Gebruiksaanwijzing /service van het product 38DHB0002UKDD van de fabrikant Avaya
Ga naar pagina of 144
INDeX IPNC Cassette Administration Manual 38DHB0002UKDD – Issue 7 (22/11/02).
Page 2 - Contents Page 2 - Contents INDeX IPNC Cassette Administration Manual 38DHB0002UKDD – Issue 7 (22/11/02 ) Introduction ............................................. 4 Making Your System Secure .............................. 4 Use of this Manual.
Contents - Page 3 Configuri ng VoIP.................................................. 106 INDeX to INDeX Vo IP Trunk ing ................................. 106 Home Office / Small Offi ce......................................... 108 Appendix A: General Information .
Page 4 - Making Your System Secure Introduction Introduction Making Your System Secure It is vital to your business that your system is secured. There are different aspects of security that your System Administrator should consider. This is particularly important for any system that supports dialled access and Internet connection.
Introduction The IP Networking Cassette Introduction - Page 5 The IP Networking Cassette Introduction The INDeX offers the advantages of integrated voice and data communications to small and medium sized organisations. An IPNC provides a wide range of facilities and can support many applications, bot h at a single site and at dispersed locations.
Page 6 - The IPNC Hardware Introduction The IPNC Hardware The IP Networking Cassette is available as six variants as follows: IPNC : Suitable for Internet Access only solutions. All IPNCs are equipped with a minimum of two 64K B channels, an X.21/V35/V24 lease line port, one 10BaseT Ethernet port plus one auto-sensing 10/100BaseT Ethernet port.
Introduction The Boot Process - Page 7 The Boot Process The boot process is shown in the diagram below. When reset the IPNC first checks for any directly connected Leased lines. It then checks its co nfiguration, which is stored in “flash memory”.
Page 8 - Overview Installation into the INDeX Installation into the INDeX Overview An IPNC (software Level 3.2) only runs on an INDeX system with Level 9.0+ or higher software. However, software Level 3.2 running on INDeX level 10.0+ are required to support IPNC tunnelled INDeX DT protocol for VoIP homeworking.
Software Upgrading and Installation Introduction - Page 9 Software Upgrading and Installation Introduction The installation Wizard installs the IP NC Manager application on the Administration PC. Notes: 1. The Configuration Wizard is contained on the Administration Software CD (which can also be accessed by running Setup.
Page 10 - Installing Software Upgrade Software Upgrading and Installation Upgrade Steps Explanation Step 3 Uninstall the existing IPNC 2.2 Manager software from the PC. Install the new IP Office Admin Suite 3.2 from the CD, see page 13. Failure to un-install the 2.
Software Upgrading and Installation Installing Software Upgrade - Page 11 Upgrade Steps Explanation Step 8 At the debug prompt type the following command: ipoffice Step 9 If the previous steps have been followed correctly and the upgrade is successful thus far to loader version 1076, an output similar to the following will be shown.
Page 12 - Installing Software Upgrade Software Upgrading and Installation Upgrade Steps Explanation Step 13 Once the IPNC has been restarted load the IPNC 3.x firmware using the Manger UpgradeWize (File|Advanced|Upgrade). In step 2, the nadrcii.bin was renamed nadrcii.
Software Upgrading and Installation Installation of a New System - Page 13 Installation of a New System At initial start up or reset, the IPNC searches for an IP address from any available DHCP server. If an IP address is found, the IPNC adopts a DHCP client mode and accepts the address.
Page 14 - Installation of a New System Software Upgradi ng and Installation Dynamic IP Addressing The following paragraphs detail the configuration requirements for dynamic IP addressing of the Administration PC which will be used to configure the IPNC.
Software Upgrading and Installation Installation of a New System - Page 15 Installation Procedure The following details the procedures for installation of a ne w system using the Configuration Wizard found on the Administration CD. Alternatively, if you are upgrading the software on an existing IPNC, see page 9.
Page 16 - Contents The Manager Application Introduction The Manager Application is the configuration and management tool for a ll functions of the IPNC. Since the Manager is common to other Avaya products (e.g. the Alchemy range) some fields are redundant, these will be clearly identified in subsequent sections.
The Manager Application Starting the Manager - Page 17 Starting the Manager To start the Manager application perform the following: 1. Use Start | Programs | IP Office | Manager.
Page 18 - Starting the Manager The Manager Application 5. If you have just installed a new IPNC, you must first extract the configuration file from the system to transfer it to the Manager folder, as follows: a) File | Offline | RecvConfig (the default file name is shown with the extension .
The Manager Application General Use of the Manager - Page 19 General Use of the Manager The list of items in the Manager's Configuration Tree corresponds to th e access rights of the operator who is currently logged on, i.e. whose name and password has been entered.
Page 20 - General Use of the Manager The Manager Application The Configuration Forms For any item in a function's summary list (see General Use of the Manager on page 19) configuration values are specified by completing forms. There may be one or more forms to complete, depending on the function concerned.
The Manager Application Operator Profiles - Page 21 Operator Profiles In order to safeguard the security of the system, it is strongly recommended that the Administrator creates a suitable set of operator profiles th at are granted only the access rights they need.
Page 22 - Operator Profiles The Manager Application To Create an Operator Profile 1. Log on with operator name and password Administrator (the default name and password which must be changed at the ealiest opportunity (see Changing Operator Profile Passwords on page 21).
The Manager Application Configuration Files - Page 23 Configuration Files The operational configuration files ( with the extension .cfg) for the IPNC are stored: - On the Admin PC in the Manager folder - In the IPNC's Non-Volatile flash memory - As the active file in the IPNC's Operational memory.
Page 24 - Configuration Files The Manager Application Opening/Saving Configurat ions Files Overview Configuration files can be opened in different ways as follows: • Retrieve the current .cfg file from the IPNC 's flash memory and open it in the Manager application.
The Manager Application The File Menu - Page 25 The File Menu Open This option (alternatively, you can use the file icon) extracts the currently operational configuration file(s) from the IPNC's flash memory (see page 23). If there are multiple IPNCs, then the window shown below is displayed.
Page 26 - The File Menu The Manager Application Save As This option allows you to name and save a file (with a .cfg ex tension). When working locally, the file is saved to both in the working directory (see Change Working Directory ) and in the IPNC. (If you are still using the default passwords, you will receive a warning.
The Manager Application The File Menu - Page 27 Offline This produces three further options that can be used to edit and save a configuration file that has previously been extracted from the IPNC. Used when configuration is to be carried out off line: Open F ile This opens a configuration file menu held in the Manager folder of your PC.
Page 28 - The File Menu The Manager Application RecvConfig This option extracts the currently active configuration file from the IPNC’s flash memory and sends it to the Manager's working directory on your PC. This guarantees that you have the current file to work on.
The Manager Application The File Menu - Page 29 Advanced Selecting this produces three options: Erase Config This restores the configuration in the units flash memory to the factory default and should only be used under the direction of an INDeX Business Partner.
Page 30 - The File Menu The Manager Application Backup/Restore This option contains two choices: Backup This allows you to create a back-up of a configuration ( .cfg and.bin file s) to a selected directory. Note that there is no confirmation when the process is complete.
The Manager Application The File Menu - Page 31 Remote Operation The Manager can be used to remotely configure multiple sites from a central location. This facility is a valuable engineering tool for off-site support and maintenance, enabling the configuration to be received, edited and sent back.
Page 32 - Introduction The Configuration Tree Functions The Configuration Tree Functions Introduction This Section describes each of the C onfiguration Tree functions in turn, explaining the meaning and purpose of all of the fields in the function def inition.
The Configuration Tree Functions The System Configuration Menu - Page 33 Addressing on the Local Subnet Before completing the System Configuration menu, the operation of the local subnet must be considered.
Page 34 - The System Configuration Menu The Configuration Tree Functions The System Configuration After editing the System Configuration it is advisable to reboot the IPNC (changes to the IP address are not effective until after a reboot – see pages 25 and 27).
The Configuration Tree Functions The System Configuration Menu - Page 35 The LAN1/2 Tab IP Address : The IP address of the IPNC. For static addressing (DHCP disabled), this is the actual address. For dynamic addressing, this is the start address from which the client address sequence starts.
Page 36 - The System Configuration Menu The Configuration Tree Functions The DNS Tab This configuration form is used to enter the DNS and WINS information that will be given to each host on LAN1 and LAN2 when the main unit is acting as the DHCP server on either or both LANs.
The Configuration Tree Functions The System Configuration Menu - Page 37 The Gatekeeper Tab Gatekeeper is an H.323 entity that provides address translation, control access, and sometimes bandwidth management to the LAN for H.323 terminals, Gateways, and Multipoint Control Units.
Page 38 - Line Functions The Configuration Tree Functions Line Functions There are two categories of line function, ISDN Lines and Virtual Private Network (VPN) lines. The ISDN line function allows different lines to be allocated to voice and data calls, if required, and for lines to be made members of a group for incoming call routing purposes.
The Configuration Tree Functions Line Functions - Page 39 Short Codes Tab Code – this field is used to match the received digits (in MSN format) to determine which line is used to complete the call. Short Codes fields can be up to eight digits long and can contain special ch aracters.
Page 40 - Line Functions The Configuration Tree Functions The Voice over IP Tab Gateway IP Address: Enter the IP address of the remote system. Voice Pkt. Size: This is the number of data bytes contained in a Voice Packet. Compression Mode: This defines the type of compression which is to be used on any Voice call on this Line.
The Configuration Tree Functions Line Functions - Page 41 VPN Lines VPN lines can be added by right-clicking in the Display Panel and clicking New . Line Number: The line number you wish to use - it must be unique. Telephone Number : Used to remember the telephone number of this line.
Page 42 - The ShortCode Function The Configuration Tree Function s The ShortCode Function The IPNC uses ShortCodes to control ISDN Line facilities and allow manipulation of MSN strings and ISDN Line selection. Short codes can be set up for global usage, against individual lines and/or users.
The Configuration Tree Functions The Unit Function - Page 43 The Unit Function The function lists all details of the IP NC and any connected WAN units.
Page 44 - User Configuration The Configuration Tree Functions User Configuration Each system User has a unique name and a profile defining its facilitie s. The User Configuration form is used to set-up these profiles. See SendConfig on page 27. Notes: 1.
The Configuration Tree Functions User Configuration - Page 45 The Source Numbers Tab The Source Numbers tab allows "trusted” originating phone numbers to be specified for a user. Calls from these numbers are accepted without verification, allowing direct access to data services.
Page 46 - Service Configuration The Configuration Tree Function s Service Configuration The Service tabs are used to set up details for external services to which local users have dialled access. Such services may be, for example, Internet services and applications at remote offices.
The Configuration Tree Functions Service Configuration - Page 47 The Service Tab The Service tab for Normal (Internet) services, shown below, allows you to set up the details for your account with your ISP. Name: The name of the service to be accessed.
Page 48 - Service Configuration The Configuration Tree Function s The Service form for WAN and Intranet For WAN and Normal (Intranet) services. The WAN Service tab also allows a password to be specified for incoming access, as shown b elow. The tab is the same in other respects as for Internet services.
The Configuration Tree Functions Service Configuration - Page 49 The Bandwidth Tab The IPNC provides both Multi-link and Bandwidth Allocation Control Protocol (BACP). Multi-link enables connection of multiple B-channels between routers. When configuring top-up bandwidth or ISDN fallback, Multi-link must be enabled by the PPP tab (see page 52).
Page 50 - Service Configuration The Configuration Tree Function s The IP Tab IP Address: This is the local device’s (IPNC's interface) IP address. Leaving the field blank or entering 0.0.0.0 means that the local device (the client) is assigned a dynamic address by the remote end (the server).
The Configuration Tree Functions Service Configuration - Page 51 The AutoConnect Tab The AutoConnect tab sets up the system to make regular calls at a specified interval to a remote service.
Page 52 - Service Configuration The Configuration Tree Function s The Fallback Tab The Fallback tab enables you to switch to another service, either automatically, as defined by a time profile, or manually.
The Configuration Tree Functions Service Configuration - Page 53 BACP : This selects BACP dynamic bandwidth allocation. Note that the Maximum Channels on the Bandwidth tab (see page 49) must be set to 2 or more if this option is selected.
Page 54 - Service Configuration The Configuration Tree Function s The Dial-In Tab The Dial-In tab only applies to WAN and Intranet services. It allows you to specify the source (incoming) numbers that are to be permitted to dial in to the service. Right-click in the Dial-In area to add numbers in the usual way.
The Configuration Tree Functions RAS Configuration - Page 55 RAS Configuration A Remote Access Service (RAS) is used to support dial-in services. Service access can be either digital / ISDN or by modem.
Page 56 - WAN Configuration The Configuration Tree Function s WAN Configuration A WAN port is used to connect one end of a leased line, i.e., a high-spe ed, permanent circuit. The configuration is simple as the IPNC automatically senses the line’s interface type (V24, V35 and X21).
The Configuration Tree Functions Time Profile Function - Page 57 Time Profile Function A series of Time Profiles can be defined and made available to the system . One of these can then be selected for inclusion in profiles for users and services, to specify, for example, when a user is permitted dial-in access to a RAS.
Page 58 - Firewall Configuration The Configuration Tree Functions Firewall Configuration A firewall is a means of restricting dialled access to and from a network, particularly at its interface with the Internet.
The Configuration Tree Function s Firewall Configuration - Page 59 Time Update Protocol (Time) – used to take the time of day from the Internet . DNS (Domain Name Server) – translates public names to IP Addresses Gopher – the predecessor of HTTP.
Page 60 - Firewall Configuration The Configuration Tree Functions The Custom Firewall Tab The Custom tab is used to include specific filter s in a Firewall profile. Each filter can allow new a session to be created for a specific address and protocol or it can be used to drop specific packets from passing across the link.
The Configuration Tree Function s Firewall Configuration - Page 61 Match Data : The required resultant value of the Match Mask calculation below. Note that the system pads the field with zeroes. Match Mask : This is a byte pattern that is logically ANDed with the data filtered from the packet.
Page 62 - IP Routing The Configuration Tree Functions IP Routing The IP Routing Form is used for setting-up routing for the IP network. When a user sets up a call to an external service, data on the local subnet for th e remote IP Address must be correctly routed to the particular Service.
How Do I? Page 63 How Do I? Within this How Do I ? section, full configuration guidelines are given for networking INDeX systems to provide IP connectivity and VoIP with proven INDeX telephony features.
Page 64 - Part 1 IP Connectivity How Do I? Part 1 IP Connectivity Introduction This section provides a number of IP c onnectivity examples for the IPNC. Most, but not, all of the following examples are suitable for VoIP traffic; the suita bility of a given configuration to support VoIP is shown.
How Do I? Part 1 IP Connectivity - Page 65 Remote Access The IPNC can be configured to provide Remote Access for both Dial-up and Dial- in IP connectivity.
Page 66 - Part 1 IP Connectivity How Do I? Task Description Step 1 Configure INDeX environment. Refer to the INDeX Programming Manuals for details. Program the INDeX to access the external line in the normal way. Step 2 Obtain configuration file The configuration file must first be obtained, modified and then submitted to the IPNC.
How Do I? Part 1 IP Connectivity - Page 67 Dial-in Access for PC Mo dem/ TA with Callback Using either an ISDN Terminal Adaptor (TA) or a analogue modem the remote PC will be configured to access resources on the Corporate network.
Page 68 - Part 1 IP Connectivity How Do I? Task Description Step 4 If callback is required miss this step and proceed to the next step Create a new User Assign the following parameters to the user tab. • Name = Username • Password = password • Confirm = password • tick the “Dia l In On” option on Dial In tab.
How Do I? Part 1 IP Connectivity - Page 69 Digital Services Two examples for digital services are proved as follows: • IP connectivity DPNSS/QSIG/PRI/BRI • Homeworking/ Small Office (With IP Office). IP connectivity DPNSS/QSIG/PRI/BRI This configuration allows IP connectivity over Private Digital bearer services.
Page 70 - Part 1 IP Connectivity How Do I? Section One - INDeX Environment for IPNC Data call Multi Subscriber Numbering (MSN) cannot be used to route the inbound digits when INDeX is used in configuration with DPNSS or Qsig. Care must be taken when setting up INDeX as DPNSS and Qsig do not adhering to ARS entries.
How Do I? Part 1 IP Connectivity - Page 71 Task Description Step 4 On INDeX1(Calling node ) Assuming the remote node is 6002, and the Pilot is 6200 as configured above.
Page 72 - Part 1 IP Connectivity How Do I? INDeX Environment (S) Type – Data Call The following procedure should be used for the IPNC data call set up a cross DPNSS or Qsig link when using the IPNC S type interface. Because of this the configuration of the S type interface is more straightfo rward than that of T type interface.
How Do I? Part 1 IP Connectivity - Page 73 Section Two –IPNC Configuration This section details the configuration of the IPNC1 and IPNC2. Task Description Step 1 Configure INDEX environment using the (T) type interface option See INDeX Environment for IPNC Data call (page 70).
Page 74 - Part 1 IP Connectivity How Do I? Task Description Step 7 (optional) This step is optional and is only required if more than two ISDN bearer channels are required.
How Do I? Part 1 IP Connectivity - Page 75 Home Office / Small Office (With IP Office) This application example details the configuration for a Home Worker using an IP Office system to access the corporat e network for computing resources. In addition, this configuration forms the basis of Avaya’s Remote Log-on virtual terminal feature.
Page 76 - Part 1 IP Connectivity How Do I? Task Description Step 1 Configure INDEX environment using the (T) type interface option (see page 70). The configuration must ensure the DDI digits <396010> are routed to the IPNC line card. Step 2 Test INDeX configuration for both Units.
How Do I? Part 1 IP Connectivity - Page 77 Task Description Step 7 (optional) This step is optional and is only required if two ISDN bearer channels are required.
Page 78 - Part 1 IP Connectivity How Do I? WAN with Lease Lines These configuration examples provide for IP connectivity between two sites using X21, V34 lease line point-to-point circuits.
How Do I? Part 1 IP Connectivity - Page 79 Task Description Step 4 For both Unit1 and Unit 2 create a new WAN Service type and add the following: Parameter Unit 1 Unit2 Name wan_link wan_link Account Name wan_link wan_link This configuration does not require a password See The Service Tab WAN and Intranet on page 47.
Page 80 - Part 1 IP Connectivity How Do I? Advanced WAN set-up The advanced WAN configuration detailed below provides the same connectivity as the previous example (Quick WAN set-up). This example allows the connection to be authenticated in bot h directions using CHAP.
How Do I? Part 1 IP Connectivity - Page 81 Task Description Step 3 Obtain configuration file for Unit2 and perform the following tasks: 1. Create a Normal service type • Name = unit2 • Account name = unit1 • Password = password1 • Encrypted Password = select ed 2.
Page 82 - Part 1 IP Connectivity How Do I? Task Description Step 5 Add the following routing entries. Unit1 • IP Address = 192.168.50. 0 • IP mask = 25 5.255.255.0 • Destination = wan_link Unit2 • IP Address = 192.168.200.0 • IP mask = 25 5.
How Do I? Part 1 IP Connectivity - Page 83 Frame Relay This example demonstrates the procedure for the configuration of the IPNC software Level 3.2 for operation on a Frame Relay Network. The configuration uses PPP encapsulation and is suitable for VoIP traffic (see page 89) and interoperation with 3 rd Party routers (see page 88) 192.
Page 84 - Part 1 IP Connectivity How Do I? Task Description Step 1 Attach WAN cable, reboot unit and obtain configuration. In order to configure the WAN interface IPNC requires the WAN cable to be attached at boot up.
How Do I? Part 1 IP Connectivity - Page 85 LAN When using an indirectly connected WAN or VPN router these devices should be capable of handling marked traffic at a priority to ensure prompt handling of voice traffic. Alternatively, over supplying the available bandwidth will ensure that all packets, voice and data, are handled quickly.
Page 86 - Part 1 IP Connectivity How Do I? Task Description Step 2 Obtain configuration file and apply the following settings to the LAN1 interface of the IPNC systems on both Sites 1 and 2: Site 1 • LAN1 IP address Site 1 = 192.168.42.1 • IP Mask = 255.
How Do I? Part 1 IP Connectivity - Page 87 LAN –Two INDeX System - Single Site The configuration outline below provides the VoIP connectivity for an extended Ethernet LAN operating at 10/100Mbs. Thi s application does not provide any connectivity for non-voice traffic.
Page 88 - Part 1 IP Connectivity How Do I? QoS over WAN between IPNC & 3rd Party Router IPNC QoS is fully compliant with 3rd party router manufacturers that support Link fragmentation using PPP Multilink and IP Header compression (IPHC) (RFC 2507 and RFC 2508).
How Do I? Part 2 Voice Over IP - Page 89 Part 2 Voice Over IP Introduction When configuring VoIP it is recommended that the task is broken into the following 6 steps. Approaching the configuration in this way allows the configuration to be tested and proved phase by phase.
Page 90 - Part 2 Voice Over IP How Do I? Step 1- INDeX environment This step details the requirements for setting-up INDeX to INDeX telephony. IPNC channel type From INDeX software Level 10.0+ the IPNC channels can be optionally configured as either Trunk (T type) or Subscriber (S type).
How Do I? Part 2 Voice Over IP - Page 91 (S) Type The IPNC S type interface must be used in the case where there are IP Endpoints directly attached to the LAN interface of the IPNC. The S type channels can also be used to provide IP connect ivity between INDeX systems when simple call features or non-voice IP connectivity is required.
Page 92 - Part 2 Voice Over IP How Do I? INDeX Net INDeX-Net is required to support user to user across INDeX systems and currently provides the following features.
How Do I? Part 2 Voice Over IP - Page 93 Configuration The following procedure details the configuration of the INDeX for VoIP support of the Home worker.
Page 94 - Part 2 Voice Over IP How Do I? The screen shot below shows an INDeX Route list configuration form created from the instructions in the table above.
How Do I? Part 2 Voice Over IP - Page 95 Part 2- IPNC and IP401 VPN line configuration To complete the configuration for Remote logon a VPN Line is required on the IPNC and the IP401 (see page 99 for details on VPN line configuration).
Page 96 - Part 2 Voice Over IP How Do I? Configuration Task Description Step 6 How to login remotely The configuration described above uses the default Remote Login number 18.
How Do I? Part 2 Voice Over IP - Page 97 Step 3 - Configure IP Connectivity Configure the IPNC for the appropriate IP connectivity option. IP Connectivity Options LAN 10/100 Ethernet The IPNC transmitted VoIP packets to LAN are distinguish with the TOS field setting.
Page 98 - Part 2 Voice Over IP How Do I? Configuration The following configuration task list details the necessary ste ps to enable QoS configuration and IPNC systems. QoS interoperation with Third party router relies on the successful negotiation of the PPP protocol options.
How Do I? Part 2 Voice Over IP - Page 99 Step 5 - Configure VPN Line The VPN Line Group ID is an absolute reference to VPN line. It is permissible for 2 VPN lines to share the same Line ID in case where redundancy is requ ired.
Page 100 - Part 2 Voice Over IP How Do I? Configuration Task Description Step 1 At Site 1, define a VPN line (see page 41) and assign VPN Line number to remote node number. Repeat process for Site 2. • Site 1 Line Number = 2 • Site 2 Line Number = 3 The VPN line number provides discriminator to other line Groups.
How Do I? Part 2 Voice Over IP - Page 101 Bandwidth Requirements Calculations When considering the deployment of VoIP, establish the goals for data and voice integration and determine the main traffic types the integrated network is expected to support.
Page 102 - Part 2 Voice Over IP How Do I? Examples Calculation for G729 without Header compression on a PPP link: ((4 + 20 + 8 + 12 + 20)* 50 * 8) = 64 * 50 * 8 = 25600 Calculation for G729 with Header compression on a PPP link: ((4 + 7 + 20)* 50 * 8) = 31 * 50 * 8 = 12400 The table below provides a quick reference for these calculations.
How Do I? Part 2 Voice Over IP - Page 103 Step 6 - Test end-to- end Voice and Data Once IP connectivity and VoIP have been configured, it is now important to prove the configuration. If the configuration is successful, there must not be an y reduction in VoIP quality when VoIP and non-voice traffic are mixed on the link.
Page 104 - Part 2 Voice Over IP How Do I? Function Method PPP LCP Config-Ack(2) id=1 len=31 MagicNum=0003709c Protocol field compression MRRU=1500 ShortSeq EndPointDiscrim=mac 00e0070045aa MultiClass=.
How Do I? Part 2 Voice Over IP - Page 105 Function Method Called[8400] Type=SubscriberNumber (4) Bchan: slot=0 chan=2 IE CMIETxChannelAudio (1) comptype=G729A8K (6) pktsize=20 ipaddr=192.168.42.99 port=49178 IE CMIERxChannelAudio (2) comptype=G729A8K (6) pktsize=20 ipaddr=192.
Page 106 - Part 2 Voice Over IP How Do I? Configuring VoIP The following example of a VoIP network features INDeX to INDeX as well as a Home Office / Small Office. This allows VoIP calls to support 'user to user' features that are normally specific to DPNSS.
How Do I? Part 2 Voice Over IP - Page 107 Use the following step by step procedure to configure the network shown above. Refer to the appropriate sections for details of the configurati on tasks. Task Where to go ? Step 1 Configure INDeX environment for INDeX1 and INDEX 2.
Page 108 - Part 2 Voice Over IP How Do I? Home Office / Small Office This new technology not only benefits business expansion, it also facilitates work force mobility.
Appendix A: General Information Internet Acce ss - Page 109 Appendix A: General Information Internet Access Internet access offers a number of business benefits - email and the exchange of multimedia information, access to all kinds of services and information, and the opportunity to create a global presence with your own web site.
Page 110 - Internet Access Appendix A: General Information The Corporate Intranet Intranets offer a number of business benefits: – Dispersed locations can be connecte d, flexibly and cost-effectivel.
Appendix A: General Information Internet Access - Page 111 The company’s headquarters is the main platform. The INDeX provides a WAN link to a regional office. Smaller sites use ISDN dial-in a ccess and an Avaya IP Office for access as and when required.
Page 112 - Internet Access Appendix A: General Information Data Routing Two examples of data services are shown in the figure below. In the first example, to specify a destination for data sent back from the Internet, it is only necessary to define a Service for the outgoing call and its associated IP routing.
Appendix A: General Information Internet Access - Page 113 Example To set up the Service at Welwyn and the corresponding RAS at Edinburgh, it is assumed that the service is to operate as an ISDN service rather than a WAN or Intranet service: 1. Define the Type of Service at Welwyn.
Page 114 - Internet Access Appendix A: General Information 4. Set Up the RAS at Edin burgh. Select RAS from the Configuration Tree. Right-click in the summary area and select New from the toolbox. Enter the MSN digits that identify this RAS into the Extension Field.
Appendix A: General Information Security - Page 115 Security The IPNC provides a number of measures for the protection of your data and systems against intrusion – either unint entional or malicious – from both the Internet and unauthorised dial-in users.
Page 116 - Security Appendix A: General Information Security Implementation - A Dial-In User To illustrate a straightforward but effective securi ty implementation, the worked example that follows is the case of a network administrator who is on call to provide network support at weekends.
Appendix A: General Information Security - Page 117 3. To set up the User profile, select User from the Configuration Tree and right-click in the summary area. Select Add from the toolbox. Enter the user’s Name and a descriptive Full Name for reference.
Page 118 - Voice-Over-IP Appendix A: General Information Voice-Over-IP The IPNCs Voice-over-IP (VoIP) technology enables a data network to carry voice traffic along with data. Support of compression, Quality of Service (QoS) and echo cancellation technology ensures that speech quality is optimise d.
Appendix B: Concepts Configuring da ta routing on the IPNC - Page 119 Appendix B: Concepts Configuring data routing on the IPNC The diagram below shows the basic concept of inbound an d outbound data call configuration on the IPNC.
Page 120 - Configuring data routing on the IPNC Appendix B: Concepts Callback The following table shows the supported IPNC Callback types. Callback Option Description Disable (Default) Callback is not.
Appendix B: Concepts Configuring da ta routing on the IPNC - Page 121 IP Routing A routing entry must exist to support an inbound / outbound connection. The following are the routing entry types that are found on the IPNC. System-Hidden routes are present in the system but are not visible in the con figuration.
Page 122 - Configuring data routing on the IPNC Appendix B: Concepts Dynamic IP parameter allocation The IPNC’s mode of operation for the DHCP Se rver is configured in the System Configuration form box. With Server selected, IP addresses are allocated both to the LAN using DHCP and to dial in users during PPP link establishment.
Appendix B: Concepts Voice Over IP Basics - Page 123 Voice Over IP Basics The diagram below shows the components in a H323 network and shows the IPNC and the INDeX platform offering the components of a VoIP network.
Page 124 - Voice Over IP Basics Appendix B: Concepts Gatekeeper Terminals are the LAN client endpoints that provide real time two way communications. When an endpoint is switched on, it perfor ms a multicast discovery for a gatekeeper and registers with it.
Appendix C: Overview of IP Routin g IP Addresses & Subnets - Page 125 Appendix C: Overview of IP Routing IP Addresses & Subnets Each computer/host is given a unique number or “IP Address”. The address is 32 bits long e.g. 11000000101010000010101000000 001.
Page 126 - Domain Name System (DNS ) Appendix C: Overview of IP Routing Domain Name System (DNS) This is the system used on the Internet to match computer/host names to IP addresses. Each host on the Internet has an IP address, rather than having to remember these IP addresses we use names like www.
Appendix C: Overview of IP Routing Address ranges - Page 12 7 Address ranges The following addresses will never appear on the Internet and are thus free for use in your private network. – 10.0.0.0 – 172.16.0.0 through 172.32.0.0 – 192.168.0.0 through 192.
Page 128 - Firewall Rules Appendix C: Overview of IP Routing Firewall Rules 1. The default behaviour for incoming session is to block, unless a specific entry exists to forward the session. 2. ICMP are blocked for incoming sessions by default may not be forwarded 3.
Appendix C: Overview of IP Routing Netw ork Address Translation (NAT) - Page 12 9 Network Address Translation (NAT) NAT is a mechanism that allows IP addressing scheme to be hidden from any TCP/IP network to which TCP/IP traffic is routed.
Page 130 - Introduction Appendix D: Use Of The Serial Port Appendix D: Use Of The Serial Port Introduction The serial port is used, in an emergency, to erase the IPNC configuration or the operational software.
Appendix D: Use Of The Serial Port Erasi ng/Re-Installing Operational Software - Pa ge 131 Erasing/Re-Installing Operational Software It may be necessary to carry out this procedure because the software is corrupted.
Page 132 - Troubleshooting Appendix D: Use Of The Serial Port Troubleshooting If the response fails because the configuration file is unavailab le, e.g.: : Received BOOTP request for 00e007000123 192.168.42.1 IPNC.bin : Sending BOOTP response for 00e007000123 192.
Appendix E: Cables DTE Cable - Page 133 Appendix E: Cables This section provides information about the cables that are used with IPNC. All of the following cables are for internal use only. All structured cabling/site wiring must conform to all lo cal regulations.
Page 134 - LAN Cable Appendix E: Cables LAN Cable A B C D A RJ45 Plug. B RJ45 Plug. C Cat 5 UTP cable - GREY . D 3 meters. Pin Connections End A Color Cable Notes End B 1 White/Orange 1 2 Orange/White.
Appendix E: Cables LAN Crossover Cable - Page 135 LAN Crossover Cable A B C D A RJ45 Plug. B RJ45 Plug. C Cat 5 UTP cable - BLACK . D 3 meters. Pin Connections End A Color Cable Notes End B 1 White/Orange 3 2 Orange/White Twisted Pair 6 3 White/Green 1 6 Green/White Twisted Pair 2 STP Cable Drain Wire.
Page 136 - V.24/V.28 WAN Cable Appendix E: Cables V.24/V.28 WAN Cable A B C D E A 37 Way D-Type Plug with UNC 4-40 locking screws. B 25 Way D-Type Plug with UNC 4-40 locking screws.
Appendix E: Cables X.21 WAN Cable - Page 137 X.21 WAN Cable A B C D E A 37 Way D-Type Plug with UNC 4-40 locking screws. B 15 Way D-Type Plug with M3 locking screws.
Page 138 - V.35 WAN Cabl e Appendix E: Cables V.35 WAN Cable A B C D E A 37 Way D-Type Plug with UNC 4-40 locking screws. B 34 Way MRAC Plug. C Label D 10 twisted pair screened cable - each core is 7/0.
Page 139 Glossary Glossary BACP Bandwidth Allocation Control Protocol is a dynamic bandwidth allocation technique that enables, if utilisation of the channel s already present exceeds a specified threshold value, the connection of additional channels.
Page 140 Glossary Glossary (Cont.) Flash Completely delineated, flash is a solid-state, non-volatile, re-writable memory. Much like RAM (Random Access Memory) flash uses memory cells to store electronic bits of data, but flash differs from RAM in two respects.
Glossary Page 141 Glossary (Cont.) IRC Internet Relay Chat. A s ervice that enables an Internet users to participat e in a conversation on line in real time with other users. An IRC channel, maintained by an IRC server, transmits the text typed by each user who has joined the channel to all other users who have joined the channel.
Page 142 Glossary Glossary (Cont.) Router An interface between two networks. A Route is the path a packet takes over a network. It is the responsibility of the router to find the best route between two networks. Router based firewall This is a packet filtering firewall.
Index Page 143 INDeX IPNC Cassette Administration Manual Index - Page 143 38DHB0002UKDD – Issue 7 (22/11/02 ) A Applicatio n ...................................................................... 141 B Bootp .........................................
Performance figur es and data quoted in this document are typic al, and must be specificall y confirmed in writin g by Avaya before they become applicable to any p articular order or contract. The company reserves t he right to make alterations or ame ndments to the detailed specif ications at its discretion.
Een belangrijk punt na aankoop van elk apparaat Avaya 38DHB0002UKDD (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen Avaya 38DHB0002UKDD heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens Avaya 38DHB0002UKDD vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding Avaya 38DHB0002UKDD leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over Avaya 38DHB0002UKDD krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van Avaya 38DHB0002UKDD bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de Avaya 38DHB0002UKDD kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met Avaya 38DHB0002UKDD . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.