background image

 

Appendix B:  SIP Overview

501

 

User Agent Server (UAS):

  The UAS receives the methods, processes them, 

and generates responses (e.g., it sends a 200 Ok response to indicate a success-

ful session).  The UAS may issue multiple responses to the UAC.

User Agent Clients

The UAC is often associated with the end user, since applications running on systems 

are used by people.  The UAC can be any end-user device, such as a cell phone, mul-

timedia handset, personal computer (PC), personal digital assistant (PDA), or a soft-

phone.

The requests generated by the UAC are sent to a server (typically a proxy server) and are 

known as “methods,” which will be discussed later.

Note

:  Non-IP devices like dumb phones can also be turned into SIP UAs by using an 

inexpensive analog telephone adapter (ATA) to make them SIP-aware. An ATA is a 

box with one or two analog ports with RJ11 jacks used for connecting regular analog 

phones to the VoIP network. Popular ones include the SIPura or Linksys PAP2.

User Agent Servers

Servers possess a predefined set of rules to handle the requests sent by clients and are 

usually part of the network.  There are several types of servers:

Proxy Server

— Proxy servers help track down addresses of recipients whose exact ad-

dresses are not known in advance.  If the proxy server cannot find the address of the 

recipient, it will send the request to other proxy servers.  Destinations include another 

extension on the same proxy server, the next-hop proxy server in the routing table, or a 

media server.  SIP proxy servers use presence services to track users, which means users 

can be located regardless of their physical location. Proxy servers are the most common 

server in the SIP environment.   

Registrar Server

— A SIP registration server is responsible for registering devices.  It 

does this by authenticating the device with a user name and password and keeping a 

table of IP addresses and extensions/phone numbers.  This authentication process is 

similar to logging into a web server, which requires a user name and password.  The 

registrations server makes it possible for users to alter the address at which they are 

contactable. Registrations play an important role in the process since SIP devices that 

Summary of Contents for ONE IP

Page 1: ...Deploying the snom ONE IP Telephone System Technical Manual Kevin Moroz and Robyn Wright Printed by Puritan Press Inc Hollis New Hampshire USA Version 1 1...

Page 2: ...are legally protected trademarks of snom technology AG Other mentioned trademarks or registered trademarks are the property of their respective manufacturers or owners Product specifications are subj...

Page 3: ...n the telecommu nication industry during the past 9 years Previously a software engineer at Pancredit he worked on several major projects within the financial industry He transitioned from fi nancial...

Page 4: ......

Page 5: ...ial Plans 147 6 Extensions 161 7 Park Orbits 177 8 Service Flags 181 9 Auto Attendant 193 10 Hunt Groups 215 11 Agent Groups 225 12 Paging 251 13 Conferencing 259 14 IVR Node 271 15 Calling Card Accou...

Page 6: ...ystem vi Part III The User Interface 23 Web Interface 399 24 Star Codes 425 25 Voicemail 447 26 Cell Phones 459 Appendix A Working with CSV Files 475 Appendix B SIP Overview 499 Appendix C snom ONE an...

Page 7: ...Activating Your License 17 Upgrading the Software 17 Manual Software Upgrades Windows 18 Mac OS Upgrades 19 Linux Upgrades 20 Restarting the System 20 Restarting From Windows Service Control Manager 2...

Page 8: ...Ports 56 SNMP 58 TFTP 59 LDAP 60 Logging 60 General Logging 61 Specific Events 62 SIP Logging 63 Configuration 66 Save Restore a Backup 66 Request Configuration 67 Reload Configuration Files 67 Schedu...

Page 9: ...e System Routes a Call to the Proper Extension 119 Basic Routing 119 When Regular Expressions are Involved 121 Regular Expressions and Direct Inward Dialing DID 124 Outbound Calls 127 Caller ID 127 Ge...

Page 10: ...Working with Default Extensions 162 Importing Multiple Extensions Bulk 164 Creating a Few New Extensions 164 Before Registering the Extension 167 Administrator Only Settings 167 Registration Settings...

Page 11: ...vice 204 Dial by Name 205 Direct Destinations 205 Nesting Auto Attendants 207 Welcome Greetings 209 Overview 209 Recording the Greeting 209 Filing System and Naming Conventions 211 10 Hunt Groups 215...

Page 12: ...IP Addresses to IP Phones 256 13 Conferencing 259 Scheduled Conferences 261 Creating a Scheduled Conference Account 261 Scheduling a New Conference 263 Modifying Scheduled Conferences 265 Moderating...

Page 13: ...295 Adding Email Accounts to the System 299 Receiving Email Notifications from the System 303 Types of Email Notifications 303 CDRs to Email 304 CDRs for Trunk Activity 304 CDRs for Your Extension Onl...

Page 14: ...ay Checklist 345 Configuring the Administrator Settings 345 Configuring the Domain Settings 346 Creating an Authentication Password 348 Setting up the Domain Address Book 349 Configuring the Button Pr...

Page 15: ...hird Party Software Vendors 390 CDR to CSV 391 CDR to Email 392 CDR to Simple TCP 392 CDR to SOAP XML 395 Part III The User Interface 23 Web Interface 399 Logging in 399 Extension Settings 401 General...

Page 16: ...ding Calls 435 Hot Desking 70 435 Call Forward All Calls 71 72 437 Call Forward on Busy 73 74 437 Call Forward on No Answer 75 76 438 Do Not Disturb 78 438 Set Night Mode for Domain Accounts 80 439 Ca...

Page 17: ...4 Via Email 454 Via Cell Phone 455 Voicemail Feature Codes 455 Send Voicemail to Email Account 95 96 455 Go to Voicemail 97 456 Go to Group Mail 97 456 Clear Message Waiting Indicator 99 458 26 Cell P...

Page 18: ...e Address Book to CSV 491 Changing the Field Separator and Validating the File 493 Importing the CSV File 494 Importing a CSV File for the Extension Account 494 Importing CSV Files for Domain Address...

Page 19: ...Part I Getting Started...

Page 20: ...Part I Getting Started...

Page 21: ...implemented in a back to back user agent or B2BUA so all traffic between two endpoints traverses the system Figure 1 1 This gives the system complete control of the call state and allows it to partic...

Page 22: ...ware based solution and executes several mea sures to preserve call quality A high scheduling priority is used with applications that are real time critical The snom ONE measures CPU usage and rejects...

Page 23: ...of the PBX The ideal scenario will be to have a dual core CPU wherein the PBX is bound to one of the cores This setting instructs the operating sys tem to run the PBX on the specified core eliminatin...

Page 24: ...rtified and meets European and U S health safety and environmental standards Unauthorized opening changing or modifying the device will cause the warranty to lapse and may also result in the lapse of...

Page 25: ...oducts ip pbx snom one Click the snom ONE free link at the top right corner fill out the form then click Submit Your per sonal download link will be sent via email check your spam folder Double click...

Page 26: ...an installation location or accept the default then click Next Note If you are installing the software on a 64 bit system the default directory path will be as follows 7 Click Next to start the instal...

Page 27: ...hen the installation is complete MAC OS Installations This section explains how to install snom ONE for Mac OS tested on Darwin Cur rently we support only Intel based hardware 1 Navigate to http wiki...

Page 28: ...Download the installation package 4 Unzip the zip file by double clicking it 5 Execute the installer contained in the zip file 6 At the Welcome screen click Continue 7 At the Important Information pa...

Page 29: ...nue the installation click Agree 10 To install snom ONE to the default directory click Install To install it to a new location click Change Install Location and select a location 11 At the password sc...

Page 30: ...en the installation is complete To log into snom ONE enter http localhost into a web browser If you are using a different HTTP port then enter localhost port e g localhost 80 Linux Installations Debia...

Page 31: ...ile onto your Linux box using the following command wget linklocation previously saved For example wget http downloads snom net snomONE debian snomone debian4 2011 4 2 0 3958 deb 4 To install the soft...

Page 32: ...System 12 The installed files are located in usr local snomONE as shown below If you need to uninstall snom ONE execute the following command apt get remove snomone Cent OS 1 Go to www wiki snomone c...

Page 33: ...wget linklocation previously saved For example wget http downloads snom net snomONE centos32 snomone CentOS5 2011 4 2 0 3958 bin 4 To make the file executable once the download is complete enter the...

Page 34: ...CentOS5 2011 4 2 0 3958 bin uninstall Logging In Once the software has been installed the snom ONE will run as a service To access it bring up a browser from the machine on which the software has bee...

Page 35: ...ONE includes three main login levels administrator domain administrator and user that provide access to different web interfaces The login levels are shown in Figure 1 2 and the web interfaces for eac...

Page 36: ...omatic For system administrators If you are logging in as an administrator use the following account information to log in Account admin Password The password field is blank by default Login Type Auto...

Page 37: ...tab then click License as shown below 3 Enter your activation code into the Code box the activation code is located on the back cover of this book near the Product key barcode Upgrading the Software S...

Page 38: ...sy system will show active calls on the system graphs Another way to determine how many active calls are on the system is to check the call list from the domain settings click Status Calls Manual Soft...

Page 39: ...ing directory 5 Rename the new file pbxctrl exe 6 Restart the system Mac OS Upgrades To upgrade snom ONE on a MAC navigate to wiki snomone com select Downloads and follow the Mac OS installation instr...

Page 40: ...recommend you do a full backup of your usr local snomONE directory before doing the update Debian 1 Download the correct installer for your platform 2 Execute the following command with root privileg...

Page 41: ...ing Started 21 Restarting From Windows Service Control Manager 1 Right click My Computer 2 Click Manage 3 Click Service Applications then click Services 4 From the right hand pane click snomONE PBX 5...

Page 42: ...Mac is to restart the Mac but this may not be desirable in many cases In such cases you can start and stop snom ONE from the command line Library StartupItems snom snomone stop Library StartupItems s...

Page 43: ...ts to write the error message to the log file in accordance with the log_filename parameter contained in the pbx xml file however if the pbx xml file has not been set up properly or if the system cras...

Page 44: ...he following sample shows a problematic value in the log_filename field To change the value open the pbx xml file using an XML editor Click in the text and replace it with log txt Technical Support Te...

Page 45: ...elp To access online help click the Help link at the top of each page Forums To join the forum go to forum snom com Submit a Ticket To submit a ticket or view existing tickets go to support snom com a...

Page 46: ...g ging monospace File and directory names examples of program code command strings and user input The default recording name is r d t i u n wav Place the file into the recordings directory A typical d...

Page 47: ...Part II Administering the System...

Page 48: ...Part II Administering the System...

Page 49: ...the domain This setup enables the administrator to assign responsibilities related to user accounts and other non system related settings to another individual without compromising system configuratio...

Page 50: ...Telephone System 30 To access the administrator settings 1 Log in as admin The following screen will be displayed 2 Click Admin The new screen includes the four tabs shown below These tabs can be see...

Page 51: ...ol Figure 2 2 Outline of Adminstrator Web Interface The following table provides an overview of the various topics that are available from the administrator s view of the web interface These topics ar...

Page 52: ...m this page you can provide parameters to change the gen eration of plug and play files Access You can control which IP addresses may access the snom ONE service here Domains From the Domains tab the...

Page 53: ...ctory Tree While most of the system settings can be configured from the web interface the admin istrator will need to access the file system at times This section provides a brief overview of the file...

Page 54: ...settings which cannot be changed this way Changes to this file must be made through either the XML file or by handcrafting a URL that contains the change With either method the three important compon...

Page 55: ...contain those characters there will be a conflict Folder Overview Table 2 2 lists the folders that are located in snom snomONE Table 2 2 Folder Details Folder Name Contents accesslist IP addresses tha...

Page 56: ...tion html Customized HTML files hunts Account information about hunt group accounts ivrnodes Information about each IVR node account messages Voicemail messages mohs Available music on hold sources pn...

Page 57: ...folder contains IP addresses that have been blocked from accessing the snom ONE service IP addresses can be blocked unblocked by the administrator in Admin Settings Access List acds The acds folder c...

Page 58: ...related ex Extension related mb Mailbox pb ACD related wk Time related Note 1 The directory suffix corresponds with the language of the prompts themselves i e English prompts are contained in audio_e...

Page 59: ...ble parameters for the ac count and any values assigned to those parameters cdr The cdr folder contains the CSV CDRs if there are any cdre The cdre folder contains CDRs that hold extension related inf...

Page 60: ...ameters for the account and any values assigned to those parameters dial_plan The dial_plan folder contains an XML file for each dial plan on the system dial_plan_entry The dial_plan_entry folder cont...

Page 61: ...ameters ivrnodes The ivrnodes folder contains the details of all IVR node accounts Each file includes the possible parameters for the account and any values assigned to those parameters messages The m...

Page 62: ...unt a DID number is considered an alias users The users folder contains an XML file for every account on the system DIDs are not considered a separate account wipers The wipers folder contains confere...

Page 63: ...luence this setting are ringback wav and busy wav These files are located in the audio_ directory The represents a language identifier code see Table 18 5 for a list of the languages that are supporte...

Page 64: ...t it can be changed and we recommend doing so Password This field sets the password for the user name from the previous setting By default no password has been set so be sure to set one This pass word...

Page 65: ...length of time a web session will stay active before it times out The duration is set in seconds and the default value is 3600 1 hour Increase or decrease this setting depending on whether you want th...

Page 66: ...size A Call Detail Record CDR is a record that is produced by the system and contains the details of calls that have terminated on the system CDRs include the date and time the call started the number...

Page 67: ...ield to specify the IP address or the host names that are permitted to make SOAP requests to the system i e management system If you want to allow multiple systems to send SOAP requests use a space to...

Page 68: ...ased rows under domains page This setting allows you to control whether the alias account of your domain will be displayed on the Domains page When this setting is set to No the list of domains will i...

Page 69: ...r the disadvantage with this ap proach is that the whole process gets stuck for some time while moving the processes from one CPU to another If during that time the CPU should play out media it will c...

Page 70: ...t is behind NAT the system uses this setting to control the registration The system registers agents that use the UDP transport layer only for a short time so that the user agents will re register qui...

Page 71: ...h to the short header form Listen to sip mcast net SIP has its own multicast group according to RFC 3261 A SIP device usually knows where to send requests but during bootup and configuration a user ag...

Page 72: ...must detect such a loop In environments where an external SIP proxy routes the call from one snom ONE domain to another a simple loopback detection that is based on the call ID is too pessimistic Ther...

Page 73: ...the IP address e g 2001 db8 4 5060 If you are specifying only the port number the system will bind to all IPv4 and IPv6 addresses on the system If you want to bind only to IPv4 sockets use the form 0...

Page 74: ...ault HTTPS port is 443 SIP Ports In this section you can provide specific port information for the SIP protocol SIP can run on UDP TCP or TLS TCP and UDP send the SIP packets unencrypted and are there...

Page 75: ...h is not on a public IP address In this case when the sys tem builds the remote SIP packets it will use the public IP address of the router The setting should include a list of local IP addresses and...

Page 76: ...rt range so that you have enough ports for all open calls A port range of 100 ports is not unusual Most user agents send RTP media data from the same port on which they expect to re ceive data This is...

Page 77: ...x removing it from use The system comes with recommended high quality codecs like G 711 law 0 G 711 A law 8 G 722 9 G 726 2 or GSM 6 10 FullRate 3 Codecs can be changed without restarting the service...

Page 78: ...NMP Port The SNMP port setting defines the port on which the system will listen for SNMP requests By default the port is 161 SNMP trusted addresses This field lists the IP addresses that may send SNMP...

Page 79: ...1 15 x Trunk status Yes SIP response code 1 3 6 1 4 1 25060 1 16 Uptime Yes Seconds 1 3 6 1 4 1 25060 1 17 Disconnects no media Yes Calls 1 3 6 1 4 1 25060 1 18 Disconnects media timeout Yes Calls TF...

Page 80: ...cannot reach the Internet then a local NTP server is necessary A popular publicly available NTP server is pool ntp org LDAP LDAP Lightweight Directory Access Protocol is an Internet protocol used to...

Page 81: ...If you enter a dollar sign into the log filename highly recommended the system will replace the dollar sign with the current day and automatically generate a new file everyday This will ensure that t...

Page 82: ...ents These events are of general interest for example informa tion about the working directory Log SIP events Events in this module relate to the SIP traffic of the system Log media events The system...

Page 83: ...tion related to plug and play Log TLS events This module logs TLS related messages in the log file Analyze audio levels CPU intense This feature measures the audio levels on a call leg The volume is m...

Page 84: ...ng call e g INVITE CANCEL ACK BYE When you enable the logging for one of the previous categories the SIP packets will be logged on log level 7 If your log level is below 7 the packets won t show up in...

Page 85: ...ttings Logging 2 Set Log Level to 7 3 Set Log Length to 300 4 Under Specific Events enable the following settings Log general events Log SIP events Log trunk events 5 Under SIP Logging enable Log Othe...

Page 86: ...ckup This backup will make a TAR backup of the whole configuration including audio recordings Because the file might get potentially large you should perform this ac tion in times when there is not to...

Page 87: ...ovide a value similar to 384000000 for 384 MB Request Configuration The system may receive its configuration information from a service provider Be espe cially careful when using this feature because...

Page 88: ...le is used to describe the files that are available for plug and play This file also defines various parameters for different phone models and vendors see Table 20 3 Schedule a Reboot To schedule soft...

Page 89: ...ficate Also some IP phones accept SIP traffic only on connections that have valid certificates While the user of a web browser can just click and accept the certificate a user of a phone usually does...

Page 90: ...ilt in web client when assessing whether or not it can trust the server it is connecting to 4 Trusted Root CA for client authentication This certificate is used for client certificate authentication a...

Page 91: ...2 and 1024 bit certificates The system currently has trouble handling certificates with other sizes The security and the performance on these certificates is still reasonable The format of the certifi...

Page 92: ...im mediately You may specify IP addresses with their netmask and their policy If no match is found packets will be accepted System administrators might want to define who has access to the system for...

Page 93: ...s for the type If the type is Allow then the system accepts the packet If the type is Block then the system blocks that request If there is no match in the list then the request is accepted If the lis...

Page 94: ...dresses Table 2 6 Access List Scenario Address Net Mask Type Description of Result First entry 127 0 0 1 255 255 255 255 Allow This entry will ensure that you can always ac cess the HTTP interface fro...

Page 95: ...m Settings 75 Web Page Control Templates This page allows you to change the look and feel of the PBX web pages It also allows you to change the various email templates phone configuration templates st...

Page 96: ...rts of the welcome message e g the specific extension that has been created the language that has been set for that extension etc If these settings are not important and you prefer to send a static em...

Page 97: ...pmargin 0 margin height 0 marginwidth 0 p class normalText Hello new user You have been added to the snom ONE telephone system This email is sent automati cally Do not reply p body html Translation Al...

Page 98: ...er Page Control tab allows the administrator to control which fields are dis played on the user pages Figure 2 4 shows the general settings that can be hidden from the user These settings are detailed...

Page 99: ...ne Calls presence PAC watch field This setting impacts the following user settings Watch the calls of the following extensions This setting allows users to monitor the status of other extensions Some...

Page 100: ...ous callers reject them pretend to be busy ask for name etc In some situations administrators may prefer to determine how anony mous callers are handled Call forward on no answer timeout This setting...

Page 101: ...time before it goes to voicemail Maximum number of messages This setting allows users to set the number of message that will be saved in their mailboxes If space is an issue adminis trators may want...

Page 102: ...low the image Figure 2 7 Blockable User Settings Settings Email Send a mailbox message by email This setting allows users to send voice mail messages to their email accounts In situations where voicem...

Page 103: ...g and call park pickup A snom ONE domain name should be fully qualified and configured in the DNS server so that traffic can be routed to the proper IP address of the PBX If this is not possible then...

Page 104: ...nown as domain aliases However one of the names will be the primary canonical name for the domain The system will use that name whenever it has to generate a name for the domain Domain names may also...

Page 105: ...2 4 the IP address of the system Assigning a Domain Administrator Just as the system is managed so must the domain be This can be the role of the ad ministrator or a user who is assigned by the admin...

Page 106: ...te or delete accounts change dial plans and rates and so forth Permission is given from the Permission tab in the user s extension account To log in to the domain users will need to log in as Domain A...

Page 107: ...bs Web Interface Tab Description Settings Domain Settings This page allows you to configure the necessary settings for the domain From this page you can decide which dial plan lan guage and music on h...

Page 108: ...Trunks This tab provides a listing of the trunks that have been created on the domain New trunks can be created at this page and existing trunks can be edited and deleted Dial Plans This tab provides...

Page 109: ...mes with a preconfigured domain that includes ten 2 digit extensions and numerous domain accounts Figure 3 1 To view the accounts click Accounts List Figure 3 1 Default Accounts Note A yellow triangle...

Page 110: ...w domains copying an existing domain is the simplest method To do this you will need to create a tar file tar files are commonly used to collect many files into one larger file while preserving file s...

Page 111: ...Chapter 3 Administering the Domain 91 3 Click the link at the bottom of the page to save the domain 4 Click Save File 5 Browse to the location where the file will be saved...

Page 112: ...ow 7 Using the Primary Name field name the domain 8 Click Browse shown above and navigate to the tar file 9 Click Create 10 Once the page has finished loading click List The new domain will be listed...

Page 113: ...ault IVR Language This setting can be configured by the administrator and is not needed on the domain level in single domain environments Tone Language This setting can be configured by the administra...

Page 114: ...e system will interpret telephone numbers according to the NANPA scheme North American Numbering Plan Administra tion which means that international numbers will start with 011 and numbers that have 1...

Page 115: ...s used to specify whether the caller ID should be used to authenticate rather than asking users to enter their PIN numbers Emergency Numbers You can specify special destination numbers when an extensi...

Page 116: ...Header Value Output Example d The domain name of the calling source domain Company A e The domain name of the called desti nation domain called domain com n The original content of the header John Sm...

Page 117: ...supports several types of CDR generation formats apart from writing them into the pbx install dir cdr directory in XML format see the CDR URL setting on page 47 Billing Settings CMC authentication for...

Page 118: ...his setting in the settings for a spe cific extension If you plan to use cell phones with the system choose a longer voicemail timeout e g 30 seconds as the call setup time for a cell phone call can b...

Page 119: ...quires approximately 100 kb of disk space Based on this measurement you can record 165 hours of voicemail per gigabyte Voicemail PIN Digits This setting specifies the number of digits that will be req...

Page 120: ...ant to use an ex ternal voicemail system e g Microsoft Exchange 2007 2010 The setting requires a telephone number that can be dialed and can include replacement fields which are used in the caller ID...

Page 121: ...information before playing the mailbox message When this setting is enabled envelop information will be offered to the user while re trieving voicemail messages To retrieve the information the user ca...

Page 122: ...ccount Before set to No After set to Yes Accounts can be disabled and enabled using the Disable and Enable buttons at the bottom of the Accounts page Additional actions are shown in the dropdown Displ...

Page 123: ...the account in the accounts page When this set ting is activated the email address for each account if one is available will be displayed Display cell phone for the account in the accounts page When...

Page 124: ...This setting controls the recording on an extension applies to calls coming from another extension for the entire domain Record outgoing calls to internal numbers This setting controls the record ing...

Page 125: ...on and sending of CDR reports Send daily CDR report to The system sends daily CDR reports sample shown in Figure 3 2 to the email addresses listed in this field Use semicolons between multiple email a...

Page 126: ...g if you want the system to reset hot desking each day at midnight Reset Block CID As with the previous two settings this is another setting that is beneficial to reset each day at midnight Send email...

Page 127: ...that country For this reason extensions should not begin with a 1 User must press enter When this scheme is selected the user of the extension will be required to press the confirm button on the phone...

Page 128: ...when dial ing local numbers beginning with 604 or 778 you need to replace 2 7 with 2 5 in the file named snom_3xx_dialplan_usa3 xml assuming you are using a snom phone Authentication User Password Thi...

Page 129: ...the standard star codes CMC The CMC identifies the customer in the CDR report and is used to expedite billing in offices that bill their clients for phone calls such as law offices and other businesse...

Page 130: ...cally Contacts who call into an agent group can automatically be added to the address book see Add to the address book on page 232 Adding Contacts by Modifying DID Information When the system has been...

Page 131: ...Chapter 3 Administering the Domain 111 Searching for Contacts Web Interface Users can search for contacts by entering the contact s first or last name into the search box...

Page 132: ...elephone System 112 Phone Display If the administrator has enabled the User can select the address book setting Admin Web Page Control User Page Control users can also search through the domain addres...

Page 133: ...trunks were physical lines and the number of calls that could be placed was limited by the number of lines Figure 4 1 shows an example of a traditional trunk In this example a telephone switch is con...

Page 134: ...to the ITSP LAN SIP Phones Internal SIP Gateway Trunk Cell Phone Access SIP Registration Trunk External PSTN ITSP data router Figure 4 2 Using SIP Trunks for Communicating with External Networks The...

Page 135: ...s dynamically bound to the SIP registration which allows the registration to be used from any IP address Although service providers often assume that a trunk registration involves an IP phone or an AT...

Page 136: ...n the PSTN and the IP network Figure 4 4 Unlike the SIP registrations trunk the gate way model does not register It just sends the traffic to the destination In this model the system uses the caller I...

Page 137: ...ies a Trunk When a new call comes into the system the system must determine whether the call is an internal extension or an outside call that is configured to a trunk To do this it first looks at the...

Page 138: ...uses the priority shown in Figure 4 9 Note The domain name localhost matches any domain name presented in the Request URI The Request URI is a Uniform Resource Identifier that lists the user or servic...

Page 139: ...trunk Account name of trunk Domain name of trunk Trunk Settings Port DID Extension Settings 75 150 87 9 5060 Figure 4 9 Identifying Gateway and Proxy Trunks How the System Routes a Call to the Proper...

Page 140: ...extension 508 is associated with the incoming number and will route the call accordingly If no extension is associ ated with the incoming number the call will fail The number shown to the right of th...

Page 141: ...ned to Assigning a large number of DIDs to individual extension accounts however is cumbersome and can be expedited through the use of regular expressions direction inward dialing is discussed on page...

Page 142: ...ot used elsewhere in the setting string In the example shown in Figure 4 12 an exclamation mark has been used Note Expressions are written without any spaces 0 9 7 0 9 3 1 Delimiter Delimiter Delimite...

Page 143: ...eld extension 777 will be called Delimiter Delimiter Delimiter Delimiter Delimiter PATTERN REPLACEMENT 1 Numbers accepted Number of digits Expression used 0 9 3 Expression 1 Default to 777 t R URI Fig...

Page 144: ...100 This example is common in U S offices where it is typical to send all calls to an auto attendant This example assumes that the auto attendant is located on account 100 Example 4 1 0 9 1 u 100 This...

Page 145: ...00 101 etc the ending digits cannot be used as the extension numbers You will need to use the workaround shown in Option 2 Option 1 Clear pattern with a start number of 4 or higher If you have a batch...

Page 146: ...create extensions based on these numbers extensions should begin with 4 or higher As a workaround you will need to create aliases for the extensions and to save time this should be done when you creat...

Page 147: ...o a trunk it presents the source of the call usually the caller ID of the calling extension However in cases of redirected calls it can get more compli cated Here the original caller ID should be in t...

Page 148: ...Asserted Identity or Remote Party ID for the user phone flag When this flag is set those numbers will be used as the ANI Figure 4 15 ANI and user phone Flag However if the SIP URI does not contain the...

Page 149: ...setting As a last resort the system uses the DID number of the trunk if there is one This is a typical scenario in the NANPA area where a trunk has a primary num ber associated with it When someone c...

Page 150: ...cannot handle any other method The disadvantage here is clearly that any redirection information gets lost Remote Party ID This method is described in a draft that expired years ago however there is...

Page 151: ...unk type see Trunk Types on page 114 4 Click Create The following section shows you how to configure the trunk settings Configuring Trunks General Settings Trunks have a large number of settings For a...

Page 152: ...unauthorized calls Outbound only Enable this setting if you are using a trunk for outbound traffic only It makes it easier for the system as the trunk will not try to match inbound traffic to this tru...

Page 153: ...roxy field follows the definitions of RFC 3263 Locating SIP Servers You may use the fully qualified domain name FQDN for a SIP serv er If you add a colon with the port number after the FQDN DNS a reso...

Page 154: ...ne setting is used the system will reserve one line for each call When all lines are in use the system will reject further calls that attempt to use the CO line For example if you have a SIP trunk tha...

Page 155: ...ription of the phones on how to do this 13 Permissions to monitor this account Enter the extensions that are permitted to monitor this account 14 Override codec preference Use this setting to specify...

Page 156: ...ce the conversation begins When this setting is used snom ONE transcodes the stream so that changes made to the codec by the other side go unnoticed by the user agent 16 Proposed Duration s Use this s...

Page 157: ...eceiving ports creating an extremely NAT unfriendly situation While most implementations today use the same port number for sending and receiving RTP some gateways still insist on strict IETF compatib...

Page 158: ...e but not all service providers set this flag By turning on the In terpret SIP URI always as telephone number you make the system believe that this flag was set on the trunk call 24 Requires busy tone...

Page 159: ...a global alias name If the direction is not only inbound then other domains may use this trunk in their dial plans for outbound calls When this setting is disabled the system does not search for tel...

Page 160: ...place the call One example is when several PSTN gateways are available for terminating the call and one gateway does not accept any more calls Another example is when you first try to route the call...

Page 161: ...s to a local PSTN gateway you might decide to treat this call as a secure call Incoming calls with the SIPS scheme will ask the snom ONE system to ensure that the call be kept secure end to end 33 ICI...

Page 162: ...asking the operator to fix the problems with early media Connecting Branch Offices Together This section describes how to connect two snom ONE systems together so that calls between the two locations...

Page 163: ...ices Using a Gateway Trunk Create a trunk for each branch office using the instructions that are shown below Branch Office 1 1 From the Type dropdown select SIP Gateway 2 Enter the IP address into the...

Page 164: ...ead office has a pubic IP ad dress and a remote branch office has only one public IP address and requires that the system be on a private address but still wants to have connectivity back to corporate...

Page 165: ...Once the offices have been connected the headquarters will need to dial the extension that the trunk is routed to Once the call hits the branch office it will be sent to the auto attendant so that th...

Page 166: ...IP Telephone System 146 will need to register the trunk to the system at the headquarters the same way an ITSP would need to be registered Then anyone in the world can dial the DID much like they wou...

Page 167: ...e set up before extensions however if only one dial plan will be used and it will be the default dial plan then this is not as important Trunk Trunk Dial Plan Multiple dial plans can exist on the same...

Page 168: ...be used to process the call C and P The C and P checkboxes determine how a call is handled once the user dials out onto the trunk If the C checkbox is selected the user will be prompted to enter a CMC...

Page 169: ...patterns such as literals prefixes and fixed patterns do not re quire a replacement string the system will automatically use sip 1 r user phone as the replacement If you use a prefix in front of a sta...

Page 170: ...predefined set of rules to handle the requests sent by clients and are usually part of the network There are several types of servers Proxy Server Proxy servers help track down addresses of recipient...

Page 171: ...back fashion similar to two people standing back to back A B2BAU establishes a two legged call keeping the SIP server in the middle of the call to orchestrate the details One side of the session acts...

Page 172: ...ost name e g sip your_number companyA vonage net This allows users to be redirected to another phone as easily as they would be redirected to another web page Types of Messages SIP communication consi...

Page 173: ...e 2976 REFER Asks the recipient to issue a SIP request call transfer 3515 MESSAGE Transports instant messages using SIP 3428 UPDATE Modifies the state of a session without changing the state of the di...

Page 174: ...401 Unauthorized When authentication is required 403 Forbidden 404 Not found When a phone number cannot be located 415 Unsupported media type When the SDP contains no common codecs this can happen if...

Page 175: ...N IP4 192 168 1 251 t 0 0 m audio 62116 RTP AVP 0 8 9 2 3 18 101 a crypto 1 AES_CM_128_HMAC_SHA1_32 inline Egjy8tgmY65IlnTn a rtpmap 0 pcmu 8000 a rtpmap 8 pcma 8000 a rtpmap 9 g722 8000 SIP 2 0 200 O...

Page 176: ...ssion initiation It includes information such as IP addresses port numbers and times and dates when the session is active SDP session descriptions are text based and consist of lines of text that are...

Page 177: ...b Bandwidth information optional o Owner creator and session identifier optional z Time zone adjustments s Session name optional k Encryption key optional i General information about the session optio...

Page 178: ...m the 200 Ok response was received Note The ACK method completes what is known as the three way handshake confir mation that a session has been successfully established The INVITE is the only method w...

Page 179: ...ny com user phone tag eed7a3b4e0 Call ID 3c2812339279 zvojwzvof6we CSeq 1 INVITE Content Length 0 SIP 2 0 180 Ringing Via SIP 2 0 TLS 192 168 0 34 5061 branch z9hG4bK e299f160c512cb066a3a536253aa4d44...

Page 180: ...P 2 0 TLS 192 168 0 34 5061 branch z9hG4bK 6dcf1018159b8e96b7b6d62a758d77fd rport From Roland Wright sip 40 pbx company com tag 1521860827 To Rachel Reed sip 41 pbx company com tag ozac09qwnh Call ID...

Page 181: ...any com user phone tag eed7a3b4e0 To Roland Wright sip 40 pbx company com tag g5ua0i7fz6 Call ID 3c2812339279 zvojwzvof6we CSeq 23626 BYE Contact sip 40 192 168 0 32 2061 transport tls line i339wes g...

Page 182: ...0 Via SIP 2 0 TLS 192 168 1 103 2077 branch z9hG4bK rib4emgq rport From Hanna Flanders sip 520 cs410 snom com tag fwxg2s0u4i To Hanna Flanders sip 520 cs410 snom com Call ID 3c267028e8ad q7dwiql86rvc...

Page 183: ...response 2 The user logs in enters user ID and password with the proxy server The UAC resends the REGISTER method 3 The UAS responds with a 200 OK Scenario 2 REGISTER sip itsp com SIP 2 0 Via SIP 2 0...

Page 184: ...314 75 150 83 2 5060 transport udp line 19ca14e7 sip instance urn uuid 7e96105b 8c8b 440e a0aa 07add8c80727 User Agent snom PBX 4 0 1 3453 Supported outbound Proxy Authorization Digest realm itsp com...

Page 185: ...by the client to the server 2 The called party s phone stops ringing and a 200 OK response for the CAN CEL is sent by the server to the client The server then sends back a 487 Trans action Terminated...

Page 186: ...C PBX 51 sip 51 localhost tag u58kfgll03 To sip 50 localhost user phone tag 4de5095638 Call ID 3c2c575f0429 38s24k0wrdrx CSeq 2 INVITE Contact sip 51 192 168 0 33 5060 Supported 100rel replaces norefe...

Page 187: ...yn Wright sip 50 pbx company com tag 55ay4g1375 Call ID a8c5d213 pbx CSeq 21261 INVITE Contact sip 50 192 168 0 31 1025 line npbudr1b reg id 1 Content Length 0 7 2010 04 28 11 21 27 Call a8c5d213 pbx...

Page 188: ...CSeq 2 ACK Max Forwards 70 Contact sip 51 192 168 0 32 2048 line o4a1zo97 reg id 1 Content Length 0 snom ONE Settings and SIP Traces Viewing SIP Traces This section shows you how to turn SIP logging...

Page 189: ...om com SIP 2 0 Via SIP 2 0 UDP 76 127 234 149 5060 branch z9hG4bKb9f8adb39884fe0e3fd1996e7b97bfd3 0 Via SIP 2 0 UDP 76 127 234 149 1030 rport 1030 branch z9hG4bK a8ru3e03jsdp om8vRLKP6dg__ From Jane S...

Page 190: ...sp com user phone SIP 2 0 2 Via SIP 2 0 UDP 192 168 0 34 5060 branch z9hG4bK 6574779d5edc4d91e2f dc47a8fba26ec rport 3 From snom ONE sip 17772022934 itsp com tag 677614076 4 To sip 509 itsp com user p...

Page 191: ...ngs Supporting Tables Table B 7 SIP Headers Header Abbrev Header Abbrev Accept Organization Accept Contact a P Access Network Info Accept Encoding P Answer State Accept Language P Asserted Identity Ac...

Page 192: ...a Authorization Content Encoding e P Preferred Identity Content Language P Profile Key Content Length l P Refused URI List Content Type c P Served User CSeq P User Database Date P Visited Network ID E...

Page 193: ...x Informational Responses 423 Interval Too Brief 100 Trying 424 Bad Location Information 180 Ringing 428 Use Identity Header 181 Call Is Being Forwarded 429 Provide Referrer Identity 182 Queued 433 An...

Page 194: ...Server Internal Error 407 Proxy Authentication Required 501 Not Implemented 408 Request Timeout 502 Bad Gateway 409 Conflict 503 Service Unavailable 410 Gone 504 Server Time out 412 Conditional Reques...

Page 195: ...Deploying the snom ONE IP Telephone System 526...

Page 196: ...using snom ONE with Exchange you can redirect calls voicemail and email to the mailbox of the Exchange server You can also use the calendar and the address book Exchange s address book allows you to...

Page 197: ...onsole select Organization Configuration Unified Messaging 2 Under Actions select New UM Dial Plan 3 Name the dial plan snomone and set the number of digits in extension num bers to 3 4 Click New then...

Page 198: ...l plan you created 8 Click New then click Finish Associate the Dial Plan with the Unified Messaging Server 1 Using the Exchange management console select Server Configuration Unified Messaging Under A...

Page 199: ...the mailbox you wish to enable and then under Actions click Enable Unified Messaging 3 Next to Unified Messaging Mailbox Policy click the Browse button and then select snomONE Default Policy 4 Enter...

Page 200: ...your Exchange Server i e exchange company com 7 In the Proxy Address field enter sip exchange company com 5060 transport tcp but replace exchange company com with the FQDN or IP address of your Excha...

Page 201: ...Deploying the snom ONE IP Telephone System 532 Figure C 1 Trunk Settings for Configuration with Exchange 2007 2010 UM...

Page 202: ...dial plan 4 Click Save Set the snom ONE External Voicemail System The redirection target should be a telephone number rather than a SIP URI and it must be possible to dial that number through the dial...

Page 203: ...Deploying the snom ONE IP Telephone System 534 2 Set the External Voicemail System field as explained in the previous section 3 Set Offer Camp On to No 4 Click Save...

Page 204: ...e must be translated into the numerical address of the hardware This function is done by Address Resolution Protocol see ARP The terms address resolution and name resolution are synonymous ANI Automat...

Page 205: ...particular domain to advise users of scheduled downtime for system maintenance CALEA Communications Assistance for Law Enforcement Act A U S wiretapping law passed in 1994 to protect public safety an...

Page 206: ...Client server computing melds personal computing with centralized data processing and supports many users simultaneously Codecs coder decoder A device used to convert binary signals transmitted on the...

Page 207: ...e presented to the PBX the dialed destination number DNIS is transmitted usually partially e g last four digits so that the PBX can route the call directly to the desired telephone extension within th...

Page 208: ...led and record that information DNS domain name system The Internet s name address resolution service that translates alphabetic domain names into numeric IP addresses For example the domain name www...

Page 209: ...being made A 911 call made from a traditional phone with ground wires is routed to the nearest public safety answering point PSAP The PSAP receives the caller s phone number and the exact location of...

Page 210: ...usually found on the customer end e g a plug on a phone or fax machine or the plug on an analog phone system that receives the analog line Because the FXO port is attached to a device such as a fax or...

Page 211: ...ciety ISOC that defines standard Internet operating protocols Its mission is to produce high quality relevant technical documents known as Requests for Comments RFC that influence the way people desig...

Page 212: ...as IP data packets Customers may use VoIP phones or traditional telephones with an analog telephony adapter ATA ITU International Telecommunication Union A telecommunications standards body that is gu...

Page 213: ...Media Access Control protocol sub layer of the Data Link Layer DLC of telecommunication protocols MIPS million instructions per second An old method for measuring a computer s speed and power and by...

Page 214: ...Also referred to as dialer or least cost router a NAD reroutes calls through a network to provide the best rates for the call destination A NAD normally includes a router modem and a monitored power s...

Page 215: ...form The analog sig nal is represented by a series of pulses and non pulses 1 or 0 respectively and the PCM performs the analog to digital conversion of the speech waveform by sampling the signal 800...

Page 216: ...ol message the proxy server pushes a policy change to the internal network s external firewall to open call control protocol ports and Real Time Protocol RTP ports only for packets from the source IP...

Page 217: ...ated of the three Routers can be programmed to understand and route the data its being asked to handle Configuration is done through a user interface Larger routers are capable of being programmed to...

Page 218: ...on Protocol RFC 3261 3262 3263 3264 and 3265 A signalling protocol for initiating and terminating an interactive user session that involves multimedia elements such as video voice chat gaming and virt...

Page 219: ...Call Detail Record database with the necessary parameters to populate a database The site then returns an HTML formatted document that includes a table taken from the database that lists the calls fo...

Page 220: ...per second Kbps and each capable of supporting a unique application that can run concurrently with but independently of other applications on different channels T 38 RFC 3362 A protocol that describe...

Page 221: ...ved were corrupted by the network Unicast The transmission method used for sending messages to a single network destina tion host on a packet switching network Unicast messaging is used whenever a pri...

Page 222: ...an regional or national boundaries WANs are similar to the Internet in that they are not owned by a single organization They exist under collective or distributed ownership and management For WAN conn...

Page 223: ......

Page 224: ...jump out 231 and cell phone settings 464 and DND 439 feature overview 225 226 logging in and out 244 245 441 message music cycle 228 229 monitoring 237 naming the agent group 230 night service 242 243...

Page 225: ...87 See also pre pay account balance 442 callback 283 286 credit for outbound calls 98 dialing interpretation 287 DISA 283 pre pay 284 read out balance 287 setting up the account 284 287 calling featur...

Page 226: ...send calls to 468 send call to cell phone 468 specify ring schedule 464 certificates buying 70 gmail SMTP server 298 making your own 70 size and format 71 system certificate 68 clean up extension 444...

Page 227: ...a CMC 148 configuring a PIN 148 preferencing 148 regular expression matching 152 replacement string 149 152 sample dial plans 155 158 wildcard patterns 151 152 DID See dialing direct destinations 205...

Page 228: ...il account 455 setting SMTP at domain level 105 SMTP server 295 system notifications 303 troubleshooting email server 62 user settings 411 414 welcome email for user 95 emergency numbers 95 Exchange 2...

Page 229: ...221 naming the hunt group 219 night service 222 permission to monitor account 222 record incoming calls to 222 ring stages 217 219 the From header 221 I installing snom ONE fresh installation 5 Linux...

Page 230: ...e 22 net stop snomone 22 night mode permission 174 P paging 251 258 configuring paging MoH 381 387 multicast 252 multicast IP addresses 256 257 setting up an account 253 256 unicast 251 parameters max...

Page 231: ...resh 50 pre pay credit for outbound calls 98 pre pay feature 289 294 See also calling card access from calling card 294 access from extension 293 access from PVA 293 dollar amount on extension 292 rat...

Page 232: ...ents 62 multicast 51 ports 54 retrieve SIP logging 65 setting registration times 50 short headers 51 SIP logging 63 To header 96 SIP overview 499 523 CANCEL request 515 components 500 502 REGISTER req...

Page 233: ...ll pickup 432 88 block anonymous calls 434 89 block anonymous calls deacti vate 435 90 intercom 427 91 add call to white list 444 92 add to black list 444 93 94 call record 445 95 send voicemails to e...

Page 234: ...lls to extensions 119 126 SIP trunks 114 117 U upgrading the software Linux 20 Mac 19 Windows 18 V voicemail accessing 449 add a comment to a message 449 calling own extension 100 change your PIN 448...

Page 235: ...o another s voicemail 429 transfer call to your voicemail 428 voicemail prompts 38 voicemail settings blocking from user interface 80 W wakeup call using star feature codes 443 WAV files MoH 379 380 w...

Page 236: ...80 87 64 87 Fax 33 1 80 87 62 88 info snom com United Kingdom snom UK Ltd Aspect Court 47 Park Square East Leeds LS12NL United Kingdom Tel 441133503111 Fax 441133503110 Boston snom technology Inc 18...

Page 237: ...Taipei R803 5F No 285 Sec 4 Zhongxiao E Rd Taipei city Taiwan 10692 Tel 886 2 6639 8031 Fax 886 2 6639 8039 infoASIA snom com...

Reviews: