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SUCC-CALL | 10| 0|FAIL-CALL | 0| 0|
CHR-PPP | 18690834| 506607701|CHR-SYS | 2064| 1896|
PCK-PPP | 207524| 372641|PCK-SYS | 32| 32|
LOST-PPP | 0| |LOST-SYS | 0| |
DROPPED-PPP| 0| |DROPPED-SYS| 0| |
------------------------------------------------------------------------
-- Session statistics --------------------------------------------------
SESNUM:001 TYPE:IpRes RESOURCE:Ip-103
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
547
Draft POEAC - PPP Over Ethernet Draft
Access Concentrator
548
Draft POEAC - PPP Over Ethernet Draft
Access Concentrator
Tip
Interesting chapter: Section 52.11.3, “How to configure a RAS using PPPoE connections with an Ethernet/
WiFi network”.
COMMAND EXECUTED
549
Draft POEAC - PPP Over Ethernet Draft
Access Concentrator
COMMAND EXECUTED
COMMAND EXECUTED
Caution
To set act the changes made, a save conf and an Abilis restart are needed (i.e. with warm start command).
550
Draft POEAC - PPP Over Ethernet Draft
Access Concentrator
TCP-MSS-CLAMP It decides whether to perform TCP MSS clamping; if set, forces PPP to change value of Maximum
Segment Size in all TCP packets to one equal or lower than set with TCP-MSS-VALUE option to avoid
certain problems with PPP over Ethernet “black hole”. Also can be used to reduce link latency at the
cost of some bandwidth loss.
DNS It estabilishes the DNS addresses negotiation [NO: no DNS address negotiation is performed;
PROVIDE: PPP can provide DNS addresses to a remote host; RETRIEVE: PPP requests DNS
addresses from a remote host].
SERVICENAME PPP over Ethernet Service name: name under which this link can be requested from the client. If the
client specifies a certain ServiceName, Server answers only if it has link with tha exactly name. If
Client specifies no name, it means any line is acceptable.
According to previous example, configure the IP over PPP resources with the following features:
COMMAND EXECUTED
COMMAND EXECUTED
551
Draft POEAC - PPP Over Ethernet Draft
Access Concentrator
REPEAT:0
Caution
To set act the changes made, use init res:ip-101 command followed by init ipr and save the configuration
with save conf command to make the changes permanent.
Repeat the same operations for each user by changing the number of the IP resource (i.e. IP-102, IP-103…).
COMMAND EXECUTED
The connection to the Access Concentrator can be done by using standard Windows PPPoE client or common routers that
support this protocol.
The PPP over Ethernet2 (PPPoE) protocol allows hosts inside an Ethernet-based network to access external hosts via PPP
through the bridge host (Access Concentrator). It is most often used to access an xDSL line from inside the network, the DSL
or cable modem playing the role of the AC.
Thus, for successful connection two physical parts are required: client PPPoE module (on every host wishing to use PPPoE)
and one or more Access Concentrators. They are presented in a CPX by two modules: POECLI for client part, and POEAC as
a server part, described in this chapter.
1
http://en.wikipedia.org/wiki/Point-to-Point_Protocol
2
http://en.wikipedia.org/wiki/Pppoe
552
Draft POEAC - PPP Over Ethernet Draft
Access Concentrator
PPPoE Access Concentrators (AC) answer the PPPoE request coming from a client site PPPoE application. It offers
standard PPP features such as authentication, encryption, and compression. It allows connection with login and password for
Internet connection accounting purposes. Also, the IP address on the other side of the link is only assigned when the PPPoE
connection is open, allowing the dynamic reuse of IP addresses.
553
Draft Draft
Table of Contents
39.1. SNMP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
39.1.1. Activating the SNMP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
39.1.2. SNMP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
39.2. Example of configuration of the SNMP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
39.3. SNMP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
39.3.1. SNMP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
39.3.2. SNMP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
39.4. SNMP Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
39.5. Appendix - SNMP Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
The MIB (Management Information Base) contains the description of the configuration/statistics “objects” available in the
SNMP Agents and their availability to be controlled by SNMP Managers.The variables accessible via Abilis CPX SNMP
resource are described in the Abilis proprietary MIB that can be downloaded from Abilis technical website - download
section1.
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
Refer to Section 39.5, “Appendix - SNMP Protocol” to have more information about SNMP protocol.
The SNMP resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
1
http://abilis.antek.it/downloads/cpx2k/download.html
554
Draft SNMP - Simple Network Draft
Management Protocol
Caution
After adding or setting the SNMP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
RES:Snmp ----------------------------------------------------------------------
Run DESCR:Simple_Network_Management_Protocol
LOG:NO ACT:YES
- Agent ----------------------------------------------------------------
locport:161
COMMUNITY:public
IPSRC:* IPSRCLIST:#
- Traps ----------------------------------------------------------------
TRAP:NO AUTHTRAP:NO TRAPREP:10
TRAPDEST:# TRAPSRC:R-ID (192.168.001.001)
COMMUNITY Sets the keyword used by the authentication procedure of those SNMP management systems able to query
the SNMP Agent of the Abilis CPX. Only those, which have the same value of the “Community Name” as
the local SNMP port, are allowed to supervise. If it doesn't match, the query frames are rejected and, if the
parameter AUTHTRAP is set to YES, a wrong authentication message is sent to the SNMP Manager, whose IP
is configured in the parameter TRAPDEST.
IPSRC Sets the IP address of the SNMP source management from which the SNMP Agent of the Abilis can receive
requests.
IPSRCLIST Sets the list of the SNMP management systems able to query the SNMP Agent of the Abilis CPX.
TRAP Enables/disables the generation of informative asynchronous signalling (trap) to the SNMP Manager, which
IP address must be declared in the TRAPDEST parameter.
AUTHTRAP Enables/disables the generation of the wrong authentication signalling if SNMP resource receives requests
from not authorized SNMP Manager processes.
TRAPREP Sets the time interval (in minutes) which has to pass before resending the trap.
555
Draft SNMP - Simple Network Draft
Management Protocol
TRAPDEST Sets the IP address (or a list of IP addresses) of the management system to which the TRAPS generated by
the SNMP Agent of the Abilis must be sent.
The command that allows the configuration of the resource to be modified has the following syntax:
s p snmp par:val...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:snmp; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
COMMAND EXECUTED
This configuration allows Abilis to accept the SNMP request from host 81.81.81.81 and to send any traps to the host
192.168.1.201 every 60 minutes.
Tip
Interesting chapter: Section 52.21, “How to activate the SNMP agent”.
d de snmp Shows the state of the resource, and information about the last sent trap.
RES:Snmp ----------------------------------------------------------------------
Simple_Network_Management_Protocol
STATE:READY
RES:Snmp ----------------------------------------------------------------------
556
Draft SNMP - Simple Network Draft
Management Protocol
Simple_Network_Management_Protocol
STATE:READY
- Last sent trap: ------------------------------------------------------
Loc. Date |Loc. Time| Trap | Resource
----------+---------+-----------------------------+---------------------
00/00/0000 00:00:00 coldStart Unknown-0
------------------------------------------------------------------------
d s snmp Shows the statistics of the SNMP resource, such as the number of sent/received packets, the number of
GetRequest frames received, the number of GetNext frames received, the number of SetRequest frames
received, the number of GetResponse frames sent, etc..
d se snmp Shows the statistics of the SNMP resource, the Traps service statistics, the Standard traps statistics and the
Enterprise specific traps statistics.
RES:Snmp ----------------------------------------------------------------------
Simple_Network_Management_Protocol
--- Cleared 080:17:02:45 ago, on 11/10/2007 at 01:40:36 ----------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
PCK | 14| 14|GET-REQ | 13| 0|
GET-NEXT | 1| 0|SET-REQ | 0| 0|
GET-RESP | 0| 14|TRAP | 0| 0|
BAD-VER | 0| |BAD-COM-N | 0| |
BAD-COM-U | 0| |ASN-ERR | 0| |
TOO-BIG | 0| 0|NO-NAME | 0| 0|
BAD-VAL | 0| 0|RONLY | 0| |
GEN_ERR | 0| 0|REQ_VAR | 17| |
SET_VAR | 0| |
------------------------------------------------------------------------
RES:Snmp ----------------------------------------------------------------------
Simple_Network_Management_Protocol
--- Cleared 080:17:02:49 ago, on 11/10/2007 at 01:40:36 ----------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
PCK | 14| 14|GET-REQ | 13| 0|
GET-NEXT | 1| 0|SET-REQ | 0| 0|
GET-RESP | 0| 14|TRAP | 0| 0|
------------------------------------------------------------------------
Traps service statistics:
-----------|--OUTPUT---|-----------|--OUTPUT---|-----------|--OUTPUT---|
REQ | 1921|REQ-SUCC | 0|REQ-FAIL | 1921|
EVENT | 0|EVENT-SUCC | 0|EVENT-FAIL | 0|
SEND | 0|SEND-SUCC | 0|SEND-FAIL | 0|
------------------------------------------------------------------------
Standard traps statistics:
-----------|--OUTPUT---|-----------|--OUTPUT---|-----------|--OUTPUT---|
COLDSTART | 0|LINKDOWN | 0|AUTHFAIL | 0|
WARMSTART | 0|LINKUP | 0|EGPNL | 0|
------------------------------------------------------------------------
Enterprise specific traps statistics:
-----------|--OUTPUT---|-----------|--OUTPUT---|-----------|--OUTPUT---|
SYNC-DN | 0|ETH-DN | 0|TR-DN | 0|
SYNC-UP | 0|ETH-RD | 0|TR-OPEN | 0|
SNTP-UNSYN | 0|X25-DN | 0|LAPB-DN | 0|
SNTP-SYN | 0|X25-RD | 0|LAPB-CN | 0|
HDLCT-DN | 0|PAD-L1-DN | 0|IPLAN-DN | 0|
557
Draft SNMP - Simple Network Draft
Management Protocol
• network diagram;
• etc.
Example of consoles may be Ipswitch WhatsUp Gold2 or Zabbix3. Below is a screen-shot of a WhatsUp Gold's Map used for
network monitoring.
2
http://www.whatsupgold.com/
3
http://www.zabbix.com/
558
Draft SNMP - Simple Network Draft
Management Protocol
4
http://en.wikipedia.org/wiki/Snmp
559
Draft Draft
Table of Contents
40.1. TRFA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
40.1.1. Activating the TRFA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
40.1.2. TRFA resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
40.1.3. Activating the TRFA inside IP resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
40.2. TRFA diagnostics, statistics and debug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
40.2.1. TRFA diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
40.2.2. TRFA statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
40.2.3. TRFA debug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
40.3. Example of TRFA configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
40.3.1. Configuring TRFA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
40.3.2. Configuration of the HTTP rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
40.3.3. Using HTTP for showing TRFA statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
• Configures each IP interface for the desired capture detail (TOTALS, by IP, by PROTOCOL, by IP and PROTOCOL).
The configuration parameters related to this function are present in the IP resource configuration.
• Shows the total traffic for each interface.
• Shows the traffic by IP address.
• Shows the traffic by protocol/applications (FTP, TELNET, etc.).
• Shows the traffic by IP address and a protocol/application.
• Shows the desired traffic types of the last day/week/month/year.
• Shows the traffic as individual interface or all summed interfaces.
• Shows graph or table view.
• Results are presented using the Abilis HTTP server (see HTTP resource).
Configuring the TRFA resource and the section inside the IP resources are needed to activate the IP Traffic Analyzer.
The TRFA resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the TRFA active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
560
Draft TRFA - Traffic Analyzer Draft
COMMAND EXECUTED
RES:Trfa ----------------------------------------------------------------------
Run DESCR:Traffic_Analyzer
LOG:DS ACT:YES max-addresses:1000 max-png:5 BAK:NO
WDIR:C:\APP\TRFA\
max-addresses Maximum number of pair “IP resource,IP address” in the TRFA address table.
max-png Maximum number of PNG shell objects. This objects will be used to create PNG files for TRFA's
HTML information page. If you have a lot of interfaces with active TRFA and TRFA's HTML
information page is created too slowly, then increase this value. Each PNG shell object gets about 400K
memory.
The following command allows the administrator to change the configuration of the resource:
s p trfa parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init res:trfa;
while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required
(i.e. with warm start command).
COMMAND EXECUTED
561
Draft TRFA - Traffic Analyzer Draft
IPADD:192.168.000.201 MASK:255.255.255.000
REDIS:YES HIDE:NO RP:NONE IPSEC:YES VRRP:NO
NAT:OUTSIDE UPNP:NO DIFFSERV:NO DDNS:NO
OUTBUF:50 OUTQUEUE:FAIR MTU:1500 BRD:NET
OUTSPL:NO
INBUF:0 mru:1500 SRCV:NO
- TRFA section ---------------------------------------------------------
TRFA:YES TRFA-MODE:TOTALS
TRFA-IPADD:LOCALNET (192.168.000.000:192.168.000.255)
- Lan ------------------------------------------------------------------
LOG:NO arpcache:200 CACHETIMER:120
rxbuf:4 txbuf:14
RES:Eth-1 ---------------------------------------------------------------------
Run DESCR:
LOG:NO MODE:AUTO DUPLEX:HALF TPPOL:AUTO
dma-rxbuf:25 dma-txbuf:25 ip-rxbuf:25 arp-rxbuf:5
pppoed-rxbuf:5 pppoes-rxbuf:25 ieee-rxbuf:25
TRFA-MODE Select traffic analysis mode [TOTALS: saves the total global traffic; PROT: subdivides the registration for
the main protocol models; IP: saves the totals for every single IP address; IP-PROT: subdivides the traffic
by protocol, for every single crossing IP address];
IP-RESERVE Reserves records in the traffic analysis data base: it represents the maximum IP number trace.
TRFA-SIDE Selects IP address type [LOCAL: filters the traffic by destination IP address; REMOTE: filters the traffic by
source IP address].
d d trfa / d de trfa Shows the current status of the resource, the current status of the active address array,
the current status of the active traffic array, the number of seconds to reach next event,
the percentage of use of the active address/backup array, the currently record saved
in the active address/backup array, the maximum number of simultaneously record
in the active address/backup array, the actual size of the active address/backup array
and the number of requests that were discarded because active address/backup array is
overflow.
RES:Trfa ----------------------------------------------------------------------
Traffic_Analyzer
STATE:ACTIVE ACTIVE-STATE:NORMAL BACKUP-STATE:NORMAL EVENT: 32
------------------------------------------------------------------------
---ARRAY---|---PERC----|----CUR----|---PEAK----|----MAX----|----OVR----|
ACTIVE | 1| 13| 21| 1000| 0|
BACKUP | 1| 11| 20| 1000| 0|
------------------------------------------------------------------------
d s trfa / d se trfa Shows the total number of requests, the number of requests that were successfully
executed, the number of requests that were not satisfied, the number of requests for
562
Draft TRFA - Traffic Analyzer Draft
which the traffic tracing was not activated and the number of failures due to an address
overflow.
RES:Trfa ----------------------------------------------------------------------
Traffic_Analyzer
--- Cleared 1 days 05:32:41 ago, on 29/12/2007 at 13:39:43 -------------
- Send/Receive statistics ----------------------------------------------
-----------|---TOTAL---|---SUCC----|---FAIL----|---INACT---|-OVERFLOW--|
REQUESTS | 3882659| 3882659| 0| 0| 0|
------------------------------------------------------------------------
RES:Trfa ----------------------------------------------------------------------
Traffic_Analyzer
BufferLength:1007 Date/Time:07/03/2011 11:44:46 TraceTime:226070834
Usage:
LSN:0 - This help
LSN:3 - Log commands (help)
LSN:4 - DATA File status
LSN:5 - BACKUP File status
LSN:6 - TEMPORARY File status
LSN:10 - Purge help
LSN:10 CMD:PURGE,param,... - Purge specific information
• Activate the statistic survey of the LAN interface (ip-1) and the internet connection (ip-2).
• Activate the IP-PROT survey (gathers the traffic dividing it by protocol for every source IP address) on the Internet
connection resource.
563
Draft TRFA - Traffic Analyzer Draft
COMMAND EXECUTED
COMMAND EXECUTED
Activate the TRFA survey on the Internet connection (ip-2 resource) and configure it with following the specifications.
COMMAND EXECUTED
COMMAND EXECUTED
564
Draft TRFA - Traffic Analyzer Draft
DDNS-FQDN:abilistest.dyndns.org
- TRFA section ---------------------------------------------------------
TRFA:YES TRFA-MODE:IP-PROT IP-RESERVE:AUTO TRFA-SIDE:REMOTE
TRFA-IPADD:*
- Lan ------------------------------------------------------------------
LOG:NO arpcache:200 CACHETIMER:120
rxbuf:4 txbuf:14
RES:Eth-2 ---------------------------------------------------------------------
Run DESCR:
LOG:NO MODE:AUTO DUPLEX:HALF TPPOL:AUTO
dma-rxbuf:250 dma-txbuf:25 ip-rxbuf:25 arp-rxbuf:5
pppoed-rxbuf:5 pppoes-rxbuf:25 ieee-rxbuf:25
Tip
Interesting chapters: Section 19.3, “IP Resources”.
COMMAND EXECUTED
COMMAND EXECUTED
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /sys/
admin r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /sys/pub/
anonymous r--- ---- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sys/trfa/
trfa r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
Tip
Interesting chapters:
565
Draft TRFA - Traffic Analyzer Draft
Period selection. It allows the definition of the time period that will be used as a report base.
• Current year
• Archive information. There are three previous years and current year.
Warning
The archive information will be available only if you have already run the
TRFA resource. You cannot, obviously, get information about periods
preceding the installation of the TRFA.
If you select the current year, you can define the report period more precisely.
Window display. A window where you can choose the time period: day/week/month/year.
• Sliding: views the whole period preceding the current time and date. For instance: if you select
the “day” period and the current time is 10.PM, you will get a report of the last 24 hours: until
10PM of the preceding day.
• Beginning: views the period starting from the beginning of the current day: For instance, it is
9.PM, and you select the “day” period you will view the report starting at 0.AM and ending at
9.PM.
566
Draft TRFA - Traffic Analyzer Draft
Note
You can always switch to another view: graph/table and vice versa.
To switch from graph to table, click on the graph; to switch from
table to graph, click on Switch to PICTURE view.
Report type. It defines if the output information will or will not be grouped.
Units. Defines the kilobytes size that will be used for the report. You can use, if you prefer, a value equal to 1000 bytes
as 1024 bytes.
Multiplier. This parameter defines the unit that will be used to show the traffic information. You can select: bits per
second (Bits/Sec) or bytes per second (Bytes/Sec).
IP Resource. Filters the traffic information for a selected period by IP resource only.
IP Address. Filters the traffic information for a selected period by selected IP addresses (or IP addresses intervals)
only.
Protocols. Filters the traffic information for a selected period by selected protocols only.
TOP 10 IP Shows the ten IP addresses that have generated the most traffic on an IP resource and the amount of traffic. It
simultaneously generates IN, OUT, IN+OUT traffic.
TOP 20 IP Shows the twenty IP addresses that have generated the most traffic on an IP resource and the amount of
traffic. It simultaneously generates IN, OUT, IN+OUT traffic.
2. Select IP-1 and IP-2 in the IP resource list. (click on IP-1 and keep the Ctrl button pressed while clicking on IP-2).
3. Keep the other default settings: Window display Sliding, Display information as Picture, Report type Individuals:
567
Draft TRFA - Traffic Analyzer Draft
Note
The graph is grey in the period in which the TRFA was not activated.
5. Keep the other default settings: Window display Sliding, Display information as Picture, Report type Individuals.
568
Draft TRFA - Traffic Analyzer Draft
569
Draft TRFA - Traffic Analyzer Draft
570
Draft TRFA - Traffic Analyzer Draft
571
Draft TRFA - Traffic Analyzer Draft
Let’s try to view: the 10 IP addresses that have generated the most traffic on the IP-2 resource, and quantify that traffic:
3. Keep the other default settings: Window display Sliding, Display information as Picture, Report type Individuals.
Note
You can get this view only if you select one IP resource from the IP resource list at a time.
5. To view the table and the whole traffic total of the single IP click on the graph.
572
Draft TRFA - Traffic Analyzer Draft
573
Draft TRFA - Traffic Analyzer Draft
Caution
To make this view work, you must configure the TRFA on the IP resource in TRFA-MODE:IP or in
TRFA-MODE:IP-PROT.
To view the day traffic of SMTP conveyed through the IP-1 resource follow these instructions:
4. Keep the other default settings: Window display Sliding, Display information as Picture, Report type Individuals.
574
Draft TRFA - Traffic Analyzer Draft
Caution
To make this view work, you must configure the TRFA on the IP resource in TRFA-MODE:PROT or
TRFA-MODE:IP-PROT.
575
Draft Draft
Table of Contents
41.1. LDAP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
41.1.1. Activating the LDAP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
41.1.2. LDAP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
41.2. LDAP tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
41.2.1. User table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
41.2.2. Rights table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
41.3. LDAP use cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
41.3.1. Publishing local VoIP users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
41.3.2. Identifying the caller in a VoIP phone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584
41.3.3. Mail composing and LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
41.4. Handling contacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
41.4.1. Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
41.4.2. LDAP Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
41.5. LDAP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
41.5.1. LDAP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
41.5.2. LDAP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
LDAP is an application protocol for accessing and maintaining distributed directory information services over an Internet
Protocol network, it is defined in terms of ASN.1, the latest version is Version 3 and published as RFC 4510.
The LDAP server provides organized set of records with a hierarchical structure and may be used as a corporate electronic
mail directory or a telephone directory that is a list of contacts including a name and a phone number.
• LDAPAdmin http://ldapadmin.sourceforge.net/index.html
• JXplorer http://jxplorer.org/
• Advanced PBX
• Mail clients
• Thunderbird http://www.mozillaitalia.org/thunderbird/
• MS Outlook http://office.microsoft.com/it-it/outlook/
Note
The LDAP resource does not provide the features of a LDAP client so Abilis CPX cannot connect to
external LDAP servers.
576
Draft LDAP - Lightweight Draft
Directory Access Protocol
The LDAP resource may already exist in the system but may not yet be active, set it active using the command:
COMMAND EXECUTED
Caution
After adding or setting the LDAP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
RES:Ldap ----------------------------------------------------------------------
Run DESCR:Lightweight_Directory_Access_protocol
LOG:NO ACT:YES tcp-locport:389 sesnum:10
mxps:2048 TOS:0-N DT:300
IPSRC:* IPSRCLIST:
SIZE-LIMIT:NO TIME-LIMIT:NO
max-entries:1000 USER-SYNC:NO DC-FIRST-ATTR:cn
root:dc=abilis,dc=net
wdir:C:\APP\LDAP\
TOS Used to enstablish the frame priority. First field [default: 0] Second field specify the type of the frame
[N=None, D=Min. Delay, T=Max. Throughput, R=Max. Reliability, C=Min. Monetary Cost].
IPSRC Incoming requests: accepted source IP address [*, 1-126.x.x.x, 127.0.0.1, 128-223.x.x.x].
In the case that one needs to restrict the access, he has to set in IPSRC the ip address of a client which
must always have access, e.g. the IP address of the administrator console, and add further IPs using
IPSRCLIST.
IPSRCLIST Incoming requests: name of the IP/IR/RU/MR list for source IP address acceptance [#, 0..9, a..z, A..Z,
_].
577
Draft LDAP - Lightweight Draft
Directory Access Protocol
SIZE-LIMIT Maximum number of entries that LDAP server will return for a search operation [NO, 1..65535]
TIME-LIMIT Maximum time allowed for the search operation. If set, the result can fail of can be partial [NO,
1..65535 sec]
max-entries Maximum number of entries (Address books and contacts), in the LDAP data base [100..10000]
USER-SYNC Determines if Abilis users can be inserted into LDAP database, and kept synchronized [NO, YES]
DC-FIRST-ATTR Determines the first attribute to be used in the distinguished name (DN) of contacts [cn, uid]
(temporarily available only for the system address book)
root Specifies the distinguished name (DN) for the root entry. From 1 up to 128 Alphanumeric extended
characters. Case is preserved. Spaces are allowed. Strings holding spaces must be written between
quotation marks (E.g.: \"dc=my book,dc=my root\").
wdir Working directory where the LDAP files are stored. It cannot be empty. Physical full path in DOS
notation, i.e. starting with a drive letter in the range ['A'..'Z'] and ending with the '\' character. Max.
128 characters. Case is preserved. Spaces are allowed. Strings holding spaces must be written between
quotation marks (E.g.: "C:\My dir\").
The command that allows the configuration of the resource to be modified has the following syntax:
s p ldap par:val...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:ldap; while to activate the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
Use the d user command to display the parameters of the users; the d user: ? command shows the meaning of all parameters.
USER: PWD: ACT: CTIP: CLUS: PPP: FTP: HTTP: MAIL: IAX: SIP: LDAP:
--------------------------------+--------------+-------------------------------
admin *** NO # # YES YES YES NO NO NO NO
guest NO # # NO NO NO NO NO NO NO
To allow an user to access LDAP, the LDAP parameter must be set to YES.
COMMAND EXECUTED
COMMAND EXECUTED
USER: PWD: ACT: CTIP: CLUS: PPP: FTP: HTTP: MAIL: IAX: SIP: LDAP:
--------------------------------+--------------+-------------------------------
admin *** YES # # YES YES YES NO NO NO YES
guest YES # # NO NO NO NO NO NO YES
578
Draft LDAP - Lightweight Draft
Directory Access Protocol
In the example the LDAP account for the user admin and the user guest (anonymous) was activated.
Type the following command to create a new user with LDAP account.
COMMAND EXECUTED
Parameter: | Value:
------------------+------------------------------------------------------------
USER: test
ALIAS: test
ID: 3 <Read Only>
PWD: ***
ACT: YES
GROUP:
CTIP: #
CLUS: #
OPC-ROLE: USER
OPC-VIEW: *
OPC-MONITOR: NONE
HTTP: YES
HTTP-PROT: PLAIN,SSL
LDAP: YES
LDAP-OWN-ADDRBOOK: NO
LDAP-USER-SYNC: SYS
LDAP-NUMBER: NONE
-------------------------------------------------------------------------------
Note
This command displays only the parameters related to enabled drivers; if you want to see all the user
parameters type the d usere:<ldap_user> command.
LDAP Enables/disables the LDAP account for the user [NO, YES], the default is NO.
LDAP-OWN-ADDRBOOK Enable/disable user's personal address book [NO, YES], the default is NO. This parameter acts
only if LDAP parameter is enabled.
LDAP-USER-SYNC Determine if the user has to be added to LDAP System address book [SYS, NO, YES], the
default is SYS, that is the USER-SYNC parameter in PORT (the default is NO).
LDAP-NUMBER Determine which is the main user phone number [NONE, CTIP, CLUS CTISIP, CTIIAX]. The
number that is actually used is filtered by macroes that depends on the interface:
• CTIP, the phone number is provided by the LDAP-NUM parameter of the CTI port specified
in CTIP user parameter.
• CLUS, the phone number is provided by the LDAP-NUM parameter of the Cluster specified in
CLUS user parameter.
579
Draft LDAP - Lightweight Draft
Directory Access Protocol
• CTISIP, the phone number is provided by the SIP-LDAP-NUM user parameter (if the SIP
account is active).
• CTIIAX, the phone number is provided by the IAX-LDAP-NUM user parameter (if the IAX
account is active).
• Main
The address book is accessible from any allowed user via a ldap right table.
• Personal
The address book contains the contacts that are accessible only by the related account. A LDAP account may enable the
personal address book via the user parameter LDAP-OWN-ADDRBOOK.
There are three main address books that are automatically created:
• SYSTEM
It will contain all (and only) the synchronized contacts which information is gathered by the user table and the CTI and
CLUSTER resources. Currently the synchronized attributes are the common name and the telephone number.
• CONTACTS
• PUBLISHED
It is intended to contain the contacts for external use, i.e. provided to third part companies.
580
Draft LDAP - Lightweight Draft
Directory Access Protocol
To display the rights of the addess books use the following command.
-------------------------------------------------------------------------------
ID: ADDRESSBOOK:
USER: GRANTS:
-------------------------------------------------------------------------------
1 contacts
admin rwcd
anonymous ----
-------------------------------------------------------------------------------
2 published
admin rwcd
anonymous r---
-------------------------------------------------------------------------------
3 system
admin rw--
anonymous ----
-------------------------------------------------------------------------------
581
Draft LDAP - Lightweight Draft
Directory Access Protocol
In the system address book [580] the creation and the deletion of contacts is never allowed because it is internally auto-
synchronized.
The rights of Admin and Anonymous on default address books are explicit (note that by default the anonymous has access
only to published [580]), other users have implicit rights.
New users with LDAP parameter enabled have the "r" right in all the main address books (also the new ones) and the its
personal addressBook (LDAP-OWN-ADDRBOOK enabled).
If a different behavior is needed for a user, an explicit entry is added. In example to remove the visibility of system address
book to the user "test" use the following command:
COMMAND EXECUTED
-------------------------------------------------------------------------------
ID: ADDRESSBOOK:
USER: GRANTS:
-------------------------------------------------------------------------------
1 contacts
admin rwcd
anonymous ----
-------------------------------------------------------------------------------
2 published
admin rwcd
anonymous r---
-------------------------------------------------------------------------------
3 system
admin rw--
anonymous ----
test ----
-------------------------------------------------------------------------------
Add and active the LDAP resource as explained in the chapter: "activating the LDAP resource".
COMMAND EXECUTED
If anonymous authentication is required, the guest user must be active and its LDAP parameter enabled.
COMMAND EXECUTED
582
Draft LDAP - Lightweight Draft
Directory Access Protocol
Note
By default the anonymous user has access just to the "published" address book, so use the command s ldap
rights id:3 user:anonymous grants:r to allow anonymous to access the system address book [580].
You may also want to limit the access of LDAP client to the LAN then use the command s p res:ldap ip-
src:192.168.0.0/16 and execute the initialization command init res:ldap.
Check the users to be kept synchronized, in this example let's created a few users.
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Enable LDAP-USER-SYNC in each user you want to keep synchronized in the system address book [580] and specify the
phone interface via the LDAP-NUMBER user parameter.
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
You may set USER-SYNC:YES in LDAP resource port but you should not use this way in most cases. You may errouneusly
synchronize users you want to keep hidden. Moreover if this parameter is switched from YES to NO you risk to lost part of
saved data (non synchronized attributes of synchronized contacts).
You may also modify, via macros, the number provided to LDAP via LDAP-NUM parameter in CTIIAX/CTISIP/CTIP/
CLUSTER interfaces.
COMMAND EXECUTED
583
Draft LDAP - Lightweight Draft
Directory Access Protocol
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTE
Note
Any modfication to CTI ports or Clusters need the CTI system initialization via the command init res:ctisys.
Hide the address books you are not interested in via the LDAP rights table. The following commands allow just the system
address book will be visible to the user named "test".
COMMAND EXECUTED
COMMAND EXECUTED
The user may now access LDAP server via LDAP client or via Abilis web interface. To access web pages provide the LDAP
accont with additional HTTP rights.
COMMAND EXECUTED
COMMAND EXECUTED
To know how to read/modify/create/remove contacts via the web interface or via a LDAP client check the chapter "handling
contacts".
Add and active the LDAP resource as explained in the chapter: "activating the LDAP resource".
You may also want to limit the access of LDAP client to the LAN (i.e. 192.168.X.X) via the ipsrc and ipsrclist parameters.
COMMAND EXECUTED
COMMAND EXECUTED
584
Draft LDAP - Lightweight Draft
Directory Access Protocol
COMMAND EXECUTED
COMMAND EXECUTED
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:ldap; while to activate the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
COMMAND EXECUTED
The user automatically gains the reading right over all the main address books.
If the anonymous authentication is required, the guest user must be active and its LDAP parameter enabled.
COMMAND EXECUTED
The guest by default has not the right to access the system address book [580] and the contacts address book [580] so
let's grant it.
COMMAND EXECUTED
COMMAND EXECUTED
Let's configure a Snom 300 VoIP phone to display the LDAP attribute "common name" instead of displaying just the calling
number.
Via the web interface of the SNOM open the Advanced section page and set the following parameters:
Parameter Value
LDAP name filter (&(telephoneNumber=*)(sn=%))
LDAP number filter (&(telephoneNumber=%)(sn=*))
Server Address <IP address or FQDN of Abilis>
585
Draft LDAP - Lightweight Draft
Directory Access Protocol
Port 389
Base dc=addressBooks,dc=abilis,dc=net
Username <The name of an Abilis user allowed to LDAP
(LDAP:YES)>
Password <The password of an Abilis user allowed to LDAP
(LDAP:YES)>
LDAP name attributes cn sn displayName
LDAP number attributes mobile telephoneNumber ipPhone
LDAP display name %cn
Note
Changing the "Base" parameter you may change the scope of contacts, i.e. to access only the contacts
address book [580] set "Base" as addressBook=contacts,dc=addressBooks,dc=abilis,dc=net.
586
Draft LDAP - Lightweight Draft
Directory Access Protocol
Now the phone will display the Common Name provided by the Abilis LDAP server instead of any known calling number.
Figure 41.3. SNOM 300 LCD when the calling number is known to LDAP server
To know how to read/modify/create/remove contacts via the web interface or via a LDAP client check the chapter "handling
contacts".
Add and active the LDAP resource as explained in the chapter: "activating the LDAP resource".
You may also want to limit the access of LDAP clients to the LAN (i.e. 192.168.X.X) via the ipsrc and ipsrclist parameters.
COMMAND EXECUTED
587
Draft LDAP - Lightweight Draft
Directory Access Protocol
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:ldap; while to activate the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
Thunderbird doesn't support LDAP user authentication so let's enable the anonymous user in Abilis (guest) and set its LDAP
right to allow him to access the contacts address book [580].
COMMAND EXECUTED
COMMAND EXECUTED
588
Draft LDAP - Lightweight Draft
Directory Access Protocol
anonymous r---
-------------------------------------------------------------------------------
3 system
admin rw--
anonymous ----
-------------------------------------------------------------------------------
In Thunderbird open the Account Settings dialog (select Tools ->Account Settings) then select your account and click the
Composition & Addressing tab, finally add a new LDAP dir.
Parameter Value
589
Draft LDAP - Lightweight Draft
Directory Access Protocol
Note
Changing the "Base DN" parameter you may change the scope of contacts, i.e. to access all main address
books set base as dc=addressBooks,dc=abilis,dc=net and execute the command s ldap rights id:3
user:anonymous grants:r
Set the Abilis LDAP server as the current LDAP for this account.
Then you may try to write a mail using the "common name" of a person and Thunderbird will autocomplete the mail address
for you. In the example the "Contacts" address book include the contact of "Clark Kent", the tooltip will appear as soon as
you write a few chars.
590
Draft LDAP - Lightweight Draft
Directory Access Protocol
To know how to read/modify/create/remove contacts via the web interface or via a LDAP client check the chapter "handling
contacts".
Using the admin account you need just to use the following command:
COMMAND EXECUTED
If you use another account remember to allow the HTTP rights too.
COMMAND EXECUTED
COMMAND EXECUTED
Non-administrator users by default have only the "read" right. Administrator has the full control.
If you want a LDAP account be also able to modify/create/remove contacts allowing it to have full rights then issue following
commands:
COMMAND EXECUTED
591
Draft LDAP - Lightweight Draft
Directory Access Protocol
COMMAND EXECUTED
COMMAND EXECUTED
Let's use admin account in this examples, anyway you know how to use another account.
Log in the web interface as admin and click the "LDAP Address books" link.
592
Draft LDAP - Lightweight Draft
Directory Access Protocol
The administrator has full access to all the address books. The interface include also the name of Base DN for each address
book. The interface also allows to import/export a single address book.
Note
To import/export the whole LDAP DB or to handle personal address books visit the "Advanced LDAP
administration" page. Although LDAP server include disaster recovery features, a periodical backup (via
exporting) of address books or the whole DB is suggested.
593
Draft LDAP - Lightweight Draft
Directory Access Protocol
Then you may add a new contact via the "Add" button.
594
Draft LDAP - Lightweight Draft
Directory Access Protocol
Note
In system address book, synchronized attributes "commonName" and "telephoneNumber" cannot be edited
although having the "w" right.
595
Draft LDAP - Lightweight Draft
Directory Access Protocol
You also need an Abilis user that must have the LDAP parameter set to yes.
Using the admin account you need just to use the following command:
COMMAND EXECUTED
COMMAND EXECUTED
Non-administrator users by default have only the "read" right. Administrator has full control.
If you want a LDAP account be able also to modify/create/remove contacts allowing it to have full rights issue following
commands.
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
596
Draft LDAP - Lightweight Draft
Directory Access Protocol
Parameter Value
Host <IP address of Abilis>
TCP port 389
Base DN dc=abilis,dc=net
Username <The name of an Abilis user allowed to LDAP
(LDAP:YES)>
Password <The password of an Abilis user allowed to LDAP
(LDAP:YES)>
Caution
LDAP uses plain autentication on a non encrypted connection so use the account only in controlled networks
or at least use an ad hoc LDAP account (a user that can just access LDAP) to avoid to share a password with
other Abilis services for that user.
597
Draft LDAP - Lightweight Draft
Directory Access Protocol
598
Draft LDAP - Lightweight Draft
Directory Access Protocol
599
Draft LDAP - Lightweight Draft
Directory Access Protocol
600
Draft LDAP - Lightweight Draft
Directory Access Protocol
Note
Use the save button to save the entry, if you receive a message explaining that the operation cannot be
completed you may not have the permission to do such operation.
RES:Ldap ----------------------------------------------------------------------
Lightweight_Directory_Access_protocol
STATE:ACTIVE DB-LOADED:YES
CUR-SES:0 PEAK-SES:0 MAX-SES:4
ENTRIES:9/250 ATTRIBUTES:28/9000 ATTR-VALUES:39/11000
- LDAP Sessions diagnostics --------------------------------------------
601
Draft LDAP - Lightweight Draft
Directory Access Protocol
LONG Total number of refused incoming packets with too long length.
BAD-SRC Total number of refused incoming packets with not allowed source IP address.
d se ldap Shows the statistics of the LDAP resource for each session.
RES:Ldap ----------------------------------------------------------------------
Lightweight_Directory_Access_protocol
--- Cleared 0 days 01:57:24 ago, on 14/11/2011 at 18:32:49 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FMR | 0| 0|
LONG | 0| |BAD-FMT | 0| |
BAD-SRC | 0| |TIME-OUT | 0| |
------------------------------------------------------------------------
RES:Ldap ----------------------------------------------------------------------
Lightweight_Directory_Access_protocol
--- Cleared 0 days 01:57:29 ago, on 14/11/2011 at 18:32:48 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FMR | 0| 0|
LONG | 0| |BAD-FMT | 0| |
BAD-SRC | 0| |TIME-OUT | 0| |
------------------------------------------------------------------------
- LDAP Sessions statistics ---------------------------------------------
SES:0
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FMR | 0| 0|
LONG | 0| |BAD-FMT | 0| |
BAD-SRC | 0| |TIME-OUT | 0| |
------------------------------------------------------------------------
SES:1
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FMR | 0| 0|
LONG | 0| |BAD-FMT | 0| |
BAD-SRC | 0| |TIME-OUT | 0| |
------------------------------------------------------------------------
SES:2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FMR | 0| 0|
602
Draft LDAP - Lightweight Draft
Directory Access Protocol
LONG | 0| |BAD-FMT | 0| |
BAD-SRC | 0| |TIME-OUT | 0| |
------------------------------------------------------------------------
SES:3
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FMR | 0| 0|
LONG | 0| |BAD-FMT | 0| |
BAD-SRC | 0| |TIME-OUT | 0| |
------------------------------------------------------------------------
603
Draft Draft
Table of Contents
42. CTI System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
42.1. CTI System module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
42.2. CTI Ports configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
42.3. CTI Ports Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
42.3.1. POTS and CTI Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
42.4. CTI Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
42.4.1. Internal clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
42.4.2. CPO - Call path optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
42.5. CTI Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
42.5.1. CTI Link Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
42.6. CTI Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
42.6.1. Display CTI Routing Table (D CTIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
42.6.2. Add CTI Routing Table (A CTIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
42.6.3. Clear CTI Routing Table (C CTIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
42.6.4. Set CTI Routing Table (S CTIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
42.6.5. Move CTI Routing Table (M CTIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
42.6.6. Macro functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
42.7. CTI routing for POTS devices (“PBX Group”) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642
42.8. CTI System Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
42.9. Diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
42.9.1. CTI Ports diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
42.9.2. CTI Ports statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650
42.9.3. CTI Cluster diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
42.9.4. CTI Link diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
42.9.5. CTI connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
42.9.6. DSP and Audio Coders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
42.10. Examples of CTI configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
42.10.1. Configuration of a VPN to transport voice and data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
42.10.2. Configuration of a VPN to transport only voice. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672
42.11. Soft-PBX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
42.11.1. Supplemetary services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
42.11.2. User call logs and mails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
42.11.3. User preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
42.11.4. Administrative pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
42.11.5. Advanced user activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
42.12. FAX Relay with Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
42.12.1. Fax over packet networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
42.12.2. Fax Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
42.12.3. Abilis configurations for best results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
42.12.4. Diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
42.12.5. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
43. The web interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
43.1. The web interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
43.2. Section 1 - User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
43.2.1. Creation of the user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
43.2.2. Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
43.2.3. User preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
43.2.4. Address Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
43.2.5. CTI incoming/outgoing calls log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
43.2.6. Advanced user activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
43.3. Section 2 - Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
43.3.1. IP Traffic Analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
43.3.2. Operator Panel Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
43.3.3. SMS Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
43.3.4. Control Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722
43.4. Section 3 - Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
43.4.1. Configuration information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
43.4.2. Users administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
43.4.3. Groups administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
605
Draft CTI System Draft
606
Draft CTI System Draft
607
Draft CTI System Draft
608
Draft Draft
Table of Contents
42.1. CTI System module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
42.2. CTI Ports configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
42.3. CTI Ports Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
42.3.1. POTS and CTI Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
42.4. CTI Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
42.4.1. Internal clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
42.4.2. CPO - Call path optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
42.5. CTI Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
42.5.1. CTI Link Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
42.6. CTI Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
42.6.1. Display CTI Routing Table (D CTIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
42.6.2. Add CTI Routing Table (A CTIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
42.6.3. Clear CTI Routing Table (C CTIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
42.6.4. Set CTI Routing Table (S CTIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
42.6.5. Move CTI Routing Table (M CTIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
42.6.6. Macro functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
42.7. CTI routing for POTS devices (“PBX Group”) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642
42.8. CTI System Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
42.9. Diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
42.9.1. CTI Ports diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
42.9.2. CTI Ports statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650
42.9.3. CTI Cluster diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
42.9.4. CTI Link diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
42.9.5. CTI connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
42.9.6. DSP and Audio Coders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
42.10. Examples of CTI configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
42.10.1. Configuration of a VPN to transport voice and data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
42.10.2. Configuration of a VPN to transport only voice. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672
42.11. Soft-PBX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
42.11.1. Supplemetary services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
42.11.2. User call logs and mails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
42.11.3. User preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
42.11.4. Administrative pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
42.11.5. Advanced user activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
42.12. FAX Relay with Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
42.12.1. Fax over packet networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
42.12.2. Fax Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
42.12.3. Abilis configurations for best results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
42.12.4. Diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
42.12.5. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
609
Draft CTI System Draft
The CTISYS is a smart switch able to exchange both circuit-switched telephony channels (TDM) and packet-switched (VoIP,
VoN) channels with all the reasonable degrees of freedom:
The table below shows the different types of connection supported by the CTI System:
All the possible combinations of connections are possible; for more details refer to CTIR section; IAX, SIP and DISA
routings are explained in the corresponding chapters.
The bandwidth depends on the used coder: G.711, G.726, G.727, GSM6.10, Spirit, G.723.1, G.729A, Transp
For compressed phone calls directly sent onto the Frame Relay network, a Spirit 723 coder with net compression at 6400 bps
and gross space memory of 8800 bps are usually used.
On an IP network the bandwidth is 22 kbps for the first call, the following simultaneous calls (from the same source to the
same destination) add a bandwidth of only 8,8 kbps for each single call.
s p ctip:<port_number> <parameter>:<value>
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
1
http://en.wikipedia.org/wiki/Computer_telephony_integration
610
Draft CTI System Draft
COMMAND EXECUTED
611
Draft CTI System Draft
Act DESCR:to_PBX
Run card:BRI4-1<2>
OPSTATE:UP LOG:NO side:NT line:PP TYPE:USER
signalling:DSS1 TEI:STANDARD HOLD:NO CT:NO SS:NO
mode:Bri BUS:SHORT NUM:*
BCHANS:ALL-BID
X25:NO (XTEI:10) XK:7 XN200:3 xn201:260 XN202:3
XT200:1 XT202:2 XT203:10
Q931:YES (QTEI:0) QK:1 QN200:3 qn201:260 QN202:3 QT200:1
QT202:2 QT203:10 TDISC:90 QT301:180 QT302:15 QT303:4
QT304:30 QT305:30 QT308:4 QT310:30 QT313:6 QT316:15
DIALT:5 scrst:YES ORCD:0 ICT-T1:500 ICT-T2:500
SQNRTY1:15 SQDELAY1:30 SQDELAY2:5
LCS-GROUP:NONE BUSY-NOCHAN:NO OUT-DIAL-TONE:SYS
SS-PICKUP:GROUP SS-PRES-CG:YES NP-CT:NO CLIP-RULE:PRIVATE
SS-CF-DND:YES
LOG State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E] (D: Debug Log; S: System Log;
A: Alarm view; L: Local audible alarm; T: SNMP traps; +E: Extended Log of state changes)
side Port behaviour [TE: if the port is connected to an ISDN line; NT: if the port is connected to a PBX].
612
Draft CTI System Draft
LINE Line type [MP if the line is Multi-Point; PP if the line is Point-to-Point].
NUM Phone number assigned to CTI port. The available values are:
• ##: enforces the presentation restricted: the Calling Number is not passed to the device;
• nnnn*: the Calling Number received from CTIR is modified by replacing first four digits with
nnnn;
• nnnn??: similar to nnnn* with the difference that only an exact number of digits as many ? is
passed after nnnn;
• ????: only an exact number of digits as many ? is passed after the nnnn.
SS Enable/disable supplementary services accessible through "*" as first digit in called number [NO, YES]
OUT-DIAL-TONE Enable/disable the outside dial tone generation [SYS, NO, YES] <Only for mode: equal to E1-ISDN,
Bri or Pots>.
LCS-GROUP Last Calling number Service group identifier [NONE, 1..32] <Only for mode: not equal to Pots>
COMMAND EXECUTED
LOG State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E] (D: Debug Log; S: System Log;
A: Alarm view; L: Local audible alarm; T: SNMP traps; +E: Extended Log of state changes)
613
Draft CTI System Draft
NUM Phone number assigned to CTI port. The available values are:
• ##: enforces the presentation restricted: the Calling Number is not passed to the device;
• nnnn*: the Calling Number received from CTIR is modified by replacing first four digits with
nnnn;
• nnnn??: similar to nnnn* with the difference that only an exact number of digits as many ? is
passed after nnnn;
• ????: only an exact number of digits as many ? is passed after the nnnn.
SS Enable/disable supplementary services accessible through "*" as first digit in called number [NO, YES]
OUT-DIAL-TONE Enable/disable the outside dial tone generation [SYS, NO, YES] <Only for mode: equal to E1-ISDN,
Bri or Pots>.
MIN-FLASH Minimal duration of the on-hook transition to detect a FLASH [SYS, 50..1000 ms]
MAX-FLASH Maximal duration of the on-hook transition to detect a FLASH [SYS, 50..1000 ms]
IN-GAIN-ADJ Input (Receive) gain adjustment respect to the gain present in the country coefficient file [SYS, MUTE,
COUNTRY, -12..+12 dB]
OUT-GAIN-ADJ Output (Transmit) gain adjustment respect to the gain present in the country coefficient file [SYS,
MUTE, COUNTRY, -12..+12 dB]
Caution
To activate the changes made on the upper case parameters, execute the initialization command init ctisys;
while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required
(i.e. with warm start command).
Here is an example: the G1 group contains the BRI ports (ctip:31 and ctip:32) towards PBX, the G2 group contains the BRI
ports towards ISDN lines (ctip:33 and ctip:34).
COMMAND EXECUTED
614
Draft CTI System Draft
COMMAND EXECUTED
SCAN It establishes the algorithm with which the ports listed in the group are scanned. The available values are:
• R: stands for “Round-Robin” algorithm and it indicates that the scanning of the ports occurs in a circular
manner, ensuring that all of them are evenly utilized;
• P: stands for “Priority” algorithm and it is used to indicate that the ports are scanned starting from the first to
the last;
• M: stands for “Multicasting” algorithm and it is used to indicate that all the port are alerted simultaneously.
RULE It establishes the rule with which the CTI router will try the connection on the next port listed in the group, in the
case that the connection on the previous port fails. The available values are:
• ST: the next port is used only for following codes: “internal causes” (i.e. those with location=0xFF), “0x92 no
user responding”, “all causes in classes 02, 05, 06” (0xA2-0xAF, 0xC1-0xCF, 0xD1-0xDF);
• IN: the next port is used only for internal causes (i.e. those with location=0xFF);
• UN: the next port is always evaluated if the previous one fails;
PICKUP Enables/disables the group for call pickup; generally used for POTS ports.
Caution
Changes made on the CTI Groups are not immediately active. To activate them, execute the initialization
command init ctir.
The most important features which the CTI Group allows on CTI POTS ports are:
• PICK-UP: allows answering an incoming call on a phone, from another one connected to the same POTS card.
The configuration of these two features is made on CTI Group (as shown above).
[DESCR:]
ID: PICKUP: SCAN: RULE: |P1 P2 P3 P4 P5 |P6 P7 P8 P9 ...
|... P62 P63 P64
615
Draft CTI System Draft
--------------------------------------+--------------------+-------------------
1 NO R ST |101 102 103 104 . |. . . . .
--------------------------------------+--------------------+-------------------
In a CTI Group, add the ports which must be alerted simultaneously and set the scanning method parameter SCAN:M, to
activate Multicasting.
In a CTI Group add the ports which must support this service and set the Pick-Up parameter PICKUP:Y to activate Pick-up.
• Generic call Pick-Up: allows the Pick-Up of the incoming call on all phones connected to the CTI ports that belong to the
CTI group; if more than one call is coming in, the oldest one will be picked-up. The operation is:
• Specific call Pick-Up: allows the pick-up of a specific incoming call on a specific phone connected to the CTI ports that
belong to the CTI group. The operation is:
• dial “* 1+NUM” (asterisk, than one, then the value of the parameter NUM assigned to the correspondent CTI POTS
port, i.e.*104 )
The example below shows how to add the cluster Abilis2 (the number associated to the cluster is 0123456).
COMMAND EXECUTED
---------+----------------------+---------+-----+-----------+------------------
CLUS: |[DESCR:]
[Int] |CG-IN-REWRITE: |RG-IN: |SS: |LCS-GROUP: |CLIP-RULE:
|NUM: |CPO:
|NUMx:
---------+----------------------+---------+-----+-----------+------------------
Abilis2 Cluster_to_Abilis2
[ 1] ue* DISABLE NO NONE PRIVATE
0123456 NO
CG-IN-REWRITE Rewrites the calling number received from the cluster, after NUMx and NUM processing.
616
Draft CTI System Draft
CPO Sets for which direction the Call Path Optimization is allowed [NO: Call Transfer is not sent out and
it is ignored in input, IN: Call Transfer is accepted in input but it is not sent out, OUT: Call transfer is
sent out but it is ignored in input, BID: Call Transfer is sent out and it is accepted in input].
NUM Phone number assigned to the CTI cluster. The available values are:
• ##: enforces the presentation restricted: the Calling Number is not passed to the device;
• nnnn*: the Calling Number received from CTIR is modified by replacing first four digits with
nnnn;
• nnnn??: similar to nnnn* with the difference that only an exact number of digits as many ? is
passed after nnnn;
• ????: only an exact number of digits as many ? is passed after the nnnn.
CLIP-RULE Specifies the treatment of the CG number for calls TO the cluster (OUTGOING) [PRIVATE, PUBLIC]. If
PRIVATE the CG is sent unmodified, if PUBLIC the CG is emptied when PI is set to RESTRICTED.
A list of cluster numbers (NumClus) is automatically generated by the system; it contains the correspondence between
Clusters and their respective numbers.
LIST:NumClus - CLNUM
Automatically_generated_CTI_Clusters_Numbers_list_(ReadOnly)
Number CtiCluster
0123456 Abilis2
This list can be used to simplify the structure of the CTI Routings : an unique rule can route all the calls for the Clusters, by
verifying the called number configured. See the example in the CTI Routing section further details.
Caution
Changes made on the CTI Clusters are not immediately active. To activate them, execute the initialization
command init ctisys.
617
Draft CTI System Draft
Tip
Interesting chapters: Chapter 36, Tunneling proprietary protocols.
COMMAND EXECUTED
COMMAND EXECUTED
618
Draft CTI System Draft
COMMAND EXECUTED
COMMAND EXECUTED
Caution
After adding or setting the resources active, you must restart the Abilis to make the device running (use the
command warm start to reboot the Abilis).
Tip
Interesting chapter: Section 36.2, “Configuring Packet Voice tunnels”.
COMMAND EXECUTED
COMMAND EXECUTED
619
Draft CTI System Draft
---------+----------------------+---------+-----+-----------+------------------
CLUS: |[DESCR:]
[Int] |CG-IN-REWRITE: |RG-IN: |SS: |LCS-GROUP: |CLIP-RULE:
|NUM: |CPO:
|NUMx:
---------+----------------------+---------+-----+-----------+------------------
Clus1 Internal_Cluster_1
[ 1] - DISABLE NO NONE PRIVATE
* NO
-------------------------------------------------------------------------------
Clus2 Internal_Cluster_2
[ 2] - DISABLE NO NONE PRIVATE
* NO
-------------------------------------------------------------------------------
Caution
To activate the changes made, execute the initialization command init res:ctisys. and the command save
conf to make changes permanent.
Tip
Interesting chapters: Section 42.4, “CTI Cluster”.
COMMAND EXECUTED
COMMAND EXECUTED
Caution
To activate the changes made, execute the initialization command init res:ctisys. and the command save
conf to make changes permanent.
Tip
Interesting chapters: Section 42.5, “CTI Link”.
620
Draft CTI System Draft
A call is received by Abilis 1 and the operator routes the call toward Abilis 2. Then the remote user reroutes the call toward
the Operator. Without CPO the calls (one from Abilis 1 to Abilis2 and one from Abilis 2 to Abilis 1) remain active and can
cause a degradation of the quality.
With CPO active the calls drawed with dotted lines are closed and the initial one remains active.
Note
CPO feature is available also for IAX and SIP resources.
621
Draft CTI System Draft
The example below shows how to associate the cluster Abilis2 with the resource pv-1.
COMMAND EXECUTED
Configured Links:1
Tip
For each CTI Link you can define a maximum bandwidth to use with compressed phone calls; this could be
very interesting if you want to limit the number of calls toward a specific direction. A link inside a group
and a further maximum bandwidth (GROUP-MAXBW) can be configured.
Caution
Changes made on the CTI Links are not immediately active. To activate them, execute the initialization
command init ctisys.
• d ctilg [id:<ctilg_number>] : displays the list of CTI Link Group or a specific one.
The d ctilg ? command shows all available parameters. The Example below shows how to create a new CTI Link Group and
how join a CTI Link in the group.
622
Draft CTI System Draft
COMMAND EXECUTED
COMMAND EXECUTED
Caution
Changes made on the CTI Link Groups are not immediately active. To activate them, execute the
initialization command init ctisys.
623
Draft CTI System Draft
Table 42.2. Special characters and values available in CTI routing table
Tip
The characters * and ? can be combined, example: “*2??35?” or “15??74*”.
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 DATA CtiSLink G2 * *
-------------------------------------------------------------------------------
2 VtoC G1 Abilis2 'ToAbilis2' *
UNLIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
624
Draft CTI System Draft
• TYPE: Type of the connection [TR, DATA, VtoC, VtoH, VtoI, VtoS, VtoD, CtoV, CtoC, CtoH, CtoI, CtoS, CtoD, HtoV,
HtoC, HtoH, HtoI, HtoS, HtoD, ItoV, ItoC, ItoH, ItoI, ItoS, ItoD, StoV, StoC, StoH, StoI, StoS, StoD, DtoV, DtoC, DtoH,
DtoI, DtoS, DtoD, *toV, *toC, *toH, *toI, *toS, *toD]
Note
The values of parameters CDI, CDO, CGI, CGO, can be optionally preceeded by TON (Type Of
Number). TON can have the following values:
u Unknown
i International number
n National number
o (Operator network) Network specific number
s Subscriber number
c (Coded) Abbreviated number
h Alphanumeric (GSM/UMTS only)
• NEXT: allows searching for an alternative routing in the CTI routings table, when the primary routing fails. The admitted
values are the following:
• N (or No): in the event of failure of the routing, no procedure for seeking an alternative routing is put into effect.
• L (or Limited): next routing is evaluated only for internal causes, i.e. those with location=0xFF (i.e. network out
of service, all channels engaged, etc…);
• U (or Unlimited): next routing is evaluated for every cause except: 0x91 (user busy) or 0x93 (no user responding,
user alerted);
• BB (or ButBusy): next routing is evaluated for any reason except BUSY.
Besides, two special values of DS (Destination Cluster) are available on VtoC, ItoC, DtoC, StoC and CtoC routings, to
simplify the structure of the CTIR:
• <AUTO-I> : by specifying this value in DS, the routing will be matched according to the standard rules. The destination
cluster will be chosen by comparing the field CDI with the NUMs set in each cluster. When the match is found, the
correspondent cluster will be the real destination of the call.
• <AUTO-O> : by specifying this value in DS, the routing will be matched according to the standard rules. The
destination cluster will be chosen by comparing the field CDO with the NUMs set in each cluster. When the match is
found, the correspondent cluster will be the real destination of the call.
Lists can be used to simplify the structure of the CTI Routings: an unique instruction can route all the calls of the Clusters,
by verifying the configured called number. See the example in the CTI Routing section for further details.
• SR: Source Cluster identifier [0..9, A..Z, a..z, _, :] or “#”, or “*”, or a list name “list”. <Only for TYPE:CtoVCHISD/
*toVCHISD>
• T301(Alerting time-out): defines the Alerting time-out, which is the duration of the call alerting state. When the time-
out expires, administrator may choose to end the call or carry out a search for an alternative routing by configuring the
625
Draft CTI System Draft
NEXT parameter. [Dft (default): this time-out corresponds to the time-out defined by the Provider of the ISDN line or by
the devices (i.e. PABX) connected to the Abilis].
• LCS: Enable/disable Last Calling number Service [NO, YES] <Only for POO: not equal to CtiSlink, CtiH323, and
CtiDisa>
• LCST: Last Calling number Service records timeout [Sys, NONE, 1..999 hour] <Only for POO: not equal to CtiSlink,
CtiH323, and CtiDisa>
• RGI: Input redirecting address [0..9, *, #, ?, 'list'], optionally preceded by TON [u, i, n, o, s, h, c] and/or NP [x, e, d, t, l, p]
and/or PI [a, r, m, q] and/or SI [y, v, w, z, j] attributes, or [##, $].
• RGO: Output redirecting address [0..9, *, #, 'macro'], optionally preceded by TON [u, i, n, o, s, h, c] and/or NP [x, e, d,
t, l, p] and/or PI [a, r, m, q] and/or SI [y, v, w, z] attributes. (E.g.: 123, *, #, 123'cdi', 'cdi'123'cgi.s5', 'sdi', ''listname'',
''listname.cd'', ''listname.cg'.s2', ''listname'.s5', 12''listname''34)
• TI1..TI5 (Time band of validity of the routing): these parameters allow the user to specify up to 5 time bands for which
the CTI routing can be used.
ggg-hh1:mm1-hh2:mm2
where:
• ggg: is the indication of the day/s of the week in which the routing can be utilized and can assume the following values:
• hh1:mm1: is the indication of the beginning of the hourly interval of the validity of the routing
• hh2:mm2: is the indication of the end of the hourly interval of the validity of the routing
Default values are TI1:ALL,00:00-23:59 and TI2...TI5:#: routing is valid on all days of the week (ALL) throughout the
day (from 00.00 to 23.59). The value # on other TI means that the time intervals are disabled.
By specifying a priority value, the command shows the routing identified by specified priority.
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
2 VtoC G1 Abilis2 'ToAbilis2' *
UNLIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
The routings are scanned in sequence starting from the lowest priority. When a call arrives, all its parameters are compared
with the rules of the table. The one which satisfies all the parameters will be matched; otherwise, the CTI Router will go on
with the scan.
-------------------------------------------------------------------------------
626
Draft CTI System Draft
PR:23 DESCR:
ACT:YES EDT:NO
TYPE:VtoC POI:G1 DS:Abilis2 EEC:NO
NEXT:UNLIMITED CDI:'ToAbilis2' CDO:*
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:*
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
IG:Sys OG:Sys SG:Sys DL:Sys DH:Sys
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:6400 SC:Sys DJ:Sys MJ:Sys ECM:Sys
CODERS:Sys
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
Meaning of the routing: if a VtoC call comes from CTI group G1 (POI:G1), the called number belongs to the list
ToAbilis2 (CDI:'ToAbilis2'), routes it to the cluster Abilis2. The parameter NEXT:Unlimited routes the call to the
next routing if this one fails.
---+-----+-----------------+---------+--------------------+--------------------
PR |TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
1 StoV CtiSip PBX 5?? *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
Meaning of the routing: if Stov call comes from ctisip resource and the called number is made by three digits, starting with
5, the call is routed toward the special group PBX. The parameter SP is set to 64000 and the parameter CODERS is set to
G.711, so only sip call using this codec will be accepted.
Allowed filters:
627
Draft CTI System Draft
StoC, StoH, StoI, StoS, StoD, DtoV, DtoC, DtoH, DtoI, DtoS,
DtoD, *toV, *toC, *toH, *toI, *toS, *toD] <Optional>
POI: Input CTI port/group [1..300, *, #, G1..G32, G*, PBX,
CtiSLink, CtiH323, CtiIax, CtiDisa, CtiSip] <Optional>
SR: Source Cluster identifier [0..9, A..Z, a..z, _, :] or "#",
or a list name between primes 'list' or a string preceded
and/or followed by '*' (E.g.:"*mystr" or "mystr*" or
"*mystr*") or "*". <Optional>
POO: Output CTI port/group [1..300, #, G1..G32, PBX, CtiSLink,
CtiH323, CtiIax, CtiDisa, CtiSip] <Optional>
DS: Destination Cluster identifier [0..9, A..Z, a..z, _, :]
or "#" or "<AUTO-I>" or "<AUTO-O>" or a string preceded
and/or followed by '*' (E.g.:"*mystr" or "mystr*" or
"*mystr*") or "*". <Optional>
628
Draft CTI System Draft
629
Draft CTI System Draft
630
Draft CTI System Draft
*toVCHISD>
SCOUT: Silence compression output [NO, YES, Sys, *]
<Only for TYPE:CtoCHISD/HtoCHISD/ItoCHISD/StoCHISD/DtoCHISD/
*toVCHISD>
DJOUT: Default jitter buffer size output [*, Sys, 0..1000 ms]
It must be minor or equal to MJOUT:.
<Only for TYPE:CtoCHISD/HtoCHISD/ItoCHISD/StoCHISD/DtoCHISD/
*toVCHISD>
MJOUT: Maximum jitter buffer size output [*, Sys, 0..1000 ms]
It must be major or equal to DJOUT:.
<Only for TYPE:CtoCHISD/HtoCHISD/ItoCHISD/StoCHISD/DtoCHISD/
*toVCHISD>
CODERSOUT: Preferred list of coders for THIS routing offered to called side
[* or Sys or NONE or *,Sys or a list of one or more coder values
(see below) or *,list]
The available coders are [Transp, G.711, G.726, G.727, GSM6.10,
Spirit, G.723.1, G.729A, ILBC, SPEEX, G.711A, G.711u]. Values can be
joined using "," operator. The position in the list defines the
preference order. The right-most value is the one with the lowest
preference.
<Only for TYPE:CtoCHISD/HtoCHISD/ItoCHISD/StoCHISD/DtoCHISD/
*toVCHISD>
TI1:..TI5: Time interval in the format "day,hh:mm-hh:mm", where 'day' can be:
- a single day of the week [MO, TU, WE, TH, FR, SA, SU] or
- a set of days of the week (E.g.: MO+TH or TU+TH+SU) or
- an interval of days of the week (E.g.: MO-WE or TH-SU) or
- "ALL".
Use "#" to disable the time interval.
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
9 [cito_gsm]
CtoV Clus2 G3 * 33312345
NO ANY NO Dft * *
64000 Sys * * Sys Sys CITOBOX2422 *
NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
12 [test-citobox]
CtoV Clus1 31 * *
NO ANY NO Dft * *
64000 Sys * * Sys Sys CITOBOX241 *
-------------------------------------------------------------------------------
631
Draft CTI System Draft
Assuming to have a user who calls a number on which there's a call transfer and supposing that:
the calling number received from 01111 is the user's phone number 08889661. The number 07779660 is stored in a field
called RG, according to ISDN standard.
When the transferred call reaches centrals not complying to ISDN standard, a trick can be used: Abilis can store the number
of the initial caller (07779660) in the CG field, while the number which trasfers calls is stored in the RG field.
A call originated by a call transfer may be identified because RG field is not empty, while a normal call has RG field empty.
This is used to create special routings which are effective only for call transfers.
Set the RGI parameter to a specific value to intercept only calls originated by call transfers.
Setting RGI:*, the rule intercepts every kind of call (tranferred or not). The following table shows the range of RGI values:
632
Draft CTI System Draft
-----------+-------------------------------------------------------------------
Symbol | Meaning
-----------+-------------------------------------------------------------------
* | Don't care.
# | Missing or Empty information element
## | Missing information element
$ | Empty or Non-empty information element
?* | Non-empty information element
-----------+-------------------------------------------------------------------
The following are the log and cti connection shown during a normal call from 901 to 902. Please note that there RGO field is
empty.
Start Debug Log content real-time logging (Type CTRL+C + ENTER to stop):
-------------------------------------------------------------------------------
ID:12 TYPE:StoS ST:ALERT PR:6 STI:07/00 STO:04/00 EEC:NO
START:16/12/2010 09:59:03 DURATION:0 REMAINING:-
POI:Sip GI:# SR:# POO:Sip GO:# DS:#
CDI:ue902 CDO:ue902
CGI:uxq901 CGO:uxq901
SDI: SDO:
SGI: SGO:
RGI: RGO:
CODER:Unk SP:0 FMRLY:NO FAXSP:0 DJ:0 FMDJ:0
BW:0 SC:NO MODSP:0 MJ:0 FMMJ:0
The following are logs and cti connection shown during a trasferred call. User test (phone number 901) calls user:test2
(phone number 902). User test2 trasfers calls to a cellphone (phone number 333xxxxxx). Please note that RGO field is not
empty, because there's a transferred call.
Start Debug Log content real-time logging (Type CTRL+C + ENTER to stop):
633
Draft CTI System Draft
CG:uxq901
161210 122825 CtiSip 0 E-CallForward RULE:ALWAYS USER:test2
161210 122825 CtiSip 24 E-NumComplete CDI:ue902 CDO:ue902
161210 122825 CtiSip 25 E-CallRx CH:36 BC:Speech CD:ux8333xxxxxx
CG:uxq901 RG:uxq902 USER:test2
161210 122825 CtiSip 25 E-Route Match PR:5
161210 122825 CtiSip 25 E-CallTx BC:Speech TY:StoS
CD:ux333xxxxxx CG:uxq901
RG:uxq902 SCD:08xxxxxx
161210 122825 CtiSip 25 E-NumComplete CDI:ux83299783725
CDO:ux3299783725
161210 122825 CtiSip 26 E-CallTransfer SES/ID-IN:25 SES/ID-OUT:24
161210 122831 CtiSip 26 E-ProgressRx PI:81 88 USER:08351825479
161210 122831 CtiSip 26 E-ProgressTx PI:81 88
-------------------------------------------------------------------------------
ID:26 TYPE:StoS ST:CREQ PR:TRS[6/5] STI:09/00 STO:03/00 EEC:NO
START:16/12/2010 12:28:25 DURATION:0 REMAINING:-
POI:Sip GI:# SR:# POO:Sip GO:# DS:#
CDI:ue902 CDO:ux333xxxxxx
CGI:uxq901 CGO:uxq901
SDI: SDO:08xxxxxx
SGI: SGO:
RGI: RGO:uxq902
CODER:G.711A SP:64000 FMRLY:NO FAXSP:0 DJ:100 FMDJ:200
BW:66400 SC:YES MODSP:0 MJ:250 FMMJ:400
The cti routing pr:5 is used to call the cellphone. This rule intercept normal calls and trasferred calls, because RGI:*.
-------------------------------------------------------------------------------
PR:5 DESCR:
ACT:YES EDT:NO
TYPE:StoS POI:CtiSip POO:CtiSip EEC:NO
NEXT:NO CDI:8* CDO:'CDI.S2'
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:08xxxxxx
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:64000 SC:Sys DJ:Sys MJ:Sys ECM:Sys
CODERS:G.711
SPOUT:64000 SCOUT:* DJOUT:* MJOUT:*
CODERSOUT:G.711
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
Example: administrator can configure Abilis so that users cannot trasfer calls to cellphones. Rule pr:5 must be modified
setting RGI:## and rule pr:6 must be created.
COMMAND EXECUTED
634
Draft CTI System Draft
-------------------------------------------------------------------------------
PR:5 DESCR:
ACT:YES EDT:NO
TYPE:StoS POI:CtiSip POO:CtiSip EEC:NO
NEXT:NO CDI:8* CDO:'CDI.S2'
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:08xxxxxx
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:## RGO:*
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:64000 SC:Sys DJ:Sys MJ:Sys ECM:Sys
CODERS:G.711
SPOUT:64000 SCOUT:* DJOUT:* MJOUT:*
CODERSOUT:G.711
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
[12:44:49] ABILIS_CPX:_a ctir pr:6 type:stov poo:none cdi:8* cdo:'cdi.s2' rgi:?* sp:64000 coders:g.
COMMAND EXECUTED
-------------------------------------------------------------------------------
PR:6 DESCR:
ACT:YES EDT:NO
TYPE:StoV POI:CtiSip POO:NONE EEC:NO
NEXT:NO CDI:8* CDO:'CDI.S2'
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:*
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:?* RGO:*
IG:Sys OG:Sys SG:Sys DL:Sys DH:Sys
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:64000 SC:Sys DJ:Sys MJ:Sys ECM:Sys
CODERS:G.711
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
The following is the log of a transferred call to a cellphone: the call fails.
Start Debug Log content real-time logging (Type CTRL+C + ENTER to stop):
635
Draft CTI System Draft
If a routing with “PR:xx” is already present in the table, it will get “PR:xx+1” priority.
Example: how to configure a Transparent (TR) routing which routes every call (CDI:*) coming from the CTI Ports Group G1
(connected to the PABX) to CTI Ports Group G2 (connected to the ISDN lines), without any alternative routings.
COMMAND EXECUTED
-------------------------------------------------------------------------------
PR:3 DESCR:
ACT:YES EDT:NO
TYPE:TR POI:G1 POO:G2 EEC:NO
NEXT:NO CDI:* CDO:*
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:*
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
Warning
Changes made on the CTI routings table are not immediately active. To activate them, execute the
initialization command init ctir
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
636
Draft CTI System Draft
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 DATA CtiSLink G2 * *
-------------------------------------------------------------------------------
2 VtoC G1 Abilis2 'ToAbilis2' *
UNLIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
3 TR G1 G2 * *
-------------------------------------------------------------------------------
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 DATA CtiSLink G2 * *
-------------------------------------------------------------------------------
2 VtoC G1 Abilis2 'ToAbilis2' *
UNLIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
Warning
Changes made on the CTI routings table are not immediately active. To activate them, execute the
initialization command init ctir
Note
Parameters may change according to the TYPE of the routing selected!
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
637
Draft CTI System Draft
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 DATA CtiSLink G2 * *
-------------------------------------------------------------------------------
2 VtoC G1 Abilis2 'ToAbilis2' *
UNLIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
3 TR G1 G3 528 *
-------------------------------------------------------------------------------
Warning
Changes made on the CTI routings table are not immediately active. To activate them, execute the
initialization command init ctir
The routing which has been modified routes the calls coming from G1 to the group G3 if the called number is 528.
Other interesting parameters available on CTI Routing tables are T301, TIx, NEXT, and DS:<AUTO-I>/<AUTO-O>.
Example: enable a CTI routing just on Tuesday and Wednesday from 18:00 to 20:30.
COMMAND EXECUTED
638
Draft CTI System Draft
-------------------------------------------------------------------------------
PR:3 DESCR:
ACT:YES EDT:NO
TYPE:TR POI:G1 POO:G3 EEC:NO
NEXT:NO CDI:528 CDO:*
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:*
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
TI1:TU-WE,18:00-20:30 TI2:# TI3:# TI4:# TI5:#
Example: how to combine the use of T301 and NEXT. Calls must be forwarded to the next routing if there is no answer after
15 seconds .
---+-----+-----------------+---------+--------------------+--------------------
PR |TYPE |POI/SR [SR] |POO/DS |CDI |CDO
|NEXT |LAST |TON |T301|UDT |CGI |CGO
|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT| |SGI |SGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 DATA CtiSLink G2 * *
-------------------------------------------------------------------------------
2 VtoC G1 Abilis2 'ToAbilis2' *
UNLIMITED ANY Sys Dft NO * *
-------------------------------------------------------------------------------
3 TR G1 G2 * *
-------------------------------------------------------------------------------
4 TR G2 G1 * *
-------------------------------------------------------------------------------
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
639
Draft CTI System Draft
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
3 TR G1 G2 00 *
-------------------------------------------------------------------------------
4 TR G2 G1 00 *
TRANSFERT ANY NO 15 * *
-------------------------------------------------------------------------------
5 VtoC G2 Abilis2 * *
-------------------------------------------------------------------------------
Warning
Changes made on the CTI routings table are not immediately active. To activate them, execute the
initialization command init ctir
When routing PR:4 is matched, the call will alert for 15 seconds on G1 ports group and if no answer occurs, it will be
transferred to the next routing and compressed to “Abilis2”.
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
3 TR G1 G2 00 *
-------------------------------------------------------------------------------
4 TR G2 G1 00 *
TRANSFERT ANY NO 15 * *
-------------------------------------------------------------------------------
5 VtoC G2 Abilis2 * *
-------------------------------------------------------------------------------
COMMAND EXECUTED
640
Draft CTI System Draft
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
3 TR G2 G1 00 *
TRANSFERT ANY NO 15 * *
-------------------------------------------------------------------------------
4 VtoC G2 Abilis2 * *
-------------------------------------------------------------------------------
5 TR G1 G2 00 *
-------------------------------------------------------------------------------
Warning
Changes made on the CTI routings table are not immediately active. To activate them, execute the
initialization command init ctir
• names of input caller's address and sub-address fields: 'CGI' and 'SGI';
• names of input called's address fields and sub-address fields: 'CDI' and 'SDI';
Examples:
• CDO:'SGI': the called address field of the outgoing call will contain the same value as is contained in the field for the
called sub-address of the incoming call.
• CDO:1023'SGI': the called address field of the outgoing call will contain the numerical sequence "1023" followed by the
content of the called sub-address of the incoming call.
• CDO:1023'SGI.S02': the called address field of the outgoing call will contain the numerical sequence "1023" followed by
the content of the called sub-address of the incoming call, starting from the 2nd character (.S02).
• CDO:1023'SGI.R02': the called address field of the outgoing call will contain the numerical sequence "1023" followed by
at most two characters taken from the content of the called sub-address of the incoming call, starting from the right most
(.R02).
641
Draft CTI System Draft
CTIP:101 DESCR:
Act card:POTS-1<1>
Run OPSTATE:UP LOG:NO TYPE:USER
signalling:POTS HOLD:YES CT:ICT SS:YES
mode:Pots NUM:01
CTIP:101 DESCR:
Act card:POTS-1<1>
Run OPSTATE:UP LOG:NO TYPE:USER
signalling:POTS HOLD:YES CT:ICT SS:YES
mode:Pots NUM:01
LOOP:NO TEST:NO
CLIP:SYS CLIP-STD:SYS CLIP-TAS:SYS MIN-FLASH:SYS
SENSING:SYS ABF:SYS HPF:SYS DEBOUNCE:SYS MAX-FLASH:SYS
COUNTRY:SYS IN-GAIN-ADJ:SYS OUT-GAIN-ADJ:SYS
AT:SYS AT-CODE:SYS AT-DURATION:SYS BC:SYS
DT:SYS DT-CODE:SYS DT-DURATION:SYS OUT-DIAL-TONE:SYS
SS-PICKUP:GROUP SS-PRES-CG:YES NP-CT:SYS
SS-CF-DND:YES
Routings can be added using the POTS ports number (101-196) in POI or POO parameters.
The special value PBX can be used: CTI Router verifies the last two digits of the Called Input number and compares them
with the field NUM of the CTI POTS ports. The call is routed to the correspondent port that matches.
Example: route the calls arriving from cluster Abilis2 to the analogue devices connected to the POTS, by verifying the last
two digits of the called number (i.e. 02345678xx).
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
2 CtoV Abilis2 PBX 02345678?? *
-------------------------------------------------------------------------------
With this rule the calls to 0234567821 is routed to the ports with NUM:21.
642
Draft CTI System Draft
By configuring the routing specifying the number of the CTI POTS ports, each call will be routed on the corresponding port
without verifying the called number.
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
2 CtoV Abilis2 101 * *
-------------------------------------------------------------------------------
The routing above routes every call which comes from the cluster Abilis2 to CTIP:101.
Use the following command to display the parameters of the resource; the d p ctisys ? command shows the meaning of
parameters.
RES:CtiSys --------------------------------------------------------------------
Run DESCR:CTI_System_general_properties
- Router ---------------------------------------------------------------
ROUTING:PREFIX max-ctoc:50 au-law:A-LAW NP-CT:YES
OUT-DIAL-TONE:NO OUT-DIAL-DIGIT:0
MAIL-FROM:Abilis-Test208<[email protected]>
CALLS-LOG-DIR:C:\APP\USERS\
NAT-PREFIX:0 INT-PREFIX:00 COUNTRY-CODE:39
TON-TO-PREFIX:NO
- Last Calling number Service ------------------------------------------
LCST:6 lcs-dir:C:\APP\CTI\LCS\
- Call&Ring ------------------------------------------------------------
CALLTRY-TOUT:30 CALLTRY-NRTY:15
- Address Book ---------------------------------------------------------
addrbook-dir:C:\APP\CTI\ADDRBOOK\
ADDRBOOK-PUB-PROTECTED:NO
- EEC ------------------------------------------------------------------
TAIL:128 NLP:YES CNM:NORMAL AEC:NO
TAIL-BASE:0 NLP-A:1 VQE-TONE-DISABLER:YES AEC-TAIL:1024
HLC:NO NLP-B:0 VQE-ACT-DELAY:300 AEC-ERL-DFT:0
HLC-THR:-10 ERL-DFT:-6
- Dsp firmwares and configurations for C6412 on QPRIX and PB44X --------
CARD-TYPE: (AC482 EEC) | fw: hdlc-b: g.729a: ec: ac:
------------------------+------------------------------------
1 no no | D64V 8 YES 32 (10)
643
Draft CTI System Draft
644
Draft CTI System Draft
In the Router section, the parameter ROUTING (Routing Management) allows to set two kinds of CTI Routing functioning:
• ROUTING:EN-BLOC. The CTI Router waits to receive the complete number (from the line, the PABX or other connected
devices) before choosing the routing. The routing table management is easier, but the disadvantage is that, at the end of
dialing, the user must press the “#” on the phone or wait a time out of (generally) 5 seconds (see parameter DIALT on CTI
Ports) before the call starts.
• ROUTING:PREFIX. The CTI Router verifies the rule to match at the receipt of a single digit. The configuration of the CTI
Routing table is a bit more difficult and delicate, but the advantage is that the user is not required to press “#” on the phone
or wait any time at the end of dialing.
Besides, the out dial tone is now played when a user picks up a POTS phone and dials the OUT-DIAL-DIGIT value (the
OUT-DIAL-xx tone is played):
There are various parameters used to configure the out dial tone generation:
The section Last Calling number Service allows to choose two system parameters:
• LCST: Last Calling number Service records timeout [NONE, 1..999 hour]
The Last Calling number Service is useful if GSM/UMTS Box is installed, but it can be used with ISDN ports, CLUSTERS,
as well as with SIP and IAX users.
The section Call&Ring allows to configure two parameters about call&ring feature:
AEC Acoustic Echo Canceller. When set to YES is enables for ALL the EEC channels the capability to cancel
acoustic echo too. In normal telecom applications the AEC is not needed.
TAIL-BASE The EEC can cancel echo in the range 0..128 msec. By specifying here a value greater than 0 the range is
value+128ms. For example if TAIL-BASE is 256, the EEC is able to cancel echo between 256 and 384 msec.
Tip
Use the following command to display the availability of Extended Echo Canceler (EEC):
-------------------------------------------------------------------------------
EEC Card Chan State CurDelay MaxDelay Tail TailBase CurERL MaxERL
-------------------------------------------------------------------------------
0 QPRI-1 0 FREE
1 QPRI-1 1 FREE
2 QPRI-1 2 FREE
3 QPRI-1 3 FREE
4 QPRI-1 4 FREE
5 QPRI-1 5 FREE
6 QPRI-1 6 FREE
7 QPRI-1 7 FREE
8 QPRI-1 8 FREE
9 QPRI-1 9 FREE
10 QPRI-1 10 FREE
11 QPRI-1 11 FREE
645
Draft CTI System Draft
12 QPRI-1 12 FREE
13 QPRI-1 13 FREE
14 QPRI-1 14 FREE
15 QPRI-1 15 FREE
16 QPRI-1 16 FREE
17 QPRI-1 17 FREE
18 QPRI-1 18 FREE
19 QPRI-1 19 FREE
20 QPRI-1 20 FREE
21 QPRI-1 21 FREE
22 QPRI-1 22 FREE
23 QPRI-1 23 FREE
24 QPRI-1 24 FREE
25 QPRI-1 25 FREE
26 QPRI-1 26 FREE
27 QPRI-1 27 FREE
28 QPRI-1 28 FREE
29 QPRI-1 29 FREE
30 QPRI-1 30 FREE
31 QPRI-1 31 FREE
32 QPRI-1 32 FREE
33 QPRI-1 33 FREE
34 QPRI-1 34 FREE
35 QPRI-1 35 FREE
36 QPRI-1 36 FREE
37 QPRI-1 37 FREE
38 QPRI-1 38 FREE
39 QPRI-1 39 FREE
40 QPRI-1 40 FREE
41 QPRI-1 41 FREE
42 QPRI-1 42 FREE
43 QPRI-1 43 FREE
44 QPRI-1 44 FREE
45 QPRI-1 45 FREE
46 QPRI-1 46 FREE
47 QPRI-1 47 FREE
48 QPRI-1 48 FREE
49 QPRI-1 49 FREE
50 QPRI-1 50 FREE
51 QPRI-1 51 FREE
52 QPRI-1 52 FREE
53 QPRI-1 53 FREE
54 QPRI-1 54 FREE
55 QPRI-1 55 FREE
56 QPRI-1 56 FREE
57 QPRI-1 57 FREE
58 QPRI-1 58 FREE
59 QPRI-1 59 FREE
60 QPRI-1 60 FREE
61 QPRI-1 61 FREE
62 QPRI-1 62 FREE
63 QPRI-1 63 FREE
The output of the above command is the following if Abilis is equipped with mixed ECC cards and non-
ECC cards:
-------------------------------------------------------------------------------
EEC Card Chan State CurDelay MaxDelay Tail TailBase CurERL MaxERL
-------------------------------------------------------------------------------
*** No EECs ***
646
Draft CTI System Draft
The section named Dsp firmwares and configurations for C6412 on QPRIX and PB44X allows to choose some
parameters of the embedded vocoders.
TRANSPARENT, G711 and G729a vocoders are available as embedded vocoders through QPRIX and PB44X. The
advantage is there's no need of additional DSP. The most important characteristics and limitations are:
• echo canceller (EC) is available up to 32 ms but it can raise up to 128 ms in the version with the additional Octasic chip
(EEC)
• Mixing cards with and without additional DSPsis not allowed, as well as mixing embedded vocoders and additional DSPs
on the same card.
The choice of vocoders and echo canceller tail defines the number of available channels (ac). This number is automatically
computed by Abilis once the type of vocoder and the echo canceller tail are set.
On the left side of the section there is the card type, this is required because the QPRIX and PB44X can be manufactured in 4
main types. On the right side there are 3 parameters to configure:
The ac value is automatically computed and shows the number of available voice channels (in the above example there are 18
channels for card type 2). Use the command s p ctisys card-type:2 g.729a:no to disable g729a support for card type 2. The
number of available channels (ac) is automatically updated to 64.
Into Audio compressors defaults section there are the default values used in the system profile (Sys).
When a compressed call between two Abilis is setup, the coder use must be “negotiated”: the available coders set is defined
in CODERS field. The order of the list items defines also the order of scan precessing.
CODERS:G.711,G.726,G.727,GSM6.10,Spirit,G.723.1,G.729A,Transp
In this section there are other interesting and very important parameters:
• SC (Silence compression): enables or disables the compression of the “silence” during compressed calls for bandwidth use
reduction.
• FM-RELAY (Fax Data relay): enables or disables the Fax Relay management.
• MAX-JBUF (Max. jitter buffer size): sets the maximum compensating time of voice frames arrival variation (very
important on WAN realized on Internet connections).
Tip
As is well known, Internet lines are affected from latency and time arrival variation of frames caused by
network congestion, timing drift, or route changes (this is the definition of jitter). When Internet lines are
647
Draft CTI System Draft
used for the VoIp application, it's fundamental to set the properly CTISYS parameter to obtain good results
and good quality communication.
The jitter buffer is managed by DFT-JBUF and MAX-J BUF parameters. Too low values can cause
chopped voice (sensation of metallic sound) during emptying of jitter-buffer. Too high values can modify
the voice tone and introduce a perceptible delay of voice (also echo can be noticed). For a good optimization
evaluating the line in use is needed.
Generally, on lines with a low time arrival variation of the frames, good values can be: DFT-JBUF:80 and
MAX-JBUF:250.
In the POTS defaults section there are general parameters of CTI POTS Ports. The most important are:
• CLIP (Caller Identification Presentation): enables or disables the CLI on POTS ports (caller number visualization)
[NO:clip disabled, YES: clip enabled, EXT: the display of the phone will show the address book name, if supported from
the phone];
Through CELL section, the administrator can configure some system parameter for UMTS BOX devices:
The CITOBOX section allows to configure system parameters for CITOBOX devices:
In the Tones and ringing patterns section, the TONESET parameter allows to choose the dial tone and other tones (i.e.
alerting tone, busy tone…). By default, it is set to ABILIS and it means that the dial tone is a continuous one, but others are
available: ITALY (simulates the Italian Telecom dial tone) or USERDEF (allows the user to customize the tones). The tones
change by configuring the sequence and the duration of TONEs and SILENCEs (T1, S1, T2...).
Into Clock sources section it is possible to select where the port(s) take the ISDN clock signal. These are the available
values:
648
Draft CTI System Draft
• ANYTE: clock signal is taken from one of the TE ISDN ports that are present in the configuration; scanning from left to
right;
• LIST: clock signal is taken from one of the ports manually inserted into P1...P50 fields; scanning from left to right.
Ctisys parameters are distributed to all the routings, but on each routing they can be manually changed.
-------------------------------------------------------------------------------
PR:4 DESCR:
ACT:YES EDT:NO
TYPE:VtoC POI:G2 DS:Abilis2 EEC:NO
NEXT:UNLIMITED CDI:* CDO:*
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:*
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
IG:Sys OG:Sys SG:Sys DL:Sys DH:Sys
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:6400 SC:Sys DJ:Sys MJ:Sys ECM:Sys
CODERS:Sys
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
The CITIBOX section allows to configure the CITOBOX default audio settings:
CTIP:38 ----------------------------------------------------------------------
Port_to_Telecom
OPSTATE:UP STATE:UP
------------------------------------------------------------------------
CH: STATE: [Q932-STATE:] CG: [SCG:] CD: [SCD:]
------------------------------------------------------------------------
*** All channels disconnected ***
- Sapi ------- TEI -- STATE --------------------------------------------
16 (X.25 ) 10 00-INACTIVE
0 (Q.931) 102 07-CONNECTED
------------------------------------------------------------------------
ISDN-STATE:F7-READY LINE-DOWN:1 SLIPS:N/A
649
Draft CTI System Draft
Data shows that the physical layer is UP (ISDN-STATE:F7-READY) and the TEI has been correctly negotiated (TEI-102
, STATE:07-CONNECTED). The message “*** All channels disconnected ***” indicates that no calls are connected.
CTIP:1 ----------------------------------------------------------------------
OPSTATE:UP STATE:UP
------------------------------------------------------------------------
CH: STATE: [Q932-STATE:] CG: [SCG:] CD: [SCD:]
------------------------------------------------------------------------
1 10-CONNECTED-FROM 3462244566
5 10-CONNECTED-TO 38227064
11 10-CONNECTED-TO 231
14 10-CONNECTED-FROM 347855710
15 07-LOC-ALERT 335586497 509
17 10-CONNECTED-TO 2
- Sapi ------- TEI -- STATE --------------------------------------------
16 (X.25 ) 10 00-INACTIVE
0 (Q.931) 0 07-CONNECTED
------------------------------------------------------------------------
ISDN-STATE:PRI-UP SLIPS:63
RxAlarms:NONE TxAlarms:NONE
Data shows that the physical layer is UP (ISDN-STATE:PRI-UP) and the TEI has been correctly negotiated (TEI-0
STATE:07-CONNECTED). Several calls are present (CONNECTED-FROM , CONNECTED-TO) on this port and for each one
the corresponding PRI channel in use (CH:1-5-11...) is indicated.
CTIP:31 ----------------------------------------------------------------------
TO_PBX
--- Cleared 0 days 06:55:06 ago, on 24/11/2010 at 09:00:34 -------------
Layer 3 Q.931
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FAIL-CALL | 0| 0|SUCC-CALL | 0| 0|
TIME-CALL | 0| 0|
------------------------------------------------------------------------
Layer 2 Sapi 16 (X.25) TEI:10
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
T200-DN | | 0|T200-UP | | 0|
REP | 0| 0|INFO | 0| 0|
UI | 0| 0|RR | 0| 0|
RNR | 0| 0|REJ | 0| 0|
FRMR | 0| 0|SABME | 0| 0|
UA | 0| 0|DISC | 0| 0|
DM | 0| 0|N200-OVER | | 0|
SHORT | 0| |LONG | 0| |
UNK-SAPI | 0| |BAD-FRM | 0| |
------------------------------------------------------------------------
Layer 2 Sapi 0 (Q.931) TEI:ALL
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
T200-DN | | 0|T200-UP | | 0|
REP | 0| 0|INFO | 4| 4|
650
Draft CTI System Draft
The data “Cleared DDD:HH:MM:SS ago, at DD/MM/YYYY HH:MM:SS” shows the time interval elapsed from the last
reset of statistics (in the format “days:hours:minutes:seconds”) and date/time of its execution (in the format “day:month:year”
and “hours:minutes:seconds”).
All the other statistics present give detailed and sensitive informations about the connection between Abilis and the other
devices (i.e. PABX, the ISDN line…). The statistics regard all the three level of ISO-OSI model:
• the physical layer (Layer 1) which shows the number of physical errors, the characters both on D-Channel and B-Channels
and so on;
• the LAPD level (Layer 2) which shows the number of packets that the devices exchange;
• the Q.931 level (Layer 3) which the information about the overall duration of the connection or the number of successful
incoming calls over all the channels.
CTIP:31 ----------------------------------------------------------------------
Linea_ISDN_verso_PABX
--- Cleared 0 days 06:56:41 ago, on 24/11/2010 at 09:00:34 -------------
Layer 3 Q.931
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FAIL-CALL | 0| 0|SUCC-CALL | 0| 0|
TIME-CALL | 0| 0|
------------------------------------------------------------------------
Layer 2 Sapi 16 (X.25) TEI:10
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
T200-DN | | 0|T200-UP | | 0|
REP | 0| 0|INFO | 0| 0|
UI | 0| 0|RR | 0| 0|
RNR | 0| 0|REJ | 0| 0|
651
Draft CTI System Draft
FRMR | 0| 0|SABME | 0| 0|
UA | 0| 0|DISC | 0| 0|
DM | 0| 0|N200-OVER | | 0|
SHORT | 0| |LONG | 0| |
UNK-SAPI | 0| |BAD-FRM | 0| |
------------------------------------------------------------------------
Layer 2 Sapi 0 (Q.931) TEI:0
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
T200-DN | | 0|T200-UP | | 0|
REP | 0| 0|INFO | 4| 4|
UI | 0| 0|RR | 4993| 4993|
RNR | 0| 0|REJ | 0| 0|
FRMR | 0| 0|SABME | 1| 1|
UA | 1| 1|DISC | 0| 0|
DM | 0| 0|N200-OVER | | 0|
SHORT | 0| |LONG | 0| |
UNK-SAPI | 0| |BAD-FRM | 0| |
------------------------------------------------------------------------
Layer 1 B-Channels (HDLC)
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 0| 0|FRM | 0| 0|
CHR-D | 0| 0|FRM-D | 0| 0|
CHR-V | 0| 0|FRM-V | 0| 0|
CHR-C | 0| 0|FRM-C | 0| 0|
ERRORS | 0| 0| | | |
D-ABORT | | 0|D-LONG | 0| 0|
D-TXUND | | 0|D-SHORT | | 0|
D-LOST | 0| | | | |
V-ABORT | | 0|V-LONG | 0| 0|
V-TXUND | | 0|V-SHORT | | 0|
V-LOST | 0| | | | |
C-ABORT | | 0|C-LONG | 0| 0|
C-TXUND | | 0|C-SHORT | | 0|
C-LOST | 0| | | | |
ABORT | 0| |UNALIGNED | 0| |
BAD-FCS | 0| |SHORT | 0| |
CHR-OVR | 0| |FRM-OVR | 0| |
------------------------------------------------------------------------
Layer 1 D-Channel
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CHR | 20034| 20034|FRM | 4999| 4999|
CHR-D | 20034| 20034|FRM-D | 4999| 4999|
ERRORS | 1| 0| | | |
D-ABORT | | 0|D-LONG | 0| 0|
D-TXUND | | 0|D-SHORT | | 0|
D-LOST | 0| | | | |
ABORT | 0| |UNALIGNED | 0| |
BAD-FCS | 1| |SHORT | 0| |
CHR-OVR | 0| |FRM-OVR | 0| |
------------------------------------------------------------------------
Layer 1 alarms
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SLIPS | N/A| N/A|LINE-DOWN | 0| |
------------------------------------------------------------------------
The informations displayed are the same as previously, but more detailed and splitted (i.e. the generic “ERRORS” is
subdivided in D-ABORT, D-TXUND, ABORT, BAD-FCS…).
652
Draft CTI System Draft
d s cticl / d se cticl Shows statistics about clusters such as the number of total/successful/failed calls, the
total duration of the calls and the statistics of the DSP.
---------+---------+-----------------------------------------------------------
CLUS: |Int |STATE:
---------+---------+-----------------------------------------------------------
CPX_1 1 [01] ALL-UP
CPX_2 2 [02] ALL-UP
CPX_3 3 [03] ALL-UP
CPX_4 4 [04] ALL-UP
653
Draft CTI System Draft
d s ctil / d se ctil Shows statistics about links such as the number of total/successful/failed calls and the
total duration of all calls.
ID:1 CLUS:CPX_1
--- Cleared 3 days 17:25:39 ago, on 10/01/2008 at 20:17:52 ------------------
----------------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL | 68| 5|SUCC-CALL | 44| 3|
FAIL-CALL | 24| 2|TIME-CALL | 9820| 241|
GROUP-MAXBW-OVR | 0| 0|VFM-OVR | | 0|
GROUP-MAXCON-OVR| 0| 0|Q931c-OVR | | 0|
-----------------------------------------------------------------------------
ID:2 CLUS:CPX_2
--- Cleared 3 days 17:25:39 ago, on 10/01/2008 at 20:17:52 ------------------
----------------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL | 0| 1|SUCC-CALL | 0| 1|
FAIL-CALL | 0| 0|TIME-CALL | 0| 0|
GROUP-MAXBW-OVR | 0| 0|VFM-OVR | | 0|
GROUP-MAXCON-OVR| 0| 0|Q931c-OVR | | 0|
-----------------------------------------------------------------------------
ID:3 CLUS:CPX_3
--- Cleared 3 days 17:25:39 ago, on 10/01/2008 at 20:17:52 ------------------
----------------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL | 3| 2|SUCC-CALL | 3| 1|
FAIL-CALL | 0| 1|TIME-CALL | 563| 56|
GROUP-MAXBW-OVR | 0| 0|VFM-OVR | | 0|
GROUP-MAXCON-OVR| 0| 0|Q931c-OVR | | 0|
-----------------------------------------------------------------------------
ID:4 CLUS:CPX_4
--- Cleared 3 days 17:25:39 ago, on 10/01/2008 at 20:17:52 ------------------
----------------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CALL | 7| 15|SUCC-CALL | 6| 12|
FAIL-CALL | 1| 3|TIME-CALL | 1211| 5317|
GROUP-MAXBW-OVR | 0| 0|VFM-OVR | | 0|
GROUP-MAXCON-OVR| 0| 0|Q931c-OVR | | 0|
-----------------------------------------------------------------------------
Values of VMF-OVR and Q931c-OVR fields greater than zero show there is some sort of overload of the system (it is needed
to check for abnormal CPU consumption). A value greater than 0 may also indicate an overload of the cluster, i.e. an attempt
to use more bandwidth than the link itself is able to sustain.
ID Type Input Output PR State Cgi (Calling In) Cdo (Called Out)
654
Draft CTI System Draft
ID Type Input Output PR State Cgi (Calling In) Cdo (Called Out)
---- ---- -------- -------- --- ------ ------------------- --------------------
1260 CtoC CPINLIN PlinkCo2 100 ACTIVE 702 0033382501154
1261 VtoC 37 PlinkCo2 138 ACTIVE 35 0458960815
-------------------------------------------------------------------------------
ID:1260 TYPE:CtoC ST:ACTIVE PR:100 STI:10/00 STO:10/00 EEC:NO
START:20/12/2010 08:36:33 DURATION:105 REMAINING:-
POI:305 GI:# SR:CPINLIN POO:351 GO:# DS:PlinkCo2
CDI:ue0033382501154 CDO:ue0033382501154
CGI:ueay702 CGO:neay03761626202
SDI: SDO:
SGI: SGO:
RGI: RGO:
CODER:Spirit SP:6400 FMRLY:YES FAXSP:9600 DJ:0 FMDJ:200
BW:11000 SC:NO MODSP:7200 MJ:100 FMMJ:400
-------------------------------------------------------------------------------
ID:1261 TYPE:VtoC ST:ACTIVE PR:138 STI:10/00 STO:10/00 EEC:NO
START:20/12/2010 08:37:13 DURATION:67 REMAINING:-
POI:37 GI:# SR:# POO:351 GO:# DS:PlinkCo2
CDI:ue00458960815 CDO:ue0458960815
CGI:uxay35 CGO:neay03761626235
SDI: SDO:35
SGI: SGO:
RGI: RGO:
CODER:Spirit SP:6400 FMRLY:YES FAXSP:9600 DJ:50 FMDJ:200
CTIAC:0 BW:11000 SC:NO MODSP:7200 MJ:150 FMMJ:400
MODE:VOICE CurJ:120 TopJ:140 AvgJ:87 FaxPg:0 ECM:NO
UND:39 OVR:22
-------------------------------------------------------------------------------
AC Card DSP/C Bus/TS DSPState ACState ModeIn ModeOut Coder Ctip/BC
-------------------------------------------------------------------------------
0 BRI4-2 0/0 1/00 RUN IDLE - - - -
1 BRI4-2 0/1 1/01 RUN IDLE - - - -
2 BRI4-2 0/2 1/02 RUN IDLE - - - -
3 BRI4-2 0/3 1/03 RUN IDLE - - - -
4 BRI4-2 1/0 1/05 RUN IDLE - - - -
5 BRI4-2 1/1 1/06 RUN IDLE - - - -
6 BRI4-2 1/2 1/07 RUN IDLE - - - -
655
Draft CTI System Draft
-------------------------------------------------------------------------------
AC Card DSP/C Bus/TS DSPState ACState ModeIn ModeOut Coder Ctip/BC
Dtmf DhVol DlVol FmLevel InGain OutGain SigGain MaxFaxSp MaxModSp
SC V-DJ V-MJ V-CurJ V-TopJ V-AvgJ EC BypassCoder
ECM FM-DJ FM-MJ FM-CurJ FM-TopJ FM-AvgJ FaxTxPg FaxFlowState
-------------------------------------------------------------------------------
0 BRI4-2 0/0 8/00 RUN IDLE - - - -
1 BRI4-2 0/1 8/01 RUN IDLE - - - -
2 BRI4-2 0/2 8/02 RUN IDLE - - - -
3 BRI4-2 0/3 8/03 RUN IDLE - - - -
4 BRI4-2 1/0 9/05 RUN IN-USE VOICE VOICE Spirit/6.4k 108/01
OUTBAND -4 -6 -9 0 0 0 9600 7200
NO 50 150 80 100 68 YES -
200 400 0 0 0 0 -
5 BRI4-2 1/1 9/06 RUN IDLE - - - -
6 BRI4-2 1/2 9/07 RUN IDLE - - - -
7 BRI4-2 1/3 9/08 RUN IDLE - - - -
8 UG-1 0/0 0/00 RUN IDLE - - - -
9 UG-1 0/1 0/01 RUN IDLE - - - -
The following command shows the available coders supported by CTI cards installed and the number of simultaneous calls.
RES:CtiSys --------------------------------------------------------------------
CTI_System_general_properties
CTIR-STATE:ENABLED CALLS-CURRENT:1 CALLS-PEAK:7
AC-STATE:ENABLED AC-CURRENT:0 AC-PEAK:5
------------------------------------------------------------------------
-- Number of simultaneous calls ----------------------------------------
| State: Alerting/Connected | State: Any |
---------------|---Current---|----Peak-----|---Current---|----Peak-----|
TR | 0 | 3 | 0 | 3 |
DATA | 0 | 0 | 0 | 0 |
VtoCHISD | 0 | 3 | 0 | 3 |
CHISDtoCHISD | 1 | 6 | 1 | 6 |
CHISDtoV | 0 | 2 | 0 | 2 |
ALL | 1 | 7 | 1 | 7 |
------------------------------------------------------------------------
- Available coders -----------------------------------------------------
-- Coder ---|-- Bit rates (kbps) --|-- Coder ---|-- Bit rates (kbps) --|
G.711A |64 |G.711u |64 |
G.723.1 |5.3, 6.3 |G.726 |16, 24, 32, 40 |
G.729A |8 |TRANSPARENT |64 |
Spirit |6.4, 7.2, 8, 8.8, 9.6 |G.727 |16/16, 24/16, 24/24, |
| | |32/16, 32/24, 32/32, |
| | |40/16, 40/24, 40/32 |
------------------------------------------------------------------------
- Clock Sources for H100 cards -----------------------------------------
CLK:38
- Clock Sources for NOT-H100 cards -------------------------------------
*** No NOT-H100 cards running ***
Type the following commands to show the statistics about DSP and audio coders:
656
Draft CTI System Draft
-------------------------------------------------------------------------------
AC's Statistics were cleared 6 days 11:37:33 ago, on 13/12/2010 at 21:12:18
-------------------------------------------------------------------------------
AC:0 CARD:BRI4-2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
OPEN | 86| |CLOSE | 86| |
PCK | 521791| 446607|CHR | 20656562| 15657186|
VOICE-UND | | 424|FM-UND | | 0|
VOICE-OVR | | 105|FM-OVR | | 0|
VOICE-LOST | 0| |FM-LOST | 0| |
FRM | 633056| 446390|FRM-FAX-BYP| 0| 0|
FRM-VOICE | 501398| 429708|FRM-FAX-REL| 88| 1291|
FRM-SILENCE| 120687| 15317|FRM-CED | 1| 2|
FRM-SID | 7502| 0|FRM-FAX-DUM| 3330| |
FRM-DTMF | 50| 0|FAX-TOUT | 0| |
TX-UND | | 404|RX-OVR | 0| |
MDC | 0| |CMD | | 1376|
------------------------------------------------------------------------
AC:1 CARD:BRI4-2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
OPEN | 83| |CLOSE | 83| |
PCK | 266191| 222528|CHR | 16375754| 13084940|
VOICE-UND | | 3117|FM-UND | | 0|
VOICE-OVR | | 314|FM-OVR | | 0|
VOICE-LOST | 1| |FM-LOST | 0| |
FRM | 339277| 222144|FRM-FAX-BYP| 0| 0|
FRM-VOICE | 256918| 209117|FRM-FAX-REL| 630| 5469|
FRM-SILENCE| 62069| 7497|FRM-CED | 7| 0|
FRM-SID | 3175| 0|FRM-FAX-DUM| 16445| |
FRM-DTMF | 33| 2|FAX-TOUT | 0| |
TX-UND | | 2886|RX-OVR | 1| |
MDC | 0| |CMD | | 1093|
------------------------------------------------------------------------
AC:2 CARD:BRI4-2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
OPEN | 85| |CLOSE | 85| |
PCK | 212028| 213795|CHR | 11544936| 11103158|
VOICE-UND | | 677|FM-UND | | 0|
VOICE-OVR | | 341|FM-OVR | | 3|
VOICE-LOST | 2| |FM-LOST | 0| |
FRM | 258895| 213321|FRM-FAX-BYP| 0| 0|
FRM-VOICE | 205093| 206882|FRM-FAX-REL| 707| 1828|
FRM-SILENCE| 44488| 4546|FRM-CED | 2| 4|
FRM-SID | 2275| 0|FRM-FAX-DUM| 6324| |
FRM-DTMF | 6| 3|FAX-TOUT | 0| |
TX-UND | | 615|RX-OVR | 0| |
MDC | 0| |CMD | | 1224|
------------------------------------------------------------------------
AC:3 CARD:BRI4-2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
OPEN | 81| |CLOSE | 81| |
PCK | 329029| 353294|CHR | 16531696| 14974230|
VOICE-UND | | 3287|FM-UND | | 0|
VOICE-OVR | | 1369|FM-OVR | | 0|
VOICE-LOST | 5| |FM-LOST | 0| |
FRM | 414667| 351840|FRM-FAX-BYP| 0| 0|
FRM-VOICE | 320074| 340720|FRM-FAX-REL| 176| 1323|
657
Draft CTI System Draft
AC:4 CARD:BRI4-2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
OPEN | 84| |CLOSE | 84| |
PCK | 424578| 388329|CHR | 37589920| 34629560|
VOICE-UND | | 663|FM-UND | | 0|
VOICE-OVR | | 566|FM-OVR | | 3|
VOICE-LOST | 0| |FM-LOST | 0| |
FRM | 479323| 387648|FRM-FAX-BYP| 0| 0|
FRM-VOICE | 414983| 381352|FRM-FAX-REL| 983| 88|
FRM-SILENCE| 57939| 6141|FRM-CED | 0| 4|
FRM-SID | 3063| 0|FRM-FAX-DUM| 2292| |
FRM-DTMF | 63| 0|FAX-TOUT | 0| |
TX-UND | | 629|RX-OVR | 0| |
MDC | 0| |CMD | | 1271|
------------------------------------------------------------------------
AC:5 CARD:BRI4-2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
OPEN | 84| |CLOSE | 84| |
PCK | 600272| 497017|CHR | 26027434| 19455056|
VOICE-UND | | 579|FM-UND | | 0|
VOICE-OVR | | 119|FM-OVR | | 0|
VOICE-LOST | 0| |FM-LOST | 0| |
FRM | 734820| 496826|FRM-FAX-BYP| 0| 0|
FRM-VOICE | 576501| 481701|FRM-FAX-REL| 126| 1948|
FRM-SILENCE| 144277| 13088|FRM-CED | 2| 2|
FRM-SID | 8851| 0|FRM-FAX-DUM| 5061| |
FRM-DTMF | 2| 34|FAX-TOUT | 0| |
TX-UND | | 249|RX-OVR | 0| |
MDC | 0| |CMD | | 1153|
------------------------------------------------------------------------
AC:6 CARD:BRI4-2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
OPEN | 84| |CLOSE | 84| |
PCK | 374751| 373547|CHR | 18749814| 16331086|
VOICE-UND | | 1775|FM-UND | | 0|
VOICE-OVR | | 904|FM-OVR | | 2|
VOICE-LOST | 3| |FM-LOST | 0| |
FRM | 488459| 372587|FRM-FAX-BYP| 0| 0|
FRM-VOICE | 357758| 355873|FRM-FAX-REL| 1495| 2515|
FRM-SILENCE| 113082| 14123|FRM-CED | 4| 2|
FRM-SID | 5827| 0|FRM-FAX-DUM| 10236| |
FRM-DTMF | 57| 11|FAX-TOUT | 0| |
TX-UND | | 1517|RX-OVR | 1| |
MDC | 0| |CMD | | 1229|
------------------------------------------------------------------------
AC:7 CARD:BRI4-2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
OPEN | 81| |CLOSE | 81| |
PCK | 444140| 354474|CHR | 19114900| 14292406|
VOICE-UND | | 1133|FM-UND | | 0|
VOICE-OVR | | 438|FM-OVR | | 0|
VOICE-LOST | 5| |FM-LOST | 0| |
658
Draft CTI System Draft
AC:8 CARD:UG-1
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
OPEN | 7| |CLOSE | 7| |
PCK | 23489| 26284|CHR | 4231724| 3758240|
VOICE-UND | | 1|FM-UND | | 0|
VOICE-OVR | | 0|FM-OVR | | 0|
VOICE-LOST | 0| |FM-LOST | 0| |
FRM | 525661| 525661|FRM-FAX-BYP| 0| 0|
FRM-VOICE | 25778| 23489|FRM-FAX-REL| 0| 0|
FRM-SILENCE| 0| 0|FRM-CED | 0| 0|
FRM-SID | 0| 0|FRM-FAX-DUM| 0| |
FRM-DTMF | 506| 0|FAX-TOUT | 0| |
TX-UND | | 2899|RX-OVR | 0| |
MDC | 0| |CMD | | 0|
------------------------------------------------------------------------
AC:9 CARD:UG-1
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
OPEN | 31| |CLOSE | 31| |
PCK | 201627| 212001|CHR | 34132161| 32260320|
VOICE-UND | | 8735|FM-UND | | 0|
VOICE-OVR | | 0|FM-OVR | | 0|
VOICE-LOST | 0| |FM-LOST | 0| |
FRM | 4239821| 4239851|FRM-FAX-BYP| 0| 0|
FRM-VOICE | 211833| 201627|FRM-FAX-REL| 0| 0|
FRM-SILENCE| 0| 0|FRM-CED | 0| 0|
FRM-SID | 0| 0|FRM-FAX-DUM| 0| |
FRM-DTMF | 168| 0|FAX-TOUT | 0| |
TX-UND | | 10983|RX-OVR | 0| |
MDC | 0| |CMD | | 0|
------------------------------------------------------------------------
RES:CtiSys --------------------------------------------------------------------
CTI_System_general_properties
--- Cleared 6 days 11:38:43 ago, on 13/12/2010 at 21:12:18 --------------
-- Number of successful (connected) calls, updated at call end ----------
------------|---INPUT---|--OUTPUT---|--LOCAL----|--TRANSIT--|----SUM----|
TR | 4| 7| 76| 0| 87|
DATA | 0| 0| 0| | 0|
VtoCHISD | 3| 148| 0| 31| 182|
CHISDtoCHISD| 34| 1| 0| 334| 369|
CHISDtoV | 99| 0| 2| 6| 107|
SUM | 140| 156| 78| 371| 745|
-------------------------------------------------------------------------
-- Seconds of successful (connected) calls, updated at call end ---------
------------|---INPUT---|--OUTPUT---|--LOCAL----|--TRANSIT--|----SUM----|
TR | 954| 1099| 5914| 0| 7967|
DATA | 0| 0| 0| | 0|
VtoCHISD | 37| 31690| 0| 4265| 35992|
CHISDtoCHISD| 1877| 40| 0| 98884| 100801|
CHISDtoV | 28223| 0| 542| 3825| 32590|
659
Draft CTI System Draft
660
Draft CTI System Draft
Site 1:
• encapsulation: fr-ietf
• standard: cisco
• DLCI: 20
• IP address: 80.80.80.80/32
• 0212345678
• 1 ISDN PBX
Site 2:
• VPI: 8
• VCI: 35
• username: abilis_2
• password: abilis_2
• 0611223344
• 1 ISDN PBX
Warning
The eth-1 card and the ip-1 resource are already present in the configuration.
• ABILIS 1
661
Draft CTI System Draft
COMMAND EXECUTED
COMMAND EXECUTED
The execution of this command adds 4 synchronous port: use the sync-1 port and set up the clock source (external) and
the speed (Access Rate):
COMMAND EXECUTED
COMMAND EXECUTED
Associate the lowres:sync-1 to the fr-1 resource and set up the standard (cisco), the Access Rate (2048000 bit/sec)
and activate the LMI:
COMMAND EXECUTED
COMMAND EXECUTED
Associate the lowres:fr-1 to the ip-2 resource and set up the encapsulation type (fr-ietf):
COMMAND EXECUTED
Set up the IP address of the HDSL line and the NAT type (outside):
COMMAND EXECUTED
• DLCI=20
• CIR=1024000 bit/sec
• BC=CIR*TC=512000*0.010=5120 bit
• BE=(PCR-MCR)*TC=(1600000-512000)*0.010=10880 [bit].
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
663
Draft CTI System Draft
COMMAND EXECUTED
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES and LMPX parameter from YES to EXT.
COMMAND EXECUTED
[16:16:35] ABILIS_CPX_1:a ipacl pr:0 type:permit ipcos:high tos-in:*-d prot:udp sa:* da:* sip:int
COMMAND EXECUTED
• ABILIS 2
COMMAND EXECUTED
Add the ADSL USB modem. The execution of this command creates the adsl-1 resource.
664
Draft CTI System Draft
COMMAND EXECUTED
COMMAND EXECUTED
Associate the ip-2 resource to the lowres:adsl-1 and set up the IP address of the resource (retrieve), the IP address
of the neighbour router (retrieve) and the NAT type (outside):
COMMAND EXECUTED
Set up the encapsulation type (ppp-enc), the Virtual Path Identifier (VPI) and the Virtual Channel Identifier (VCI) of
the ADSL line:
COMMAND EXECUTED
Configure the authentication parameters (username and password) of the ADSL line:
COMMAND EXECUTED
Set up the speedlimit with a speed slightly lower than the upload speed of the ADSL line:
COMMAND EXECUTED
665
Draft CTI System Draft
------------------------------------------------------------------------
DESCR:
LOG:DS max-vc:1 aal5-max-payload:2100 aal5-payload-rxbuf:30
usb-rx-bufsize:1728 usb-rx-buf:3 usb-tx-bufsize:3200
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
666
Draft CTI System Draft
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES and LMPX parameter from YES to EXT.
COMMAND EXECUTED
[16:16:35] ABILIS_CPX_2:a ipacl pr:0 type:permit ipcos:high tos-in:*-d prot:udp sa:* da:* sip:int
COMMAND EXECUTED
COMMAND EXECUTED
The execution of this command creates the CTI ports from 31 to 34. Configure the ports 31 and 32 towards PBX and 33
and 34 ports to ISDN lines:
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Add G1 group that groups CTI ports towards PBX and G2 that groups CTI ports towards ISDN lines:
COMMAND EXECUTED
COMMAND EXECUTED
667
Draft CTI System Draft
1 NO R ST |31 32 . . . |. . . . .
--------------------------------------+--------------------+-------------------
To_ISDN_lines
2 NO R ST |33 34 . . . |. . . . .
--------------------------------------+--------------------+-------------------
Add To_Site_2 list containing numbers to route towards tunnel; the list contains the unique number of “Site
2” (0611223344):
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Add a CTI Link and associate the Site_2 cluster to ip-5 resource:
COMMAND EXECUTED
---------+----------------------+---------+-----+-----------+------------------
CLUS: |[DESCR:]
[Int] |CG-IN-REWRITE: |RG-IN: |SS: |LCS-GROUP: |CLIP-RULE:
|NUM: |CPO:
|NUMx:
---------+----------------------+---------+-----+-----------+------------------
Site_2 Compressed_phones_towards_Site_2
[ 1] - DISABLE NO NONE PRIVATE
* NO
-------------------------------------------------------------------------------
668
Draft CTI System Draft
COMMAND EXECUTED
Add a CTI routing (type:CtoV) for calls coming from “Site 2” and directed to the local PBX:
COMMAND EXECUTED
Add a CTI routing (type:VtoC) for compressed calls directed to “Site 2”, with next parameter set to u (unlimited) to
route calls on ISDN lines if it is not possible to route them towards the Tunnel:
COMMAND EXECUTED
Add two CTI routings (type:TR) to guarantee the transparent calls from PBX towards ISDN lines and from PBX towards
ISDN lines:
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 DATA CtiSLink G2 * *
-------------------------------------------------------------------------------
2 CtoV * G1 'Node' *
-------------------------------------------------------------------------------
3 VtoC G1 Site_2 'To_site_2' *
UNLIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
4 TR G1 G2 * *
-------------------------------------------------------------------------------
5 TR G2 G1 * *
-------------------------------------------------------------------------------
669
Draft CTI System Draft
Tip
Remember to save the configuration with the save conf command.
• ABILIS 2
The configuration of CTI ports and CTI groups is identical to “Abilis 1”. For the remaining configuration it is only needed
to change the ISDN numbers.
Add To_Site_1 list containing numbers to route towards tunnel; in this example the list contains the unique number of
“Site 1” (0212345678):
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Add a CTI Link and associate the Site_1 cluster to ip-5 resource:
COMMAND EXECUTED
---------+----------------------+---------+-----+-----------+------------------
CLUS: |[DESCR:]
[Int] |CG-IN-REWRITE: |RG-IN: |SS: |LCS-GROUP: |CLIP-RULE:
|NUM: |CPO:
|NUMx:
---------+----------------------+---------+-----+-----------+------------------
670
Draft CTI System Draft
Site_1 Compressed_phones_towards_Site_1
[ 1] - DISABLE NO NONE PRIVATE
* NO
-------------------------------------------------------------------------------
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 DATA CtiSLink G2 * *
-------------------------------------------------------------------------------
2 CtoV * G1 'Node' *
-------------------------------------------------------------------------------
3 VtoC G1 Site_1 'To_site_1' *
UNLIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
4 TR G1 G2 * *
-------------------------------------------------------------------------------
5 TR G2 G1 * *
-------------------------------------------------------------------------------
Tip
Remember to save the configuration with the save conf command.
671
Draft CTI System Draft
Site 1:
• Add an ADSL line with the following parameters to the previous configuration:
• VPI: 8
• VCI: 35
• username: abilis_1
• password: abilis_1
Site 2:
• VPI:8
• VCI:35
• IP address: 61.61.61.61/30
• 2 ISDN Basic Rate Interface lines (Point-to-Point) with the following numbers:
• 1 ISDN PBX
672
Draft CTI System Draft
Warning
The eth-1 card and the ip-1 resource are already present in the configuration.
• ABILIS 1
Add the ADSL USB modem. The execution of this command creates the adsl-1 resource.
COMMAND EXECUTED
COMMAND EXECUTED
Associate the ip-3 resource to the lowres:adsl-1 and set up the IP address of the resource (retrieve), the IP address
of the neighbour router (retrieve) and the NAT type (outside):
COMMAND EXECUTED
Set up the encapsulation type (ppp-enc), the Virtual Path Identifier (VPI) and the Virtual Channel Identifier (VCI) of
the ADSL line:
COMMAND EXECUTED
Configure the authentication parameters (username and password) of the ADSL line:
COMMAND EXECUTED
Set up the speedlimit with a speed slightly lower than the upload speed of the ADSL line:
COMMAND EXECUTED
673
Draft CTI System Draft
maxmru:1500 DNS:NO
- Authentication -------------------------------------------------------
USERNAME:abilis_1
PASSWORD:******** LOCAL:CHAP,PAP
SERVNAME: REMOTE:NONE
REPEAT:0
RES:Adsl-1 - Not Saved (SAVE CONF) --------------------------------------------
------------------------------------------------------------------------
DESCR:
LOG:DS max-vc:1 aal5-max-payload:2100 aal5-payload-rxbuf:30
usb-rx-bufsize:1728 usb-rx-buf:3 usb-tx-bufsize:3200
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES.
It is important to ensure that outgoing packets are routed towards the appropriate resource. If it is necessary, add a static
towards the remote Abilis (ip:61.61.61) through IP-2 resource.
COMMAND EXECUTED
674
Draft CTI System Draft
• ABILIS 3
COMMAND EXECUTED
Add the ADSL USB modem. The execution of this command creates the adsl-1 resource.
COMMAND EXECUTED
COMMAND EXECUTED
Associate the ip-2 resource to the lowres:adsl-1 and set up the IP address and the NAT type (outside):
COMMAND EXECUTED
Set up the encapsulation type (enc), the Virtual Path Identifier (VPI) and the Virtual Channel Identifier (VCI) of the
ADSL line:
COMMAND EXECUTED
Set up the speedlimit with a speed slightly lower than the upload speed of the ADSL line:
COMMAND EXECUTED
675
Draft CTI System Draft
OUTSPL:YES OUTSP:240
INBUF:0 mru:1500 SRCV:NO
- TRFA section ---------------------------------------------------------
TRFA:NO
- Link -----------------------------------------------------------------
LLOG:DS LMPX:NO LCOMP:NO LCR:NO
LT1:1000 LT3:3000 LN2:3 LCRKEY:DFT
- ATM/ADSL -------------------------------------------------------------
VPI:8 VCI:35
RES:Adsl-1 - Not Saved (SAVE CONF) --------------------------------------------
------------------------------------------------------------------------
DESCR:
LOG:DS max-vc:1 aal5-max-payload:2100 aal5-payload-rxbuf:30
usb-rx-bufsize:1728 usb-rx-buf:3 usb-tx-bufsize:3200
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
Tip
Saving the configuration with save conf command, the validation procedure will automatically change the
parameter MPX (Multiplexing) from NO to YES.
COMMAND EXECUTED
676
Draft CTI System Draft
[16:16:35] ABILIS_CPX_3:a ipacl pr:0 type:permit ipcos:high tos-in:*-d prot:udp sa:* da:* sip:int
COMMAND EXECUTED
COMMAND EXECUTED
Add a CTI Link and associate the Site_3 cluster to pv-1 resource:
COMMAND EXECUTED
---------+----------------------+---------+-----+-----------+------------------
CLUS: |[DESCR:]
[Int] |CG-IN-REWRITE: |RG-IN: |SS: |LCS-GROUP: |CLIP-RULE:
|NUM: |CPO:
|NUMx:
---------+----------------------+---------+-----+-----------+------------------
Site_2 Compressed_phones_towards_Site_2
[ 1] - DISABLE NO NONE PRIVATE
* NO
-------------------------------------------------------------------------------
Site_3 Compressed_phones_towards_Site_3
[ 2] - DISABLE NO NONE PRIVATE
* NO
-------------------------------------------------------------------------------
Tip
Remember to save the configuration with the save conf command.
COMMAND EXECUTED
COMMAND EXECUTED
677
Draft CTI System Draft
Add a CTI routing (type:VtoC) for compressed calls directed to “Site 3”, with next parameter set to u (unlimited) to
route calls on ISDN lines in case if it is not possible to route them towards the Tunnel:
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 DATA CtiSLink G2 * *
-------------------------------------------------------------------------------
2 CtoV * G1 'Node' *
-------------------------------------------------------------------------------
3 VtoC G1 Site_2 'To_site_2' *
UNLIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
4 VtoC G1 Site_3 'To_site_3' *
UNLIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
5 TR G1 G2 * *
-------------------------------------------------------------------------------
6 TR G2 G1 * *
-------------------------------------------------------------------------------
• ABILIS 3
The configuration of CTI ports and CTI groups is identical to “Abilis 1”. For the remaining configuration it is only needed
to change the ISDN numbers.
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
678
Draft CTI System Draft
COMMAND EXECUTED
COMMAND EXECUTED
Add a CTI Link and associate the Site_1 cluster to pv-1 resource:
COMMAND EXECUTED
---------+----------------------+---------+-----+-----------+------------------
CLUS: |[DESCR:]
[Int] |CG-IN-REWRITE: |RG-IN: |SS: |LCS-GROUP: |CLIP-RULE:
|NUM: |CPO:
|NUMx:
---------+----------------------+---------+-----+-----------+------------------
Site_1 Compressed_phones_towards_Site_1
[ 1] - DISABLE NO NONE PRIVATE
* NO
-------------------------------------------------------------------------------
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
679
Draft CTI System Draft
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 DATA CtiSLink G2 * *
-------------------------------------------------------------------------------
2 CtoV * G1 'Node' *
-------------------------------------------------------------------------------
3 VtoC G1 Site_1 'To_site_1' *
UNLIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
4 TR G1 G2 * *
-------------------------------------------------------------------------------
5 TR G2 G1 * *
-------------------------------------------------------------------------------
Tip
Remember to save the configuration with the save conf command.
42.11. Soft-PBX
This section describes the main features of the CTI resource which can be modified through the web interface or the CP.
• the call forwarding and the do-not-disturb (SS-CF-DND) features are active by default;
• the pickup is active only for calls of the belonging group (SS-PICKUP:GROUP).
Use the following command to activate supplementary services for the CTIP interface:
COMMAND EXECUTED
680
Draft CTI System Draft
Type the command s user:test sip:yes sip-ss:yes to activate supplementary services for a sip user, or s user:test iax:yes iax-
ss:yes for a iax user.
Parameter: | Value:
------------------+------------------------------------------------------------
USER: alice
ALIAS: alice
ID: 5 <Read Only>
...
IAX-SS: YES
IAX-SS-PICKUP: NO
IAX-SS-PRES-CG: YES
IAX-SS-CF-DND: YES
...
SIP-SS: YES
SIP-SS-PICKUP: NO
SIP-SS-PRES-CG: YES
SIP-SS-CF-DND: YES
...
-------------------------------------------------------------------------------
Type the command s cticl clus:clus1 ss:yes to activate supplementary services for a cluster.
Configured Clusters:1
--------------+----------------------+------------------------+------------+---
CLUS: [Int]|[DESCR:]
|NUM: |CG-IN-REWRITE: |CLIP-RULE: |SS:
|NUMx:
--------------+----------------------+------------------------+------------+---
clus1 [ 1] * - PRIVATE YES
42.11.1.1. Pickup
1. Configuring pickup for POTS/BRI ports.
SS-PICKUP pickup permission [NO:pickup disabled, GROUP:pickup enabled only for call of the belonging group,
ANY:pickup enabled].
681
Draft CTI System Draft
Warning
Setting PICKUP parameter to YES for the group is required! Refer to Section 42.3, “CTI Ports Group”
to have more informations.
COMMAND EXECUTED
Remeber to save the configurations (save conf) and initialize the CTISYS resource (init res:ctisys).
SIP users are enabled only to pickup every call setting SIP-SS-PICKUP to ANY (SIP-SS-PICKUP:GROUP is not
permitted). Remeber to enable supplemetary services.
COMMAND EXECUTED
IAX users are enabled only to pickup every call setting IAX-SS-PICKUP to ANY (IAX-SS-PICKUP:GROUP is not
permitted). Remeber to enable supplemetary services.
COMMAND EXECUTED
682
Draft CTI System Draft
ALIAS: iax_user
...
IAX-SS: NO
IAX-SS-PICKUP: ANY
...
-------------------------------------------------------------------------------
Now configure CTI preferences or CTI advanced preferences for the user. This last configuration can be done using the
web interface.
CF and DND are enabled by default and managed through the SS-CF-DND parameter.
SS-CF-DND Call forwarding and Do-Not-Disturb [NO, YES]. The dafault value is YES.
COMMAND EXECUTED
The above example deactivate the CF and DND for cti port #101.
Remeber to save the configurations (save conf) and initialize the CTISYS resource (init res:ctisys).
Call forward and DND for SIP users can be configured using the following parameter:
SIP-SS-CF-DND Call forwarding and Do-Not-Disturb [NO, YES]. The dafault value is YES.
COMMAND EXECUTED
683
Draft CTI System Draft
SIP-SS-PICKUP: ANY
SIP-SS-PRES-CG: YES
SIP-SS-CF-DND: NO
Call forward and DND for IAX users can be configured using the following parameter:
IAX-SS-CF-DND Call forwarding and Do-Not-Disturb [NO, YES]. The dafault value is YES.
COMMAND EXECUTED
Set the value of CTIP-ACTION parameter to DND in CTI preferences. Use the below command:
COMMAND EXECUTED
...
684
Draft CTI System Draft
COMMAND EXECUTED
Rules are ordered using the PR parameter which can be used as reference to modify values:
s cf user:<username> parameter:<value>
SIP-ACTION action [CF:call forward enabled, DND: DND enabled, ADVANCED: enables CTI advanced
preferences]. The default is ADVANCED.
COMMAND EXECUTED
685
Draft CTI System Draft
SIP-CF-DLY: 0
SIP-CF-CDO: 12
SIP-CF-CGO: *
...
IAX-ACTION action [CF:call forward enabled, DND: DND enabled, ADVANCED: enables CTI advanced
preferences]. The default is ADVANCED.
COMMAND EXECUTED
Parameter: | Value:
--------------------+----------------------------------------------------------
USER: test
ID: 4 <Read Only>
LAST-CHANGE: 02/02/2011 15:23:59 CET <Read Only>
PWD: ***
...
--------------------
SIP-CLIP: SYS
SIP-ACTION: ADVANCED
SIP-CF-RULE: ALWAYS
SIP-CF-TOUT: 15
SIP-CF-DLY: 0
SIP-CF-CDO: 12
SIP-CF-CGO: *
...
686
Draft CTI System Draft
COMMAND EXECUTED
The above rule enables DND only for SIP interface (IF:SIP).
Rules are ordered using the PR parameter which can be used as reference to modify values:
s cf user:<username> parameter:<value>
Parameter: | Value:
--------------------+----------------------------------------------------------
USER: test
ID: 4 <Read Only>
LAST-CHANGE: 02/02/2011 15:23:59 CET <Read Only>
PWD: ***
...
--------------------
IAX-CLIP: SYS
IAX-ACTION: ADVANCED
IAX-CF-RULE: ALWAYS
IAX-CF-TOUT: 15
IAX-CF-DLY: 10
IAX-CF-CDO: ux#
IAX-CF-CGO: *
...
COMMAND EXECUTED
687
Draft CTI System Draft
------------------------------------------------------------------------------
PR |ENABLED|IN-USE|IF |TI |ACTION
ADMIN|CGI |CDI |RULE
|CGO |CDO |TOUT |DLY
------------------------------------------------------------------------------
1 YES YES IAX ALL,00:00-23:59 DND
NO * * ALWAYS
------------------------------------------------------------------------------
The above rule enables DND only for IAX interface (IF:IAX).
Rules are ordered using the PR parameter which can be used as reference to modify values:
s cf user:<username> parameter:<value>
42.11.1.2.2. Configuring CF
Configure the following parameters for the user who is associated to this ctip port.
CTIP-ACTION CTIP interface: action [CF: call forward enabled, DND:dnd enabled, ADVANCED:use cti
advanced preferences];
CTIP-CF-RULE rule for call forwarding [ALWAYS, BUSY, NOANS, OTHERS, FORK]. Values [BUSY, NOANS,
OTHERS, FORK] can be joined using ',' character.
CTIP-CF-CDO output called number for call forwarding. From 1 up to 20 digits in the range ['0'..'9'] or "#"
optionally preceded by TON [u, i, n, o, s, h, c] and/or NP [x, e, d, t, l, p] attributes.
Example:
COMMAND EXECUTED
688
Draft CTI System Draft
COMMAND EXECUTED
RULE Rule for call forwarding [ALWAYS, BUSY, NOANS, OTHERS, FORK]. Values [BUSY, NOANS,
OTHERS, FORK] can be joined using ',' character.
CDO Outgoing Called Number. Max 20 characters in the range [0..9, *, #, 'macro'] optionally preceded by TON
[u, i, n, o, s, h, c] and/or NP [x, e, d, t, l, p] attributes.
SIP-ACTION action [CF:call forward enabled, DND: DND enabled, ADVANCED: enables CTI advanced
preferences]. The default is ADVANCED.
SIP-CF-CDO output called number for call forwarding. From 1 up to 20 digits in the range ['0'..'9'] or "#"
optionally preceded by TON [u, i, n, o, s, h, c] and/or NP [x, e, d, t, l, p] attributes.
COMMAND EXECUTED
689
Draft CTI System Draft
PWD: ***
...
--------------------
SIP-CLIP: SYS
SIP-ACTION: CF
SIP-CF-RULE: ALWAYS
SIP-CF-TOUT: 15
SIP-CF-DLY: 0
SIP-CF-CDO: 12
SIP-CF-CGO: *
...
IAX-ACTION action [CF:call forward enabled, DND: DND enabled, ADVANCED: enables CTI advanced
preferences]. The default is ADVANCED.
IAX-CF-CDO output called number for call forwarding. From 1 up to 20 digits in the range ['0'..'9'] or "#"
optionally preceded by TON [u, i, n, o, s, h, c] and/or NP [x, e, d, t, l, p] attributes.
COMMAND EXECUTED
Parameter: | Value:
--------------------+----------------------------------------------------------
USER: test
ID: 4 <Read Only>
690
Draft CTI System Draft
[17:43:37] ABILIS_CPX:a cf user:test pr:1 enabled:yes in-use:yes if:sip cdo:12 action:cf rule:
COMMAND EXECUTED
Rules are ordered using the PR parameter which can be used as reference to modify values:
s cf user:<username> parameter:<value>
Parameter: | Value:
--------------------+----------------------------------------------------------
USER: test
ID: 4 <Read Only>
LAST-CHANGE: 02/02/2011 15:23:59 CET <Read Only>
PWD: ***
...
--------------------
IAX-CLIP: SYS
IAX-ACTION: ADVANCED
IAX-CF-RULE: ALWAYS
IAX-CF-TOUT: 15
IAX-CF-DLY: 10
IAX-CF-CDO: ux#
IAX-CF-CGO: *
...
[17:46:59] ABILIS_CPX:a cf user:test pr:1 enabled:yes in-use:yes if:iax cdo:12 action:cf rule:
691
Draft CTI System Draft
COMMAND EXECUTED
Rules are ordered using the PR parameter which can be used as reference to modify values:
s cf user:<username> parameter:<value>
Please refer to Section 43.2.3.2, “CTI preferences” section to learn how to activate/deactivate logs and mails.
A web page showing a table displays a list of all users with links to their own incoming and outgoing calls logs.
692
Draft CTI System Draft
Clicking Incoming calls log for user 08888888888, you can obtain all logs for incoming calls to the user selected. Click
Extended to have more details on the incoming calls.
Each forwarder can receive his own mails and have his own call logs. In the following example there are three sip users: test,
test2and test3. Below there's a table showing users and their own sip numbers:
The user test make a call to user test2 dialling 11, but the user test 2 forwards every call to user test3 (see the image below).
The user test3 is offline.
693
Draft CTI System Draft
The following screenshots show the logs for users test,test2 (forwarder who receives his own logs) and test3.
694
Draft CTI System Draft
If CF is selected, choose the rule to use (CF on Busy, No answer with relative delay, Others or always) and insert the number
to call inside Forward Called textbox. Refer to the above figure to view the User Preferences page.
Tip
Refer to Section 43.2.3.4, “CTI preferences administration through CP” to know how to configure Users
preferences using CP.
42.11.3.2. Fork
After opening the Users CTI Preferences page, select CF-FOK (call forward) for an interface. Type the delay for the fork rule
in the textbox and the number to call in the textbox Forward Called.
In the example shown in the above figure, forking is enabled for user test2 and for sip interface. Forking delay is 10 seconds
and the called number is 12. When a sip call is received from user test2, the call is forked to number 12 after 10 seconds.
Tip
Remeber to configure CTIR rule to route forked calls. For example a rule is needed to fork a call from a sip
phone to pots phone.
695
Draft CTI System Draft
FORK rule consists in leaving own phone to ring and simultaneously make an outgoing call, for example to own mobile. The
first that answers will take the call. Besides ticking the checkboxes Busy and Others with more phones “forking” to the “next
one” Abilis can manage groups of different kind of phones.
This new release includes some changes in the list of KEY codes for Supplementary Services: the old code *57 now becomes
*54. From 7.0.0 version of Abilis firmware, the *57 code is used to enable FORK using as calling number the own one. The
*58 code is used to enable FORK using as calling number the one of the incoming call. Type the command help ss keycodes
to show all available keycodes.
Tip
Refer to Section 43.2.3.4, “CTI preferences administration through CP” to know how to configure Users
preferences using CP.
42.11.3.3. DND
After opening the Users CTI Preferences page, select DND (Do Not Disturb) for an interface in the Action row. Refer to the
above figure to view the User Preferences page.
Tip
Refer to Section 43.2.3.4, “CTI preferences administration through CP” to know how to configure Users
preferences using CP.
In the CTI routings view/change page, the administrator can add/delete/move cti routing rules through the icons or buttons
shown below:
696
Draft CTI System Draft
Please refer to chapter CTI Router to learn the meaning of various parameters. Administrator can make some fields editable
by users ticking the checkbox near the name of the considered parameter (image below).
697
Draft CTI System Draft
Administrator can make a list editable by users in the List administration page (Image below). Tick the checkbox to enable
the Set and Reset buttons.
Press the Set button to let a user to modify the list created.
The page is located in /sys/advuser/ path so a proper http rights configuration is needed.
COMMAND EXECUTED
Don't forget to use init res:http to initialize the http resource and save conf to save the configuration.
Click Advanced user activities in the CPX home page then click CTI Routings view/change to access a page where users can
modify portion of routings enabled to be modified or click List view/change to access a page where the user can modify lists.
698
Draft CTI System Draft
In the following page there is a table with a list of rules which can be edited by the user. The choice can be done among the
rules enabled by the administrator.
Clicking the link corresponding to the PR parameter of a rule, a user can modify only the parameters enabled by
administrator, in the example below only ACT, TYPE and DESCR parameters.
Click List view/change to view a table containing the lists which can be edited. Only the lists enabled by administrator can be
modified by a user.
699
Draft CTI System Draft
There are two basic ways to transport fax over packet networks:
• fax bypass:
the fax signal is treated as a normal phone call. The voice compressors like G.723.1, G.729, GSM, etc ... are not able to
transport fax signals since fax signals tolerate a much smaller distortion than voice. At the time of writing only G.726 and
G.727 at 40 kbit/sec are able to pass faxes acceptably. Of course G.711 and fully TRANSPARENT coders, which both
requires 64 kbit/sec, transport fax signal without any additional distortion.
• fax relay:
the fax signal is demodulated locally and converted into data packets which are sent to remote site for re-modulation.
This process requires much less bandwidth on the packet network than fax bypass: the demodulation extracts the original
data bits, which can be at one of the bit rates available in group 3 faxes, i.e. 9.6, 7.2, 4.8, 2.4, and only this information is
transported over the packet network. Recently group 3 faxes have been extended with a 14.4 kbit/sec bit rates using V.34
modulation scheme. Abilis CPX supports also this method.
• have the following feature: fax data packets are transported to remote side;
• have the following feature: remote side converts data packets into fax data and remodulates them locally.
In this process there are four points where problems can arise:
• excess delays;
700
Draft CTI System Draft
• incompatibilities between fax machines, and between fax machines and the Abilis CPX fax relay engine.
• The CTI SYSTEM clock between Abilis CPX and the Fax machine (or PABX if it is in the middle) is not synchronised.
This is actually the usual problem of ISDN/TDM synchronisation issues between devices, while tolerable with voice calls
become critical with fax/data connections.
• The level of the analogue signals is not adequate. It's very rare to have the need to change default level, which is of #9
dbm.However Abilis CPX allows to change it via FM-LEVEL: parameter in CTISYS and FMLEVEL parameter in CTIR.
The literature widely available on Internet explains very well the challenges of transporting real time data over packet
networks. This is not the place where we will explain them deeply, but we want to summarise few key points:
• Packet networks work with message store-and-forward paradigm, therefore hops and queues introduce variable delays in
packet delivery. This effect is called jitter.
• Although coders, silence suppression, and other techniques, may make the packet exchange discontinued, voice and faxes
produces and uses data at constant bit rate, based on a clock available at A/D and D/A converters.
• Each application has its own tolerable delays which poses constrains to buffers dimensioning.
• Buffering, also known as jitter-compensation, has to be dimensioned as a trade-off to cover all the above points and
provide the desired, or acceptable, quality of the service.
Packet loss and late packets are far the most critical problem, which may have several causes:
• buffer overflows;
• buffer underflows;
The fax protocol tolerates delays which are between 1 to 3 seconds, therefore if the network offers a round-trip delay above 1
second ... problems “may” arise.
42.12.2.4. Incompatibilities
Fax bypass does not make any inspection of the fax signal and therefore compatibility is not an issue.
Fax relay has to demodulate the signal locally and make some other “inspection”, so fax machine and the Abilis fax relay
engine may not understand each other correctly.
Both Abilis at the two sides of fax relay connection must have these values set. Each Abilis CPX can jitter compensate the
packets it RECEIVES. These parameters affects only the CPX where they are set, for the receive direction.
701
Draft CTI System Draft
They can be increased if the network shows a higher jitter, but there is a risk to fall in the excessive delay problem explained
above.
For higher reliability, at least speed of 9.6 must be allowed by configuring SP:9600 in CTIR. Since we want to use only 6.4k
for voice, a routing which intercepts numbers assigned to faxes and uses SP:9600 is required.
42.12.3.3. ECM
The ECM negotiation is disabled. This reduces incompatibilities problems and make lower failure chances in presence of
packet loss.
It means that Abilis in “Site A” and Abilis in “Site B” which relay faxes each other through Internet, may run different ISDN/
TDM clocks without having negative effects to faxes. It means that either or both sides may miss interconnection to ISDN
network!
On the other hand synchronisation to a unique clock is always preferred when possible. With unique synchronisation the
voice can be handled without buffer underrun/overrun also if silence suppression is disabled. Silence suppression is the only
way to avoid that sooner or later one direction will persistently work at overrun condition (with high delay!) and the other at
underrun condition (jitter compensation absent).
To avoid this:
• set to yes the FMRLY parameter in the fax cti routing rule to enable fax/data relay only for that routing
Refer to chapter How to configure fax modem relay parameter to view an example of configuration.
If the previous parameters have been set correctly and several issues with fax are still present, administrator can try to set the
V-RED parameter to FM (Fax Modem) for best results. V-RED must be set to FM on both local and remote Abilis.
The statistics to check carefully are MISSING and time arrival variation of voice frames. MISSING should not increase, and
time arrival variation should not increase for values above 200 msec. If those two statistics increase ... fix the network (or
network connections).
The statistics an diagnostics of Audio Compressors (CTIAC) provide many useful information. Jitter measures, available
when an Audio Compressor is IN-USE, may be useful to troubleshoot fax connections.
702
Draft CTI System Draft
-------------------------------------------------------------------------------
AC Card DSP/C Bus/TS DSPState ACState ModeIn ModeOut Coder Ctip/BC
Dtmf DhVol DlVol FmLevel InGain OutGain SigGain MaxFaxSp MaxModSp
SC V-DJ V-MJ V-CurJ V-TopJ V-AvgJ EC BypassCoder
ECM FM-DJ FM-MJ FM-CurJ FM-TopJ FM-AvgJ FaxTxPg FaxFlowState
-------------------------------------------------------------------------------
0 QPRI-1 0/0 4/05 RUN IN-USE FAX - Spirit/6.4k -
OUTBAND -4 -4 -9 0 0 0 9600 7200
YES 100 250 0 0 0 NO -
YES 200 400 0 216 22 0 Tx-DIS
where:
42.12.5. Conclusion
For a successful fax relay here is a check list:
• Use network connection with round-trip delay not higher than 1 second.
Abilis FM-DFT-JBUF and FM-MAX-JBUF may be increased a little bit in presence of network connections with bigger
jitter, but reasonably to value not greater than 400 and 600 respectively. Clock synchronisation between the Abilis CPX at the
two endpoints of the fax relay connection is not required.
703
Draft Draft
Table of Contents
43.1. The web interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
43.2. Section 1 - User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
43.2.1. Creation of the user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
43.2.2. Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
43.2.3. User preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
43.2.4. Address Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
43.2.5. CTI incoming/outgoing calls log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
43.2.6. Advanced user activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
43.3. Section 2 - Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
43.3.1. IP Traffic Analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
43.3.2. Operator Panel Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
43.3.3. SMS Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
43.3.4. Control Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722
43.4. Section 3 - Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
43.4.1. Configuration information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
43.4.2. Users administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
43.4.3. Groups administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
43.4.4. Lists administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
43.4.5. Disa administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
43.4.6. CTI administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744
43.4.7. Voice Mail administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 746
• section 1 - User, every link (but Advanced user activities) is always reachable by a user logged in
• User preferences
• Address books
• section 2 - Applications, reachable by a user logged in and enjoining the right HTTP privileges
• IP traffic analyzer
• SMS gateway
• Control Port
• section 3 - Administration, reachable by a user logged in and enjoyining the right HTTP privileges
• Configuration Information
• Users administration
• Groups administration
704
Draft The web interface Draft
• Lists administration
• DISA administration
• CTI administration
The following default virtual path correspond to link Advanced user activities of section 1:
705
Draft The web interface Draft
• /sys/admin/ (with recur:yes):every link of section 3 (useful to give quickly all administration privileges).
The access to specific services (IP traffic analyzer, PBX extension states, Control Port, User preferences, Users
administration, DISA administration) is allowed only for enabled users (users with appropiate rights must be created).
Warning
Cookies must be enabled.
Warning
Abilis SNTP server must be active and properly configured (it is possible to set an expiration date for the
cookie, parameter: LOGIN-COOKIE-TOUT).
COMMAND EXECUTED
USER: PWD: ACT: CTIP: CLUS: PPP: FTP: HTTP: MAIL: IAX: SIP:
--------------------------------+--------------+-------------------------------
admin NO # # YES YES YES NO NO NO
guest NO # # NO NO NO NO NO NO
httpuser *** YES # # NO NO YES NO NO NO
Tip
Interesting chapter: Section 5.9, “Users Table”.
43.2.2. Login
Go to Abilis' home page and click login, insert User name and Password and press Send button.
706
Draft The web interface Draft
The following page will be shown if user name and password are right.
Clicking Change password you will be moved to the following page: insert the old and the new password and then press the
Submit button to validate the operation.
707
Draft The web interface Draft
Section 1 Interface - it's the particular interface for the considered user. [CTIP, CLUS, IAX, SIP].
Clip - it allows to choose if the CLIP of the user who transfers calls must be displayed or not. [SYS:the
configuration depends on that of the port (example: the CLIP-RULE parameter fo CTISIP resource),
RESTRICTED: CLIP not displayed, ALLOWED: CLIP displayed].
• ADVANCED: it allows to use an advanced configuration (refer to Section 43.2.3.3, “CTI advanced
preferences”) where a user can choose the CF on NOANSWER, on BUSY, on OTHER reasons, the
weekday and time where the rule is valid, the calling and the called number for which the call is valid, and
so on;
• CF: it allows to transfer a call choosing the cause (ALWAYS, BUSY, NO-ASNWER). The textbox near
no-aswer checkbox shows the number of seconds aftwer which the call is transferred;
• CF-FORK: it allows to enable forking. Refer to chapter Section 42.11.3, “User preferences” to learn more
about it.
Forward Calling - it allows to configure the output calling number [*, USER].
Event - choosing of the event [VOICE MAIL, CALL FAILURE, CALL FORWARD, SEIZED CALL].
Recipient List - IN2T list used to select recipients for email on call forward on the base of called numbers.
Call&Ring (POTS only) - it allows to configure Call&Ring settings. Configure the Interval to set the timeout
[SYS, 30..600 sec] and the maximal number of retry [SYS, 1..30].
TON to PREFIX - it allows to convert TON to the corresponding PREFIX in notification mails, call logs,
operator panel control (OPC) [SYS, NO, YES].
708
Draft The web interface Draft
Tip
Configure the sending email address setting the MAIL-FROM parameter in the CTISYS resource (s p ctisys
mail-from:[email protected]).
709
Draft The web interface Draft
In the example above, DND is active for a call incoming from number 10 on Saturday and Sunday.
Tip
Interesting chapter: Section 43.4.2.4, “Example - How to change advanced settings for a sip user”.
• d pref ctip[:<ctip>]: This command shows CTIP preferences when it is not assigned to a user, a limit set of preferences is
available.
• s pref user:<user> <par:><val> [<par:><val>] ...:This command sets one or more user preference.
• s pref ctip:<ctip> <par:><val> [<par:><val>] ...: This command sets one or more preference for an unassigned CTIP.
Example:
Parameter: | Value:
--------------------+----------------------------------------------------------
USER: test
ID: 4 <Read Only>
LAST-CHANGE: 29/04/2011 16:01:55 CET <Read Only>
PWD: ***
--------------------
CTIP-CLIP: SYS
CTIP-ACTION: ADVANCED
CTIP-CF-RULE: ALWAYS
CTIP-CF-TOUT: 15
CTIP-CF-DLY: 10
CTIP-CF-CDO: ux#
CTIP-CF-CGO: *
CTIP-VM: NO
710
Draft The web interface Draft
CTIP-VM-RULE: NOANS,OTHERS
CTIP-VM-TOUT: 15
--------------------
CLUS-CLIP: SYS
CLUS-ACTION: ADVANCED
CLUS-CF-RULE: ALWAYS
CLUS-CF-TOUT: 15
CLUS-CF-DLY: 10
CLUS-CF-CDO: ux#
CLUS-CF-CGO: *
CLUS-VM: NO
CLUS-VM-RULE: NOANS,OTHERS
CLUS-VM-TOUT: 15
--------------------
IAX-CLIP: SYS
IAX-ACTION: ADVANCED
IAX-CF-RULE: ALWAYS
IAX-CF-TOUT: 15
IAX-CF-DLY: 10
IAX-CF-CDO: ux#
IAX-CF-CGO: *
IAX-VM: NO
IAX-VM-RULE: NOANS,OTHERS
IAX-VM-TOUT: 15
--------------------
SIP-CLIP: SYS
SIP-ACTION: ADVANCED
SIP-CF-RULE: ALWAYS
SIP-CF-TOUT: 15
SIP-CF-DLY: 0
SIP-CF-CDO: 12
SIP-CF-CGO: *
SIP-VM: NO
SIP-VM-RULE: NOANS,OTHERS
SIP-VM-TOUT: 15
--------------------
VM-RCPT-LIST: #
VM-RCPT:
VM-OGM-MSG: SYS
VM-END-MSG: SYS
--------------------
MAIL-FAIL: NO
MAIL-FAIL-RCPT-LIST: #
MAIL-FAIL-RCPT:
MAIL-FWD: NO
MAIL-FWD-RCPT-LIST: #
MAIL-FWD-RCPT:
SEIZED-CALLS: NO
--------------------
CTI-CALLS-LOG: YES
CTI-CALLS-LOG-IN: 30
CTI-CALLS-LOG-OUT: 30
--------------------
CALLTRY-TOUT: SYS
CALLTRY-NRTY: SYS
--------------------
TON-TO-PREFIX: SYS
-------------------------------------------------------------------------------
711
Draft The web interface Draft
User's preferences:
712
Draft The web interface Draft
713
Draft The web interface Draft
• s cf user:<user> <par:><val> [<par:><val>] ...: This command sets one or more user preference.
714
Draft The web interface Draft
Address book administration is available from the HTTP interface and even from CP (through commands a/d/s/c contact).
On the top left corner of the page there are two arrows which allow to browse the address book pages back and forward.
• Abort icon
715
Draft The web interface Draft
• Export icon
• fill the outdial field (Up to 8 digits. OutDial + Number cannot exceed 20 digits)
• fill the number field (from 1 up to 20 digits.outdial + number cannot exceed 20 digits).
716
Draft The web interface Draft
Click the arrow on the top left of the page and go back to the first page of the address book web interface. Searching contacts
can be done filling the text box. Javascripts permits a search-as-you-type operation.
Click the search button or use special character thicking the checkbox advanced search.
Contacts can be sorted by name or number (Sort by listbox); the user can choose: to show only private/public contacts (show
contacts listbox), the number of contacts per page (contacts per page listbox), the number of columns per page (Columns per
page listbox).
The table on the center of the address book page shows the search results.
Click the radiobutton sms to compose an sms to the correspondig user, filling number and message fields.
Tip
Interesting chapter: Section 53.19, “How to configure CTISMS to send sms via emails”.
717
Draft The web interface Draft
Click Outgoing calls log to view the log about outgoing calls. Clicking a number, a user can do the following actions directly
from log page:
• click to call;
• abort a call;
• call try;
Warning
CTI call logs are now available only for SOFT-PBX licence.
Tip
Interesting chapters:
Chapter 6, Licencing.
Use the following commands to give the correct rights to access this page.
COMMAND EXECUTED
718
Draft The web interface Draft
-------------------------------------------------------------------------------
The following page will be shown if no routing or list is enabled by administrator, otherwise a list of editable routings/lists
will appear (see the paragraph CTI administration):
COMMAND EXECUTED
719
Draft The web interface Draft
7 /sys/trfa/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
Refer to paragraph Using HTTP for showing TRFA statistics to learn how to use this feature.
Refer to chapter TRFA - traffic analyzer to have more informations about the resource.
By default, the anonymous access in this section is disabled; add the path in the HTTP Virtual Paths Access Rights Table for
httpuser.
COMMAND EXECUTED
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /sys/
admin r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sys/opc/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /sys/pub/
anonymous r--- ---- YES PLAIN,SSL
-------------------------------------------------------------------------------
Go to Abilis' Home Page, login and select the Operator Panel Control link.
The next page shows the interface status of the each user enabled to OPC.
Please, refer to chapter OPC- Operator Panel Control to know more about OPC's features.
720
Draft The web interface Draft
COMMAND EXECUTED
There are various ways to send sms using the links on the bottom of page:
721
Draft The web interface Draft
By default, the anonymous access in this section is disabled; add the path in the HTTP Virtual Paths Access Rights Table for
httpuser.
COMMAND EXECUTED
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /sys/
admin r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
4 /sys/cp/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sys/opc/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /sys/pub/
anonymous r--- ---- YES PLAIN,SSL
-------------------------------------------------------------------------------
Go to Abilis Home page, login and select the Control Port link.
722
Draft The web interface Draft
This link belongs to administration section, so a user must have the proper rights to access this page.
Warning
The page is in the /sys/admin/ path so the RECUR parameter must be set to NO, otherwise the user gains
access to all administration links.
COMMAND EXECUTED
723
Draft The web interface Draft
Caution
Generally the access to this section is reserved to users with administrator's rights.
The anonymous access is disabled by default; add the path in the HTTP Virtual Paths Access Rights Table for httpuser.
COMMAND EXECUTED
724
Draft The web interface Draft
-------------------------------------------------------------------------------
5 /sys/advuser/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
6 /sys/cp/
-------------------------------------------------------------------------------
4 /sys/disa/
disa r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sys/opc/
test r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /sys/pub/
anonymous r--- ---- YES PLAIN,SSL
-------------------------------------------------------------------------------
8 /sys/sms/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
7 /sys/trfa/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
Go to Abilis Home page, login and select the Users administration link.
Users can be created, removed or modified (this operations are similar to typing d/a/c/s user command on the control port);
Saving the configuration can be done pressing the Save configuration button.
Tip
Refer to Section 5.9, “Users Table” to know how to administrate users through CP.
In the previous page click on Add new user link: this page will be shown.
725
Draft The web interface Draft
Insert the username and the password and click on Add button. The operation will be validated in this page:
Then click on User Administration to come back to the starting page of the session.
Select from the list the user that you want to modify (iaxuser in this case): the following page will be shown.
Select the protocol/s that you want to enable (in this case select IAX) and click on Submit button. The operation will be
validated in this page.
726
Draft The web interface Draft
Click on User Administration to come back in the starting page of the session.
Click on IAX (in the Advanced user settings section): this page will be shown.
Select from the list the user to modify (iaxuser in this case): this page will be shown.
Set the field and click on the Submit button. The operation will be validated in this page.
727
Draft The web interface Draft
Tip
Refer to Section 5.9, “Users Table” to know how to administrate users through CP.
Click the user to delete and then click the YES button.
728
Draft The web interface Draft
Tip
Remember to save the configuration to make the change permanent.
Tip
Refer to Section 5.9, “Users Table” to know how to administrate users through CP.
Change parameters and click Submit button, click ok on the following page:
729
Draft The web interface Draft
Tip
Remember to save the configuration to make the change permanent.
Tip
Refer to Section 5.9, “Users Table” to know how to administrate users through CP.
Change user's parameters and then click submit button. Click OK button on the confirmation page:
Tip
Remember to save the configuration to make the change permanent.
Click the user to modify, change the assigned number and then click Set button:
730
Draft The web interface Draft
Tip
Remember to save the configuration to make the change permanent.
731
Draft The web interface Draft
Tip
Remember to save the configuration to make the change permanent.
732
Draft The web interface Draft
Tip
Remember to save the configuration to make the change permanent.
Click the group to change, add a description, add users and click Submit button
733
Draft The web interface Draft
Enable DND for calls incoming on CTIP interface, calling every number starting with 012345, only on Saturday. Then, click
the Submit button on the bottom of page.
734
Draft The web interface Draft
Caution
Generally the access to this section is reserved to users with administrator's rights.
By default, the anonymous access is disabled; add the path in the HTTP Virtual Paths Access Rights Table for httpuser.
COMMAND EXECUTED
Go to Abilis Home page, login and select the Lists administration link.
On the next page the user can create, remove or modify a list (this operations are similar to typing d/a/c/s list command on
the control port); save the configuration pressing the Save configuration button.
735
Draft The web interface Draft
Tip
Interesting chapter: Section 5.11, “Lists management”.
In the previous page click on Add new list link: this page will be shown.
Insert the list name, description and select the type. Then click Add button. The operation will be validated in this page:
Tip
Interesting chapter: Section 5.11, “Lists management”.
In the previous page click on Remove existing list link: this page will be shown.
Click the list to delete, then click YES button on the following page:
736
Draft The web interface Draft
Tip
Interesting chapter: Section 5.11, “Lists management”.
In the previous page click on View/Change list link: this page will be shown.
Click the list to change. The following page allows to edit the name and the description of the list, to insert items. Click Add
button to insert an item:
737
Draft The web interface Draft
Tip
Interesting chapter: Section 5.11, “Lists management”.
Caution
Generally the access to this section is reserved to users with administrator's rights.
By default, the anonymous access is disabled; add the path in the HTTP Virtual Paths Access Rights Table for httpuser.
COMMAND EXECUTED
738
Draft The web interface Draft
2 /sys/pub/
anonymous r--- ---- YES PLAIN,SSL
-------------------------------------------------------------------------------
8 /sys/sms/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
7 /sys/trfa/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
Click Login on the CPX home page and insert login and password. Click the DISA administration link to access to the
following page.
Tip
Interesting chapter: Chapter 47, DISA - Direct Inward System Access.
The following page confirms the change. Click DISA administration button.
Tip
Remember to save the configuration to make the change permanent.
739
Draft The web interface Draft
Tip
Interesting chapter: Section 47.3.1, “CTIDISA Service table”.
Tip
Remember to save the configuration to make the change permanent.
Tip
Interesting chapter: Section 47.3.1, “CTIDISA Service table”.
740
Draft The web interface Draft
Click the service to change. Set new parameters and click Submit button.
Tip
Interesting chapter: Section 47.3.1, “CTIDISA Service table”.
741
Draft The web interface Draft
Tip
Remember to save the configuration.
Tip
Interesting chapter: Section 47.3.2, “CTIDISA User table”.
742
Draft The web interface Draft
Tip
Remember to save the configuration.
Tip
Interesting chapter: Section 47.3.2, “CTIDISA User table”.
Tip
Remember to save the configuration.
Tip
Interesting chapter: Section 47.3.2, “CTIDISA User table”.
Click Message set(s) View/Change to view the list of existing messages sets.
743
Draft The web interface Draft
Tip
Interesting chapter: Section 47.8, “Message files”.
Caution
Generally the access to this section is reserved to users with administrator's rights.
By default, the anonymous access is disabled; add the path in the HTTP Virtual Paths Access Rights Table for httpuser.
COMMAND EXECUTED
744
Draft The web interface Draft
-------------------------------------------------------------------------------
4 /sys/disa/
disa r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sys/opc/
test r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /sys/pub/
anonymous r--- ---- YES PLAIN,SSL
-------------------------------------------------------------------------------
8 /sys/sms/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
7 /sys/trfa/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
Go to Abilis Home page, login and click CTI administration to access to the following page.
Tip
Interesting chapter: Chapter 42, CTI System.
Click an interface to change, set the new number and click Set button.
745
Draft The web interface Draft
Tip
Interesting chapter: Section 42.2, “CTI Ports configuration”.
Caution
Generally the access to this section is reserved to users with administrator's rights.
By default, the anonymous access is disabled; add the path in the HTTP Virtual Paths Access Rights Table for httpuser.
COMMAND EXECUTED
746
Draft The web interface Draft
-------------------------------------------------------------------------------
1 /sys/
admin r--- l--- YES PLAIN,SSL
...
-------------------------------------------------------------------------------
12 /sys/admin/vm/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
...
Click Login on the CPX home page and insert login and password. Click the Voice Mail administration link to access to the
following page.
Click System Message set(s) View/Change to view/change the system message sets. The following page allows to modify
end/ogm message sets.
747
Draft The web interface Draft
• Extract - It allows to convert CPM files into Wav files. Files can be downloaded using the command file get.
Click User's Message set(s) View/Change to view/change the user's message sets. Each user can customize his own
messages, so the folowing page shows all user's message sets. Extract/Rebuild/Update are available for User's Message set(s).
Tip
Interesting chapter: Section 48.2, “CTIVM - CTI Voice Mail”.
748
Draft The web interface Draft
Click the message set name to update. The list will show OGM (Out Going Message) and END (End message) folders.
Click the message set to configure (in this case OGM), select the file to use and click Upload button.
Tip
Message files must be recorded on a PC and saved in WAV format with CCITT A-law (or u-law) 8KHz, 8
bit, Mono (Windows sound recorder supports it).
749
Draft The web interface Draft
The message has been uploaded. Click Rebuild to convert the file from wav to CPM format.
750
Draft The web interface Draft
751
Draft The web interface Draft
The CPM file is now present. Click the Select button to use it and Ok on the confirmation page. The selected message is now
the default one for user test-set (VM-OGM-MSG parameter in the CTI preferences).
Note
The user must exists otherwise the following message is shown.
752
Draft The web interface Draft
Note
The dir c:\app\vm\users\ is created.
Upload a wav file in the right directory under the created one, using the file put command.
Upload Zmodem
message1.wav
Converting C:\APP\VM\USERS\test-set\OGM\message1.wav
Converting to G711A/64k .......... END
Converting to G723.1/5.3k .......... END
Converting to G723.1/6.3k .......... END
Converting to G729A/8k .......... END
753
Draft The web interface Draft
COMMAND COMPLETED
Refer to Section 48.2.5.2, “Working dir structure” to know more about the VM working dir structure.
Tip
Interesting chapters:
754
Draft Draft
Table of Contents
44.1. OPC resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
44.1.1. Activating the OPC resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
44.1.2. OPC resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
44.2. OPC configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
44.2.1. Creation of the user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
44.3. OPC Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
44.3.1. The panel view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760
44.3.2. The table view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
44.3.3. Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
44.3.4. Special features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
In order to run the OPC, both the HTTP and OPC resources must be active.
Tip
Interesting chapter: Chapter 34, HTTP - HyperText Transfer Protocol.
COMMAND EXECUTED
The OPC resource may already exist in the system, but may not yet be active: set it active with the following command.
COMMAND EXECUTED
The OPC resource may collect call information from the local as well as from remote Abilis. The operator can view the
call status of several sites in the same web page. The parameter abilisid of the OPC resource has the purpose to permit the
programmer to choose which is the wished ABILIS target.
COMMAND EXECUTED
The new abilisid is available in runtime for both local and remote.
Tip
Refer to Section 44.1.2, “OPC resource parameters” to have more informations about collecting information
from a remote Abilis. A how to is available directly at this link.
755
Draft OPC - Operator Panel Control Draft
RES:Opc -----------------------------------------------------------------------
DESCR:Operator_Panel_Collector
LOG:NO ACT:YES XML-TOUT:60 XML-MIN-DELAY:500
maxusers:200 maxcalls:200 maxclients:20 maxremotes:5
ABILISID:myabilis
- OPC Remote collectors ------------------------------------------------
REM:0 ABILISID: ENABLED:NO
SRCADD:R-ID (192.168.030.001) TOS:0-N
SERVER:
PROT:PLAIN PORT:AUTO RETRY-DELAY:60
LOGIN:
PASSWORD:
-----------------------------------------------------------------
REM:1 ABILISID:test ENABLED:NO
SRCADD:R-ID (192.168.030.001) TOS:0-N
SERVER:192.168.001.150
PROT:PLAIN PORT:AUTO RETRY-DELAY:60
LOGIN:admin
PASSWORD:********
-----------------------------------------------------------------
REM:2 ABILISID: ENABLED:NO
SRCADD:R-ID (192.168.030.001) TOS:0-N
SERVER:
PROT:PLAIN PORT:AUTO RETRY-DELAY:60
LOGIN:
PASSWORD:
-----------------------------------------------------------------
REM:3 ABILISID: ENABLED:NO
SRCADD:R-ID (192.168.030.001) TOS:0-N
SERVER:
PROT:PLAIN PORT:AUTO RETRY-DELAY:60
LOGIN:
PASSWORD:
-----------------------------------------------------------------
REM:4 ABILISID: ENABLED:NO
SRCADD:R-ID (192.168.030.001) TOS:0-N
SERVER:
PROT:PLAIN PORT:AUTO RETRY-DELAY:60
LOGIN:
PASSWORD:
-----------------------------------------------------------------
LOG set to NO if events are not to be recorded into the Abilis LOG files, otherwhise: D: Debug Log; S: System
Log; A: Alarm view; L: Local audible alarm; T:SNMP traps; +E: Extended Log of state changes (see LOG
parameter1 for more details)
ACT [YES/NO] to set the OPC active/inactive during runtime (init res:OPC to commit the change)
maxclients Max. number of monitors that can require information from OPC.
maxremotes Max. number of external remote collector that can be stored locally.
756
Draft OPC - Operator Panel Control Draft
The syntax for setting the OPC parameters is the usual one: s p opc parameter:value
Caution
As usual, changes on parameters whose name is displayed in UPPERCASE can be committed with the
command init res:opc, whilst changes on parameters written in LOWERCASE require a new system's
startup (SAVE CONF and WARM START).
Tip
Refer to chapter Section 53.11, “How to configure opc to collect call information from a remote abilis” to
configure opc to collect call information from a remote abilis.
Tip
Refer to Section 43.1, “The web interface” to have more information about http directories.
USER: PWD: ACT: CTIP: CLUS: PPP: FTP: HTTP: MAIL: IAX: SIP:
--------------------------------+--------------+-------------------------------
admin NO # # YES YES YES NO NO NO
guest NO # # NO NO NO NO NO NO
As shown above, only the admin user is enabled to HTTP service. The following command creates a new user called “opc1”
and enabled for the HTTP service.
COMMAND EXECUTED
USER: PWD: ACT: CTIP: CLUS: PPP: FTP: HTTP: MAIL: IAX: SIP:
--------------------------------+--------------+-------------------------------
admin NO # # YES YES YES NO NO NO
757
Draft OPC - Operator Panel Control Draft
guest NO # # NO NO NO NO NO NO
opc1 YES # # NO NO YES NO NO NO
Tip
Interesting chapter: Section 5.9, “Users Table”.
The appropriate http-rights must be assigned so that user opc1 is allowed to access this path:
COMMAND EXECUTED
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /sys/
admin r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sys/opc/
opc1 r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /sys/pub/
anonymous r--- ---- YES PLAIN,SSL
-------------------------------------------------------------------------------
Additional specifications for the OPC users are: OPC USER-PORTS CORRELATION, OPC-MONITOR and OPC-
RIGHTS.
Each user may have assigned up to four interfaces: a CTIP (a.g a POTS port or an ISDN or a GSM/UMTS port), a CTI
CLUSTER, SIP and IAX.
The OPC-USER PORTS CORRELATION states which CTIP or CLUSTER ports are to be assigned the user (for SIP/IAX
users this specification is given automatically when the SIP or IAX rights are granted).
The OPC-MONITOR parameter permits to specify which of the interfaces linked to the user are to be notified the OPC
management.
The following example shows how to correlate the user “opc1” to the analogue port#100 (ctip:100) and notify the OPC
management only the information relevant to the CTIP ports assigned to him.
COMMAND EXECUTED
758
Draft OPC - Operator Panel Control Draft
OPC-VIEW: *
OPC-MONITOR: CTIP
OPC-HIDE-NUMBERS: NO
OPC-PRIVACY: NO
HTTP: YES
HTTP-PROT: PLAIN,SSL
-------------------------------------------------------------------------------
The OPC-MONITOR parameter can take the following values: NONE (to disable opc monitoring), ALL (to monitor every
kind of interface), CTIP (to monitor POTS, ISDN or GSM ports), IAX (to monitor IAX2 interfaces), SIP (to monitor SIP
interfaces), CLUS (to monitor clusters).
For example, assuming that the user “opc2” has both a sip and a iax account, the following commands can be used:
If the OPC-MONITOR parameter is set to a value different from NONE (this is the default one), some other opc related
parameter are shown:
• OPC-ROLE: this parameter can be equal to USER or OPERATOR (enables advanced features like buttons drag&drop).
The default is: USER
• OPC-VIEW: list of users that can be seen on the OPC panel by this user. The default is: *
• OPC-HIDE_NUMBERS: if set to YES, the user will not see calling and called numbers.The default is: NO
• OPC-PRIVACY: if set to YES, it hides to every monitor the calling and the called numbers of the calls to and from this
user. The default is: NO
• fill the fields with user name and password of the user created in the chapter Section 44.2.1, “Creation of the user”.
Tip
Interesting chapter: Section 43.1, “The web interface”.
759
Draft OPC - Operator Panel Control Draft
Each box always shows on the center the user name, on the top right corner the interface and on the top left corner the
number (for cluster there is no number but a *).
• ctip box
760
Draft OPC - Operator Panel Control Draft
• cluster box
Tip
Refer to chapter Section 44.3.4, “Special features” to know more about buttons on the bottom of boxes.
During a call the button turns red and it shows the calling/called number on the bottom left corner. The called number is
preceded by “>” for outgoing calls. The number is preceded by “<” for incoming calls.
Click a button to open a window with more information like: alias, abilisid, time and so on.
761
Draft OPC - Operator Panel Control Draft
• Abilisid
• Username
• Alias
• Interface
• Number
• Status
• Calls
The entries of the table can be ordered by clicking the name of the column, so data can be sorted in increasing/decreasing
order by alias, number, interface and so on.
762
Draft OPC - Operator Panel Control Draft
This icon shows also the duration of the call just keeping the mouse pointer on it.
44.3.3. Preferences
On the bottom of the page there's a menu showing the link Preferences.
On this page, the choosing of the kind of interface to monitor for every user is available.(please refer to opc-monitor
parameter in the chapter Section 44.2.1, “Creation of the user”). All interfaces can be selected by thicking the checkbox
Select ALL on the top left corner of the page.
763
Draft OPC - Operator Panel Control Draft
Dragging and dropping the box in alerting state to the box of the target user, let the operator transfer the call to a user shown
on the panel.
Clicking on transfer icon, let the operator trasfer calls to the entered number.
• phone is on-hook: in this case the phone will ring and the call will start when you pick-up the phone;
• phone is off-hook while on another call: the old phone call is parked and the new one begins.
Click the button shown in the figure below to use this feature.
When the phone is on-hook, Abilis can send to user's telephone the number you are going to call or even the name associated
in the address book.
Refer to chapter Section 42.8, “CTI System Resource” to know more about CTISYS resource parameters.
COMMAND EXECUTED
Use the below command and look at the POTS section of the resource to verify changes.
764
Draft OPC - Operator Panel Control Draft
LCST:6 lcs-dir:C:\APP\CTI\LCS\
- Call&Ring ------------------------------------------------------------
CALLTRY-TOUT:60 CALLTRY-NRTY:15
- Address Book ---------------------------------------------------------
addrbook-dir:C:\APP\CTI\ADDRBOOK\
ADDRBOOK-PUB-PROTECTED:NO
- EEC ------------------------------------------------------------------
TAIL:128 NLP:YES CNM:NORMAL AEC:NO
TAIL-BASE:0 NLP-A:1 VQE-TONE-DISABLER:YES AEC-TAIL:1024
HLC:NO NLP-B:0 VQE-ACT-DELAY:300 AEC-ERL-DFT:0
HLC-THR:-10 ERL-DFT:-6
- Audio compressors defaults -------------------------------------------
dsp1-fw:D1C4F3 dsp2e-fw:D2C4F6 dsp8-fw:D8C2F2 dsp1-coderset:NORMAL
IN-GAIN:0 OUT-GAIN:0 SIG-GAIN:0 DFT-JBUF:0
DTMF-HIGH:-4 DTMF-LOW:-6 DTMF:OUTBAND MAX-JBUF:100
FM-RELAY:YES FM-LEVEL:-9 FM-DFT-JBUF:200 FM-MAX-JBUF:400
SC:YES SID-GEN:NO SID-USE:NO ECM:YES
AT:NO AT-CODE:C AT-DURATION:100
CODERS:G.711,G.726,G.727,ILBC,GSM6.10,Spirit,G.723.1,G.729A,SPEEX,Transp
- POTS defaults --------------------------------------------------------
CLIP:EXT CLIP-STD:ETSI CLIP-TAS:RP MIN-FLASH:50
SENSING:YES ABF:NO HPF:YES DEBOUNCE:16 MAX-FLASH:200
COUNTRY:IT (SL-IT.BIN) POTS-NUM-LENGTH:2
POTS-IN-GAIN-ADJ:COUNTRY POTS-OUT-GAIN-ADJ:COUNTRY BC:Speech
POTS-AT:NO POTS-AT-CODE:C POTS-AT-DURATION:100 POTS-AT-GAIN:0
POTS-DT:NO POTS-DT-CODE:D POTS-DT-DURATION:100
- CELL (GSM/UMTS) defaults ---------------------------------------------
CELL-GAIN-IN:0 CELL-GAIN-OUT:0 pdn-rxbuf:30
CELL-CODEC-GAIN-IN:0 CELL-CODEC-GAIN-OUT:0
- HDLC -----------------------------------------------------------------
dmaframe:2100 bdframe:2100 bcframe:64 bvframe:264
rxdmabuf:3 bdrxbuf:14 bcrxbuf:3 bvrxbuf:3
txdmabuf:2 bdtxbuf:1 bctxbuf:1 bvtxbuf:3
- Tones and ringing patterns -------------------------------------------
- Tones -------------------+------+------+------+------+------+------+
TONESET:ABILIS | T1 | S1 | T2 | S2 | T3 | S3 |
----------+------+------+------+------+------+------|
DIAL-xx: |(7000)|( 0)|( 0)|( 0)|( 0)|( 0)|
OUT-DIAL-xx: |( 200)|( 200)|( 600)|(1000)|( 0)|( 0)|
ALERT-xx: |(1000)|(4000)|( 0)|( 0)|( 0)|( 0)|
BUSY-xx: |( 500)|( 500)|( 0)|( 0)|( 0)|( 0)|
DISC-xx: |( 200)|( 200)|( 0)|( 0)|( 0)|( 0)|
HOLD-xx: | 110 | 110 | 110 | 1500 | 0 | 0 |
MENU-xx: | 110 | 2000 | 0 | 0 | 0 | 0 |
- POTS Ringing ------------+------+------+------+------+------+------+
EXT-xx: | 1000 | 4000 | 0 | 0 | 0 | 0 |
INT-xx: | 400 | 200 | 400 | 3000 | 0 | 0 |
PKC-xx: | 500 | 500 | 500 | 500 | 1500 | 2000 |
+------+------+------+-------------+------+
- Clock Sources for H100 cards -----------------------------------------
CLK:ANYTE
+----------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
| P1:..P10:| . | . | . | . | . | . | . | . | . | . |
|P11:..P20:| . | . | . | . | . | . | . | . | . | . |
|P21:..P30:| . | . | . | . | . | . | . | . | . | . |
|P31:..P40:| . | . | . | . | . | . | . | . | . | . |
|P41:..P50:| . | . | . | . | . | . | . | . | . | . |
+----------+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+
- Clock Sources for NOT-H100 cards -------------------------------------
+------------+-------+-----+-----+-----+-----+-----+-----+-----+-----+
| CARD: | CLK: | P1: | P2: | P3: | P4: | P5: | P6: | P7: | P8: |
+------------+-------+-----+-----+-----+-----+-----+-----+-----+-----+
765
Draft OPC - Operator Panel Control Draft
On a working Abilis an initialization of CTISYS resource is required (save conf and init res:ctisys).
• when a call fails, enter the code *9 during the disconnection phase and place the phone on-hook;
To abort the call&ring procedure, pick up the phone and enter the code *9 at the dial tone.
Click the button shown in the figure below to use this feature from operator panel.
If another call is placed while the call&ring procedure is active, the procedure is suspended and it's restored at the end of the
call.
The maximum number of retries and the number of seconds between retries can be assigned to two parameters of CTISYS
resource in the call&ring section. Use the below command to view their values.
RES:CtiSys --------------------------------------------------------------------
DESCR:CTI_System_general_properties
- Router ---------------------------------------------------------------
ROUTING:PREFIX max-ctoc:50 au-law:A-LAW NP-CT:NO
OUT-DIAL-TONE:NO OUT-DIAL-DIGIT:0
MAIL-FROM:SYS
CALLS-LOG-DIR:C:\APP\USERS\
NAT-PREFIX:0 INT-PREFIX:00 COUNTRY-CODE:39
TON-TO-PREFIX:YES
- Last Calling number Service ------------------------------------------
LCST:6 lcs-dir:C:\APP\CTI\LCS\
- Call&Ring ------------------------------------------------------------
CALLTRY-TOUT:60 CALLTRY-NRTY:15
- Address Book ---------------------------------------------------------
addrbook-dir:C:\APP\CTI\ADDRBOOK\
ADDRBOOK-PUB-PROTECTED:NO
- EEC ------------------------------------------------------------------
TAIL:128 NLP:YES CNM:NORMAL AEC:NO
TAIL-BASE:0 NLP-A:1 VQE-TONE-DISABLER:YES AEC-TAIL:1024
766
Draft OPC - Operator Panel Control Draft
The following command is useful to set the number of retries to 30 and the number of seconds between retries to 10s. On a
working Abilis an initialization of CTISYS resource is required (save conf and init res:ctisys).
COMMAND EXECUTED
767
Draft OPC - Operator Panel Control Draft
SAVE EXECUTED
Tip
Interesting chapters:
768
Draft OPC - Operator Panel Control Draft
Tip
Interesting chapters:
Tip
Interesting chapters:
769
Draft OPC - Operator Panel Control Draft
770
Draft Draft
Table of Contents
45.1. CTIIAX resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
45.1.1. Activating the CTIIAX resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
45.1.2. CTIIAX resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
45.2. CTIIAX tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775
45.2.1. Users table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775
45.2.2. CTIIAX translation table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778
45.3. CTI Routings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 779
45.4. Example of IAX configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781
45.4.1. Configuration of the CTIIAX resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 782
45.4.2. Users configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 782
45.4.3. CTIIAX translation table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 787
45.4.4. CTI Routings configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 788
45.5. Connecting Abilis and Asterisk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794
45.5.1. Checklist of parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794
45.5.2. Activation of the CTIIAX resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
45.5.3. Example 1: Abilis and Asterisk have static IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
45.5.4. Example 2: Abilis has a static address and Asterisk has a dynamic address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797
45.5.5. CTI Routings configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 799
45.6. CTIIAX diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 802
45.6.1. CTIIAX diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 802
45.6.2. CTIIAX statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
45.6.3. Debug of the CTIIAX resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 805
45.7. Appendix - IAX protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
The CTIIAX resource may already exist in the system, but may not yet be active: set it active with the command:
771
Draft IAX - Inter-Asterisk eXchange Draft
COMMAND EXECUTED
Caution
You must restart the Abilis to make the resource running (use the command warm start to reboot the
Abilis) after adding or setting the CTIIAX active.
COMMAND EXECUTED
Caution
Execute the initialization command init res:ctiiax to activate the changes made on the upper case
parameters; use save conf and warm start commands to set active the changes made on the lowercase
parameters.
772
Draft IAX - Inter-Asterisk eXchange Draft
udp-locport UDP port number on which the incoming IAX (call signalling protocol) call is accepted.
SRCADD Source IP address for outgoing connections [R-ID: the source IP address of the outgoing
datagrams will be set to the current RouterID value; OUT-IP: the source IP address of the
outgoing datagrams will be set on the base of the output IP interface; 1-126.x.x.x,
128-223.x.x.x: the source IP address of the outgoing datagrams will be set to the selected
value; Ip-nnn: use the current IPADD of the specified IP resource].
IPSRC Specifies which client's IP address is allowed to access and called by IAX server.
IPSRCLIST Name of the IP address list (IP/IR/RU/MR) from which the request for access can be accepted.
LIFETIME Default duration of incoming registration; users must register themselves before this time interval
expires.
REM-LIFETIME Default duration of outgoing registration; Abilis must register before this time interval expires.
RETR-FREQ Retransmission frequency (time interval between a retransmission attempt of a IAX full frame and
another one if acknowledgement doesn't arrive).
RETR-EXCEED Retransmission time limit (maximum time for which a frame can stay unacknowledged).
RETR-EXCEED-FAST Retransmission time limit for NEW and REGREQ messages (these messages are used to setup
a call); a shorter timeout for these messages helps in keeping small the time lost in case of peer
failure and make a more effective alternative routing.
TRUNK-FREQ Trunk frequency: it represents how much time to wait prior to send the UDP packet. During this
time other voice packets coming form the same or other channels can be inserted in the same UDP
header thus sensibly reducing the transmisison overhead; of course it adds some delay, but great
benefit toward the bandwidth saving.
773
Draft IAX - Inter-Asterisk eXchange Draft
CHAN-FREQ Channel frequency for bandwidth optimisation. It represents how many msec of voice are desired
to be packed into a single UDP packet; it's a “desire” in the sense that the actual optimisation will
depend on the frame length in msec of the coder in use, and the result will be an a approximation
by defect.
ROUTE-BY-SD It allows routing using subaddress called field (SD) [NO: the SD is completely ignored; YES: the
user corresponding to SD is searched: if found the call is forwarded to that user, otherwise the
standard search in CtiIax table is performed; USER: the user corresponding to SD is searched: if
found and the user has parameter IAX-ROUTE-BY-SD:YES, the call is forwarded to that user,
otherwise the standard search in CtiIax table is performed].
PROVIDE-SG Allows insertion of IAX USER NAME in subaddress calling field [NO: disable insertion
of USERNAME in calling subaddress; YES: enable insertion of USERNAME in calling
subaddress; USER: insertion of USERNAME in calling subaddress depends on individual user
configuration]. When it is enabled, either as result of value YES or because value is USER and
the user corresponing to the subaddress content allows it, the call sent to CTIR will include in the
subaddress calling field the IAX USER NAME of the caller.
PLAY-DTMF Duration of a DTMF played from a DTMF FULL FRAME. When CTIIAX has to convert a
DTMF FULL FRAME command to CTIR DTMF frame, it produces as many frames as needed
to cover the period specified by this parameter. The actual interval must be rounded to the value
immediately higher than configured one.
PLAY-SILENCE Duration of a silence played after a PLAY-DTMF. When CTIIAX has to convert a DTMF FULL
FRAME command to CTIR DTMF frame, it produces as many frames as needed to cover the
perios specified by PLAY-DTMF parameter. Before a new DTMF can be played, a silence period
must elapse, and this is controlled by this parameter.
DETECT-DTMF Duration of a DTMF from CTIR in order to allow digit recognition. When CTIIAX received
DTMF frames from CTIR, and after it created the most accurate and monotonical timestamp, the
DTMF length is measured and for a successful digit recognition it must be of at least the length
specified here. If the configured value is not an exact multiple of the frame rate, it must be rounded
to the next upper value multiple of frame rate.
DETECT-SILENCE Duration of a silence after a DTMF from CTIR in order to recognise a digit.
TRANSFER Unattended call transfer handling type [IAX: the handling respects IAX specifications: the original
call is dropped; CPX: the handling is modified by Abilis: the original call is kept up in case that
transferred one fails(user busy, not reacheable, etc...)].
CPO Enables/disables Call Path Optimization between two IAX users. It is used when IAX-CPO:SYS
in user service, otherwise the value of IAX-CPO is used.
CPO-STATE Earlier state of both call legs in which the Call Path Optimization can be ordered [ACCEPT: CPO
on ACCEPT receiving; RINGING: CPO on RINGING receiving; ANSWER: CPO on ANSWER
receiving].
CPO-DROP Enables/disables call drop on Call Path Optimization (CPO) failure. If enabled, the call will drop if
CPO will fail. It is used when IAX-CPO-DROP:SYS in user service, otherwise the value of IAX-
CPO-DROP is used.
NETSTATS Enables/disables network statistics and checks connection every the specified value of seconds.
HTML-IN URL to send to a caller IAX user using the HTML full frame of the IAX protocol.
HTML-OUT URL to send to a called IAX user using the HTML full frame of the IAX protocol.
The following command allows the administrator to change the configuration of the resource:
s p ctiiax parameter:value...
Caution
Execute the initialization command init res:ctiiax to activate the changes made on the upper case
parameters; use save conf and warm start commands to set active the changes made on the lowercase
parameters.
774
Draft IAX - Inter-Asterisk eXchange Draft
Use the following command to display the parameters of the users; the d user: ? command shows the meaning of parameters.
775
Draft IAX - Inter-Asterisk eXchange Draft
IAX-PROVIDE-NAME: BLANK
IAX-AUTH: SYS
IAX-NETSTATS: SYS
IAX-TRUNK: SYS
IAX-TRUNK-FREQ: SYS
IAX-TRUNK-TS: SYS
IAX-CHAN-FREQ: SYS
IAX-TRANSFER: SYS
IAX-DISC-AUDIO: SYS
IAX-HTML-IN: SYS
IAX-HTML-OUT: SYS
IAX-REM-USER:
IAX-REM-PASS:
IAX-REM-AUTH: SYS
IAX-REM-REG: NO
-------------------------------------------------------------------------------
Note
The above command displays only the parameters related to enabled driver; if you want to see all the user
parameters type the d usere:iax_user command.
IAX-HOST IP address of the IAX host (the ip address of the user) [DYNAMIC: IP is not known in advance,
it is known after the user executes the registration; 1.0.0.0-126.255.255.255,
128.0.0.0-223.255.255.255: remote IP is known in advance; calls and registrations are
performed and accepted only with this IP].
IAX-SRCADD Source IP address for outgoing connections [R-ID: the source IP address of the outgoing
datagrams will be set to the current RouterID value; OUT-IP: the source IP address of the
outgoing datagrams will be set on the base of the output IP interface; 1-126.x.x.x,
128-223.x.x.x: the source IP address of the outgoing datagrams will be set to the selected
value; Ip-nnn: use the current IPADD of the specified IP resource; SYS: uses the value in
SRCADD parameter in CTIIAX resource].
IAX-PORT UDP port on which the remote user is listening; Abilis outgoing UDP calls for this user will be
sent to this port.
IAX-NUMBER Number that identifies the user; if this number is not null, it is used to route calls to the user.
IAX-CG-NUM Calling number to use for calls coming from the user. The parameter accepts from 1 up to 20
characters in the following range: [AUTO: enforces caller id information element equal to IAX-
NUMBER; [0..9]: enforces the content with these exact digits; [0..9]*: replaces first specified
digits and passes the remaining transparently; *: passes calling address information element
transparently; #: removes calling number information element; ##: enforces the presentation
restricted: the calling number is sent empty; ##[0..9]: enforces the presentation restricted: the
calling number is sent with these exact digits; ##[0..9]*: enforces the presentation restricted:
the first specified digits are replaced and the remaining are passed transparently; ##*: enforces the
presentation restricted: the calling number is sent transparently].
IAX-FWD-CG-NUM Indicates how the calling number is managed in unconditional call transfers and call forwarding
[CALLER: the calling number of the original call is passed to the new recipient; USER: the calling
number of the IAX user performing the action is passed to the new recipient].
IAX-ROUTE-BY-SD Allows routing using subaddress called field. Calls from CTIR and directed to IAX users are first
directed to the user with a USERNAME equal to what is specified in Subaddress Called; if such
776
Draft IAX - Inter-Asterisk eXchange Draft
user does not exists, or the user disallows IAX-ROUTE-BY-SD, the call is routed using standard
CTIIAX table matches.
IAX-CONTEXT Context string to use for resource dial-plan choice in other IAX peers.
IAX-PROVIDE-NAME Rule to provide CALLING NAME in outgoing calls [BLANK: provides an empty CALLING
NAME; SG: provides Calling Subaddress as CALLING NAME; REM-USER: provides IAX-
REM-USER as CALLING NAME; NO: doesn't provide CALLING NAME].
IAX-NETSTATS Indicates how often the user availability is checked [SYS: uses the value in NETSTATS parameter
in CTIIAX resource; 1..60: frequency for statistics (sec); NO: No statistics].
IAX-TRUNK Enables/disables trunking [SYS: uses the value in TRUNK parameter in CTIIAX resource; NO:
doesn't allow trunking; YES: allows trunking].
IAX-TRUNK-FREQ IAX trunk frequency [SYS: uses the value in TRUNK-FREQ parameter in CTIIAX resource;
20..240: frequency for trunking (msec)].
IAX-CHAN-FREQ IAX desired channel frequency for bandwidth optimisation, to be rounded down to a codec frame
length multiple [SYS: uses the value in CHAN-FREQ parameter in CTIIAX resource; 30..90:
frequency for banwidth optimisation].
IAX-CPO Enables/disables Call Path Optimization (CPO) [SYS: uses the value in CPO parameter in CTIIAX
resource; NO: doesn't allow CPO; YES: allows CPO].
IAX-CPO-STATE Earlier state of both call legs in which the Call Path Optimization can be ordered [SYS: uses the
value in CPO-STATE parameter in CTIIAX resource; RINGING: CPO on RINGING receiving;
ANSWER: CPO on ANSWER receiving].
IAX-CPO-DROP Enables/disables call drop on Call Path Optimization (CPO) failure [SYS: uses the value in CPO-
DROP parameter in CTIIAX resource; NO: call will not drop on CPO failure.; YES: call will drop
on CPO failure.].
IAX-SS-CF-DND IAX supplementary service. Call forwarding and Do-Not-Disturb [NO, YES]
IAX-TRANSFER Unattended call transfer handling type [SYS: uses the value in IAX-TRANSFER parameter in
CTIIAX resource; IAX: the handling respects IAX specifications: the original call is dropped;
CPX: the handling is modified by Abilis: the original call is kept up in case that transferred one
fails].
IAX-HTML-IN URL to send to a caller IAX user using the HTML full frame of the IAX protocol.
IAX-HTML-OUT URL to send to a called IAX user using the HTML full frame of the IAX protocol.
IAX-REM-USER The name used in the remote IAX server to identify the Abilis (this name is used for both
registration and authentication purposes).
IAX-REM-PASS The password used in the remote IAX server to identify the Abilis (this password is used for both
registration and authentication purposes).
777
Draft IAX - Inter-Asterisk eXchange Draft
IAX-REM-REG Enables/disables the registration of the Abilis to the remote IAX server.
When the parameter IAX-CG-NUM is set to AUTO, calls from CTIIAX to CTIR have the callerid provided by IAX user
validated against the CTIIAX translation table and the IAX-number set in user service. In case of validation failure the
callerid will be overwritten with the value configured in the IAX-number of the user table (*, as wildcard, is not included).
NUMx: USER: P:
------------------------------------------------------------
7* asterisk S
200 iax_user C
• connected: when you specify an IAX-NUMBER in the IAX users chart, the CDI parameter you find in the table will be
the same. In case the routings are connected the letter C will appear under the P item.
Tip
The connected entries are automatically added.
• statics : when you don't specify an IAX-NUMBER in the IAX user table, but you associate it by hand in the table: this
system is used when you need to add several numbers to the same user (for instance in case of static routings) the letter S
will appear under the P item.
Tip
More IAX-numbers can be associated to a single user.
The IAX users creation creates the NumIax list in which are located all the IAX-NUMBERS of the users (it is very useful
for the CTIR configuration).
LIST:NumIax - IN
Automatically_generated_CTI_IAX_Numbers_list_(ReadOnly)
601 602
Note
It is a “read only” list as it is automatically created by the system.
778
Draft IAX - Inter-Asterisk eXchange Draft
The destination or the source of the IAX group appears as CtiIax. When a CTI routing is created there's no need to specify
it, because it is automatically compiled.
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
Tip
Transcoding is allowed when parameter CODERSOUT is different from *.
The transcoding is possible only for the coders supported by Abilis. Refer to Section 42.8, “CTI System
Resource” to have more information about CTISYS resource. To view them, type:
RES:CtiSys --------------------------------------------------------------------
CTI_System_general_properties
-- Number of simultaneous calls ----------------------------------------
| State: Alerting/Connected | State: Any |
---------------|---Current---|----Peak-----|---Current---|----Peak-----|
TR | 0 | 0 | 0 | 0 |
DATA | 0 | 0 | 0 | 0 |
VtoCHISD | 0 | 0 | 0 | 0 |
779
Draft IAX - Inter-Asterisk eXchange Draft
CHISDtoCHISD | 0 | 0 | 0 | 0 |
CHISDtoV | 0 | 0 | 0 | 0 |
ALL | 0 | 0 | 0 | 0 |
------------------------------------------------------------------------
- Available coders -----------------------------------------------------
-- Coder ---|-- Bit rates (kbps) --|-- Coder ---|-- Bit rates (kbps) --|
G.711-A |64 |G.711-u |64 |
TRANSPARENT |64 |Spirit |6.4, 7.2, 8, 8.8, 9.6 |
------------------------------------------------------------------------
- Clock Sources for H100 cards -----------------------------------------
CLK:INT
- Clock Sources for NOT-H100 cards -------------------------------------
*** No NOT-H100 cards running ***
SPOUT Allows to set the maximum bandwidth the coder can use in output [*: preserves the bit rate value; 5300;
6000; 6300; 6400; 7200; 8000; 8800; 9600; 11200; 13200; 13340; 15200; 16000; 18400;
24000; 24800; 32000; 40000; 64000 bps].
Warning
If you set SPOUT:9600, you will not be able to use CODERS which need greater bit rates
(e.g. G.711 works at 64 Kbps).
CODERSOUT Allows to filter/select the available coder audio sets for the output. When you set the parameters * you don't
enable the cross-encoding, you automatically keep the coder used in the incoming call. When you set specific
values or value combinations, you can increase or reduce the set of available coders. Example:
• CODERSOUT:*,Sys : adds, in output, to the coders already present in input, the set described in the
CTISYS resource;
• CODERSOUT:Sys : allows to use, in output, only the coders described in the CTISYS resource;
• CODERSOUT:<specific coder> : enables, in output, only the chosen coder. You can also specify
many coders (divide their names/codes with a comma ,);
• CODERSOUT:*,<coder list> : adds, in output to the already present coders, the coders indicated in
the list; you can also only specify the list;
• CODERSOUT:<coder list> : enables to use in output only the coders present in the list.
Tip
The coder position, inside the coders list in the CTISYS resource, defines the order of
preference.
SP Allows tho set the maximum bandwidth the coder can use in input [5300; 6000; 6300; 6400; 7200;
8000; 8800; 9600; 11200; 13200; 13340; 15200; 16000; 18400; 24000; 24800; 32000; 40000;
64000 bps].
Warning
If you set SPOUT:9600, you will not be able to use CODERS which need greater bit rates
(e.g. G.711 works at 64 Kbps).
CODERS Allows to limit the available audio sets during the negotiation. The various configuration values are:
• CODERS:Sys : accepts in input only the coders specified in the CTISYS resource;
• CODERS:<specific coder> : accepts in input only the indicated coder. You can also specify several
coders (divide their name/code with a comma ,);
• CODERS:<coder list> : accepts in input only the coders indicated in the list.
780
Draft IAX - Inter-Asterisk eXchange Draft
Tip
The coder position, inside the coders list in the CTISYS resource, defines the order of
preference.
MJ Maximum Jitter buffer size; it must be major or equal to DJ [sys, 0..1000 msec].
DJOUT Default Jitter buffer size output; it must be minor or equal to MJOUT [sys, 0..1000 msec];
MJOUT Maximum Jitter buffer size output; it must be major or equal to DJOUT [*, sys, 0..1000 ms].
• Site 1:
• IAX phone;
• Abilis that manages all the systems and a VPN with “Site 2”.
• Site 2:
• Asterisk server;
• Abilis that manages interconnection with Asterisk and a VPN with “Site 1”;
781
Draft IAX - Inter-Asterisk eXchange Draft
• to enable the communication between the IAX users (IAX phone and PC with Zoiper);
• to enable the communication between the POTS telephone of “Site 1” and the IAX users;
• to enable the communication between the IAX users of “Site 1” and the analog phone phone of “Site 2”;
• to forward to the Asterisk of “Site 2” the calls sent to “Site 1” in case “Site 1” is busy or doesn't answer.
In this example suppose that the POTS cards, used to manage the analog phones and configured for Cluster and CtiLink for
compressed phone calls, are already active on Abilis.
COMMAND EXECUTED
COMMAND EXECUTED
782
Draft IAX - Inter-Asterisk eXchange Draft
• password: iaxphone
• host: 192.168.0.100
COMMAND EXECUTED
783
Draft IAX - Inter-Asterisk eXchange Draft
IAX-TRUNK-FREQ: SYS
IAX-TRUNK-TS: SYS
IAX-CHAN-FREQ: SYS
IAX-TRANSFER: SYS
IAX-DISC-AUDIO: SYS
IAX-HTML-IN: SYS
IAX-HTML-OUT: SYS
IAX-REM-USER:
IAX-REM-PASS:
IAX-REM-AUTH: SYS
IAX-REM-REG: NO
-------------------------------------------------------------------------------
Tip
If the IAX-AUTH parameter is set to SYS, you must define, on the IAX Phone, the protocol specified in the
AUTH parameter of the CTIIAX resource as authentication algorithm (in the present case MD5).
COMMAND EXECUTED
• password: zoiper
• half-duplex call: 1
784
Draft IAX - Inter-Asterisk eXchange Draft
IAX: YES
IAX-HOST: DYNAMIC
IAX-SRCADD: SYS
IAX-PORT: (DYNAMIC)
IAX-IP-PERMIT: *
IAX-MAXSES-BID: 1
IAX-MAXSES-IN: 0
IAX-MAXSES-OUT: 0
IAX-NUMBER: 620
IAX-CG-NUM: AUTO
IAX-FWD-CG-NUM: CALLER
IAX-CTIP-TYPE: SYS
IAX-RG-IN: SYS
IAX-ROUTE-BY-SD: NO
IAX-PROVIDE-SG: NO
IAX-CLIP-RULE: SYS
IAX-BUSY-NOCHAN: NO
IAX-LCS-GROUP: NONE
IAX-CPO: SYS
IAX-CPO-STATE: SYS
IAX-CPO-DROP: SYS
IAX-SS: NO
IAX-SS-PICKUP: NO
IAX-SS-PRES-CG: YES
IAX-SS-CF-DND: YES
IAX-CONTEXT:
IAX-PROVIDE-NAME: BLANK
IAX-AUTH: SYS
IAX-NETSTATS: SYS
IAX-TRUNK: SYS
IAX-TRUNK-FREQ: SYS
IAX-TRUNK-TS: SYS
IAX-CHAN-FREQ: SYS
IAX-TRANSFER: SYS
IAX-DISC-AUDIO: SYS
IAX-HTML-IN: SYS
IAX-HTML-OUT: SYS
IAX-REM-USER:
IAX-REM-PASS:
IAX-REM-AUTH: SYS
IAX-REM-REG: NO
-------------------------------------------------------------------------------
Tip
If the IAX-AUTH parameter is set to SYS, you must define, on the Zoiper settings, the protocol specified in
the AUTH parameter of the Ctilax resource as authentication algorithm (in the present case MD5).
COMMAND EXECUTED
785
Draft IAX - Inter-Asterisk eXchange Draft
guest NO # # NO NO NO NO NO NO
• password: asterisk;
• host: 217.1.2.2;
• enable the registration to the remote IAX node (Asterisk) using username “abilis”, password “swordfish” and MD5
authentication.
COMMAND EXECUTED
786
Draft IAX - Inter-Asterisk eXchange Draft
IAX-NETSTATS: SYS
IAX-TRUNK: YES
IAX-TRUNK-FREQ: SYS
IAX-TRUNK-TS: SYS
IAX-CHAN-FREQ: SYS
IAX-TRANSFER: SYS
IAX-DISC-AUDIO: SYS
IAX-HTML-IN: SYS
IAX-HTML-OUT: SYS
IAX-REM-USER: abilis
IAX-REM-PASS: *********
IAX-REM-AUTH: MD5
IAX-REM-REG: YES
-------------------------------------------------------------------------------
Tip
The IAX-NUMBER field of this user is empty, add a static routing in the CTIIAX translation table to route
toward this user the calls addressed to numbers starting with 7.
CDI: USERNAME: P:
----------------------------------------------------------
620 zoiper C
520 iaxphone C
CDI: USERNAME: P:
----------------------------------------------------------
*** NO CTI IAX ENTRIES DEFINED ***
Add a static routing in the CTIIAX table to route the calls directed to the numbers starting with 7 to this user.
COMMAND EXECUTED
NUMx: USER: P:
------------------------------------------------------------
787
Draft IAX - Inter-Asterisk eXchange Draft
7* asterisk S
• to connect the IAX users and the analog phone connected to the POTS on the Abilis of “Site 1”;
• to connect the IAX users and the analog phone connected to the POTS of “Site 2”;
• to forward the input calls of the ISDN line toward the remote Asterisk, in case the POTS telephone of Abilis is busy or
doesn't answer after 20 seconds.
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 ItoI CtiIax CtiIax 'NumIax' *
-------------------------------------------------------------------------------
LIST:NumIax - IN
Automatically_generated_CTI_IAX_Numbers_list_(ReadOnly)
520 620
Tip
Transcoding is not activated because SPOUT and CODERSOUT parameters are set to the default value *; set
the SP parameter value to a value greater than 6400 (default value) to increase the available coder pool.
COMMAND EXECUTED
788
Draft IAX - Inter-Asterisk eXchange Draft
-------------------------------------------------------------------------------
PR:0 DESCR:
ACT:YES EDT:NO
TYPE:DATA POI:* POO:CtiSLink EEC:NO
NEXT:NO CDI:* CDO:*
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:*
UDT:NO SGI:* SGO:*
RGI:* RGO:*
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
-------------------------------------------------------------------------------
PR:1 DESCR:
ACT:YES EDT:NO
TYPE:ItoI POI:CtiIax POO:CtiIax EEC:NO
NEXT:NO CDI:'NumIax' CDO:*
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:*
UDT:NO SGI:* SGO:*
LCS:NO LCST:Sys RGI:* RGO:*
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:64000 SC:Sys DJ:Sys MJ:Sys ECM:Sys
CODERS:*
SPOUT:* SCOUT:* DJOUT:* MJOUT:*
CODERSOUT:*
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
45.4.4.1.2. Communication between the analog phone and the IAX users.
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 ItoI CtiIax CtiIax 'NumIax' *
789
Draft IAX - Inter-Asterisk eXchange Draft
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
2 VtoI PBX CtiIax 'NumIax' *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
3 ItoV CtiIax 101 420 *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
The PR:2 routing, routes the calls coming from the Abilis POTS port toward the CTIIAX and directed to one number of the
numiax list. The CTIIAX routing table will forward the call to the user.
The PR:3 routing, routes toward port 101 (where the analog phone is connected) the calls coming from one of the IAX users
and directed to the number 420.
45.4.4.1.3. Communication between the IAX users and the remote analog phone.
Add the following routings:
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 ItoI CtiIax CtiIax 'NumIax' *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
2 VtoI PBX CtiIax 'NumIax' *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
3 ItoV CtiIax 101 420 *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
4 ItoC CtiIax site2 320 *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
790
Draft IAX - Inter-Asterisk eXchange Draft
-------------------------------------------------------------------------------
5 CtoI * CtiIax 'NumIax' *
NO ANY NO Dft * *
64000 Sys * * Sys Sys * *
-------------------------------------------------------------------------------
The PR:4 routing routes toward the Site 2 cluster the calls coming from IAX users and directed to the number 320 (the
analog phone of the remote site).
The PR:5 routing routes toward the Ctilax the calls coming from any cluster and directed to one of the numbers of the
numiax list (numbers given to the IAX users). The Ctilax translation table will forward the call to the user.
45.4.4.1.4. Transfer the incoming calls from the ISDN line towards Asterisk, in case the analog
phone of “Abilis 1” is busy or doesn't answer after 20 seconds.
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 ItoI CtiIax CtiIax 'NumIax' *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
2 VtoI PBX CtiIax 'NumIax' *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
3 ItoV CtiIax 101 420 *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
4 ItoC CtiIax Clus2 320 *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
5 CtoI * CtiIax 'NumIax' *
NO ANY NO Dft * *
64000 Sys * * Sys Sys * *
791
Draft IAX - Inter-Asterisk eXchange Draft
-------------------------------------------------------------------------------
6 TR 34 101 * *
TRANSFERT ANY NO 20 * *
-------------------------------------------------------------------------------
7 VtoC 34 Clus2 * 701
-------------------------------------------------------------------------------
The PR:6 routing routes toward port 101 (analog phone) the calls coming from the ISDN line (CTIP:34). In
case the telephone is busy or doesn't answer after 20 seconds (T301:20), the call is forwarded to the next routing
(NEXT:TRANSFERT).
The PR:7 routing routes the calls toward the Site 2 cluster; the numbers starting with 7 are sent to the remote Asterisk.
• to connect the analog phone of “Site2” and the IAX users of the Abilis of “Site 1”;
• to forward to Asterisk the calls coming from “Site 1” in case of the remote analog phone is busy or doesn't answer.
45.4.4.2.1. Communication between the IAX users and the remote analog phone.
Use normal routings for compressed phone calls:
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
LIST:RemoteIAX - IN
IAX_user's_number_of_site_1
520 620
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
792
Draft IAX - Inter-Asterisk eXchange Draft
The PR:1 routing routes to port ctip:101 the calls coming from any cluster and addressed to the number 320.
The PR:2 routing routes the calls coming from an analog phone to the cluster site1, when the called number belongs to the
RemoteIAX list.
45.4.4.2.2. Transfer the incoming calls from Site 1 towards Asterisk, in case the analog remote
phone is busy or doesn't answer.
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 CtoV * 101 320 *
-------------------------------------------------------------------------------
2 VtoC PBX Clus1 'remoteiax' *
-------------------------------------------------------------------------------
3 CtoI * CtiIax 7* *
NO ANY NO Dft * *
64000 Sys * * Sys Sys * *
-------------------------------------------------------------------------------
The PR:3 routing routes toward CTIIAX resource the calls coming from any cluster; when the called number starts with 7 the
Ctilax routing table forwards the call toward to Asterisk.
• answering service (saves the messages and sends them as mail enclosures);
• virtual answering service ( in case the called number gives no answer, Asterisk sends a mail containing the calling number
with data and time);
• operator service;
793
Draft IAX - Inter-Asterisk eXchange Draft
• ...
Tip
Asterisk offers many solutions of advanced call management (conference, answering service, operator
service…); to every service you can assign a specific code and manage them with a single routing.
The PR:3 routing forwards to Asterisk all the calls starting with 7: Configuring the routing of the remote
Abilis,the answering service can be assigned to number 701, the conferences to number 750, the operator to
number 711, etc…
The calls converge toward this Abilis, the PR:3 routing allows the matching, and Asterisk manages the calls
depending on the selected number.
Tip
Abilis generates the alerting tone after RINGING when ALERTING without progress in-band-info is
received from CTIR. The audio is sent after RINGING acknowledgment. Alerting tone is generated
according to CTISYS tones configuration.
794
Draft IAX - Inter-Asterisk eXchange Draft
In common use, you don't need to configure all the listed parameters, many of them belong to the IAX protocol advanced
options. The basic options are:
• SRCADD: source IP address for outgoing connections [R-ID: the source IP address of the outgoing datagrams will be set
to the current RouterID value; OUT-IP: the source IP address of the outgoing datagrams will be set on the base of the
output IP interface; 1-126.x.x.x, 128-223.x.x.x: the source IP address of the outgoing datagrams will be set to
the selected value; Ip-nnn: use the current IPADD of the specified IP resource].
Tip
If Abilis has only one IP resource (and therefore only one IP address) , you can use the default value;
otherwise if Abilis has more IP resoures and more IP addresses the suggested configuration is OUT-IP.
Assumptions:
• Asterisk provides advanced services like IVR and voice mail: suppose that 10 sessions are needed.
COMMAND EXECUTED
COMMAND EXECUTED
Below the result is displayed (emphasized parameters are the values different from defaults):
795
Draft IAX - Inter-Asterisk eXchange Draft
USER: asterisk
ALIAS: asterisk
ID: 9 <Read Only>
PWD: ***
ACT: YES
GROUP:
CTIP: #
CLUS: #
OPC-ROLE: USER
OPC-VIEW: *
OPC-MONITOR: NONE
IAX: YES
IAX-HOST: 192.168.001.100
IAX-SRCADD: SYS
IAX-PORT: 4569
IAX-IP-PERMIT: *
IAX-MAXSES-BID: 10
IAX-MAXSES-IN: 0
IAX-MAXSES-OUT: 0
IAX-NUMBER: *
IAX-CG-NUM: AUTO
IAX-FWD-CG-NUM: CALLER
IAX-CTIP-TYPE: SYS
IAX-RG-IN: SYS
IAX-ROUTE-BY-SD: NO
IAX-PROVIDE-SG: NO
IAX-CLIP-RULE: SYS
IAX-BUSY-NOCHAN: NO
IAX-LCS-GROUP: NONE
IAX-CPO: SYS
IAX-CPO-STATE: SYS
IAX-CPO-DROP: SYS
IAX-SS: NO
IAX-SS-PICKUP: NO
IAX-SS-PRES-CG: YES
IAX-SS-CF-DND: YES
IAX-CONTEXT:
IAX-PROVIDE-NAME: BLANK
IAX-AUTH: SYS
IAX-NETSTATS: SYS
IAX-TRUNK: YES
IAX-TRUNK-FREQ: SYS
IAX-TRUNK-TS: SYS
IAX-CHAN-FREQ: SYS
IAX-TRANSFER: SYS
IAX-DISC-AUDIO: SYS
IAX-HTML-IN: SYS
IAX-HTML-OUT: SYS
IAX-REM-USER: abilis
IAX-REM-PASS: *********
IAX-REM-AUTH: MD5
IAX-REM-REG: YES
-------------------------------------------------------------------------------
The CTIIAX table, used to route calls toward IAX users, gets automatically populated with a unique route because you set
IAX-NUMBER:*.
NUMx: USER: P:
796
Draft IAX - Inter-Asterisk eXchange Draft
------------------------------------------------------------
* asterisk C
The asterisk configuration file /etc/asterisk/extensions.conf must contain a context for managing the calls. For
our convenience we use here the name from-abilis:
[from-abilis]
exten => 123,1,Answer() ; answer, play, hangup
exten => 123,2,Playback(welcome)
exten => 123,3,Hangup
exten => 222,1,Answer() ; answer, play, forward call to another number (999)
exten => 222,2,Playback(welcome)
exten => 222,3,Dial(IAX2/abilis/999)
The asterisk configuration file /etc/asterisk/iax.conf must be modified to include the following lines in the
general context:
[general]
disallow=all ; first disallow every coder
allow=alaw ; then enable only G.711 A-law
trunkfreq=40 ; trunkfrequency 40 msec
trunktimestamps=yes ; individual miniframes timestamp
[abilis]
type=friend
username=asterisk ;the same of USER in Abilis
secret=swordfish ;the same of PWD and IAX-REM-PASS in Abilis
host=192.168.1.254 ;Abilis static address
context=from-abilis ;name of the desired context from extensions.conf
trunk=yes ;enable trunking
Caution
Remember to reload the Asterisk service.
Assumptions:
• Asterisk provides advanced services like IVR and voice mail: suppose that 10 sessions are needed.
The steps are the same as in the Section 45.5.3, “Example 1: Abilis and Asterisk have static IP addresses”,there is just one
parameter different in Abilis and one directive to add in Asterisk configuration.
797
Draft IAX - Inter-Asterisk eXchange Draft
COMMAND EXECUTED
COMMAND EXECUTED
The Abilis user configuration differs from Section 45.5.3, “Example 1: Abilis and Asterisk have static IP addresses” by the
fields emphasized below :
798
Draft IAX - Inter-Asterisk eXchange Draft
IAX-CHAN-FREQ: SYS
IAX-TRANSFER: SYS
IAX-DISC-AUDIO: SYS
IAX-HTML-IN: SYS
IAX-HTML-OUT: SYS
IAX-REM-USER: abilis
IAX-REM-PASS: *********
IAX-REM-AUTH: MD5
IAX-REM-REG: YES
-------------------------------------------------------------------------------
The asterisk configuration file /etc/asterisk/iax.conf must be modified to include in the general context the
register directive:
[general]
disallow=all ; first disallow every coder
allow=alaw ; then enable only G.711 A-law
trunkfreq=40 ; trunk frequency 40 msec
trunktimestamps=yes ; individual miniframes timestamp
Caution
Remember to reload the Asterisk service.
In this situation any coder with maximal speed 6400 (the default for SP parameter) is allowed, but transcoding is disallowed,
which means that the same coder must be used in Asterisk and in the Abilis where a CtoV or CtoI routing will terminate the
call to an ISDN/POTS/GSM port or to another IAX user.
Cluster test is only useful to the example, any cluster can be used.
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
799
Draft IAX - Inter-Asterisk eXchange Draft
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 VtoI * CtiIax * *
-------------------------------------------------------------------------------
1 CtoI * CtiIax * *
-------------------------------------------------------------------------------
2 ItoC CtiIax test * *
LIMITED ANY NO Dft * *
-------------------------------------------------------------------------------
3 ItoV CtiIax G1 * *
-------------------------------------------------------------------------------
Tip
Set SP:8000 in every routing to allow G.729A .
In this situation only G.711 A-law or u-law is possible between Asterisk and Abilis, but since transcoding is enabled by
CODERSOUT <> * the ItoC and CtoI routings will negotiate for the “C” side any coder with maximal speed up 6400 bps.
COMMAND EXECUTED
COMMAND EXECUTED
[15:26:22] ABILIS_CPX:a ctir pr:2 type:itoc ds:test cdi:* next:limited sp:64000 coders:g.711 spout:
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
800
Draft IAX - Inter-Asterisk eXchange Draft
Tip
To allow G.729A you have to set SP:8000 in CtoI PR:1 and SPOUT:8000 in ItoC PR:2.
When the Abilis-Asterisk interconnection occurs via local LAN, i.e. with high speed, minimal delays, minimal jitter, the
transcoding can be optimized so that the Asterisk side uses minimal jitter, therefore minimal delays, while the WAN side
uses the values optimal for WAN link.
This is obtained by properly setting DJ, MJ, DJOUT, MJOUT. For example, type:
COMMAND EXECUTED
COMMAND EXECUTED
Tip
DJ and MJ in pr:1 as well as DJOUT and MJOUT in pr:2 may assume other values appropriate for the
WAN link or specifically required by calls matching the routing.
45.5.5.2.2. Fax
When transcoding takes place in IoC and CtoI, with G.711 toward Asterisk FAX relay can be used! It means that if your
asterisk is properly set-up to manage faxes via G.711 coder, you can exchange FAX with following characteristics:
801
Draft IAX - Inter-Asterisk eXchange Draft
• use G3 Fax relay, 2400/4800/9600/14400 kbps plus IP overhead on the WAN link.
If you want to forcedly disable fax relay you have just to set FMRELAY:NO in the desired routing, e.g.:
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
d d ctiiax Shows diagnostic information, such as the state of the resource, the currently used channels, the remote
IAX username/address/port, the calling and the called number.
d de ctiiax Shows diagnostic information in an extended format: the same information listed for d d ctiiax command
and the state of Unattended/Attended Call Transfer, the minimum/average/maximum lag value during the
call and the jitter value (calculated as variance of the lag) in least 10 seconds.
RES:CtiIax --------------------------------------------------------------------
Inter-Asterisk_eXchange_Version_2
STATE:ACTIVE UDP-STATE:OPENED USED-CHAN:1
- IAX Channels diagnostics ---------------------------------------------
CH: IAXState User RemAdd-RemPort
Q931State CallId CG CD
------------------------------------------------------------------------
0 CONNECTED asterisk160 192.168.000.253-4569
10-CONNECTED-TO 636 9916 749
------------------------------------------------------------------------
1 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
2 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
3 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
4 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
5 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
6 DISCONNECTED
802
Draft IAX - Inter-Asterisk eXchange Draft
00-DISCONNECTED
------------------------------------------------------------------------
7 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
8 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
9 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
RES:CtiIax --------------------------------------------------------------------
Inter-Asterisk_eXchange_Version_2
STATE:ACTIVE UDP-STATE:OPENED USED-CHAN:1
- IAX Channels diagnostics ---------------------------------------------
CH: IAXState User RemAdd-RemPort
Q931State CallId CG CD
Q932State UCTState ACTState CPOState
MinLag MaxLag AvgLag LastLag 10sec-JitterLag
------------------------------------------------------------------------
0 CONNECTED asterisk160 192.168.000.253-4569
10-CONNECTED-TO 636 9916 749
IDLE - - -
- - - - -
------------------------------------------------------------------------
1 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
2 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
3 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
4 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
5 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
6 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
7 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
8 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
9 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
d s ctiiax Shows statistic information, such as the number of incoming/outgoing accepted/rejected calls, the number
of incoming/outgoing succesful/failed registrations, the number of incoming/outgoing succesful/failed
transmission requests.
803
Draft IAX - Inter-Asterisk eXchange Draft
d se ctiiax Shows statistic information in an extended format: the same information listed for d se ctiiax command
are shown for each session.
RES:CtiIax --------------------------------------------------------------------
Inter-Asterisk_eXchange_Version_2
--- Cleared 45 days 03:25:16 ago, on 07/11/2007 at 18:50:14 ------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SUCC-CALL | 1023| 5569|FAIL-CALL | 53| 1304|
SUCC-REG | 51217| 12807|FAIL-REG | 12| 52198|
SUCC-QUAL | 0| |FAIL-QUAL | 31| |
SUCC-TRAN | 2520| |FAIL-TRAN | 1018| |
SUCC-TXREQ | 0| 0|FAIL-TXREQ | 0| 0|
EXP-RETRY | 12| 53530|DTMF | 34| 100|
QUELCH | 2461| |UNQUELCH | 2416| |
LOST-JITTER| | 0|OUTSEQ-FULL| 21| |
LOST-NOBUF | 0| 0|OUTSEQ-MINI| 7| |
BLACKLISTED| 0| |UNSUPPORTED| 0| 0|
TRUNK-OVR | | 0|
------------------------------------------------------------------------
RES:CtiIax --------------------------------------------------------------------
Inter-Asterisk_eXchange_Version_2
--- Cleared 45 days 03:25:23 ago, on 07/11/2007 at 18:50:15 ------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SUCC-CALL | 1023| 5569|FAIL-CALL | 53| 1304|
SUCC-REG | 51217| 12807|FAIL-REG | 12| 52198|
SUCC-QUAL | 0| |FAIL-QUAL | 31| |
SUCC-TRAN | 2520| |FAIL-TRAN | 1018| |
SUCC-TXREQ | 0| 0|FAIL-TXREQ | 0| 0|
EXP-RETRY | 12| 53530|DTMF | 34| 100|
QUELCH | 2461| |UNQUELCH | 2416| |
LOST-JITTER| | 0|OUTSEQ-FULL| 21| |
LOST-NOBUF | 0| 0|OUTSEQ-MINI| 7| |
BLACKLISTED| 0| |UNSUPPORTED| 0| 0|
TRUNK-OVR | | 0|
------------------------------------------------------------------------
CH:0 CallId:24026 CG:3381834848 CD:601
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
VOICE-FRM | 334| 301|LOST | 0| |
OUTSEQ-FULL| 0| |LOST-JITTER| | 0|
OUTSEQ-MINI| 0| |LOST-NOBUF | | 0|
------------------------------------------------------------------------
CH:1 CallId:17799 CG: CD:621
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
VOICE-FRM | 0| 0|LOST | 0| |
OUTSEQ-FULL| 0| |LOST-JITTER| | 0|
OUTSEQ-MINI| 0| |LOST-NOBUF | | 0|
------------------------------------------------------------------------
CH:2 CallId:1488 CG:671 CD:601
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
VOICE-FRM | 1184| 1178|LOST | 0| |
OUTSEQ-FULL| 0| |LOST-JITTER| | 0|
OUTSEQ-MINI| 0| |LOST-NOBUF | | 0|
------------------------------------------------------------------------
CH:3 CallId:0 CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
VOICE-FRM | 0| 0|LOST | 0| |
OUTSEQ-FULL| 0| |LOST-JITTER| | 0|
OUTSEQ-MINI| 0| |LOST-NOBUF | | 0|
804
Draft IAX - Inter-Asterisk eXchange Draft
------------------------------------------------------------------------
CH:4 CallId:0 CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
VOICE-FRM | 0| 0|LOST | 0| |
OUTSEQ-FULL| 0| |LOST-JITTER| | 0|
OUTSEQ-MINI| 0| |LOST-NOBUF | | 0|
------------------------------------------------------------------------
CH:5 CallId:0 CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
VOICE-FRM | 0| 0|LOST | 0| |
OUTSEQ-FULL| 0| |LOST-JITTER| | 0|
OUTSEQ-MINI| 0| |LOST-NOBUF | | 0|
------------------------------------------------------------------------
CH:6 CallId:0 CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
VOICE-FRM | 0| 0|LOST | 0| |
OUTSEQ-FULL| 0| |LOST-JITTER| | 0|
OUTSEQ-MINI| 0| |LOST-NOBUF | | 0|
------------------------------------------------------------------------
CH:7 CallId:0 CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
VOICE-FRM | 0| 0|LOST | 0| |
OUTSEQ-FULL| 0| |LOST-JITTER| | 0|
OUTSEQ-MINI| 0| |LOST-NOBUF | | 0|
------------------------------------------------------------------------
CH:8 CallId:0 CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
VOICE-FRM | 0| 0|LOST | 0| |
OUTSEQ-FULL| 0| |LOST-JITTER| | 0|
OUTSEQ-MINI| 0| |LOST-NOBUF | | 0|
------------------------------------------------------------------------
CH:9 CallId:0 CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
VOICE-FRM | 0| 0|LOST | 0| |
OUTSEQ-FULL| 0| |LOST-JITTER| | 0|
OUTSEQ-MINI| 0| |LOST-NOBUF | | 0|
------------------------------------------------------------------------
Note
To use these commands you need to have administrator or super user rights.
RES:CtiIax --------------------------------------------------------------------
Inter-Asterisk_eXchange_Version_2
BufferLength:931 Date/Time:29/06/2007 14:10:00 TraceTime:4812354
Usage:
805
Draft IAX - Inter-Asterisk eXchange Draft
Type the following command to display the event logs connected with the users registation:
RES:CtiIax --------------------------------------------------------------------
Inter-Asterisk_eXchange_Version_2
BufferLength:16243 Date/Time:28/06/2007 18:05:56 TraceTime:<NotRunning>
This table shows data, time, identification of the event and the description of the error.
• unknown user;
• debug res:ctiiax lsn:3 cmd:set:err : set log mask to log only errors events;
• debug res:ctiiax lsn:3 cmd:set:err,reg : set log mask to log only errors and registration events;
• debug res:ctiiax lsn:3 cmd:set:full : set log mask to log any event.
The following command shows the registration table (remote peers registered with Abilis and remote peers Abilis is
registered to). Registration in IAX is a way to avoid NAT troubles and mantain connectivity between IAX peers.
RES:CtiIax --------------------------------------------------------------------
Inter-Asterisk_eXchange_Version_2
BufferLength:324 Date/Time:18/01/2008 11:24:47 TraceTime:<NotRunning>
806
Draft IAX - Inter-Asterisk eXchange Draft
REG Registration of the user [REMOTE: Abilis is registered to a remote peer; LOCAL: a remote peer is registered to
Abilis].
In the previous example, Abilis is registered to the remote peer asterisk (ip address: 192.168.0.250) which needs Abilis
registration each 60 seconds; Abilis registered itself 12 seconds ago.
The user zoiper (ip address: 192.168.0.24) is registered to Abilis; it registered itself 35 seconds ago.
IAX now most commonly refers to IAX2, the Version 2 of the IAX protocol. The original IAX protocol has been deprecated
almost universally in favor of IAX2; subsequent references to IAX, in this tutorial, refer to Version 2.
The primary design goals for the IAX protocol are: minimize bandwidth usage for both control and media with specific
emphasis on individual voice calls and provide native support for Network Address Translation (NAT).
IAX is a peer-to-peer media and signaling protocol; the signaling component is similar to the Session Initiation Protocol
(SIP). With respect to media, sequencing and timing information is included in IAX frames.
The basic design approach for IAX multiplexes signaling and multiple media streams over a single User Datagram Protocol
(UDP) association between two Internet hosts. In this facet of its design, it is actually two protocols in one, a protocol for
signaling sessions and a protocol for transporting the actual media streams themselves. This approach differs from the overall
architecuture of other IETF-based protocols that separate the control (SIP) and media stream (RTP/RTCP) components using
different protocols. Because signaling and media share the same UDP port number (4569) , IAX does not suffer from the
NAT traversal problems associated with SIP.
Tip
Interesting links: The IAX protocol.4
1
http://en.wikipedia.org/wiki/IAX
2
http://www.asterisk.org/
3
http://en.wikipedia.org/wiki/Pbx
807
Draft Draft
Table of Contents
46.1. CTISIP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808
46.1.1. Activating the CTISIP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808
46.1.2. CTISIP resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
46.2. CTISIP tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
46.2.1. Users table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
46.2.2. CTISIP translation table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
46.3. CTI Routings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816
46.4. Example of configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818
46.4.1. Activation and configuration of the CtiSip resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
46.4.2. Users configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
46.4.3. CTISIP translation table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
46.4.4. CTI Routings configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 823
46.5. Connecting Abilis and a SIP proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 826
46.5.1. Activation of the CTISIP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 826
46.5.2. Example: Abilis and a proxy registered in Abilis domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 826
46.5.3. Example: Proxy and Abilis registered in Proxy remote domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
46.5.4. CTI Routings configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
46.6. Busy Lamp Field (BLF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
46.6.1. Dialog an presence monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
46.6.2. BLF in Abilis CPX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
46.7. CTISIP diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
46.7.1. CTISIP diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
46.7.2. CTISIP statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
46.7.3. Debug of the CTISIP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837
46.8. Appendix - SIP protocol overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
46.8.1. SIP and NAT trasversal problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
46.8.2. Solution to SIP NAT trasversal problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840
46.8.3. SIP NAT Trasversal problem with Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840
808
Draft SIP - Session Initiation Protocol Draft
The CTISIP resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the CTISIP active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
Caution
Execute the initialization command init res:ctisip to activate the changes made on the upper case
parameters. Use the command save conf and restart Abilis (i.e. with warm start command) to set act the
changes made on the lowercase parameters.
RES:CtiSip --------------------------------------------------------------------
Run DESCR:Session_Initiation_Protocol
LOG:NO ACT:YES mxps:2172
sesnum:10 non-invite-sesnum:50 tcp-sesnum:10
tcp-locport:5060 UDP-PORT-BASE:6000 SIP-TOS:0-N
udp-locport:5060 UDP-PORT-RANGE:200 RTP-TOS:0-D
SRCADD:OUT-IP
EXTERNAL-IP:OUT-IP
IPSRC:* IPSRCLIST:#
SUB-LIFETIME:180 max-sub:100
AUTH:DIGEST KEEPALIVE:90 CTIP-TYPE:USER
LIFETIME:120 DISC-AUDIO:NO NP-CT:SYS
REM-AUTH:DIGEST T1:500 ROUTING:EN-BLOC
REM-LIFETIME:120 T2:4 DIALT:5
AUTH-TOUT:4 T4:5 T302:15
AUTH-TOUT-INVITE:4 CHAN-FREQ:20 ROUTE-BY-SD:NO
DTMF-MODE:RFC2833 T38:NO PROVIDE-SG:NO
PLAY-DTMF:100 T38-G711:NO CLIP-RULE:PRIVATE
PLAY-SILENCE:100 T38-PACKING:1 RG-IN:DISABLE
DETECT-DTMF:40 T38-REDUND:REDUNDANCY CPO-RTP:NO
DETECT-SILENCE:40 T38-REDUND-PCK:1 CPO-SIGNALLING:NO
DOMAIN:
UA:AUTO (Abilis CPX - Ver. 3570/STD-D - Build 3570)
809
Draft SIP - Session Initiation Protocol Draft
non-invite-sesnum Number of SIP sessions/dialogs initiated by NON-INVITE methods: i.e. Register, Subscribe and
Notify.
tcp-ses Number of reserved TCP sessions available for SIP channels; this value must not be greater than
sesnum [0..254, AUTO: inherit value from sesnum].
UDP-PORT-BASE Base local UDP port usable for RTP/RTCP sessions; this feature is required to assign high
priority to RTP/RTCP packets.
UDP-PORT-RANGE Range of permitted local UDP ports usable for RTP/RTCP sessions; this value must not be lower
than (sesnum * 2 + 50).
SRCADD Source IP address for outgoing connections [R-ID: the source IP address of the outgoing
datagrams will be set to the current RouterID value; OUT-IP: the source IP address of the
outgoing datagrams will be set on the base of the output IP interface; 1-126.x.x.x,
128-223.x.x.x: the source IP address of the outgoing datagrams will be set to the selected
value; Ip-nnn: use the current IPADD of the specified IP resource].
EXTERNAL-IP Abilis external IP address. [R-ID: the source IP address of the outgoing datagrams will be set
to the current RouterID value; OUT-IP: the source IP address of the outgoing datagrams will be
set on the base of the output IP interface; 1-126.x.x.x, 128-223.x.x.x: the source IP
address of the outgoing datagrams will be set to the selected value]. When OUT-IP or R-ID are
set, the address must be determined at the call start and must not change until call end.
IPSRC Specifies which client's IP address is allowed to access and called by SIP server; a client is
accepted if it also satisfies SIP-IP-PERMIT specified in User table.
IPSRCLIST Name of the IP address list (IP/IR/RU/MR) from which the request for access can be accepted; a
client is accepted if it also satisfies SIP-IP-PERMIT specified in User table.
max-sub Maximum number of subscriptions that CTISIP may handle independently from the event type,
the subscriber and the monitored resource.
LIFETIME Default duration of incoming registration; users must register themselves before this time interval
expires.
REM-LIFETIME Default duration of outgoing registration; Abilis must register before this time interval expires.
AUTH-TOUT SIP NOT-INVITE authentication timeout for incoming/outgoing calls initiated by REGISTER
method.
AUTH-TOUT-INVITE SIP INVITE authentication timeout for incoming/outgoing calls initiated by INVITE method.
KEEPALIVE Session keepalive time; when this session inactivity timer expires a RE-INVITE or UPDATE
message is sent.
810
Draft SIP - Session Initiation Protocol Draft
ROUTE-BY-SD It allows routing using subaddress called field (SD) [NO: the SD is completely ignored; YES: the
user corresponding to SD is searched: if found the call is forwarded to that user, otherwise the
standard search in CTISIP table is performed; USER: the user corresponding to SD is searched: if
found and the user has parameter SIP-ROUTE-BY-SD:YES, the call is forwarded to that user,
otherwise the standard search in CTISIP table is performed].
PROVIDE-SG Allows insertion of SIP USER NAME in subaddress calling field [NO: disable insertion
of USERNAME in calling subaddress; YES: enable insertion of USERNAME in calling
subaddress; USER: insertion of USERNAME in calling subaddress depends on individual user
configuration]. When it is enabled, either as result of value YES or because value is USER and
the user corresponing to the subaddress content allows it, the call sent to CTIR will include in the
subaddress calling field the SIP USER NAME of the caller.
DTMF-MODE DTMF mode used by CTISIP in outgoing DTMF [INBAND: the outband DTMF received from
CTIR is not dropped, only the audio stream is passed; INFO: the outband DTMF received from
CTIR is sent using INFO message; RFC2833: the outband DTMF received from CTIR is sent
using RFC2833 payload].
PLAY-DTMF Duration of a DTMF played from a DTMF FULL FRAME. When CTISIP has to convert a
DTMF FULL FRAME command to CTIR DTMF frame, it produces as many frames as needed
to cover the period specified by this parameter. The actual interval must be rounded to the value
immediately higher than configured one.
PLAY-SILENCE Duration of a silence played after a PLAY-DTMF. When CTISIP has to convert a DTMF FULL
FRAME command to CTIR DTMF frame, it produces as many frames as needed to cover the
perios specified by PLAY-DTMF parameter. Before a new DTMF can be played, a silence period
must elapse, and this is controlled by this parameter.
DETECT-DTMF Duration of a DTMF from CTIR in order to allow digit recognition. When CTISIP received
DTMF frames from CTIR, and after it created the most accurate and monotonical timestamp,
the DTMF length is measured and for a successful digit recognition it must be of at least the
length specified here. If the configured value is not an exact multiple of the frame rate, it must be
rounded to the next upper value multiple of frame rate.
DETECT-SILENCE Duration of a silence after a DTMF from CTIR in order to recognise a digit.
T2 SIP T2 time; maximum retransmission interval for NON-INVITE requests and INVITE
responses.
T4 SIP T4 time; maximum duration that a message can remain in the network.
CHAN-FREQ Channel frequency for bandwidth optimisation. It represents how many msec of voice are desired
to be packed into a single UDP packet; it's a “desire” in the sense that the actual optimisation will
depend on the frame length in msec of the coder in use, and the result will be an a approximation
by defect.C
CPO-RTP Enables/disables Call Path Optimization between two SIP users. It is used when SIP-CPO:SYS
in user service, otherwise the value of SIP-CPO is used.
DOMAIN Domain for local users. If Abilis has clients in the public side you can also specify a FQDN.
The following command allows the administrator to change the configuration of the resource:
s p ctisip parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:ctisip; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
811
Draft SIP - Session Initiation Protocol Draft
Use the below command to display the parameters of the users; the d user: ? command shows the meaning of all parameters.
USER: PWD: ACT: CTIP: CLUS: PPP: FTP: HTTP: MAIL: IAX: SIP:
--------------------------------+--------------+-------------------------------
admin *** YES # # YES YES YES NO NO NO
guest NO # # NO NO NO NO NO NO
test *** YES # # NO NO YES NO NO YES
Parameter: | Value:
------------------+------------------------------------------------------------
USER: test
ALIAS: test
ID: 4 <Read Only>
PWD: ***
ACT: YES
GROUP:
CTIP: #
CLUS: #
OPC-ROLE: OPERATOR
OPC-VIEW: *
OPC-MONITOR: SIP
OPC-HIDE-NUMBERS: NO
OPC-PRIVACY: NO
HTTP: YES
HTTP-PROT: PLAIN,SSL
SIP: YES
SIP-TYPE: PHONE
SIP-DOMAIN: SYS
SIP-HOST: DYNAMIC
SIP-TCP-REMPORT: (DYNAMIC)
SIP-UDP-REMPORT: (DYNAMIC)
sip-udp-locport: SYS
SIP-SRCADD: SYS
SIP-PROT-IN: TCP,UDP
SIP-PROT-OUT: UDP
SIP-IP-PERMIT: *
SIP-MAXSES-BID: 4
SIP-MAXSES-IN: 0
SIP-MAXSES-OUT: 0
SIP-NUMBER: 10
SIP-CG-NUM: AUTO
SIP-FWD-CG-NUM: CALLER
SIP-CTIP-TYPE: SYS
SIP-RG-IN: SYS
SIP-ROUTE-BY-SD: NO
SIP-PROVIDE-SG: NO
SIP-CLIP-RULE: SYS
SIP-BUSY-NOCHAN: NO
SIP-LCS-GROUP: NONE
812
Draft SIP - Session Initiation Protocol Draft
SIP-CPO-RTP: SYS
SIP-CPO-SIGNALLING: SYS
SIP-SS: NO
SIP-SS-PICKUP: NO
SIP-SS-PRES-CG: YES
SIP-SS-CF-DND: YES
SIP-AUTH: SYS
SIP-CHAN-FREQ: SYS
SIP-REMOTE-NAT: NO
SIP-LOCAL-NAT: NO
SIP-EXTERNAL-IP: SYS
SIP-KEEPALIVE: ENABLED
SIP-DTMF-MODE: SYS
SIP-DISC-AUDIO: SYS
SIP-BC-TRANSP: UDI
SIP-T38: SYS
SIP-T38-G711: SYS
SIP-T38-PACKING: SYS
SIP-T38-REDUND: SYS
SIP-T38-REDUND-PCK: SYS
SIP-UA: SYS
SIP-UA-PERMIT: *
SIP-REM-USER:
SIP-REM-PASS:
SIP-REM-AUTH: SYS
SIP-REM-REG: NO
------------------------------------------------------------------------------
Note
This command displays only the parameters related to enabled driver; if you want to see all the user
parameters type the d usere:sip_user command.
SIP-TYPE • PHONE: The user is a SIP client of Abilis, in example it is a phone or a softphone and SIP-
DOMAIN specifies the local domain of Abilis. Usually the user registers on Abilis or has a static
SIP-HOST and SIP-UDP/TCP-PORT.
• LOCAL-PEER: The user is a Peer as Abilis and SIP-DOMAIN specifies the local domain of
Abilis. Calling and Called numbers are both passed to the user. Usually the user registers on
Abilis or has a static SIP-HOST and SIP-UDP/TCP-PORT.
• SERVER: The user is a SIP server for Abilis and SIP-DOMAIN specifies the remote domain.
Usually the Abilis registers on this user.
• REMOTE-PEER: The user is a Peer as Abilis and SIP-DOMAIN specifies the remote
domain.Calling and Called numbers are both passed to the user. Usually the Abilis registers on
this user.
Before 7.3.4 version a different naming was used. Here is the matching table:
813
Draft SIP - Session Initiation Protocol Draft
SIP-HOST IP address of the SIP UAC/UAS. Domain and Host may differ, because SIP registrar server
may be different from SIP proxy; normally proxies and SIP registrar server are co-located
[DYNAMIC: IP is not known in advance, it is known after the user executes the registration;
1.0.0.0-126.255.255.255, 128.0.0.0-223.255.255.255: remote IP is known in
advance; calls and registrations are performed and accepted only with this IP].
SIP-TCP-REMPORT TCP port on which the remote user is listening; Abilis outgoing TCP calls for this user will be
sent to this port [DYNAMIC: the port is learned from incoming registration; 1..65535: calls and
registrations are performed and accepted only with this port].
SIP-UDP-REMPORT UDP port on which the remote user is listening; Abilis outgoing UDP calls for this user will be
sent to this port [DYNAMIC: the port is learned from incoming registration; 1..65535: calls and
registrations are performed and accepted only with this port].
sip-udp-locport UDP port on which the Abilis is listening for this user [SYS, AUTO, 1..65535] . The default value
is"SYS" and refers to the port parameter udp-locport. "AUTO" and a port different from the one
configured in SIP port parameter "udp-locport" may be assigned only to SIP-TYPE REMOTE-
PEER or SERVER. Note that this is a lower cased parameter, it means that an Abilis CPX reboot
must be performed to apply changes, in detail you need to save the configuration ( command save
conf ) and restart the Abilis ( via the command warm start ).
SIP-SRCADD Source IP address for outgoing connections [R-ID: the source IP address of the outgoing datagrams
will be set to the current RouterID value; OUT-IP: the source IP address of the outgoing datagrams
will be set on the base of the output IP interface; 1-126.x.x.x, 128-223.x.x.x: the source
IP address of the outgoing datagrams will be set to the selected value; Ip-nnn: use the current
IPADD of the specified IP resource; SYS: uses the value in SRCADD parameter in CTISIP resource].
SIP-NUMBER Number that identifies the user; if this number is not null, it is used to route calls to the user.
SIP-CG-NUM Calling number to use for calls coming from the user. The parameter accepts from 1 up to 20
characters in the following range: [AUTO: enforces caller id information element equal to SIP-
NUMBER; [0..9]: enforces the content with these exact digits; [0..9]*: replaces first specified
digits and passes the remaining transparently; *: passes calling address information element
transparently; #: removes calling number information element; ##: enforces the presentation
restricted: the calling number is sent empty; ##[0..9]: enforces the presentation restricted: the
calling number is sent with these exact digits; ##[0..9]*: enforces the presentation restricted:
the first specified digits are replaced and the remaining are passed transparently; ##*: enforces the
presentation restricted: the calling number is sent transparently].
SIP-FWD-CG-NUM Indicates how the calling number is managed in unconditional call transfers and call forwarding
[CALLER: the calling number of the original call is passed to the new recipient; USER: the calling
number of the SIP user performing the action is passed to the new recipient].
SIP-ROUTE-BY-SD Allows routing using subaddress called field. Calls from CTIR and directed to SIP users are first
directed to the user with a USERNAME equal to what is specified in Subaddress Called; if such user
does not exists, or the user disallows SIP-ROUTE-BY-SD, the call is routed using standard CTISIP
table matches.
814
Draft SIP - Session Initiation Protocol Draft
SIP-CHAN-FREQ SIP desired channel frequency for bandwidth optimisation, to be rounded down to a codec frame
length multiple [SYS: uses the value in CHAN-FREQ parameter in CTISIP resource; 30..90:
frequency for banwidth optimisation].
SIP-CPO-RTP Enables/disables Call Path Optimization (CPO) [SYS: uses the value in CPO parameter in CTISIP
resource; NO: doesn't allow CPO; YES: allows CPO].
SIP-REMOTE-NAT Position of the client in Internet [NO: requests and responses to the customer's phone occurs on the
Contact header field specified. RTP checks that remote ip/address matches with which one specified
in SDP (symmetric RTP is not allowed); STRICT: requests and responses to the customer's phone
occurs on the same address/port from which the remote requests/responses came from. RTP checks
that remote address matches with which one of signaling (symmetric RTP is allowed); LOOSE:
requests and responses to the customer's phone occurs on the same address/port from which remote
requests/responses came from (symmetric RTP is fully allowed with no address checking)].
SIP-DTMF-MODE DTMF mode sent to the remote UA [SYS: uses DTMF-MODE value in CTISIP resource; INBAND:
the outband DTMF received from CTIR is not dropped, only the audio stream is passed; INFO: the
outband DTMF received from CTIR is sent using INFO message; RFC2833: the outband DTMF
received from CTIR is sent using RFC2833 payload].
SIP-REM-USER The name used in the remote SIP UA server to identify the Abilis; this name is used for both
registration and authentication purposes.
SIP-REM-PASS The password used in the remote SIP UA server to identify the Abilis; this password is used for both
registration and authentication purposes.
SIP-REM-REG Enables/disables the registration of the Abilis to the remote SIP UA server [NO; YES: Abilis
periodically register to the remote UA to inform remote peer about its IP address and TCP/UDP
port].
When SIP-CG-NUM:AUTO in the Users table, calls from CTISIP to CTIR will have:
• the callerid provided by SIP user validated in the CTISIP translation table;
In case of validation failure the callerid will be overwritten with the value configured in the SIP-number of the user table (*,
as wildcard, is not included).
Type the following command to view the details of the CTISIP translation table:
815
Draft SIP - Session Initiation Protocol Draft
NUMx: USER: P:
------------------------------------------------------------
500 test4 C
12 test3 C
11 test2 C
10 test C
• connected: when SIP-NUMBER is set in the SIP users chart, the CDI parameter in the chart will be the same. In case the
routings are connected, the letter C will appear under the P item.
Tip
The connected entries are automatically added.
• statics: when a SIP-NUMBER is not specified in the SIP users chart and it's associated by hand in the chart, the letter S
will appear under the P item. This system is used to add several numbers to the same user (for instance in case of static
routings).
Tip
To a single user can be associated more SIP-numbers.
The SIP users creation generates automatically the NumSip list in which are located all the SIP-NUMBERS associated to the
users (it is very useful for the CTIR configuration).
LIST:NumSip - IN
Automatically_generated_CTI_SIP_Numbers_list_(ReadOnly)
10 11 12
500
Note
It is a “read only” list, you cannot modify it, as it is automatically created by the system.
The destination or the source of the SIP group appears as CtiSip (this is the default value).
816
Draft SIP - Session Initiation Protocol Draft
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
Tip
Transcoding is allowed when parameter CODERSOUT is different from *.
The transcoding is possible only for the coders supported by Abilis. To view them, type:
RES:CtiSys --------------------------------------------------------------------
CTI_System_general_properties
-- Number of simultaneous calls ----------------------------------------
| State: Alerting/Connected | State: Any |
---------------|---Current---|----Peak-----|---Current---|----Peak-----|
TR | 0 | 0 | 0 | 0 |
DATA | 0 | 0 | 0 | 0 |
VtoCHISD | 0 | 0 | 0 | 0 |
CHISDtoCHISD | 0 | 0 | 0 | 0 |
CHISDtoV | 0 | 0 | 0 | 0 |
ALL | 0 | 0 | 0 | 0 |
------------------------------------------------------------------------
- Available coders -----------------------------------------------------
-- Coder ---|-- Bit rates (kbps) --|-- Coder ---|-- Bit rates (kbps) --|
G.711-A |64 |G.711-u |64 |
TRANSPARENT |64 |Spirit |6.4, 7.2, 8, 8.8, 9.6 |
------------------------------------------------------------------------
- Clock Sources for H100 cards -----------------------------------------
CLK:INT
- Clock Sources for NOT-H100 cards -------------------------------------
817
Draft SIP - Session Initiation Protocol Draft
Tip
For further information about transcoding refer to Section 45.3, “CTI Routings”.
• Site 1
• SIP phone;
• Abilis which manages all the systems and a VPN with “Site 2”.
• Site 2
• SIP phone;
• Abilis that manages all the systems and a VPN with “Site 1”.
Assumptions: the POTS cards, used to manage the analog phones and configured for Cluster and CtiLink for compressed
phone calls, are already active on Abilis.
Tip
Interesting chapter: Section 53.7, “How to register a SIP telephone onto Abilis”.
818
Draft SIP - Session Initiation Protocol Draft
COMMAND EXECUTED
COMMAND EXECUTED
• password: zoiper
819
Draft SIP - Session Initiation Protocol Draft
COMMAND EXECUTED
820
Draft SIP - Session Initiation Protocol Draft
SIP-T38-G711: SYS
SIP-T38-PACKING: SYS
SIP-T38-REDUND: SYS
SIP-T38-REDUND-PCK: SYS
SIP-UA: SYS
SIP-UA-PERMIT: *
SIP-REM-USER:
SIP-REM-PASS:
SIP-REM-AUTH: SYS
SIP-REM-REG: NO
-------------------------------------------------------------------------------
COMMAND EXECUTED
• password:sip_phone
COMMAND EXECUTED
821
Draft SIP - Session Initiation Protocol Draft
SIP-UDP-PORT: (DYNAMIC)
SIP-SRCADD: SYS
SIP-PROT-IN: TCP,UDP
SIP-PROT-OUT: UDP
SIP-IP-PERMIT: *
SIP-MAXSES-BID: 2
SIP-MAXSES-IN: 0
SIP-MAXSES-OUT: 0
SIP-NUMBER: 630
SIP-CG-NUM: AUTO
SIP-FWD-CG-NUM: CALLER
SIP-CTIP-TYPE: SYS
SIP-RG-IN: SYS
SIP-ROUTE-BY-SD: NO
SIP-PROVIDE-SG: NO
SIP-CLIP-RULE: SYS
SIP-BUSY-NOCHAN: NO
SIP-LCS-GROUP: NONE
SIP-CPO-RTP: SYS
SIP-CPO-SIGNALLING: SYS
SIP-SS: NO
SIP-SS-PICKUP: NO
SIP-SS-PRES-CG: YES
SIP-SS-CF-DND: YES
SIP-AUTH: SYS
SIP-CHAN-FREQ: SYS
SIP-REMOTE-NAT: NO
SIP-LOCAL-NAT: NO
SIP-EXTERNAL-IP: SYS
SIP-KEEPALIVE: ENABLED
SIP-DTMF-MODE: SYS
SIP-DISC-AUDIO: SYS
SIP-BC-TRANSP: UDI
SIP-T38: SYS
SIP-T38-G711: SYS
SIP-T38-PACKING: SYS
SIP-T38-REDUND: SYS
SIP-T38-REDUND-PCK: SYS
SIP-UA: SYS
SIP-UA-PERMIT: *
SIP-REM-USER:
SIP-REM-PASS:
SIP-REM-AUTH: SYS
SIP-REM-REG: NO
-------------------------------------------------------------------------------
Add another “sip_phone” user in the Abilis of “Site 2” and assign it the SIP-NUMBER:910 (the configuration is similar to
that one of “Site 1”).
NUMx: USERNAME: P:
----------------------------------------------------------
610 zoiper C
822
Draft SIP - Session Initiation Protocol Draft
630 sip_phone C
NUMx: USERNAME: P:
----------------------------------------------------------
910 sip_phone C
To connect up the PC with Zoiper and the SIP phone in “Site 1”, type:
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 StoS CtiSip CtiSip 'NumSip' *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
---------------------------------------------------------------------------
LIST:NumSip - IN
Automatically_generated_CTI_SIP_Numbers_list_(ReadOnly)
823
Draft SIP - Session Initiation Protocol Draft
610 630
46.4.4.1.2. Communication between the analog phone and the SIP users
Add the following routings:
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 StoS CtiSip CtiSip 'NumSip' *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
1 StoV CtiSip 101 01 *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
2 VtoS PBX CtiSip 'NumSip' *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
The PR:1 routing routes toward port 101 (where the analog phone is connected) the calls coming from one of the SIP users
and directed to the number 01.
The PR:2 routing routes the calls coming from the Abilis POTS port towards the CTISIP and directed to one number of the
NumSip list; the CTISIP translation table will forward the call to the user.
46.4.4.1.3. Communication between the SIP users in “Site 1” and the SIP users in “Site 2”
Add a StoC and a CtoS routing with the following commands to connect up the PC with Zoiper in “Site 1” and the sip phone
in “Site 2”:
COMMAND EXECUTED
COMMAND EXECUTED
824
Draft SIP - Session Initiation Protocol Draft
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 StoS CtiSip CtiSip 'NumSip' *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
1 StoV CtiSip 101 01 *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
2 VtoS PBX CtiSip 'NumSip' *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
3 StoC CtiSip site2 910 *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
4 CtoS * CtiSip 'NumSip' *
NO ANY NO Dft * *
64000 Sys * * Sys Sys * *
-------------------------------------------------------------------------------
The PR:3 routing routes towards the Site2 cluster the calls coming from SIP users and directed to the number 910.
The PR:4 routing routes towards the CTISIP the calls coming from any cluster and directed to one of the numbers of the
NumSip list; the CtiSip translation table will forward the calls to the user.
The example is similar to the configuration of the Abilis of the “Site 1”; type the following commands:
COMMAND EXECUTED
COMMAND EXECUTED
825
Draft SIP - Session Initiation Protocol Draft
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 StoC CtiSip site1 610 *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
1 CtoS * CtiSip 'NumSip' *
NO ANY NO Dft * *
64000 Sys * * Sys Sys * *
-------------------------------------------------------------------------------
LIST:NumSip - IN
Automatically_generated_CTI_SIP_Numbers_list_(ReadOnly)
910
Like the previous chart, the SP parameters is set at 64000 to keep the available coder pool.
The PR:0 routing routes toward the “Site1”cluster the calls coming from SIP users and directed to the number 610.
The PR:1 routing routes toward the CTISIP the calls coming from any cluster and directed to one of the numbers of the
NumSip list; the CTISIP translation table will forward the calls to the user.
• SRCADD: source IP address for outgoing connections [R-ID: the source IP address of the outgoing datagrams will be set
to the current RouterID value; OUT-IP: the source IP address of the outgoing datagrams will be set on the base of the
output IP interface; 1-126.x.x.x, 128-223.x.x.x: the source IP address of the outgoing datagrams will be set to
the selected value; Ip-nnn: use the current IPADD of the specified IP resource].
Tip
If Abilis has only one IP resource (and only one IP address) , you can use the default value; otherwise if
Abilis has more IP resoures and more IP addresses the suggested configuration is OUT-IP.
• DOMAIN: if Abilis has clients in the public side you can also specify a FQDN.
826
Draft SIP - Session Initiation Protocol Draft
• SIP proxy provides advanced services like IVR and voice mail, let's say that 10 sessions are needed.
Now you have to create a SIP user representing the user that is client of voip.it SIP proxy:
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
827
Draft SIP - Session Initiation Protocol Draft
The CTISIP table, used to route calls toward SIP users, gets automatically populated with a unique route because you set
SIP-NUMBER:*.
828
Draft SIP - Session Initiation Protocol Draft
Note
REMOTE-PEER handling is similar to SERVER but it allows calling/called number to pass unchanged.
In this situation any coder with maximal speed 6400 (the default for SP parameter) is allowed, but transcoding is disallowed.
This means that the same coder must be used by the SIP proxy and Abilis.
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 VtoS * CtiSip * *
-------------------------------------------------------------------------------
1 CtoS * CtiSip * *
-------------------------------------------------------------------------------
2 StoC CtiSip test * *
829
Draft SIP - Session Initiation Protocol Draft
Tip
To allow G.729A you have to set SP:8000 in every routing.
46.5.4.2. Only G.711 on SIP proxy, any coder on Cluster, transcoding allowed
Purpose of example: calls arriving from ISDN/POTS/GSM/CLUSTER are routed to SIP users, and calls arriving from SIP
users are first sent to cluster test; in case of failure (NEXT:LIMITED) it is attempted on ISDN/POTS/GSM group G1.
In this situation only G.711 A-law or u-law can be used by SIP proxy and Abilis. Since transcoding is enabled by
CODERSOUT <> * the StoC and CtoS routings will negotiate for the “C” side any coder with maximum speed up 6400 bps.
COMMAND EXECUTED
COMMAND EXECUTED
[18:12:45] ABILIS_CPX:a ctir pr:2 type:stoc ds:test cdi:* next:limited sp:64000 coders:g.711 spout:
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 VtoS * CtiSip * *
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
1 CtoS * CtiSip * *
NO ANY NO Dft * *
6400 Sys * * Sys Sys * *
64000 * * * NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO
*
G.711
-------------------------------------------------------------------------------
830
Draft SIP - Session Initiation Protocol Draft
Tip
To allow G.729A you have to set SP:8000 in CtoS PR:1 and SPOUT:8000 in StoC PR:2.
When the Abilis-SIP proxy interconnection occurs via local LAN, (i.e. with high speed, minimal delays, minimal jitter),
optimising the transcoding can be done so that the SIP proxy side uses minimal jitter, minimal delays.
COMMAND EXECUTED
COMMAND EXECUTED
Tip
DJ and MJ in pr:1 as well as DJOUT and MJOUT in pr:2 may assume other values appropriate for the
WAN link or specifically required by calls matching the routing.
46.5.4.2.2. Fax
When transcoding takes place in StoC and CtoS, with G.711 toward the SIP proxy, something interesting happens: on the
WAN FAX relay can be used! Abilis can exchange FAX with following characteristics:
• use G3 Fax relay, 2400/4800/9600/14400 kbps plus IP overhead on the WAN link.
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
831
Draft SIP - Session Initiation Protocol Draft
There is no RFC called "Busy Lamp Field" and actually the lights on the phone are implemented differently by different
producers
• 4235 - An INVITE-Initiated Dialog Event Package for the Session Initialisation Protocol (SIP)
The lights on the phone may be associated to a lot of different features anyway when speaking about BLF normally there are
two options:
• Dialog Monitoring (RFC 4235). It is the most used, it displays the state of the calls associated with the Sip extension.
• Presence Monitoring (RFC 3856). It is often used by softphones, it display the human state of the user, so if the state is
busy it does not mean that he is involved in a call. He is just busy, may be he is reading a newspaper or playing darts.
Anyway Asterisk and other similar solutions convert the call state in presence state to satisfy the softphones requests.
832
Draft SIP - Session Initiation Protocol Draft
Almost all producers offer modules to increase the number of available leds and buttons for the BLF feature.
BLF requires separated licence in CPX and needs also SoftPBX licence as it is required by OPC.
Abilis CPX introduced just a couple of port parameters specific for BLF:
• SUB-LIFTIME - Expiration time of incoming subscriptions. Range 60-3600 seconds, default 180.
• max-sub - Maximum number of subscriptions that CTISIP may handle independently from the event type, the subscriber
and the monitored resource. Range 0-1000, default 100.
For a smooth operation of BLF it is necessary that CTIP/CLUS/SIP/IAX interfaces and users have all different numbers
assigned. In case that the same number is assigned to a two or more of them the following priority order will be used : CTIP,
then CLUS, then SIP, then IAX.
IP phones keys must be properly configured in order to monitor an extension and/or perform call pickup on that extension.
There are optional strings that can be used.
<number>@domain The related user is in the local Abilis, the monitored interface
is chosen after a search of the <number> in CTIP/CLUS/SIP/
IAX interfaces
<user>/<number>@domain The <user> is in local Abilis and the monitored interface is
CTISIP. The <number> is needed in case of direct call
<interface>/<user>/<number>@domain The <user> is in local Abilis and the monitored <interface>
is specified in the request URI. The <number> is needed in
case of direct call
<abilisid>/<interface>/<user>/<number>@domain The <user> may be in a remote Abilis with <abilisid>
identifier specified in OPC configuration, the CTI
<interface> is specified in the Request Uri. The <number> is
needed in case of direct call
Also note that the SIP user to perform Call Pick-up must have SIP-SS:yes and SIP-SS-PICKUP:ANY.
Parameter: | Value:
--------------------+----------------------------------------------------------
USER: test
833
Draft SIP - Session Initiation Protocol Draft
...
SIP-SS: YES
SIP-SS-PICKUP: ANY
...
-------------------------------------------------------------------------------
About Call pick-up feature also note that there are different handlings in different phones.
Normally the IP phones uses the number provided via SIP signalling (NOTIFY) to perform call pick-up, i.e. it occurs with
SNOM and Thomson/Tecnicolor phones.
The Yealink phones default need to specify the number to perform call pick-up in their web interface but they have an
advanced option of the Account: Dialog-Info Call Pickup (default is disabled, just enable it) that allow them to use the
number provided by SIP signalling.
Finally the Grandstream phones need to specify the call pick-up prefix (default is ** to be changed in *1), and ignores the
SIP signalling about call picked up number.
d d ctisip Shows diagnostic information, such as the state of the resource, the currently used channels, the remote
SIP username, the local/remote IP address-port of the SIP channel for incoming packets, the calling and
the called number.
d de ctisip Shows diagnostic information in an extended format: the same information listed for d d ctisip command
and the state of Unattended/Attended Call Transfer, the local/remote IP address-port of the SIP channel for
outgoing packets, the local/remote IP address-port for RTP and RTCP channel.
RES:CtiSip --------------------------------------------------------------------
Session_Initiation_Protocol
STATE:ACTIVE UDP-STATE:CLOSED USED-CHAN:0
- SIP Channels diagnostics ---------------------------------------------
CH: SIPState Prot TcpLsn SIP-LocAdd-Port-In SIP-RemAdd-Port-In
Q931State CG CD
User CallId
------------------------------------------------------------------------
0 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
1 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
2 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
3 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
4 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
5 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
6 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
834
Draft SIP - Session Initiation Protocol Draft
7 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
8 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
9 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
RES:CtiSip --------------------------------------------------------------------
Session_Initiation_Protocol
STATE:ACTIVE UDP-STATE:CLOSED USED-CHAN:0
- SIP Channels diagnostics ---------------------------------------------
CH: SIPState Prot TcpLsn SIPLocAdd-Port-In SIPRemAdd-Port-In
SIPLocAdd-Port-Out SIPRemAdd-Port-Out
Q931State CG CD
User CallId
Q932State UCTState ACTState CPOState
RTPState RTPLocAdd-LocPort RTPRemAdd-RemPort
RTCPState RTCPLocAdd-LocPort RTCPRemAdd-RemPort
------------------------------------------------------------------------
0 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
1 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
2 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
3 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
4 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
5 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
6 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
7 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
8 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
9 DISCONNECTED
00-DISCONNECTED
------------------------------------------------------------------------
d s ctisip Shows statistic information, such as the number of incoming/outgoing accepted/rejected calls, the
number of incoming/outgoing succesful/failed registrations, the number of incoming/outgoing reinvites,
the number of successful incoming/outgoing transfers, the number of expired retransmission timer in
incoming/outgoing calls.
835
Draft SIP - Session Initiation Protocol Draft
d se ctisip Shows statistic information in an extended format: the same information listed for d se ctisip command
are shown for each session.
RES:CtiSip --------------------------------------------------------------------
Session_Initiation_Protocol
--- Cleared 20 days 16:33:47 ago, on 03/12/2007 at 03:21:24 ------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SUCC-CALL | 0| 0|FAIL-CALL | 0| 0|
SUCC-REG | 0| 0|FAIL-REG | 0| 0|
SUCC-TRAN | 0| 0|FAIL-TRAN | 0| 0|
EXP-RETRY | 0| 0|DTMF | 0| 0|
HOLD | 0| 0|UN-HOLD | 0| 0|
UNKNOWN | 0| 0|REINVITES | 0| 0|
LOST-NOBUF | 0| 0|OUTSEQ | 0| |
BLACKLISTED| 0| |
------------------------------------------------------------------------
RES:CtiSip --------------------------------------------------------------------
Session_Initiation_Protocol
--- Cleared 0 days 00:23:42 ago, on 19/12/2010 at 10:09:52 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SUCC-CALL | 0| 0|FAIL-CALL | 0| 0|
SUCC-REG | 0| 0|FAIL-REG | 0| 0|
SUCC-TRAN | 0| 0|FAIL-TRAN | 0| 0|
EXP-RETRY | 0| 0|DTMF | 0| 0|
HOLD | 0| 0|UN-HOLD | 0| 0|
UNKNOWN | 0| 0|REINVITES | 0| 0|
LOST-NOBUF | 0| 0|OUTSEQ | 0| |
BLACKLISTED| 0| |
------------------------------------------------------------------------
CH:0 CallId:
CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RTP-PCK | 0| 0|RTCP-PCK | 0| 0|
RTP-LOST | 0| 0|SIP-OUTSEQ | 0| |
RTP-OUTSEQ | 0| |RTP-NOBUF | 0| 0|
------------------------------------------------------------------------
CH:1 CallId:
CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RTP-PCK | 0| 0|RTCP-PCK | 0| 0|
RTP-LOST | 0| 0|SIP-OUTSEQ | 0| |
RTP-OUTSEQ | 0| |RTP-NOBUF | 0| 0|
------------------------------------------------------------------------
CH:2 CallId:
CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RTP-PCK | 0| 0|RTCP-PCK | 0| 0|
RTP-LOST | 0| 0|SIP-OUTSEQ | 0| |
RTP-OUTSEQ | 0| |RTP-NOBUF | 0| 0|
------------------------------------------------------------------------
CH:3 CallId:
CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RTP-PCK | 0| 0|RTCP-PCK | 0| 0|
RTP-LOST | 0| 0|SIP-OUTSEQ | 0| |
RTP-OUTSEQ | 0| |RTP-NOBUF | 0| 0|
------------------------------------------------------------------------
CH:4 CallId:
836
Draft SIP - Session Initiation Protocol Draft
CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RTP-PCK | 0| 0|RTCP-PCK | 0| 0|
RTP-LOST | 0| 0|SIP-OUTSEQ | 0| |
RTP-OUTSEQ | 0| |RTP-NOBUF | 0| 0|
------------------------------------------------------------------------
CH:5 CallId:
CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RTP-PCK | 0| 0|RTCP-PCK | 0| 0|
RTP-LOST | 0| 0|SIP-OUTSEQ | 0| |
RTP-OUTSEQ | 0| |RTP-NOBUF | 0| 0|
------------------------------------------------------------------------
CH:6 CallId:
CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RTP-PCK | 0| 0|RTCP-PCK | 0| 0|
RTP-LOST | 0| 0|SIP-OUTSEQ | 0| |
RTP-OUTSEQ | 0| |RTP-NOBUF | 0| 0|
------------------------------------------------------------------------
CH:7 CallId:
CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RTP-PCK | 0| 0|RTCP-PCK | 0| 0|
RTP-LOST | 0| 0|SIP-OUTSEQ | 0| |
RTP-OUTSEQ | 0| |RTP-NOBUF | 0| 0|
------------------------------------------------------------------------
CH:8 CallId:
CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RTP-PCK | 0| 0|RTCP-PCK | 0| 0|
RTP-LOST | 0| 0|SIP-OUTSEQ | 0| |
RTP-OUTSEQ | 0| |RTP-NOBUF | 0| 0|
------------------------------------------------------------------------
CH:9 CallId:
CG: CD:
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
RTP-PCK | 0| 0|RTCP-PCK | 0| 0|
RTP-LOST | 0| 0|SIP-OUTSEQ | 0| |
RTP-OUTSEQ | 0| |RTP-NOBUF | 0| 0|
------------------------------------------------------------------------
Note
To use these commands you need to have administrator or super user rights.
RES:CtiSip --------------------------------------------------------------------
Session_Initiation_Protocol
BufferLength:1027 Date/Time:28/11/2010 10:39:59 TraceTime:<NotRunning>
Usage:
837
Draft SIP - Session Initiation Protocol Draft
Type the below command to view the event logs connected with the users registration:
RES:CtiSip --------------------------------------------------------------------
Session_Initiation_Protocol
BufferLength:10838 Date/Time:18/01/2008 11:37:06 TraceTime:<NotRunning>
This table shows data, time, identification of the event and the description of the error.
• unknown user;
• debug res:ctisip lsn:3 cmd:set:err : set log mask to log only errors events;
• debug res:ctisip lsn:3 cmd:set:err,reg : set log mask to log only errors and registration events;
• debug res:ctisip lsn:3 cmd:set:full : set log mask to log any event.
The following command allows to show the registration table (remote peers registered with Abilis and remote peers Abilis is
registered to).
RES:CtiSip --------------------------------------------------------------------
Session_Initiation_Protocol
BufferLength:324 Date/Time:18/01/2008 11:38:56 TraceTime:<NotRunning>
838
Draft SIP - Session Initiation Protocol Draft
REG Registration of the user [REMOTE: Abilis is registered to a remote peer; LOCAL: a remote peer is registered to
Abilis].
In the previous example, Abilis is registered to the remote peer sip_proxy (ip address: 62.62.62.62) which needs Abilis
registration each 120 seconds; Abilis registered itself 21 seconds ago.
The user zoiper (ip address: 192.168.0.24) is registered to Abilis; it registered itself 35 seconds ago.
SIP can be used with other IETF protocols to build a complete multimedia architecture, such as the Real-time Transport
Protocol2 (RTP) for transporting real-time data and providing QoS feedback, the Real-time streaming protocol (RTSP)
for controlling delivery of streaming media, the Media Gateway Control Protocol (MEGACO) for controlling gateways to
the Public Switched Telephone Network (PSTN) and the Session Description Protocol3 (SDP) for describing multimedia
sessions.
• Transport independent: SIP can be used with UDP, TCP, ATM & so on.
• Text-based (UTF-8): SIP messages have a header with multiple header fields and a message body.
SIP is modular and uses other protocols to define media details (SDP) and voice timing and synchronization (RTP). The SDP
protocol is inserted in the message body (e.g. in a INVITE message) and it contains the RTP UDP port number; classic SIP
implementations use TCP port 5060 and/or UDP port 5060 to handle signaling and various UDP ports for RTP.
SIP is a peer-to-peer protocol; the peers in a session are called User Agents (UAs). An user agent can function in one of the
following roles:
• User agent client (UAC): a client application which initiates the SIP request.
• User agent server (UAS): a server application which contacts the user when a SIP request is received and that returns a
respone on behalf the user.
1
http://en.wikipedia.org/wiki/Sip
2
http://en.wikipedia.org/wiki/Real-time_Transport_Protocol
3
http://en.wikipedia.org/wiki/Session_Description_Protocol
839
Draft SIP - Session Initiation Protocol Draft
• Full Cone: all requests from the same internal IP address and port are mapped to the same external IP address and port.
Any external host can send a packet to the internal host, by sending a packet to the mapped external address.
• Restricted Cone: all requests from the same internal IP address and port are mapped to the same external IP address
and port. Unlike a Full Cone NAT, an external host (with IP address X) can send a packet to the internal host only if the
internal host had previously sent a packet to IP address X.
• Port Restricted Cone: it is like a Restricted Cone NAT, but the restriction includes port numbers. An external host can
send a packet, with source IP address X and source port P, to the internal host only if the internal host had previously sent a
packet to IP address X and port P.
• Symmetric: all requests from the same internal IP address and port, to a specific destination IP address and port, are
mapped to the same external IP address and port. If the same host sends a packet with the same source address and port,
but to a different destination, a different mapping is used. Only the external host that receives a packet can send an UDP
packet back to the internal host.
1. UPnP: a client queries the NAT via UPnP (Universal Plug and Play) protocol asking what mapping it should use if it
wants to receive on port P; the NAT responds with the address:port pair needed to reach the client on this port P. This
solution doesn't work with Symmetric NATs and cascading NATs; furthermore there is a huge installed base of existing
NATs that do not support UPnP.
2. External query: a server sits listening for packets (call this a NAT probe); when it receives a packet from a client, it
returns a message from the same port to the source of the received packet containing the address:port pair which it sees
as the source of that packet. The client can then determine if it is behind a NAT and the public address:port pair it should
use in SDP message in order for the endpoint to reach it. This solution doesn't work with Symmetric NATs and cascading
NATs.
3. STUN (Simple Traversal of UDP Through NATs): is a protocol for setting up the kind of NAT probe. It returns the public
address:port pair and can also determine which kind of NAT the client is behind. Clients can set their SDP messages
accordingly; the STUN server does not sits in the signaling or media data path. This solution doesn't work with Symmetric
NATs.
4. Connection Oriented Media: the client must send out a RTP to, and receive RTP back from the same IP address. Any
RTP connection between an endpoint outside a NAT and one inside a NAT must be estabilished point to point. The
endpoint outside the NAT must wait until it receives a packet from the client before it can know where to reply. The
client informs the endpoint to wait for the incoming packet through the addition of the a=direction:active tag in the
SDP message; this approach is useful in Symmetri NATs but is still problematic because there are not many endpoints
supporting this tag.
5. Symmetric RTP: the server simply “ignore” the RTP UDP port indicated in SDP of the INVITE request and always
respond to the port from where it receives RTP traffic. This solution works well and is the de-facto solution used by Cisco
Gateways to problems arising from symmetric NATs.
6. TURN (Trasversal Using Realy NATs): complements STUN and places the probe in the signaling and media path. The
probe terminates the media for both endpoints so that the probe which detected the address:port pair is also the probe
which is sending the client media. In this way the symmetric issue is taken care of.
7. Media Relay: combines the strengths of both “Symmetric RTP” and the “TURN server”. The relay can send media
packets to an endpoint on a port previously used send a media packet to the relay. As opposed to the TURN server, since
the relay has access to the SIP message this media port manipulation is quite trivial.
840
Draft SIP - Session Initiation Protocol Draft
The cases 2 and 6 never work because a thrid part with public IP would be needed, while in the cases 3 and 7 there is no
NAT.
• Case 1: UAC behind a NAT connected to public IP UAS. If UAC is behind a full cone NAT, restricted cone NAT, port
restricted NAT then a simple STUN server may be used. In case of symmetric NAT, UAC have to hope that UAS supports
symmetric RTP, like CISCO gateways and Asterisk PBX do.
• Case 4: public IP UAC connected to UAS behind a NAT. Similar but opposite to case 1.
• Case 5: UAS behind a NAT connected to a public IP UAC. In this case NAT will contain a port forwarding for TCP port
5060 and UDP port 5060, and other UDP ports needed by RTP; the UAS will send SDP using the configured public IP
address (it should be known), and public domain. Qualifying should be on to maintain a pinhole in the NAT.
• Case 8: public IP UAS connected to a UAC behind a NAT. UAS should support “Symmetric RTP”.
841
Draft Draft
Table of Contents
47.1. CTIDISA overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
47.1.1. User identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
47.1.2. Post-selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844
47.1.3. Automatic Call Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845
47.1.4. Call Back . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
47.1.5. Data Call Back . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
47.2. CTIDISA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
47.2.1. Activating the CTIDISA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
47.2.2. CTIDISA resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
47.3. CTIDISA tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 848
47.3.1. CTIDISA Service table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 848
47.3.2. CTIDISA User table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
47.4. Example of Post Selection configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
47.4.1. Configuring the CTIDISA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
47.4.2. Configuring the CTIDISA Service table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
47.4.3. Configuring the CTIDISA User table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
47.4.4. Configuring the CTI Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854
47.5. Example of Automatic Call Distribution configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
47.5.1. Configuring the CTIDISA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
47.5.2. Configuring the CTIDISA Service table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
47.5.3. Configuring the CTIDISA User table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857
47.5.4. Configuring CTI Routings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857
47.6. Example of Call Back configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 858
47.6.1. Configuring the CTIDISA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 858
47.6.2. Configuring the CTIDISA Service table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859
47.6.3. Configuring the CTIDISA User table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860
47.6.4. CTI Routing configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860
47.7. Example of Data Call Back configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862
47.7.1. Configuring the CTIDISA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862
47.7.2. Configuring the CTIDISA Service table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862
47.7.3. Configuring CTI Routings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
47.8. Message files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
47.8.1. File audio format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
47.8.2. Commands to manage audio files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866
47.8.3. Example of insertion of WAV files and creation of CPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866
47.9. CTIDISA diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869
47.9.1. CTIDISA diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869
47.9.2. CTIDISA statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 870
47.9.3. Advanced Debug of the CtiDisa resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 872
47.10. DISA administration through web interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873
47.10.1. Configuration of the HTTP rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873
47.10.2. DISA administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873
842
Draft DISA - Direct Inward System Access Draft
• User identification;
• Post-Selection;
• Call Back;
Calls passing through DISA can be divided in two parts: INCOMING and OUTGOING. The first one, refers to call's arrival
to the Abilis until the user identification; the second one refers to post-selection.
1. Pre-identification
2. User identification
47.1.1.1. Pre-identification
It refers to the call arrival to the DISA: it is called pre-identification because Abilis doesn't know if the user will enter the PIN
code or the post-selection yet.
Note
A service is a collection of functions, rules, mechanisms!
• calling number not present in the list of CGI users (if RESTRICTED-CALLING parameter is set to YES);
• maximum number of simultaneous calls on DISA has been reached (MAX-CALLS parameter).
The Default service is assigned to all calls which has not been matched with other configured services.
843
Draft DISA - Direct Inward System Access Draft
The call can come from a ISDN port, a Cluster or other CTI resources like H.323, IAX or SIP and it's routed to CtiDisa
resource. The possible routings are VtoD, CtoD, HtoD, ItoD, StoD and *toD.
When the call arrives to the DISA (if the pre-identification phase doesn't fail), the user who has called hears the tone or the
welcome message (this means that the assignment of the service has happened).
47.1.1.2. User-identification
The Anonymous user is created by the system and identifies all callers not configured in other users.
• calling number: the user is identified verifying the number used for the call;
• PIN: the user is identified verifying the insertion of a PIN code (PIN starts with the '*' character and ends with '#');
• PIN + calling number: the user is identified by means of a PIN entering and the calling number.
Caution
If CGI and PIN fields are empty, the user will be considered anonymous (default user).
In the configuration of a user, the service assigned, the maximum number of simultaneous calls, the PIN code, one or more
calling numbers (CGI) for the identification and a list of numbers enabled and/or denied to be called (PERMIT and DENY
parameter) can be defined.
Tip
The combination of PERMIT (for services and users) and DENY (only for users) allows to further define
the user security clearance level in the post-selection phase; example: if a user is identified as belonging to a
service enabled to call numbers starting with 6, you can further define the user as cleared to call only number
601 or deny calls to 605 by specifying the proper value in the user's config file.
• wrong PIN (in this case the call will be immediately rejected).
47.1.2. Post-selection
The OUTGOING part represents the post-selection phase. From this moment a user can:
Other interesting characteristic is the TRANSFER functionality. it allows the call's hung up from DISA when the call in post-
selection has been connected. Example: if the incoming call is VtoD and the post-selection DtoV, it will be maintained a
single “VtoV” (or transparent, TR) call.
844
Draft DISA - Direct Inward System Access Draft
Defining whether loops are active, in case one of the previous conditions happens, can be done.For each condition a tone or a
message to inform the user about the “status” of the call can be defined.
The maximum number of allowed loops before the call is permanently rejected (MAX-LOOPS parameter) can be defined.
This last phase is named BYE and can be identified from a specific message (it cannot be replaced by a tone!).
The queues are individually generated for each called number and are totally indipendent.
If the user goes to a service with ACD:YES, he cannot digit the PIN (the user is in now in the post-selection phase).
If the user goes to a service with ACD:NO, inserts a PIN and then goes to another service with ACD:YES, the user goes to this
post-selection.
If the user goes to a service with ACD:YES and then goes to another service with ACD:NO, the AUTO-CDO of the first service
is maintained.
If the caller hungs up before the operator, the call is forwarded after 5 seconds; in the opposite situation the call is
forwarded after 1 second (because Abilis immeditely realizes that the operator is free).
• the interval of attempts expires (the timer is resetted for every attempt).
This interval is editable in the ACD-INTERVAL parameter. During this phase the caller hears the LOOPDIAL message.
Abilis continues to call the selected internal extension every ACD-INTERVAL seconds and in case the operator gets free,
the call goes to ALERTING status and subsequently to ACTIVE status.
Note
When a call in queue goes to ALERTING status, it is immediately removed from queue; if it fails (for
example if the operator doesn't answer), the call is re-inserted in the queue (in the last position).
• to select a new internal extension entering the last position of the new queue.
Note
If the user is not allowed to call the selected number, the call exits form the queue and enters into the loop.
The CALLNA message is played and then the AFTERPIN (if it is configured) or INITDIAL message. This
sequence is valid also if the call is “aborted” with the “**” during the ALERTING status (in this case the
DISC message is played).
When the ACD is active, the MAX-LOOPS parameter is automatically set to 99, while the TRANSFER parameter is disabled.
• ACD:NO and AUTO-CDO configured: after user identification, in case of loop, the user will have to insert another number;
• ACD:YES and AUTO-CDO configured: the number configured in AUTO-CDO will be repeated until it is not changed by the
user. If the number is not allowed the INITDIAL and AFTERPIN tone will be played.
845
Draft DISA - Direct Inward System Access Draft
• user dials-in;
• the pre-identification assigns a service;
• if the service allows Call Back the user is identified only by its calling number (only users without PIN can use this
service);
Caution
Call Back can proceed only if it is enabled for the service AND the user; otherwise the call-back is
aborted, the user identification is cleared, and DISA resumes to “not Call Back” call exactly at the
moment where pre-identification is complete. The new user identification requires either a PIN or the first
digit of the called number to be entered.
• the call reaches the alerting state and instead of being connected, it is refused;
• after a configurable delay DISA calls back the user; the number called is obtained by adding a prefix to the user calling
number. There can be different prefixes for the three main different types of calling numbers: UNKNOWN, NATIONAL,
INTERNATIONAL;
• if Call Back fails, it can be repeated for a configured number of times, with a configurable delay between each call;
• once Call Back gets answered, the DISA proceeds in the same way as if the call was originated by user itself, except for
the user identification which is already complete.
• user dials-in;
• the call reaches the alerting state and instead of being connected, it is refused;
Note
Once the connection toward internet is established, Abilis can be reached through a FQDN configuring the
DDNS resource.
The CTIDISA resource may already exist in the system, but may not yet be active: set it active with the command:
846
Draft DISA - Direct Inward System Access Draft
COMMAND EXECUTED
Caution
After adding or setting the CTIDISA active, you must restart the Abilis to make the resource running (use
the command warm start to reboot the Abilis).
Warning
DISA activation requires at least 30 MByte of free RAM (the activation of the module needs 13 MByte; the
configuration of users and services will increase the occupation of the RAM). Refer to Section 54.6.1, “How
can I view the current RAM usage?” to know how to know the RAM usage.
COMMAND EXECUTED
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:ctidisa; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
RES:CtiDisa -------------------------------------------------------------------
Run DESCR:Direct_Inward_System_Access
LOG:NO ACT:YES sesnum:10 RESTRICTED-CALLING:YES
PROVIDE-SG:NO CALL-ABORT:** CALL-REPEAT:** PIN-START:* PIN-END:#
NP-CT:SYS CTIP-TYPE:NET-PRIVATE
WDIR:C:\APP\DISA\
RESTRICTED-CALLING Rejects calls from calling numbers that are not present in CTIDISA User table (CGI parameter).
Note
By default, DISA doesn't allow ISDN subaddress fields.
847
Draft DISA - Direct Inward System Access Draft
CALL-ABORT Sequence of digits to abort an outgoing call that is in any states prior to ACTIVE.
NP-CT Allows NET-PUBLIC to NET-PUBLIC call transfer; when both calls are outgoing, this transfer
is not allowed to avoid the “hang trunk” problem.
The following command allows the administrator to change the configuration of the resource:
s p ctidisa parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:ctidisa; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart
are required (i.e. with warm start command).
-------------------------------------------------------------------------------
SERVICE:Default DESCR:System_default_service
MODE: DISA |INTRO-STATE: CREQ |INTRO:
ROUTING: PREFIX |CONN-DELAY: 6 |WELCOME:
MAX-CALLS: NOMAX |TRANSFER: NO |INITDIAL:
BC: Speech | |AFTERPIN: #
CB: NO |DIAL-TOUT: 30 |LOOPDIAL:
CB-DELAY: 5 |PIN-TOUT: 15 |IDENFAIL:
CB-NRTY: 1 |NUM-TOUT: 15 |CALLNA:
CB-UNK-CDO: 'CGI' |BUSYDISC: 4 |ALERT:
CB-NAT-CDO: 0'CGI' |MAX-LOOPS: 0 |BUSY:
CB-INT-CDO: 00'CGI' |LOOP-BUSY: YES |NOANSWER:
CB-CGO: # |LOOP-NOANSWER: YES |DISC:
CTIP-TYPE-O: * |LOOP-DENIED: YES |HOLD:
AUTO-CDO: # |LOOP-OTHER: YES |BYE: #
TOUT-CDO: #
PERMIT: *
848
Draft DISA - Direct Inward System Access Draft
CDI: -
CGI: -
-------------------------------------------------------------------------------
Note
The Default service is automatically created by the system. It is assigned to the calls which doesn't match
with other configured services; default values can be edited, except CDI and CGI fields.
MODE Operational mode [DISA: the behaviour is the standard DISA behaviour; ACD: the Automatic Call
Distribution is enabled; INTRO: the behaviour is that of a “responder” for not-paid messages; DATA-
CB: the behaviour is that of ordering a CALL request to the specified resource and reject the call].
CB-DELAY Time between the end of the incoming call and the Call Back call by the DISA.
AUTO-CDO Automatic Called Number; if service matches and this field is not null, the number configured here is
automatically dialled (any other digit entered by the user is discarded).
CDI Incoming Called number that can be used at pre-identification. If it is set to DISABLED [#], the pre-
identification is performed using calling number.
CGI List of calling numbers that can be used at pre-identification to find the user. Use - prefix to delete
from the list a calling number previously inserted (e.g. “-123456”): several calling numbers can be
set joining values by the character , (e.g. “CGI:1234,5555,-77777”). This field is not allowed for the
Anonymous user and it is possible to set up to 2000 numbers.
CONN-DELAY Sets the duration of ALERTING state for incoming calls to DISA (i.e. the time between the reception
of the call and the response by the DISA).
TRANSFER Enables/disables call transfer after outgoing call is established; this function is inhibited when in the
service ACD is active.
ACD-INTERVAL Time interval in which a call in a queue tries to verify if the currently ACTIVE call gets disconnected.
DIAL-TOUT Maximum time to wait for the insertion of the first digit in post-selection (during INITDIAL).
PIN-TOUT Maximum time to wait for the insertion of the first digit of the PIN.
NUM-TOUT Maximum time to wait to complete the insertion of the number in post-selection.
849
Draft DISA - Direct Inward System Access Draft
MAX-LOOPS Maximum number of loop enabled [0-99: when the ACD is set to YES, this value is automatically set to
99 and it is not editable].
LOOP-BUSY Enables/disables the loop when the reason of a call failure is “user busy” (cause 0x91).
LOOP-NOANSWER Enables/disables the loop when the reason of a call failure is “user not responding, user alerted” (cause
0x93).
LOOP-DENIED Enables/disables the loop when the reason of a call failure is “selection not allowed for the user” (in
this kind of error the call was not sent to CTIR).
LOOP-OTHER Enables/disables the loop for reasons other than those precisely recognised (e.g. non-existent routing).
DISC-CAUSE Used to set the disconnect cause after the INTRO message has been played. This is useful for setting up
alternative routings. (Only for MODE:INTRO).
INTRO...BYE Refer to Section 47.8.1, “File audio format” to have more inforamations about these parameters.
-------------------------------------------------------------------------------
USER:Anonymous
PIN: # |MAX-CALLS: NOMAX |PERMIT: SERVICE
SERVICE: AUTO |CB: NO |DENY: *
CGI: -
-------------------------------------------------------------------------------
Note
The Anonymous user is automatically created by the system; it identifies all the callers not configured in
others users.
PIN Personal Identification Number code assigned to the user; if it is set to #, the user is identified only by its
calling number.
SERVICE Service name assigned to the user; if it is set to AUTO, the service discovered at the pre-identification phase is
used.
850
Draft DISA - Direct Inward System Access Draft
CGI List of calling numbers that can be used at pre-identification to find the user. Use - prefix to delete from the
list a calling number previously inserted (e.g. “-123456”): several calling numbers can be set joining values
by the character , (e.g. “CGI:1234,5555,-77777”). This field is not allowed for the Anonymous user and it is
possible to set up to 2000 numbers.
Identification of the user is made through the PIN and the calling number verification.
Tip
More examples are available at Section 53.15, “How to configure CTIDISA to implement a responder”.
COMMAND EXECUTED
Caution
To activate the changes made execute the initialization command init res:ctidisa.
• LOOP enabled for “user busy”, “no answer”, “selection not allowed” and “all other reasons”;
851
Draft DISA - Direct Inward System Access Draft
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
-------------------------------------------------------------------------------
SERVICE:Default DESCR:System_default_service
MODE: DISA |INTRO-STATE: CREQ |INTRO:
ROUTING: PREFIX |CONN-DELAY: 6 |WELCOME:
MAX-CALLS: NOMAX |TRANSFER: NO |INITDIAL:
BC: Speech | |AFTERPIN: #
CB: NO |DIAL-TOUT: 30 |LOOPDIAL:
CB-DELAY: 5 |PIN-TOUT: 15 |IDENFAIL:
CB-NRTY: 1 |NUM-TOUT: 15 |CALLNA:
CB-UNK-CDO: 'CGI' |BUSYDISC: 4 |ALERT:
CB-NAT-CDO: 0'CGI' |MAX-LOOPS: 0 |BUSY:
CB-INT-CDO: 00'CGI' |LOOP-BUSY: YES |NOANSWER:
CB-CGO: # |LOOP-NOANSWER: YES |DISC:
CTIP-TYPE-O: * |LOOP-DENIED: YES |HOLD:
AUTO-CDO: # |LOOP-OTHER: YES |BYE: #
TOUT-CDO: #
PERMIT: *
CDI: -
CGI: -
-------------------------------------------------------------------------------
SERVICE:testdisa DESCR:
MODE: DISA |INTRO-STATE: CREQ |INTRO: test
ROUTING: PREFIX |CONN-DELAY: 0 |WELCOME: test
MAX-CALLS: 3 |TRANSFER: YES |INITDIAL: test
BC: Speech | |AFTERPIN: test
CB: NO |DIAL-TOUT: 30 |LOOPDIAL: test
CB-DELAY: 5 |PIN-TOUT: 15 |IDENFAIL: test
CB-NRTY: 1 |NUM-TOUT: 15 |CALLNA: test
CB-UNK-CDO: 'CGI' |BUSYDISC: 4 |ALERT: test
CB-NAT-CDO: 0'CGI' |MAX-LOOPS: 4 |BUSY: test
CB-INT-CDO: 00'CGI' |LOOP-BUSY: YES |NOANSWER: test
CB-CGO: # |LOOP-NOANSWER: YES |DISC: test
CTIP-TYPE-O: * |LOOP-DENIED: YES |HOLD: test
AUTO-CDO: # |LOOP-OTHER: YES |BYE: test
TOUT-CDO: #
PERMIT: 5*
852
Draft DISA - Direct Inward System Access Draft
CDI: 003
CGI: #
-------------------------------------------------------------------------------
User1:
• no service re-assignation;
• 1 simultaneous call;
• post-selection enabled toward all numbers allowed to service in which the caller has been identified;
User2:
• no service re-assignation;
• 1 simultaneous call;
• post-selection enabled toward number 515 and not enabled toward number 520;
Configure “user1”:
COMMAND EXECUTED
COMMAND EXECUTED
Configure “user2”:
COMMAND EXECUTED
COMMAND EXECUTED
-------------------------------------------------------------------------------
USER:Anonymous
PIN: # |MAX-CALLS: NOMAX |PERMIT: SERVICE
SERVICE: AUTO |CB: NO |DENY: *
CGI: -
-------------------------------------------------------------------------------
USER:user1
853
Draft DISA - Direct Inward System Access Draft
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
...
-------------------------------------------------------------------------------
1 VtoD G2 CtiDisa 00? *
-------------------------------------------------------------------------------
2 CtoD * CtiDisa 00? *
NO ANY NO Dft * *
64000 Sys * * Sys Sys * *
-------------------------------------------------------------------------------
3 DtoV CtiDisa PBX 5?? 'CDI.S2'
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
...
854
Draft DISA - Direct Inward System Access Draft
-------------------------------------------------------------------------------
Refer to Section 47.5, “Example of Automatic Call Distribution configuration” to have more information about ACD.
Tip
More examples are available at Section 53.15, “How to configure CTIDISA to implement a responder”.
COMMAND EXECUTED
Caution
To activate the changes made execute the initialization command init res:ctidisa.
• LOOP enabled for “user busy”, “no answer”, “selection not allowed” and “all other reasons”;
855
Draft DISA - Direct Inward System Access Draft
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
-------------------------------------------------------------------------------
SERVICE:acd DESCR:
MODE: ACD |INTRO-STATE: CREQ |INTRO: test
ROUTING: PREFIX |CONN-DELAY: 0 |WELCOME: test
MAX-CALLS: 5 |TRANSFER: NO |INITDIAL: test
BC: Speech |ACD-INTERVAL: 15 |AFTERPIN: test
CB: NO |DIAL-TOUT: 30 |LOOPDIAL: test
CB-DELAY: 5 |PIN-TOUT: 15 |IDENFAIL: test
CB-NRTY: 1 |NUM-TOUT: 15 |CALLNA: test
CB-UNK-CDO: 'CGI' |BUSYDISC: 4 |ALERT: test
CB-NAT-CDO: 0'CGI' |MAX-LOOPS: (99) |BUSY: test
CB-INT-CDO: 00'CGI' |LOOP-BUSY: YES |NOANSWER: test
CB-CGO: # |LOOP-NOANSWER: YES |DISC: test
CTIP-TYPE-O: * |LOOP-DENIED: YES |HOLD: test
AUTO-CDO: 501 |LOOP-OTHER: YES |BYE: test
TOUT-CDO: #
PERMIT: 501
CDI: 002
CGI: #
-------------------------------------------------------------------------------
SERVICE:Default DESCR:System_default_service
MODE: DISA |INTRO-STATE: CREQ |INTRO:
ROUTING: PREFIX |CONN-DELAY: 6 |WELCOME:
MAX-CALLS: NOMAX |TRANSFER: NO |INITDIAL:
BC: Speech | |AFTERPIN: #
CB: NO |DIAL-TOUT: 30 |LOOPDIAL:
CB-DELAY: 5 |PIN-TOUT: 15 |IDENFAIL:
CB-NRTY: 1 |NUM-TOUT: 15 |CALLNA:
CB-UNK-CDO: 'CGI' |BUSYDISC: 4 |ALERT:
CB-NAT-CDO: 0'CGI' |MAX-LOOPS: 0 |BUSY:
856
Draft DISA - Direct Inward System Access Draft
• no service re-assigning;
• post-selection enabled toward all numbers allowed to service in which the caller has been identified;
COMMAND EXECUTED
COMMAND EXECUTED
-------------------------------------------------------------------------------
USER:acd
PIN: # |MAX-CALLS: 3 |PERMIT: *
SERVICE: AUTO |CB: NO |DENY: #
CGI: 01234567
-------------------------------------------------------------------------------
COMMAND EXECUTED
COMMAND EXECUTED
857
Draft DISA - Direct Inward System Access Draft
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 VtoD G2 CtiDisa 00? *
-------------------------------------------------------------------------------
2 CtoD * CtiDisa 00? *
NO ANY NO Dft * *
64000 Sys * * Sys Sys * *
-------------------------------------------------------------------------------
3 DtoV CtiDisa PBX 5?? 'CDI.S2'
NO ANY NO Dft * *
64000 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
Tip
More examples are available at Section 53.15, “How to configure CTIDISA to implement a responder”.
COMMAND EXECUTED
858
Draft DISA - Direct Inward System Access Draft
WDIR:C:\APP\DISA\
Caution
To activate the changes made execute the initialization command init res:ctidisa.
• LOOP enabled for “user busy”, “no answer”, “selection not allowed” and “all other reasons”;
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
COMMAND EXECUTED
-------------------------------------------------------------------------------
SERVICE:call_back DESCR:
859
Draft DISA - Direct Inward System Access Draft
• no service re-assignation;
COMMAND EXECUTED
COMMAND EXECUTED
-------------------------------------------------------------------------------
USER:call_back
PIN: # |MAX-CALLS: 1 |PERMIT: SERVICE
SERVICE: AUTO |CB: YES |DENY: #
CGI: 3456789012
-------------------------------------------------------------------------------
--------------------------------------+--------------------+-------------------
860
Draft DISA - Direct Inward System Access Draft
[DESCR:]
ID: PICKUP: SCAN: RULE: |P1 P2 P3 P4 P5 |P6 P7 P8 P9 ...
|... P62 P63 P64
--------------------------------------+--------------------+-------------------
1 NO R ST |31 32 33 34 . |. . . . .
--------------------------------------+--------------------+-------------------
2 NO R ST |201 202 203 204 . |. . . . .
--------------------------------------+--------------------+-------------------
[12:05:34] ABILIS_CPX:a ctir pr:1 type:vtod poi:g2 cdi:* sp:64000 coders:g.711 mj:80 dj:0
COMMAND EXECUTED
[14:29:04] ABILIS_CPX:a ctir pr:2 type:dtov poo:g2 cdi:0039* cdo:'cdi.s5' sp:64000 coders:g.711 mj:
COMMAND EXECUTED
[14:29:04] ABILIS_CPX:a ctir pr:3 type:dtov poo:g1 cdi:* sp:64000 coders:g.711 mj:80 dj:0
COMMAND EXECUTED
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 DATA * CtiSLink * *
-------------------------------------------------------------------------------
1 VtoD G2 CtiDisa * *
NO ANY NO Dft * *
64000 Sys 0 80 Sys Sys * *
* *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
2 DtoV CtiDisa G2 0039* 'CDI.S5'
NO ANY NO Dft * *
64000 Sys 0 80 Sys Sys * *
NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
3 DtoV CtiDisa G1 * *
861
Draft DISA - Direct Inward System Access Draft
NO ANY NO Dft * *
64000 Sys 0 80 Sys Sys * *
NO Sys * *
* *
Sys AUTO AUTO Sys Sys NO Sys Sys Sys Sys Sys
G.711
-------------------------------------------------------------------------------
Tip
More examples are available at Section 53.15, “How to configure CTIDISA to implement a responder”.
COMMAND EXECUTED
Caution
To activate the changes made execute the initialization command init res:ctidisa.
• calling input number which activates the data call back is 10;
• the data call back uses res:ip-6 to establish a connection toward internet
COMMAND EXECUTED
COMMAND EXECUTED
862
Draft DISA - Direct Inward System Access Draft
-------------------------------------------------------------------------------
SERVICE:data_cb DESCR:
MODE: DATA-CB |CD-RES: Ip-6
MAX-CALLS: NOMAX |DISC-CAUSE: 81,90
CDI: 10
CGI: #
-------------------------------------------------------------------------------
COMMAND EXECUTED
PR:1 DESCR:data_cb
ACT:YES EDT:NO
TYPE:VtoD POI:G1 POO:CtiDisa EEC:NO
NEXT:NO CDI:09999901 CDO:10
LAST:ANY CGI:* CGO:*
T301:Dft SDI:* SDO:*
UDT:NO SGI:* SGO:*
RGI:* RGO:*
IG:Sys OG:Sys SG:Sys DL:Sys DH:Sys
FMRLY:Sys FAXSP:AUTO MODSP:AUTO FMLVL:Sys FMDJ:Sys FMMJ:Sys
SP:6400 SC:Sys DJ:Sys MJ:Sys ECM:Sys
CODERS:Sys
TI1:ALL,00:00-23:59 TI2:# TI3:# TI4:# TI5:#
863
Draft DISA - Direct Inward System Access Draft
864
Draft DISA - Direct Inward System Access Draft
Audio files must be loaded, using either FTP of FILE PUT commands, into the appropriate directory (or a subdirectory) of
the following location:
For example if you want to create the messages set “prova”, the files must be copied in the directory:
865
Draft DISA - Direct Inward System Access Draft
• C:\APP\DISA\MSG\prova
Warning
The subdirectory “msg” (and its subdirectories) doesn't exist by default; you must previously create them
with an FTP client or using the command msg add ctidisa <msgset>. Go to the FTP section for more
information about FTP resource.
Once WAV files are loaded, they must be converted in the CPM (CPX Packed Messages) format (i.e. the format that allows
Abilis to play the messages with any coder supported).
• msg update ctidisa [MsgSet [MsgName]]: recreates CPM files only if the corresponding WAV file is newer;
• msg rebuild ctidisa [MsgSet [MsgName]]: recreates CPM files regardless of the corresponding WAV file date/time;
• msg extract ctidisa [MsgSet [MsgName]]: extracts the G.711 A-law from the CPM file and writes the corresponding
WAV file. The date/time of the extracted WAV should be set equal to the CPM date/time, so that the MSG UPDATE
command doesn't recognise it as newer.
Warning
The operation could persist for some minutes; the duration depends on the number of coder installed in the
CPX.
1. Connect through FTP to the Abilis and create the directory <disa-working-dir>\MSG (tipically C:\APP\DISA\MSG).
Warning
You must log in the Abilis with an user enabled to create and edit directories and files. (see FTP section).
2. Record an audio file for every event (WELCOME, INITDIAL, AFTERPIN, LOOPDIAL, IDENFAIL, CALLNA,
ALERT, BUSY, NOANSWER, DISC, HOLD, BYE) and save it in the following formats (you can use the Windows
sound recorder):
3. Rename the files according the syntax event.wav (e.g. initdial.wav, alert.wav, …).
4. Load the files into the directory naming the “message set” desired; you have two possibilities:
• through FTP: you must access to the directory and load the wav files (the FTP user must have the requested
authorizations);
If you want to load the file bye.wav in the “test” directory, type:
Upload Zmodem
866
Draft DISA - Direct Inward System Access Draft
Note
The command must be repeated for every file.
Converting C:\APP\DISA\MSG\test\afterpin.wav
Converting to G711A/64k .......... END
Converting C:\APP\DISA\MSG\test\alert.wav
Converting to G711A/64k .......... END
Converting C:\APP\DISA\MSG\test\busy.wav
Converting to G711A/64k .......... END
Converting C:\APP\DISA\MSG\test\bye.wav
Converting to G711A/64k .......... END
Converting C:\APP\DISA\MSG\test\callna.wav
Converting to G711A/64k .......... END
Converting C:\APP\DISA\MSG\test\disc.wav
Converting to G711A/64k .......... END
Converting C:\APP\DISA\MSG\test\hold.wav
Converting to G711A/64k .......... END
Converting C:\APP\DISA\MSG\test\idenfail.wav
Converting to G711A/64k .......... END
Converting C:\APP\DISA\MSG\test\initdial.WAV
Converting to G711A/64k .......... END
867
Draft DISA - Direct Inward System Access Draft
Converting C:\APP\DISA\MSG\test\loopdial.wav
Converting to G711A/64k .......... END
Converting C:\APP\DISA\MSG\test\noanswer.wav
Converting to G711A/64k .......... END
Converting C:\APP\DISA\MSG\test\welcome.wav
Converting to G711A/64k .......... END
COMMAND COMPLETED
8. The wav files can be deleted from the directory; you have two possibilities:
• through FTP: you must access to the directory and delete the wav files (the FTP user must have the requested
authorizations);
Type the below command to delete the bye.wav file in the “test” directory:
Note
The command must be repeated for every file.
868
Draft DISA - Direct Inward System Access Draft
d d ctidisa Shows diagnostic information, such as the state resource, the number of used channels, the name of the
identified user and service, the Q931 state of the incoming/outgoing call, the calling/called number of the
incoming/outgoing call, the connection time of the current incoming/outgoing call, the current number of
loop.
d de ctidisa Shows diagnostic information in an extended format: the same information listed for d d ctidisa and in
addition the call identifier of incoming/outgoing call, the internal state of the channel, the type of tone/
message and the name of CTISYS tone or Vocal message which are playing.
RES:CtiDisa -------------------------------------------------------------------
Direct_Inward_System_Access
STATE:ACTIVE USED-CHAN:0
- DISA Channels diagnostics --------------------------------------------
CH: User Q931State-In CGI Time-In Nrty
Service Q931State-Out CDO Time-Out Loop
------------------------------------------------------------------------
0 DISCONNECTED 0 0
DISCONNECTED 0 0
------------------------------------------------------------------------
1 DISCONNECTED 0 0
DISCONNECTED 0 0
------------------------------------------------------------------------
2 DISCONNECTED 0 0
DISCONNECTED 0 0
------------------------------------------------------------------------
3 DISCONNECTED 0 0
DISCONNECTED 0 0
------------------------------------------------------------------------
4 DISCONNECTED 0 0
DISCONNECTED 0 0
------------------------------------------------------------------------
5 DISCONNECTED 0 0
DISCONNECTED 0 0
------------------------------------------------------------------------
6 DISCONNECTED 0 0
DISCONNECTED 0 0
------------------------------------------------------------------------
7 DISCONNECTED 0 0
DISCONNECTED 0 0
------------------------------------------------------------------------
8 DISCONNECTED 0 0
DISCONNECTED 0 0
------------------------------------------------------------------------
9 DISCONNECTED 0 0
DISCONNECTED 0 0
------------------------------------------------------------------------
RES:CtiDisa -------------------------------------------------------------------
Direct_Inward_System_Access
STATE:ACTIVE USED-CHAN:0
- DISA Channels diagnostics --------------------------------------------
CH: User Q931State-In CGI Time-In Nrty
Service Q931State-Out CDO Time-Out Loop
869
Draft DISA - Direct Inward System Access Draft
d s ctidisa Shows statistic information, such as the number of incoming/outgoing calls, the number of incoming/
outgoing calls that reached ACTIVE state, the number of incoming/outgoing calls that were closed prior
to reach ACTIVE state, the number of incoming/outcoming voice frames;
d se ctidisa Shows statistic information in an extended format: the same information listed for d s ctidisa command
are shown for each channel.
RES:CtiDisa -------------------------------------------------------------------
Direct_Inward_System_Access
--- Cleared 091:01:20:34 ago, on 01/10/2007 at 04:51:42 ----------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-CALL | 5182| |I-SUCC-CALL| 5107| |
I-TIME-CALL| 695438| |I-FAIL-CALL| 0| |
I-VOICE-FRM| 34847445| 40743886| | | |
870
Draft DISA - Direct Inward System Access Draft
RES:CtiDisa -------------------------------------------------------------------
Direct_Inward_System_Access
--- Cleared 091:01:21:12 ago, on 01/10/2007 at 04:51:41 ----------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-CALL | 5182| |I-SUCC-CALL| 5107| |
I-TIME-CALL| 695438| |I-FAIL-CALL| 0| |
I-VOICE-FRM| 34847445| 40743886| | | |
O-CALL | | 4369|O-SUCC-CALL| | 4010|
O-TIME-CALL| | 592376|O-FAIL-CALL| | 1000|
O-VOICE-FRM| 26127200| 26127186|
------------------------------------------------------------------------
CH:0
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-VOICE-FRM| 1096| 1098|I-DTMF | 1| |
O-VOICE-FRM| 0| 0|
------------------------------------------------------------------------
CH:1
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-VOICE-FRM| 8805| 10777|I-DTMF | 1| |
O-VOICE-FRM| 5981| 5981|
------------------------------------------------------------------------
CH:2
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-VOICE-FRM| 17402| 18212|I-DTMF | 1| |
O-VOICE-FRM| 16219| 16219|
------------------------------------------------------------------------
CH:3
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-VOICE-FRM| 18028| 22767|I-DTMF | 1| |
O-VOICE-FRM| 12621| 12621|
------------------------------------------------------------------------
CH:4
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-VOICE-FRM| 1289| 2045|I-DTMF | 1| |
O-VOICE-FRM| 0| 0|
------------------------------------------------------------------------
CH:5
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-VOICE-FRM| 6285| 8882|I-DTMF | 1| |
O-VOICE-FRM| 2996| 2996|
------------------------------------------------------------------------
CH:6
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-VOICE-FRM| 8851| 13394|I-DTMF | 1| |
O-VOICE-FRM| 3016| 3016|
------------------------------------------------------------------------
CH:7
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-VOICE-FRM| 0| 0|I-DTMF | 0| |
O-VOICE-FRM| 0| 0|
------------------------------------------------------------------------
CH:8
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-VOICE-FRM| 0| 0|I-DTMF | 0| |
O-VOICE-FRM| 0| 0|
871
Draft DISA - Direct Inward System Access Draft
------------------------------------------------------------------------
CH:9
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
I-VOICE-FRM| 0| 0|I-DTMF | 0| |
O-VOICE-FRM| 0| 0|
------------------------------------------------------------------------
Note
To use these commands you need to have administrator or super user rights.
RES:CtiDisa -------------------------------------------------------------------
Direct_Inward_System_Access
BufferLength:288 Date/Time:14/11/2010 03:59:07 TraceTime:<NotRunning>
The following command shows the number of used channels and the number of the used/free queues.
RES:CtiDisa -------------------------------------------------------------------
Direct_Inward_System_Access
BufferLength:243 Date/Time:25/06/2007 10:55:14 TraceTime:<NotRunning>
--------------+----------
Name | Value
--------------+----------
State | ACTIVE
Used channels | 2
FIFO - used | 0
FIFO - free | 29
--------------+----------
RES:CtiDisa -------------------------------------------------------------------
Direct_Inward_System_Access
BufferLength:451 Date/Time:25/06/2007 10:55:59 TraceTime:<NotRunning>
------------+----------
872
Draft DISA - Direct Inward System Access Draft
Name | Value
------------+----------
Event IN | 14397
Event OUT | 12300
Call IN | 1440
Call ACC | 1440
Call REJ | 0
Voice IN | 11835552
Voice OUT | 13004449
Handle OPN | 3525
Handle CLS | 3523
Handle DSC | 0
Timer RSQ | 3960
Timer CLR | 2492
Timer EXP | 1468
------------+----------
COMMAND EXECUTED
COMMAND EXECUTED
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
-------------------------------------------------------------------------------
1 /sys/
admin r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
2 /sys/pub/
anonymous r--- ---- YES PLAIN,SSL
-------------------------------------------------------------------------------
3 /sys/admin/disa/
disa r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
873
Draft DISA - Direct Inward System Access Draft
For example, by clicking on Message set(s) View/Change link, it is possible to manage the message files.
874
Draft Draft
Table of Contents
48.1. CTIAS - CTI Advanced Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
48.1.1. Activating the CTIAS resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
48.1.2. CTIAS resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
48.2. CTIVM - CTI Voice Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
48.2.1. Activating the CTIVM resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
48.2.2. CTIVM resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 877
48.2.3. CTIVM diagnostic and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878
48.2.4. CTIVM configuration through CP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
48.2.5. Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884
• activate directly the desired plugin. Abilis will automatically activate the CTIAS resource if it's not.
The CTIAS resource may already exist in the system, but may not yet be active. Set it active with the command:
COMMAND EXECUTED
Caution
You must restart the Abilis to make the resource running (use the command warm start to reboot the
Abilis) after adding or setting the CTIAS active.
RES:CtiAs ---------------------------------------------------------------------
Run DESCR:CTI_Advanced_Services_entry_point
sesnum:0 TC-SESNUM:1
Caution
Execute the initialization command init res:ctias to activate the changes made on the upper case parameters;
use save conf and warm start commands to set active the changes made on the lowercase parameters.
875
Draft CTIAS - CTI Advanced Services Draft
RES:CtiAs ---------------------------------------------------------------------
Run DESCR:CTI_Advanced_Services_entry_point
sesnum:0 TC-SESNUM:1
sesnum Number of sessions that the CTIAS can support at once [0..255] <ReadOnly>.
TC-SESNUM Number of on-the-fly simultaneous transcoding session allowed for ALL plugins [0..255].
The following command allows the administrator to change the configuration of the resource:
s p ctias parameter:value...
Caution
Execute the initialization command init res:ctias to activate the changes made on the upper case parameters;
use save conf and warm start commands to set active the changes made on the lowercase parameters.
Abilis provides a system message set for voice mail, but every user can customize its own messages.
COMMAND EXECUTED
The CTIVM resource may already exist in the system, but may not yet be active. Set it active with the command:
COMMAND EXECUTED
Caution
You must restart the Abilis to make the resource running (use the command warm start to reboot the
Abilis) after adding or setting the CTIVM active.
Tip
If the CTIVM resource is activated and the CTIAS resource is not, Abilis automatically adds the CTIAS
resource:
COMMAND EXECUTED
876
Draft CTIAS - CTI Advanced Services Draft
SAVE EXECUTED
COMMAND EXECUTED
Caution
Execute the initialization command init res:ctivm to activate the changes made on the upper case
parameters; use save conf and warm start commands to set active the changes made on the lowercase
parameters.
RES:CtiVm ---------------------------------------------------------------------
Run DESCR:CTI_Voice_Mail_service
LOG:NO ACT:YES sesnum:5 TC-SESNUM:1 BUSY-NOCHAN:YES
CONN-DELAY:0 MSGLEN:90
RCPT:
RCPT-LIST:#
OGM-MSG:default END-MSG:default
wdir:C:\APP\VM\
Meaning of parameters:
DESCR Resource description. From 0 up to 79 Alphanumeric extended characters. Spaces are not allowed. Case is
preserved.
LOG State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E] (D: Debug Log; S: System Log; A: Alarm
view; L: Local audible alarm; T: SNMP traps; +E: Extended Log of state changes, see ref. manual) ACT: Operation
activation [NO, YES].
sesnum Number of sessions that the VM plugin can support at once [1..255]. Default is 5.
TC-SESNUM Number of on-the-fly simultaneous transcoding sessions allowed for VM plugin [0..255]. Default is 1.
BUSY-NOCHAN Return BUSY cause instead of NOCHAN [NO, YES]. Default is YES.
877
Draft CTIAS - CTI Advanced Services Draft
RCPT Defult Voice Mail recipient(s). From 0 up to 128 ASCII printable characters (used when a call is not for a
user). Spaces are not allowed. Case is preserved. Default is empty.
RCPT-LIST IN2T list used to select Voice Mail recipient(s) on the base of called numbers [#, ListName]. Default is #.
OGM-MSG Name of the file holding the Outgoing Message. From 1 up to 20 characters. Names holding spaces must
be written between quotation marks (E.g.: "Dft out message"). Default is default.
END-MSG Name of the file holding the End Message. From 1 up to 20 characters. Names holding spaces must be
written between quotation marks (E.g.: "Sys end message"). Default is default.
wdir Directory where message files are located. It cannot be empty. Physical full path in DOS notation, i.e.
starting with a drive letter in the range ['A'..'Z'] and ending with the '\' character. Max. 128 characters.
Case is preserved. Spaces are allowed. Strings holding spaces must be written between quotation marks
(E.g.: "C:\My dir\"). Default is C:\APP\VM\.
The following command allows the administrator to change the configuration of the resource:
s p ctivm parameter:value...
Caution
Execute the initialization command init res:ctivm to activate the changes made on the upper case
parameters; use save conf and warm start commands to set active the changes made on the lowercase
parameters.
d d ctivm it shows the state of the resource sorted by session (sesnum parameter).
MAILER- CTIVM sender state (WAITING:sender is waiting for new mail to be sent.
STATE SEARCHING: sender is searching on disk for new mail to be sent. CHECKING": sender
is checking metadata file.SENDING: sender is sending the mail. DELETING: sender is
deleting metadata file and WAV file.)
VM-State CTIVM session state. (READY: session is READY for incoming call. OGM: session
is playing OGM message. OGM-BEEP: session is playing BEEP pattern after having
played OGM message. RECORDING: session is recording to WAV or to CPM. END-
BEEP: session is playing BEEP pattern prior to play END message. END: session is
playing END message.)
RES:CtiVm ---------------------------------------------------------------------
CTI_Voice_Mail_service
STATE:ACTIVE MAILER-STATE:WAITING TC-STATE:WAITING
878
Draft CTIAS - CTI Advanced Services Draft
------------------------------------------------------------------------
SES: VM-State User
Q931-State CG CD
------------------------------------------------------------------------
0 READY
00-DISCONNECTED
------------------------------------------------------------------------
1 READY
00-DISCONNECTED
------------------------------------------------------------------------
2 READY
00-DISCONNECTED
------------------------------------------------------------------------
3 READY
00-DISCONNECTED
------------------------------------------------------------------------
4 READY
00-DISCONNECTED
------------------------------------------------------------------------
d s ctivm it shows the statistics of the CTIVM resource such as the total number of successfully sent mails (SENT), the
total number of successfully transcoded CPM files (TRANSCODED).
RES:CtiVm ---------------------------------------------------------------------
CTI_Voice_Mail_service
--- Cleared 0 days 00:24:18 ago, on 05/05/2011 at 11:36:38 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SENT | | 0|TRANSCODED | | 0|
------------------------------------------------------------------------
Tip
Interesting chapter: Section 43.4.7, “Voice Mail administration”.
Parameter: | Value:
--------------------+----------------------------------------------------------
USER: test2
ID: 5 <Read Only>
LAST-CHANGE: 05/05/2011 16:55:59 CET <Read Only>
PWD: ***
--------------------
CTIP-CLIP: SYS
CTIP-ACTION: ADVANCED
CTIP-CF-RULE: ALWAYS
CTIP-CF-TOUT: 15
CTIP-CF-DLY: 10
CTIP-CF-CDO: ux#
CTIP-CF-CGO: *
879
Draft CTIAS - CTI Advanced Services Draft
CTIP-VM: NO
CTIP-VM-RULE: NOANS,OTHERS
CTIP-VM-TOUT: 15
--------------------
CLUS-CLIP: SYS
CLUS-ACTION: ADVANCED
CLUS-CF-RULE: ALWAYS
CLUS-CF-TOUT: 15
CLUS-CF-DLY: 10
CLUS-CF-CDO: ux#
CLUS-CF-CGO: *
CLUS-VM: NO
CLUS-VM-RULE: NOANS,OTHERS
CLUS-VM-TOUT: 15
--------------------
IAX-CLIP: SYS
IAX-ACTION: ADVANCED
IAX-CF-RULE: ALWAYS
IAX-CF-TOUT: 15
IAX-CF-DLY: 10
IAX-CF-CDO: ux#
IAX-CF-CGO: *
IAX-VM: NO
IAX-VM-RULE: NOANS,OTHERS
IAX-VM-TOUT: 15
--------------------
SIP-CLIP: SYS
SIP-ACTION: ADVANCED
SIP-CF-RULE: ALWAYS
SIP-CF-TOUT: 5
SIP-CF-DLY: 10
SIP-CF-CDO: ux12
SIP-CF-CGO: *
SIP-VM: YES
SIP-VM-RULE: NOANS,OTHERS
SIP-VM-TOUT: 5
--------------------
VM-RCPT-LIST: #
VM-RCPT: [email protected]
VM-OGM-MSG: Message1
VM-END-MSG: SYS
--------------------
MAIL-FAIL: NO
MAIL-FAIL-RCPT-LIST: #
MAIL-FAIL-RCPT:
MAIL-FWD: NO
MAIL-FWD-RCPT-LIST: #
MAIL-FWD-RCPT:
SEIZED-CALLS: NO
--------------------
CTI-CALLS-LOG: YES
CTI-CALLS-LOG-IN: 30
CTI-CALLS-LOG-OUT: 30
--------------------
CALLTRY-TOUT: SYS
CALLTRY-NRTY: SYS
--------------------
TON-TO-PREFIX: SYS
-------------------------------------------------------------------------------
Meaning of parameters:
880
Draft CTIAS - CTI Advanced Services Draft
CTIP-VM-RULE Voice mail rule [ALWAYS, BUSY, NOANS, OTHERS]. Values [BUSY, NOANS, OTHERS] can be
joined using ',' character. Default is NOANS,OTHERS.
CTIP-VM-TOUT Voice mail: Time-out for the 'NOANS' rule [5..180 sec.]. Default is 15.
CLUS-VM-RULE Voice mail rule [ALWAYS, BUSY, NOANS, OTHERS]. Values [BUSY, NOANS, OTHERS] can be
joined using ',' character. Default is NOANS,OTHERS.
CLUS-VM-TOUT Voice mail: Time-out for the 'NOANS' rule [5..180 sec.]. Default is 15.
IAX-VM-RULE Voice mail rule [ALWAYS, BUSY, NOANS, OTHERS]. Values [BUSY, NOANS, OTHERS] can be
joined using ',' character. Default is NOANS,OTHERS.
IAX-VM-TOUT Voice mail: Time-out for the 'NOANS' rule [5..180 sec.]. Default is 15.
SIP-VM-RULE Voice mail rule [ALWAYS, BUSY, NOANS, OTHERS]. Values [BUSY, NOANS, OTHERS] can be
joined using ',' character. Default is NOANS,OTHERS.
SIP-VM-TOUT Voice mail: Time-out for the 'NOANS' rule [5..180 sec.]. Default is 15.
VM-RCPT-LIST IN2T list used to select Voice Mail recipient(s) on the base of called numbers [#, ListName].
VM-RCPT Defult Voice Mail recipient(s). From 0 up to 128 ASCII printable characters. Spaces are not allowed.
Case is preserved.
VM-OGM-MSG Name of the file holding the Outgoing Message. "SYS" or from 1 up to 20 characters. Names holding
spaces must be written between quotation marks (E.g.: "My message"). Default is SYS.
VM-END-MSG Name of the file holding the End Message. "SYS" or from 1 up to 20 characters. Names holding spaces
must be written between quotation marks (E.g.: "My message"). Default is SYS.
In the previous example, VM is activated (ACTION:VM) for every interface (IF:ANY), at any time (TI:ALL,00:00-23:59), if
user test2 doesn't answer, or for any other cause, (RULE:NOANS,OTHERS) after 15 seconds (TOUT:15).
881
Draft CTIAS - CTI Advanced Services Draft
USER: PWD: ACT: CTIP: CLUS: PPP: FTP: HTTP: MAIL: IAX: SIP:
--------------------------------+--------------+-------------------------------
admin *** YES # # YES YES YES NO NO NO
guest NO # # NO NO NO NO NO NO
test2 *** YES # # NO NO NO NO NO YES
test3 *** YES # # NO NO NO NO NO YES
The voice mail settings are stored in users' preferences. Type the following command to show the settings for test2 user:
These settings show that the voice mail service is not activated because SIP-VM parameter is set to NO. Change the
parameters values in the following way:
COMMAND EXECUTED
882
Draft CTIAS - CTI Advanced Services Draft
SIP-CF-CGO: *
SIP-VM: YES
SIP-VM-RULE: NOANS,OTHERS
SIP-VM-TOUT: 15
--------------------
VM-RCPT-LIST: #
VM-RCPT: [email protected]
VM-OGM-MSG: SYS
VM-END-MSG: SYS
--------------------
...
The call is passed to the voice mail after 15 seconds (SIP-VM-TOUT) If test2 doesn't answer.
Start Debug Log content real-time logging (Type CTRL+C + ENTER to stop):
An e-mail (with the following text) is sent from Abilis to the recipient specified in the VM-RCPT parameter. The e-mail has
a wav file as attachment.
883
Draft CTIAS - CTI Advanced Services Draft
Tip
Interesting chapter: Section 43.4.7, “Voice Mail administration”.
Tip
Configure the smtp resource to let Abilis send e-mails.
Tip
The e-mails sender can be configured by MAIL-FROM parameter of CTISYS resource.
48.2.5. Appendix
48.2.5.1. Meaning of log
A new kind of routing is available (*toA) to manage calls toward Abilis advanced services. Two hidden rules are always
inside the CTIR:
884
Draft CTIAS - CTI Advanced Services Draft
• a rule to encode a call on-the-fly, so that the file is directly saved in WAV format (one DSP per call is used);
• a rule to save the call in its original format (used if there's no free DSP); the file is encoded in the WAV format when a
DSP is free.
Start Debug Log content real-time logging (Type CTRL+C + ENTER to stop):
885
Draft CTIAS - CTI Advanced Services Draft
A user can choose to use system default messages (stored in system folder) or customized messages (stored in USER folder).
Tip
Interesting chapter: Section 43.2.3.2, “CTI preferences”.
886
Draft Draft
Table of Contents
49.1. CTISMS - CTI SMS resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 887
49.1.1. Activating the CTISMS resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 887
49.1.2. CTISMS resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 888
49.2. CTISMS Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 888
49.2.1. CTISMS IN routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 888
49.2.2. CTISMS OUT routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 889
49.3. CTISMS diagnostic and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 890
49.3.1. CTISMS diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 890
49.3.2. CTISMS statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891
If it's used toghether with SMTP resource, it allows to send/receive sms through emails.
Tip
Interesting chapters:
Section 53.18, “How to configure CTISMS to send sms using the web interface”.
The CTISMS resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
You must restart the Abilis to make the resource running (use the command warm start to reboot the
Abilis) after adding or setting the CTISMS active.
COMMAND EXECUTED
887
Draft CTISMS - CTI SMS resource Draft
Caution
Execute the initialization command init res:ctisms to activate the changes made on the upper case
parameters; use save conf and warm start commands to set active the changes made on the lowercase
parameters.
RES:CtiSms --------------------------------------------------------------------
Run DESCR:Short_Message_Service
LOG:NO ACT:YES MAX-SMS-SPLIT:1 ALLOW-UNICODE:NO
DFT-IN:NO
DFT-SMTP:
wdir:C:\APP\SMS\
LOG State changes log and alarm generation [NO, D, S, A, L, T, ALL] [+E] (D: Debug Log; S: System Log; A: Alarm
view; L: Local audible alarm; T: SNMP traps; +E: Extended Log of state changes, see ref. manual) ACT: Operation
activation [NO, YES].
DFT-IN Default route for incoming SMS [NO: No default route, message deleted , SMTP: Message routed to
SMTP].
DFT-SMTP SMTP recipient()s for default route. From 0 up to 128 ASCII printable characters. Spaces are not
allowed. Case is preserved.
wdir Working directory. It cannot be empty. Physical full path in DOS notation, i.e. starting with a drive
letter in the range ['A'..'Z'] and ending with the '\' character. Max. 128 characters. Case is preserved.
Spaces are allowed. Strings holding spaces must be written between quotation marks (E.g.: "C:\My dir
\").
The following command allows the administrator to change the configuration of the resource:
s p ctisms parameter:value...
Caution
Execute the initialization command init res:ctisms to activate the changes made on the upper case
parameters; use save conf and warm start commands to set active the changes made on the lowercase
parameters.
888
Draft CTISMS - CTI SMS resource Draft
----+-------+------------------------+---------+----------+--------------------
PR: |ACT: |CG: |DEST: |LIFETIME: |HEADER:
|RULE: |TEXT:
----+-------+------------------------+---------+----------+--------------------
0 NO * SMTP 21600 REMOVE
MAIL
-------------------------------------------------------------------------------
CG Allowed calling numbers/prefixes. From 1 up to 20 characters, in the range ['0'..'9', '*'] or "#" optionally
preceded by TON [u, i, n, o, s, h, c] and/or NP [x, e, d, t, l, p] and/or PI [a, r, m, q] and/or SI [y, v, w, z]
attributes or the name of an IN/IN2T/INR/RU/MR list between primes. The '*' is allowed only alone or as the
last character. (E.g. # or ne# or 1234567 or 4567* or * or 'my_list').
DEST Destination application [SMTP].At this time only SMTP is available for incoming messages.
HEADER Treatment of the message part used for routing [REMOVE, KEEP]. The initial part of the message used for
routing can be removed or kept prior to pass the message to the application. Typically it will be necessary to
remove it.
RULE Message verification rule [MAIL: message is checked according to MAIL rule, PREFIX: message is checked
according to PREFIX rule].
TEXT First part of the message for matching PREFIX rule. From 0 up to 20 ASCII characters. Case is preserved.
Spaces are allowed. Strings holding spaces must be written between quotation marks (E.g.: "my text"). <Only
for RULE:PREFIX>.
Note
When a sms is received, an email is sent to the configured recipient. The mail subject contains the
information of the port on which the message has been received.
Tip
Interesting chapters:
Section 53.18, “How to configure CTISMS to send sms using the web interface”.
----+-------+-------------------------+-----+---------+-------+-------+--------
PR: |ACT: |CD: |POO: |LIFETIME:|DELAY: |SPLIT: |UNICODE:
|SOURCE:|SENDER-ID:
----+-------+-------------------------+-----+---------+-------+-------+--------
0 NO * 201 1800 300 SYS SYS
SMTP *
889
Draft CTISMS - CTI SMS resource Draft
-------------------------------------------------------------------------------
1 NO * 201 1800 300 SYS SYS
FILE *
-------------------------------------------------------------------------------
CD Allowed called numbers/prefixes. From 1 up to 20 characters, in the range ['0'..'9', '*'] or "#" optionally
preceded by TON [u, i, n, o, s, h, c] and/or NP [x, e, d, t, l, p] attributes or the name of an IN/IN2T/INR/RU/
MR list between primes. The '*' is allowed only alone or as the last character. (E.g. # or ne# or 1234567 or
4567* or * or 'my_list').
LIFETIME Maximal time a message can be kept in the outgoing queue [10..1048576 sec].
SPLIT Maximal number of SMS for a single outgoing message [SYS, 1..4].
SOURCE Source application [SMTP: SMTP application, FILE: FILE to SMS application].
SENDER-ID Textual identifier of the sender. "*" or from 1 up to 64 ASCII charcters or the name of TXT list between
primes. Case is preserved. Spaces are allowed. Strings holding spaces must be written between quotation
marks (E.g.: "my sender id" or * or 'listname').
RES:CtiSms --------------------------------------------------------------------
Short_Message_Service
STATE:ACTIVE
------------------------------------------------------------------------
APP:SMTP APP-STATE:CLOSED
APP:FILE APP-STATE:OPENED
RES:Smtp ----------------------------------------------------------------------
Simple_Mail_Transfer_Protocol
STATE:ACTIVE CUR-SES:10 ACTIVE-IN:0 ACTIVE-OUT:0
MIX-IN:0 MIX-OUT:0 QUEUE-OUT:0 QUEUE-DEFER:0
- Smtp Sessions --------------------------------------------------------
CH TYPE TCP-State LocAdd-LocPort RemAdd-RemPort SMTP-State
------------------------------------------------------------------------
0 OUT READY READY
1 OUT READY READY
2 IN LISTEN 000.000.000.000-25 READY
3 IN LISTEN 000.000.000.000-25 READY
890
Draft CTISMS - CTI SMS resource Draft
d s ctisms Shows the statistics of the SMTP resource, such as the number of incoming messages from application
(SUCC-MSG-APPL in), the number of outgoing messages to application (SUCC-MSG-APPL out), the
number of incoming incorrect messages from application (FAIL-MSG-APPL in), the number of failure
outgoing message to application (FAIL-MSG-APPL out), etc...
RES:CtiSms --------------------------------------------------------------------
Short_Message_Service
--- Cleared 0 days 01:43:44 ago, on 04/02/2011 at 09:09:27 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SUCC-MSG | 0| 0|FAIL-MSG | 0| 0|
------------------------------------------------------------------------
------------------------------------------------------------------------
APP:SMTP
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SUCC-MSG | 0| 0|FAIL-MSG | 0| 0|
------------------------------------------------------------------------
APP:FILE
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
SUCC-MSG | 0| 0|FAIL-MSG | 0| 0|
------------------------------------------------------------------------
891
Draft Draft
Table of Contents
50.1. ACNT resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 892
50.1.1. Activating the ACNT resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 892
50.1.2. ACNT resource parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893
50.2. ACNT diagnostics and statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893
50.2.1. ACNT diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893
50.2.2. ACNT statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 894
50.3. Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 895
The ACNT resource may already exist in the system, but may not yet be active: set it active with the command:
COMMAND EXECUTED
Caution
After adding or setting the ACNT active, you must restart the Abilis to make the resource running (use the
command warm start to reboot the Abilis).
COMMAND EXECUTED
892
Draft ACNT - Accounting resource Draft
- Collector ------------------------------------------------------------
IPADD:# CR:AUTO CRKEY:DFT
- Additional collector(s) ----------------------------------------------
ADD-IPLIST:* ADD-CR:AUTO ADD-CRKEY:DFT
Caution
Execute the initialization command init res:acnt to activate the changes made on the upper case parameters;
changes made on the lowercase parameters require a save conf and an Abilis restart (i.e. with warm start
command).
Set the parameter ACT to YES to allow the connection from the Collector program.
The configuration above allows the connection from at maximum 3 Collector from any IP address; to enable the connection
form specific IP addresses, it is needed to set the IPADD and ADD-IPLIST parameters.
RES:Acnt ----------------------------------------------------------------------
Run DESCR:Accounting_Service
LOG:NO ACT:YES locport:2060 tcpses:3 FILTER:ALL
- Collector ------------------------------------------------------------
IPADD:# CR:AUTO CRKEY:DFT
- Additional collector(s) ----------------------------------------------
ADD-IPLIST:* ADD-CR:AUTO ADD-CRKEY:DFT
FILTER It defines a filter to be applied on the Accounting information to be collected [ALL: any accounting event
is collected; CONNECTED: only information related to successful connections are collected; FAILED: only
information related to failed connections are collected].
IPADD Main collector IP address. If it is set to #, the resource accept connections from any IP address.
The following command allows the administrator to change the configuration of the resource:
s p acnt parameter:value...
Caution
To activate the changes made on the upper case parameters, execute the initialization command init
res:acnt; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are
required (i.e. with warm start command).
893
Draft ACNT - Accounting resource Draft
d d acnt / d de acnt Shows diagnostic information, such as the current state of the connection, the current mode
for exchanging accounting data, whether data exchanged on the current connection are
encrypted, the local IP Address/port and the remote IP address/port of the PC in which is
executed the Collector application.
RES:Acnt ----------------------------------------------------------------------
Accounting_Service
STATE:READY
- Accounting channels --------------------------------------------------
Ch State Mode Crypt LocAdd-LocPort RemAdd-RemPort
------------------------------------------------------------------------
1 CONN-FROM SIMPLE NO 192.168.000.232-2060 192.168.000.024-2384
2 CONN-FROM SIMPLE NO 192.168.000.231-2060 192.168.000.051-2702
3 CONN-FROM SIMPLE NO 192.168.000.232-2060 192.168.000.250-32966
d s acnt Shows statistic information, such as the number of failed/succesfull calls on the connection, the number of
sent/received characters and the number of sent/received messages.
d se acnt Shows statistic information in an extended format: the same information listed for d s acnt command are
shown for each session.
RES:Acnt ----------------------------------------------------------------------
Accounting_Service
--- Cleared 2 days 13:43:44 ago, on 10/12/2007 at 20:30:08 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FAIL-CALL | 0| 0|SUCC-CALL | 4| 0|
CHAR | 40978| 519868|MSG | | 2017|
------------------------------------------------------------------------
RES:Acnt ----------------------------------------------------------------------
Accounting_Service
--- Cleared 2 days 13:43:59 ago, on 10/12/2007 at 20:30:08 -------------
- Accounting channels --------------------------------------------------
Ch State Mode Crypt LocAdd-LocPort RemAdd-RemPort
------------------------------------------------------------------------
1 CONN-FROM SIMPLE NO 192.168.000.232-2060 192.168.000.024-2384
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FAIL-CALL | 0| 0|SUCC-CALL | 2| 0|
CHAR | 232| 4992|MSG | | 21|
------------------------------------------------------------------------
2 CONN-FROM SIMPLE NO 192.168.000.231-2060 192.168.000.051-2702
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FAIL-CALL | 0| 0|SUCC-CALL | 1| 0|
CHAR | 14829| 257436|MSG | | 998|
------------------------------------------------------------------------
3 CONN-FROM SIMPLE NO 192.168.000.232-2060 192.168.000.250-32966
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
FAIL-CALL | 0| 0|SUCC-CALL | 1| 0|
CHAR | 25917| 257440|MSG | | 998|
------------------------------------------------------------------------
894
Draft ACNT - Accounting resource Draft
50.3. Appendix
Figure 50.1. Accounting scheme
• call duration
• called number
• calling number
• reason of failure
• ...
• SIMPLE accounting: events are sent from Abilis CPX to the Collector at the same time they occur. The Collector prints
the event on a window and saves it into the selected file. If the TCP session is not opened the event is lost. SIMPLE
accounting can supply events to more Collectors simultaneously.
• TRANSACTION accounting: events are stored in an internal database which can be either in RAM or on the HD. When
the transaction has to take place, events are transferred to the Collector. It writes them on disk and sends acknowledge for
deletion in Abilis CPX. The transaction procedure ensure that no events are lost (except when the Abilis CPX database
becomes full), and no events are duplicated.
TRANSACTION account can deal with a unique Collector only, the counterpart identity must be checked based on IP
address (first level check), and with an addition message exchange. This is mandatory not only for security, but mainly for
database consistency.
895
Draft Draft
Part V. HowTo
Draft Draft
Table of Contents
51. HowTo - Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 900
51.1. How to enter into the Abilis control-program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 900
51.1.1. How to enter into the Abilis control-program through the TELNET protocol . . . . . . . . . . . . . . . . . . . . . . . 901
51.1.2. How to enter into the Abilis control-program through the serial-asynchronous port of the Abilis
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 901
51.1.3. How to enter into the Abilis control-program through the SSH protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 902
51.1.4. How to enter into the Abilis control-program through an ISDN connection . . . . . . . . . . . . . . . . . . . . . . . . 902
51.2. How to prepare an Abilis Compact-Flash using a PC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 904
51.3. How to use the Console configurator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906
51.3.1. How to create a new configuration file DRIVERS.CFG with the Console configurator . . . . . . . . . . . . . 906
51.3.2. How to modify an existing configuration file DRIVERS.CFG with the Console Configurator. . . . . . 908
51.4. How to remotely upgrade the Abilis firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 908
51.5. How to remotely transfer files using a terminal emulator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910
51.5.1. How to download configuration files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910
51.5.2. How to upload configuration files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911
51.6. How to restart the Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912
51.7. How to upgrade configuration files to newer firmware versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912
51.8. How to copy files using a removable drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 914
51.8.1. How to copy configuration and log files on an USB disk through the command-line interface. . . . . 914
51.8.2. How to copy configuration and log files on an USB disk using the MFIDE front panel . . . . . . . . . . . . 915
51.8.3. How to copy configuration files from an USB disk to the Abilis HD/CF through the command-
line interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 916
51.8.4. How to copy configuration files from an USB disk to the Abilis HD/CF using the MFIDE front
panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 916
51.9. How to know which kind of hardware is mounted on Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917
51.9.1. How to recognize PCI cards model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917
51.10. How to automatically reassign the USBPORTID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 918
51.11. How to manage licences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.12. How to view boot log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.13. How to change the login passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.13.1. How to change the TELNET password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.13.2. How to change the SSH password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.13.3. How to change the users' passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.14. How to activate the Abilis SSH server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 920
51.15. How to open a TELNET connection from Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 920
51.16. How to open a SSH connection from Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 921
51.17. How to create a list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 922
51.17.1. How to create a list of ISDN numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
51.17.2. How to create a list of IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
51.17.3. How to create a list of IP addresses ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
51.18. How to configure Abilis as a SYSLOG client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
51.19. How to trace the internal events for debugging purposes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924
51.19.1. How to convert Abilis CPX traces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 925
52. HowTo - Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929
52.1. How to configure LAN settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930
52.2. How to activate a new ethernet port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930
52.3. How to assign several IP addresses to the same LAN port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931
52.4. How to configure ADSL connections using USB modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931
52.4.1. How to configure a RFC 1483 connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932
52.4.2. How to configure a PPPoA (RFC 2364) connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933
52.4.3. How to configure a PPPoE connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933
52.5. How to configure HDSL/SHDSL connections using V.35/G.703 synchronous ports . . . . . . . . . . . . . . . . . . . . . . . . . 934
52.6. How to configure the default IP route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935
52.6.1. How to configure the default IP route in case Abilis is connected to an ADSL USB or V.35/
G.703 modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935
52.6.2. How to configure the default IP route in case Abilis is connected to an ethernet ADSL router. . . . . . 936
52.6.3. How to configure an alternative default IP route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 936
52.7. How to configure the Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 937
52.8. How to share a single Internet connection among multiple computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 938
897
Draft HowTo Draft
52.9. How to access IP hosts and services which are behind a NAT manager (port forwarding) . . . . . . . . . . . . . . . . . . . 938
52.10. How to setup DDNS service on Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939
52.10.1. How to setup DDNS service using dyndns.org . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939
52.10.2. How to setup DDNS service on Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 948
52.11. How to configure a Remote Access Server (RAS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 949
52.11.1. How to configure a RAS using IPSEC VPN server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 949
52.11.2. How to configure a RAS using IPSEC VPN server with iPHONE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 950
52.11.3. How to configure a RAS using PPPoE connections with an Ethernet/WiFi network . . . . . . . . . . . . . . 952
52.11.4. How to configure a RAS using ISDN network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953
52.12. How to configure an ISDN PPP Dial-UP connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954
52.13. How to configure a VPN tunnel between two Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954
52.13.1. How to configure a VPN tunnel where both Abilis have a static public IP address . . . . . . . . . . . . . . . . 955
52.13.2. How to configure a VPN tunnel where one Abilis has a dynamic public IP address or is placed
behind a router doing NAT/PAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 956
52.13.3. How to configure a VPN tunnel with the “backup over ISDN” option . . . . . . . . . . . . . . . . . . . . . . . . . . . . 957
52.13.4. How to configure a VPN tunnel with the “double path” option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959
52.14. How to configure a voice tunnel between two Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 961
52.14.1. How to configure a voice tunnel where both Abilis have a static public IP address . . . . . . . . . . . . . . . . 962
52.14.2. How to configure a voice tunnel where one Abilis has a dynamic public IP address or is
placed behind a router doing NAT/PAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 963
52.14.3. How to configure a voice tunnel with the “backup over ISDN” option . . . . . . . . . . . . . . . . . . . . . . . . . . . . 964
52.14.4. How to configure a voice tunnel with the “double-path” option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965
52.15. How to activate the DHCP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966
52.15.1. How to activate the DHCP in relay mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967
52.15.2. How to activate the DHCP in server mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 968
52.15.3. How to activate the DHCP in client mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969
52.16. How to activate the FTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 970
52.17. How to activate the HTTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 970
52.17.1. How to activate the HTTP over SSL server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971
52.18. How to activate the TRFA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 972
52.19. How to use state detection of IP interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
52.20. How to activate the SNTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
52.20.1. How to activate the SNTP client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
52.20.2. How to activate the SNTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 974
52.21. How to activate the SNMP agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 974
52.22. How to publish the users on the Abilis LDAP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975
53. HowTo - CTI system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977
53.1. How to configure ISDN ports to connect PBX or ISDN lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977
53.2. How to configure FXS (POTS) ports for analog telephones or fax machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 979
53.3. How to program a group of telephone lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980
53.4. How to configure fax modem relay parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 981
53.5. How to create a VoIP tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982
53.6. How to register an IAX telephone onto Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
53.7. How to register a SIP telephone onto Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
53.7.1. How to register a SIP telephone onto Abilis when the telephone is behind a NAT . . . . . . . . . . . . . . . . . 985
53.8. How to register Abilis as a client of Asterisk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987
53.9. How to register Abilis as a client of a SIP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
53.10. How to configure the speedlimit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
53.11. How to configure opc to collect call information from a remote abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
53.12. How to activate the Accounting service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
53.13. How to enable pickup service for a POTS/ISDN port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 990
53.14. How to enable pickup service for a SIP account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 990
53.15. How to configure CTIDISA to implement a responder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
53.15.1. Implementing a responder using MODE:INTRO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
53.15.2. Implementing a responder using MODE:DISA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
53.15.3. Getting a call on phones while the responder is active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992
53.16. How to configure Last Calling Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993
53.17. How to configure DATA CALL BACK using an UMTS Key, calling an ISDN number . . . . . . . . . . . . . . . . . . . . 994
53.18. How to configure CTISMS to send sms using the web interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
53.19. How to configure CTISMS to send sms via emails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
53.19.1. Instructions to send emails through sms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997
53.19.2. Instructions to send sms through emails using a client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997
898
Draft HowTo Draft
899
Draft Draft
Table of Contents
51.1. How to enter into the Abilis control-program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 900
51.1.1. How to enter into the Abilis control-program through the TELNET protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 901
51.1.2. How to enter into the Abilis control-program through the serial-asynchronous port of the Abilis . . . . . . . . . . 901
51.1.3. How to enter into the Abilis control-program through the SSH protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 902
51.1.4. How to enter into the Abilis control-program through an ISDN connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 902
51.2. How to prepare an Abilis Compact-Flash using a PC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 904
51.3. How to use the Console configurator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906
51.3.1. How to create a new configuration file DRIVERS.CFG with the Console configurator . . . . . . . . . . . . . . . . . . . . 906
51.3.2. How to modify an existing configuration file DRIVERS.CFG with the Console Configurator . . . . . . . . . . . . . 908
51.4. How to remotely upgrade the Abilis firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 908
51.5. How to remotely transfer files using a terminal emulator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910
51.5.1. How to download configuration files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910
51.5.2. How to upload configuration files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911
51.6. How to restart the Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912
51.7. How to upgrade configuration files to newer firmware versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912
51.8. How to copy files using a removable drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 914
51.8.1. How to copy configuration and log files on an USB disk through the command-line interface . . . . . . . . . . . . . 914
51.8.2. How to copy configuration and log files on an USB disk using the MFIDE front panel . . . . . . . . . . . . . . . . . . . . 915
51.8.3. How to copy configuration files from an USB disk to the Abilis HD/CF through the command-line
interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 916
51.8.4. How to copy configuration files from an USB disk to the Abilis HD/CF using the MFIDE front panel . . . . . 916
51.9. How to know which kind of hardware is mounted on Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917
51.9.1. How to recognize PCI cards model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917
51.10. How to automatically reassign the USBPORTID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 918
51.11. How to manage licences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.12. How to view boot log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.13. How to change the login passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.13.1. How to change the TELNET password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.13.2. How to change the SSH password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.13.3. How to change the users' passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919
51.14. How to activate the Abilis SSH server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 920
51.15. How to open a TELNET connection from Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 920
51.16. How to open a SSH connection from Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 921
51.17. How to create a list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 922
51.17.1. How to create a list of ISDN numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
51.17.2. How to create a list of IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
51.17.3. How to create a list of IP addresses ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
51.18. How to configure Abilis as a SYSLOG client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
51.19. How to trace the internal events for debugging purposes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924
51.19.1. How to convert Abilis CPX traces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 925
900
Draft HowTo - Management Draft
• IP Resource: IP-1
• IP Address: 192.168.1.1
1. Connect an ethernet RJ-45 straight cable from the Abilis Eth-1 port to a hub or switch, while making sure that your PC is
also connected to the same hub or switch. It also possible to connect an ethernet RJ-45 cross cable from the Abilis Eth-1
port to your PC.
2. Configure your PC with a free IP address in the 192.168.1.0/24 network (e.g. ip:192.168.1.2, mask:255.255.255.0).
3. Run a TELNET client (e.g. the Windows Command Prompt, Windows HyperTerminal, Zoc, Putty, etc..) and connect to
the Abilis IP address 192.168.1.1: the Abilis Control Port will appear.
In a Windows O.S. the easiest way to reach TELNET is to go to the Start Menu and choose Run; in the box which comes
up, type telnet 192.168.1.1 and press the return key or click the OK button: the Abilis Control Port will appear.
1. Connect an asynchronous RS232/V24 Null-Modem cable (DB9F-DB9F or DB9F-DB25F)1 from the Abilis asynchronous
port (PAD-1) to the serial DB9 or DB25 male connector of your PC.
2. Run a terminal emulator program (e.g. Windows HyperTeminal, Zoc, Putty, etc.) and configure it with the following
characteristics:
901
Draft HowTo - Management Draft
• Data bits: 8
• Parity: 1
3. When the PAD local port prompt appears (CPX/PAD1), type 00-cp: the Abilis Control Port will appear.
51.1.3. How to enter into the Abilis control-program through the SSH
protocol
The Eth-1 port is activated by default with the following configuration:
• IP Resource: IP-1
• IP Address: 192.168.1.1
The SSH server is not activated by default; to activate it, refer to Section 51.14, “How to activate the Abilis SSH server”.
1. Connect an ethernet RJ-45 straight cable from the Abilis Eth-1 port to a hub or switch, while making sure that your PC is
also connected to the same hub or switch. It also possible to connect an ethernet RJ-45 cross cable from the Abilis Eth-1
port to your PC.
2. Configure your PC with a free IP address in the 192.168.1.0/24 network (e.g. ip:192.168.1.2, mask:255.255.255.0).
3. Run a SSH client (e.g. the Zoc, Putty, etc.) and connect to the Abilis IP address 192.168.1.1 using the username “root” (by
default the password is empty): the Abilis Control Port will appear.
Let's see how to configure “Abilis 1” and how to connect to “Abilis 2”.
Physical connections:
• Verify that an ISDN card (QPRIX, PB44X, BRI-HFC4, BRI-HFC8, BRIO) is installed in both Abilis. If the card is not
present, insert it in a free PCI slot.
902
Draft HowTo - Management Draft
Enter into the Abilis-1 control-program (through TELNET, SSH or the serial-asynchronous port) or open the configuration
file with the Console configurator and type the following commands.
On a working Abilis, a system restart is required to make the X25-1 resource running.
After Abilis restart, enter into the Abilis control-program and connect to “Abilis 2” using the following commands.
[12:18:17] ABILIS_1: <--- type the combination Ctrl+P to access to TELNET server prompt o
[192.168.1.1] TELNETS>clr
CLR 00 00
[12:19:05] ABILIS_2:
903
Draft HowTo - Management Draft
[12:19:47] ABILIS_2: <--- type the combination Ctrl+P to access to TELNET server prompt o
[192.168.1.1] TELNETS>clr
CLR 00 00
[12:20:10] ABILIS_1:
Note
Please refer to Section 51.15, “How to open a TELNET connection from Abilis” to know how to access
telnet client of remote abilis when using ISDN.
Extract the archive double-clicking the cpx-X.Y.Z-std-package.exe. The following files will be extracted: bm.RTB,
bootd16.exe, Bootdisk.exe, cpx.pkg, install.bat, pkgmake.exe, version.bat.
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
Warning
Every Abilis is associated with a specific Compact Flash unit: it may occur that the same Compact Flash
unit doesn't work with another Abilis.
If you want to substitute the Compact Flash, please contact Abilis technical support (<[email protected]>)
indicating the CF model and Abilis motherboard model (see the label on the Abilis rear panel near PCI
slots). Antek will provide a new CF compatible with your Abilis motherboard.
2. Insert a Compact Flash and delete all files. It is not recommended to format the CF. If needed, the CF must be formatted
using FAT32 file system.
Tip
It's recommended to use jame’s format tool to format the CF. Follow the steps below:
Every time you need a CF with DOS installed, run the "James' Format Tool" link on your desktop and set
all the program properties as shown in the figure below:
904
Draft HowTo - Management Draft
Parameters are:
• Volume label - a label displayed together with the drive letter; generally left blank;
3. Open the MS-DOS prompt and go into the directory in which you have extracted the “Standard package” archive and type
the command: install <letter_associated_to_CF_reader>:
For example:
905
Draft HowTo - Management Draft
4. Copy the configuration files DRIVERS.CFG and DRIVERS.BCK on the Compact Flash into the <release_number>
directory (e.g. the F:\7-0-3\ directory).
Note
Make sure that the configuration files are compatible with the firmware version.
7. Switch on the Abilis CPX, by pressing the button POWER of the front panel. After the firmware is loaded, both LEDs of
the front panel will light every second; it means the Abilis CPX regularly started.
Go to http://abilis.antek.it/downloads/cpx2k/download.html and click the System and tools link of the firmware Release that
you want to use; in the following page, download the “Console configurator” utility (config.exe).
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
906
Draft HowTo - Management Draft
At the end of the configuration writing, save the changes with the save conf command and close the program with the
close or exit commands or close the window by clicking the Close Button (“X”).
907
Draft HowTo - Management Draft
• Double click the config.exe file: the DRIVERS.CFG file will be loaded.
• Open the MS-DOS prompt, go into the directory that contains the config.exe file and type the command config.
• Open the MS-DOS prompt, go into the directory that contains the config.exe file and type the command config -
p<path> (e.g. config -pc:\Abilis_CPX\7-0-3\).
At the end of the configuration writing, save the changes with the save conf command and close the program with the close
or exit commands or close the window by clicking the Close Button (“X”).
Extract the archive double-clicking the cpx-X.Y.Z-std-package.exe file. The following files will be extracted:
bm.RTB, bootd16.exe, Bootdisk.exe, cpx.pkg, install.bat, pkgmake.exe, version.bat.
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
1. Enter into the Abilis control-program with a Terminal Emulator with file transfer support (e.g. Windows HyperTerminal,
Zoc, ecc...).
908
Draft HowTo - Management Draft
Note
If the package file is already present in the “C:\PKG\” directory, it is possible to install it with the
command: sys update <new_version> (e.g. sys update 7-0-3).
3. Once the new firmware version is installed, it's necessary to copy the configuration file into the version directory. The
procedure varies depending on compatibility of drivers.cfg files.
• If the new version installed is compatible with the current one, type the command: save conf <new_version> (e.g. save
conf 7-0-3).
4. Configure the version that must be loaded at next system startup using the command: sys set boot version
<new_version> (e.g. sys set boot version 7-0-3).
909
Draft HowTo - Management Draft
All files present in the Abilis HD/CF can be downloaded with the file get command or uploaded with the file put command.
• with XMODEM protocol: file get drivers.cfg <version> (e.g.. file get drivers.cfg 7-0-3)
• with ZMODEM protocol: file get z drivers.cfg <version> (e.g.. file get z drivers.cfg 7-0-3)
910
Draft HowTo - Management Draft
• with XMODEM protocol: file put drivers.cfg <version> (e.g.. file put drivers.cfg 7-0-3)
• with ZMODEM protocol: file put z drivers.cfg <version> (e.g.. file put z drivers.cfg 7-0-3)
911
Draft HowTo - Management Draft
• a new resource or device has been set active (e.g. s act res:ssh or s act dev:eth-2);
• s g sysrbtime:<hh:mm> : it executes an automatic restart after <hh> hours and <mm> minutes. (e.g. s g
sysrbtime:01:00).
912
Draft HowTo - Management Draft
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
For example, if you use the “GUI configuration converter”, follow these instructions:
2. Select in the Source file field the file that must be converted and in the Target file field the new file.
913
Draft HowTo - Management Draft
5. Click the OK button to close the window and then the Exit button to close the program.
Tip
Type the command sys disk info to verify that the USB device is correctly mounted.
Drv Disk Label FAT Free space Used space Total space
Interface Sectors per block Cluster size Bootable
-------------------------------------------------------------------------------
C: HD-0 16 105 MB 13 MB 119 MB
IDE-PIO-32 1 2,048 Bytes YES
-------------------------------------------------------------------------------
D: HD-4 UDISK 32 978 MB 4 KB 978 MB
USB 4,096 Bytes YES
-------------------------------------------------------------------------------
Enter into the Abilis control-program and type the following commands.
conf backup or
914
Draft HowTo - Management Draft
51.8.2. How to copy configuration and log files on an USB disk using
the MFIDE front panel
1. Switch on the Abilis and keep pressed the “Up” button during the system start-up. The following messages are displayed:
2. Press “OK” button: the request to insert a floppy disk in the drive will be shown:
3. Press “OK” button. The messages “CONFLOG BACKUP”, “IN PROGRESS...” will be shown and Abilis CPX will
copy current configuration and Log files (DRIVERS.CFG, DRIVERS.BCK, DHCP.BND, CPX.LOG, CPX.DBG and
CPX.XCP) to the floppy disk. During the configuration and Log files copying procedure, a message is shown informing
the User about the file that is going to be copied and about the result of the operation. These messages are of the following
form:
Where:
• FFFFFFF.FFFF is the name of the file that is going to be processed (DRIVERS.CFG, DRIVERS.BCK, DHCP.BND,
CPX.LOG, CPX.DBG and CPX.XCP);
• E-nn signals that an error occurred on the file that is going to be processed, nn is a decimal value.
If the operation is successful, the messages “CONFLOG BACKUP”, “EXECUTED” are shown; otherwise the messages
“CONFLOG BACKUP”, “ENDED WITH ERROR” will be displayed.
4. After the backup phase completion, the next step of the procedure (i.e. configuration files restore phase) is initiated:
Pressing “Left” button it is possible to go to the next step of the procedure (i.e. configuration files restore), while pressing
“Left” button it is possible to end the procedure.
915
Draft HowTo - Management Draft
Press “Up” button to execute the configuration recovery procedure from the beginning once again.
Tip
Type the command sys disk info to verify that the USB device is correctly mounted.
Drv Disk Label FAT Free space Used space Total space
Interface Sectors per block Cluster size Bootable
-------------------------------------------------------------------------------
C: HD-0 16 105 MB 13 MB 119 MB
IDE-PIO-32 1 2,048 Bytes YES
-------------------------------------------------------------------------------
D: HD-4 UDISK 32 978 MB 4 KB 978 MB
USB 4,096 Bytes YES
-------------------------------------------------------------------------------
Enter into the Abilis control-program and type the following commands.
916
Draft HowTo - Management Draft
3. Press “OK” button: the request to insert a floppy disk in the drive will be shown:
4. Press “OK” button. The messages “CONFLOG RESTORE”, “IN PROGRESS...” will be shown and Abilis CPX will copy
configuration files (DRIVERS.CFG and DRIVERS.BCK) from the floppy disk to the HD/CF. During the configuration
and Log files copying procedure, a message is shown informing the user about the file that is going to be copied and about
the result of the operation. These messages are of the following form:
Where:
• FFFFFFF.FFFF is the name of the file that is going to be processed (DRIVERS.CFG and DRIVERS.BCK);
• E-nn signals that an error occurred on the file that is going to be processed, nn is a decimal value.
If the operation is successful, the messages “CONFLOG RESTORE”, “EXECUTED” are shown; otherwise the messages
“CONFLOG RESTORE”, “ENDED WITH ERROR” will be displayed.
After the configuration files restore phase completion, it possible either to make the Abilis CPX system start-up to
proceed; or to make the system to be restarted; or to re-execute the procedure from the beginning.
917
Draft HowTo - Management Draft
The following table shows the field Cardname and the correspondig model.
CardName Model
CTI-HFC-SWIX-4PB BRI-HFC4
CTI-HFC-SWIX-8P BRI-HFC8
CTI-HFC-OKI-4P BRI-HFC4 with H100 bus(old model)
CTI-HFC-OKI-4P BRI-HFC8 with H100 bus(old model)
CTI-HFC-4P BRI-HFC4 without H100 bus(old model)
CTI-HFC-8P BRI-HFC8 without H100 bus(old model)
CTI-POTS POTS card
CTI-VoIP Voip card
Abilis automatically assign an USB port id when a usb device is added and plugged.
...
------------------ Active USB Devices and Physical Resources: -----------------
Device(s) Run Con Physical Resource(s) or CTI Port(s) USBPORTID
-------------------------------------------------------------------------------
ADSLUSB-1 Yes Yes Adsl-1 . . . . . . . . . . . . . . . . 3.0
ADSLUSB-2 No No Adsl-2 . . . . . . . . . . . . . . . . 1.0.0
ADSLUSB-3 Yes Yes Adsl-3 . . . . . . . . . . . . . . . . 1.1
ADSLUSB-4 Yes Yes Adsl-4 . . . . . . . . . . . . . . . . 2.0
CELLBOX-1 201..202 . . . . . . . . . . . . . . .
CELL-1 Yes Yes . . . . . . . . . . . . . . . . . . . 1.0.1.0
CELL-2 Yes Yes . . . . . . . . . . . . . . . . . . . 1.0.1.1
CODEC-1 Yes Yes . . . . . . . . . . . . . . . . . . . 1.0.1.2
SIMEMU-1 Yes Yes . . . . . . . . . . . . . . . . . . . 1.0.1.3
CELLBOX-2 203..204 . . . . . . . . . . . . . . .
CELL-3 Yes Yes . . . . . . . . . . . . . . . . . . . 1.0.3.0
CELL-4 Yes Yes . . . . . . . . . . . . . . . . . . . 1.0.3.1
CODEC-2 Yes Yes . . . . . . . . . . . . . . . . . . . 1.0.3.2
SIMEMU-2 Yes Yes . . . . . . . . . . . . . . . . . . . 1.0.3.3
GPIO-1 Yes Yes Gpio-1 . . . . . . . . . . . . . . . . 4.0
BLUSB-1 Yes No Blusb-1 . . . . . . . . . . . . . . . -
...
The usbportid can't change on-the-fly plugging and unplugging a device on a different port. If connecting a device on a
different port is needed, follow the below steps to reconfigure the USBPORTID parameter:
918
Draft HowTo - Management Draft
Caution
Read carefully the chapter SYS DISPLAY BOOT LOG to have more information about some issues arising
from updating Abilis firmware to version 7.x.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
919
Draft HowTo - Management Draft
or or
On a working Abilis, a system restart is required to make the SSH resource running.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a r pr:1 in:telnet out:telnet cdi:* udi:tln Transfer an incoming TELNET session to an outgoing
TELNET session.
a r pr:2 in:* out:telnet cdi:* udi:tln Transfer any incoming session to an outgoing TELNET
session.
save conf Save the configuration.
To open a TELNET connection from “ABILIS_1” to “ABILIS_2”, type the following commands.
[16:13:17] ABILIS_1: <- type Ctrl+P to access to the TELNET server prompt of “Abilis_1”.
[192.168.1.1] TELNETS>clr
CLR 00 00
Password: *********
COM
[16:14:27] ABILIS_2:
Note
If you are connected to “ABILIS_1” through an ISDN call, if you type the combination Ctrl+P, the
TELNET server prompt of the Abilis that generates the call will be shown.
To access to the TELNET client of “ABILIS_1”, you have to type the 22n-tln command, where n refers to
the X25-n port that you have used for the connection. For example:
[10:39:17] ABILIS_1: <- type Ctrl+P to access to the TELNET server prompt of the Abili
920
Draft HowTo - Management Draft
[192.168.1.1] TELNETS>clr
CLR 00 00
Password: *********
COM
[10:40:59] ABILIS_2:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a r pr:3 in:ssh out:ssh cdi:* udi:ssh Transfer an incoming SSH session to an outgoing SSH
session.
a r pr:4 in:* out:ssh cdi:* udi:ssh Transfer any incoming session to an outgoing SSH session.
save conf Save the configuration.
To open a SSH connection from “ABILIS_1” to “ABILIS_2”, type the following commands.
[10:39:17] ABILIS_1: <- type Ctrl+P to access to the TELNET server prompt of “Abilis_1”.
[192.168.1.1] TELNETS>clr
CLR 00 00
Password: *********
COM
921
Draft HowTo - Management Draft
[10:40:59] ABILIS_2:
Note
If you are connected to “ABILIS_1” through an ISDN call, if you type the combination Ctrl+P, the Telnet
server prompt of the Abilis that generate the call will be shown.
To access to the SSH client of “ABILIS_1”, you have to type the 22n-ssh command, where n refers to the
X25-n port that you have used for the connection. For example:
[10:39:17] ABILIS_1: <- type Ctrl+P to access to the TELNET server prompt of the Abili
[192.168.1.1] TELNETS>clr
CLR 00 00
Password: *********
COM
[10:40:59] ABILIS_2:
• IP: IP addresses
922
Draft HowTo - Management Draft
• RU: Rules
list create tech_support IN Numbers_technical_support Create the list technical_support, with type
IN (Isdn Numbers) and give it the description
Numbers_technical_support.
a list:tech_support 21 24 27 02223344 Insert the numbers in the list.
save conf Save the configuration.
list create NET_site2 IR Network_Site_2 Create the list NET_site2, with type IR (Ip addresses
Range) and give it the description Network_Site_2.
a list:NET_site2 10.0.0.0:10.0.0.255 10.0.2.0:10.0.2.255 Insert in the IP addresses range in the list.
save conf Save the configuration.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
923
Draft HowTo - Management Draft
On a working Abilis, a system restart is required to make the SYSLOG resource running.
Warning
Verify the parameters settings of the internal events trace using the command trace param. If a trace is
runnig the following message is shown:
TRACE RUNNING
The trace continues to be active on ports shown by trace param command and not on those specified by
trace act command.
COMMAND EXECUTED
COMMAND EXECUTED
Configure the trace and follow the steps of the how to:
924
Draft HowTo - Management Draft
COMMAND EXECUTED
Abilis CPX traces are saved in a proprietary format “cpx”. Follow these instructions to convert them in other formats (pcap,
bxa, ...).
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
For example, the “GUI CPX trace converter” (trcmgrw.exe) converts Abilis CPX traces into:
925
Draft HowTo - Management Draft
• “TAB separated”: is a general purpose format usable to import data into OpenOffice or Excel speadsheets.
• I4B: it is a format for ISDN layer 1 representation and it can be loaded by Ethereal/Wireshark.
• VN: Visual Network format; it can be loaded by Ethereal/Wireshark for PPP representation.
For example, if you want to convert the trace in PCAP format, follow these instructions.
1. Double click the trcmgrw.exe file: the following window will appear.
2. In the To PCAP tab, select the in the Source file name field the trace that must be converted and in the Target file name
field the name of the new trace.
926
Draft HowTo - Management Draft
3. Click the OK button: in the next window select the port traced and the format.
927
Draft HowTo - Management Draft
5. Click the OK button to close the window and then the Exit button to close the program.
928
Draft Draft
Table of Contents
52.1. How to configure LAN settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930
52.2. How to activate a new ethernet port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930
52.3. How to assign several IP addresses to the same LAN port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931
52.4. How to configure ADSL connections using USB modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931
52.4.1. How to configure a RFC 1483 connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932
52.4.2. How to configure a PPPoA (RFC 2364) connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933
52.4.3. How to configure a PPPoE connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933
52.5. How to configure HDSL/SHDSL connections using V.35/G.703 synchronous ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 934
52.6. How to configure the default IP route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935
52.6.1. How to configure the default IP route in case Abilis is connected to an ADSL USB or V.35/G.703
modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935
52.6.2. How to configure the default IP route in case Abilis is connected to an ethernet ADSL router . . . . . . . . . . . . . 936
52.6.3. How to configure an alternative default IP route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 936
52.7. How to configure the Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 937
52.8. How to share a single Internet connection among multiple computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 938
52.9. How to access IP hosts and services which are behind a NAT manager (port forwarding) . . . . . . . . . . . . . . . . . . . . . . . . . . . 938
52.10. How to setup DDNS service on Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939
52.10.1. How to setup DDNS service using dyndns.org . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939
52.10.2. How to setup DDNS service on Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 948
52.11. How to configure a Remote Access Server (RAS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 949
52.11.1. How to configure a RAS using IPSEC VPN server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 949
52.11.2. How to configure a RAS using IPSEC VPN server with iPHONE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 950
52.11.3. How to configure a RAS using PPPoE connections with an Ethernet/WiFi network . . . . . . . . . . . . . . . . . . . . . . 952
52.11.4. How to configure a RAS using ISDN network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953
52.12. How to configure an ISDN PPP Dial-UP connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954
52.13. How to configure a VPN tunnel between two Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954
52.13.1. How to configure a VPN tunnel where both Abilis have a static public IP address . . . . . . . . . . . . . . . . . . . . . . . . 955
52.13.2. How to configure a VPN tunnel where one Abilis has a dynamic public IP address or is placed behind
a router doing NAT/PAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 956
52.13.3. How to configure a VPN tunnel with the “backup over ISDN” option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 957
52.13.4. How to configure a VPN tunnel with the “double path” option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959
52.14. How to configure a voice tunnel between two Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 961
52.14.1. How to configure a voice tunnel where both Abilis have a static public IP address . . . . . . . . . . . . . . . . . . . . . . . 962
52.14.2. How to configure a voice tunnel where one Abilis has a dynamic public IP address or is placed
behind a router doing NAT/PAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 963
52.14.3. How to configure a voice tunnel with the “backup over ISDN” option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 964
52.14.4. How to configure a voice tunnel with the “double-path” option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965
52.15. How to activate the DHCP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966
52.15.1. How to activate the DHCP in relay mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967
52.15.2. How to activate the DHCP in server mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 968
52.15.3. How to activate the DHCP in client mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969
52.16. How to activate the FTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 970
52.17. How to activate the HTTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 970
52.17.1. How to activate the HTTP over SSL server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971
52.18. How to activate the TRFA resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 972
52.19. How to use state detection of IP interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
52.20. How to activate the SNTP resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
52.20.1. How to activate the SNTP client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973
52.20.2. How to activate the SNTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 974
929
Draft HowTo - Networking Draft
• IP Resource: IP-1
• IP Address: 192.168.1.1
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
On a working Abilis, you must initialize the IP-1 resource: init res:ip-1.
Caution
If you are connected to Abilis through TELNET or SSH protocol, when you execute the initialization
command, the connection will be lost!
• Verify that a second Eth card is installed in the Abilis. If the card is not present, insert it in a free PCI slot.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
930
Draft HowTo - Networking Draft
On a working Abilis, a system restart is required to make the ETH-2 device and the IP-2 resource running.
Caution
The IP addresses of the ethernet ports must belong to different LANs!
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
On a working Abilis, a system restart is required to make the IP-10 resource running.
Note
If you want to assign an IP address belonging to the same network of the IP-1 resource, you must configure
in the mask parameter the value 255.255.255.255. For example:
931
Draft HowTo - Networking Draft
• Connect the USB cable from the ADSL modem to an Abilis USB port.
• Connect the ADSL modem to the telephone line using a standard RJ-11 cable.
Before proceeding with the configuration, make sure you have the following parameters available from your ISP.
password: provider_pwd
Note
Abilis supports ONLY the Routing mode (not Bridge mode).
or or
On a working Abilis, a system restart is required to make the ADSLUSB-1 device and the IP-3 resource running.
932
Draft HowTo - Networking Draft
Tip
Remember to configure NAT settings.
or or
or or
On a working Abilis, a system restart is required to make the ADSLUSB-1 device and the IP-3 resource running.
Tip
Remember to configure NAT settings.
or or
933
Draft HowTo - Networking Draft
On a working Abilis, a system restart is required to make the ADSLUSB-1 device and the IP-3 resource running.
Tip
Remember to configure NAT settings.
• Verify that an ESB2 card is installed in the Abilis. If the card is not present, insert it in a free PCI slot.
• Connect the ESB2 synchronous port to the DCE modem using the “octopus” cable connector numbered with “0”.
Before proceeding with the configuration, make sure you have the following parameters available from your ISP.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
934
Draft HowTo - Networking Draft
On a working Abilis, a system restart is required to make the ESB-1 device, the FR-1 and IP-4 resources running.
Note
The BC (Committed Burst size) and BE (Excess Burst size) parameters must satisfy the following rules:
• BC = TC*CIR [bit].
• BE = (PCR-MCR)*TC [bit].
Tip
Remember to configure NAT settings.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a ipr net:0.0.0.0/0 ip:3 Add a default route by configuring in the IP parameter the
IP resource associated to the WAN connection.
save conf Save the configuration.
Note
In the Console configurator, you must type the command: a sipr id:0 net:0.0.0.0/0 ip:3
935
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a ipr net:0.0.0.0/0 gw:192.168.2.254 ip:2 Add a default route by configuring in the GW parameter the
IP address of the ADSL router and in the IP parameter the
IP resource connected to the ADSL router.
save conf Save the configuration.
Note
In the Console configurator, you must type the command: a sipr id:0 net:0.0.0.0/0 gw:192.168.2.254 ip:2
In the following scheme, the “Best” route for the network 0.0.0.0/0 is the IP-3 resource. Let's see how to configure the IP-4
resource as the alternative route that will be considered only if the primary one is down; in normal conditions the route
towards IP-4 resource is ignored.
936
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a ipad net:0.0.0.0/0 prot:static distance:180 ip:4 Add an entry in the IPAD table for the network 0.0.0.0/0.
a ipr net:0.0.0.0/0 ip:4 -fd Add an entry in the IPR table for the network 0.0.0.0/0.
save conf Save the configuration.
On a working Abilis, you must refresh the IPAD table: init ipad.
Note
The option -fd has been used because a static routing towards network 0.0.0.0/0 was already present.
Note
In the Console configurator, you must type the command: a sipr id:1 net:0.0.0.0/0 ip:4
or or
s p ip-n nat:vpn or
937
Draft HowTo - Networking Draft
On a working Abilis, a system restart is required to make the NAT resource running.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
On a working Abilis, you must refresh the NAT table: init nat.
938
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
On a working Abilis, you must refresh the NAT table: init nat.
939
Draft HowTo - Networking Draft
If you have already an account on dyndns.com you can skip the following steps and jump to this paragraph [942].
• choose the options desired in the Subscribe to section and enter the numbers of the security image
In the figure below username and password are abilistest. Remember these values because they will be used to configure
Abilis.
940
Draft HowTo - Networking Draft
An email with the following text will be sent to the email address entered above. Click on the link to complete the account
creation process.
941
Draft HowTo - Networking Draft
Now your account is activated. Point your browser to www.dyndns.com, click Sign In and fill username and password
entered above.
942
Draft HowTo - Networking Draft
After logging in, a page with services, billing and account settings is shown. Click Add Host Services in My Services column.
943
Draft HowTo - Networking Draft
The following page is very important because here you can choose the DNS name associated to the dynamic ip entering
hostname and domain. For example if hostname is abilistest and the choosen domain is dyndns.org, the resulting DNS name
is abilistest.dyndns.org.
• Fill the Hostname field and select dyndns.org from the drop-down menu
• enter ip address
944
Draft HowTo - Networking Draft
945
Draft HowTo - Networking Draft
946
Draft HowTo - Networking Draft
Click Activate Services. Now the configuration of the services on dyndns.org is completed.
947
Draft HowTo - Networking Draft
In the next section there are the steps to follow to configure Abilis DDNS service.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
948
Draft HowTo - Networking Draft
On a working Abilis, a system restart is required to make the IP-5 resource running.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
or or
949
Draft HowTo - Networking Draft
On a working Abilis, a system restart is required to make the IPSEC and IKE resources running.
Caution
The IPSEC connection works ONLY if the LAN, where the PC client is connected to, is different from the
LAN of Abilis (e.g. in the previous case if the PC client IP address is belonging to the 192.168.1.0/24 the
IPSEC connection doesn't work!).
Tip
To configure IPSEC clients refer to Chapter 56, IPSEC clients.
950
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
or or
951
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
On a working Abilis, a system restart is required to make the POEAC-1 and IP resources running.
Tip
Remember to configure NAT settings.
952
Draft HowTo - Networking Draft
Tip
To configure PPPoE clients refer to Chapter 57, PPPoE clients.
• Verify that an ISDN card (QPRIX, PB44X, BRI-HFC4, BRI-HFC8, BRIO) is installed in the Abilis. If the card is not
present, insert it in a free PCI slot.
• The remote PC must be connected to an ISDN router or to a TA adapter able to generate ISDN calls.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
Add an “IP over PPP” resource for each client that you want
to enable.
a res:ip-201 subtype:ppp Add an “IP over PPP” resource (e.g. IP-201)
s p ip-201 lowres:ctislink Configure the CtiSlink as the lower resource.
s p ip-201 dial-in:yes dial-out:no Enable the incoming calls and disable the outgoing calls.
s p ip-201 cgi:01765432 Configure the calling number.
s p ip-201 ipadd:192.168.201.1 Configure the server IP address and mask.
s p ip-201 neigh:192.168.201.11 Configure the client IP address.
s p ip-201 username:provider_user Configure the login information.
password:provider_pwd
s p ip-201 tcp-mss-clamp:yes Activate the TCP MSS clamping procedure.
s p ip-201 dns:provide Provide the DNS service to the client.
953
Draft HowTo - Networking Draft
s p ip-201 local:none remote:chap Configure the local and remote authentication protocol.
s p ip-201 descr:user_1 Configure the description of the IP resource.
Repeat the previous commands for each client.
s p iprtr PPP-DNS-PRI:62.94.0.1 PPP-DNS- Configure the DNS servers provided to the remote clients.
SEC:62.94.0.2
save conf Save the configuration.
Tip
Remember to configure NAT settings.
• Verify that an ISDN card (QPRI2, PB44, BRI-HFC4, BRI-HFC8, BRIO) is installed in the Abilis. If the card is not
present, insert it in a free PCI slot.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
Tip
Remember to configure NAT settings.
• one Abilis has a dynamic public IP address or is placed behind a router doing NAT/PAT.
954
Draft HowTo - Networking Draft
• Double-Path.
Refer to Section 52.14, “How to configure a voice tunnel between two Abilis” to configure a tunnel for voice communication
only.
• ABILIS 1:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:ip-5 subtype:aipt Add an “IP over IP (Abilis tunnel)” resource (e.g. IP-5).
s p ip-5 mode:ext Configure the EXTENDED operating mode.
s p ip-5 mask:255.255.255.0 neigh:192.168.2.1 Configure the subnet mask and in the NEIGH parameter the
private IP address of the remote Abilis.
s p ip-5 frag:frf12 fragsize:800 Configure the link fragmentation type and the maximum
size of link frames fragments.
s p ip-5 lcr:data Activate the data encryption.
s p ip-5 locipadd:80.80.80.80 Configure the Local IP address for incoming/outgoing UDP
pakets.
s p ip-5 remipadd:81.81.81.81 remport:2105 Configure the Remote IP address and port for incoming/
outgoing UDP packets.
s p ip-5 descr:VPN_to_Abilis_2 Configure the description of the IP resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the IP-5 resource running.
• ABILIS 2:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:ip-5 subtype:aipt Add an “IP over IP (Abilis tunnel)” resource (e.g. IP-5).
s p ip-5 mode:ext Configure the EXTENDED operating mode.
s p ip-5 mask:255.255.255.0 neigh:192.168.1.1 Configure the subnet mask and in the NEIGH parameter the
private IP address of the remote Abilis.
955
Draft HowTo - Networking Draft
s p ip-5 frag:frf12 fragsize:800 Configure the link fragmentation type and the maximum
size of link frames fragments.
s p ip-5 lcr:data Activate the data encryption.
s p ip-5 locipadd:81.81.81.81 Configure the Local IP address for incoming/outgoing UDP
pakets.
s p ip-5 remipadd:80.80.80.80 remport:2105 Configure the Remote IP address and port for incoming/
outgoing UDP packets.
s p ip-5 descr:VPN_to_Abilis_1 Configure the description of the IP resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the IP-5 resource running.
Tip
Remember to configure NAT settings.
• ABILIS 1:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:ip-5 subtype:aipt Add an “IP over IP (Abilis tunnel)” resource (e.g. IP-5).
s p ip-5 mode:ext-server Configure the EXTENDED-SERVER operating mode.
s p ip-5 mask:255.255.255.0 neigh:192.168.2.1 Configure the subnet mask and in the NEIGH parameter the
private IP address of the remote Abilis.
s p ip-5 frag:frf12 fragsize:800 Configure the link fragmentation type and the maximum
size of link frames fragments.
s p ip-5 lcr:data Activate the data encryption.
956
Draft HowTo - Networking Draft
On a working Abilis, a system restart is required to make the IP-5 resource running.
• ABILIS 2:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:ip-5 subtype:aipt Add an “IP over IP (Abilis tunnel)” resource (e.g. IP-5).
s p ip-5 mode:ext-client Configure the EXTENDED-CLIENT operating mode.
s p ip-5 mask:255.255.255.0 neigh:192.168.1.1 Configure the subnet mask and in the NEIGH parameter the
private IP address of the remote Abilis.
s p ip-5 frag:frf12 fragsize:800 Configure the link fragmentation type and the maximum
size of link frames fragments.
s p ip-5 lcr:data Activate the data encryption.
s p ip-5 locipadd:out-ip id:192.168.2.1 Configure the Local IP address for incoming/outgoing UDP
pakets and the Identification IP address sent by the Client to
the Server.
s p ip-5 remipadd:80.80.80.80 remport:2105 Configure the Remote IP address and port for incoming/
outgoing UDP packets.
s p ip-5 descr:VPN_to_Abilis_1 Configure the description of the IP resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the IP-5 resource running.
Tip
Remember to configure NAT settings.
52.13.3. How to configure a VPN tunnel with the “backup over ISDN”
option
With the “backup over ISDN” option, in case of failure of the permanent VPN connection, the Abilis tunnel is
instantaneously switched onto ISDN backup lines.
957
Draft HowTo - Networking Draft
• ABILIS 1:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:ip-5 subtype:aipt-bck Add an “IP over IP (Abilis tunnel) with Abilis Back-up”
resource (e.g. IP-5).
s p ip-5 mode:ext Configure the EXTENDED operating mode.
s p ip-5 mask:255.255.255.0 neigh:192.168.2.1 Configure the subnet mask and in the NEIGH parameter the
private IP address of the remote Abilis.
s p ip-5 frag:frf12 fragsize:800 Configure the link fragmentation type and the maximum
size of link frames fragments.
s p ip-5 lcr:data Activate the data encryption.
s p ip-5 locipadd:80.80.80.80 Configure the Local IP address for incoming/outgoing UDP
pakets.
s p ip-5 remipadd:81.81.81.81 remport:2105 Configure the Remote IP address and port for incoming/
outgoing UDP packets.
s p ip-5 brty:us bnrty:30 btb:10 Configure the Retry law type, the maximum number of
consecutive calls and the Time base for delay between calls.
s p ip-5 sgi:abilis2-abilis1 sgo:abilis1-abilis2 Configure the input and output calling sub-addresses and
cdo:01765432 the output called number.
s p ip-5 descr:VPN_to_Abilis_2 Configure the description of the IP resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the IP-5 resource running.
• ABILIS 2:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:ip-5 subtype:aipt-bck Add an “IP over IP (Abilis tunnel) with Abilis Back-up”
resource (e.g. IP-5).
958
Draft HowTo - Networking Draft
On a working Abilis, a system restart is required to make the IP-5 resource running.
Tip
Remember to configure NAT settings.
Tip
It is advisable to use ART ONLY with lines with the same speed. In case of lines with different speeds, the
packets are sent with the maximum speed of the slower line.
959
Draft HowTo - Networking Draft
• ABILIS 1:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:ip-5 subtype:aipt Add an “IP over IP (Abilis tunnel)” resource (e.g. IP-5).
s p ip-5 mode:ext Configure the EXTENDED operating mode.
s p ip-5 path:double Activate the Double Path.
s p ip-5 mask:255.255.255.0 neigh:192.168.2.1 Configure the subnet mask and the IP address of the
neighbour router.
s p ip-5 frag:frf12 fragsize:800 Configure the link fragmentation type and the maximum
size of link frames fragments.
s p ip-5 lcr:data Activate the data encryption.
s p ip-5 locipadd:80.80.80.80 locipadd2:90.90.90.90 Configure the first and the second Local IP address for
incoming/outgoing UDP pakets.
s p ip-5 out-ip:auto out-ip2:4 Configure the first and the second Output IP resource.
s p ip-5 remipadd:81.81.81.81 remipadd2:91.91.91.91 Configure the first and the second Remote IP address and
remport:2105 port for incoming/outgoing UDP.
s p ip-5 descr:VPN_to_Abilis_2 Configure the description of the IP resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the IP-5 resource running.
• ABILIS 2:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:ip-5 subtype:aipt Add an “IP over IP (Abilis tunnel)” resource (e.g. IP-5).
s p ip-5 mode:ext Configure the EXTENDED operating mode.
s p ip-5 path:double Activate the Double Path.
s p ip-5 mask:255.255.255.0 neigh:192.168.1.1 Configure the subnet mask and the IP address of the
neighbour router.
960
Draft HowTo - Networking Draft
s p ip-5 frag:frf12 fragsize:800 Configure the link fragmentation type and the maximum
size of link frames fragments.
s p ip-5 lcr:data Activate the data encryption.
s p ip-5 locipadd:81.81.81.81 locipadd2:91.91.91.91 Configure the first and the second Local IP address for
incoming/outgoing UDP pakets.
s p ip-5 out-ip:auto out-ip2:4 Configure the first and the second Output IP resource.
s p ip-5 remipadd:80.80.80.80 remipadd2:90.90.90.90 Configure the first and the second Remote IP address and
remport:2105 port for incoming/outgoing UDP.
s p ip-5 descr:VPN_to_Abilis_1 Configure the description of the IP resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the IP-5 resource running.
Tip
Remember to configure NAT settings.
d se ip-5 path:1 Shows the statistics of the Aipt resource ip-5 about path
number 1 in extended mode.
d se ip-5 path:2 Shows the statistics of the Aipt resource ip-5 about path
number 2 in extended mode.
• one Abilis has a dynamic public IP address or is placed behind a router doing NAT/PAT.
• Double-Path.
To configure a tunnel for data and voice communication, refer to Section 52.13, “How to configure a VPN tunnel between
two Abilis”.
961
Draft HowTo - Networking Draft
• ABILIS 1:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:pv-1 subtype:ip Add a “PV over IP (Abilis tunnel)” resource (e.g. PV-1).
s p pv-1 mode:ext Configure the EXTENDED operating mode.
s p pv-1 locipadd:80.80.80.80 Configure the Local IP address for incoming/outgoing UDP
pakets.
s p pv-1 remipadd:81.81.81.81 remport:3101 Configure the Remote IP address and port for incoming/
outgoing UDP packets.
s p pv-1 descr:PV_to_Abilis_2 Configure the description of the PV resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the PV-1 resource running.
• ABILIS 2:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:pv-1 subtype:ip Add a “PV over IP (Abilis tunnel)” resource (e.g. PV-1).
s p pv-1 mode:ext Configure the EXTENDED operating mode.
s p pv-1 locipadd:81.81.81.81 Configure the Local IP address for incoming/outgoing UDP
pakets.
s p pv-1 remipadd:80.80.80.80 remport:3101 Configure the Remote IP address and port for incoming/
outgoing UDP packets.
s p pv-1 descr:PV_to_Abilis_1 Configure the description of the PV resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the PV-1 resource running.
962
Draft HowTo - Networking Draft
• ABILIS 1:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:pv-1 subtype:ip Add a “PV over IP (Abilis tunnel)” resource (e.g. PV-1).
s p pv-1 mode:ext-server Configure the EXTENDED-SERVER operating mode.
s p pv-1 locipadd:80.80.80.80 Configure the Local IP address for incoming/outgoing UDP
pakets.
s p pv-1 remport:3101 cli-id:192.168.2.1 Configure the Remote port for incoming/outgoing UDP
packets and the Client identification IP address.
s p pv-1 descr:PV_to_Abilis_2 Configure the description of the PV resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the PV-1 resource running.
• ABILIS 2:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:pv-1 subtype:ip Add a “PV over IP (Abilis tunnel)” resource (e.g. PV-1).
s p pv-1 mode:ext-client Configure the EXTENDED-CLIENT operating mode.
s p pv-1 locipadd:out-ip id:192.168.2.1 Configure the Local IP address for incoming/outgoing UDP
pakets and the Identification IP address sent by the Client to
the Server.
s p pv-1 remipadd:80.80.80.80 remport:3101 Configure the Remote IP address and port for incoming/
outgoing UDP packets.
s p pv-1 descr:PV_to_Abilis_1 Configure the description of the PV resource.
963
Draft HowTo - Networking Draft
On a working Abilis, a system restart is required to make the PV-1 resource running.
• ABILIS 1:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:pv-1 subtype:ip-bck Add a “PV over IP (Abilis tunnel) with Abilis Backu-up”
resource (e.g. PV-1).
s p pv-1 mode:ext Configure the EXTENDED operating mode.
s p pv-1 locipadd:80.80.80.80 Configure the Local IP address for incoming/outgoing UDP
pakets.
s p pv-1 remipadd:81.81.81.81 remport:3101 Configure the Remote IP address and port for incoming/
outgoing UDP packets.
s p pv-1 brty:us bnrty:30 btb:10 Configure the Retry law type, the maximum number of
consecutive calls and the Time base for delay between calls.
s p pv-1 sgi:abilis2-abilis1 sgo:abilis1-abilis2 Configure the input and output calling sub-addresses and
cdo:01765432 the output called number.
s p pv-1 descr:PV_to_Abilis_2 Configure the description of the PV resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the PV-1 resource running.
• ABILIS 2:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
964
Draft HowTo - Networking Draft
a res:pv-1 subtype:ip-bck Add a “PV over IP (Abilis tunnel) with Abilis Backu-up”
resource (e.g. PV-1).
s p pv-1 mode:ext Configure the EXTENDED operating mode.
s p pv-1 locipadd:81.81.81.81 Configure the Local IP address for incoming/outgoing UDP
pakets.
s p pv-1 remipadd:80.80.80.80 remport:3101 Configure the Remote IP address and port for incoming/
outgoing UDP packets.
s p pv-1 brty:us bnrty:30 btb:10 Configure the Retry law type, the maximum number of
consecutive calls and the Time base for delay between calls.
s p pv-1 sgi:abilis1-abilis2 sgo:abilis2-abilis1 Configure the input and output calling sub-addresses and
cdo:01234567 the output called number.
s p pv-1 descr:PV_to_Abilis_2 Configure the description of the PV resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the PV-1 resource running.
Tip
It is advisable to use ART ONLY with lines with the same speed. In case of lines with different speeds, the
packets are sent with the maximum speed of the slower line.
• ABILIS 1:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:pv-1 subtype:ip Add a “PV over IP (Abilis tunnel)” resource (e.g. PV-1).
965
Draft HowTo - Networking Draft
On a working Abilis, a system restart is required to make the PV-1 resource running.
• ABILIS 2:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a res:pv-1 subtype:ip Add a “PV over IP (Abilis tunnel)” resource (e.g. PV-1).
s p pv-1 mode:ext Configure the EXTENDED operating mode.
s p pv-1 path:double Activate the Double Path.
s p pv-1 locipadd:81.81.81.81 locipadd2:91.91.91.91 Configure the first and the second Local IP address for
incoming/outgoing UDP pakets.
s p pv-1 out-ip:auto out-ip2:4 Configure the first and the second Output IP resource.
s p pv-1 remipadd:80.80.80.80 remipadd2:90.90.90.90 Configure the first and the second Remote IP address and
remport:3101 port for incoming/outgoing UDP.
s p pv-1 descr:PV_to_Abilis_1 Configure the description of the PV resource.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the PV-1 resource running.
d se pv-1 path:1 Shows the statistics of the Aipt resource ip-5 about path
number 1 in extended mode.
d se pv-1 path:2 Shows the statistics of the Aipt resource ip-5 about path
number 2 in extended mode.
966
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
On a working Abilis, a system restart is required to make the DHCP resource running.
967
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
On a working Abilis, a system restart is required to make the DHCP resource running.
968
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
On a working Abilis, a system restart is required to make the DHCPC resource running.
Tip
Type the command d d ip-2 to verify the acquired ip address (CUR-IPADD parameter).
Note
Using the above configuration, Abilis retrieves ip address, default gateway and dns server through DHCP.
Refer to chapter Section 25.5.3, “Example of configuration” or read the following example to learn how to
retrieve only ip address configuring parameters DHCP-GW, DHCP-GW-AD and DHCP-DNS.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
969
Draft HowTo - Networking Draft
or or
On a working Abilis, a system restart is required to make the DHCPC resource running.
Tip
Type the command d d ip-2 to verify the acquired ip address (CUR-IPADD parameter).
or or
On a working Abilis, a system restart is required to make the FTP resource running.
or or
970
Draft HowTo - Networking Draft
a http rights path:/sys/opc/ user:httpuser Enable the httpuser to access the “Operator Panel
Control” link.
a http rights path:/sys/sms/ user:httpuser Enable the httpuser to access the “SMS Gateway” link.
a http rights path:/sys/cp/ user:httpuser Enable the httpuser to access the “Control Port” link.
a http rights path:/sys/admin/ user:httpuser recur:no Enable the httpuser to access the “Configuration
information” link.
a http rights path:/sys/admin/groups/ user:httpuser Enable the httpuser to access the “Groups
administration” link.
a http rights path:/sys/advuser/ user:httpuser Enable the httpuser to access the “Advanced User
activities” link.
a http rights path:/sys/admin/users/ user:httpuser Enable the httpuser to access the “Users administration”
link.
a http rights path:/sys/admin/lists/ user:httpuser Enable the httpuser to access the “Lists administration”
link.
a http rights path:/sys/admin/disa/ user:httpuser Enable the httpuser to access the “DISA administration”
link.
save conf Save the configuration.
On a working Abilis, a system restart is required to make the HTTP resource running.
or or
On a working Abilis, a system restart is required to make the SSL resource running.
Note
Verify that the SSL protocol is enabled in the Users and HTTP Virtual Paths Access Rights tables.
Parameter: | Value:
---------------+---------------------------------------------------------------
USER: httpuser
ALIAS: httpuser
ID: 4 <Read Only>
PWD: *******
ACT: YES
GROUP:
CTIP: #
CLUS: #
OPC-ROLE: USER
OPC-VIEW: *
971
Draft HowTo - Networking Draft
OPC-MONITOR: NONE
HTTP: YES
HTTP-PROT: PLAIN,SSL
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
ID: PATH:
USER: FILE: DIR: RECUR: PROT:
------------------------------------------------------------------------------
3 /sys/opc/
httpuser r--- l--- YES PLAIN,SSL
-------------------------------------------------------------------------------
...
or or
On a working Abilis, a system restart is required to make the TRFA resource running.
Tip
To enable the “TOP10 IP” feature, you must configure the TRFA-MODE parameter to IP or IP-PROT (e.g.
s p ip-n trfa-mode:ip-prot).
Tip
For the description of the TRFA web pages refer to Section 40.3.3, “Using HTTP for showing TRFA
statistics”.
972
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
On a working Abilis, a system restart is required to make the SNTP resource running.
973
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
On a working Abilis, a system restart is required to make the SNTP resource running.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
On a working Abilis, a system restart is required to make the SNMP resource running.
974
Draft HowTo - Networking Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
On a working Abilis, a system restart is required to let the LDAP resource running if it was not running previously.
Tip
The published users populate the system address book [580], to hide other address books type a ldap rights
id:1 user:test grants:-r and a ldap rights id:2 user:test grants:-r.
975
Draft HowTo - Networking Draft
Tip
For the description of the LDAP web pages refer to Section 41.4.1, “Web Interface”.
976
Draft Draft
Table of Contents
53.1. How to configure ISDN ports to connect PBX or ISDN lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977
53.2. How to configure FXS (POTS) ports for analog telephones or fax machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 979
53.3. How to program a group of telephone lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980
53.4. How to configure fax modem relay parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 981
53.5. How to create a VoIP tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982
53.6. How to register an IAX telephone onto Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
53.7. How to register a SIP telephone onto Abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
53.7.1. How to register a SIP telephone onto Abilis when the telephone is behind a NAT . . . . . . . . . . . . . . . . . . . . . . . . . 985
53.8. How to register Abilis as a client of Asterisk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987
53.9. How to register Abilis as a client of a SIP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
53.10. How to configure the speedlimit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
53.11. How to configure opc to collect call information from a remote abilis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
53.12. How to activate the Accounting service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
53.13. How to enable pickup service for a POTS/ISDN port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 990
53.14. How to enable pickup service for a SIP account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 990
53.15. How to configure CTIDISA to implement a responder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
53.15.1. Implementing a responder using MODE:INTRO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
53.15.2. Implementing a responder using MODE:DISA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
53.15.3. Getting a call on phones while the responder is active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992
53.16. How to configure Last Calling Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993
53.17. How to configure DATA CALL BACK using an UMTS Key, calling an ISDN number . . . . . . . . . . . . . . . . . . . . . . . . . . . 994
53.18. How to configure CTISMS to send sms using the web interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
53.19. How to configure CTISMS to send sms via emails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
53.19.1. Instructions to send emails through sms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997
53.19.2. Instructions to send sms through emails using a client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997
• Verify that an ISDN card (QPRIX, PB44X, BRI-HFC4, BRI-HFC8, BRIO) is installed in the Abilis. If the card is not
present, insert it in a free PCI slot.
• side:NT (it the CTI Port is connected to PBX) or TE (if the CTI Port is connected to ISDN lines);
• line:PP (if the ISDN line is Point-to-Point) or MP (if the ISDN line is Point-to-Multipoint).
Let's see how to configure a BRI card: in the standard configuration, the CTI Ports 31 and 32 are configured towards the
PBX, while the CTI Ports 33 and 34 towards ISDN lines.
977
Draft HowTo - CTI system Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
On a working Abilis, a system restart is required to make the BRI4-1 device and the CTI Ports running.
Tip
To know if the ISDN line is PP or MP, display the statistics of the CTI Ports and verify the DISC parameter.
If the vaule is different from zero, the line is MP.
CTIP:33 ----------------------------------------------------------------------
to_ISDN_line_(MP)
978
Draft HowTo - CTI system Draft
• Verify that a POTS and an ISDN card (QPRIX, PB44X, BRI-HFC4, BRI-HFC8,) is installed in the Abilis. If the cards are
not present, insert them in a free PCI slots and connect them with the H.100 bus.
Warning
The POTS card must be connected to the internal power supplier.
979
Draft HowTo - CTI system Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
On a working Abilis, a system restart is required to make the POTS-1 device and the CTI Ports running.
980
Draft HowTo - CTI system Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a ctig id:1 p1:31 p2:32 descr:to_PBX Add the CTI Group with ID:1 and assign it the CTI Ports 31
and 32.
a ctig id:2 p1:33 p2:34 descr:to_ISDN_lines Add the CTI Group with ID:2 and assign it the CTI Ports 33
and 33.
a ctig id:3 p1:101 p2:103 p4:108 descr:technical_office Add the CTI Group with ID:3 and assign it the CTI Ports
101, 103 and 108.
a ctig id:4 p1:105 p2:106 p4:113 Add the CTI Group with ID:3 and assign it the CTI Ports
descr:administration_office 105, 106 and 113.
save conf Save the configuration.
On a working Abilis, you must initialize the CTI Routings: init ctir.
• Verify that a POTS card is installed in the Abilis. If the card is not present, insert it in a free PCI slot.
Warning
The POTS card must be connected to the internal power supplier.
981
Draft HowTo - CTI system Draft
Refer to chapter Section 53.2, “How to configure FXS (POTS) ports for analog telephones or fax machines” to know more
about the configuration of POTS ports.
Assumptions:
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
s p ctisys fm-relay:no Set the fax modem relay parameter to no for the ctisys
resource
a ctir pr:1 type:ctov sr:clus1 poo:pbx cdi:088888 cdo:35 add a ctir rule to route a call incoming from 088888 toward
fmrly:yes the fax. The parameter fmrly is enabled only for this routing.
save conf save the configuration
On a working Abilis, you must initialize the CTISYS resource: init ctisys.
Tip
Refer to chapter Section 42.12, “FAX Relay with Abilis” to know more about the fm-relay parameter.
• CTICL (CTI CLuster): it identifies a connection, used to transport compressed phone calls, between two Abilis.
Let's see how to create the VoIP tunnel shown in the following scheme.
982
Draft HowTo - CTI system Draft
• ABILIS 1
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a cticl clus:Abilis2 num:05555667701 descr:to_Abilis_2 Add an CTI CLuster and configure the number and the
description.
a ctil id:1 res:pv-1 clus:Abilis2 Add an CTI Link and associate the resource to the cluster.
save conf Save the configuration.
On a working Abilis, you must initialize the CTISYS resource: init ctisys.
• ABILIS 2
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
a cticl clus:Abilis1 num:0222334401 descr:to_Abilis_1 Add an CTI CLuster and configure the number and the
description.
a ctil id:1 res:pv-1 clus:Abilis1 Add an CTI Link and associate the resource to the cluster.
save conf Save the configuration.
On a working Abilis, you must initialize the CTISYS resource: init ctisys.
983
Draft HowTo - CTI system Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
On a working Abilis, a system restart is required to make the CTIIAX resource running.
Note
The previous configuration can be applied also when Asterisk must register itself onto Abilis.
Tip
For the softphones configuration refer to Chapter 58, Softphones.
984
Draft HowTo - CTI system Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
On a working Abilis, a system restart is required to make the CTISIP resource running.
Note
It is possible to specify a FQDN in the DOMAIN parameter of the CTISIP resource. If the SIP user uses a
local domain different from the one set in the CTISIP resource, you need to specify it in the User parameter
SIP-DOMAIN. Usually you need to do it in this way when the Abilis has a public domain and the user need
to access to it via the local area network.
Note
The previous configuration can be applied also when a SIP Proxy must register itself onto Abilis. In this
case the proxy is a “normal” user like a SIP phone but the SIP-TYPE parameter must be set up to LOCAL-
PEER (e.g. s user:sip_proxy sip-type:local-peer).
Tip
For the softphones configuration refer to Chapter 58, Softphones.
985
Draft HowTo - CTI system Draft
or or
On a working Abilis, a system restart is required to make the CTISIP resource running.
Note
Users which are registered onto Abilis and that stays behind the same NAT, i.e. that presents themselves to
the Abilis with the same IP address, can be configured (with SIP-CPO:YES) to exchange RTP directly each
other, without transiting through the Abilis. In such a situation, if either puts on-hold, the other will receive
RTP stream with the hold tone directly from the Abilis.
Note
It is possible to specify a FQDN in the DOMAIN parameter of the CTISIP resource. If the SIP user uses a
local domain different from the one set in the CTISIP resource, you need to specify it in the User parameter
SIP-DOMAIN. Usually you need to do it in this way when the Abilis has a public domain and the user need
to access to it via the local area network.
Note
The previous configuration can be applied also when a SIP Proxy must register itself onto Abilis. In this
case the proxy is a “normal” user like a SIP phone but the SIP-TYPE parameter must be set up to LOCAL-
PEER (e.g. s user:sip_proxy sip-type:local-peer).
Tip
For the softphones configuration refer to Chapter 58, Softphones.
986
Draft HowTo - CTI system Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
or or
On a working Abilis, a system restart is required to make the CTIIAX resource running.
987
Draft HowTo - CTI system Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
or or
On a working Abilis, a system restart is required to make the CTISIP resource running.
988
Draft HowTo - CTI system Draft
The speedlimit can be activated setting the OUTSPL parameter to YES in the IP resources. The maximum speed is set in the
OUTSP parameter. Generally this parameter must be set to a value slightly lower than the maximum speed in upload of the
ADSL/HDSL line (e.g.: if the ADSL line has a maximum speed of 256 Kbit/s the OUTSP parameter must be set to 240).
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
s p ip-3 outspl:yes outsp:240 Activate the Output Speedlimit and configure the speed
limitation value.
s p iprtr acl:ext cos:enabled cosbalance:yes Configure the Access List activation mode to EXT, enable
the Class-Of-Service management and the Class-Of-Service
Balancing.
a ipacl pr:0 type:permit ipcos:high tos-in:*-d prot:udp Add the standard IPACL that assigns high priority to voice
sip:int sa:* da:* spo:* dpo:* packets.
save conf Save the configuration.
On a working Abilis, you must initialize the IP-3 (init res:ip-3) and the IPRTR resources (init res:iprtr). The changes on
IPACL table are immediately active.
• the OPC resource is already active on both local and remote abilis
• the user of the remote abilis can access the remote OPC (in the example login:admin, password: admin)
Enter into the local Abilis control-program or open the configuration file with the Console configurator and type the
following commands.
On a working Abilis, you must initialize the OPC resource: init res:opc.
989
Draft HowTo - CTI system Draft
or or
On a working Abilis, a system restart is required to make the ACNT resource running.
Tip
For the installation and configuration of the CPX Accounting software refer to Section 55.1, “CPX
accounting software”.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
Tip
The parameter ss-pickup can be set to: NO to disable pickup, ANY to pickup any call or GROUP to pickup
only calls belonging to its own group (the parameter PICKUP of the group must be equal to YES).
Tip
Refer to chapter Section 53.3, “How to program a group of telephone lines” to know how to configure a
group of phones.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
Tip
The parameter ss-pickup can be set to: NO to disable pickup, ANY to pickup any call.
990
Draft HowTo - CTI system Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
a ctir pr:1 type:vtod poi:g2 cdi:09999? cdo:20 ti1:sa Add a cti rule to route a call incoming from an ISDN line to
+su,00:00-23:59 disa only on Saturday and Sunday
init ctir Initialize ctir resource
save conf Save the configuration
Caution
Phone calls incoming on ISDN lines don't reach any phone on Saturday and Sunday.
Warning
MODE:INTRO may not work! It depends on your operator.
991
Draft HowTo - CTI system Draft
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
a ctir pr:1 type:vtod poi:g2 cdi:09999? cdo:20 ti1:sa Add a cti rule to route a call incoming from an ISDN line to
+su,00:00-23:59 disa only on Saturday and Sunday
init ctir Initialize ctir resource
save conf Save the configuration
Caution
Phone calls incoming on ISDN lines don't reach any phone on Saturday and Sunday.
Note
A possible optimization is to set the service parameter DIAL-TOUT=CONN-DELAY+Duration of sound
message.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
992
Draft HowTo - CTI system Draft
or or
a ctir pr:1 type:vtod poi:g2 cdi:09999? cdo:20 ti1:sa Add a cti rule to route a call incoming from an ISDN line to
+su,00:00-23:59 disa only on Saturday and Sunday
a ctir pr:2 type:dtov poo:pbx cdi:500 Add a cti rule to route a call from disa to a pots phone whose
number is 500
init ctir Initialize ctir resource
save conf Save the configuration
Caution
Phone calls incoming on ISDN lines don't reach any phone on Saturday and Sunday.
Note
A possible optimization is to set the service parameter DIAL-TOUT=CONN-DELAY+Duration of sound
message.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
993
Draft HowTo - CTI system Draft
On a working Abilis, the initialization of the CTISYS resource is needed (init ctisys).
Remember to set the LCS parameter to YES in the VTOC routing (the one which routes calls from UMTSBOX toward
internal cluster).
Tip
Check the lcs table to verify the association between calling and called number.
or or
994
Draft HowTo - CTI system Draft
a ctir pr:1 descr:umts-data type:data cdi:* poi:ctislink Add a rule to route data to ctip 201.
poo:201
a ctir pr:2 descr:DISA_data_cb type:vtod cdi:999901 Add a rule to route a call incoming from an ISDN line to
cgi:393331234567 cdo:888 sp:64000 coders:g.711 DISA,
Note
The result is that calling the isdn number 999901 from the number 3331234567, the call is rejected and
an internet connection is established using the UMTS Key. The key acquires a dynamic IP address so the
configuration of Dynamic DNS is needed to reach Abilis. Besides, a correct configuration of NAT resource
may be necessary for example to reach a server located behind Abilis or to enable navigation toward internet
from LAN.
or or
995
Draft HowTo - CTI system Draft
The configuration of CTISMS includes a correct configuration of SMTP and DNS resources.
Enter into the Abilis control-program or open the configuration file with the Console configurator and type the following
commands.
or or
or or
996
Draft HowTo - CTI system Draft
or or
997
Draft HowTo - CTI system Draft
b. Click Add/Mail.
998
Draft HowTo - CTI system Draft
999
Draft HowTo - CTI system Draft
1000
Draft HowTo - CTI system Draft
Example: [email protected]
1001
Draft Draft
Table of Contents
54.1. ISDN lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1003
54.1.1. How can I verify if an ISDN line is active? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1003
54.1.2. Back up over ISDN doesn't work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1004
54.1.3. How can I manage the backup over ISDN autoconnection? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1004
54.1.4. Is it possible to connect ISDN phones to BRI/BRI-HFC cards? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1004
54.1.5. Why (and how to) enable/disable analog ports on a NT1 Plus device? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1004
54.2. POTS ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1005
54.2.1. The connection to a PBX using pots ports doesn't work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1005
54.3. ADSL/HDSL lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1006
54.3.1. How can I verify if an ADSL line is active? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1006
54.3.2. How can I verify if a HDSL line is active? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1006
54.3.3. Why the xDSL line is slow? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007
54.3.4. Why can't I reach any website? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008
54.4. CTI system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008
54.4.1. How can I manage alternative CTI routings? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008
54.4.2. How does Round Robin scanning method work in CTI Port Group? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009
54.4.3. How can I change the POTS number length? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1010
54.4.4. How can I activate the Caller Identification Presentation (CLIP) on POTS ports? . . . . . . . . . . . . . . . . . . . . . . . . 1010
54.4.5. How can I manage the Calling Line Identification (CLI) for outcoming calls? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1010
54.4.6. Why during a call do I hear a fax handshaking? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1011
54.4.7. How can I view the maximum number of simultaneous calls supported by Abilis? . . . . . . . . . . . . . . . . . . . . . . . 1011
54.4.8. How can I view the available coders supported by the cards installed in Abilis? . . . . . . . . . . . . . . . . . . . . . . . . . . 1012
54.4.9. How can I change the volume of a compressed call? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1012
54.4.10. How many VoIP channels are used, depending on the call's source and destination? . . . . . . . . . . . . . . . . . . . . 1013
54.4.11. What happens if a call fails with the “CAUSE:FF B4 (CPX,Loop)”? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1013
54.4.12. How can i configure sip multialerting? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014
54.5. IP router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014
54.5.1. How can I query the IP routing table? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014
54.5.2. How does ACLBYPASS parameter work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015
54.5.3. How can I view the Abilis ARP table? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015
54.5.4. How can I filter the NAT sessions? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1016
54.6. Abilis system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1018
54.6.1. How can I view the current RAM usage? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1018
54.6.2. How can I view the current HD/CF space occupation? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1019
54.6.3. How can I view the current CPU load? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1020
54.6.4. How can I view if the BRI card has the H.100 bus? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1020
54.6.5. Is it possible to extract clock synchronization from BRIO cards? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1020
54.6.6. How can I view if the Abilis USB ports are enabled? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1020
54.6.7. Why do I get the error “RESOURCE NOT PRESENT OR NOT RUNNING” when I initialize a
resource? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021
54.6.8. How can I change the Abilis prompt name? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021
54.7. Tunnelling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021
54.7.1. How can i have information about the use of ISDN backup? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021
54.8. IPSEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1022
54.8.1. Why the outgoing traffic from CPX toward an IPSEC vpn is blocked after updating from 6.5.x to
7.0.x? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1022
1002
Draft FAQ - Frequently Asked Questions Draft
Type the command d d ctip:xx (where xx refers to the port that you want to check) and verify if the physical and logical
layer are active:
For example:
CTIP:3 ----------------------------------------------------------------------
OPSTATE:UP STATE:UP
------------------------------------------------------------------------
CH: STATE: [Q932-STATE:] CG: [SCG:] CD: [SCD:]
------------------------------------------------------------------------
1 10-CONNECTED-TO 039997335 3419985005
- Sapi ------- TEI -- STATE --------------------------------------------
16 (X.25 ) 10 00-INACTIVE
0 (Q.931) 0 07-CONNECTED
------------------------------------------------------------------------
ISDN-STATE:PRI-UP LINE-DOWN:27 SLIPS:8
RxAlarms:NONE TxAlarms:NONE
• In ISDN MP lines the physical layer is active ONLY when there is a current call; so if the physical layer is not active, you
cannot verify if the line is correctly working.
Type the command d d ctip:xx (where xx refers to the port that you want to check) and verify if the physical and logical
layer are active:
For example:
CTIP:33 ----------------------------------------------------------------------
OPSTATE:UP STATE:UP
------------------------------------------------------------------------
CH: STATE: [Q932-STATE:] CG: [SCG:] CD: [SCD:]
1003
Draft FAQ - Frequently Asked Questions Draft
------------------------------------------------------------------------
2 10-CONNECTED-FROM 3401233729 172695572
- Sapi ------- TEI -- STATE --------------------------------------------
16 (X.25 ) 10 00-INACTIVE
0 (Q.931) 64 07-CONNECTED
------------------------------------------------------------------------
ISDN-STATE:F7-READY LINE-DOWN:27 SLIPS:8
You must verify that there are no resources (X25, IP-BCK, AIPT-BCK,…) with SGI:* and eventually, to insert the correct
value or SGI:disabled.
Tip
From 6.1 Release, with the d d ctislink command, it is possible to display the resources (with their SGI
value) ready to receive a connection over B-channel. For example:
RES:CtiSLink ------------------------------------------------------------------
HDLC_Over_ISDN_B-Channel
MaxConn:9 CurrConn:0
- Sessions -------------------------------------------------------------
SES: STATE: CG: [SCG:] CD: [SCD:] RES:
------------------------------------------------------------------------
- LISTEN X25-999
CPISDN
- LISTEN Pv-1
ABILIS1-ABILIS2
- LISTEN Pv-3
ABILIS1-ABILIS3
2 CONN -TO 0211223344 Ip-10
ABILIS1-ABILIS5
With the DDT and VDT parameters it is possible to configure the Data and Voice Disconnect Time-out for every resource
over B channel and every resource with backup. With the value NOMAX it is possible to disable the inactivity timers.
54.1.5. Why (and how to) enable/disable analog ports on a NT1 Plus
device?
If Abilis is connected to a NT1 Plus device, it is recommended to disable the analog ports.
Consider the following scheme: when all VoIP channels are busy, a new incoming call is refused by the CTIP:33 and the NT
device forwards the call to the analog ports; in this way the call doesn't reach the BUSY state but the ALERTING state.
1004
Draft FAQ - Frequently Asked Questions Draft
2. Temporarily disconnect from the NT device the cable(s) coming from Abilis.
3. Connect an analog BCA telephone with DTMF to the analogic port a1/b1 (RJ11).
2. Temporarily disconnect from the NT device the cable(s) coming from Abilis.
3. Connect an analog BCA telephone with DTMF to analogic connector a1/b1 (RJ11).
1005
Draft FAQ - Frequently Asked Questions Draft
Warning
“ADSL” LED is green and continuous even if the logical layer is down.
Warning
When “USB” LED is red, the USB connection is not active!
• there is traffic on the line: Trh-OUT and Trh-IN columns with values different from zero and increasing over time.
For example:
RES:Adsl-1 --------------------------------------------------------------------
MODEM:CONNECTED MAC:00-30-0A-4B-BF-C1
ADSL-STATE:UP ADSL-FAILURE:NONE ADSL-TYPE:Annex-A
ADSL-TX-SPEED:320000 ADSL-RX-SPEED:1504000
ADSL-TX-SN-MARGIN:31 ADSL-RX-SN-MARGIN:31
ADSL-TX-ATTENUATION:15 ADSL-RX-ATTENUATION:10
- ATM level virtual channel diagnostics --------------------------------
VPI VCI State Bw-Out Bw-In 5sec-Thr-Out 5sec-Thr-In
5min-Thr-Out 5min-Thr-In
------------------------------------------------------------------------
8 35 UP 289811 1362113 2488 3328
4904 6544
------------------------------------------------------------------------
Note
Statistics are shown only if a Starmodem is used
It is possible to restart USB modem, using the command debug res:adsl-1 lsn:255. By typing the command debug
res:adsl-1 lsn:0, it is possible to display all available debug commands.
RES:Adsl-1 --------------------------------------------------------------------
BufferLength:57 Date/Time:23/11/2007 12:37:50 TraceTime:<NotRunning>
1006
Draft FAQ - Frequently Asked Questions Draft
• there is traffic on the line: Trh-OUT and Trh-IN columns with values different from zero and increasing over time.
For example:
1. Verify that the ERRORS parameter in the ADSL resource is not increasing over time.
RES:Adsl-2 --------------------------------------------------------------------
--- Cleared 9 days 20:13:02 ago, on 17/12/2007 at 21:03:54 -------------
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
ADSL-DOWN | 0| |MODEM-DISC | 0| |
ADSL-UP | 1| |MODEM-CONN | 1| |
AUTORST-A | 0| |AUTORST-U | 0| |
MANUALRST | 0| |MISALIGNED | 0| |
ATM-VC-UNK | 0| |ATM-VC-UNK | 0| |
------------------------------------------------------------------------
VPI:8 VCI:35
-----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---|
CELLS | 55127478| 24499227|AAL5-SDU | 4030698| 3521937|
AAL5-CHAR | 2505678980| 1055083922|ERRORS | 8243| 0|
------------------------------------------------------------------------
RES:Adsl-1 --------------------------------------------------------------------
MODEM:CONNECTED MAC:00-30-0A-4B-BF-C1
ADSL-STATE:UP ADSL-FAILURE:NONE ADSL-TYPE:Annex-A
ADSL-TX-SPEED:320000 ADSL-RX-SPEED:1504000
ADSL-TX-SN-MARGIN:31 ADSL-RX-SN-MARGIN:31
ADSL-TX-ATTENUATION:15 ADSL-RX-ATTENUATION:10
- ATM level virtual channel diagnostics --------------------------------
VPI VCI State Bw-Out Bw-In 5sec-Thr-Out 5sec-Thr-In
5min-Thr-Out 5min-Thr-In
------------------------------------------------------------------------
8 35 UP 289811 1362113 519347 3328
518161 6544
------------------------------------------------------------------------
If the input and/or output throughput has a value near to the maximum Bandwidth available, the line is saturated.
1007
Draft FAQ - Frequently Asked Questions Draft
Note
Statistics are shown only if a Starmodem is used
3. With the d nat maps command it is possible to display the IP addresses and ports of the current NAT sessions.
In this case there is a FTP session that could use a lot of bandwidth.
Tip
For release preceding 7.x one, use debug res:nat lsn:1.
RES:Nat -----------------------------------------------------------------------
Network_Address_Translator
STATE:READY
-----------|--- CUR ---|-- PEAK ---|--- MAX ---|
LINKS | 998| 1000| 1000|
------------------------------------------------
If the value of CUR (current) parameter is near to the value of MAX parameter, probably some sessions could be discarded.
Tip
Remember to check also the IPACL table.
When the parameter LAST is set to BUSY or NOANS or OTHER the routings can match only if the last failure reason matches
the one specified in LAST.
Note that:
• routing with LAST <> ANY can match only if a previous routing failed; they will never match as first routing;
• when a routing with LAST <> ANY fails, the original failure reason is not updated.
1008
Draft FAQ - Frequently Asked Questions Draft
For example:
--+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
0 CtoV # PBX ?? *
TRANSFERT ANY NO Dft * *
-------------------------------------------------------------------------------
1 CtoV # PBX ?? 22
TRANSFERT BUSY NO Dft * *
-------------------------------------------------------------------------------
2 CtoV # PBX ?? 01
TRANSFERT NOANS NO Dft * *
-------------------------------------------------------------------------------
3 CtoD # CtiDisa ?? 99
NO OTHER NO Dft * *
-------------------------------------------------------------------------------
• If PR:0 fails with BUSY reason PR:1 is executed, e.g. call sent to a colleague.
• If PR:0 fails with NOANS reason PR:2 is executed, e.g. call sent to PBX main operator.
• If PR:0 fails with OTHER reasons (other than BUSY and NOANS) PR:3 is executed, e.g. call sent to a DISA group that
plays a message telling that call could not be delivered.
54.4.2. How does Round Robin scanning method work in CTI Port
Group?
If in a CTI group the S parameter is set to R, the incoming calls are directed towards the CTI ports in a circular manner; e.g.
the first call is forwarded to the port set in P1 parameter, the second call is forwarded to the port set in P2 parameter, etc...
If a port is busy or not responding, the call is forwarded to next port if the R parameter is set to UN (unconditional). In case of
“no answer” the call is forwarded to the next port after the time interval set in the T301 parameter; in case of “busy” the call
is immediately forwarded to the next port.
For example:
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
|FMRLY|FAXSP|MODSP|FMLVL|ECM |UDT |IG |OG |SG |DL |DH
|CODERS
|CODERSOUT
|TI1 .. TI5
-------------------------------------------------------------------------------
1009
Draft FAQ - Frequently Asked Questions Draft
28 CtoV * G1 'technicians' *
TRANSFERT ANY NO 15 * *
6400 Sys Sys Sys Sys Sys * *
-------------------------------------------------------------------------------
--------------------------------------+--------------------+-------------------
[DESCR:]
ID: PICKUP: SCAN: RULE: |P1 P2 P3 P4 P5 |P6 P7 P8 P9 ...
|... P62 P63 P64
--------------------------------------+--------------------+-------------------
1 YES M UN |104 110 108 . . |. . . . .
--------------------------------------+--------------------+-------------------
Note
If the T301 parameter is set to the default value (180 sec.), the call is not forwarded to the next port.
Tip
Refer to this paragraph [648] to know more about CLIP parameter.
54.4.5. How can I manage the Calling Line Identification (CLI) for
outcoming calls?
Calling Line Identification can be statically managed in the CGO parameter in CTI Routings:
• CGO:# : Set an empty information element. An empty information element in most cases is removed.
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
EDT|SP |SC |DJ |MJ |FMDJ|FMMJ|SDI |SDO
|SPOUT|SCOUT|DJOUT|MJOUT|LCS |LCST|SGI |SGO
| |RGI |RGO
1010
Draft FAQ - Frequently Asked Questions Draft
In alternative, if the call is incoming from a POTS port which is configured with SS:YES and SS-PRES-CG:YES, it is
possible to force CLIR/CLIP typing the following codes:
CTIP:106 DESCR:
Act card:POTS-1<6>
OPSTATE:UP LOG:NO TYPE:USER
signalling:POTS HOLD:YES CT:ICT SS:YES
mode:Pots NUM:06
LOOP:NO TEST:NO
CLIP:SYS CLIP-STD:SYS CLIP-TAS:SYS MIN-FLASH:SYS
SENSING:SYS ABF:SYS HPF:SYS DEBOUNCE:SYS MAX-FLASH:SYS
COUNTRY:SYS IN-GAIN-ADJ:SYS OUT-GAIN-ADJ:SYS
AT:SYS AT-CODE:SYS AT-DURATION:SYS BC:SYS
DT:SYS DT-CODE:SYS DT-DURATION:SYS OUT-DIAL-TONE:SYS
SS-PICKUP:GROUP SS-PRES-CG:YES NP-CT:SYS
SS-CF-DND:YES
Caution
In this case the CGO parameter in the CTIR routing must not be set to #.
• disable the fax relay feature (FM-RELAY:NO in the setting of CTISYS resource, or FMRLY:NO in the specific CTIR
routings).
Tip
Refer to chapter Section 42.12.3.5, “Fm-relay parameter”.
-------------------------------------------------------------------------------
1011
Draft FAQ - Frequently Asked Questions Draft
54.4.8. How can I view the available coders supported by the cards
installed in Abilis?
To view the available coders supported by CTI cards installed in Abilis type the command: d d ctisys.
RES:CtiSys --------------------------------------------------------------------
CTI_System_general_properties
CTIR-STATE:ENABLED CALLS-CURRENT:0 CALLS-PEAK:0
AC-STATE:ENABLED AC-CURRENT:0 AC-PEAK:0
------------------------------------------------------------------------
-- Number of simultaneous calls ----------------------------------------
| State: Alerting/Connected | State: Any |
---------------|---Current---|----Peak-----|---Current---|----Peak-----|
TR | 0 | 0 | 0 | 0 |
DATA | 0 | 0 | 0 | 0 |
VtoCHISD | 0 | 0 | 0 | 0 |
CHISDtoCHISD | 0 | 0 | 0 | 0 |
CHISDtoV | 0 | 0 | 0 | 0 |
ALL | 0 | 0 | 0 | 0 |
------------------------------------------------------------------------
- Available coders -----------------------------------------------------
-- Coder ---|-- Bit rates (kbps) --|-- Coder ---|-- Bit rates (kbps) --|
G.711A |64 |G.711u |64 |
G.726 |16, 24, 32, 40 |G.729A |8 |
TRANSPARENT |64 |Spirit |6.4, 7.2, 8, 8.8, 9.6 |
G.727 |16/16, 24/16, 24/24, |
|32/16, 32/24, 32/32, |
|40/16, 40/24, 40/32 |
------------------------------------------------------------------------
- Clock Sources for H100 cards -----------------------------------------
CLK:34
- Clock Sources for NOT-H100 cards -------------------------------------
*** No NOT-H100 cards running ***
s p ctisys out-gain:+3 Change the output gain in the range [MUTE, -31..+31 dB].
save conf Save the configuration.
init ctisys Initialize the CTISYS resource.
For the phones connected to POTS cards it is possible to modify the OG parameter in the specific CTI Routing. For example:
s ctir pr:5 og:+5 Change the output gain in the range [SYS, MUTE, -31..+31
dB].
save conf Save the configuration.
1012
Draft FAQ - Frequently Asked Questions Draft
54.4.10. How many VoIP channels are used, depending on the call's
source and destination?
Codec used by the call Abilis routes VoIP channels occupied Bandwidth occupied by
coming from VoIP the call toward each channel (Kbit/s)
telephones in the LAN
SIP Codec G.711 Telecom ISDN network 1 64
SIP Codec G.729 Telecom ISDN network 1 64
SIP Codec G.711 Abilis over ISDN network 2 9
SIP Codec G.729 Abilis over ISDN network 2 9
SIP Codec G.711 VoIP provider with G.729 2 32
SIP Codec G.729 VoIP provider with Abilis 2 30 the first call, 9 the others
Codec calls
SIP Codec G.711 VoIP provider with G.729 0 32
SIP Codec G.729 VoIP provider with Abilis 2 30 the first call, 9 the others
Codec calls
SIP Codec G.711 Abilis GSM Box 0 1 GSM channel
SIP Codec G.729 Abilis GSM Box 1 1 GSM channel
IAX2 Codec G.711 Telecom ISDN network 1 64
IAX2 Codec G.729 Telecom ISDN network 1 64
IAX2 Codec G.711 Abilis over ISDN network 2 9
IAX2 Codec G.729 Abilis over ISDN network 2 9
IAX2 Codec G.711 VoIP provider with G.729 2 32
IAX2 Codec G.729 VoIP provider with Abilis 2 30 the first call, 9 the others
Codec calls
IAX2 Codec G.711 VoIP provider with G.729 0 32
IAX2 Codec G.729 VoIP provider with Abilis 2 30 the first call, 9 the others
Codec calls
IAX2 Codec G.711 Abilis GSM Box 0 1 GSM channel
IAX2 Codec G.729 Abilis GSM Box 1 1 GSM channel
Note
1 DSP manages 4 channels.
To enable the loop, you must add a CTI Routing with POI:<port_number> and POO:<port_number> (e.g. POI:32,
POO:32) before the CTI Routing with POI:*.
---+-----+-----------------+---------+--------------------+--------------------
PR |[DESCR]
|TYPE |POI/SR [SR] |POO/DS |CDI |CDO
ACT|NEXT |LAST |EEC |T301|CGI |CGO
1013
Draft FAQ - Frequently Asked Questions Draft
54.5. IP router
54.5.1. How can I query the IP routing table?
To understand what is the outgoing IP port of a packet, according to a specific source, type the debug res:iprtr lsn:9
cmd:src.src.src.src-dst.dst.dst.dst command.
For example:
RES:Iprtr ---------------------------------------------------------------------
IP_Router_general_properties
BufferLength:137 Date/Time:22/12/2010 11:51:01 TraceTime:12047455
By typing the debug res:iprtr lsn:0 command it is possible to display the help of the debug command.
RES:Iprtr ---------------------------------------------------------------------
IP_Router_general_properties
BufferLength:2453 Date/Time:22/12/2010 11:50:02 TraceTime:11989095
Usage:
LSN:0 == This help
LSN:1 == Complete debug
LSN:2 == Upper/Lower NCB status
LSN:3 == Display ICMP header of the last 10 packets with chksum err
LSN:3 CMD:EXT == Display ICMP extended of checksum errors
LSN:3 CMD:CLR == Clear the ICMP checksum failures history
LSN:4 == NAT/ROUTE statistics display
LSN:4 CMD:CLR == NAT/ROUTE statistics clear
LSN:5 == Speed-limit status information
LSN:6 == Speed-limit error information
1014
Draft FAQ - Frequently Asked Questions Draft
ACLBYPASS parameter is used only AFTER IPACL check, and only if it returned a DENY. The result is that packets
matching IPACL PERMIT entries will get IPCOS and TOS-OUT as specified in the IPACL, while packets matching
a DENY entry may be passed because of match with ACLBYPASS with the assigment of IPCOS=COSDFT and TOS
unchanged.
RES:Iprtr ---------------------------------------------------------------------
Run DESCR:IP_Router_general_properties
- General --------------------------------------------------------------
R-ID:AUTO (192.168.000.201)
maxroute:500 DFTTTL:255 ps:2048
DEF-LOCAL-AD:0 DEF-STATIC-AD:1 DEF-OSPF-AD:110 DEF-RIP-AD:120
pvc:0 bsvc:0 LINKS:3 virtual:0
- IP Access List -------------------------------------------------------
ACL:EXT ACLBYPASS:192.168.0.232
COS:ENABLED COSDFT:NORMAL
COSBALANCE:NO NORMRATE:50 LOWRATE:50
- IP Trace -------------------------------------------------------------
tracerec:100
- Ppp-Dns --------------------------------------------------------------
PPP-DNS-PRI:000.000.000.000 PPP-DNS-SEC:000.000.000.000
1015
Draft FAQ - Frequently Asked Questions Draft
----+----------------+------------------+-----------+-----------
ID|IP |MAC |State | Expiry [s]
----+----------------+------------------+-----------+-----------
1|192.168.000.058 |00-40-F4-BB-E6-2F |VALID | 3
2|192.168.000.208 |00-08-54-50-16-1E |VALID | 106
3|192.168.000.251 |00-48-54-13-21-22 |VALID | 26
4|192.168.000.024 |00-08-54-02-00-78 |VALID | 53
5|192.168.000.005 |00-0C-6E-DE-2C-15 |VALID | 103
6|192.168.000.029 |00-40-CA-63-34-E3 |VALID | 1
7|192.168.000.250 |00-40-CA-63-34-A2 |VALID | 103
9|192.168.000.067 |00-13-8F-7E-21-33 |VALID | 84
10|192.168.000.009 |00-48-54-13-23-E7 |VALID | 99
11|192.168.000.085 |00-04-61-75-56-F5 |VALID | 107
12|192.168.000.090 |00-40-CA-6D-1D-24 |VALID | 108
13|192.168.000.035 |00-40-CA-63-34-82 |VALID | 35
14|192.168.000.025 |00-40-CA-63-35-15 |VALID | 60
15|192.168.000.033 |00-40-CA-63-34-F8 |VALID | 76
16|192.168.000.126 |00-80-48-B3-45-4B |VALID | 20
...
By typing the debug res:ip-1 layer:lan lsn:0 command it is possible to display the help of the debug command.
1016
Draft FAQ - Frequently Asked Questions Draft
By typing the debug res:nat lsn:0 command it is possible to display the help of the debug command.
D NAT MAPS [filter:val] Display any NAT active maps matching the
specified filter(s)
1017
Draft FAQ - Frequently Asked Questions Draft
PPTPC, PPTPD]
PORT: Separate records by port/id [1..65535]
SP: Separate records by source port/id [1..65535]
DP: Separate records by destination port/id [1..65535]
AP: Separate records by alias port/id [1..65535]
Tip
For version preceding the release 7.x, the command debug res:nat lsn:1 cmd:ip:<ip_address> must be
used. Type debug res:nat lsn:0 to display the help of the debug command.
[11:38:04] ABILIS_CPX:d i
ABILIS-ID: 2349
To view the current RAM usage of each Abilis driver type the command debug mem -d. For example:
1018
Draft FAQ - Frequently Asked Questions Draft
[11:38:04] ABILIS_CPX:d i
ABILIS-ID: 2349
1019
Draft FAQ - Frequently Asked Questions Draft
+----------+--------------+--------------+--------------+
| | Last 1 sec. | Last 15 sec. | Last 5 min. |
+----------+--------------+--------------+--------------+
| CPU Load | 9% | 6% | 6% |
+----------+--------------+--------------+--------------+
54.6.4. How can I view if the BRI card has the H.100 bus?
Type the d pcidev command and verify that the OKI string is present. The HFC string identifies the BRI-HFC cards. For
example:
54.6.6. How can I view if the Abilis USB ports are enabled?
Type the d pcidev command and verify that the USB CONTROLLER UHCI string is present and there is a value in the Irq
column. For example:
1020
Draft FAQ - Frequently Asked Questions Draft
For example:
A new resource is identified by the “New” string; a running resource is identified by the “Run” string.
With the d run command, it is possible to display all the running resource. If the resource is not present in the list, it is
needed to restart the Abilis.
54.7. Tunnelling
54.7.1. How can i have information about the use of ISDN backup?
There are several things which can be checked:
• tunneling diagnostics;
• tunnelling statistics:
SUCC-CALL shows the number of successful calls made using the ISDN backup;
1021
Draft FAQ - Frequently Asked Questions Draft
• system log: informs about the state of tunnels. If the LLOG parameter of the PV/AIPT resource is set to ALL+E, the time
when the ISDN backup is used is stored in the system log.
54.8. IPSEC
54.8.1. Why the outgoing traffic from CPX toward an IPSEC vpn is
blocked after updating from 6.5.x to 7.0.x?
The interaction between NAT and IPSEC changes updating from 6.5.x to 7.0.x and this may cause the outgoing traffic
blocking.
• a NAT rule for the OUTSIDE interfaces used by the INSIDE tunnel;
the ip addresses belonging to that tunnel must not to be involved in the NAT rule.
----------------------------------------------------------------------------
HOST: NAME: LOC-IP: NATT: XAUTH:
AUTH: HASH: DH: CIPHER: REM-IP: SIDE:
MODE-CFG:
XAUTH-USER: XAUTH-PWD:
----------------------------------------------------------------------------
1 SOFTMEDIDC 012.034.065.078 SYS NO
PSK MD5 MODP1024 3DES xxx.xxx.xxx.xxx INSIDE NO
----------------------------------------------------------------------------
2 SOFTMEDLAB 012.034.065.078 SYS NO
PSK MD5 MODP1024 3DES xxx.xxx.xxx.xxx INSIDE NO
1022
Draft FAQ - Frequently Asked Questions Draft
----------------------------------------------------------------------------
3 SOFTMEDBCK 012.034.065.078 SYS NO
PSK MD5 MODP1024 3DES xxx.xxx.xxx.xxx INSIDE NO
----------------------------------------------------------------------------
4 MATTEO 012.034.065.078 SYS NO
PSK MD5 MODP1024 3DES xxx.xxx.xxx.xxx INSIDE NO
----------------------------------------------------------------------------
5 SMHOUSING 012.034.065.078 SYS NO
PSK MD5 MODP1024 3DES xxx.xxx.xxx.xxx INSIDE NO
----------------------------------------------------------------------------
----------------------------------------------------------------------------
CLI: NAME: HOST-ID: RULE: LIFE-TIME:
PFS:
ESP: ESP-CIPHER: ESP-AUTH: PASSIVE: PERMANENT: NET-LOC:
AH: AH-AUTH: TUNNEL: NET-REM:
MODE-CFG-DNS:
----------------------------------------------------------------------------
1 NAME1 1 IPSEC 28800 NO
YES DES MD5 NO YES
192.168.002.064/28
NO MD5 YES
192.168.010.000/24
SYS
----------------------------------------------------------------------------
2 NAME2 2 IPSEC 28800 NO
YES DES MD5 NO YES
192.168.002.064/28
NO MD5 YES
192.168.011.010/32
SYS
----------------------------------------------------------------------------
3 NAME3 3 IPSEC 86400 NO
YES DES MD5 NO YES
192.168.002.064/28
NO MD5 YES
192.168.014.000/24
SYS
----------------------------------------------------------------------------
4 NAME4 4 IPSEC 86400 NO
YES DES MD5 NO NO
192.168.002.064/28
NO MD5 YES
172.016.015.000/24
SYS
----------------------------------------------------------------------------
5 NAME5 5 IPSEC 86400 NO
YES DES MD5 NO YES
192.168.002.064/28
NO MD5 YES
192.168.026.102/32
SYS
----------------------------------------------------------------------------
1023
Draft FAQ - Frequently Asked Questions Draft
LIST:PrivateIp - IR
010.000.000.000:010.255.255.255 172.016.000.000:172.031.255.255
192.168.000.010:192.168.255.255
LIST:PublicIp - RU
NOT.PrivateIp
Exclude private ip addresses from the NAT rule used by the tunnel setting the DNET parameter to 'PublicIp':
Configured maps
----------------------------------------------------------------------------
PR: [DESCR:]
INAT: ADD: SNET: DNET: ANET:
ONAT: SPO: DPO: APO:
PAT:
SIP: DIP: PROT: TOUT:
----------------------------------------------------------------------------
0 IN SRC 192.168.002.064/28 192.168.001.001/32 Ip-1
OUT * * AUTO
YES
----------------------------------------------------------------------------
1 IN SRC 192.168.002.064/28 'PublicIp' Ip-3
OUT * * AUTO
YES
----------------------------------------------------------------------------
54.9. CTISMS
54.9.1. Can SMS to Email be sent an SMTP server different from the
Abilis one?
SMS to Mail can be sent to ANY recipient. The Abilis SMTP can send mails:
1024
Draft FAQ - Frequently Asked Questions Draft
1. The Silence Compression is not enabled (SC:NO in the setting of CTISYS resource, or if SC:NO in the CTI Routings that
are used by the UMTS BOX).
2. The GSM/UMTS signal (SIGNAL parameter) is sufficient; to show the available signal, type the d d ctip:<xxx>
command, where <xxx> is the number of the CTIP port associated to the SIM card that you want to monitorate.
CTIP:201 ----------------------------------------------------------------------
SIM-1
OPSTATE:UP STATE:UP
------------------------------------------------------------------------
CH: STATE: [Q932-STATE:] CG: [SG:] CD: [SD:]
------------------------------------------------------------------------
*** All channels disconnected ***
------------------------------------------------------------------------
VOICE-STATE:READY PDN-STATE:READY SMS-STATE:READY
------------------------------------------------------------------------
NET:Operator-1 ROAMING:NO NET-MODE:GSM
SIGNAL:29 SIGNAL-dbm:-95 RXQUAL:0
IMEI:xxxxxxxxxxxxxx IMSI:22288141316922 SIM:N/A
PWR-CONS-mA:N/A TEMP-Celsius:N/A
CELL:CONNECTED CELL-STATE:READY CELL-ERR:NONE
CODEC:CONNECTED CODEC-STATE:READY CODEC-ERR:NONE
SIMEMU:CONNECTED SIMEMU-STATE:READY SIMEMU-ERR:NONE
• 0-10: the signal is not sufficient; the UMTS Box doesn't work correctly.
• 11-13: the signal is low; the UMTS Box can have some problems.
• 20-30: the signal is high and the UMTS Box works correctly.
3. DJ:0 and MJ:80 in the CTIR routing used by UMTS Box in order to reduce the delays of packets.
Tip
It is possible to increase the call volume setting the CELL-GAIN-IN and CELL-GAIN-OUT parameter in
the CTISYS resource.
...
- CELL (GSM/UMTS) defaults ---------------------------------------------
CELL-GAIN-IN:0 CELL-GAIN-OUT:0 pdn-rxbuf:30
CELL-CODEC-GAIN-IN:0 CELL-CODEC-GAIN-OUT:0
- CITOBOX defaults -----------------------------------------------------
...
1025
Draft FAQ - Frequently Asked Questions Draft
54.10.2. How does Abilis manage the PIN code of a SIM card?
It is possible to set the PIN code of a SIM card in the PIN parameter of its related CTIP port.
Act card:UG-1<1>
Run OPSTATE:UP LOG:DS TYPE:USER
signalling:CELL
mode:CELL VOICE-ROAMING:DISABLED NUM:*
PDN-MODE:AUTO PDN-ROAMING:DISABLED
PDN-APN:tre.it
LOOP:NO PIN:1234 GAIN-IN:+9 CODEC-GAIN-IN:SYS
DIALT:5 PIN2:# GAIN-OUT:SYS CODEC-GAIN-OUT:SYS
RSIM:NO
LCS-GROUP:NONE
Caution
If you change the position of the SIM card in the UMTS Box, you must modify the PIN parameter in the
CTIP port.
It is ALWAYS better to remove the PIN code from the SIM card because Abilis inserts it into the SIM for each init ctisys
command.
In order to avoid that the SIM card gets blocked, Abilis can insert the PIN code for maximum 2 times. If the value in the PIN
parameter is changed with another one wrong, the card gets blocked.
To unlock the SIM card, it is needed to insert the PUK code using the following DEBUG command:
debug res:ctisys cmd:l1pxxxtkyyyyyyyy lsn:254, where xxx is the number of the CTIP port and yyyyyyyy is the PUK code
(PUK code has to be always 8 digits number).
The PUK code enter takes some time, so the CP response isn't immediate. The response then should be:
RES:CtiSys --------------------------------------------------------------------
CTI_System_general_properties
BufferLength:63 Date/Time:03/10/2007 14:12:25 TraceTime:219355
1026
Draft Draft
Table of Contents
55. CPX accounting software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029
55.1. CPX accounting software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029
55.1.1. Collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029
55.1.2. Extractor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1037
55.2. Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1040
56. IPSEC clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041
56.1. TheGreenbow IPSEC VPN client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041
56.1.1. Installing TheGreenbow IPSEC VPN client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041
56.1.2. Checklist of parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041
56.1.3. Configuring The Greenbow IPSEC VPN client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1042
57. PPPoE clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048
57.1. RASPPPoE driver for Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048
57.1.1. Installing RASPPPOE drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048
57.1.2. Creating PPPoE Dial-Up connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048
57.2. Routers with PPPoE support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1049
58. Softphones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1050
58.1. Zoiper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1050
58.1.1. Zoiper installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1050
58.1.2. Creating an IAX account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1051
58.1.3. Creating a SIP account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055
1028
Draft Draft
Table of Contents
55.1. CPX accounting software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029
55.1.1. Collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029
55.1.2. Extractor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1037
55.2. Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1040
It consists of an agent running in Abilis CPX plus collector and extractor applications running on a Windows platform.
Software download: go to Abilis technical website - Accounting download1, select the software Release and download the
Acnt-X-Y-Z.exe file (X.Y.Z stands for the release number).
Extract the Collect (Collect.exe) and Extractor (Extract.exe) programs by double-clicking the Acnt-X-Y-Z.exe
file.
Note
Access to download section is restricted, before proceeding you need to obtain a valid username/password
from Abilis technical support (<[email protected]>).
Tip
It is reccomended to create a shortcut of Collect.exe and Extract.exe files into the Startup
directory: in this way the connection with Abilis is automatically activated at the Windows startup.
55.1.1. Collector
It collects information about phone/data calls made on Abilis and realizes a TCP connection between the PC and the
monitored Abilis on port 2060.
Note
To make the connection running, it is needed to activate the ACNT resource in Abilis.
1
http://abilis.antek.it/downloads/cpx-acnt/download.html
1029
Draft CPX accounting software Draft
• Remote TCP port: 2060 is the default value; the ACNT resource on Abilis uses that TCP port.
• Connect automatically at startup: if it is selected, the connection to Abilis CPX is generated automatically at the
program start-up; if it is not selected, the connection must be manually done by choosing Connect to CPX form
Connections menu.
1030
Draft CPX accounting software Draft
1031
Draft CPX accounting software Draft
The Connected State indicates that the connection with the Abilis is active and the program is ready to collect
information.
1032
Draft CPX accounting software Draft
In Autosaving tab, select Use autosave, the save frequency (by default is set up to Daily) and the time to save (by default
is set up to 23.59); at this date, the calls will be saved in a yyyy-mm-dd---hh-mm.dat file placed in the same
directory of Collect.exe.
1033
Draft CPX accounting software Draft
Right-click the connection icon in the list and select Show call events. This function shows the basic information of the calls
passed through the Abilis from the begin of the connection of the Collector to the Abilis (calling number, called number,
duration, date/time of disconnection, etc..).
1034
Draft CPX accounting software Draft
1035
Draft CPX accounting software Draft
1036
Draft CPX accounting software Draft
Note
The following icon in the desktop bar shows that the collector is running.
55.1.2. Extractor
Extractor is a program dedicated to export in TXT format information saved by the Collector program. The TXT file created
can be imported with a datasheet (i.e. Excel).
1037
Draft CPX accounting software Draft
• Use autoextract: if it is selected, the DAT files will be automatically converted in TXT format (it will be also created
a backup file .BCK). The program with a configurable frequency (by default is set up to 10 minutes) will check if new
DAT files have been created.
• Path to monitor: directory where the program searches the DAT files.
1038
Draft CPX accounting software Draft
• If you click the Extract with default mask button, the file will be exported in TXT format, with the default mask, specified
in the Settings menu.
• If you click the Extract button, a new window allows to select the fields to insert in the mask or to load an existing mask.
When the mask has been defined, click the Export button to create a TXT file.
1039
Draft CPX accounting software Draft
55.2. Appendix
Main characteristic of CPX accounting software:
• All calls are listed (both successful and unsuccessful, outgoing or incoming); unsuccessful calls report the reason of failure.
• The complete information is filed: date and time, calling and called numbers, type of call (transparent or VoIP, voice or
data or fax...), bandwith used, jitter and packet loss specific for each call, subaddresses, etc..
• One host can receive the CDRs of many Abilis at the same time.
• For backup purposes, multiple hosts can receive the CDRs from the same Abilis.
1040
Draft Draft
Table of Contents
56.1. TheGreenbow IPSEC VPN client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041
56.1.1. Installing TheGreenbow IPSEC VPN client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041
56.1.2. Checklist of parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041
56.1.3. Configuring The Greenbow IPSEC VPN client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1042
Double-click the downloaded file and install the program following the instructions.
The Greenbow parameter Abilis IKE Table Abilis IKE Table parameter
Name HOST NAME
Interface HOST REM-IP
Remote Gateway HOST LOC-IP
Preshared Key PSK KEY
Encryption HOST CIPHER
Authentication HOST HASH
Key Group HOST DH
Local ID (Advanced parameter) HOST ID-TYPE
Local ID Value (Advanced parameter) HOST IP or FQDN
Remote ID (Advanced parameter) HOST PEER-ID-TYPE
Remote ID Value (Advanced HOST PEER-IP or PEER-FQDN
parameter)
1
http://www.thegreenbow.com/vpn_down.html
1041
Draft IPSEC clients Draft
The Greenbow parameter Abilis IKE Table Abilis IKE Table parameter
Name CLI NAME
VPN Client address CLI NET-REM
Address type CLI
Remote host address CLI NET-LOC
Subnet Mask CLI NET-LOC
Encryption CLI ESP-CIPHER
Authentication CLI ESP-AUTH
Mode CLI TUNNEL
Parameter: | Value:
------------+------------------------------------------------------------------
HOST: 0
NAME: user_1
LOC-IP: 080.080.080.080
REM-IP: *
IPRES: 4
AUTH: PSK
HASH: MD5
DH: MODP1024
CIPHER: 3DES
SIDE: INSIDE
KEYING-TRIES: 3
LIFE-TIME: 3600
DPD-ENABLE: NO
DPD-DELAY: 30
DPD-TIMEOUT: 120
DPD-ACTION: STOP
ID-TYPE: IP
IP: 080.080.080.080
PEER-ID-TYPE: IP
PEER-IP: 192.168.200.001
-------------------------------------------------------------------------------
Parameter: | Value:
------------+------------------------------------------------------------------
PSK: 0
KEY: ********
ID-TYPE: ANONYMOUS
-------------------------------------------------------------------------------
Parameter: | Value:
------------+------------------------------------------------------------------
CLI: 0
NAME: user_1
HOST-ID: 0
1042
Draft IPSEC clients Draft
RULE: IPSEC
PASSIVE: YES
PERMANENT: YES
TUNNEL: YES
ESP: YES
ESP-CIPHER: 3DES
ESP-AUTH: MD5
AH: NO
AH-AUTH: MD5
LIFE-TIME: 28800
PFS: YES
NET-LOC: 192.168.001.000/24
NET-REM: 192.168.200.001/32
-------------------------------------------------------------------------------
1043
Draft IPSEC clients Draft
Configuration of Phase 1.
• Click the Advanced… button and configure the following window as explained.
1044
Draft IPSEC clients Draft
• Click the Save & Apply button to save and initialize the changes made.
Configuration of Phase 2.
• In the main window right click on the selected Phase 1 and and select Add Phase 2.
• Configure Phase 1 as shown here below and click the Save & Apply button to save and initialize the changes made.
1045
Draft IPSEC clients Draft
• When the VPN is active the “Tunnel” light at the bottom becomes green. It is possible to display the status of the
connection by clicking on Connections: this window will be shown.
1046
Draft IPSEC clients Draft
Tip
Interesting chapter: Section 52.11, “How to configure a Remote Access Server (RAS)”.
1047
Draft Draft
Table of Contents
57.1. RASPPPoE driver for Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048
57.1.1. Installing RASPPPOE drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048
57.1.2. Creating PPPoE Dial-Up connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048
57.2. Routers with PPPoE support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1049
2. If you are running Windows 2000, right-click the My Network Places icon on your desktop and select Properties to bring
up the Network and Dial-up Connections window.
If you are running Windows XP/2003, click the Start button, select Control Panel, then click Network and Internet
Connections and then click the Network Connections control panel icon to bring up the Network Connections window. Go
to the menu and select View then Details to get a detailed view of the network connections on your machine.
3. You should find one or more Local Area Connection objects. Locate the one for the network adapter for which you want
to install PPPoE driver, right-click it and select Properties.
5. In the Select Network Component Type window, select Protocol and click the Add... button. (Note: It could take a few
seconds for the following window to come up.)
6. In the Select Network Protocol window, click the Have Disk... button.
7. In the Install From Disk window, either type the name of your temporary installation directory or click the Browse...
button to navigate to it (it does not matter which of the INF files you select, Windows will automatically pick the right one
later). Then click the OK button. A new window opens, offering the PPP over Ethernet Protocol for installation. Click OK
to start installing the protocol.
8. During installation, a window titled Digital Signature Not Found (Windows 2000) or Hardware Installation (Windows
XP/2003) may come up several times (typically four times per installed network adapter), warning you that the driver
has no digital signature or Windows Logo. Make sure you click Yes (Windows 2000) or Continue Anyway (Windows
XP/2003) every time you are prompted to allow successful installation of the protocol.
9. Back at the Local Area Connection Properties window, click Close to close the window.
2. Into the Run dial-box type raspppoe and click the OK button to run the Dial-Up connection Setup application.
3. A dialog box comes up with a combo box labeled Query available PPP over Ethernet Services through Adapter: at the top.
Select the network adapter from the list. If the protocol is only operating on one network adapter, the box will be grayed
out as there is no choice to make.
1
http://www.raspppoe.com/conf.php
1048
Draft PPPoE clients Draft
• Click the Create a Dial-Up Connection for the selected Adapter button. Shortly afterwards, a shortcut to the new dial-
up connection named Connection through <Adapter Name> should show up on your desktop.
• After you have created the connection(s) you need, click the Exit button to quit the application.
• Click the Create a Dial-Up Connection for the selected Adapter button. Shortly afterwards, a shortcut to the new dial-
up connection named Connection through <Adapter Name> should show up on your desktop.
• After you have created the connection(s) you need, click the Exit button to quit the application.
• Double-click the desktop icon for the dial-up connection you created.
• In Telephone Number field the ACNAME parameter configured in Abilis should be already present. If it is
not present, insert it and after “\” add the SERVICENAME configured in Abilis. (e.g. for ACNAME:wlan and
SERVICENAME:user_1, the Telephone Number will be: wlan\user_1).
4. Double-click the desktop icon for the dial-up connection you created.
5. In the Connection to <Connection Name> window, enter the USERNAME and PASSWORD configured in Abilis (USER
and PWD parameter in the Users Table).
Tip
For more information go to http://www.raspppoe.com/.
Tip
Refer to Section 52.11.3, “How to configure a RAS using PPPoE connections with an Ethernet/WiFi
network” to know how to configure Abilis.
1049
Draft Draft
Table of Contents
58.1. Zoiper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1050
58.1.1. Zoiper installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1050
58.1.2. Creating an IAX account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1051
58.1.3. Creating a SIP account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055
58.1. Zoiper
58.1.1. Zoiper installation
Download Zoiper from http://www.zoiper.com/ and install it on a PC. For the instructions about the installation and the
configuration refer to Zoiper manual1.
• right click on the ZOIPER icon in the system tray or on the phone itself and select Options submenu;
The first step is to configure Audio devices: suggested value is the audio board.
1
http://www.zoiper.com/support.php
1050
Draft Softphones Draft
Note
The following icon in the system tray shows that Zoiper is running.
1051
Draft Softphones Draft
• Server Hostname/IP: Abilis IP address (configure the private IP address if the user is registered in the Abilis private side or
the public IP address if the user is registered in the Abilis public side).
1052
Draft Softphones Draft
If the IAX user is already registered onto Abilis, the string Registered appears in the Account check box. The user can be
unregistered by clicking the Unregister button.
1053
Draft Softphones Draft
Note
To manually start the registration, select the user in the Account check box and press the Register button.
RES:CtiIax --------------------------------------------------------------------
Inter-Asterisk_eXchange_Version_2
BufferLength:324 Date/Time:08/04/2008 10:52:23 TraceTime:<NotRunning>
If an entry exists for the “iax_phone” user, the registration is successful and the user is able to make calls.
1054
Draft Softphones Draft
To make a call simply digit a number in Phone to dial text box and press the Dial button (the first button from left under the
text box).
Tip
Interesting chapter: Section 45.6.3, “Debug of the CTIIAX resource”.
• Domain: Abilis domain or IP address (configure the private IP address if the user is registered in the Abilis private side or
the public IP address if the user is registered in the Abilis public side).
1055
Draft Softphones Draft
Note
If the user is registered in the Abilis public side, you must enable a valid STUN server (e.g.
stun.zoiper.com).
1056
Draft Softphones Draft
If the SIP user is already registered onto Abilis, the string Registered appears in the Account check box. By clicking the
Unregister button, it is possible to unregister the user.
1057
Draft Softphones Draft
Note
To manually start the registration, select the user in the Account check box and press the Register button.
RES:CtiSip --------------------------------------------------------------------
Session_Initiation_Protocol
BufferLength:405 Date/Time:08/04/2008 11:35:39 TraceTime:<NotRunning>
If an entry exists for the “sip_phone” user, the registration is successful and the user is able to make calls.
1058
Draft Softphones Draft
To make a call simply digit a number in Phone to dial text box and press the Dial button (the first button from left under the
text box).
Tip
Interesting chapter: Section 46.7.3, “Debug of the CTISIP resource”.
1059
Draft Draft
Table of Contents
59. List of Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1062
59.1. Complete list of On-line Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1062
59.2. Complete list of Off-line Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070
60. Log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1075
60.1. System Log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1075
61. Disconnection codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1078
61.1. ISDN disconnection codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1078
61.1.1. ISDN disconnection codes recommended by ITU (formerly CCITT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1078
61.1.2. Abilis CPX private ISDN disconnection codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081
61.2. X.25 disconnection codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1082
61.2.1. ITU (formerly CCITT) X.25 codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1082
61.2.2. Abilis CPX internal codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1084
1061
Draft Draft
Table of Contents
59.1. Complete list of On-line Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1062
59.2. Complete list of Off-line Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070
[11:26:53] ABILIS_CPX:??
Alarm operations:
ALARM VIEW Alarm view
ALARM RESET Alarm reset
Add operations:
A CRKEY: Encryption/Decryption key identifier [1..63]
A CF CF/DND (Call forwarding/Do-Not-Disturb) entry
A CONTACT Address Book
A CTIB CTI channels bundle
A CTICL CTI cluster
A CTIDISA CTI DISA Users and Services
A CTIG CTI group
A CTIH323 CTI H.323 Translation entry
A CTIIAX CTIIAX numbers table entry
A CTIL CTI link
A CTILG CTI group of links
A CTIPC CTI permanent connection
A CTIR CTI routing
A CTIRE CTI routing
A CTIRR CTI routing
A CTISIP CTISIP numbers table entry
A CTISMS CTI SMS routings for incoming/outgoing messages
A DEV: HW device identifier 'type-n', where 'n' can be [1..255]
A DHCP DHCP profile/subnet/host
A DNS DNS server and relay tables
A FTP FTP Virtual root paths/path's access Rights
A GROUP: Group name. Max. 32 ASCII characters.
A HTTP HTTP Virtual root paths/path's access Rights
A IKE IKE Host/Client connections and preshared keys tables
A IPACL IP Access List
A IPAD IP Routing Administrative Distance
A IPLB IP Load Balancing entry
A IPR IP Routing
A IPSEC IPSEC Security policies and associations tables
A LCSG Last Calling Number Service group
A LCST Last Calling Number Service table entry
A LIST: CPX list name
A NAT NAT alias entry
1062
Draft List of Commands Draft
Boot operations:
BOOT DEV: HW device identifier 'type-n', where 'n' can be [1..255]
Clear operations:
C C COR connection
C CF CF/DND (Call forwarding/Do-Not-Disturb) entry
C CL CTI incoming/outgoing calls logs
C CODE Cause and diagnostic codes
C CONTACT Address Book
C CRKEY: Encryption/Decryption key identifier [1..63]
C CTIB CTI channels bundle
C CTIC CTI connections
C CTICL CTI cluster
C CTIDISA CTI DISA Users and Services
C CTIG CTI group
C CTIH323 CTI H.323 Translation entry
C CTIIAX CTIIAX numbers table entry
C CTIL CTI link
C CTILG CTI group of links
C CTIPC CTI permanent connection
C CTIR CTI routing
C CTIRE CTI routing
C CTIRR CTI routing
C CTISIP CTISIP numbers table entry
C CTISMS CTI SMS routings for incoming/outgoing messages
C DEV: HW device identifier 'type-n', where 'n' can be [1..255]
C DHCP DHCP profile/subnet/host
C DNS DNS server and relay tables
C FTP FTP Virtual root paths/path's access Rights
C GROUP: Group entry
C HTTP HTTP Virtual root paths/path's access Rights
C IKE IKE Host/Client connections and preshared keys tables
C IPACL IP Access List
C IPAD IP Routing Administrative Distance
C IPLB IP Load Balancing entry
C IPR IP Routing
C IPSEC IPSEC Security policies and associations tables
C L System Log
C LCSG Last Calling Number Service group
C LCST Last Calling Number Service table entry
C LDM Debug Log in Memory
C LDME Debug Log in Memory
C LE Exceptions Log
C LIST: CPX list name
C NAT NAT alias entry
C OSPF OSPF area/range/neigh/host/external route
C PVC PVC Connection
C R SVC Routing
C RES: Resource identifier 'type-n', where 'n' can be [1..999]
C RIP RIP external route
C S Status and statistics
C SE Status and statistics
C USER: User entry
1063
Draft List of Commands Draft
Open a Connection:
CALL CTIP: CTI port identifier [1..300]
CALL RES: Resource identifier 'type-n', where 'n' can be [1..999]
CALL USER: User name. Max. 32 ASCII characters.
Open a Connection:
CALLTRY CTIP: CTI port identifier [1..300]
CALLTRY USER: User name. Max. 32 ASCII characters.
Configuration management:
CONF BACKUP Copy configuration to removable disk
CONF GET Sends the configuration in memory to a remote site
CONF INFO Display/set configuration notes
CONF PUT Receives configuration from a remote site
CONF RELOAD Reload the configuration from a file
CONF RESTORE Alias of the CONFLOG RESTORE command
CONF SAVE Alias of the SAVE CONF command(s)
CONF VALIDATE Alias of the VALIDATE command
Address Book:
CONTACT LOAD Import contacts from a CSV file
CONTACT SAVE Export contact to a CSV file
Display operations:
D ACT Active HW device/resource/CTI port
D C COR Connections status
D CE COR Connections extended status
D CF CF/DND (Call forwarding/Do-Not-Disturb) entry
D CL CTI incoming/outgoing calls logs
D CODE ISDN/X.25 codes descriptions
D CONTACT Address Book
D CPU CPU load percentages
D CPUID CPU identification
D CRKEY Encryption/Decryption keys
D CRKEY: Encryption/Decryption key identifier [1..63]
D CTIB CTI channels bundle
D CTIC CTI connections
D CTICE CTI connections in extended format
D CTICL CTI cluster
D CTIDISA CTI DISA Users and Services
D CTIG CTI group
D CTIH323 CTI H.323 Translation entry
D CTIIAX CTIIAX numbers table entry
D CTIL CTI link
D CTILG CTI group of links
D CTIP CTI port
D CTIP: CTI port identifier [1..300]
D CTIPC CTI permanent connection
D CTIPE CTI port in extended format
D CTIPE: CTI port identifier [1..300]
D CTIR CTI routing
D CTIRE CTI routing in extended format
D CTIRR CTI routing in reduced format
1064
Draft List of Commands Draft
1065
Draft List of Commands Draft
Debug operations:
DEBUG BM Display Boot Manager configuration file
DEBUG CPXRUN Display CPX Run configuration file
DEBUG FILE File system information and statistics
DEBUG IRQ Interrupts information and statistics
DEBUG MEM Memory information and statistics
DEBUG PCIDEV Display PCI service debug information
DEBUG PO: CPX port number [0..999]
DEBUG RES: Resource identifier 'type-n', where 'n' can be [1..999]
DEBUG SIMULATE Simulate an event for debugging purposes
DEBUG TASK Tasks information and statistics
DEBUG USBDEV Display USB service debug information
DEBUG WDGMEM Watchdog memory
Close a Connection:
DISC CTIP: CTI port identifier [1..300]
DISC RES: Resource identifier 'type-n', where 'n' can be [1..999]
DISC USER: User name. Max. 32 ASCII characters.
Disabling operations:
DISABLE AC AC connections
DISABLE CTIR CTI connections
Enabling operations:
ENABLE AC AC connections
ENABLE CTIR CTI connections
Find operations:
F BRIDGE Bridge MAC search
F CF CF/DND (Call forwarding/Do-Not-Disturb) searches
F CONTACT Address book
F CTIDISA CTIDISA searches
F CTIIAX CTIIAX numbers search
F CTISIP CTISIP numbers search
F DNS DNS searches
F FTP FTP Virtual root paths/path's access Rights
F HTTP HTTP Virtual root paths/path's access Rights
F IPACL IP Access List
F LCST Last Calling Number Service table entry
F LIST: CPX list name
F LISTE: CPX list name
F USER Users Access Control table summary
F USER: User entry
Shutdown operation:
HALT SYSTEM System shutdown
Init operations:
INIT CTIH323 Refreshes CTI H.323 Translation table content
1066
Draft List of Commands Draft
INIT CTIG Unsupported. Use INIT CTIR to refresh entries in CTI groups
INIT CTIR Refreshes entries in CTI routings, CTIG tables and CTICL list(s)
INIT CTISYS Refreshes parameters of CTISYS resource (RES:CtiSys) and
refreshes entries in CTI ports, clusters and LCS groups
INIT IP Refreshes IP resources and purges queues
INIT IPAD Refreshes IP Routing Administrative Distances
INIT IPLB Refreshes IP Load Balancing definitions
INIT IPR Rebuild IP Routings table
INIT LCSG Unsupported. Use INIT CTISYS to refresh entries in LCS groups
INIT NAT Refreshes the static table and clears the dynamic table content
INIT RES: Refreshes parameters of a resource
INIT USBDEV Refreshes USB Service
Licence operations:
LICENCE COMPARE Compare ACTIVE licence and STORED licence
LICENCE DISPLAY Display licences or permissions
LICENCE GET Download ACTIVE licence or STORED licence file
LICENCE PUT Upload STORED licence file
LICENCE SET Enter STORED licence value
Lists operations:
LIST CLEAR Remove all items from a list
LIST CREATE Create a list
LIST DELETE Delete a list
LIST DESCRIPTION Add/Modify list description
LIST DISPLAY Display currently configured lists
LIST EDITABLE Set/Reset list editable flag
LIST RENAME Modify list name
Move operations:
M CF CF/DND (Call forwarding/Do-Not-Disturb) entry
M CTIR CTI routing
M CTIRE CTI routing
M CTIRR CTI routing
M CTISMS CTI SMS routings for incoming/outgoing messages
M IPACL IP Access List
M NAT NAT alias entry
M R SVC Routing
1067
Draft List of Commands Draft
Restart operations:
R CTIAC CTI AC DSP(s)
R PVC PVC Connection
R RES: Resource identifier 'type-n', where 'n' can be [1..999]
Set operations:
S ACT Active HW device/resource/CTI port
S CF CF/DND (Call forwarding/Do-Not-Disturb) entry
S CONTACT Address Book
S CRKEY: Encryption/Decryption key identifier [1..63]
S CTIB CTI channels bundle
S CTIDISA CTI DISA Users and Services
S CTICL CTI cluster
S CTIG CTI group
S CTIH323 CTI H.323 Translation entry
S CTIIAX CTIIAX numbers table entry
S CTIL CTI link
S CTILG CTI group of links
S CTIP CTI port
S CTIP: CTI port identifier [1..300]
S CTIPC CTI permanent connection
S CTIPE CTI port
S CTIPE: CTI port identifier [1..300]
S CTIR CTI routing
S CTIRE CTI routing
S CTIRR CTI routing
S CTISIP CTISIP numbers table entry
S CTISMS CTI SMS routings for incoming/outgoing messages
S DEV: HW device identifier 'type-n', where 'n' can be [1..255]
S DHCP DHCP profile/subnet/host
S DNS DNS server and relay tables
S FTP FTP Virtual root paths/path's access Rights
S G General system parameters
S GROUP: Group entry
S GROUPE: Group entry
S HTTP HTTP Virtual root paths/path's access Rights
S IKE IKE Host/Client connections and preshared keys tables
S INACT Inactive HW device/resource/CTI port
S IPACL IP Access List
S IPAD IP Routing Administrative Distance
S IPLB IP Load Balancing entry
S IPR IP Routing
S IPSEC IPSEC Security policies and associations tables
S LCSG Last Calling Number Service group
S NAT NAT alias entry
S OSPF OSPF area/range/neigh/host/external route
S P Resource parameters
S PREF Preferences
S PVC PVC Connection
S R SVC Routing
S RE SVC Routing
S RIP RIP external route
S S Status/Signals
S T System local date and/or time
S USER: User entry
1068
Draft List of Commands Draft
Save operations:
SAVE CONF Current configuration
SAVE DEBUG Debug Log on Disk
Shutdown operation:
SHUTDOWN SYSTEM System shutdown
System operations:
SYS COMPACT Directory re-compacting operation
SYS COMPACTR Directory re-compacting operation, recursive
SYS DELETE Delete operations
SYS DIR List operations
SYS DISK Disk and Volume management
SYS DISPLAY Display operations
SYS SET Set operations
SYS UPDATE Receive a package or a new disk image and update the system
Testing operations:
TEST DSP DSPs test
TEST H100 H.100 bus test
Trace operations:
TRACE ACT Activate trace
TRACE CLEAR Clear trace
TRACE DELETE Delete trace file
TRACE DISPLAY Trace display operations
TRACE GET Transfer trace
TRACE INACT Deactivate trace
TRACE PARAM Trace parameters operations
TRACE SAVE Save trace on disk
TRACE START Start trace
TRACE STOP Stop trace
Transfer Calls:
TRANSFER CTIP: CTI port identifier [1..300]
TRANSFER USER: User name. Max. 32 ASCII characters.
1069
Draft List of Commands Draft
Comments:
# Commands starting with this character will be ignored
[16:35:06] ABILIS_CPX:??
Add operations:
A CRKEY: Encryption/Decryption key identifier [1..63]
A CF CF/DND (Call forwarding/Do-Not-Disturb) entry
A CTIB CTI channels bundle
A CTICL CTI cluster
A CTIDISA CTI DISA Users and Services
A CTIG CTI group
A CTIH323 CTI H.323 Translation entry
A CTIIAX CTIIAX numbers table entry
A CTIL CTI link
A CTILG CTI group of links
A CTIPC CTI permanent connection
A CTIR CTI routing
A CTIRE CTI routing
A CTIRR CTI routing
A CTISIP CTISIP numbers table entry
A CTISMS CTI SMS routings for incoming/outgoing messages
A DEV: HW device identifier 'type-n', where 'n' can be [1..255]
A DHCP DHCP profile/subnet/host
A DNS DNS server and relay tables
A FTP FTP Virtual root paths/path's access Rights
A GROUP: Group name. Max. 32 ASCII characters.
A HTTP HTTP Virtual root paths/path's access Rights
A IKE IKE Host/Client connections and preshared keys tables
A IPACL IP Access List
A IPAD IP Routing Administrative Distance
A IPLB IP Load Balancing entry
A IPRS Saved static IP Routing (same of SIPR)
A IPSEC IPSEC Security policies and associations tables
A IPSR IP Source Routing
A LCSG Last Calling Number Service group
A LIST: CPX list name
A NAT NAT alias entry
A OSPF OSPF area/range/neigh/host/external route
A PVC PVC Connection
A R SVC Routing
A RES: Resource identifier 'type-n', where 'n' can be [1..999]
A RIP RIP external route
A SIPR Saved static IP Routing (same of IPRS)
A USER: User name. Max. 32 ASCII characters.
A VRRP VRRP Routers
A WGB WG Bridge Routing
Boot operations:
BOOT DEV: HW device identifier 'type-n', where 'n' can be [1..255]
1070
Draft List of Commands Draft
Clear operations:
C CF CF/DND (Call forwarding/Do-Not-Disturb) entry
C CRKEY: Encryption/Decryption key identifier [1..63]
C CTIB CTI channels bundle
C CTICL CTI cluster
C CTIDISA CTI DISA Users and Services
C CTIG CTI group
C CTIH323 CTI H.323 Translation entry
C CTIIAX CTIIAX numbers table entry
C CTIL CTI link
C CTILG CTI group of links
C CTIPC CTI permanent connection
C CTIR CTI routing
C CTIRE CTI routing
C CTIRR CTI routing
C CTISIP CTISIP numbers table entry
C CTISMS CTI SMS routings for incoming/outgoing messages
C DEV: HW device identifier 'type-n', where 'n' can be [1..255]
C DHCP DHCP profile/subnet/host
C DNS DNS server and relay tables
C FTP FTP Virtual root paths/path's access Rights
C GROUP: Group entry
C HTTP HTTP Virtual root paths/path's access Rights
C IKE IKE Host/Client connections and preshared keys tables
C IPACL IP Access List
C IPAD IP Routing Administrative Distance
C IPLB IP Load Balancing entry
C IPRS Saved static IP Routing (same of SIPR)
C IPSEC IPSEC Security policies and associations tables
C IPSR IP Source Routing
C L System Log
C LCSG Last Calling Number Service group
C LE Exceptions Log
C LIST: CPX list name
C NAT NAT alias entry
C OSPF OSPF area/range/neigh/host/external route
C PVC PVC Connection
C R SVC Routing
C RES: Resource identifier 'type-n', where 'n' can be [1..999]
C RIP RIP external route
C SIPR Saved static IP Routing (same of IPRS)
C USER: User entry
C VRRP VRRP Routers
C WGB WG Bridge Routing
Configuration management:
CONF INFO Display/set configuration notes
CONF RELOAD Reload the configuration from a file
CONF SAVE Alias of the SAVE CONF command(s)
CONF VALIDATE Alias of the VALIDATE command
Display operations:
D ACT Active HW device/resource/CTI port
D CF CF/DND (Call forwarding/Do-Not-Disturb) entry
D CODE ISDN/X.25 codes descriptions
D CRKEY Encryption/Decryption keys
D CRKEY: Encryption/Decryption key identifier [1..63]
D CTIB CTI channels bundle
D CTICL CTI cluster
1071
Draft List of Commands Draft
1072
Draft List of Commands Draft
Find operations:
F BRIDGE Bridge MAC search
F CF CF/DND (Call forwarding/Do-Not-Disturb) searches
F CTIDISA CTIDISA searches
F CTIIAX CTIIAX numbers search
F CTISIP CTISIP numbers search
F DNS DNS searches
F FTP FTP Virtual root paths/path's access Rights
F HTTP HTTP Virtual root paths/path's access Rights
F IPACL IP Access List
F LIST: CPX list name
F LISTE: CPX list name
F USER Users Access Control table summary
F USER: User entry
Lists operations:
LIST CLEAR Remove all items from a list
LIST CREATE Create a list
LIST DELETE Delete a list
LIST DESCRIPTION Add/Modify list description
LIST DISPLAY Display currently configured lists
LIST EDITABLE Set/Reset list editable flag
LIST RENAME Modify list name
Move operations:
M CF CF/DND (Call forwarding/Do-Not-Disturb) entry
M CTIR CTI routing
M CTIRE CTI routing
M CTIRR CTI routing
M CTISMS CTI SMS routings for incoming/outgoing messages
M IPACL IP Access List
M NAT NAT alias entry
M R SVC Routing
Save operations:
SAVE CONF Current configuration
Set operations:
S ACT Active HW device/resource/CTI port
S CF CF/DND (Call forwarding/Do-Not-Disturb) entry
S CRKEY: Encryption/Decryption key identifier [1..63]
S CTIB CTI channels bundle
S CTIDISA CTI DISA Users and Services
S CTICL CTI cluster
S CTIG CTI group
S CTIH323 CTI H.323 Translation entry
S CTIIAX CTIIAX numbers table entry
S CTIL CTI link
S CTILG CTI group of links
S CTIP CTI port
1073
Draft List of Commands Draft
Trace operations:
TRACE DISPLAY Trace display operations
TRACE PARAM Trace parameters operations
Comments:
# Commands starting with this character will be ignored
1074
Draft Draft
Table of Contents
60.1. System Log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1075
[15:41:54] ABILIS_CPX:d l
1075
Draft Log messages Draft
Tip
The command allows to display a log file of another version:
[09:22:13] ABILIS_CPX:_d l ?
Notification messages are stored in the Abilis CPX System Log file in the following format:
Notification messages are classified on the basis of importance of the reported event. The event importance is indicated by a
prefix reported in the text of the event message itself.
The following table lists Event types and the corresponding Event text prefix:
Each message also has a Severity level indicator, based on SYSLOG protocol severity classification. See SYSLOG section
for a description of SYSLOG Message Severities.
1076
resource state [dn (DOWN),
RD (READY)].
00428 INFO I: MFIo-nnn ST:ssss Diagnostic information
Draft Log messages Draft
about MfIo resource.
'ssss' is the resource state
[in (INACTIVE), RD
Table 60.3. System Log event's List (ACTIVE)].
00429 WARNING W: LDAP - <file-name> LDAP service need to update
version update required, from db file <file-name>.
v. xxx to v. yyy
00430 WARNING W: LDAP - <file-name-1> LDAP service, db file <file-
v. xxx being saved in <file- name> save is in progress.
name-2>
00431 WARNING W: LDAP - <file-name-1> v. LDAP service, db file <file-
xxx saved in <file-name-2> name> successfully saved.
00432 WARNING W: LDAP - Error nn (ssss) LDAP service, db file <file-
saving <file-name>. name> unsuccessful save.
The number 'nn' is the
occurred error code and 'ssss'
is the related description.
Please report the event to the
Abilis CPX Help desk.
00433 WARNING W: LDAP - <file-name> LDAP service, db file <file-
being updated to v. xxx name> version update is in
progress.
00434 WARNING W: LDAP - <file-name> LDAP service, db file <file-
successfully updated to v. name> successfully updated.
xxx
00435 WARNING W: LDAP - Error nn (ssss) LDAP service, db file <file-
updating <file-name> name> unsuccessful update.
The number 'nn' is the
occurred error code and 'ssss'
is the related description.
Please report the event to the
Abilis CPX Help desk.
00436 INFO I: MfTemp-nnn ST:ssss Diagnostic information
about MfTemp resource.
'ssss' is the resource state
[in (INACTIVE), RD
(ACTIVE)].
00437 INFO I: SysCtl-nnn ST:ssss Diagnostic information
about SysCtl resource.
'ssss' is the resource state
[in (INACTIVE), RD
(ACTIVE)].
00438 WARNING W: MAIL SERVICE SMTP Mail Service: mail not sent
ERROR [nn] - ssss because of SMTP driver
error. The number 'nn' is the
occurred error code and 'ssss'
is the related description.
Please report the event to the
Abilis CPX Help desk.
00439 WARNING W: MAIL SERVICE ERROR Mail Service: mail not sent
[nn] - ssss because of service internal
error. The number 'nn' is the
occurred error code and 'ssss'
is the related description.
Please report the event to the
Abilis CPX Help desk.
00440 WARNING W: Adsl-nnn STH ADSL (STH) modem -
Unsupported FW version unsupported FW version.
'nnn' is the resource
identifier.
1077
Draft Draft
Table of Contents
61.1. ISDN disconnection codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1078
61.1.1. ISDN disconnection codes recommended by ITU (formerly CCITT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1078
61.1.2. Abilis CPX private ISDN disconnection codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081
61.2. X.25 disconnection codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1082
61.2.1. ITU (formerly CCITT) X.25 codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1082
61.2.2. Abilis CPX internal codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1084
Example: CAUSE: 82 90
1078
Draft Disconnection codes Draft
1079
C/Q.931.
DF Invalid message, unspecified. This cause is used to report
an invalid message event only when no other cause in the
Draft invalid message class applies.
Disconnection codes Draft
E0 Mandatory information element is missing. This cause
indicates that the equipment sending this cause has received
Table 61.3. Second field: ISDN disconnection cause
a message which is missing an information element which
must be present in the message before that message can be
processed.
E1 Message type non-existent or not implemented. This cause
indicates that the equipment sending this cause has received
a message with a message type which it does not recognize
either because this is a message not defined or is defined but
not implemented by the equipment sending this cause.
E2 Message not compatible with call state or message type
non-existent or not implemented. This cause indicates that
the equipment sending this cause has received a message
such that the procedures do not indicate that this is a
permissible message to receive while in the call state, or a
STATUS message was received indicating an incompatible
call state.
E3 Information element/parameter non-existent or not
implemented. This cause indicates that the equipment
sending this cause has received a message which includes
information element(s)/parameter(s) not recognized because
the information element identifier(s)/parameter name(s)
are not defined or are defined but not implemented by the
equipment sending the cause. This cause indicates that
the information element(s)/parameter(s) were discarded.
However, the information element is not required to be
present in the message in order for the equipment sending the
cause to process the message.
E4 Invalid information element contents. This cause indicates
that the equipment sending this cause has received an
information element which it has implemented; however, one
or more fields in the information element are coded in such
a way which has not been implemented by the equipment
sending this cause.
E5 Message not compatible with call state. This cause
indicates that a message has been received which is
incompatible with the call state.
E6 Recovery on timer expiry. This cause indicates that a
procedure has been initiated by the expiry of a timer in
association with error-handling procedures.
E7 Parameter non-existent or not implemented - passed
on (national use). This cause indicates that the equipment
sending this cause has received a message which includes
parameters not recognized because the parameters are not
defined or are defined but not implemented by the equipment
sending the cause. The cause indicates that the parameter(s)
were ignored. In addition, if the equipment sending this
cause is an intermediate point, then this cause indicates that
the parameter(s) were passed on unchanged.
EE Message with unrecognized parameter discarded. This
cause indicates that the equipment sending this cause has
discarded a received message which includes a parameter
that is not recognized.
EF Protocol error, unspecified. This cause is used to report a
protocol error event only when no other cause in the protocol
error class applies.
FF Interworking, unspecified. This cause indicates that there
has been interworking with a network which does not
provide causes for actions it takes. Thus, the precise cause
for a message which is being sent cannot be ascertained.
1080
Draft Disconnection codes Draft
Codes starting with FF as the first byte, report local problems, i.e. they are not messages sent or received by the network.
Codes starting with 80 as the first byte, are codes specific to CPX, sent or received by the network.
It should be noted that these “private” codes might not be transported to their destination by ISDN, exactly as happens with
the Italian Telecom network.
1081
Draft Disconnection codes Draft
1082
25 packet disallowed: Reject not allowed
26 packet disallowed: packet too short
27 packet disallowed: packet too long
Draft Disconnection codes Draft
28 packet disallowed: GFI (General Format Identifier) not valid
29 packet disallowed: restart with GFI different from zero
Table
2A 61.6. ITU X.25 diagnostic codes packet disallowed: type of packet not compatible with the
registered facility
2B packet disallowed: interrupt confirmation not authorised
2C packet disallowed: interrupt not authorised
2D packet disallowed: reject not authorised
30 TIMER EXPIRED
31 Timer expired: for call request
32 Timer expired: for clear indication
33 Timer expired: for reset indication
34 Timer expired: for restart indication
40 CALL SET-UP PROBLEMS
41 Call-setup problems: facility or registration code not
permitted
42 Call-setup problems: parameter of the facility not permitted
43 Call-setup problems: called address not valid
44 Call-setup problems: caller's address
45 Call-setup problems: length of facility or registration not
valid
46 Call-setup problems: incoming calls barred
47 Call-setup problems: no logical channel available
48 Call-setup problems: call collision
49 Call-setup problems: facility request duplicated
4A Call-setup problems: length of the address different to zero
4B Call-setup problems: length of the facility different to zero
4C Call-setup problems: facility was not supplied when expected
4D Call-setup problems: format of the facility specified by DTE
not compatible with CCITT
50 VARIOUS
51 Various: incorrect cause code generated by DTE
52 Various: byte not aligned
53 Various: Q-bit setting meaningless
70 INTERNATIONAL PROBLEMS
71 International problems: problems of the remote network
72 International problems: problems of protocol at international
level
73 International problems: international link not in service
74 International problems: international link busy
75 International problems: problem of the facility on the transit
network
76 International problems: problem of the facility on the
destination network
77 International problems: problems on the international
routings
78 International problems: temporary routing problems
79 International problems: the DNIC being called is not
recognized
7A International problems: maintenance in progress
1083
Draft Disconnection codes Draft
Internal disconnection codes which are not caused by errors in the X.25 procedure, have FO as the cause (see also the
parameter MCAU in the port parameters) and the appropriate value for the error identification.
Some of these diagnostic codes are of considerable importance to the installer and the user of Abilis CPX, while others are
important for technical assistance of the retailer and the producer.
1084
F0 C7 An internal error caused the
compression module to be reinitialised
F0 C8 Internal code not provided for the
Draft Disconnection codes commands SEND/RECEIVE. Draft
1085
Draft Draft
Appendix A. Glossary
ADSL Asymmetric Digital Subscriber Line (see Wikipedia1 for details).
GSM Global System for Mobile communications (see Wikipedia12 for details).
HDSL High bit rate Digital Subscriber Line (see Wikipedia15 for details).
1086
Draft Glossary Draft
STUN Simple Traversal of UDP through NATs (see Wikipedia48 for details).
1087