com.x administrator's guide - far south networks€¦ · 3.3.5 failed rules ... 3.11.11.11 fxo...

198
Com.X IP PBX / Gateway Administrator Guide (Com.X revision 1.3 software release) Version 3.0.2, 26 August 2013 ©2010 – 2013 Far South Networks

Upload: hacong

Post on 12-Jun-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Com.X

IP PBX / Gateway

Administrator Guide

(Com.X revision 1.3 software release)

Version 3.0.2, 26 August 2013

©2010 – 2013 Far South Networks

Document History

Version Date Description of Changes

3.0.0 26/07/2013 Document ported from release 1.2 version 2.0.5

3.0.1 01/08/2013 Include Ntework and Firewall administration.

3.0.2 26/08/2013 Added 1.3 sip handset provisioning

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 3

Table of Contents

1 INTRODUCTION ............................................................................................................................... 17

1.1 OVERVIEW ...................................................................................................................................... 17

2 MANAGING THE UNIT ................................................................................................................... 18

2.1 ACCESSING THE UNIT ....................................................................................................................... 18

2.1.1 Factory network configuration ............................................................................................. 18

2.1.2 Authentication ....................................................................................................................... 18

2.1.3 Remote web login .................................................................................................................. 18

2.2 CONFIGURATION MANAGEMENT ....................................................................................................... 19

2.2.1 GUI layout ............................................................................................................................. 19

2.2.2 Configuration status .............................................................................................................. 19

2.2.3 Applying and reverting a configuration ................................................................................ 20

2.2.4 Changing the default administrator's password ................................................................... 20

2.2.5 Rebooting and Shutting down ............................................................................................... 21

2.3 SYSTEM MAINTENANCE ................................................................................................................... 22

2.3.1 Backup and Restore .............................................................................................................. 22

2.3.1.1 Backup contents ........................................................................................................................... 22

2.3.1.1.1 Factory default configurations ............................................................................................. 22

2.3.1.1.2 Configuration, Recordings ................................................................................................... 22

2.3.1.1.3 Voicemail ............................................................................................................................ 22

2.3.1.1.4 CDR ..................................................................................................................................... 23

2.3.1.1.5 Excluded from backup ......................................................................................................... 23

2.3.1.2 Immediate backup ........................................................................................................................ 23

2.3.1.3 Scheduled backup ........................................................................................................................ 23

2.3.1.4 Managing existing archives .......................................................................................................... 24

2.3.1.5 Restoring an archive onto the same system .................................................................................. 24

2.3.1.6 Restoring an archive onto a replacement system .......................................................................... 25

2.3.2 Licensing ............................................................................................................................... 27

2.3.2.1 Adding a License ......................................................................................................................... 27

2.3.3 Unlicensed Functionality ...................................................................................................... 28

2.3.4 ViBE Licensing ...................................................................................................................... 28

2.3.5 Updating the software ........................................................................................................... 29

2.3.5.1 Updating the PBX software ......................................................................................................... 29

2.3.5.1.1 Managing Packages from the GUI ....................................................................................... 29

2.3.5.2 Updating Packages ....................................................................................................................... 30

2.3.5.2.1 Check for updates ................................................................................................................ 30

2.3.5.2.2 Download Updates .............................................................................................................. 30

2.3.5.2.3 Install/Upgrade .................................................................................................................... 30

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 4

2.3.6 Upgrading a 1.2 system to 1.3 .............................................................................................. 31

3 COMMISSIONING THE UNIT ....................................................................................................... 32

3.1 GLOBAL SETTINGS ........................................................................................................................... 32

3.2 NETWORK CONFIGURATION .............................................................................................................. 34

3.2.1 Connections ........................................................................................................................... 34

3.2.2 Ethernet Interface Configuration .......................................................................................... 35

3.2.2.1 Listing ethernet interfaces ............................................................................................................ 35

3.2.2.2 Configuring an Interface .............................................................................................................. 35

3.2.2.3 Providing DHCP Server IP allocation to clients ........................................................................... 37

3.2.2.4 Providing Comma iTA boot services ........................................................................................... 39

3.2.3 Configuration of PPPoE Interfaces ...................................................................................... 40

3.2.4 X.21 Interface configuration ................................................................................................ 41

3.2.4.1 Frame Relay PVC Configuration ................................................................................................. 43

3.2.5 Creating Virtual ports for VLAN and PVC .......................................................................... 45

3.2.5.1 Vlan ............................................................................................................................................. 45

3.2.6 Adding IP Routes to Interfaces ............................................................................................. 47

3.2.6.1 Removing IP Routes from an Interface ........................................................................................ 47

3.3 FIREWALL CONFIGURATION ............................................................................................................. 48

3.3.1 Zones ..................................................................................................................................... 48

3.3.2 Policies .................................................................................................................................. 49

3.3.2.1 Applying Default Policies ............................................................................................................ 50

3.3.2.2 Managing Policies ........................................................................................................................ 51

3.3.2.3 Editing Policies ............................................................................................................................ 51

3.3.2.4 Creating a New Policy ................................................................................................................. 52

3.3.3 Rules ...................................................................................................................................... 53

3.3.3.1 Port Forward ................................................................................................................................ 53

3.3.3.2 Inbound Redirect ......................................................................................................................... 55

3.3.3.3 Inbound Access ............................................................................................................................ 56

3.3.3.4 Ping .............................................................................................................................................. 57

3.3.3.5 Blacklist ....................................................................................................................................... 58

3.3.4 Advanced ............................................................................................................................... 58

3.3.5 Failed Rules ......................................................................................................................... 58

3.4 HARDWARE DEVICE CONFIGURATION ............................................................................................... 59

3.4.1 Configured devices ................................................................................................................ 59

3.4.2 Detecting and scanning for devices ...................................................................................... 59

3.4.3 Adding Detected Devices ...................................................................................................... 60

3.4.4 Manually adding devices ...................................................................................................... 60

3.4.5 Configuring devices .............................................................................................................. 61

3.4.5.1 Configuring Comma devices ........................................................................................................ 61

3.4.5.2 Configuring Generic devices ........................................................................................................ 62

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 5

3.4.6 Adding Hardware (Managed SIP Device) ............................................................................ 64

3.4.6.1 Manually add Managed SIP Phone .............................................................................................. 64

3.4.6.2 Adding an Auto-detected Managed Sip phone ............................................................................. 66

3.4.6.3 Spreadsheet .................................................................................................................................. 68

3.4.6.3.1 Adding hardware via spreadsheet ........................................................................................ 68

3.4.6.3.2 Exporting spreadsheet of current hardware and extensions .................................................. 69

3.4.7 Removing a hardware device ............................................................................................... 69

3.4.8 Restore Factory Defaults of a Managed handset .................................................................. 69

3.4.9 Configuring Extensions on a Managed Sip phone ................................................................ 70

3.4.9.1 Enabling Lines ............................................................................................................................ 70

3.4.9.2 Assigning Extensions to Managed SIP Devices ........................................................................... 70

3.4.9.3 Creating New Extensions ............................................................................................................. 70

3.4.9.4 Assigning free extensions to available lines on Managed SIP Device .......................................... 71

3.4.9.5 Configuring a port on the Phone to register as an extension on a remote system ......................... 71

3.4.10 Codecs ................................................................................................................................. 73

3.4.11 Removing an association to an extension ........................................................................... 73

3.4.11.1 Unassigning Extensions ............................................................................................................. 73

3.4.11.2 Deleting Extensions ................................................................................................................... 73

3.4.12 Advanced Configuration options for Managed SIP Devices .............................................. 74

3.4.12.1 Configuring Soft Keys .............................................................................................................. 74

3.4.12.2 Configuring keys individually .................................................................................................... 74

3.4.12.3 Configuring Multiple DSS keys to map to consecutive extensions. ........................................... 75

3.4.12.4 Adding an Extension Module ..................................................................................................... 75

3.5 CONFIGURING COMMA DEVICE PORTS .............................................................................................. 76

3.5.1 Configuring Analogue Trunk (FXO) ports ............................................................................ 76

3.5.2 Configuring Analogue Extension (FXS) ports ...................................................................... 77

3.5.3 Configuring BRI ports ........................................................................................................... 78

3.5.4 Configuring PRI .................................................................................................................... 79

3.5.5 Removing devices .................................................................................................................. 79

3.5.6 Echo cancellation .................................................................................................................. 79

3.5.7 Earthing the Com.X ............................................................................................................... 81

3.5.8 Configuring devices for Fax / modem support ...................................................................... 82

3.5.8.1 Echo cancellation ......................................................................................................................... 82

3.5.8.2 Telco issues .................................................................................................................................. 82

3.5.8.3 Timing ......................................................................................................................................... 82

3.5.8.4 Additional configuration for faxing over PRI .............................................................................. 83

3.6 EXTENSION CONFIGURATION ............................................................................................................ 83

3.6.1 Extensions and Extension Ports ............................................................................................ 83

3.6.2 Listing existing extensions and ports .................................................................................... 84

3.6.3 Adding Extensions ................................................................................................................. 84

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 6

3.6.3.1 Adding extensions from ports ...................................................................................................... 85

3.6.3.2 Adding Unassigned extensions .................................................................................................... 85

3.6.3.3 Adding Generic SIP extensions .................................................................................................... 85

3.6.4 Configuring extensions ......................................................................................................... 85

3.6.4.1 Basic configuration ...................................................................................................................... 85

3.6.4.2 Advanced configuration ............................................................................................................... 86

3.6.4.3 Configuring Follow-me / Divert .................................................................................................. 86

3.6.5 Logging into phones with an extension (hot-desking) .......................................................... 88

3.6.6 Configuring SIP extensions ................................................................................................... 89

3.6.7 Remote SIP extensions .......................................................................................................... 89

3.6.8 Assigning extensions ............................................................................................................. 89

3.6.9 Unassigning extensions ......................................................................................................... 89

3.6.10 Configuring multiple extensions ......................................................................................... 90

3.6.11 Configuring Multiple Sip Extensions from a Spread Sheet. ............................................... 90

3.6.12 Deleting extensions ............................................................................................................. 90

3.7 TRUNK GROUPS AND VOIP PROVIDERS ............................................................................................ 90

3.7.1 Listing existing trunk groups and VOIP providers ............................................................... 90

3.7.2 Analogue trunk groups .......................................................................................................... 90

3.7.2.1 Adding trunk groups .................................................................................................................... 90

3.7.2.2 Editing trunk groups .................................................................................................................... 91

3.7.2.3 Adding trunks to a group ............................................................................................................. 92

3.7.2.4 Removing trunks from a group .................................................................................................... 92

3.7.2.5 Removing a trunk group .............................................................................................................. 92

3.7.2.6 Viewing group members .............................................................................................................. 93

3.7.3 SIP trunks .............................................................................................................................. 93

3.7.3.1 SIP call setup ............................................................................................................................... 93

3.7.3.2 Adding a SIP trunk ...................................................................................................................... 93

3.7.3.3 Sip trunk configuration ................................................................................................................ 93

3.7.3.4 Editing a SIP trunk ....................................................................................................................... 97

3.7.3.5 Removing a SIP trunk .................................................................................................................. 98

3.7.4 Inter-Asterisk Exchange (IAX) trunks ................................................................................... 98

3.7.4.1 Adding an IAX trunk ................................................................................................................... 98

3.7.4.2 Editing an IAX trunk ................................................................................................................. 100

3.7.4.3 Removing a SIP trunk ................................................................................................................ 100

3.8 BUDGET TRUNKS ........................................................................................................................... 100

3.8.1 Configuring Budget Trunks ................................................................................................. 100

3.8.2 Budget Trunk Behaviour ..................................................................................................... 102

3.9 OUTBOUND ROUTE CONFIGURATION ............................................................................................... 102

3.9.1 Viewing configures outbound routes ................................................................................... 102

3.9.2 Adding outbound routes ...................................................................................................... 102

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 7

3.9.3 Configuring outbound routes .............................................................................................. 103

3.9.4 Dial Patterns ....................................................................................................................... 103

3.9.4.1 Adding dial patterns to an outbound route ................................................................................. 103

3.9.4.2 Dial pattern syntax ..................................................................................................................... 103

3.9.5 Adding trunks to an outbound route ................................................................................... 104

3.9.6 Removing Trunks from a route ............................................................................................ 104

3.9.7 Deleting outbound routes .................................................................................................... 104

3.9.8 Outbound route priority ...................................................................................................... 104

3.10 INBOUND ROUTE CONFIGURATION ................................................................................................. 104

3.10.1 Viewing existing inbound routes ....................................................................................... 105

3.10.2 Adding a new inbound route ............................................................................................. 105

3.10.3 Configuring inbound routes .............................................................................................. 106

3.10.4 Configuring call destinations ............................................................................................ 107

3.10.4.1 Conferences ............................................................................................................................. 107

3.10.4.2 Day/Night ................................................................................................................................ 107

3.10.4.3 Extensions ................................................................................................................................ 107

3.10.4.4 Ring Groups ............................................................................................................................. 107

3.10.4.5 Termination ............................................................................................................................. 107

3.10.4.6 Voicemail ................................................................................................................................. 107

3.10.4.7 IVR .......................................................................................................................................... 107

3.10.4.8 Phonebook ............................................................................................................................... 108

3.10.5 Deleting an inbound route ................................................................................................ 108

3.11 FLEXPATH CONFIGURATION ......................................................................................................... 108

3.11.1 FlexPath Fundamentals .................................................................................................... 108

3.11.2 FlexPath Route Types ....................................................................................................... 109

3.11.2.1 Include ..................................................................................................................................... 109

3.11.2.2 Match ....................................................................................................................................... 109

3.11.2.3 Start ......................................................................................................................................... 110

3.11.3 FlexPath Destinations ....................................................................................................... 110

3.11.4 Viewing existing FlexPaths ............................................................................................... 110

3.11.5 Adding FlexPaths .............................................................................................................. 110

3.11.6 Deleting FlexPaths ............................................................................................................ 111

3.11.7 Adding routes to a FlexPath ............................................................................................. 111

3.11.8 Changing route priority in a FlexPath ............................................................................. 112

3.11.9 Editing routes in a FlexPath ............................................................................................. 112

3.11.10 Deleting routes from a FlexPath ..................................................................................... 112

3.11.11 FlexPath use cases ......................................................................................................... 112

3.11.11.1 Class of service ..................................................................................................................... 112

3.11.11.2 Partitioning / multi-tenant ..................................................................................................... 113

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 8

3.11.11.3 Simple partitioned DID routing: ............................................................................................ 114

3.11.11.4 Trunk to Trunk gateway ........................................................................................................ 114

3.11.11.5 Legacy PBX Remote extension gateway ............................................................................... 115

3.11.11.6 Legacy PBX feature set extension ......................................................................................... 116

3.11.11.7 Immediate dialing ................................................................................................................. 117

3.11.11.8 Transformations .................................................................................................................... 117

3.11.11.9 Assigning DIDs to BRI ports ................................................................................................ 118

3.11.11.10 Load-balancing calls ........................................................................................................... 118

3.11.11.11 FXO Trunk pick-up to test for trunk service ....................................................................... 119

3.12 CALL RECORDING ........................................................................................................................ 119

3.12.1 Configuring individual extensions .................................................................................... 119

3.12.2 Recording all calls ............................................................................................................ 120

3.12.3 On-demand recording ....................................................................................................... 120

3.12.4 Call recording conditions ................................................................................................. 120

3.12.5 Gateway Recording ........................................................................................................... 121

3.12.5.1 Gateway Recording Encryption ............................................................................................... 121

3.12.5.2 Gateway recording in a-law ..................................................................................................... 121

3.12.6 Viewing call recordings .................................................................................................... 121

3.13 POWERING THE COM.X VIA AN UNINTERRUPTED POWER SUPPLY ................................................. 122

3.13.1 Supported UPS Devices .................................................................................................... 122

3.14 SECURING THE SYSTEM ................................................................................................................ 122

3.14.1 General .............................................................................................................................. 123

3.14.2 Network ............................................................................................................................. 123

3.14.3 VoIP .................................................................................................................................. 123

3.14.4 PBX ................................................................................................................................... 123

3.15 CALL BEHAVIOR ON NO ANSWER / BUSY ...................................................................................... 124

3.15.1 Unattended transfer ......................................................................................................... 124

3.15.2 Attended transfer .............................................................................................................. 124

3.15.3 Call parking ..................................................................................................................... 124

3.15.4 Ring-back ......................................................................................................................... 125

3.15.4.1 Disabling Ringback Functionality ............................................................................................ 127

4 ADVANCED CONFIGURATION .................................................................................................. 128

4.1 ANNOUNCEMENTS ......................................................................................................................... 128

4.2 CALLBACK .................................................................................................................................... 128

4.3 CONFERENCES ............................................................................................................................... 130

4.4 DAY / NIGHT CONTROL .................................................................................................................. 131

4.5 FEATURE CODES ............................................................................................................................ 132

4.6 GENERAL SETTINGS ....................................................................................................................... 134

4.6.1 Dial command options ........................................................................................................ 134

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 9

4.7 IVR .............................................................................................................................................. 139

4.8 MUSIC ON HOLD ............................................................................................................................ 142

4.8.1 Configuring streaming music .............................................................................................. 142

4.8.2 Playback configuration ....................................................................................................... 142

4.8.3 Adding a music category ..................................................................................................... 143

4.8.4 Adding a streaming category .............................................................................................. 143

4.9 OUTBOUND ROUTES ....................................................................................................................... 144

4.10 PAGING ....................................................................................................................................... 145

4.11 INTERCOM ................................................................................................................................... 146

4.12 PARKING LOT .............................................................................................................................. 147

4.13 PHONEBOOK ................................................................................................................................ 147

4.14 PIN SETS ..................................................................................................................................... 148

4.15 QUEUES ...................................................................................................................................... 149

4.16 RING GROUPS ............................................................................................................................. 152

4.17 SYSTEM RECORDINGS .................................................................................................................. 154

4.18 TIME CONDITIONS ....................................................................................................................... 155

4.19 TIME GROUPS .............................................................................................................................. 156

4.20 VOICEMAIL BLASTING ................................................................................................................. 157

4.21 DISA ......................................................................................................................................... 157

4.22 LISTENING IN ON CALLS / SPY FEATURE ........................................................................................ 158

5 MONITORING THE SYSTEM ...................................................................................................... 159

5.1 GUI STATUS PAGE ........................................................................................................................ 159

5.1.1 Status Display ..................................................................................................................... 159

5.1.2 Services menu ...................................................................................................................... 159

5.2 DETAILED LOGGING ....................................................................................................................... 159

5.3 CALL DETAIL RECORDS (CDR) ..................................................................................................... 160

5.3.1 Reviewing Call Detail Records ........................................................................................... 160

5.3.2 Enabling logging to CSV ..................................................................................................... 161

5.3.3 Accessing the CDR database .............................................................................................. 161

5.4 MONITORING OF REMAINING CAPACITY ON THE UNIT ...................................................................... 161

5.4.1 Deleting of call recordings ................................................................................................. 162

5.4.2 Changing the memory consumption threshold .................................................................... 162

5.4.3 Auto-removal of audio files ................................................................................................. 162

5.5 RETRIEVING MONITORING INFORMATION ......................................................................................... 162

5.5.1 Monitoring functions ........................................................................................................... 162

6 ADVANCED ADMINISTRATION ................................................................................................ 166

6.1 CONSOLE ACCESS .......................................................................................................................... 166

6.1.1 Authentication ..................................................................................................................... 166

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 10

6.1.2 Accessing the unit ................................................................................................................ 166

6.1.2.1 Serial access ............................................................................................................................... 166

6.1.2.2 Secure shell access ..................................................................................................................... 166

6.1.2.3 Editing system files .................................................................................................................... 167

6.1.2.4 Changing the shell login password ............................................................................................. 167

6.2 REBOOTING THE SYSTEM ................................................................................................................ 167

6.3 CONFIGURING EMAIL SERVICES ...................................................................................................... 167

6.3.1 Configuring voicemail to email ........................................................................................... 167

6.3.2 Configuring sendmail for mail relay ................................................................................... 168

6.3.3 Sending a test email ............................................................................................................ 169

6.3.4 Monitoring outgoing email ................................................................................................. 169

6.4 ASTERISK PBX SOFTWARE MANAGEMENT ...................................................................................... 169

6.4.1 Accessing the Asterisk PBX console ................................................................................... 169

6.4.2 Stopping and restarting the Asterisk PBX software ............................................................ 170

6.4.2.1 Restarting Asterisk ..................................................................................................................... 170

6.4.2.2 Stopping Asterisk ....................................................................................................................... 170

6.4.2.3 Starting Asterisk ........................................................................................................................ 170

6.4.2.4 Notify when no calls .................................................................................................................. 170

6.5 FREEPBX ACCESS ......................................................................................................................... 170

6.6 MANUALLY BACKING UP AND RESTORING THE CONFIGURATION ....................................................... 171

6.7 SETTING THE SYSTEM'S DATE, TIME AND TIMEZONE ........................................................................ 171

6.8 VIDEO CALL SUPPORT (H.263 AND H.263+) .................................................................................. 172

6.9 RECOVERING / RESETTING THE COM.X COMMA USER PASSWORD ..................................................... 172

6.10 ADDING STATIC ROUTES TO THE NETWORK ................................................................................... 172

6.11 BOOTING THE COM.X IN RECOVERY MODE ................................................................................... 173

6.11.1 Booting in recovery mode ................................................................................................. 173

6.12 THIRD PARTY MODULES .............................................................................................................. 173

6.13 TELEPHONE MANAGEMENT SYSTEMS (TMS) ............................................................................... 173

6.13.1 MAN 3000 ......................................................................................................................... 173

6.13.1.1 Installing MAN 3000 support .................................................................................................. 173

6.13.1.2 CDR format ............................................................................................................................. 177

6.13.1.3 Defining outbound line numbers .............................................................................................. 179

6.13.1.4 Logging records from a specific date ....................................................................................... 179

6.13.2 Asterisk TMS systems ........................................................................................................ 180

6.13.3 P$X (PBillX) hotel management system ........................................................................... 180

6.14 SETTING UP A STREAMING MUSIC SERVER ..................................................................................... 181

6.15 MICROSOFT OUTLOOK INTEGRATION ............................................................................................ 182

6.15.1 Outcall ............................................................................................................................... 182

6.15.2 asttapi ................................................................................................................................ 184

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 11

6.16 FAIL2BAN INTEGRATION ............................................................................................................... 186

6.16.1 Configuration .................................................................................................................... 186

6.17 VIBE .......................................................................................................................................... 186

6.18 FLASH OPERATOR PANEL ............................................................................................................. 187

6.18.1 Flash Operator Panel demo version ................................................................................. 187

6.18.2 FOP2 access ..................................................................................................................... 187

6.18.3 Setting the operator extension ........................................................................................... 187

6.18.4 Limiting Flash Operator Panel access to operator only .................................................. 187

6.18.5 Accessing Flash operator panel ........................................................................................ 188

6.18.6 Using FOP2 ...................................................................................................................... 189

6.18.7 Generating internal phone calls ....................................................................................... 189

6.18.8 Answering Calls ................................................................................................................ 190

6.18.9 Transferring calls .............................................................................................................. 190

6.18.10 Listening to calls ............................................................................................................. 191

6.18.10.1 Listen .................................................................................................................................... 191

6.18.10.2 Listen and Whisper ................................................................................................................ 191

6.19 NAGIOS ....................................................................................................................................... 191

6.19.1 Hosts .................................................................................................................................. 192

6.19.2 Accessing Nagios .............................................................................................................. 192

6.19.3 Services ............................................................................................................................. 192

6.19.4 Disabling active Nagios Checks on a Service or Port ...................................................... 193

6.19.5 Customised Monitoring and Reporting ............................................................................. 194

7 TROUBLESHOOTING ................................................................................................................... 195

Index of TablesTable 1: Default network interface configuration.......................................................18

Table 2: Global settings............................................................................................34

Table 3: Com.X Firewall default policies. .................................................................51

Table 4: Comma device configuration.......................................................................62

Table 5: Generic device configuration.......................................................................63

Table 6: Managed SIP device configuration..............................................................63

Table 7: FXO port configuration................................................................................74

Table 8: FXS port configuration................................................................................75

Table 9: BRI port configuration.................................................................................76

Table 10: PRI port configuration...............................................................................77

Table 11: Extension configuration.............................................................................83

Table 12: Advanced extension configuration............................................................84

Table 13: Follow-me configuration............................................................................86

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 12

Table 14: Trunk group configuration (addition)..........................................................89

Table 15: Trunk group configuration (editing)...........................................................90

Table 16: SIP trunk basic configuration.....................................................................92

Table 17: SIP trunk advanced configuration.............................................................95

Table 18: IAX trunk basic configuration.....................................................................97

Table 19: IAX trunk advanced configuration.............................................................97

Table 20: Outbound route configuration..................................................................101

Table 21: Inbound route configuration.....................................................................105

Table 22: FlexPath route types...............................................................................107

Table 23: FlexPath destinations..............................................................................108

Table 24: FlexPath configuration............................................................................109

Table 25: FlexPath route configuration...................................................................109

Table 26: Ring-back behavior.................................................................................125

Table 27: Announcement configuration...................................................................126

Table 28: Callback configuration.............................................................................127

Table 29: Conference configuration........................................................................128

Table 30: Day/night configuration...........................................................................130

Table 31: Feature code configuration......................................................................131

Table 32: General PBX configuration settings.........................................................136

Table 33: Interactive voice response configuration.................................................139

Table 34: Playback configuration............................................................................141

Table 35: Music category configuration...................................................................141

Table 36: Streaming music category configuration.................................................142

Table 37: Outbound route configuration..................................................................143

Table 38: Paging configuration...............................................................................144

Table 39: Parking lot configuration..........................................................................145

Table 40: Phone book entry configuration options..................................................146

Table 41: Pin set configuration................................................................................146

Table 42: Queue configuration options...................................................................150

Table 43: Ring group configuration oprions............................................................152

Table 44: System recording configuration...............................................................152

Table 45: Time condition configuration...................................................................153

Table 46: Time group configuration.........................................................................154

Table 47: Voicemail blasting configuration..............................................................155

Table 48: Logging levels.........................................................................................158

Table 49: Monitoring functions................................................................................163

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 13

Table 50: Man3000 CDR format column headers...................................................175

Table 51: Man3000 CDR format field descriptions..................................................177

Table 52: Outcall configuration...............................................................................180

Table 53: asttapi configuration................................................................................183

Table 54: Services and interfaces monitored by the Nagios application.................191

Illustration IndexFigure 1: Com.X web portal......................................................................................19

Figure 2: Remote web login......................................................................................19

Figure 3: GUI layout and configuration status...........................................................19

Figure 4: Review / apply task list...............................................................................20

Figure 5: Start menu options.....................................................................................20

Figure 6: Start menu options.....................................................................................21

Figure 7: System maintenance - backup...................................................................22

Figure 8: The new backup is listed under the appropriate section.............................23

Figure 9: Backups can be scheduled to back up the Com.X settings automatically. 23

Figure 10: The schedule (if configured) is displayed on the title bar. ........................23

Figure 11: Managing individual backup archives. .....................................................24

Figure 12: Save the backup archive to an external location......................................24

Figure 13: Restore the selected backup....................................................................24

Figure 14: Tasks to be executed are listed with an option to cancel.........................25

Figure 15: Submit the desired archive for upload. ....................................................25

Figure 16: Updating the MAC address of a replacement unit....................................26

Figure 17: Manage Licenses via the GUI..................................................................27

Figure 18: Select the appropriate license type before uploading the license.............27

Figure 19: File retrieved and ready for upload...........................................................27

Figure 20: Licenses submitted for authentication......................................................28

Figure 21: Only system maintenance options available from the GUI of a system with no active licenses......................................................................................................28

Figure 22: Select the Packages tab..........................................................................29

Figure 23: Managed packages listed with version and status...................................29

Figure 24: Options available for managing packages...............................................29

Figure 25: The comx-base-1.2-mpx packages is selected. ......................................30

Figure 26: Global Settings........................................................................................31

Figure 27: Options available for global network configurations. ...............................33

Figure 28: Interface list, status is boldly indicated by colour highlighting...................34

Figure 29: Ethernet LAN port configuration options..................................................35

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 14

Figure 30: DHCP and Comma server configuration options. ....................................36

Figure 31: Adding a route to all addresses in the 10.0.0.X range by declaring the subnet, /24...............................................................................................................37

Figure 32: Managing IP routes on an interface. .......................................................38

Figure 33: PPPoE interface configuration options. ...................................................39

Figure 34: VLAN and PVC port creation. .................................................................40

Figure 35: VLAN Configuration Options....................................................................41

Figure 36: Ports can be allocated a particular zone into which they fall. ..................42

Figure 37: Ports can be allocated into one of four default zones. .............................42

Figure 38: Policies are listed showing source and destination zones. ......................43

Figure 39: Add the default firewall policies to your configuration. .............................44

Figure 40: Policy Management and preference manipulation. .................................45

Figure 41: Editing an existing Firewall policy. ...........................................................45

Figure 42: Logging Options for firewall policies. .......................................................45

Figure 43: Options for new rules and policies. .........................................................46

Figure 44: Configuring a new firewall policy. ............................................................46

Figure 45: Rule Wizard . Types of configurable rules. ..............................................46

Figure 46: Inbound Redirect rule wizard. .................................................................48

Figure 47: Inbound access rule wizard......................................................................49

Figure 48: Ping firewall rule wizard...........................................................................50

Figure 49: Blacklist rule configuration wizard. ..........................................................51

Figure 50: This rule features an unknown interface and so has been disabled and marked in red............................................................................................................52

Figure 51: The network can bge scanned for devices from the Hardware panel.......52

Figure 52: The number of detected devices is displayed on the Hardware panel. Scanning the network increases the number of detected devices. ...........................52

Figure 53: Selecting the appropriate detected device after a scan of the network. . .53

Figure 54: Selection of device types to be added. ....................................................53

Figure 55: Comma device configuration....................................................................55

Figure 56: A Managed SIP device will already have some fields populated. ............56

Figure 57: Manual Configuration of a Managed SIP Device......................................57

Figure 58: The Com.X forwards and proxies the necessary traffic to the handsets so that they can sit safely behind a firewall and still be configured remotely..................57

Figure 59: The GUI of the device is accessible through the Com.X GUI by selecting Connect....................................................................................................................58

Figure 60: Enabling lines on a handset.....................................................................59

Figure 61: Right click the appropriate line in the ports tree to assign it a new extension..................................................................................................................59

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 15

Figure 62: Consecutive extensions can be created and assigned to multiple lines on the same device........................................................................................................59

Figure 63: Four extensions will be created and assigned to the lines of the same handset.....................................................................................................................60

Figure 64: Click and drag the desired line over the desired free extension. Note the green tick icon on the line being dragged. ................................................................60

Figure 65: Strong passwords are generated for extensions. ....................................60

Figure 66: Extensions can be configured to support multiple Codecs.......................61

Figure 67: Available destinations for DSS keys include extensions,conferences,queues,ring groups, parking lots and individual parking bays...................................................................................................................................62

Figure 68: Multiple DSS keys can be configured to transfer to consecutive extensions..................................................................................................................................63

Figure 69: The above procedure results in a configuration as such. ........................63

Figure 70: Keys on the extensions module can also be configured. .........................64

Figure 71: Select Add-> Spreadsheet to add and provision handsets from a spreadsheet. ............................................................................................................64

Figure 72: Example spreadsheet for Maqnaged SIP Device provisioning and extension creation.....................................................................................................65

Figure 73: Echo cancellation.....................................................................................71

Figure 74: Assigning extensions...............................................................................74

Figure 75: Trunk group configuration (editing)..........................................................81

Figure 76: SIP trunk basic configuration options.......................................................85

Figure 77: SIP provider deletion confirmation...........................................................88

Figure 78: Budget configuration settings...................................................................90

Figure 79: CDR Call logs........................................................................................110

Figure 80: Configuration and synchronization status display..................................145

Figure 81: Services can be enabled/disabled, restarted and enabled/disabled on start up. ..........................................................................................................................145

Figure 82: Call record search options.....................................................................146

Figure 83: CDRs can be exported in CSV or PDF format.......................................147

Figure 84: "ifconfig eth0" shows network configurations of eth0 (Lan1)..................152

Figure 85: 'sudo asterisk -rx "stop when convenient" ' stops the asterisk service, so that no calls are cut off, then 'sudo reboot' reboots the Com.X system. .................153

Figure 86: If an email address is listed in this field, voicemail recordings and notifications will be sent to the address. .................................................................153

Figure 87: Sendmail configuration..........................................................................154

Figure 88: Man3000 settings menu.........................................................................160

Figure 89: Man3000 port settings...........................................................................160

Figure 90: Man 3000 TCP/IP configuration.............................................................161©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 16

Figure 91: Man3000 format settings........................................................................162

Figure 92: Importing a Man3000 format template...................................................162

Figure 93: Outcall dialing rules configuration..........................................................168

Figure 94: Outcall server configuration...................................................................168

Figure 95: Outcall extension configuration..............................................................169

Figure 96: Outlook contacts integration...................................................................169

Figure 97: asttapi configuration...............................................................................170

Figure 98: Calling a contact....................................................................................171

Figure 99: Selecting Asterisk as dial option............................................................171

Figure 100: An Operator extension can be manually configured. ...........................173

Figure 101: FOP access can be limited to the operator only, if required. ...............174

Figure 102: Select "Operator panel" to access the Flash operator panel................174

Figure 103: Login with an extension number and voicemail pin..............................174

Figure 104: Extension 1000 logged in. Notice the nine icons above the extensions each of which performs a function..........................................................................175

Figure 105: Extension 2000 is logged in on this operator panel. Notice only four function buttons above the listed extensions...........................................................175

Figure 106: Trunks, queues and parking slots are also displayed. Notice the Sip Trunk has one active call, indicated by the orange colour and the external caller, 5000........................................................................................................................175

Figure 107: Dialling extension 2000 from extension 1000. Notice the blue outline around extension 2000...........................................................................................176

Figure 108: Notice the change of colour of extension 1000, as well as the incoming call from "1000" shown on extension 2000..............................................................176

Figure 109: Picking up a call to extension 1003. Pushing the "Call Pickup" button will connect the caller to the extension of the FOP user. ..............................................176

Figure 110: The call between extension 1000 and external caller 5000 will be transferred to extension 1001.................................................................................176

Figure 111: Select the active call, then click "Listen"...............................................177

Figure 112: The Listen and whisper feature allows the operator to listen in on other calls, and talk to the local user on the call. .............................................................177

Figure 113: The landing page of the Com.X Gui.....................................................178

Figure 114: Options available for configuring Nagios monitoring on a port or a service....................................................................................................................180

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 17

1 Introduction

1.1 OverviewThis document is intended for Com.X PBX and Gateway administrators and details access to, commissioning, management and monitoring of the Com.X range of products, release 1.3, including the Com.X5, Com.X10 and Com.X2 products. It forms part of a suite of manuals and guides for the Com.X product range, which also includes the Com.X End User manual, the Com.X Installation guide and the Com.X Trouble-shooting guide release 1.2

Note: Com.X systems running 1.2 software can be upgraded to 1.3 software and licensed.

Com.X gateway products can also be remotely licensed and upgraded to fully functional 1.3 PBX systems.

Please contact your distributor for pricing and other details.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 18

2 Managing the unit

2.1 Accessing the unit

2.1.1 Factory network configurationThe Com.X units ship with 2 - 4 external ethernet ports labeled lan1, lan2 etc. (enumerated from eth0 in the Operating System). Com.X1 and Com.X10 models have an internal ethernet port (eth3), and certain Com.X5 models have an internal port for DSL applications (wan). The ports are factory-configured as follows.

Interface Models DHCP? IP Netmask

lan1 / eth0 X1, X2, X5, X10

DHCP Client - -

lan2 / eth1 X1, X2, X5, X10

No 192.168.101.1 255.255.255.0

lan3 / eth2 X1, X5, X10 No 192.168.102.1 255.255.255.0

lan4 / eth3 X5 No 192.168.103.1 255.255.255.0

internal / eth3 X1, X10 No 192.168.103.1 255.255.255.0

wan X5 No - -

Table 1: Default network interface configuration

Note: Com.X5 systems utilize an internal PCI bus and offer external connection to the lan4/eth3 network interface.

Warning: Changing the configuration of the internal eth3 interface may result in loss of service on Com.X1/Com.X10.

2.1.2 AuthenticationWeb login has been pre-configured with the default administrator username 'admin' and password 'admin'. It is advisable to change this password directly after installation.

2.1.3 Remote web loginOnce the unit has been powered on and started up, it can be accessed from a Firefox, Internet Explorer or Chrome web browser with the URL set to the IP address of the unit. Select the Administrator button to log in. Enter your username and password and select 'Login' to authenticate. Please see section 2.2.4 for more detail on changing the administrator's password.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 19

Figure 1: Com.X web portalFigure 2: Remote web login

Note: Should your GUI eventually time out rather than loading correctly, you can now select to Restart the GUI and to restart the system directly from the web portal log in.

2.2 Configuration management

2.2.1 GUI layoutThe Com.X GUI facilitates status monitoring and control of the unit and peripheral devices via a set of menus accessible from the menu bar. After any changes have been made to the configuration, these need to be reviewed and applied before they take effect.

2.2.2 Configuration statusThe current configuration status, indicating pending tasks and status alerts, can be viewed from the configuration menu:

When the status on the Status tab is SYNCHRONIZED, the configuration is up to date and synchronized with the underlying system configuration resources. If the status is PENDING or MODIFIED, the Review/Apply button will be emphasized and the administrator needs to review and apply the configuration using the Review/Apply button in order to synchronize.

At the top right of the GUI a status icon indicates the over-all system status. If this

indicator is a green check , the system is synchronized and all services are

running. If the status indicator is an orange/yellow warning symbol , the configuration requires audit and apply, or, the system is in error and requires

©2010 – 2013 Far South Networks

Figure 3: GUI layout and configuration status

Com.X Administrator Guide

Page 20

attention. Clicking the status indicator navigates to the Configuration status panel on

the GUI. The unknown indicator shows that system status is not available (possibly still being acquired after restart or GUI login.)

See section 5.1 for further details on the GUI status page.

2.2.3 Applying and reverting a configurationSelect the Review/Apply button. A list of tasks to be applied will appear. Review the task list and select Apply to proceed.

To revert changes and return to the configuration last applied, select the Revert button.

To apply changes without disrupting service to users, select “Apply when no calls”. The system will monitor the number of active calls, and if all calls clear, will initiate apply. The system will remain pending Apply until all calls have terminated.

To continue configuring the system without applying, select Cancel.

During apply, individual task progress and success or failure is indicated. Once the process has completed, a confirmation is displayed.

Figure 4: Review / apply task list

Figure 5: Start menu options.

2.2.4 Changing the default administrator's passwordThe password for the default administrative user (admin) can be changed by selecting the “Change Password” option from the Start menu. Enter the existing password, the new password and its confirmation and Accept to apply the change.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 21

Figure 6: Start menu options.

Note: changing the administrator's password on the GUI also changes the underlying advanced FreePBX GUI's password accordingly.

Note: changing the administrator's password does not change the SSH login password for the system, the ARI call monitor password or the MySQL database password. Please see section 3.15 for more information on securing the system.

2.2.5 Rebooting and Shutting downSelect Start and then Restart or Shutdown (please wait 2 minutes before power cycle).

Note: Any changes that have not been applied will be lost. When the system has been shut down, it remains powered on but halted. Only a physical power cycle will power it on again.

Note: Startup typically takes 2 – 3 minutes, but the system will check its hard disk integrity every 20th start-up. This could delay start-up by a few minutes. If uncertain of the system state, please connect a serial cable to determine the boot state.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 22

2.3 System Maintenance

2.3.1 Backup and RestoreThe Com.X configuration can be backed up to the unit's internal hard drive, or downloaded to another machine. Backups can be scheduled daily, weekly and monthly, and individual sections of the configuration can be configured for backup, each with its own schedule. Immediate backups can also be initiated. Backups are stored on the system in /var/lib/asterisk/backups/

From the Start menu, select System maintenance and then Backup. Please see section 6.6 for more information regarding manual backup and restore.

2.3.1.1 Backup contents

The following selection of backup sets are provided for backup:

2.3.1.1.1 Factory default configurations

Com.X systems ship with a default factory configuration, which includes the default configuration of telephony ports in the system. This configuration is reflected on hardware the Hardware panel. Factory default configurations cannot be deleted from the GUI, but can be stored offline and may also be uploaded to the system.

2.3.1.1.2 Configuration, Recordings

System configuration, including network, device, trunk, extension, voicemail, inbound, outbound and FlexPath configurations, as well as all recordings present on the system, including system recordings, auto attendant and music.

2.3.1.1.3 Voicemail

©2010 – 2013 Far South Networks

Figure 7: System maintenance - backup

Com.X Administrator Guide

Page 23

All user voice mailboxes with messages and the listened-to state of the messages. This could result in a substantial archive.

2.3.1.1.4 CDR

Backs up the system's Call Data Record database.

2.3.1.1.5 Excluded from backup

The following items are excluded from backup and should be provided for by the system installer, using scheduled scripts or other mechanisms:

• Custom FOP2 configuration (FOP2 configuration is generated by the Com.X GUI on apply. Custom configurations are not backed up.)

• NFS configuration

• Mail relay configuration Third party module / service configuration (e.g. P$X, FOP, Queue statistics, PPPoE, TNG, Man3000, device mount configurations, etc)

• Static network routes

2.3.1.2 Immediate backup

To initiate an immediate backup, select “Backup now” from the Options menu for the desired backup set. After successful completion, the backup archive will be listed under the appropriate section.

Figure 8: The new backup is listed under the appropriate section.

2.3.1.3 Scheduled backup

To schedule a backup, select the Options menu for the desired backup set, select “Schedule” and select the desired backup frequency. To remove a schedule, select Manual Only.

Figure 9: Backups can be scheduled to back up the Com.X settings automatically.

The schedule setting is reflected in the backup set's title bar.

Figure 10: The schedule (if configured) is displayed on the title bar.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 24

2.3.1.4 Managing existing archives

As scheduled backups complete and immediate backups are initiated, the existing archives are listed under the appropriate sections on the backup panel. The most recent backups appear at the bottom of each section. To sort by a particular column, click on the column header.

Figure 11: Managing individual backup archives.

Individual backup archives can be managed by right-clicking on the entries. To download an archive to a local disk, select Save As and follow the browser prompts.

Figure 12: Save the backup archive to an external location.

2.3.1.5 Restoring an archive onto the same system

To restore from an existing archive, right-click the archive in the list and select Restore.

Figure 13: Restore the selected backup.

The list of steps to be executed during the restore are displayed. Select Continue to restore, or cancel.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 25

Figure 14: Tasks to be executed are listed with an option to cancel.

Reboot the system once restore has completed (please see 2.2.5).

To restore from a data file saved at an external location, first upload the archive to the Com.X and then follow the procedure above. Select “Upload” from the options menu on the appropriate backup set in order to upload an archive.

2.3.1.6 Restoring an archive onto a replacement system

In case of hardware failure, it might be necessary to restore the configuration of a system onto a replacement unit.

to restore from a data file saved at an external location, first upload the backup to the Com.X.

Select “upload” in the options menu of the relevant section. Enter or browse to, the location of the backup archive and submit.

Figure 15: Submit the desired archive for upload.

Then follow the procedure in 2.3.1.5 to restore the backup onto the system.

Note: After a configuration has been restored, you will be required to apply the changes. This gives the opportunity to change any settings (network configurations in particular may need changing, to avoid loss of service) before they become active on the system.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 26

Once restored, select Start – Configuration and then select the Hardware panel. The restored device should be listed, but the MAC address will not match that of the device in the replacement unit. As a result some telephony spans may not be available.

To update the restored configuration with the replacement device's MAC address, edit the hardware entry (double-click or right-click-edit) and select the selection button to the right of the MAC address field and select “Update from detected”.

Note: It is important to note that the telephony port configuration of the replacement unit must match that of the system to be replaced. The restore process will only list detected devices for which the port configurations match.

Select the appropriate detected device, accept and apply the changes. A system restart may be required to ensure all telephony spans are working.

Figure 16: Updating the MAC address of a replacement unit

Note: Updating of the MAC address is necessary only on iTA devices. Units that contain only MPX telephony devices (such as a Com.X 5 with no external iTA's ) will not require MAC addresses to be updated.

These archives contain the relevant licenses for Farsouth (gateway or PBX) and third party software.

Note: If a configuration back up is made on a system featruing budget trunks, the remaining minutes field is set to the minutes remaining on the system at the time the back up is made. If this back up is then restored to the system, the trunk will be created with the remaining minutes field already set. This field should be manually reset after any configuration archive restoration.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 27

2.3.2 LicensingLicenses are used to enable functionality on 1.2 systems. Licenses are available for full PBX functionality, gateway and PBX major release upgrades and for certain third party installations, like ViBE (see section 2.3.4 for more information on ViBE licensing) and FOP2 (see section 6.18 for further information on FOP2).

2.3.2.1 Adding a License

License archives of the form <serialnumber>_XXXXXXXXXXXXXXXXXXX.zip obtained from Far South Networks are uploaded to the system via the GUI. These archives contain the relevant licenses for Farsouth (gateway or PBX) and third party software. These licenses will only work on the unit for which they are issued.

From the system maintenence page, select the packages tab, and then options, licensing, and Add License.

Figure 17: Manage Licenses via the GUI

This will allow you to upload a license from your computer. Select they type of License you would like to add and then Browse your computer for the correct license file.

Figure 18: Select the appropriate license type before uploading the license.

As the license file is retrieved the status bar will turn blue. Accepting will upload the selected file.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 28

Figure 19: File retrieved and ready for upload.

The .zip folder is then submitted for authentication. After which the GUI restarts.

Figure 20: Licenses submitted for authentication

After uploading a license to the Com.X, allow a few seconds for the GUI to update and refresh. If the license is accepted the appropriate GUI functionality will be available.

Note: It may be necessary to manually restart the GUI from the command line after

adding a license: sudo /etc/init.d/comma-gui restart

2.3.3 Unlicensed FunctionalityUnlicensed functionality is presented as grey and is inaccessible in the GUI, as such, the GUI of a Com.X gateway will show several greyed-out PBX configuration options. This functionality can be remotely enabled by adding a Com.X PBX license, which can be purchased from Far South Networks, through your distributor.

Figure 21: Only system maintenance options available from the GUI of a system with no active licenses.

2.3.4 ViBE LicensingIn order to operate a ViBE enabled link or network a once-off license is required for each ViBE-enabled CPE. To activate the ViBE application, this license needs to be installed on the internal ViBE CPE of the Com.X.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 29

ViBE licenses can be purchased through your Far South Networks distributor and are uploaded to the GUI as in section 2.3.2.1.

Please refer to section 6.17 for further details on the ViBE application.

2.3.5 Updating the softwareCom.X software updates are published from time to time on the Far South Networks repository. The updates are freely available to licensed units with valid software maintenance contracts.

2.3.5.1 Updating the PBX software

Each Com.X unit ships with the Far South Networks repository configured in /etc/apt/sources.list:

The software packages on Com.X units need to be updated from time to time to ensure optimal functinality and to incorporate new features.

Updates are released as a part of two top-level managed packages, namely the comx-base and comx-gui packages, that can be updated from the Com.X GUI.

Note: Units need to have internet access in order to retrieve update packages from the Far South Networks repository.

Note: On Com.X5 units, the comx-base package is somewhat different to the equivalent package for Com.X1, Com.X2 and Com.X10 units. As such the corresponding package on Com.X5 builds is named comx-base-1.2-mpx.

2.3.5.1.1 Managing Packages from the GUI

The status of the two top-level packages is displayed on the Packages tab of the System Maintenance page of the Com.X GUI.

Select Start, System Maintenance and then the Packages tab.

Figure 22: Select the Packages tab A list showing the com.x-base, comx-gui and vibe packages, as well as their versions and status is displayed.

Figure 23: Managed packages listed with version and status.

The State column provides information comparing the version of the installed package to the version of the latest package available on the Far South Networks repository.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 30

Figure 24: Options available for managing packages.

2.3.5.2 Updating Packages

2.3.5.2.1 Check for updates

From the Packages tab of the System Maintenance page, select Check For Updates.

On this command, the Com.X connects to the repository and compares current package versions to those available.

2.3.5.2.2 Download Updates

To download updates for a particular package, or multiple packages, select the package in the package list, or select multiple packages using Ctrl-click. A selected package is distinguished by a blue highlight.

Figure 25: The comx-base-1.2-mpx packages is selected.

With one or more packages selected, click Options and then Download updates.

This will pull the latest packages from the Far South Networks repository and store them on the Com.X, however it will not install the updates until requested to do so. This allows updates to be retrieved immediately, but installed at a convenient time, when service can be interrupted.

Note: If no packages are selected, the GUI will ask if you would like to download updates for the two top-level packages, comx-base and comx-gui

2.3.5.2.3 Install/Upgrade

Select individual packages or multiple packages as in section 2.3.5.2.2 and then click on the Install/Upgrade option in the Options list. This will install any updates to the selected package that have been downloaded but not installed. If there are no dowloaded updates, then the Com.X will download and install the updated packages from the Far South Networks repository.

Note: Installation of updates may incur a brief loss of service.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 31

2.3.6 Upgrading a 1.2 system to 1.3Com.X units featuring 1.2 software can be upgraded to use 1.3 software. Please contact your Far South Networks distributor for further details or pricing information.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 32

3 Commissioning the unit

3.1 Global settingsA range of global settings are available for configuration,

Double-click a field to edit the field and enter required information.

Figure 26: Global Settings

Field Content

External Address If specified, outgoing SIP packets will include this address as the source address of the SIP packets.

External is Dynamic

When true, indicates that the SIP source host specified should be treated as a dynamic host. This informs the remote peer to resolve the address of the host for each dialog, in case the address has changed.

VPN subnet The subnet (IP and subnet mask in the form A.B.C.D/E.F.G.H) over which VPN communication is established. VoIP traffic

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 33

Field Content

received from this subnet will be treated as local by the Com.X

Jitter Buffer Enabled

When enabled, a SIP jitter buffer will be instantiated for each SIP call.

Jitter Buffer Max Milliseconds

Indicates the maximum number of milliseconds that the jitter buffer is allowed to buffer media before streaming out.

Jitter Buffer Adaptive

When enabled, uses an adaptive buffering algorithm that adjusts to the media stream conditions. When disabled, the jitter buffer length is fixed to the maximum value specified.

Match Digit Timeout

The timeout in milliseconds after which, if no additional digit is pressed, the dialed digit series is deemed complete and the call is attempted.

Notification email Email address to which to send system notifications .

SMTP host The mail relay server to use when sending emails (including notification emails and voicemail to email.)

Please see section 6.3 for a detailed discussion on email services.

Masquerading domain

The domain to masquerade from when sending emails.

SMTP user SMTP authentication user to use for sending email via the SMTP host

SMTP password SMTP authentication password

Network slip tolerant

Provides receive FIFO buffers for analogue and PRI channels in case of network slips

Gateway recording

If enabled, all calls on all trunks via the Com.X will be recorded.

Please see section 3.13.5 for a detailed discussion on gateway recording.

Gateway recording encryption

If enabled, all calls on all trunks recorded will be encrypted using the Com.X system's unique hardware key. Recordings can only be decrypted on the same system, or using the system's unique hardware key.

FOP only available to Operator

If set to true, this will restrict access to the Flash operator panel to the operator extension set in the general settings page of the advanced menu. Please see Section 6.18 for more detail on the operator panel.

Ringback on transfer busy

Enabled by default. If enabled, calls that are transferred to a busy extension will ring back to the transferring

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 34

Field Content

extensionRingback on transfer no answer

Ringback on transfer no answer

Enabled by default. If enabled, calls that are transferred to an extension and then unanswered, will ring back to the transferring extension.

Ringback on transfer voice prompt

Enabled by default. If enabled a caller will hear a short “extension unavailble, one moment please” message before a call rings back to the transferring extension.

Table 2: Global settings

3.2 Network configurationConfiguration of all ethernet LAN and Wan ports is possible through the Network tab of the Comma GUI. This module allows further control of router and firewall settings, including configurations of zones on a port-by-port basis, general firewall policies, and individual rules, providing exceptions to the configured policies.

3.2.1 ConnectionsThe connections page allows for configuration of some global networking parameters.

Double-click a field to edit the field and enter required information.

Figure 27: Options available for global network configurations.

Field Content

Host Name The host name assigned to the Com.X.

Domain The system domain name. Use 'local' to indicate a local domain.

Primary DNS Server

The system's primary Domain Name resolution Server

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 35

Field Content

Note: the Com.X uses an open-source, synchronous DNS lookup library. As a result, the Com.X makes use of a DNS proxy to facilitate DNS lookups. If the primary DNS is configured to an IP address outside the LAN (i.e. outside of the network gateway router) and this DNS server or network connectivity to the DNS server should become unavailable, the Com.X and the DNS cache might both block on DNS lookup, resulting in loss of SIP registration and general call failures.

Always configure the primary DNS as the LAN gateway router, and the secondary DNS as an external DNS server if so required.

Secondary DNS Server

The system's secondary Domain Name resolution Server

DNS Associated Interface

The interface through which the Com.X expects communication from the DNS server.

NTP Time Server The NTP server the Com.X should refer to for time synchronization in the NTP hierarchy.

3.2.2 Ethernet Interface ConfigurationThe Com.X GUI provides functionality to configure all ethernet interfaces, as well as provision of DHCP IP allocation for IP phones and booting of Comma iTA devices. The Com.X unit can serve both DHCP and Comma addresses simultaneously, provided the IP ranges do not overlap.

3.2.2.1 Listing ethernet interfaces

To access the list of network interface configurations, select Configuration from the Start menu and then select the Network panel and the “Interfaces” section.

Interfaces are coloured coded, with active, healthy ports indicated by green highlighting, and yellow highlights indicating a port is in a warning or down status.

Figure 28: Interface list, status is boldly indicated by colour highlighting.

3.2.2.2 Configuring an Interface

Double-click an ethernet interface to configure the following fields:

Field Content

Name Operating System allocated interface name

Description A description for the interface

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 36

Field Content

DHCP Client Determines whether the unit will try and obtain its IP configuration from a DHCP server. If not selected, the fields below need to be configured

Enabled By default each port is enabled. Unselecting this option will disable the port for all functionality.

IP Address An IP address unique to the network. Auto-assigned if DHCP Client is enabled.

Network Mask The network mask to use on the network. Auto-assigned if DHCP Client is enabled.

Gateway The routing gateway for this interface. Auto-assigned if DHCP Client is enabled.

Default Metric The metric of a network route is a property used by a routing protocol to determine whether one particular route should be chosen over another.

In conflicting cases, traffic will be directed towards the gateway containing the lowest value metric.

Figure 29: Ethernet LAN port configuration options.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 37

Apply the configuration.

Note:After applying network configuration changes, the unit needs to be rebooted or the networking service restarted before the changes become active in the configuration.

3.2.2.3 Providing DHCP Server IP allocation to clients

Double-click an ethernet interface and select the Servers tab.

Field Content

DHCP Start Address The start address for the range of IP addresses from which new DHCP requests should be served

DHCP End Address The end address for the range of IP addresses from which new DHCP requests should be served

DHCP Router Address The address of the IP router / gateway to be used by the device requesting IP configuration, normally the same as the Com.X address on this interface.

DHCP DNS Server The primary DNS address to be configured on the device requesting IP configuration, may be left blank.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 38

Figure 30: DHCP and Comma server configuration options.

Apply the configuration.

Note: After applying network configuration changes, the unit needs to be rebooted or networking restarted.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 39

3.2.2.4 Providing Comma iTA boot services

Double-click an ethernet interface and select the Servers tab.

Field Content

Comma Start Address The start address for the range of IP addresses to allocate to new Comma units. Once a unit has been assigned an IP, the system will remember this assignment, across restarts, and will always reserve the IP for that unit. The IP will no longer be served to future commas.

Comma End Address The end address for the range of IP addresses to allocate to new Comma units.

Apply the configuration.

Note: After applying network configuration changes, the unit needs to be rebooted or networking restarted.

Note: On Com.X 1 and Com.X10 units, the eth3 interface is the internal ethernet bus serving the Com.X Media processor card and should not changed from its factory configuration.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 40

3.2.3 Configuration of PPPoE Interfaces

Figure 31: PPPoE interface configuration options.

Field Content

Name A suitable name for the virtual interface.

Description A description of the interface, marking it as PPPoE.

Automatic IP If enabled, the interface will attempt to dynamically receive an IP address via IPCP. If left unchecked, a static IP address can be configured.

Enabled By default the interface is enabled. Unchecking this option will disable the interface for all functionality.

IP Address If Automatic IP is disabled, a static IP address can be configured in this field. If Automatic IP is enabled then this field can not be edited from the Gui.

Network Mask The network mask to use on the network. Auto-assigned if DHCP Client is enabled.

Gateway Peer IP The IP address of the bridge mode router handling PPPoE traffic. This could be an internal router (on select Com.X5 units,) or another router on the local network.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 41

PPP Attached Device The port through which the router can be reached. This could be a Lan port on the Com.X or the internal dsl router on select Com.X5 units.

PPP Username The username of with which to authenticate with your service provider.

PPP Password The password associated with your username, used to authenticate with your service provider.

PPP Authorization The authorization method used to authenticate your account with your service provider.

PPP Service name This field should be left blank, unless your service provider has requested that your configure your service with a specific name.

Default Route If enabled, the PPPoE interface will be configured as the default route for any IP traffic to an address matching no other configured route.

Default Metric The metric of a network route is a property used by a routing protocol to determine whether one particular route should be chosen over another.

In conflicting cases, traffic will be directed towards the gateway containing the lowest value metric.

3.2.4 X.21 Interface configurationIf the Com.X is equipped with an X.21 serial interface (typically for connection to leased line or frame relay services), the interface is listed as serial0 (X21-1) in the Interfaces list.

The Com.X X.21 interface is always DTE on the physical layer (although it may act as protocol DCE in Frame Relay mode). Therefore, the clock and thus the data rate of the interface is provided by the DCE equipment connected to the X.21 interface, typically an NTU.

Figure 32: Interface list including serial0, the X21 interface

As with other network interfaces, the interface configuration may be edited by double-clicking the list entry. The availability of the different fields will depend on the Serial Protocol chosen.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 42

Figure 33: X21 interface configuration

The fields are described in the table below. Note that only PPP mode supports Automatic IP configuration.

Field Contents

Name (not editable) serial0

Description (not editable)

X21-1

Serial Protocol IP/HDLC – Raw IP in HDLC encapsulation

Cisco HDLC – Cisco compatible IP HDLC encapsulation

Frame Relay – ANSI/CCITT (ITU) compatible frame relay encapsulation

PPP – Point-to-Point Protocol

Frame relay LMI (Only enabled when Serial Protocol is Frame Relay) – Local

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 43

Management Interface protocol selection. Valid values are:

None

ANSI DTE

ANSI DCE CCITT DTE

CCITT DCE

Automatic IP (only valid for PPP mode) – obtain IP address automatically from the PPP peer

Enabled Interface enabled/disabled at startup

IP Address (except when Frame Relay or Automatic IP enabled) – IP address of this interface

Network Mask (except when Frame Relay or PPP enabled) – Network mask of this interface

Gateway/Peer IP (optional, not enabled when Frame Relay or PPP enabled) – Peer IP for point-to-point links, or gateway for multipoint

PPP attached device (not editable)

(only valid for PPP mode) /dev/ttyX0

PPP username (only valid for PPP mode) PAP/CHAP username

PPP password (only valid for PPP mode) PAP/CHAP password

PPP authorization Method of PPP authorization:

PPP_NONE – don't use PAP/CHAP

PPP_AUTO – use PAP or CHAP as required

PPP_PAP – use PAP only

PPP_CHAP – use CHAP only

PPP service name (optional) PPP provider's service name, normally left blank

Default metric The metric of a network route is a property used by a routing protocol to determine whether one particular route should be chosen over another. In conflicting cases, traffic will be directed towards the gateway containing the lowest value metric.

3.2.4.1 Frame Relay PVC Configuration

If the X.21 interface is configured for Frame Relay protocol, it is possible to add multiple PVCs (Permanent Virtual Circuits), which themselves are separate network interfaces with the usual configuration options. The list below shows a PVC interface entry.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 44

Figure 34: PVC interface shown in interface list

PVCs are added by selecting Options → New PVC... The screenshot below shows the configuration of a new PVC.

Figure 35: X21 PVC device configuration

The fields are described in the table below.

Field Contents

PVC physical interface X21-1

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 45

PVC encapsulation IP/Frame Relay – Raw IP is encapsulated in the PVC frame

Ethernet/Frame Relay – IP over Ethernet is encapsulated in the PVC frame

DLCI Data Link Connection Identifier – number from 1 to 1023 (normally in the range 16 to 991) that uniquely identifies this PVC from others sharing the physical link

IP Address, Network mask, Gateway, Default metric

Same as for other interfaces

To edit a PVC, double-click its interface entry as usual. To delete a PVC, right-click on the interface entry and select the Delete option in the menu.

3.2.5 Creating Virtual ports for VLAN and PVC Virtual ports can be configured from the GUI, to connect to Vlan and PVC networks.

3.2.5.1 Vlan

To create a new virtual port on a Vlan network, navigate to the Connections page, under the Network tab of the GUI. Then select New Vlan.

©2010 – 2013 Far South Networks

Figure 36: VLAN and PVC port creation.

Com.X Administrator Guide

Page 46

Figure 37: VLAN Configuration Options

Field Contents

VLAN Physical Interface

The actual physical LAN interface through which this virtual port connects to the rest of the virtual network. This could be any of the LAN ports, or the internal dsl router on certain Com.X5 models.

VLAN ID A numerical identifier for the VLAN. Integer values from 1 to 4095 are valid VLAN identifiers.

DHCP Client If checked, this virtual port will receive a n IP address from some DHCP server on the VLAN.

Enabled By default the port is enabled. Disabling the port prevents all functionality and will delete any associated IP routes. Re-enabling the port will recreate associated IP routes.

IP Address If the interface is not configured as a DHCP client, a static IP address can be configured in this field. If the interface is a DHCP client, then this field can be read, but not edited from the GUI.

Network Mask A network mask can be manually configured along with a static IP address. If the interface is configured as a DHCP client, this field will be populated in the DHCP negotiation process and can be read, but not edited from the GUI.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 47

Gateway The routing gateway for this interface. Auto-assigned if DHCP Client is enabled.

Default Metric Sets the default metric value of routes utilizing this interface.

In conflicting cases, traffic will be directed through the route containing the lowest value metric.

VLAN ports can be configured to act as DHCP and Comma servers , as in section 3.2.2.3 . Individual and specific IP routes can be associated to the VLAN interface in a similar was as described in section 3.2.2.2.

3.2.6 Adding IP Routes to InterfacesWhen an interface is configured with an IP address, an ip route matching that address and the configured subnet of the interface is autoimatically configured, associating the port with traffic on the subnet.

Additional routes can be added to an interface, ensuring all traffic to the associated address(es) is directed through the interface.

Routes can be configured for individual addresses as well as for a range of IP address, by declaring the subnet range after a '/'.

To configure an IP route, select the desired interface and select the Routes tab and then the add button.

Figure 38: Adding a route to all addresses in the 10.0.0.X range by declaring the subnet, /24

Click Accept and then review and apply your changes.

Note: After applying network configuration changes, the unit needs to be rebooted or the networking service restarted.

3.2.6.1 Removing IP Routes from an Interface

Configured routes can be removed from interfaces by selecting the routes tab of the associated interface, selecting the route, and then clicking the Remove button. Accept and apply your changes.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 48

Figure 39: Managing IP routes on an interface.

Multiple routes can be deleted at once, by using CTRL-click to select all routes marked for deletion.

3.3 Firewall ConfigurationWith the on-board firewall option enabled, the Com.X can manage firewall services on your network.

3.3.1 ZonesThe Com.X allows separation of its interfaces into different zones, each of which is authorized to access only portion s of the available network. The access provided to devices in each zone is configured through firewall policies (See section 3.3.2)

Figure 40: Ports can be allocated a particular zone into which they fall.

Configuration for each port can be edited by double-clicking on the desired appropriate and then selecting the desired firewall zone.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 49

Figure 41: Ports can be allocated into one of four default zones.

Zone Access

Com.X The Com.X zone contains interfaces (physical and virtual) on the Com.X system itself. This includes the ports listed on the interfaces section of the Network page of the Com.X GUI.

LAN Interfaces placed in the LAN zone have access only to the internal network. The internet and any external destination is only reachable through another device in the DMZ.

DMZ The De-militarized zone has access both to the internet and a limited partition of the internal network. Interfaces in this zone are typically used to provide services to users on the external network.

Internet This zone holds any devices on the external internet.

3.3.2 Policies

Policies are used to control the access available to each firewall zone (see section 3.3.1) Policies are explicitly configured to provide a standard way of dealing with traffic moving from one zone to another.

Figure 42: Policies are listed showing source and destination zones.

A policy can be configured to respond in one of three ways:

Policy Action

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 50

Accept Allow traffic between the two zones.

Drop Ignore any packets travelling from the source zone to the destination zone.

Reject Reject any packets sent from the source zone to the destination zone with a rejection message.

3.3.2.1 Applying Default Policies

A comprehensive suite of firewall policies are available for restoration on each system. These policies include what we at Far South believe should be a good “out of the box” policy configuration that would need particular rules and perhaps additional policies to be configured in order to meet the needs of the client.

To add the default policy suite to your configuration, select the Firewall page of the Network tab, and then the Load Defaults option from the options list.

Figure 43: Add the default firewall policies to your configuration.

Default Policies:

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 51

Source Zone Destination Zone Action

Com.X Internet Accept

Com.X LAN Accept

Com.X DMZ Accept

LAN Com.X Accept

LAN Internet Accept

LAN DMZ Accept

DMZ Com.X Accept

DMZ Internet Accept

DMZ LAN Drop

Internet All Zones Drop

All Zones All Zones Reject

Table 3: Com.X Firewall default policies.

3.3.2.2 Managing Policies

Policies are evoked in preferential order based on their position in the list on the GUI. By right-clicking on a policy, it can be moved up and down, deleted and edited.

Figure 44: Policy Management and preference manipulation.

3.3.2.3 Editing Policies

To edit a policy right-click the policy and select edit. This edit does not allow the changing of source and destination zones (for that a new policy is required) but allows the resultant action to be changed (choosing between Accept, Reject and Drop) as well as select the type of logging required for traffic evoking this policy. Further, a policy can be disabled, and a disabled policy re-enabled.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 52

Figure 45: Editing an existing Firewall policy.

Figure 46: Logging Options for firewall policies.

3.3.2.4 Creating a New Policy

To create a new firewall policy, select Options, then new policy.

©2010 – 2013 Far South Networks

Figure 47: Options for new rules and policies.

Com.X Administrator Guide

Page 53

Figure 48: Configuring a new firewall policy.

3.3.3 RulesRules are very specific exceptions to the configured policies. Rules allow the forwarding of ports. Rules allow for traffic to move from particular ports or addresses in a manner that would normally be prevented by the policies.

To configure a new rule, select Rule Wizard from the options menu of the Firewall page and select the type of rule you wish to configure.

Figure 49: Rule Wizard . Types of configurable rules.

Each Rule type makes use of the same rules parameter sheet, with certain fields pre-configured depending on the type of rule.

3.3.3.1 Port Forward

To forward a single port or a range of ports to the firewall, you can use the port forwarding rule wizard.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 54

Illustration 1: Port Forward rule wizard options.

Field Description

Source Zone Since this is the port forward rule wizard, the source zone is automatically configured to “Internet” and can not be edited.

Source IP address If required, access to the port forward rule can be restricted to a particular source IP address or address range. To configure an IP range, specify the non-zero bits of the netmask numerically after a / character. <ip_address>/<numerical_netmask>

Source start port The start port of the source which you would like to be able to access this port forward rule.

Source end point The end port of the source which you would like to be able to access this port forward rule.

Destination Zone The allocated zone of your destination device. For port forward rules this option is limited to LAN and DMZ.

Destination IP address The ip address of the destination device to be accessed by this port forward rule.

Destination start port The start port to be accessed on the destination device.

Destination end port The final port in the range to be accessed on the destination device.

Protocol The communication protocol that will be available on this rule. Select between tcp and udp.

Loglevel The logging tag you would like attatched to any logging

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 55

on this route.

Enable An Enable toggle. If unchecked, the rule will not be active.

Description An optional description for the firewall rule.

3.3.3.2 Inbound Redirect

Figure 50: Inbound Redirect rule wizard.

Field Description

Source Zone In a redirect rule, the source will always be in the internet zone, so this field has been preconfigured and can not be edited using the rule wizard.

Source IP address Access to this rule can be limited to a single IP address or a range of IP addresses on the same subnet.

Source start port The start port of the source which you would like to be able to access this rule.

Source end point The final port of the range of ports on the source which you would like to be able to access this rule

Destination Zone The allocated zone of your destination device. As this is an inbound redirect rule, the zone is pre-configured to Com.X and can not be editted from the rule wizard.

Destination start port The port to be accessed on the destination device.

Protocol The communication protocol that will be available on this rule. Select between tcp and udp.

Loglevel The logging tag you would like attached to any logging

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 56

on this route.

Enable An Enable toggle. If unchecked, the rule will not be active.

Description An optional description for the firewall rule.

3.3.3.3 Inbound Access

An inbound access route can be configured to allow access to the Com.X device from particular devices on the external internet.

Figure 51: Inbound access rule wizard.

Field Description

Source Zone In a redirect rule, the source will always be in the internet zone, so this field has been preconfigured and can not be edited using the rule wizard.

Source IP address Access to this rule can be limited to a single IP address or a range of IP addresses on the same subnet.

Source start port The start port of the source which you would like to be able to access this rule.

Source end point The final port of the range of ports on the source which you would like to be able to access this rule

Destination Zone The allocated zone of your destination device. As this is an inbound access rule, the zone is pre-configured to Com.X and can not be edited from the rule wizard.

Protocol The communication protocol that will be available on this rule. Select between tcp and udp.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 57

Loglevel The logging tag you would like attached to any logging on this route.

Enable An Enable toggle. If unchecked, the rule will not be active.

Description An optional description for the firewall rule.

3.3.3.4 Ping

A ping rule allows the Com.X device to receive and respond to pings sent from particular devices in the internet zone (i.e. not on the local network, but rather on the external internet).

Figure 52: Ping firewall rule wizard.

Field Description

Source Zone In a ping rule, the source will always be in the internet zone, so this field has been preconfigured and can not be edited using the rule wizard.

Source IP address Access to this rule can be limited to a single IP address or a range of IP addresses on the same subnet.

Destination Zone The allocated zone of your destination device. As this is an inbound access rule, the zone is pre-configured to Com.X and can not be edited from the rule wizard.

Protocol As this is a wizard for a ping rule, only icmp traffic is permitted. This field can not be edited on this type of rule.

Loglevel The logging tag you would like attached to any logging on this route.

Enable An Enable toggle. If unchecked, the rule will not be active.

Description An optional description for the firewall rule.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 58

3.3.3.5 Blacklist

If required, particular ip addresses or ranges of ip addresses can be black listed by the administrator. This results in any traffic from the source being rejected.

Figure 53: Blacklist rule configuration wizard.

Field Description

Source Zone In a blacklist rule, the source will always be in the internet zone, so this field has been preconfigured and can not be edited using the rule wizard.

Source IP address The IP address (addresses) you would like to blacklist.

Destination Zone All zones are included in a blacklist rule

Loglevel The logging tag you would like attached to any logging on this route.

Enable An Enable toggle. If unchecked, the rule will not be active.

Description An optional description for the firewall rule.

3.3.4 AdvancedShould you require some behaviour that can not be achieved with the rule-types already listed, configuring an advanced rule allows you to manually configure each field of the rules sheet. This allows for advanced port-by-port traffic routing of your choice of protocols. We suggest consulting

the shorewall documentation before configuring a rule of this type.

http://www.shorewall.net/

3.3.5 Failed Rules When using the advanced rule wizard, it is possible to configure a rule that is for some reason forbidden. This could be a result of a logical flaw, or an unknown interface.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 59

If such a rule is present, the “checking firewall services” step will fail in an apply, but the apply will succeed. The GUI elects to disable the individual rule, but enable the firewall service and all other configured rules or policies.

Rules that have been disabled due to logical flaws or ambiguities are highlighted in red and displayed in the rules list.

Figure 54: This rule features an unknown interface and so has been disabled and marked in red.

3.4 Hardware Device configurationTo list, detect and configure hardware devices (including the Com.X, external iTAs, IP phones and other network devices), select the Start button, then Configuration and open the Hardware panel.

3.4.1 Configured devicesThe list of configured devices is displayed on the hardware panel. Devices are classified as follows:

• Generic devices – the IP address and/or MAC address of the device is known, and the Com.X GUI provides proxy web access to the device. This class supports generic IP phones, ADSL routers, etc.

• Comma devices – built in telephony hardware and Comma iTA devices

• Managed SIP devices – supported IP phone types that are fully managed by the Com.X

For each device, the device name, type, model, MAC address and Auto IP values are listed. Where available, the device IP address and current status are also listed.

3.4.2 Detecting and scanning for devicesThe Com.X unit can detect network devices present on all networks attached to it. By default, devices requesting either DHCP IP information, internal telephony devices and external Comma iTA devices are automatically added to the list of detected devices. A scan of all network interfaces can also be initiated by selecting the Scan button. This process may take a couple of minutes.

Figure 55: The network can bge scanned for devices from the Hardware panel.

The number of devices detected is displayed in the top right corner of the Hardware panel. To add detected devices to the configuration, select the Add menu item followed by the Detected menu item.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 60

Figure 56: The number of detected devices is displayed on the Hardware panel. Scanning the network increases the number of detected devices.

This results in a list of detected devices from which one can be selected for configuration. Where available, the existing MAC address, device type, model, IP address and vendor information is listed.

3.4.3 Adding Detected DevicesOnce a device has been detected by the Com.X, navigate to “Add” then “Detected” and select the device from the list. If the network was scanned to detect the handset, then the list of detected devices will include several devices and the correct handset must be selected. Select the appropriate handset and click OK.

3.4.4 Manually adding devicesIf a device is not present on the network or does not appear on the detected list, it can be added manually by providing its MAC address and IP information. Comma iTAs, Generic devices and Managed SIP devices can be added by selecting the Add button, followed by the New menu and the desired device type.

Figure 58: Selection of device types to be added.

©2010 – 2013 Far South Networks

Figure 57: Selecting the appropriate detected device after a scan of the network.

Com.X Administrator Guide

Page 61

3.4.5 Configuring devicesAfter a device has been selected for configuration, manually added or edited, a device configuration form will appear:

3.4.5.1 Configuring Comma devices

Double-click an ethernet interface to configure the following fields:

Field Content

Device Name A custom name for the device

Model Type The card configuration of the device. If the device was detected, this field will be populated automatically.

Auto IP On first boot, request an IP address from the Com.X Manager. Once an IP has been allocated, the Auto IP field becomes disabled and the IP is statically reserved for the device by the Comma Manager, always issuing the same IP to the device matching the configured MAC address.

IP Address An IP address unique to the device on the network. Auto-assigned if Auto IP Client is enabled.

Network Mask The network mask the device should be configured with. Auto-assigned if Auto IP is enabled.

Gateway The routing gateway the device should use. Auto-assigned if Auto IP is enabled.

Attached network The network interface to which the device is attached.

Note: the interface selected here must be configured as providing Comma services, or the addition of the device will fail with the message 'Device not supported on this interface'. The Comma device manager only listens on and provides configuration to devices on boot-up on interfaces configured for Comma services.

Timing Mode The timing source for the device. Options are:

Local: Recover timing from the local Com.X clock (i.e. this device is a clock master)

System: Recover timing from another clock master (i.e. this device is a clock slave) This is equivalent to the iTA “Network” clocking mode.

Bri/Pri Priority 1: Configure this device to recover clock from the first active ISDN interface (PRI or BRI)

Bri/Pri Priority 2: Configure this device to recover clock from the second active ISDN interface (PRI or BRI)

Note: On Com.X5 systems, the primary clock source is always the system, unless an iTA is configured as clock

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 62

Field Content

master (Line 1 or Line 2) on a PRI or BRI port. When using an X5 , it is an invalid configuration to configure any iTA as 'local'.

Table 4: Comma device configuration

Figure 59: Comma device configuration

3.4.5.2 Configuring Generic devices

Field Content

Device Name A custom name for the device

Model Type The type of the device. In most cases this will remain blank for manually added generic devices.

Auto IP Indicates whether the Com.X DHCP server should allocate an IP to the device on DHCP request. Once the DHCP lease on the IP expires, the Com.X DHCP server might issue a different IP to the device. To ensure a device is always allocated the same IP (static), disable Auto IP and enter the IP manually. If the static IP falls within the DHCP pool, the DHCP server will always allocate it to the device (i.e. the DHCP client on the device should still be enabled). If the static IP falls outside the DHCP server IP pool, the device should be manually configured with the static IP and its DHCP client disabled.

Please see section 3.2.2.3 for more information on configuring DHCP services on an interface.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 63

Field Content

MAC The device's unique hardware address. May be left empty if an IP address is provided.

IP Address An IP address unique to the device on the network. Auto-assigned (leave empty) if Auto IP Client is enabled.

Network Mask The network mask the device should be configured with. Auto-assigned if Auto IP is enabled.

Table 5: Generic device configurationSip Handset Provisioning

3.5 Managed Sip phone provisioningSIP handsets can be configured and manipulated in various ways directly from the Com.X GUI.

For each phone added to the hardware list, a corresponding .cfg file, marked as unique to the handset with a matching MAC address, is created and stored within

/etc/commagui/autoprovision/, where each phone manufacturer and then model, is

allocated its own folder containing the .cfg files of all similar handsets. Changes made on the GUI are reflected in these files, which are requested by their corresponding handsets on start up.

A configuration backup of the system will back up these files to the backup archive. Should an archive be restored, in which configuration files are present, they will be restored to the correct folder within /etc/commagui/autoprovision/ after the restore has been applied. Restoring the factory default .tar.gz archive on the Com.X unit will result in these files being deleted and the Com.X losing all association to the phone. Each handset will have to be re-added to the hardware panel to allow configuration of any of the settings mentioned.

Note: If the phone connects to a network with a DHCP server other than the Com.X present, the DHCP server should configure option 66 to refer to the Com.X when responding to phone DHCP requests.

Much like a firewall is able to block unwanted traffic by forwarding selected ports on the Com.X to be visible from the internet, the Com.X is able to port-forward traffic to the handsets so that they sit behind the Com.X, but can still be safely accessible from the internet. This allows for the installation of unconfigured phones on site, to be configured remotely at a later stage.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 64

Figure 60: The Com.X forwards and proxies the necessary traffic to the handsets so that they can sit safely behind a firewall and still be configured remotely.

This means that an array of phones can sit behind a firewall, and be configured remotely.

3.5.1 Adding Hardware (Managed SIP Device)In order to configure a sip handset, it needs to be added as a hardware device on the system.Once a phone is added as a hardware device, the ports of the handset become visible on the CommaGUI ports tree and are available for configuration.

Note: If a phone is featured on the hardware list, either as a managed SIP phone, or a generic device, the GUI of the phone can be accessed through the GUI of the Com.X. This is done by forwarding ports, ensuring that all hardware is available remotely, even if it is behind a firewall.

3.5.1.1 Manually add Managed SIP Phone

It is possible to manually add a device, without the device even being present on the network, however the MAC address of the device must be known. This allows for configuration of units prior to installation, or for the autoprovisioning of handsets that are receiving DHCP ip addresses from remote servers.

Figure 61: Adding Hardware.

Select Options → New and then select either the manufacturer of your handset.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 65

Figure 62: Configuration options for a Managed SIP Phone.

Note: If a Managed SIP Phone is receiving DHCP from a remote server(i.e. Not from the Com.X), that dhcp server should be configured to set option 66 to contain the location /etc/commagui/autoprovision on the Com.X server.

Field Description

Device Name Choose a suitable name for the device.

Model Type Use the drop down list to select the appropriate model

Auto IP On first boot, request an IP address from the Com.X Manager. Once an IP has been allocated, the Auto IP field becomes disabled and the IP is statically reserved for the device by the Comma Manager, always issuing the same IP to the device matching the configured MAC address.

Mac Address The Mac address of the device being added. This field is used to identify the device when it is physically connected to the network.

IP Address An IP address unique to the device on the network. Auto-assigned if Auto IP Client is enabled.

Network Mask The network mask the device should be configured with. Auto-assigned if Auto IP is enabled.

Attached Network The network interface through which the device will connect to the Com.X.

Configuration Path The location on the com.x at which the configuration is stored. This read only variable can be copied from the GUI if it is

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 66

required elsewhere.

Autoprovision Firmware

If a .rom firmware file has been added to the Com.X via the file manager, selecting the .rom will install the selected firmware on the handset.

3.5.1.2 Adding an Auto-detected Managed Sip phone

If a compatible phone is receiving an IP from a DHCP server on one of the ethernet ports on the Com.X, it should identify themselves as Managed Sip phones. To scan for a list of devices obtaining IP addresses from the Com.X, select scan and enable the auto detect option.

Figure 63: Enable Auto Detect to see a list of devices receiving an IP address from the Com.X.

You will notice the number of detected devices (displayed in the top right hand corner of the GUI) increase.

Figure 64: Detected Devices increases.

Select Options, and then Detected to see a list of detected phones. Select a Managed SIP Device.

When configuring an auto-detected device the Com.X automatically detects and populates all fields with appropriate settings. The name of the device is defaulted to the Mac address of the unit, and this is the only field that should require (optional) editing.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 67

Figure 65: Adding Managed devices.

Figure 66: Auto-detected Managed SIP Device configuration options.

Field Description

Device Name Choose a suitable name for the device. By default, this field is set to contain the MAC address of the device.

Model Type On a Managed SIP phone, the device should automatically populate this field with its model type.

Auto IP This option is enabled by default for a detected device.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 68

Mac Address This field contains the MAC address of the device, and is populated automatically for a detected device.

IP Address An auto-detected device will have received its IP address from a DHCP server on the Com.X, so this field will automatically be populated by the GUI.

Network Mask The network mask of an auto-detected device will be automatically configured.

Attached Network This field will be automatically set to the interface serving DHCP to the auto-detected phone.

Configuration Path The location at which the configuration file for autoprovision is stored. This read-only variable is available to be copied and pasted from the GUI.

Autoprovision Firmware

If any compatible .rom firmware files have been uploaded to the Com.X, they will be available as choices here. Selecting any .rom file in this field will install the selected firmware on the device.

Accept and Review/Apply your configuration changes.

3.5.1.3 Provisioning via Spreadsheet based configuration

For larger installations, featuring several sip endpoints,spread sheet provisioning is a very powerfull tool. Various fields are configurable on the spreadsheet and will be automatically added to the configuration of the phones, once the Com.X detects them.

3.5.1.3.1 Adding hardware via spreadsheet

To add hardware via spreadsheet, first prepare a spreadsheet containing your handsets, extension numbers and settings (voicemail, DNS, NAT etc).

Navigate to Options and select Spreadsheet the import. Browse for your spreadsheet file and select ok.

A sample spreadsheet for you to work from is available at: http://www.farsouthnet.com/wp-content/uploads/2013/08/Com.X-IP-phone-config-sample.xls

Note: The fields listed in the spreadhseet can vary and not all options need be configured. It is recommended that anyone using spreadhseets to configure phones first manually add a few managed sip phones to a unit and then export a spreadhseet of the configuration, which can be used as a template for all future configurations. See Section 3.5.1.3.2 for details on exporting a spreadsheet.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 69

Figure 67: Options to import or export hardware spreadsheet files.

Figure 68: Browse for the appropriate spreadsheet file.

Note: Provisioning from a spreadsheet will configure the extension automatically. Spreadsheets should not contain extension numbers for any existing extensions. If an existing extension number is present on the spreadsheet, it will be deleted and replaced by a new extension of the same number, featruing the configurations of the spreadsheet entry.

Note: If a handset in the spreadsheet already exists on the Com.X (identified by MAC address) the handset will be updated with the settings from the spreadsheet.

3.5.1.3.2 Exporting spreadsheet of current hardware and extensions

The GUI can produce a spreadsheet export of your current hardware and extension configuration. This export can be useful as a template, where only mac addresses and other optional changes need to be made from system to system.

To export your hardware and extensions select Options, Spreadsheet and then Export.

3.5.2 Removing a hardware device To remove a device that has been added as hardware, simply right-click the device in the hardware list, and select remove. Once you apply the device and its ports will be removed from the GUI. Any extensions configured on the ports become free extensions, but remain in any inbound routes, ring groups or queues.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 70

3.5.3 Restore Factory Defaults of a Managed handsetTo restore factory default configuration of a managed phone, right-click on the phone in the device list and select the Factory Defaults option. This will delete any non-default configuration on the phone.

If you have the phone any extensions configured on the phones ports, the phone will receive this configuration when it starts up. To have the phone remain in a factory default configuration, first delete or unassign extensions on the phones ports and then factory default the phone.

Note: It is recommended that any phones that are added be factory defaulted as a part of their initial configuration. It is not possible to reassign lines on devices if they are already assigned to extensions, the association to the extension must first be deleted. Factory defaulting phones as you install them deletes any extensions configured in a previous installation and ensures that the Com.X is able to configure all lines seamlessly.

3.5.4 Configuring Extensions on a Managed Sip phoneBy default, Line1 of any Managed Sip Phone will be enabled. Any further lines will first have to be enabled before they can be configured to support and extension.

3.5.4.1 Enabling Lines

To enable a line on a Managed Sip Device. Select the device in the hardware list. Find the desired line from the ports tree on the right hand side of the GUI. Right-click the line and tick the Enabled box.

Figure 69: Enable the line on the device.

3.5.4.2 Assigning Extensions to Managed SIP Devices

Extensions can be assigned to the enabled lines of Managed SIP Devices using one of two methods:

3.5.4.3 Creating New Extensions

Extensions that have yet to be created can be created and assigned to the Managed SIP Device simultaneously.

To create new extensions that are assigned to the Managed SIP Device, navigate to the Extensions page of the GUI and right-click the particular line on the device in the ports list. Then select Assign.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 71

Figure 70: Right click the appropriate line in the ports tree to assign it a new extension.

Multiple extensions, with consecutive DID numbers can be assigned to multiple lines on the device by holding 'Ctrl' while selecting individual lines, then right-clicking and selecting assign.

Figure 71: Consecutive extensions can be created and assigned to multiple lines on the same device.

Enter the DID of the starting extension, this extension will be assigned to the first selected line on the handset. The other selected lines on the device will be assigned extensions with consecutive numbers.

Figure 72: Four extensions will be created and assigned to the lines of the same handset.

3.5.4.4 Assigning free extensions to available lines on Managed SIP Device

A free extension configured on the system can be assigned to an available line on a SIP handset. Left-click the appropriate line in the port tree of the Extensions page of the Com.X GUI and (while holding left click) drag the line over the entry of the desired free extension and then release.

A green tick icon indicates that the selected extension is available for assigning, whilst a red cross icon indicates that an extension is not available to be assigned.

Figure 73: Click and drag the desired line over the desired free extension. Note the green tick icon on the line being dragged.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 72

3.5.4.5 Configuring a port on the Phone to register as an extension on a remote system

If there is an unused port(line) on the handset, you can configure it to register as an extension on a remote PBX, from the Com.X GUI.

Navigate to the hardware page and select the port from the port tree. Right-click and select Edit.

Figure 74: Editing a line on a Managed Sip Phone.

FIELD DESCRIPTION

Enable If not ticked, the line will not be available for configuration.

Local Extension Port

If enabled, SIP Server, Register Login and Register Password fields will be automatically populated. Disable this option to manually enter configuration details and register an extension on a remote system.

Label on Phone Enter the label you would like to see on the phones display.

Register Login If Local Extension Port is disabled, this field can be edited to contain the authorisation name for an extension on a remote system.

Register Password

If Local Extension Port is disabled, this field can be edited to contain the password for an extension registering on a remote system.

SIP Server If Local Extension Port is disabled, this field can be edited to contain the IP address of the remote SIP server on which the extension is registering.

SIP Server Port If Local Extension Port is disabled, this field can be edited to contain the port on which the extension should register on the

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 73

remote system.

Use Outbound Proxy

If enabled, an outbound proxy can be configured through which to register the extension.

Outbound proxy The address of the outbound proxy through which the extension registers with the remote system.

Outbound Proxy port

The port of the outbound proxy through which the extension registers on the remote system.

NAT Traversal If enabled, the phone will use NAT to locate its remote host.

Note: In order for a line on a managed Sip phone to register as an extension on a remote system, correct routing needs to be configured on both systems. This would require a route to allow the phone to connect to the external network through the correct interface, and a corresponding route on the remote system, directing traffic to the phone to the correct interface.

3.5.5 CodecsBy default extensions created in the above manner, will be configured to support an alaw codec. To add or remove supported codecs to the extension, right-click the extension and select “Edit”. Select the “Codecs” tab. This will present a list of available Codecs. To select multiple Codecs, hold “Ctrl” and click on the desired Codecs.

Figure 75: Extensions can be configured to support multiple Codecs.

3.5.6 Removing an association to an extensionTwo possibilities exist for removing extensions from device lines.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 74

3.5.6.1 Unassigning Extensions

To unassign an extension, right-click on the extension in the extensions list and select Unassign. This will result in the phones line becoming a free port and the extension becoming a free extension. The extension will remain in any inbound routes,destinations (queues and ring groups) and flex-path contexts and can be logged in to from any free port by dialling the *11 feature code (See section 3.7.5 )

3.5.6.2 Deleting Extensions

To delete an extension, right-click on the extension in the extensions list and select Delete. This will result in the line on the phone becoming a free port, and the extension being deleted. The extension will be removed from any inbound routes, queues, ring groups, flexpaths and other internal destinations.

Illustration 2: Deleting or Unassigning an extension will result in a free port on the phone.

3.5.7 Advanced Configuration options for Managed SIP DevicesThe advanced configuration options can be configured by right-clicking the Managed SIP Device entry on the hardware panel and selecting 'Advanced'.

3.5.7.1 Configuring Soft Keys

The Com.X GUI offers a mechanism to provision the soft keys keys of compatible handsets. These keys can be set to transfer to, and monitor the status (through BLF) of : other extensions, conference extensions, queues, ring groups, parking lots and particular parking bays within parking lots.

3.5.7.2 Configuring keys individually

Right click the device and navigate to Advanced ->Switchboard.

Using this interface, the keys of the handset, as well as any extension modules to which it is connected,can be configured directly from the GUI.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 75

Figure 76: Available destinations for soft keys include extensions,conferences,queues,ring groups, parking lots and individual parking bays.

Right-click the particular key you wish to edit, and select a destination.

If the user of the managed SIP Device is on a call, pushing the key will transfer the call to that destination. If no call is in progress, pressing the key will initiate a call to the destination.

By default, the DSS key will also show the status of the destination through the Busy Lamp Field. If the destination is available, the lamp next to the DSS key will be green. If the destination is busy, the lamp will be red and if the extension is ringing, the light will flash red.

3.5.7.3 Configuring Multiple DSS keys to map to consecutive extensions.

It is possible to simultaneously configure multiple keys to map to extensions. Right-click the Managed SIP Device in the hardware list. Navigate to Advanced->Switchboard and then select multiple soft keys by left clicking the first key you would like to edit and then holding shift while left clicking the last key in the range. To select non-consecutive keys, hold Ctrl while selecting the desired keys.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 76

Figure 77: Multiple DSS keys can be configured to transfer to consecutive extensions

Select the Extension option and choose the first extension in the range. The first highlighted key will then be set to the first extension selected and the subsequent keys set to the next extensions featured in the list.

3.5.7.4 Adding an Extension Module

To add an extension module, simply click “Add”. Navigate to the correct EXT tab to configure the soft keys of the extension module. Multiple extension modules can be added to handsets that support them.

The EXT keys are configured as per section 3.5.7.1.

Note: Applying any changes to Managed SIP Devices from the Com.X GUI will cause the handset to reboot. The device will reboot,and then update configuration upon startup. This process results in the phone being unavailable for around one minute after a Review/Apply.

3.6 Configuring Comma device portsWhen a device is selected in the device list, the available ports on the device are categorized and listed in the ports tree on the right of the Hardware panel. Comma ports are enumerated using the device's name, the card index in the device and the port number. I.e. device:a2-5 would indicate the fifth port on the second analogue card (a – analogue, d – bri, p – pri) in a device called 'device'.

3.6.1 Configuring Analogue Trunk (FXO) portsTo edit the configuration of an FXO port, double-click on the desired port from the ports tree on the right of the hardware panel.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 77

Field Content

Input gain Indicates how much, if any, gain adjustment should be performed in the input direction. Values are in decibels.

Output gain Indicates how much, if any, gain adjustment should be performed in the output direction. Values are in decibels.

Echo canceler The echo cancellation delay and algorithm to be employed on the port. The delay up to which the echo canceler can compensate is specified in milli-seconds. An optional non-linear processing echo suppression algorithm (NLP) can also be employed during echo cancellation. If you expect the devices connected to the port to be in a noisy environment how-ever, you might prefer not to enable NLP, as it might result in the far-end noise being cut off when speech ceases. Some local users may find this uncomfortable. NLP is recommended for quiet remote environments. Please see section 3.6.8.1 for a detailed discussion around echo cancellation.

Detect Fax When enabled, the Com .X will differentiate between an incoming call and an incoming fax. Any echo cancellation configurations will be bypassed and the jitter buffer for the call adjusted for a higher tolerance, in the event of an incoming fax.

DID number A direct inward dialing number to associate with this port. A call incoming on this port may be routed using the DID.

DID description A custom description for the DID.

Detect caller ID If this is enabled, the incoming caller ID, if available, will be detected and may be used in inbound routing.

Hangup detection

Devices such as Least Cost Routers connected to FXO ports, or the Telco equipment in various parts of various countries may signal hangup differently. Change this setting to match the tone set for the country of device deployment, or the duty cycle of the hangup signal you are receiving. Options include 250, 500 or 2500 ms of tone followed by the same period of silence and any regular pattern.

Note: if a country tone-set is not available for the country of deployment and as a result on of the available duty cycles is configured, it is possible that different exchanges routing inbound calls to the system might have different end-of-call tones.

This may result in FXO port lockup if the varying tones cannot be detected using the configured duty cycle. If this is the case, use the 'Any regular pattern' setting to detect such tones.

For more information on the options available to detect end-of-call under such conditions, please see the Com.X Trouble-shooting guide.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 78

Table 6: FXO port configuration

3.6.2 Configuring Analogue Extension (FXS) ports

Field Content

Input gain Indicates how much, if any, gain adjustment should be performed in the input direction. Values are in decibels.

Output gain Indicates how much, if any, gain adjustment should be performed in the output direction. Values are in decibels.

Echo canceller The echo cancellation delay and algorithm to be employed on the port. The delay up to which the echo canceler can compensate is specified in milli-seconds. An optional non-linear processing echo suppression algorithm (NLP) can also be employed during echo cancellation. If you expect the devices connected to the port to be in a noisy environment how-ever, you might prefer not to enable NLP, as it might result in the near-end noise being cut off when speech ceases. Some remote users may find this uncomfortable. NLP is recommended for quiet local environments. Please see section 3.6.8.1 for a detailed discussion around echo cancellation.

Allow transfer If enabled, the phone using this port is allowed to transfer calls.

Immediate mode When enabled, ring tone is not provided when the phone goes off hook and the Com.X is required to take immediate action, such as dialing an emergency number. Please see section 3.12.11.7 for more detail on using FlexPath with his feature.

Fax channel Indicates that this port is to be used for fax. Enabling this setting disables echo cancellation on the port. Please see section 3.6.8

Table 7: FXS port configuration

3.6.3 Configuring BRI ports

Field Content

Link Type Indicates whether this device is part of a point-to-point (i.e. DIDs may be issued by the telco) or point-to-multipoint (i.e. one or more multi-subscriber numbers may be issued, or multiple BRI devices share the BRI bus.) The link type needs to match the mode of the service provided by the telco.

Act as NT When disabled, the device is an ISDN TE, connected to the telco NT. When enabled, this port acts as though it is an ISDN NT device. This is useful when the Comma device is placed between the PBX and the telco NT, e.g. for least-cost routing and BRI gateway routing.

Bus termination Comma BRI cards have terminating resistors on-board, removing the need for external terminators. If this device should terminate

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 79

Field Content

the BRI bus (this is the usual case), enable this setting.

If multiple devices are attached to the BRI cable (point-to-multipoint) and another device is providing termination, the Com.X can be configured not to terminate.

A BRI link should always be terminated by a device on at least one side of the BRI connection, or electrical reflection on the link could interfere with BRI signaling and result in loss of layer 1 link establishment, or CRC errors.

Echo canceler The echo cancellation delay and algorithm to be employed on the port. The delay up to which the echo canceler can compensate is specified in milli-seconds. An optional non-linear processing echo suppression algorithm (NLP) can also be employed during echo cancellation. If you expect the devices connected to the port to be in a noisy environment how-ever, you might prefer not to enable NLP, as it might result in the far-end noise being cut off when speech ceases. Some local users may find this uncomfortable. NLP is recommended for quiet remote environments. Please see section 3.6.8.1 for a detailed discussion around echo cancellation.

Note: This setting applies to all BRI ports in the same BRI trunk group as this BRI port. This option is not available if the port is not part of at least one BRI trunk group.

Detect Fax When enabled, all BRI ports in all trunk groups to which this BRI port belongs will detect fax tones and disable echo cancellation for the duration of a fax call. We recommend enabling this feature on all BRI ports that are likely to support fax calls.

Note: This option is not available if the port is not part of at least one BRI trunk group.

Table 8: BRI port configuration

3.6.4 Configuring PRI

Field Content

Physical interface The service offering, either 23B+D T1 or 30B+D E1. For E1, double frame or CRC4 multi-frame can be enabled, and for T1 framing can be either Super Frame (D4) or Extended Super Frame (ESF, using CRC-6) The physical interface configuration must match that of the PRI peer.

Switch type National switch type options are:

US National ISDN phase 1 (NI-1)

US National ISDN phase 2 (NI-2)

ETSI “Euro” ISDN: Europe ISDN standard

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 80

Field Content

QSIG: protocol for switching between PBXs

Signaling role When configured as Terminal, the device is an ISDN TE, connected to the telco NT. When configured as Network, this port acts as though it is an ISDN NT device. This is useful when the Comma device is placed between the PBX and the telco NT, e.g. for least-cost routing.

Overlap dialing Enabling this setting will result in digits being transmitted across the PRI link as they are dialed, as opposed to the full number being collected before dialing. Overlap dialing allows a destination number to be specified partially resulting in the first stage of a routing path being established before the remaining digits arrive.

Table 9: PRI port configuration

3.6.5 Removing devicesTo remove a device configuration, select Remove from the device's context menu.

Note: Any of the device's ports that are included in trunk groups will be removed from the groups, outbound routes that make use of the ports will no longer be associated with the ports and any extensions associated with device ports or channels will become unassigned.

3.6.6 Echo cancellationWhen two phones, B and C are in a call, and the person's speech at phone C is reproduced at phone B, some of the audio exiting B's earpiece re-enters B's microphone and is returned as echo. Analog lines exacerbate this problem due to additional reflection of audio in the electronic circuitry. The result of audio feedback at B is that person C hears his/her own voice after a short delay i.e. echo occurs.

The person hearing the echo should look to the remote party for the cause of the echo and not to their own phone and system. If both parties experience echo, both systems should be investigated.

In analog phones, both the 2-wire to 4-wire converter (hybrid) and the handset can introduce echo. The Com.X impedance parameters are aligned with South African telecommunications standards. Non-compliant handsets with a large impedance mismatch are likely to introduce noticeable echo. The delay introduced by VoIP based systems can result in the returned echo becoming noticeable to the person who is speaking.

The degree of echo and the delay between the original audio and the echo is a function of the handset, gain settings, potential wiring problems and the audio transmission path.

The Com.X products incorporate a sophisticated Echo Canceller for each telephony channel (BRI, PRI or analog). The algorithm adapts to the detected audio feedback within a configurable timeframe of 16, 32 or 64 milliseconds, and attempts to create an identical image of the echo, which is then removed from the audio signal prior to

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 81

sending it on to the other party. Generally, a shorter timeframe is preferable since it reduces the time the algorithm takes to “learn” the feedback environment. Typically, echo is reduced to below detectable levels within 1 – 2 seconds. In extreme cases convergence might take 3 – 12 seconds, during which call quality would increase to an optimum.

After primary echo has been canceled in this way, some residual echo may remain (echo present beyond the time-frame the canceler buffered or “non-linear” reflections). Such echo is then removed by a non-linear echo cancellation algorithm, if enabled. This may result in one of the parties' audio being clipped when both parties are talking. Some users may find this uncomfortable. If this is the case it might be preferable to disable the NLP.

Although the default (16ms + NLP) is normally a good compromise, the Echo Cancellation settings may need to be adjusted on a per-port basis, as the audio environment might differ from one port to the next (e.g. an office environment for one range of extensions vs a factory floor for another and an open plan arrangement for another range of extensions.)

Wiring problems, such as power cables crossing telephone cables, or insufficient earthing of the Com.X or iTAs may add noise to the audio path that may reduce performance of the algorithm.

In diagnosing echo cancellation problems, establish good earth (~0.5 ohm or less, if resistance approaches 1 ohm earthing might be a concern), and proceed to eliminate each of the potential contributing elements from the equation by testing with different phones, connecting phones directly to the Com.X FXS ports, turning echo cancellation off completely to establish a quality baseline and then trying different combinations of echo cancellation, with and without NLP, on the different extensions.

Often the first measure to attempt, often yielding the greatest improvement is to try adjusting the gain on problematic extensions.

Note: In exceptional circumstances, if the echo cancelers take a long time to converge (e.g. > 10 seconds), the acoustics of the environment might be introducing too much echo, long loops may be present in the telco network and / or the handset might be too sensitive.

Adjusting the gain on the port down might help, or fixing the FIR coefficients in the echo canceler for that port might help. After restart, the first call on ports configured thus would take a long time to converge, and there-after the coefficients are re-used for subsequent calls. Due to the dynamic nature of echo, fixing the coefficients is not recommended for most cases.

To fix the coefficients select the 'Keep' option on the FXO/FXS port.

Following this, restart the iTA for the new settings to take effect with:

comma-ls -r

Please note that echo heard by users of the Com.X (as opposed to external parties) is typically caused by the remote party. The Com.X does attempt to cancel the echo from the remote party on BRI, PRI and FXO connections to the telco, but the effectiveness of this cancellation is highly dependent on external conditions which are impossible to predict or control.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 82

Note also that SIP connections (including local SIP phones) are never echo cancelled (it is not technically feasible) – therfore, this is the responsibility of the SIP phone itself or of the upstream service provider.

Figure 78: Echo cancellation

3.6.7 Earthing the Com.XProper earth with < 0.5 ohm measured from the Com.X stud to the earthing point, preferably to telco or failing that, building earth should be present on all installations.

The Com.X provides an earth connection in its power brick and cable. If a good mains earth is present, a separate earth strap to the Com.X earth stud could be unnecessary.

The Comma iTA (if present) does not have an earth connection in its power brick and must be earthed using an earth strap and its earth stud.

It is important that Com.X and iTA devices are earthed in a “star” pattern to a single earthing point. Do not wire an iTA to a Com.X's earth stud or vice versa.

Be careful not to create earth loops which may induce noise into the system. Ensure high quality multi-adapters (multi-plugs) are employed, and do not place the Com.X at the end of a chain of devices chained on the same multi-adapter.

3.6.8 Configuring devices for Fax / modem support

3.6.8.1 Echo cancellation

Echo cancellation plays an important part in ensuring voice quality through the telecommunications network.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 83

The Com.X product range incorporates state of the art, innovative, embedded on-DSP-chip echo cancellation that off-loads resources from the system server.

Echo cancellation can how-ever affect fax and modem signaling and data. It is therefore important to understand the impact of echo cancellation on fax and modem negotiation and configure devices correctly for fax use.

Echo cancellation is performed at the source device, where 'source' here indicates a network endpoint that introduces a signal into the PBX system. In the Com.X systems echo cancellation takes place on FXO, BRI and PRI ports/channels terminating traffic from the PSTN for routing in the system, as well as FXS ports originating calls via the PBX.

If not configured properly for fax support, faxes and modems may fail or higher baud rate operation might not be possible.

At these sources, if a fax start “CNG” tone is detected and the port / channels are correctly configured for fax, the echo cancelers are automatically disabled, and a clear channel is offered for fax service.

In the case of PRI and BRI channels, channels may serve both voice and fax traffic, and detection of the fax tone is required before echo cancellation can be switched off. This detection is configurable from the Hardware panel for BRI trunk groups and PRI ports.

Since fax devices are usually affixed to individual ports, and specific incoming DIDs reserved for fax use, in the case of FXS and FXO, ports need to be deliberately reserved for fax use by disabling echo cancellation. This is done for FXO ports by enabling the “Detect Fax” option, and for FXS ports by enabling the “Fax channel” option in the hardware panel, which disables echo cancellation and configures additional jitter buffering for the port.

3.6.8.2 Telco issues

Telco FXO connectivity, cable distance and environment, etc. introduces additional signal to noise ratio and impedance elements into the equation and may not support high baud rates.

3.6.8.3 Timing

Timing in the system is very important to ensure successful fax / modem communication. The iTA device (e.g. the internal BRI / PRI enabled iTA MPC card in the Com.X1 case or the BRI / PRI iTA in the Com.X2 case) connected to the telco interface should have the highest timing priority (line N), and other iTAs connected should derive timing from this device (system). Please see section 3.4.5.1 for detail on configuring the timing source on an iTA device.

In scenarios where multiple PRI links are configured to the same telco, setting the first PRI as PRI Line 1 is recommended (i.e. deriving clocking from the telco line) and setting all other PRIs to System (i.e. sharing the clocking of the first PRI in the transmit direction and honoring the telco's clocking on each PRI in the receive direction.

In gateway scenarios, where one or more PRIs face the telco and one or more PRIs face a 3rd party device, the telco-facing PRIs should be configured as above, and the PRIs facing the 3rd party device should be configured to use System timing. In this scenario the “transmit clocking” setting should be enabled the relevant PRI ports in the GUI hardware panel.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 84

This indicates to the Com.X that the receive direction clocking (from the 3rd party device) should not be honored (as in the telco case), but that the Com.X should propagate its system-derived timing to the 3rd party device. In such configurations the 3rd party device should be configured as a clock slave.

This additional configuration is not required for BRI ports, as the NT/TE mode setting on BRI pre-selects the correct timing driver on the gateway leg facing the 3rd party device. BRI timing configuration follows the same Line Priority and System configuration pattern as described above for PRI.

If an iTA is connected to a switch located between the iTA and the Com.X host server, network packet delays could occur which could also affect timing. If this is the case, from the GUI, Monitor – Telephony – dahdi statistics should show slips and skips increasing on the span to the iTA. The Com.X can be instructed to buffer in the receive direction from the iTA in order to alleviate such network delays. This is done by enabling the “Network slip tolerant” setting on the GUI under Setup – Global Settings.

Please also refer to the Com.X troubleshooting guide for more information on fax and modem troubleshooting.

3.6.8.4 Additional configuration for faxing over PRI

In order to enable clear-channel communication for fax over PRI, the PRI needs to be configured to allow fax detection and the disabling of echo cancellation on fax calls. This is performed by enabling the “Fax detect” setting on the PRI port in the hardware panel.

3.7 Extension configuration

3.7.1 Extensions and Extension PortsThe Com.X treats extensions and extension ports differently.

• Extensions represent dialable numbers (users) in the system, e.g. extension 1000.

• Extension Ports represent hardware devices available for making and receiving calls, e.g. FXS lines (analog phone) and SIP phone lines.

Note that a SIP phone may have more than one line and hence more than one extension port.

Extension Ports are created when Comma or Managed SIP devices are added in the Hardware Panel, and when Generic SIP extensions are added in the Extension Panel.

An Extension and an Extension Port can be associated, either by configuration as described below or by “hot-desking” user login.

3.7.2 Listing existing extensions and portsTo manage the list of configured extensions, select Start, followed by Configuration and the Extensions panel.

Configured extensions are categorized as those having been assigned to extension ports, and those that are unassigned (free extensions). Free extension ports are also listed. These ports are available for either fixed extension assignment or for dynamic extension login (hot-desking).

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 85

For each extension, the number, friendly name, pickup group, port assignment, port secret, extension type (analogue or SIP), class of service and voicemail indicator are displayed.

At the right of the extensions panel, available FXS and SIP extension ports are shown, with current extension number assignments to these ports appended in square brackets.

3.7.3 Adding ExtensionsExtensions can be added either by selecting extension ports in the ports list and right-clicking to assign extensions to the ports (select multiple ports for assignment using CTRL-click), by dragging a port from the tree on the right onto a free extension, or by using the Add button on the Extension panel to add free or generic SIP extensions. Individual extensions, or a range of extensions can be added.

Figure 79: Assigning extensions

3.7.3.1 Adding extensions from ports

Single extensions or a group of extensions can be assigned to available extension ports by selecting the ports in the ports list and selecting Assign from the context menu.

A starting extension number can be specified, and upon acceptance extensions are numbered incrementally from the starting number for the number of extensions selected.

Note: The end of the range is not specified, instead the number of extensions desired is specified. If a large range is entered, the GUI will present a warning to the user.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 86

3.7.3.2 Adding Unassigned extensions

When a range of extensions is added, the friendly name is set equal to the extension number.

3.7.3.3 Adding Generic SIP extensions

A Generic SIP extension allows local or remote login of any standards based SIP phone or softphone.

When a Generic SIP extension is created, both an Extension and an Extension Port are created with the same name, and automatically associated together. In this case, there is no device element related to the Extension Port.

The following password generation schemes are supported for SIP extensions:

•Fixed: The same password is set for all the newly created extensions. A new strong, random password of length 12 is suggested by default.

•Same as Extension: The password for each newly created extension is the same as the extension number.

Note: setting the extension password to the extension number is strongly discouraged and may lead to weak system security!

•Random: A strong unique, random password of length 12 is generated , for each newly created extension.

3.7.4 Configuring extensions

3.7.4.1 Basic configuration

Field Content

Number The extension number selected during creation. This cannot be changed after extension creation.

Friendly name A custom name for the extension

Port The device and port the extension has been assigned to, if any. This can only be changed by unassigning and re-assigning the extension (please see 3.7.9 and 3.7.8)

Table 10: Extension configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 87

3.7.4.2 Advanced configuration

Field Content

Voicemail Enable this to enable voicemail for the extension.

Note: Disabling voicemail will reset any call recording settings that may have been configured on the extension!

Pin The user pin used to access voicemail and features

Email An email address to which voicemail will be emailed

Call waiting Enables the call waiting feature, allowing an indication to be provided to the user when an incoming call arrives while the user is on the phone

Ring time The number of seconds to ring before activating voicemail. This setting is ignored if voicemail is not configured, or follow-me is active

Pickup group Assign this extension to a pick-up group, allowing other members of the pick-up group to pick up this extension when it rings using a specified feature code (*8). Specify multiple pickup groups using “,” E.g. “1,2,3” In order to allow an extension to be picked up using directed pickup (**) from any group, enter a * in this field.

Account code The account code to be recorded in the CDR record for calls placed by the extension.

Note: FlexPath account code or outbound trunk CID override configuration may supersede the value configured here.

Table 11: Advanced extension configuration

3.7.4.3 Configuring Follow-me / Divert

Extensions can be configured to forward calls to other extensions in a follow-me list. From the Extensions panel, right-click the extension and select 'Follow me'. Configure the follow-me settings:

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 88

Field Content

Disable When checked, the follow-me configuration is ignored and the extension rings as usual.

Note: when follow-me is disabled here, directed pick-up of the extension is no longer available.

Initial Ring Time The number of seconds to ring the extension before processing the follow-me list. If set to 0, the follow-me list is processed immediately (e.g. divert). The extension may be in its own follow-me list, in which case it will also ring.

Ring strategy Determines the strategy in which extensions in the follow-me list rings. One of:

Ring all (v2): Ring the primary extension for the initial ring time, then rings all the extensions in the follow-me list simultaneously until one answers

Note: In certain configurations “Ring all (v2)” results in an extension ringing only once. If this is problematic, change the ring strategy to “Ring all”

Ring all: Rings all the extensions in the follow-me list simultaneously until one answers

Hunt: Rings available extensions, one at a time, in turn.

Memory Hunt: Rings the first extension in the follow-me list, then the first and the second, then the first, second and third, etc.

First available: Rings only the first available extension (if that extension is engaged, but has call waiting, it will ring call waiting) I.e. 'available' includes the concept of call waiting.

First not on phone: Rings the first available extension for which the phone is not off-hook (i.e. ignores call waiting settings)

(strategy)-prim: This setting behaves as the selected strategy described above, however, if the primary extension is engaged or set to do not disturb, the extensions in the follow-me list are not processed.

Ring time The maximum time to ring phones. If the selected strategy is a hunting strategy, this is the duration of each ring iteration.

The maximum value for this field is 60 seconds.

Follow-me list The list of extensions to process according to the ring strategy. This list may include the primary extension itself and may also include external numbers, suffixed with a #, in which case the number would be called using the applicable outbound route. E.g. including 0115551234# in the follow-me list would call the

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 89

Field Content

external number 0115551234

Announcement An announcement to be played to the calling party before processing the follow-me list. Please see section 4.17 for more detail on system recordings.

Play Music on Hold?

If set to Ring, will play ring-tone to the calling party while processing the follow-me list.

If set to a music on hold class (e.g. Default), will play music to the calling party while processing the follow-me list.

CID Name Prefix An optional CID prefix to display to the ringing extensions.

Alert info Optional SIP alert info to enable SIP extensions in the follow-me list to ring differently on receiving forwarded calls from the primary extension

Confirm calls When enabled, extensions in the follow-me list are required to press 1 when picking up the call to confirm that the call has been answered. This is useful for preventing voicemail on external numbers from picking up the call when another extension down the follow-me list could still be serviced up by a person. This feature is only available for ring-all strategies.

Remote announce A message to be played to the person answering the call in the case where call confirmation is required. Please see section 4.17 for more detail on system recordings.

Too-late announce A message to be played to a person answering the call in the case where they have picked up the call, have not pressed 1 to confirm yet, and in the interim someone else has picked up and confirmed. Please see section 4.17 for more detail on system recordings.

Note: It is recommended that a too-late announcement is configured on all follow-me's. Without such an announcement the person answering the extension too late might interpret the engaged tone as a dropped call.

Destination if no answer

The destination to route the call to if the ring strategy is unsuccessful in delivering the call (i.e. no-one answers). Please see section 3.11.4 for more detail on call destinations.

Table 12: Follow-me configuration

3.7.5 Logging into phones with an extension (hot-desking)Users can log into ports that are categorized as free ports on the Extensions panel by using the associated feature codes (the default is *11 to log in and *12 to log out) followed by their extension number and pin. Calls placed from a device connected to such a port will be flagged in CDRs as having originated from the extension number that is logged in to the device.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 90

To make a port that currently has an extension assigned to it available for dynamic login, first unassign the extension from the port, resulting in a free extension and a free port.

Note: In order to log in dynamically to a free device using a free extension, the extension must have a user pin configured.

3.7.6 Configuring SIP extensionsIn addition to the basic and advanced configurations (please see 3.7.6), SIP extensions also allow the configuration of various voice codecs in order to provide compatibility with SIP providers and phones.

Codecs supported by a SIP extension can be selected by using the Codecs button. Use Ctrl-Left-Click (holding Ctrl down) to select multiple codecs. Individual codecs can be moved up and down the codec priority list by selecting the codec entry, and selecting the Up or Down buttons. Codecs may specify the integration time in milliseconds after the codec name in the form codec:integrationtime, e.g. 'g729:40'

When negotiating a SIP call, the codec with the highest priority(at the top of the list) will be attempted first, then the second and so on.

3.7.7 Remote SIP extensionsWhen configuring SIP extensions as remote extensions at a remote site (e.g. home ADSL), if the Com.X is located behind a NAT/firewall on the network, configure the NAT/firewall to forward UDP port 5060 to the Com.X internal IP address. If required (no NAT available), also forwards RTP ports 10000-20000 to the Com.X internal IP address.

You may also need to configure the external address on the Com.X by selecting Start -> Configuration -> Setup and then setting the External address. Configure this field to the dynamic DNS name or the FQDN that resolves to the external (public) address of the Com.X (i.e. the external address should be set to the same as will be programmed into the remote phone).

If you are using dynamic DNS, make sure that the External Is Dynamic field is set to true.

3.7.8 Assigning extensionsFree extensions can be assigned to a port by editing the extension, and selecting the Port button. From there a menu of available extension ports can be accessed. Only available ports are listed in the menus.

Alternatively, drag a free port onto a free extension in the Extensions panel.

3.7.9 Unassigning extensionsExtensions' associations with ports can be removed by selecting the extension in the extensions list, and selecting Unassign from its context menu (right-click.)

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 91

3.7.10 Configuring multiple extensionsMultiple extensions can be configured simultaneously. When the list of extensions for configuration include both analogue and SIP extensions, only those fields that are not unique to any individual extension can be configured:

When only SIP extensions are included in the list, only those fields not unique to any of the SIP extensions can be configured. This includes the SIP codec configuration.

Note that, since multiple extensions may have different values for shared fields, these fields default to disabled during a multiple-edit, i.e. the form is not a reflection of the underlying configuration when first opened.

Simply accepting this form will set all the extensions' values to disabled. Canceling the form will leave all extensions' configurations unchanged. Enabling one of the fields will enable the field for all of the extension being edited.

3.7.11 Configuring Multiple Sip Extensions from a Spread Sheet.Certain Sip handsets can be added to the GUI and provsioned using a spreadsheet. This also assigns and configures the extensions as per the spreadsheet, for details on configuring handsets and extensions from a spreadsheet, please see the Adding hardware devicesfrom a spreadsheet technical note, available from http://farsouthnet.com/support/technical-notes/

3.7.12 Deleting extensionsExtensions may be deleted individually, or as a group, by selecting Delete from the extension context menu.

Note: Deleting an extension that is in use in an inbound route will result in an update to the route to terminate with hangup.

3.8 Trunk groups and VOIP providers

3.8.1 Listing existing trunk groups and VOIP providersTo view the list of configured trunks, select Start, followed by Configuration and then the Trunks Panel. The list is populated with legacy telco trunks in the top section and VOIP providers in the lower section of the panel.

3.8.2 Analogue trunk groupsAnalogue and BRI trunks can be grouped to facilitate simplified routing. PRI channels are always grouped into a trunk per PRI. Each analogue and BRI trunk may only belong to one group, containing only members of the same the trunk type (analogue or BRI).

3.8.2.1 Adding trunk groups

A new trunk group may be created by selecting Add, then the Trunk Group option from the Trunks page of the GUI..

A new group may also be created by selecting trunks of the same type, and selecting New Group from the context menu.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 92

Field Content

Name Unique identifier for this group. Analogue groups (FXO) may only be numbers from 1 – 62, and BRI groups may be any unique combination of alpha-numeric characters.

Type The group type. Only trunks of this type may be included in the group. Allowed types are:

•Analogue trunk (FXO)

•ISDN BRA (BRI)

When the group was created from a selection of trunks, the type will automatically be selected

Table 13: Trunk group configuration (addition)

After creation, the new group and any ports belonging to it will be listed under the Trunk Groups node.

3.8.2.2 Editing trunk groups

Trunk groups can be edited by right-clicking on the trunk group in the group list and selecting edit.

Figure 80: Trunk group configuration (editing)

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 93

Field Content

Enable trunk When disabled, though part of an outbound route, the trunk group will not be attempted for outbound or inbound calls. Instead, outbound calls will fail-over to the next trunk or group in the outbound route. Individual trunks in the group will still be used if they are explicitly added to and outbound route.

Outbound caller ID The caller ID to present for call placed via this trunk group.

Outbound dial prefix A prefix to be prepended to all dialed numbers on all trunks in this trunk. This can be used in conjunction with the | symbol in an outbound route dial pattern to accomplish dialed number transformations across all the trunks in the group.

Round robin Place calls using the round-robin scheme for trunk selection when placing calls using this trunk group. If not enabled, trunk selection always starts with the first available trunk in the trunk group.

Table 14: Trunk group configuration (editing)

3.8.2.3 Adding trunks to a group

Trunks may be added to a group either by selecting the trunks and creating a group using them, as detailed in 3.8.2.1, or by selecting the trunks and then selecting Add to group from the context menu and selecting an existing group of the same type. Only groups of the same type will appear as options for selection.

After being added to a group, the trunks under the Trunk Ports node will show the group name they belong to in parentheses.

3.8.2.4 Removing trunks from a group

To remove a selection of trunks from a trunk group, find the group under the Trunk Groups node and select the trunks (using Ctrl-left-click to select multiple). Select the Remove from Group option from the context menu. The trunks will be removed from the group and the reference to the group removed from the trunks under the Trunk Ports node.

Note: You will not be prompted to confirm this action.

3.8.2.5 Removing a trunk group

To completely remove a trunk group and remove the group association from all the trunks included in the group, select the group in the Trunk Groups list and select the Remove Group option from the context menu. The trunks will be removed from the group and the reference to the group removed from the trunks under the Trunk Ports node, and the group will be removed from under the Trunk Groups node.

Note: Deletion a group may affect routing. The group will be removed from routes that made use of it, potentially resulting in routes with no trunks associated (empty routes). We suggest reviewing outbound routes after any trunk configuration has been applied.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 94

3.8.2.6 Viewing group members

Membership of trunks to their respective groups may be observed either by expanding individual devices listed under the Trunk Ports node, where group membership is denoted in parenthesis after trunks, or by selecting the desired group in the group list under the Trunk Groups node, where the devices and trunks included in the group are listed.

3.8.3 SIP trunksMultiple SIP trunks can be configured for call routing. SIP trunks can also act as SIP providers, providing the capability to configure back-to-back SIP trunks for inter-office connections.

3.8.3.1 SIP call setup

SIP uses a peer to peer mechanism for call setup. In order for a call to be established, two peers need to be defined and be able to communicate with each other. This necessitates a SIP trunk entry for each peer of a given system.

Communication between two peers implies that the peer initiating the call knows the IP address of the recipient, and that the recipient can match the caller's credentials in order to allow and configure the call.

The peer initiating the call can either have the recipient's IP address configured, or may know the recipient's IP address as the result of the recipient registering with the it (i.e. the calling peer is acting as a provider.) When acting as a provider, a peer allows registration of a remote peer by matching the incoming registration request's username with the provider's SIP trunk name. At this point the provider's SIP trunk moves from having an UNKNOWN peer to being associated with the registered IP address.

An incoming call is matched by the recipient by looking at the incoming call's IP address and FROM field, which defaults to the caller ID of the caller, or the calling peer's from-user field if configured. The recipient first looks at the caller's FROM field, and if this matches the username field of a peer that has “Identify by user” enabled or a configured extension, a successful match is made.

If no such match can be made, the recipient matches the first SIP trunk entry that is associated with the IP address of the caller. This implies that, if multiple SIP trunks are associated with peers with the same IP address, they have to have “Identify by username” enabled and a username specified, and the remote peers have to have their from-user fields set to the appropriate username.

If a successful match is made and the password and codecs that are configured for that matched peer are compatible with those in the call setup request, the call is established.

This mechanism is used for call setup in both directions.

3.8.3.2 Adding a SIP trunk

To add a SIP provider, activate the Add menu on the Trunks panel. Select SIP Provider.

3.8.3.3 Sip trunk configuration

SIP trunk configuration is divided into basic, advanced and codec configuration, accessible from their accompanying tabs on the SIP Provider form.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 95

Field Content

Name The unique name of this SIP trunk. If this trunk is a SIP provider, the name of the trunk must match the username.

Description A custom description of this SIP trunk

SIP Server The address of the SIP provider peer

Port The port on which the SIP service resides (defaults to 5060)

Username The registration user name provided in the registration string to the SIP provider when registering. When registering, the username must be the same as the username configured in the SIP provider.

When not registering, if “Identify by username” is enabled, this username is used to match incoming SIP calls. I.e. the from-user field for the remote peer must be set to this value.

Password The registration password required by the SIP provider

Act as Provider When enabled, this trunk allows other SIP users to register with it. An UNKNOWN peer will be created and the IP address of the peer will be associated with this trunk on registration.

Note: When configuring a Com.X to Com.X SIP trunk, if the registering trunk is configured and applied on the registering Com.X before the SIP provider configuration is applied on the Provider Com.X, the registering box will need a 'sip reload' to initiate registration. We therefore recommend configuring and applying the provider trunk before the registering trunk. SIP can be reloaded from the Monitoring – Reload menu

Register with Provider

When enabled, the SIP trunk will attempt to register its IP address with the SIP host at the provider address configured. The registration string will use the configured username.

Identify by username

When enabled, will use the username field to identify a SIP client. This is necessary when multiple SIP trunks are registered with the same SIP provider from the same IP address and allows the provider to determine the incoming trunk from the SIP FROM field provided. The remote SIP peer's from-user field needs to match this trunk's name and username field if enabled.

Table 15: SIP trunk basic configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 96

Figure 81: SIP trunk basic configuration options.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 97

Field Content

Proxy The SIP proxy to use when establishing outgoing connections in peer to peer setups. This will in most cases be left blank when registering with a service provider, although some service providers may require registration via a SIP proxy.

Proxy port The port on which the SIP proxy service resides (defaults to 5060)

From user Defaults to the extension number of the initiator of the SIP call. If the provider rejects the registration, the from user might need to be set to the provider's registration / account / username. The from-user field only affects SIP calls, and not SIP trunk registration.

This fields overrides the caller ID number sent in the SIP call setup headers.

From domain A domain to append to the from-user during call setup. I.e. from-user@from-domain.

Auth user An authentication username to use during SIP registration and call setup.

NAT When enabled, the system ignores the SIP and SDP headers' address and port and replies to the sender's address and port. This should be enabled when the Com.X is located behind a NAT router.

Secure If this is setting is enabled, after registration with the SIP provider, all invites will require successful authentication as well as port number matching.

Disabling this settings allows invites to proceed without further security requirements after successful registration.

Skype Indicates that the trunk is to connect to a Skype Connect SIP server and configures Skype-specific trunk parameters appropriately.

Retry registration

If network problems result in trunk intermittently becoming unavailable, enable this option in order to keep retrying registration every 30 seconds, indefinitely. If this option is disabled, registration attempts will stop after 10 failed attempts.

Qualify connection

When enabled, checks the reachability of the peer every 60 seconds.

Note: SIP trunk qualification is an additional (non-standards-based) feature which allows for monitoring of SIP trunks. Not all SIP providers support this additional feature. For providers that do not support this add-on feature, the standard SIP trunking configuration is recommended (Qualify turned off)

Contact # for incoming

A DID number to assign to incoming calls on this SIP trunk. This facilitates inbound routing where the DID is not provided by the SIP provider.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 98

Field Content

Maximum # channels

The maximum number of simultaneous SIP channels supported on this trunk. Leave blank for no limit.

T.38 fax mode Configures the trunk as a T.38 end-point, allowing faxes to be sent and received using UDP over IP using the T.38 fax protocol. Also configures UDPTL and datagram settings accordingly.

Max datagram size

Fine-tuning for T.38

Table 16: SIP trunk advanced configuration

Codecs supported by a SIP trunk can be selected by using the Codecs button. Use Ctrl-Left-Click (holding Ctrl down) to select multiple codecs. Individual codecs can be moved up and down the codec priority list by selecting the codec entry, and selecting the Up or Down buttons.

When negotiating a SIP call, the codec with the highest priority (at the top of the list) will be attempted first, then the second and so on. Codecs may specify the integration time in milliseconds after the codec name in the form codec:integration time, e.g. 'g729:40'

3.8.3.4 Editing a SIP trunk

To update the configuration of a SIP trunk, select the Edit option from the trunk's context menu.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 99

3.8.3.5 Removing a SIP trunk

To remove a SIP trunk, select Remove from the Sip Provider node's context menu.

Note: Removing a provider will remove the SIP trunk from all routes that are using it, possibly resulting in routes with no trunks associated.

Note that if the trunk was a provider, with active registrations from clients, the clients need to re-register, or their registrations will remain invalid until they time out.

Figure 82: SIP provider deletion confirmation

3.8.4 Inter-Asterisk Exchange (IAX) trunksIAX is the native Asterisk PBX server to server communications protocol designed to work well across firewalls and NAT.

Multiple IAX trunks can be configured for call routing. IAX trunks can be configured as providers, or as peers registering with providers.

IAX supports multiplexing of channels over a single link. Data from multiple calls are merged into a single stream between two endpoints, reducing the IP overhead without creating additional latency.

If the Com.X is located behind a NAT/firewall on the network, configure the NAT/firewall to forward UDP port 4569 to the Com.X internal IP address.

3.8.4.1 Adding an IAX trunk

To add an IAX provider, activate the Add menu on the Trunks panel. Select IAX Provider.

IAX trunk configuration

IAX trunk configuration is divided into basic, advanced and codec configuration, accessible from their accompanying tabs on the IAX Provider form.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 100

Field Content

Name The unique name of this IAX trunk. If this trunk is an IAX provider, the name of the trunk must match the username.

Description A custom description of this IAX trunk

Registrar The address of the IAX provider's registration server

Username The registration user name provided in the registration string to the IAX provider when registering. When registering, the username must be the same as the username configured in the IAX provider.

Password The registration password required by the IAX provider

Act as Provider When enabled, this trunk allows other IAX users to register with it. An UNKNOWN peer will be created and the IP address of the peer associated with this trunk on registration.

Note: When configuring a Com.X to Com.X IAX trunk, if the registering trunk is configured and applied on the registering Com.X before the IAX provider configuration is applied on the Provider Com.X, the registering box will need a 'iax2 reload' to initiate registration. We therefore recommend configuring and applying the provider trunk before the registering trunk.

Register with Provider

When enabled, the IAX trunk will attempt to register its IP address with the IAX host at the provider address configured. The registration string will use the configured username.

Table 17: IAX trunk basic configuration

Field Content

Qualify connection

When enabled, checks the reachability of the peer every 60 seconds.

Contact # for incoming

A DID number to assign to incoming calls on this IAX trunk. This facilitates inbound routing where the DID is not provided by the IAX provider.

Maximum # channels

The maximum number of simultaneous IAX channels supported on this trunk. Leave blank for no limit.

Table 18: IAX trunk advanced configuration

Codecs supported by an IAX trunk can be selected by using the Codecs button. Use Ctrl-Left-Click (holding Ctrl down) to select multiple codecs. Individual codecs can be moved up and down the codec priority list by selecting the codec entry, and selecting the Up or Down buttons.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 101

When negotiating an IAX call, the codec with the highest priority (at the top of the list) will be attempted first, then the second and so on. Codecs may specify the integration time in milliseconds after the codec name in the form codec:integration time, e.g. 'g729:40'

3.8.4.2 Editing an IAX trunk

To update the configuration of an IAX trunk, select the Edit Provider option from the trunk's context menu.

3.8.4.3 Removing a SIP trunk

To remove an IAX trunk, select Remove from the IAX Provider node's context menu.

Note: Removing a provider will remove the IAX trunk from all routes that are using it, possibly resulting in routes with no trunks associated.

Note that if the trunk was a provider, with active registrations from clients, the clients need to re-register, or their registrations will remain invalid until they time out.

3.9 Budget TrunksEach Voip trunk and trunk group can be configured as a budget trunk. These trunks are associated with a variable minutes value that depletes as outbound calls are completed. These trunks are skipped in outbound routes once the balance of remaining minutes reaches zero. This minutes value is reloaded on a user-configurable schedule, either monthly or weekly.

3.9.1 Configuring Budget TrunksTo configure budget settings on any VOIP trunk, or any trunk group, select the trunk in the trunks panel of the GUI, right-click and select the Budget Settings.

Figure 83: Budget configuration settings

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 102

Field Content

Budget Mode Select whether the trunk has an associated budget will be skipped in outbound calling routes when the budget is reduced to zero. Budget trunking is enabled when this is set to Skip When Depleted.

Reload Period Selects the frequency at which the monthly budget is loaded on to the trunk. Monthly and Weekly patterns are available.

Reload day/date The day of the week/month on which the budget will be reloaded. If the reload period is weekly, the reload day can vary between 1 and 7, corresponding to Monday and Sunday repsctively. If the reload period is monthly, days 1 to 28 are available and indicate the date on which the budget is to be reloaded.

Initial Charge Period (Sec)

Normal Charge Period(sec)

Reload Minutes The number of minutes to reload to the system on the selected reload date.

Carry Over (%) This indicates the percentage of the remaining unused minutes at the end of the reload period to be carried over into the next period.

Current Minutes The initital minutes to be added to the trunk as soon as budget options are configured.

Last Reload Date Automtacially populated: This field serves to indicate the last date on which minutes were reloaded to the trunk group.

Next Reload date Automatically generated: This field serves to indicate the date on which the next reload of minutes is scheduled.

Note: Budget trunk configurations are backed up as a part of the configuration back up. If a backup is made whilst a trunk has minutes remaining, these minutes will be set as the Current Minutes field when the backup is restored. For accurate budget trunking, this field needs to be manually reset to zero after a configuration back up has been restored.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 103

3.9.2 Budget Trunk BehaviourBudget trunking allows for outbound calls to be completed only whilst the budget remaining on the trunk exceeds zero seconds. In the event that the remaining budget on the trunk depletes to zero or beneath, no outbound calls over that trunk will be permitted. Trunkgroups with zero budget will be bypassed in outbound routes, and routes containing only trunks with zero budget will be disabled.

Note: If the remaining budget exceeds zero seconds, an outbound call can be placed. If the budget declines to zero during a call,no further outbound calls will be allowed, but any current calls will be allowed to be completed, which may result in a negative remaining budget.

3.10 Outbound route configurationA variety of trunk types can be combined and prioritized to form outbound routes, routing calls based on dial-patterns. The Com.X supports routing to trunk groups, as well as individual FXO trunks and BRI channels.

3.10.1 Viewing configures outbound routesThe list of existing configured outbound routes can be accessed by selecting Start, followed by Configuration and the Outbound panel. For each route listed, the route's name, the pin code and an indication of whether the route is an emergency and / or intra-company route is displayed. Routes can be managed from their context menu.

To prioritize one route above another, select the Up and Down options in the context menu. Routes appearing first in the list have the highest priority. Dial pattern matching tries each route in turn for a match, starting with the highest priority route and progressing to the last route in the list.

3.10.2 Adding outbound routesNew routes can be added by selecting the Add button on the Outbound panel. For the route configuration, please see 3.10.3.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 104

3.10.3 Configuring outbound routes

Field Content

Name A unique name for the route.

Pin If set, after a user has dialed a number that matches the dial pattern of this route, the user will be prompted to enter the pin code in order for the call to proceed.

Pin sets If more than one pin should allow access to this route, leave the Route password field empty and specify a pin set here. The pin set needs to exist before referring to it here. Please see section 4.14 for details on configuring pin sets.

Time Limit Optional hard timeout setting. If set, calls placed through this outbound route will be terminated after the configured number of settings. Leave blank for no time limit.

Emergency When enabled, emergency dialing indicates that the emergency CID set on a device or port should override all other CID settings and be sent with the call information.

Intra-company When enabled, the CID sent with the call information is the internal, local CID, and not the outbound CID of the extension or trunk.

Table 19: Outbound route configuration

Note: If changes are applied while an outbound route has no associated trunk, the dial patterns for that route will be lost after the apply.

3.10.4 Dial Patterns

3.10.4.1 Adding dial patterns to an outbound route

The Dial Patterns for outbound routes are analyzed, and the highest priority route for which a pattern match is made is tasked with routing the call. New dial patterns can be added to a route by selecting New from the context menu of the Dial Patterns section of the route. The route has to be edited first before this option becomes available. If no existing patterns are included in the route, the context menu can be accessed by right-clicking the Dial Pattern header.

3.10.4.2 Dial pattern syntax

Dial patterns consist of the following characters only:

0 1 2 3 4 5 6 7 8 9 X Z N | . ! [ ] , - +

X matches any digit from 0 – 9

Z matches any digit from 1 – 9

N matches any digit from 2 – 9

| separates a dialing prefix from numbers dialed, e.g. 123|4567 would match the dialed number 1234567, but would only send 4567 on to the trunks.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 105

. matches one or more digits, e.g. 0. would match a 0 followed by one or more digits

! provides legacy overlap dialing support and matches as soon as it can unambiguously, without waiting for the dialing to complete, allowing subsequent digits to be transferred directly to the trunk (only supported on PRI channels).

[ ] allows a collection of digits to be matched, e.g. [7-9] would match 7, 8 and 9

- indicates a range of sequential numbers to match

+ in conjunction with | allows insertion of digits into the dial string, e.g. to change 0114567890 to 27114567890 use dial rule '27+0|X.' in the Dial Rules section on the trunk from the Advanced menu

Removing Dial Patterns from a route

A Dial Pattern can be removed from a route by selecting Remove from the pattern's context menu.

3.10.5 Adding trunks to an outbound routeTrunks can be added to a route by selecting Add from the context menu of the Trunk Priorities section of the route. The route has to be edited first before this option becomes available. If no existing trunks are included in the route, the context menu can be accessed by right-clicking the Trunk Priorities header.

A list of available trunks, including analogue trunks (FXO), BRI trunks, PRI, SIP providers and Trunk Groups will be displayed. Multiple trunks and groups can be selected for addition by using Ctrl-Left-Click.

Once added, trunks can be prioritized by selecting a trunk and selecting Up or Down from the trunk's context menu. Calls will be attempted on the trunks in the order that they appear in this list.

3.10.6 Removing Trunks from a routeA Trunk can be removed from a route by selecting Remove from the trunk's context menu.

3.10.7 Deleting outbound routesTo delete an outbound route, select Delete from the route's context menu.

3.10.8 Outbound route priorityOutbound routes can be moved up and down the overall list by right-clicking and selecting Up or Down. An outbound number that matches a pattern in more than one route will be routed via the highest priority route.

3.11 Inbound route configurationInbound routes allows incoming calls to be routed to a particular destination based on the incoming call's DID and CID number pair. The Com.X supports a rich set of destination types, greatly simplifying incoming call routing.

Note: The Com.X will automatically try and find extension numbers that match incoming DIDs. E.g. if the system receives a call from a BRI link with DID 9031, and an extension 9031 exists, no inbound route is necessary. The call will automatically be routed to extension 9031.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 106

3.11.1 Viewing existing inbound routesThis list of configured inbound routes can be viewed by selecting Start, followed by Configuration and the Inbound panel. For each configured inbound route, the DID and CID pair used to match the route, the route description, destination type and destination are displayed. To manage inbound routes, select an option from the desired route's context menu.

3.11.2 Adding a new inbound routeTo add a new inbound route, select the Add button on the Inbound panel.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 107

3.11.3 Configuring inbound routes

Field Content

DID Direct Inward Dialing allows a number of incoming numbers to be serviced across a limited number of physical connections from the telco to the PBX. This field may contain a pattern to be matched against an incoming number. Please see 3.10.4.2 for more on the dialed pattern syntax. If left blank, this route will match any dialed number or if no DID information is present.

Be careful of using a single '.' as the pattern for an inbound route, as this might also match dial plan constructs such as fax and hangup and may result in unexpected behaviour. Rather use 'X.'

The DID and CID together form a pattern matching pair which must be unique amongst the list of inbound routes. If this rule matches the DID and CID best, the route is used to route the call.

FXO ports do not provide DID information from the telco. However, the FXO port configuration on the Hardware Panel allows a DID to be assigned to calls originating on the FXO for routing purposes.

MSN note: DID numbers typically are sequential, and so the telco might only signal a subset of the DID numbers, e.g. the last 4 digits. MSN numbers are not guaranteed to be consecutive. As a result the MSNs signaled by the telco might be longer than the DIDs. The full MSN number arriving at the PBX needs to be matched in order to process the call.

CID Caller ID number is the caller's number sent to the PBX by the telco. This field may contain a pattern to be matched against an incoming caller ID. Please see 3.10.4.2 for more on the dialed pattern syntax. If left blank, this route will match any caller ID or if no CID information is present.

Note: The DID and CID together form a pattern matching pair which must be unique amongst the list of inbound routes. If this rule matches the DID and CID best, the route is used to route the call

Description A custom description describing the inbound route

Destination Type Extension, Day/Night, Conference, Terminate, Ring Group, Voicemail (busy), Voicemail (no message), Voicemail (unavailable)

Destination The destination extension, conference extension, termination destination (busy, congestion, hangup, on hold forever, ring, sit ring), ring group number, voicemail extension. The list of available destinations reflects the current configuration of features in the system.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 108

Table 20: Inbound route configuration

3.11.4 Configuring call destinations

3.11.4.1 Conferences

To configure conferences, select Advanced from the main menu bar and Conferences. Once configured, the destinations will become available selections in the Inbound Routes destination menus.

3.11.4.2 Day/Night

To configure day/night inbound routing modes, select Advanced from the main menu bar and Day/Night Control. Once configured, the destinations will become available selections in the Inbound Routes destination menus.

3.11.4.3 Extensions

To configure extensions, select Start from the main menu bar, followed by Configuration and the Extensions panel. Please see 3.7 for more detail. Once configured, the destinations will become available selections in the Inbound Routes destination menus.

3.11.4.4 Ring Groups

To configure ring groups, select Advanced from the main menu bar and Ring Groups. Once configured, the destinations will become available selections in the Inbound Routes destination menus.

3.11.4.5 Termination

The following termination options are available for inbound routing:

•busy: a busy tone is provided to the caller

•congestion: an 'All circuits are busy now' message is provided to the caller

•hangup: hang up the call

•on hold forever: places the call on hold without termination

•ring: provides the caller with a ring tone

•sit ring: provides the caller with a specific ring tone.

3.11.4.6 Voicemail

To choose Voicemail for an extension as a destination, select Start from the main menu bar, followed by Configuration and the Extensions panel. Select the desired extension and edit the extension configuration. Please see 3.7 for more details. Only extensions that have voicemail enabled will be available for voicemail termination.

3.11.4.7 IVR

Interactive Voice Response systems allow the playback of a set of audio messages and the transfer of calls based on user interaction via the phone keypad. To select an IVR, first configure an IVR entry and detailed in 4.7 and then select it here.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 109

3.11.4.8 Phonebook

To choose an entry in the phonebook as a destination, first configure the phonebook entries and then select the appropriate entry from the options menu for the phonebook destination.

3.11.5 Deleting an inbound routeTo delete an inbound route, select Delete from the route's context menu.

3.12 FlexPath configurationThe innovative Com.X FlexPath feature is extremely powerful and allows flexible routing, trunk to trunk routing, gateway and class of service capabilities. FlexPaths allow grouping of call sources into contexts (paths) which can be associated with outbound routes, inbound routing tables, transformations, destinations, etc.

FlexPaths are not required for many typical PBX configurations, but are extremely useful for special routing needs, gateway configurations, partitioning and other applications.

Fundamentally, the FlexPath feature provides customisable call handling through hand crafted routing paths.

To access FlexPath, select Configuration from the Start menu, and then the FlexPath panel.

3.12.1 FlexPath FundamentalsEvery SIP or FXS Extension Port, FXO, BRI or PRI Trunk and VoIP Provider Trunk is a candidate for FlexPath routing.

In the FlexPath configuration panel, all these ports are displayed in a tree structure in the right hand column of the screen, along with the selected routing path for each port. By default, no FlexPaths are defined and every port is displayed with the “default” path.

A port configured as “default” will route as follows:

• FXS, SIP phone port – routed as internal extensions, i.e. access to internal destinations and Outbound routes.

• FXO, BRI, PRI, VoIP trunks – routed as inbound, i.e. access to Inbound routes and DID mapped extensions only

In order to change the default routing, one or more FlexPaths are created, and one or more extension ports or trunks are “placed into the FlexPath”. A port that is mapped to a flexpath is indicated in the tree on the right as <port name> -> <flexpath name> instead of <port name> -> default. Right clicking on the port text allows selection of default or any of the configured FlexPaths.

An extensions port or trunk assigned to a particular FlexPath follows the routing rules of that FlexPath instead of the default routing as described above.

FlexPaths are also available as destinations for Inbound routes (on the Inbound panel) – i.e. custom FlexPath routing can be applied after initial Inbound routing. In this case, the trunk port will typically be assigned to the default routing context to enable normal Inbound handling.

Each FlexPath has the following:

• A name and description©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 110

• A number of configuration parameters

• One or more FlexPath Routes

Types of FlexPath Routes available are as follows:

• Include – the selected routing set is simply included (routing sets include Inbound, Internal, other FlexPaths and Outbound routes)

• Match – a pattern for matching dialled number/DID and/or CID is configured, along with a destination route set as above and an optional transform to the dialled number. In this case, only matching numbers are routed.

• Start – a route set is selected for calls with no dialled number information

3.12.2 FlexPath Route Types

3.12.2.1 Include

Include routes allow the inclusion of all, or part of existing routing contexts configured in the system, including Inbound, Outbound and other FlexPaths. Calls originating from ports in a FlexPath that has includes will, if no other route entries in the FlexPath match the call source, be forwarded to the route destinations specified in the order of includes.

Inclusion type Description

Inbound DID Includes inbound rules that match incoming DIDs

Inbound Direct Includes configured extensions only (including services that have extensions, such as queues and groups). Excludes feature codes. This type forms a bridge between DIDs and internal extensions. If a call is inbound with a DID that matches an extension, having Inbound Direct enabled allows the call to be routed directly to the extension without the need for an inbound route.

Internal Includes configured extensions and feature codes, as well as the phonebook and other internal applications.

Table 21: FlexPath route types

Outbound destinations can also be included, as well as other FlexPaths. A FlexPath can include only one additional FlexPath. If multiple FlexPaths need to be in the include chain, chain them together by including the second in the first, the third in the second and so forth. Though multiple FlexPaths includes in a FlexPath are allowed, only the first will be processed.

3.12.2.2 Match

Matching routes allows calls to be routed based on DID and CID matches. This functionality differs from normal inbound routing in that, upon match, the DID can be transformed, routed to a subset of inbound routes, or routed to an outbound route (i.e. trunk to trunk routing.)

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 111

3.12.2.3 Start

Start routes are special cases of Match routes and match when no DID are available. These routes are used to assign DIDs to originating calls when no DID information is present. Start routes will only match if no DID are available. If it is possible that a DID will be present, include a Match rule as well.

Note: An Include route will take preference over a Start route.

3.12.3 FlexPath DestinationsCalls originating from ports that have been included in a FlexPath may be routed to the following destinations:

Destination Description

FlexPath Existing FlexPaths. Beware of circular references. Once a call has been routed to another FlexPath, the matching process starts with the first route in the destination FlexPath.

Other Internal extensions, feature codes and existing inbound routes. Please see 3.12.2.1 for more detail.

Outbound Existing outbound destinations.

Table 22: FlexPath destinations

3.12.4 Viewing existing FlexPathsTo view existing FlexPaths, select Start – Configuration – FlexPath.

For each FlexPath, the path name and the current routes included in the path are displayed. For each route, the route name, DID pattern match, CID match, description, transform, destination type and destination are shown if available.

Routes are processed in the order in which they are listed in a FlexPath. Paths are sorted in alphabetical order.

3.12.5 Adding FlexPathsTo add a new FlexPath, select the Add Path button on the FlexPath panel.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 112

Field Content

Name Unique name for the FlexPath. Spaces are not allowed in the name.

Description Custom description for the FlexPath.

Account Code If configured, adds an account code to calls within a FlexPath which can be used to group calls for billing purposes.

Lookup Caller ID If checked, the normal caller ID lookup will be performed prior to routing. If unchecked, the “raw” port ID will be used for CID routing.

Allow Directed Pickup

Other users of the system will be able to answer ringing calls to extensions in the flexpath using the directed pickup. (by dialing **<exten> from any handset)

Table 23: FlexPath configuration

3.12.6 Deleting FlexPathsTo delete a FlexPFlexPath, select “Delete” from the path's context menu. Confirm deletion to delete.

Note: Ports that have beenassigned to a deleted FlexPath will become “invalid”, resulting in no service for calls originating on such ports. Service to these ports can be restored by assigning the ports either to the “default” FlexPath or to another FlexPath.

3.12.7 Adding routes to a FlexPathTo add routes to a FlexPath, select “Add Route” from the path's context menu.

Field Content

Routing mode One of Include, Match or Start. Please see 3.12.2 for more detail on FlexPath route types

Pattern The DID pattern that this route will match

CID The CID pattern that this route will match

Description Custom description for this route

Transform If specified, the originating call's DID will be transformed as configured. Please see 3.12.11.8 for more detail on transformations.

Destination The routing destination. Please see 3.12.3 for more detail on FlexPath destinations.

Table 24: FlexPath route configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 113

3.12.8 Changing route priority in a FlexPathRoutes that have been added to a FlexPathFlexPath are processed in the order they appear in the FlexPath. Once a route has matched in a FlexPath, other routes are ignored. If no Match or Start routes match, Include routes match in the order they are listed.

The priority of a route in a FlexPath's match list can be changed by selecting “Move up” or “Move down” from the route's context menu.

3.12.9 Editing routes in a FlexPathTo edit a route in a FlexPath, select “Edit” from the route's context menu. Please see 3.12.7 for more detail on route configuration.

3.12.10 Deleting routes from a FlexPathTo delete a route from a FlexPath, select “Remove” from the route's context menu.

Note: Empty FlexPaths are valid. A port assigned to an empty FlexPath will not be able to route calls.

3.12.11 FlexPath use cases

3.12.11.1 Class of service

Any source of a call in the system can be pre-processed using a FlexPath. This allows class of service control on both outgoing and incoming calls.

Note: To block an extension from making calls, place it in an empty FlexPath (i.e. a FlexPath with no routes.)

Note: To allow phones to only make internal calls and limit outbound calls to the phonebook, create a FlexPath with only one route. The route should contain one include mode with destination 'Internal'.

Note: Assigning analogue phones to class of service FlexPaths results in service loss while apply is in progress. Assignment of SIP phones to FlexPaths can be applied with no break in service.

Scenario

• Extension 301 is required to have access to internal and national dialing only.

• Extension 302 is required to have access to internal, national and international dialing.

Configuration:

Extensions:

• Two SIP extensions are configured:

Two outbound routes:

• national access

• international access

Two FlexPaths:

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 114

• pathNational includes the national outbound route and the Internal include.

• pathInternational includes both the national and international outbound routes as well as the Internal include.

Port assignments:

• 301 is assigned to pathNational

• 302 is assigned to pathInternational

3.12.11.2 Partitioning / multi-tenant

Scenario:

Company A and Company B share a PBX. Each company has reserved a set of BRI channels for their exclusive use.

Company A: 4 BRI channels on BRI ports d1 and d2

Company B: 4 BRI channels on BRI ports d3 and d4

Extensions 8xxx belong to Company A with reception at 8000.

Extensions 9xxx belong to Company B with reception at 9000

Outgoing calls must be routed to the companies' BRI channels.

Incoming calls on the companies' BRI lines must be routed to their reception.

Configuration:

Extensions:

• Extensions ports (both FXS and SIP) are assigned the appropriate extension numbers for each company.

Two outbound routes:

• companyAout routes over Company A's BRI channels

• companyBout routes over Company B's BRI channels

Two Inbound routes:

• Fixed incoming DID 8000 is routed to Company A's reception. This DID will be assigned to BRI calls originating from Company A's BRI channels in a FlexPath

• Fixed incoming DID 9000 is routed to Company B's reception. This DID will be assigned to BRI calls originating from Company B's BRI channels in a FlexPath

FlexPaths:

• companyA-in: Add a Start route that transforms incoming BRI calls without DIDs to the reception extension and forward these to the Inbound routes.

• companyA-in: Add a Match route that transforms incoming BRI calls with any DID to the reception extension and forward these to the Inbound routes.

• Assign Company A's BRI trunk groups to the companyA-in FlexPath

• companyA-out: Include an internal route that facilitates dialing internal extensions

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 115

• companyA-out: Add a rule that matches outgoing numbers other than extensions and routes them to the companyAout outbound route.

• Assign Company A's extension ports to the companyA-out FlexPath

• companyB-in: Add a Start route that transforms incoming BRI calls without DIDs to the reception extension and forward these to the Inbound routes.

• companyB-in: Add a Match route that transforms incoming BRI calls with any DID to the reception extension and forward these to the Inbound routes.

• Assign Company B's BRI trunk groups to the companyB-in FlexPath

• companyB-out: Include an internal route that facilitates dialing internal extensions

• companyB-out: Add a rule that matches outgoing numbers other than extensions and routes them to the companyBout outbound route.

• Assign Company B's extension ports to the companyB-out FlexPath

Note: Inter-company calls are facilitated by default and can be accessed by directly dialing a company's extensions (e.g. the receptionist for Company B could dial 8000 to reach the receptionist for Company A.) To disable this, create empty FlexPaths that terminate service for cross-company numbers:

• Company A: Create an empty FlexPath that Matches dial pattern 9XXX

• Company B: Create an empty FlexPath that Matches dial pattern 8XXX

Note: This is a simplified example. FlexPath could also be used to match incoming DID ranges and route these to separate inbound routes for different partitions.

Note: The incoming CID can also be prefixed with a custom name for inbound routes. To configure this, access the FreePBX Inbound Route configuration (please see section 6.5) and configure the 'CID name prefix' field.

3.12.11.3 Simple partitioned DID routing:

If DIDs are provided by the telco, the use of inbound FlexPaths are unnecessary and, provided the extension numbers created for each company matches the DIDs provided over by the Telco, calls will automatically route to the correct extensions.

Scenario:

DID ranges routed by the Telco as follows:

Company A: 5559000 – 5559049 -> ports d1 and d2

Company B: 5559050 - 5559099 -> ports d3 and d4

Telco communicates the last 4 digits of DID across channels during call setup.

Configuration:

Creating extensions 9000 – 9049 for Company A and 9050 – 9099 for Company B assigned to the appropriate FXS and SIP ports will result in automatic call routing to the correct extensions for incoming calls.

3.12.11.4 Trunk to Trunk gateway

Scenario:

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 116

A company has a head office in a major city, and a remote office in another city. The company has an agreement with an internet connectivity provider for a high quality IP link between the two offices. The company requires a PBX system at the head office, with internal extensions at both office locations, the two offices SIP trunks and PSTN trunks provided for call routing at the head office location.

Configuration:

Both the head office and the branch office are provided with Com.X units.

Extensions:

• Head office extensions configured as 101 – 105

• Branch office extensions configured as 201 – 205

Sip trunk configuration:

• Head office SIP trunk configured as provider

• Branch office SIP trunk configured to register with head office

• Ensure that Proxy, NAT, connection qualification and codec selection options are configured appropriately.

Outbound route configuration:

• Head office outbound route routes calls to branch extensions across the SIP trunk

• Head office outbound route routes all calls to PSTN

• Branch office outbound route routes all calls (including calls to head office extensions) to head office across the SIP trunk

FlexPath:

• Head office configured with a FlexPath that places calls originating from the SIP trunk either internally or routes them trunk-to-trunk to the PSTN outbound route.

3.12.11.5 Legacy PBX Remote extension gateway

Scenario:

A company has a head-office with 4 FXO trunks to the telco and 10 analogue extensions on a legacy PBX. The legacy PBX has a number of unused extension and trunk ports available. The company is opening a second branch, geographically separated from the first, and desires a stand-alone PBX at the branch, with its own BRI telco interfaces, but the ability for head-office and branch to phone one another using extension numbers across a SIP trunk. There will be four extensions required at the branch, with potential for some growth.

Configuration:

Install a Com.X1 at both sites. For the branch, the Com.X1 serves as a PBX, with the BRI outbound routes routing across the BRI interface.

In the head-office, place the Com.X1 behind the legacy PBX, connecting its FXO ports to free FXS ports on the legacy PBX and configuring the SIP trunk to the branch.

Extensions:

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 117

In this configuration, the branch extensions look like additional extensions on the legacy PBX, but the Com.X1 gateways these across the SIP trunk to the branch.

Calls from the branch to head-office are routed across the SIP trunk, prepended by caller ID, and the Com.X1 at the head-office then routes based on the branch CID to the appropriate FXO port, in effect using the correct legacy PBX extension for activity from the associated branch extension.

FlexPath:

• At the branch, create a FlexPath with a Match rule that matches head-office extensions with an outbound route as destination and the following transform: CD.

• At the head-office, add FlexPaths with Match rules that match the DIDs transformed by the branch and routes them based on the received CID number in the DIDs to the correct FXO port.

• At the head office, assign DIDs to the Com.X1 FXO ports and add a FlexPath that pre-pends this DID to the dialed number before routing to the branch across the SIP trunk.

• At the branch, add FlexPaths with Match rules that routes to the appropriate extensions based on the DIDs received from the head-office.

3.12.11.6 Legacy PBX feature set extension

Scenario:

A company has a significant investment in a legacy analogue PBX. This investment includes some features, e.g. voicemail, routing, groups, feature codes and IVRs that the company would like to preserve.

They would how-ever like to extend the legacy PBX with new SIP extensions and additional features, including call recording, least cost routing and additional SIP-based features for the new SIP phones, and possibly enable the PBX to support a remote office as described in section 3.12.11.5. The existing PBX cannot be extended, or the cost associated with such extension is prohibitive.

As a result, the company want existing analogue phones to be served dial-tone directly from the existing PBX (preserving the existing feature set) and the new features and LCR to be available to new SIP extensions. Call recording should be available on all extensions, and it should be possible to block extensions from dialing.

Configuration:

Install a Com.X solution with sufficient analogue FXS and FXO ports for the company. The Com.X solution provides SIP extensions, LCR and the other features mentioned to the business.

Connect the analogue phones to the Com.X solution's FXS ports and the Com.X solution's FXO ports to the existing PBX's FXS ports.

For each FXO port, assign a DID matching the legacy PBX's extension. Create an extension with the same extension number for each of the legacy PBX's extensions.

For each of these FXS ports, create an outbound route with dial pattern '!' (please see section 3.10.4.2) and a FlexPath with the extension FXS port as the source, and destination the associated outbound route. Enable immediate dialing on the extension port (please see section 3.6.2)

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 118

Using this configuration, when an analogue phone goes off-hook, the legacy PBX would be providing dial-tone directly. If the legacy PBX's extension rings, the associated Com.X extension also rings. This enables calls to be recorded on the legacy analogue extensions. Though dialed numbers cannot be recorded in CDR records for the legacy extensions (since the number is not collected by the Com.X solution but rather passed straight through to the legacy PBX), the duration of calls originating from legacy extensions can be recorded. Extensions can also be blocked. Call recording would be fully featured for the new SIP extensions.

3.12.11.7 Immediate dialing

Emergency and single-purpose devices can be configured to dial immediately on pick-up.

Scenario:

An emergency phone is required to dial 911 when picked up.

Configuration:

Extension:

• From the Hardware panel, edit the port to which the device is connected and enable “Immediate mode”.

FlexPath:

• Create a FlexPath that includes a Start route, configured to transform the DID to 911

• Assign the emergency port to the FlexPath.

3.12.11.8 Transformations

The Com.X allows both outgoing and incoming dialing numbers to be transformed.

To transform, create a FlexPath and add a Start or Match route to the path, with the required transform specified.

Transforms may contain digits 0 – 9 and special placeholders D, which is replaced with the current DID and C, which is replaced with the current CID.

Scenario:

All outgoing calls must be prepended with 08 and followed by 55 and the CID, if any.

Configuration:

• Add a FlexPath with a Match rule with an outbound route as destination and the following transform: 08D55C

• Assign extension ports that need this transform to the FlexPath.

Scenario:

All calls incoming on a SIP trunk needs to be prepended with 77.

Configuration:

• Add a FlexPath with a match rule that includes inbound DID routing transforms as follows: 77D

• Assign the SIP trunk to the FlexPath.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 119

3.12.11.9 Assigning DIDs to BRI ports

When DIDs are not provided over BRI channels, DIDs can be associated directly with BRI ports in the Com.X to facilitate call routing.

Scenario:

DIDs 9001 – 9004 need to be associated with 4 BRI ports.

Configuration:

• Create a Trunk Group for each BRI port. BRI ports cannot be assigned to FlexPaths directly.

• Create FlexPath for each BRI port

• Add Start routes to the FlexPaths that transform to the required DIDs

• Set the destinations of the Start routes to Inbound DIDs for inbound call routing.

• Assign the BRI ports to their specific FlexPaths.

3.12.11.10 Load-balancing calls

Outbound calls can be load-balanced across telco interfaces or network routes using FlexPath.

Scenario:

Company A has 8 extension, and wishes to load-balance outgoing calls across two DSL links, each supporting up to a maximum of 4 simultaneous calls. The DL routers have IPs 192.168.0.1 and 192.168.0.2. The company's VOIP service provider has provided the company with the IP addresses of two SIP proxies: 10.0.0.1 and 10.0.0.2

Configuration:

• Add two SIP trunks, with distinct IP address end-points (in this scenario 10.0.0.1 and 10.0.0.2) These may be two proxies with the same provider, but for IP routing capability, the IP addresses must be different. When routing across telco interfaces, one would replace the SIP trunks here with trunk groups that contain the trunks to be used.

• Create two outbound routes, one using the first SIP trunk and the other the second SIP trunk (or the appropriate telco trunk groups).

• Create two FlexPaths, and add an Include rule that includes the appropriate outbound route for each. Point the first FlexPath to the first outbound route and the second to the second outbound route.

• For network load-balanced scenarios, log into the Com.X using ssh and configure two routes for routing the traffic across the two network paths in /etc/network/interfaces:

auto eth0 iface eth0 inet dhcp post-up ip route flush dev eth0post-up ip route add 10.0.0.1 via 192.168.0.1post-up ip route add 10.0.0.2 via 192.168.0.2

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 120

3.12.11.11 FXO Trunk pick-up to test for trunk service

When installing a Com.X, at times it might be useful to determine whether a specific trunk port has been service provisioned by a device connected to the port. For example, the installer might want to check whether a legacy PBX is providing dial-tone in the trunk, or a premi-cell is available. This might also be of use if the wiring to the Com.X1 is not clearly marked, to determine which trunks have service.

Configuration:

• create an outbound route called 'trunk-tester' with dial pattern '99!' and the trunk of interest included in the trunks list

• Dial 99

Configure for automatic test on pickup:

• Replace the dial pattern above with '!'

• create a FlexPath called 'trunk-tester' and use the Include mode to include the 'trunk-tester' outbound route

• on the FlexPath panel, assign an extension port to the trunk-tester FlexPath and plug a phone into the extension port

• select the extension port in the Hardware panel and enable Immediate mode

• Pick up the handset. If the service is active you'll hear dial-tone or the service prompt.

Note: If immediate mode is not set for the automatic test configuration, the Com.X will still provide dial-tone on the extension as usual, which might be incorrectly perceived as an external trunk service, so be sure to enable Immediate mode on the extension port.

3.13 Call recordingPlease note that the call recording features provided by Far South Networks products are best-effort services and do not meet the requirements for recording to be used in legal cases, nor are they certified in any way by any regulatory bodies or authorities. Use of call recording may be subject to regulations specific to your country as well as international law.

Calls can be configured to be recorded on an individual extension, on all extensions and in the incoming, outgoing or both directions, for internal and external calls. Depending on the size of the hard disk in the Com.X configuration, capacity for call recording may vary (E.g. a Com.X with a 250GB hard drive can record ~400,000 minutes of voice in A-law WAV format and a Com.X with a 60GB SSD drive ~500,000 minutes of voice in GSM format or 100,000 minutes in A-law WAV).

3.13.1 Configuring individual extensionsTo configure call recording setting on an individual user basis, log into the User Portal from the Com.X's main web page, and select Settings.

To configure call recording setting for all users, log into the User Portal as 'admin' from the Com.X's main web page, and select Settings. All users will be affected!

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 121

When set to “On-Demand”, calls will only be recorded when the user starts recording using the in-call call recording feature code (*1 by default). Please see section 4.5 for more detail on feature codes.

Note: In order for the caller or the recipient of the call to initiate on-demand call recording, the general dial command options need to include “w” and / or “W”. Please see 4.6.1 for more detail.

Note: Disabling voicemail on an extension will also disable call recording.

3.13.2 Recording all callsLog into the user portal as 'admin' with password 'ari_password' and set their Call Monitor settings for both incoming and outgoing calls to “Always”. Please see 3.13.1 for more detail.

Enable the Extension Recording Override setting in the system's General Settings. Please see 4.6 for more detail. If this setting is Disabled, calls will not automatically be recorded, even if “Always” is selected in the user call monitor settings.

If a user's call monitor is configured to “Never” record calls, calls received by that user will not be recorded, even if Extension Recording Override is enabled.

3.13.3 On-demand recordingIf so configured, users can record calls on-demand by pressing *1

On-demand recording will only work if the Advanced – General settings dial options include the correct recording permissions.

SIP phones need to translate DTMF properly (RFC2833)

Some analogue phones may not properly relay the DTMF to the PBX, in which case on-demand recording may not work. For such phones configuring recording to always be on is a work-around.

Pressing *1 activates recording if not active, and de-activates recording if active. The last *1 to activate on-demand recording in a call will over-write previous recordings for that call. I.e. if recording was active, then de-activated and re-activated, only the re-activation recording will be present for that call.

3.13.4 Call recording conditionsDue to privacy issues in countries that enforce these, the Com.X recording feature only records calls as follows:

Outbound calls are recorded if the caller has recording enabled in the outbound direction or uses on-demand-recording on the call.

Inbound calls are recorded if the caller has recording enabled in the inbound direction or uses on-demand-recording on the call.

Internal calls are recorded in both users' call monitors if the called user has inbound recording configured, regardless of the calling user's configuration.

Internal calls are not recorded in either of the users' call monitors if the called user does not have inbound recording configured, or has on-demand inbound call recording configured and has not used the on-demand feature code, regardless of the calling user's configuration.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 122

If on-demand recording is activated on an internal call by either party (provided that party has on-demand recording configured), the call will be recorded, regardless of the other party's call recording configuration.

In summary then, on-demand recording over-rides all call recording configurations. Otherwise, the called user's call recording setting dictates the call recording behavior for internal calls. Calls placed over or received via trunks are subject to the user's outbound and inbound call settings.

Note: It is the legal obligation of the recording party to inform callers when recording is activate on a system. Similarly, when on-demand recording is used to record calls, the DTMF feature code activation might be audible to the remote party, but is not guaranteed. In such scenarios it is the user activating on-demand recording's responsibility to inform the other party that call recording has been activated.

3.13.5 Gateway RecordingGateway recording can be enabled via the Global Settings menu on the settings page of the Comma Gui (see section 3.1 for further details on global settings). This will record all outbound calls placed over any trunk, including those with no associated extension, for instance in a trunk to trunk gateway scenario.

Gateway call recordings are stored in /var/spool/asterisk/monitor/ and are named with the prefix “gw-rec”.

Note: Outbound calls from extensions will feature two recordings if gateway recording is enabled. One will be prefixed OUT<extension number> whilst the gateway recording will be prefixed ge-rec

3.13.5.1 Gateway Recording Encryption

This option is configurabled from the Global Settings menu. If enabled, all gateway call recordings will be encrypted and stored in /var/spool/asterisk/monitor/ .

3.13.5.2 Gateway recording in a-law

To have gateway recordings saved in 8-bit a-law format set the “Call Recording Format” variable in the “General Settings” page of the Advanced menu (see section 4 for further information on advanced configuration options) to .wav as opposed to .WAV

3.13.6 Viewing call recordingsIndividual users can view and play call recordings from their user's Call Monitor by selecting the Call Monitor option.

The system administrator can view and play all call recordings for all users by logging into the User portal with username 'admin' and password 'ari_password'.

The admin user's password can be changed by editing the

/usr/share/freepbx/recordings/includes/main.conf.php file and specifying the desired password in the $ARI_ADMIN_PASSWORD field.

The system administrator can also view all call recordings (including gateway recordings,) by selecting “Call log” from the Reports menu. This view allows one to search for call recordings by month, day, destination, source, channel and call

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 123

duration. Presented for each call is the call date, the call channel, source, caller ID, destination and call disposition (NO ANSWER, ANSWER, FAILED, BUSY). If a recording of the call is available, a link to the recording is provided, or alternatively the unique call identifier, which can be used to look up the call recording at an alternative storage location. Recording filenames include the unique call id.

Figure 84: CDR Call logs

3.14 Powering the Com.X via an Uninterrupted Power SupplyCom.X products ship with a UPS service that supports standard USB-connected UPS products. When enabled the service will do the following:

• Monitor the UPS Report in /var/log/syslog when mains power goes down or is restored.

• Cleanly shut down the system when battery level is low.

• Power off the UPS at the end of shut down

The UPS will automatically switch on again (after some short delay) whenpower is restored. If present, it is recommended to connect applicable ADSLrouters and related network switches to the same UPS as the Com.X.

3.14.1 Supported UPS Devices

The following UPS devices are confirmed to work with the comma-ups service. Other devices may also function correctly:

• Proline B1000• Proline B600

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 124

3.15 Securing the systemIt is of utmost importance to ensure that the Com.X system is secure. If a Com.X unit is public facing, large costs can be incurred if the VoIP configuration security is weak, or downtime and degraded performance may result from the Operating System being compromised. The following steps are recommended to ensure a secure Com.X system:

3.15.1 General

• Ensure that access to the unit is restricted. Install the Com.X in a secure server room or locked cabinet. This prevents unauthorized access to the unit using the serial port or USB keyboard, as well as physical damage to the unit or its power supply.

• Change the default password for the comma user.

• Regularly check the system log files for unauthorized activity (/var/log/auth* and /var/log/syslog*)

• Use strong passwords.

• Regularly backup the system configuration and important data.

3.15.2 Network

• Preferably allow remote (external) access (VoIP and data) to the Com.X only by means of a Virtual Private Network (VPN)

• Configure the Com.X and telephony devices (e.g. iTA or VoIP phones) on a separate network partition on a managed switched, or a physically separate network.

• Assign IP addresses and services on the VoIP network based on a white list of approved MAC addresses.

• Place the Com.X behind a firewall.

• Perform port forwarding on a non-standard port to port 22 on the Com.X for SSH access. Tunnel HTTP access through the SSH connection.

• Limit administrator access (SSH and web GUI) to a white list of MAC addresses, IP addresses or networks.

• Activate fail2ban (please see section 6.16)

3.15.3 VoIP

• If the Com.X is accessing external VoIP trunks via a NAT router/firewall, no special port forwarding is required. If external VoIP agents (e.g. SIP phones) need to access the Com.X, forward only ports 5060 and 10000-20000 to the Com.X for VoIP control and voice communication.

• Configure the firewall to block all incoming VoIP traffic except that from a white-list of remote extensions.

• Ensure that all VoIP extensions and trunks have strong (generated) passwords, different from the extension number.

• Activate fail2ban (please see section 6.16)

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 125

3.15.4 PBX

• Change the Com.X GUI password from the default.

• Log the PBX console messages to /var/log/asterisk/messages and monitor this periodically. A large number of rejected VoIP registrations may indicate an attack on the system.

• Use pins and pin sets on international and high-cost outbound routes, requiring the caller to know the pin in order to place a call.

• Disable feature codes for administrative features, or change the feature codes to access those features to something other than the default. (E.g. ChanSpy, ZapBarge).

• Require all users to set their voicemail pin and user portal login passwords to something other than the default.

• Regularly backup the PBX configuration and valuable recordings.

• If direct database access is configured for CDR access, limit the access to a white list of MAC addresses, IP addresses or networks.

3.16 Call behavior on No answer / BusyThis section describes the Com.X behavior and call routing for incoming calls that go unanswered or encounter a busy extension.

3.16.1 Unattended transferOn unattended transfer, the person transferring the call is taken out of the loop, i.e. the call is treated as though the caller called the final party directly. Voicemail or follow-me for the recipient would determine where the call goes on busy and no answer.

If both voicemail and follow-me are not configured, the extension would ring indefinitely.

3.16.2 Attended transferThe person wanting to connect the caller with a third party may place the caller on hold by picking up the second line, pressing a hold button or initiating an attended transfer.

The caller hears music, and the intermediary has one extension channel available to call the intended destination with and confirm availability. The intermediary can interact with the destination and connect the caller with the destination by using a transfer button or by putting the phone / channel down.

3.16.3 Call parkingThe person wanting to connect the caller with a third party may place the caller in a parking bay.

The caller hears music, and the intermediary has both extension channels available for use. Once the necessary calls have been made, conferences set up, availability determined, etc., the intermediary can pick up the call in the parking bay and transfer or respond as required.

Should the time the caller spends in the parking lot exceed the specified timeout period, the action configured for orphaned callers is initiated. This could include

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 126

playing an announcement to the caller and keeping the caller in the bay, or transferring the caller to reception.

3.16.4 Ring-backIn the event that a call is transferred to a destination extension that is busy, or unanswered, the ringback mechanism will send the call back to the transferring party, with a modification to the CID. The new CID presented to the transferring party will be prefixed by “Ret:” to indicate that the call is returning, as well as a the extension number of the destination extension to which the original call was transferred. The Ringback caller id will have the form :

“Ret: [original intended destination extension]CID”

Note that Ringback functionality is only activated on destination extensions with follow me or voicemail enabled. Transferred calls to extensions with neither configured will ring indefinitely if unanswered, or fail with an engaged tone should the extension be unavailable.

Note that the follow me of the destination extension will be evoked before the ringback occurs, so a transfer to an extension with follow me enabled, will only ring back to the intermediary extension if the destination extension and all extensions in its follow me list, are unavailable or unanswered.

If the ringback mechanism sends the call back to the transferring extension and this extension is no longer available, or the call is unanswered, the destination will be as in the table below:

Intermediary Voicemail Enabled

Intermediary Follow me Enabled

Destination Voicemail Enabled

Destination Follow me Enabled

Ringback Occurs

Ringback Failover Destination

N/A

√ √ Destination extension Follow me failover

√ √ Destination extension voicemail

√ √ √ Destination extension Follow me failover.

√ N/A

√ √ √ Destination extension Follow me failover.

√ √ √ Destination extension voicemail

√ √ √ √ Destination extension Follow me failover.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 127

√ N/A

√ √ √ Destination extension Follow me failover.

√ √

√Destination extension voicemail

√ √ √ √ Destination extension Follow me failover.

√ √ N/A

√ √ √ √ Destination extension Follow me failover.

√ √ √ √ Destination extension voicemail

√ √ √ √ √ Destination extension Follow me failover.

Intermediary Voicemail Enabled

Intermediary Follow me Enabled

Destination Voicemail Enabled

Destination Follow me Enabled

Ringback Occurs

Destination After Ringback

√ √ √ Destination extension voicemail

√ √ √ √ Destination extension Follow me failover.

√ √ N/A

√ √ √ √ Destination extension Follow me failover.

√ √ √ √ Destination extension voicemail

√ √ √ √ √ Destination extension

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 128

Intermediary Voicemail Enabled

Intermediary Follow me Enabled

Destination Voicemail Enabled

Destination Follow me Enabled

Ringback Occurs

Destination After Ringback

Follow me failover.

Table 25: Ring-back behavior

Note: Users need to be informed as to what to expect. With ring-back enabled their phones should 'ring by itself' once available. If the hand-set it picked up, they should hear ringing while the initial calling party is being contacted.

If the other party is now on the phone and also has neither follow-me nor voicemail enabled, when the handset of the phone on which ring-back was initiated is picked up, the user would hear a busy tone. A second round of ring-back will then be initiated. I.e. once the original caller (now on the phone) ends the call, his phone will ring, and picking it up, the initial called user would be attempted again.

3.16.4.1 Disabling Ringback Functionality

From the global settings menu, ringback functionality can be customised to be enabled or disabled for all transfers to busy extensions or unanswered extensions. (See section 3.1 for details on configuring ringback on busy and ringback on unanswered). Both settings are enabled by default.

If ringback on transfer busy is disabled, transfered calls to busy extensions will go directly to the voicemail or other configured failover destination for the extension and will not ring back to the transferring extension.

Similarly, disabling ringback on transfer no answer will direct unanswered transfered calls directly to the voicemail or failover destination of the unanswered extension, rather than ring back to the transferring extension.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 129

4 Advanced configurationAccess to a variety of advanced features is provided via the Advanced menu. Selecting a function from this menu opens a new window, which can be maximized with detailed configuration options for the feature. Once configured, select Submit at the bottom of the configuration page. Also remember to review and apply the updated configuration to the underlying system when ready.

4.1 AnnouncementsAnnouncements added as destinations allow messages to be played on inbound calls before transferring the calls to appropriate destinations. Announcements can play recordings created or uploaded as detailed in 4.17.

Field Content

Description The description of the announcement that will appear in selection lists (e.g. when selecting announcements for IVR)

Recording The audio recording to play for this announcement

Repeat The key a user may press to repeat the announcement. If this is set, a delay will be inserted after the announcement has been played to allow the user the option of repeating. Allowed keys are: 0-9, *, #

Allow skip If this is enabled, should the user press a key during an announcement, the announcement will be skipped.

Return to IVR When enabled, after the announcement has been played, the call is transferred to the last IVR.

Note: Even if the call was transferred to other destinations since the last IVR, this will still transfer the call the the last IVR.

Don't answer channel

If enabled, the channel will not be answered and the call transferred to the destination. If the channel supports early media, the announcement will be played as early media when the next destination answers the channel.

Destination after playback

Destination to transfer this call to. Please see 3.11.4 and 4 for destination options and configuration.

Table 26: Announcement configuration

4.2 CallbackThis feature allows users to dial into the system and hang up while ringing, after which the system will call the user back.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 130

Field Content

Callback description A custom description for this callback.

Callback number The number to call back. If this is left blank, the caller ID will be used to callback.

Note: the device to be called back must support incoming calls directly(e.g. some hotel and pay phones do not).

Note: If a callback number is not specified here, the calling device must presents a proper CID.

Delay before callback The amount of seconds to delay before calling back.

Destination Once connected via callback, the destination to which to transfer the called-back party.

Table 27: Callback configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 131

4.3 ConferencesThis feature allows multiple users to join a conference with two-way audio on all devices. Conference features include join and leave announcements, passwords, conference administration, in-conference menus, etc.

Field Content

Conference number The number to dial to access the conference

Conference name A custom name for this conference

User PIN A pin required to be entered by users in order to join the conference. This field is optional. The user must press # after entering the pin.

Admin PIN A pin that identifies the conference leader (admin). This field is optional, unless “Leader wait” has been enabled. The user must press # after entering the pin.

Join message If set, this audio recording will be played before a user joins the conference.

Leader wait If enabled, the conference will not start until the leader has joined by entering the Admin pin.

Quiet mode When enabled, audio recordings associated with joining and leaving the conference will not be played.

User count If enabled, the number of users already in the conference will be announced to a new user joining the conference.

User join/leave If enabled, an announcement will be made when-ever a user joins or leaves the conference.

Music on hold If enabled, music will be played when there is only one user in the conference.

Allow menu When enabled, users and the admin user can access their menus by pressing *

Record conference If enabled, conferences using this conference number will be recorded.

Table 28: Conference configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 132

4.4 Day / Night controlA number of day / night modes can be programmed on the Com.X. Each has a feature index and can route calls according to its own set of rules. These allow configuration of day / night to support multiple receptionists, tea or lunch breaks, after hours, etc.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 133

Field Content

Feature code index The index of this day/night mode. The index is the day-night feature code (please see section 4.5 for more detail on feature codes), with the last digit of the feature code (e.g. 280) replaced by this day/night's index (e.g.283, 284, 288, etc.) Up to 10 day/night entries are available, 0-indexed.

Description Custom description for this day/night control. This is the value that will be listed in selection lists that allow day/night selection.

Current mode This sets the initial and current mode for this day/night control. I.e. if Day is currently active, and Night is selected here, night will become active, and on system restart night will be the initial value for this day/night control.

Optional password If not blank, a user will have to enter this password in order to toggle this day/night control.

Day destination The destination to use when this control is in Day mode. Another day/night destination can be selected here, chaining together these conditions to form a logical AND tree. I.e. a number of decision junctions can be joined and manipulated by setting the modes for the day/night controls that have been chained together. An example:

280 has Day -> 281

280 has Night -> Support ring group extension

281 has Day -> 282

281 has Night -> Alternative receptionist

282 has Day -> Reception

282 has Night -> Tea / lunch room

A receptionist can enable night mode in the evenings and day mode in the mornings by using *280. When tea-time arrives, the receptionist enables night mode for 281 using *281. After tea-time she re-enables day mode for 281 using *281.

Please see 3.11.4 for detail on destinations.

Night destination The destination to use when this control is in Night mode. Please see 3.11.4 for detail on destinations.

Table 29: Day/night configuration

4.5 Feature CodesAn extensive list of feature codes is available to users and administrators to facilitate administration of the system and user call preferences using a phone. For each function, the administrator may change the feature code associated with the function,

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 134

enable or disable the function, or revert to the default feature code associated with the function.

Field Content

Name The name of the function category or the individual function.

Code The feature code currently associated with the function

Use default If enabled, the existing feature code will be replaced with the default feature code for this function, if different from the existing one.

Enabled Allows the disabling and enabling of individual functions. If disabled, the feature will not be available on the system. The code associated with the feature will remain configured even when disabled.

Table 30: Feature code configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 135

4.6 General SettingsGeneral settings apply system-wide on the Com.X platform. Users can typically override general settings with their own preferences, but some general settings override all user preferences.

4.6.1 Dial command optionst: Allow the called user to transfer the call with the “in-call blind transfer” feature code (default ##).

T: Allow the calling user to transfer the call with the “in-call blind transfer” feature code (default ##).

r: Generate a ringing tone for the calling party

w: Allow the called user to start recording after pressing the “in-call recording” feature code (default *1).

W: Allow the calling user to start recording after pressing “in-call recording” feature code (default *1).

L: Limit trunk calls to a specified duration. Parameters are separated using ':' and only the first parameter is mandatory. The first parameter indicates the maximum duration in milliseconds of the call. The second parameter indicates when a warning message should first be played when the specified number of milliseconds remain on the call. The third parameter indicates the frequency in milliseconds with which the warning message should be repeated. To limit calls to 1 hour and warn the user every minute after only 5 minutes are left on the call, use 'L(3600000:300000:60000)'

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 136

Field Content

Internal Dial command options

Options specified here applies to internal calls. Please see 4.6.1 for more details.

Outbound dial command options

Options specified here applies to outbound calls. Please see 4.6.1 for more details.

Extension recording override

If disabled, all user recording settings other than the on-demand settings will be ignored, and no recording other than on-demand will take place.

If enabled, the recording format setting specified here will override user-specific format settings.

Recording settings for other modules, such as queues and conferences remain unaffected. Disabling this override has a positive impact on system performance, as the checks that are performed for each call re: recording become unnecessary.

Call recording format Recordings will be saved on the Com.X hard drive in

the format selected here. Options are: wav, law, alaw, GSM, SLN, G.729.

We recommend using the wav format, since it results in higher quality recordings and does not use additional codec translation resources, which may affect performance on systems with high-usage.

Recording location If this field is blank, the default location (/var/spool/asterisk/monitor/) will be used to store recordings.

If this field is populated, ensure that the trailing / is included and that permissions on the directory are correct. This is required in order for the system to store recordings and the user's call monitor function to download the recordings:

chown asterisk:asterisk -R <dir>/recordings/

chmod g+rwx <dir>/recordings

Also configure the ASTERISK_CALLMONITOR_PATH entry in /usr/share/freepbx/recordings/includes/main.conf.php to point to the new location.

Users can access their recordings via the User login and Call Monitor feature.

If there is a requirement for an administratot to get access to all recordings, set this location to /var/www/recordings and secure the directory (please see the Apache web server administration manuals). Then access the list using http://<server-ip>/recordings/

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 137

Field Content

Run after record If not empty, this field specifies a custom script to be run after each recording has completed. The script should be executable and the location to the script the absolute path.

Ringtime default This specifies the default time an extension should ring before activating voicemail.

Direct dial voicemail prefix Dialing the prefix specified here followed by an extension number will take the user directly to the the mailbox for that extension.

Note: Please ensure the prefix specified here does not clash with any feature codes. Please see 4.5 for more detail on feature codes.

Direct dial to voicemail message type

The message (or no message) the user will hear before the voicemail prompt when dialing directly into an extension's voicemail. Can be one of:

Default - “Please leave your message after the tone. When done, hang up or press the pound key.”

No message

Unavailable - “The person at extension <ext> is unavailable.” followed by the default message.

Busy - “The person at extension <ext> is on the phone.” followed by the default message.

Optional voicemail recording gain

If present, applies additional gain on the recording.The number entered is interpreted as whole-numbered dBs.

Do Not Play "please leave message after tone" to caller

When checked, this option removes the default message to be played after the selected (if any) voicemail announcement has been made, but instead plays the tone directly after the voicemail announcement.

Default Context & Pri The internal dial-plan context to use if the user dials an extension or a short number that does not match outbound routes. This should remain the default unless requested otherwise for test purposes by Far South Networks.

Timeout/#-press default The internal destination to route a user after timeout. This should remain the default unless requested otherwise for test purposes by Far South Networks.

Loop Exceed default The destination that a user is transferred to when exceeding the maximum number of invalid selection

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 138

Field Content

options during a voicemail call. This should remain the default unless requested otherwise for test purposes by Far South Networks.

Timeout VM Msg Indicates whether the standard voicemail instructions should be played on timeout, or whether the tone should be played directly.

Max Loop VM Msg Indicates whether the standard voicemail instructions should be played, or whether the tone should be played directly once the maximum number of loops has been exceded.

Direct VM

Msg Timeout Time to wait after message has played to timeout and/or repeat the message if no entry pressed.

Msg Play Number of times to play the recorded message if the caller does not press any options and it times out.

Error Re-tries Number of times to play invalid options and repeat the message upon receiving an undefined option.

Find users in the Company Directory by

Specifies whether the first three letters entered by a user using the directory will look up by first name, last name or both.

Announce Extension When transferring a call as a results of a directory lookup, announces the transfer extension if this option is enabled. “Please hold while I transfer you to extension xxx”

Operator Extension When a user selects a 0 while engaging the directory, the user is transferred to this number. The number may transfer to an extension, ring group, external number, etc.

Extension of fax machine for receiving faxes

The extension number of the device to receive faxes when faxes are detected and explicit routing does not provide for fax termination.

Email address to have faxes emailed to

The email address to which faxes are sent if the “Extension of fax machine for receiving faxes” is set to “system”

Email address that faxes appear to come from

The email address from which faxes appear to have been sent, when “Extension of fax machine for receiving faxes” is set to “system”

Country Indications Configures the Com.X PBX country

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 139

Field Content

24-hour format Configures whether 12-hour AM/PM or 24-hour format should be employed by the Com.X PBX

Allow Anonymous Inbound SIP Calls?

Enabling this setting disables authentication checks on incoming SIP requests. I.e. anyone can place a SIP call to this PBX.

Check for updates Allow the system to automatically check the internet for FreePBX and Asterisk version updates. Updates of the FreePBX and Asterisk modules are managed by Far South Networks for the Comma and Com.X product ranges. This field should be left blank.

Update email An email address to send notifications of available updates to. Updates of the FreePBX and Asterisk modules are managed by Far South Networks for the Comma and Com.X product ranges. This field should be left blank.

Table 31: General PBX configuration settings

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 140

4.7 IVRThe Interactive Voice Response feature allows the creation and chaining together of interactive voice announcements and corresponding menu selections to facilitate user call transfer in the Com.X system.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 141

Field Content

Change Name Changes the name used to identify this IVR from the default (Unnamed). This entry will be displayed in selection lists that support IVR.

Announcement The audio message to be played to the user when this IVR is accessed. The message typically would present the user with a list of options and corresponding digit(s) to activate the option.

Timeout The number of seconds without user response before this IVR times out. When timed out, if a destination with option 't' has been defined, this destination would be transferred to on timeout.

Enable directory If enabled, this allows callers currently being serviced by this IVR to dial the Directory feature code (default #) to access the directory. Please see 4.5 for more information on feature codes.

VM Return to IVR When enabled, should one of the IVR options result in the user's call being transferred to a voicemail box, after leaving a message or exiting the voicemail menu, the user is returned to this IVR.

Directory Context If directory access is enabled, access the directory specified here if the user uses the Directory feature code.

Enable Direct Dial If enabled, users can dial extensions directly from within the IVR.

Note: Having direct dialing enabled introduces a delay before the IVR responds to menu options while the system gives the user a chance to dial more digits re: dialing an extension.

Note:If enabled and some of the configured extensions start with the same number as one of the configured IVR options, the option might be inaccessible as the system will be collecting digits in order to dial an extension, as opposed to servicing IVR options. Rather disable direct dial in your main IVR and include an option for direct dialing (e.g. 'If you know the number of the extension you wish to dial, please press 8) which leads to a second IVR with a return option, and direct dial enabled, from which the caller can then dial the desired extension.

Loop before t-dest If enabled, the IVR loops as described in the 'Repeat loops field' when user selection times out.

Timeout message If specified, this audio message is played when user selection times out.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 142

Field Content

Loop before i-dest If enabled, the IVR loops as described for the 'Repeat loops field' when user a user selects an invalid option.

Invalid message If specified, this audio message is played when the user selection is invalid.

Repeat loops The number of times the IVR should be played if the user does not provide an option before timeout, or if the option is invalid.

The IVR will only loop on invalid input if the 'Loop before i-dest' option is enabled. The IVR will only loop on timeout if the 'Loop before t-dest' option is enabled.

If the number of repeats has been reached and another timeout or invalid selection occurs, the relevant timeout 't' or invalid 'i' destination is used. If these destinations are not configured, the call terminates.

Destinations For each valid selection in this IVR, enter the digit(s) to activate the selection and the call destination to transfer the caller to.

A special 't' destination is used to configure a destination on user selection timeout.

A special 'i' destination is used to configure a destination on invalid user selection.

For each destination, if the Return to IVR option is enabled, the destination will be ignored and the user returned to the parent IVR of this IVR.

Note: It is possible that the last IVR was not the transfer directly before this IVR, but some steps removed. The Return to IVR option will cause the call to return to the last previous IVR, regardless of how many non-IVR transfers may have taken place in the interim.

Table 32: Interactive voice response configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 143

4.8 Music on holdThe Music on hold feature allows for the upload of audio files (e.g. music, announcements, advertisements, informationals, etc.) in either WAV or MP3 format for playback to users when calls are on hold.

Note: When mp3 files are uploaded, the files are internally converted to wav format. This process can take as long as the total length of the mp3, and utilize a high amount of CPU resources. We recommend that mp3 upload is performed during scheduled maintenance.

Music may be categorized and music from a specific category played for specific contexts, e.b. when a user is waiting in a support queue.

4.8.1 Configuring streaming musicTo configure music on hold to stream from a media server, select Music on hold from the Advanced menu, and then add a streaming category.

Please see section 6.14 for details on configuring a streaming music server.

Enter a name for the stream, and configure the music player command as follows, using the URL to the streaming server:

/usr/bin/mpg123 -q -s --mono -r 8000 -f 16384 -b 100 <url>

The -s switch redirects the music stream for PBX use

The --mono switch transforms the stream to 1 channel audio as required

The -f switch adjusts the audio volume. You can also try -f 8192 (softer) or -f 32768 (louder)

The -b switch configures an audio buffer of the specified amount of Kbytes. If your connection to the streaming server suffers from delays, consider adjusting this value. Setting this to a high value might result in a delay before streaming commences.

<url> represents the URL to the streaming server, including any protocol and port indications.

Use the optional -@ switch if the streaming server is publishing a playlist (e.g. .m3u) instead of directly streaming the audio (e.g. as in the case with the GNU MP3 daemon).

Submit and apply the configuration. This streaming category can now be used where music on hold selection is possible (e.g. queues).

For inbound calls you can set the music on hold class from the inbound route's advanced context menu.

Warning: If you incorrectly configure the application entry above, applying might result in the apply freezing up. To fix this, restart the Com.X, correct the application entry, or remove the streaming music on hold category and apply.

4.8.2 Playback configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 144

Field Content

Upload The audio file to upload. Supported formats are: WAV, MP3

Volume This value is linear, but human sound perception is logarithmic. As a result we recommend that you test the volume configured here for comfort and quality levels. This feature will convert MP3 files to WAV files. If you do not have mpg123 installed, you can set the parameter: AMPMPG123=false in your /etc/amportal.conf file.

Enable random play

Enabling random play will select audio files to play in a random order.

If this is disabled, files are played in the order listed here.

Table 33: Playback configuration

4.8.3 Adding a music categoryMusic categories categorize the audio files available on the Com.X PBX server storage.

Field Content

Category name A unique name for this audio category

Table 34: Music category configuration

4.8.4 Adding a streaming categoryStreaming categories allow the inclusion of internet audio streams for features that support Music on hold.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 145

Field Content

Category name A unique name for this streaming category.

Application This is the "application=" line used to provide the streaming details to Asterisk.

Please see information on the musiconhold.conf configuration for different audio and internet streaming source options.

Optional format An optional "format=" line that is used to provide the audio format. This should be a format understood by Asterisk such as alaw, and is specific to the streaming application you are using.

Please see information on the musiconhold.conf configuration for different audio and internet streaming source options.

Table 35: Streaming music category configuration

4.9 Outbound routesThis feature allows advanced access to outbounds routes and should only be used when the Outbound Routes panel does not provide sufficient levels of detail or flexibility given the administration need.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 146

Field Content

Route name A unique name for this route.

Route password An optional password. If present, users will be prompted to enter this password before call routing using this route is allowed.

Note: this is a single password for the route. Pin sets should be assigned using the Pin set field.

Pin set If more than one pin should allow access to this route, leave the Route password field empty and specify a pin set here.

Emergency Dialing When enabled, the CID field of the caller will be overridden by the calling device's emergency CID value (if configured).

Intra company route If enabled, the internal caller ID information will be retained, and not replaced by the extension's external CID nor the route's external CID.

Music on hold If specified, the audio file will be played before routing the call. This allows country-specific or destination-specific messages or instructions to be played before placing the outbound call.

Dial patterns This route will only route calls if it is the highest priority outbound route that matches the destination number to one of the dial patterns specified here.

For more information on dial patterns, please see 3.10.4.2.

Trunk sequence This prioritized list specifies the order in which trunks should be utilized to route calls. the first trunk in this list is attempted, failing which the second trunk is attempted, etc.

Table 36: Outbound route configuration

4.10 PagingPaging allows groups of extensions to be created that will receive calls (provided the phones for the specified extensions allow paging).

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 147

Field Content

Paging extension The extension to dial to activate the page

Group description A custom description for this group

Device list The list of devices and extensions to include in this paging group

Force if busy If enabled, the system will not check whether the extension is busy before paging it. Active calls may be interrupted. This is useful for emergency pages.

Duplex When enabled, all supporting devices will allow two-way communication to all other extensions and devices in this list. I.e. any audio generated by any device will be audible to all other devices and extensions in the device list.

Default page group If enabled, this function removes the default flag from any previous default paging group. If set, an extension, when created, may be specified to join the default paging group, resulting in it automatically being added to this group and automatically being deleted from this group if such an extension is deleted.

Table 37: Paging configuration

4.11 IntercomThe intercom feature allows for a call to be placed to phones supporting the feature, and for such phones to automatically answer the call and play the audio on speaker.

To enable intercom (disabled by default), navigate to the GUI, then Start – Configuration – Advanced and Feature Codes.

Enable the Intercom Prefix feature code and change the feature code to a code that will not conflict with existing codes (e.g. *93). Apply.

The list of phones known to support Intercom and Paging include: Aastra, Grandstream, Linksys/Sipura, Mitel, Polycom, SNOM, and possibly other SIP phones. ATAs are not supported. If your phone is set to auto-answer, it should also support intercom.

The phone must be configured to support the feature. On a Snom for example, configuration would involve turning on Auto Connect Indication, setting the Auto Connect Type to Handsfree and enabling the Intercom feature.

Please contact your phone manufacturer or consult the phone manuals for specifics on configuring your phone and model for intercom support.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 148

4.12 Parking LotCallers can be placed in a parking with a time out associated, after which the caller is transferred to the specified destination. This allows receptionist, for example, to place a caller on hold while waiting for their desired extension to become available. The caller in the parking lot would then, after the parked timeout, automatically ring reception again, by which time the desired extension might have freed up.

To transfer a call to the parking lot, use a transfer feature and dial extension 70. The allocated slot will be announced. To retrieve the call, dial the slot number.

Field Content

Enable parking lot feature

Call parking will only be available if this feature is enabled.

Parking lot extension

The extension to transfer calls to in order to park them (the default extension number is 70)

Number of slots The number of parking bays available. Parking lots are numbered as follows: Parking lot extension + bay number, e.g. 71, 72, etc.

Parking timeout The number of seconds after which the call is removed from the parking bay. The call is then transferred back to the extension from which the call was transferred into the parking bay.

Parking lot context The dialplan context for parked calls. Changing this setting might result in parked calls no longer functioning.

Parking Alert-Info Additional information to be added to the call when the call is transferred to the destination for orphaned calls. Phones supporting SIP Alert information could then inform the user receiving an orphaned call of the call's orphaned status by displaying a message or playing a different ring-tone.

Caller ID pre-pend Additional information to be pre-pended to the CID when the call is transferred to the destination for orphaned calls. This allows a user receiving an orphaned call to be informed of the call's orphaned status.

Announcement An announcement to be played to the caller in the parking lot when the call is flagged as orphaned, before transferring the call to the orphaned call destination.

Destination The destination for calls that become orphaned. Please see section 3.11.4 for more information on call destinations.

Table 38: Parking lot configuration

4.13 PhonebookThe phonebook feature allows names and speed dialing codes to be matched with extension and outbound numbers. It allows a user to dial numbers by phoning the phonebook feature code (please see section 4.5 for more detail on feature codes) and entering the first three letters of a desired phonebook entry's name, after which

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 149

the call is transferred to the desired extension or an outbound call is placed with the desired number.This feature also enables lookups of users in the phonebook directory using the directory feature code (#).

Field Content

Name The name to look the first three letters up from.

Number The extension or outbound number to be dialed for this entry.

Speed dial code A speed dial code to associate with this phonebook entry.

Set speed dial The speed dial entry will be added to the database if this field is enabled.

File An optional CSV format file for uploading multiple phone book entries. Entries should be in the following format:

“Name”;number;speeddial

If large phonebook databases (> 2000 entries) are to be uploaded, additional configuration is required. Please see the Com.X Troubleshooting guide for more detail large phonebook imports.

Note: If the delimiter is something other than ';' the import will

fail. Please see your operating system / application help for

configuring ';' as the CSV export delimiter.

Table 39: Phone book entry configuration options

4.14 Pin SetsPin Sets are a convenient way to group sets of pins to facilitate multiple users with individual pins gaining access to features, without using a common pin for the features.

Field Content

Description Custom description for this Pin set. This will be listed in selection lists that allow Pin sets.

Record in CDR If enabled, when this Pin set is used in call routing, the Call Detail Record includes the Pin set details.

Pin list The list of pins included in this Pin set.

Table 40: Pin set configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 150

4.15 QueuesQueues are a powerful feature of the Com.X system, allowing callers to be placed on hold and transferred according to a number of strategies and based on priority.

Callers waiting in the queue are provided with their position in the queue, projected waiting time and the option to use self-service menus to exit the queue and transfer to other destinations.

Agents servicing queues are allowed to log in by dialing the queue number followed by *, and log out out of queues by dialing the queue number followed by **, are provided with information re: callers waiting in the queue, and queues can be configured in flexible manners to transfer calls to agents.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 151

Field Content

Queue number The extension number of the queue. Any calls or transfers to this extension will be routed to the queue.

Queue name A unique name for the queue.

Queue password An optional password. If set, agents will need to log in with this password before they can service the queue.

CID name prefix An optional prefix to be added to the CID of callers in the queue. This prefix will be displayed to agents servicing the queue.

Wait time prefix If set to “yes”, prefixes the CID name of all callers in the queue with the total time, in minutes, for which they were in the queue.

Alert info If configured, additional SIP INFO messages carry the string configured here to the agent phones, facilitating distinctive ring and other features.

Static agents A list of agents who are permanently servicing the queue. Static agents do not need to log in to the queue and can not log out of the queue. The list can contain extensions as well as external numbers, provided there is an outbound route that can support a call to the external number.

Extension quick pick

An ease-of-use drop-down list of extensions to allow quick addition of extensions to the list of static agents in the queue.

Agent announcement

An announcement to be played to the agent prior to connecting the agent and the caller.

Join announcement

An announcement to be played to callers upon their placement in the queue.

Music on hold class

The category of music on hold to be played to callers while waiting in the queue.

Join empty If set to Yes, callers can be added to the queue even when no agents are logged in to service the queue.If set to No, callers may not be added to the queue if there are no agents logged in. If set to Strict, callers may not be added to the queue if there are no agents logged in, or if all of the agents are unavailable.

Leave when empty If set to Yes, callers will be removed from the queue if there are no longer any agents logged in. If set to strict, callers will be removed from the queue if there are no agents logged in or if all of the agents are unavailable.

Ring strategy Ringall: Rings all the available agents simultaneously until one answers.

Roundrobbin:Takes turns ringing each available agent.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 152

Leastrecent: Rings the agent who was least recently called by this queue.

Fewestcalls: Rings the agent who has serviced the fewest calls from this queue.

Random: Rings an agent at random.

Rrmemory: Round robbin with memory. Rings each agent sequentially but remembers the position when the call is answered and rings the next agent in the sequence to service the next call.

Agent timeout The number of seconds for which an agents extension will ring before it is considered a timeout.

Retry The number of seconds to wait before attempting to dial agents again. If set to No Retry, then caller will be transferred to the failover destination after just one round of dialing the agents.

Wrap up time After a succesful call, this is the number of seconds to wait before attempting to transfer another call to a potentially free agent.

Call recording The format in which calls are to be recorded, if recording of queue calls is required.

Event when called If set to Yes, a call will trigger the AgentCalled, AgentDump,AgentConnect and AgentComplete manager (AMI) events.

Member status If set to Yes, the QueueMemberStatus manager(AMI)event will be generated.

Skip busy agents If set to Yes, agents on occupied extensions will be skipped as if the line were returning a busy signal. This prevents the call waiting feature from being presented with a call and the next agent is attempted instead.

Queue weight Allows prioritising of queues so that calls waiting in a high priority queue will deliver it's calls first if there are agents servicing more than one queue.

Autofill If not enabled, calls in the queue are processed in series,requiring all calls to be held until the first caller in the queue is connected to an agent. If enabled, calls can be processed in parallel.

Agent regex filter Provides an optional regex expression that will be applied against the agent callbacknumber. If the callback number does not pass the regex filter then it will be treated as invalid. This can be used to restrict agents to extensions within a range, not allow callbacks to include keys like *, or any other use that may be appropriate.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 153

Frequency The frequency with which their position and estimated hold time is announced to the caller.

Announce position If set to Yes, the annoucements will tell the caller their position in the queue.

Announce hold time

If set to Yes, the announcements inform the user of the expected time before their call is connected to an agent.

IVR break out menu

An option to include an existing IVR as a break out menu. This allows callers to select options from the IVR, removing them from the queue and directing their calls to the destination specified by the IVR option.

Repeat frequency The frequency with which the optional IVR menu is announced. (0 seconds to disable announcements)

Destination The destination for any failover calls (i.e. Calls that are removed from the queue without being answered by an agent).

Table 41: Queue configuration options

4.16 Ring GroupsRing groups allow groups of extensions to be notified of incoming calls using a number of powerful ring strategies. A rich set of ring group parameters allow flexible configuration of timeout, alerts, music on hold, pick-up confirmation and other features.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 154

Field Content

Ring group number

The number a caller will dial to ring extensions in this ring group.

Group description A descriptive title for this ring group.

Ring strategy The strategy with which to ring extensions in this ring group.

Options include:

Ringall: rings all available extensions in the ring group simultaneously.

Hunt: Takes turns ringing each available extension in the ring group.

Memoryhunt: Rings the first extension in the list. Then rings the first and the seond extension in the list. Then the first, second and third extension in the list. And so on...

Firstavailable: Rings only the first available extension in the list.

Firstnotonphone: Rings only the first channel not off hook, ignoring call waiting features.

*Prim: The patterns with this suffix work as above, except if the first extension in the list is occupied, then the other extensions will not be rung. If the first extension has Do Not Disturb (DND) enabled, it will not be rung. If the first extension has unconditional call forwarding enabled, then all of the extensions in the list will ring.

Ring time The time, in seconds, for which each extension in the list will ring.

Extension list The list of extensions to be included in this ring group. External numbers may be included if suffixed by a #.

If an internal extension is suffixed by a #, then the follow-me of that extension will be used for the call.

Extension quick pick

An ease-of-use drop-down list of extensions to allow quick addition of extensions to the list of static agents in the queue.

Announcement An optional message to be played to the caller before attempting to ring the extension in the list.

Play music on hold?

If a music category is selected, then the caller will hear that music while the calls is attempted rather than the traditional ringing.

CID name prefix An optional feature to prefix the CID of all callers calling this group. This allows agents to differentiate between calls to the ring group and calls to their extension directly.

Alert info If configured, additional SIP INFO messages carry the string configured here to the agent phones, facilitating distinctive ring

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 155

and other features.

Ignore CF settings When checked, agents who attempt to use call forward will be ignored.

Skip busy agent If checked, agents on an occupied line will be skipped as if the line were returning an unavialble signal. This prevents calls form being presented to call waiting features.

Confirm calls If enabled, agents will have to confirm, by pressing the number 1 button on their handset, before answering a call. This prevents calls from being connected to voicemail or similar features on external extensions. This feature is only available when the ringall ring strategy is selected.

Remote announce A message to be played to the agent receiving the call if the Confirm calls feature is enabled.

Too late announce A message to be played to agents who have answered a call, but were too slow in confirming the call. i.e. Another agent answered and confirmed before the initial agent confirmed.

Destination if no answer

The destination to which to send unanswered calls. This can include extensions, voicemail boxes, IVR's, announcements, queues, phonebook entries and terminations.

Table 42: Ring group configuration oprions

4.17 System RecordingsAudio can be recorded and used in features such as announcements, IVR, etc. Recordings can be uploaded and made from an extension. Follow the instructions on the system recordings page.

Note: Remember to press the # key to indicate the end of the recording before giving it a name.

Field Content

Extension number If an extension number is entered here, this number will be used to record a recording should the Save Recording feature code (please see section 4.5 for more detail on feature codes) be dialed from that extension.

Upload A recording file in PCM Encoded format, 16 Bits, at 8000Hz, single channel. Recordings are uploaded to

/var/lib/asterisk/sounds/custom/

Name of this recording

A custom name for the recording. This name will appear in selection lists for features that make use of recordings.

Table 43: System recording configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 156

4.18 Time ConditionsTime conditions check the current Com.X system time and compares it with the specified Time Group to determine whether there is a match. The call is then routed either to a day-night entry if this over-ride has been enabled, or to the match destination if the current time falls within the time block specified in the Time Group, or to the no match destination otherwise.

Field Content

Name Name used to identify this time condition in selection lists that allow time conditions.

Time group The Time Group that specifies the time range that results in a match for this time condition. If the current system time does not match this time group, the call will be routed to the no match destination. Please see 4.19 for detail on Time Groups.

Associate with If a day-night feature code (e.g. 283) is specified here, and the day/night entry is enabled, this time condition will route directly to the day/night entry, ignoring the time condition settings specified here. Disabling the day/night entry will cause calls to be routed according to the time condition settings.

Destination if matches Destination to route the call to if the Time Group conditions are matched.

Destination it no match Destination to route the call to if the Time Group conditions are not matched.

Table 44: Time condition configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 157

4.19 Time GroupsTime groups allows the specification of blocks of time for use in call routing rules, such as time conditions. Please see 4.18 for more detail on Time Conditions.

Field Content

Name A name to identify this time group with. This will appear in selection lists that allow time groups.

Time to start The start time for the block of time this time group specifies.

Time to finish The end time for the block of time this time group specifies.

Week day start The start day for the block of time this time group specifies.

Week day finish The end day for the block of time this time group specifies.

Month day start The start day in the month for the block of time this time group specifies.

Month day finish The end day in the month for the block of time this time group specifies.

Month start The start month for the block of time this time group specifies.

Month finish The end month for the block of time this time group specifies.

Table 45: Time group configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 158

4.20 Voicemail BlastingVoicemail blasting allows messages to be added to a number of voicemail boxes at once.

Field Content

Voicemail blast number

The extension to dial to leave a message to this voicemail blasting group.

Group description Custom description for this voicemail blasting group.

Audio label Select the audio recording or announcement to play before the voicemail prompt for this voicemail blasting group.A unique announcement serves to confirm for a user that they have dialed the correct voicemail blasting group.

Password An optional password required to authenticate before the voicemails are delivered.

Voice mailbox list Select (using Ctrl-click) all the extensions that should receive the voicemail message in their mailboxes.

Default voicemail blast group

If enabled, this function removes the default flag from any previous default voicemail blasting group. If set, an extension, when created, may be specified to join the default voicemail blast group, resulting in it automatically being added to this group and automatically being deleted from this group if such an extension is deleted.

Table 46: Voicemail blasting configuration

4.21 DISAA DISA destination allows for an outbound dial tone to be configured as a destination on the unit. This could be used to allow particular external callers to make outbound calls through the outbound routes on the Com.X.

Field Content

DISA Name An appropriate name for the DISA destination.

Pin The user will be prompted to enter this pin before a call can be placed from the DISA tone destination. Mulitiple pins can be entered, with each separated by a comma.

Response Timeout The time, in seconds, for which the DISA is available before hanging up. If an incomplete or invalid number has been entered, the call will hang up after this duration.

Digit Timeout The maximum time, in seconds, that the system will wait between digits being entered. If digits are entered and this time limit elapses, a call will be attempted using only the

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 159

entered digits.

Require Confirmation Optional. Requests the user to confirm by pressing '1' before requesting the password for the DISA destination.

Caller ID The outbound caller id that the call will appear to have come from.

Context The context of the calls generated from this DISA. It is not advisable to edit this unless you have great confidence in your Freepbx knowlege.

Allow Hangup If enabled, a call can be hung up using the feature code “**” while in call. This will present the user with dialtone again, and allow another outbound call.

4.22 Listening in on calls / Spy featureThe Com.X PBX allows a spy feature to be enabled that allows the listener to listen in on calls in progress. Input from the listener will not be audible to the callers on the call being listened in to.

To listen in on all calls, enter the ChanSpy feature code. The first active channel will be listened in on. To cycle through the channels, use the * key. To increase or decrease the volume of the intercepted audio, use the # key.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 160

5 Monitoring the systemA rich suite of monitoring functions are available from the Com.X GUI. Monitoring domains include Call Detail Records, PBX system monitoring and events, Configuration details, Host system monitoring, Telephony status and events and GUI web server status.

5.1 GUI Status PageThe status page of the Com.X GUI offers vast monitoring features, as well as displaying the configuration status of the Com.X.

5.1.1 Status DisplayThe GUI offers a display to indicate the overall status of the system configuration and synchronization. This display lists any configurations that are outstanding, as well as actions required to apply the configuration and set the status to synchronized.

Figure 85: Configuration and synchronization status display

5.1.2 Services menuA list of services and their status is offered on this page. From this list, services can be configured to restart and be enabled/disabled and enabled/disabled on start up.

To restart or enable/disable a service, right-click and select the appropriate action.

Figure 86: Services can be enabled/disabled, restarted and enabled/disabled on start up.

Note: Services that are essential to operation can not be disabled in real time, or at start up.

Changing the status of services should not normally be necessary. Please ensure that you understand the consequences of disabling or restarting a service before using these functions.

5.2 Detailed loggingThe Com.X supports a variety of logging levels, as detailed below:

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 161

Log level Description

debug Source code level debug reports. Enabling this level results in a large volume of logging data.

notice Informative messages that report on system, channel, span and call state.

warning Informational messages requiring attention and evaluation. Warnings may indiacte conditions that may limit or in future potentially impede functionality.

error Error reports indicating items that should be addresses should system functionality be affected.

verbose Additional informational messages (similar to notices), allowing more effective call tracing.

Table 47: Logging levels

Logging takes place on the CLI as well as to /var/log/asterisk/messages.

From the Com.X GUI, two levels of detail can be selected, namely “brief” or “verbose”. These may be accessed using Monitor -> Asterisk -> Set log level <Brief/Verbose>

5.3 Call Detail Records (CDR)

5.3.1 Reviewing Call Detail RecordsThe Com.X records call detail records for all calls. To access these records, select “Call Log” from the Reports menu. Specify the period for which records should be retrieved and select “Search”.

Figure 87: Call record search options

For each record, the date, channel, call source, caller ID, destination, the disposition and duration of the call is logged.An additional UUID field is provided for each call, containing the unique identifier, or a recording of the call, if one exists.

Note: If the outbound CID on a trunk has been configured with an override (or as 'hidden'), the override CID will be stored in the caller ID field, not the original CID, as well as in the Source field (empty if the override is 'hidden').

If the extension number or a specific account code should rather be stored in the CDR when the trunk CID has been over-ridden, configure the “Account code” field

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 162

on each extension to an appropriate value. The account code is then stored in the CDR, while the upstream telco is presented with the CID as configured on the trunk.

A results summary is displayed at the bottom of the list, where navigation of the list is also facilitated. CDR records are stored in a database on the Com.X and can be backed up. Please see 2.3.1.1.4 for more detail on backing up the CDR database. Call reports can also be exported to Portable Document Format (PDF) or in Comma Separated Values (CSV) format for further processing.

Figure 88: CDRs can be exported in CSV or PDF format.

5.3.2 Enabling logging to CSVTo enable logging of all CDRs to /var/log/asterisk/cdr-csv/Master.csv, uncomment the 'enable=yes' line in /etc/asterisk/cdr.conf. Please see section 6.1.2.3 for details re: editing system files.

5.3.3 Accessing the CDR databaseTo access the records in the MySQL CDR database remotely, the Com.X needs to be configured to allow an external user access.

1. Configure the Com.X to allow remote connections to the MySQL server by editing /etc/mysql/my.cnf and changing the bind-address field to 0.0.0.0

Note: This poses a security risk and remote access should be restricted by a proper firewall.

2. Restart the MySQL server:sudo /etc/init.d/mysql restart

3. Restart the comma-gui service:sudo /etc/init.d/commagui restart

4. Log into the mysql server as root from the Com.X console:mysql -u root

5. Configure a cdruser with read access to the CDR database:GNT SELECT ON asteriskcdrdb.* TO cdruser@'%' IDENTIFIED BY 'password';

FLUSH PRIVILEGES;

6. ConfigurX your SQL client to point to the server, with username cdruser and the password as configured, on the default port 3306, and with database schema asteriskcdrdb.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 163

5.4 Monitoring of remaining capacity on the unit

The Com.X provides monitoring of the available space on the hard drive, SSD or SD card.Space on the device is consumed as new calls are recorded and the recordings are saved. The Com.X monitors the storage and sends a notification email (see section 3.1) once the space consumed in exceeds a particular threshold (default 80%). A reminder email is then sent repeatedly until such time as the threshold is no longer exceeded.

5.4.1 Deleting of call recordingsOnce an email has been received informing the administrator of the exceeded capacity threshold, the administrator can delete any call recordings that are not needed.

Function to be added in upcoming release.

5.4.2 Changing the memory consumption thresholdShould a consumption threshold of 80% be unsatisfactory, the threshold percentage can be altered.

Function to be added in upcoming release.

5.4.3 Auto-removal of audio filesIf the stored data exceeds a threshold of 97% capacity, an email is sent to notify the administrator and audio files are automatically deleted to prevent loss of service due to storage device overflow. The oldest recordings are deleted first and recordings are deleted until the consumed disk space is less than 96% of capacity.

5.5 Retrieving monitoring informationTo access monitoring functions, select Monitoring from the main menu bar, and select the category and function of interest. Results are displayed in tabular format, with the ability to page to more results. In some cases the information is color coded to facilitate easier analysis. The reload button re-issues the monitoring query, facilitating ad-hoc snapshots of monitoring data.

Note: Due to a known issue with the tabular representation of results, if you are only seeing one page, manually enter “2” in the page number at the bottom of the table and press enter. All pages of information should then become visible.

5.5.1 Monitoring functions

Category Function Description

Asterisk

Asterisk Events Asterisk event log (/var/log/asterisk/event_log)

Asterisk Messages Asterisk messages log (/var/log/messages)

Asterisk Queues Asterisk queue log (/var/log/queue_log)

Channels Asterisk CLI (show channels). Lists channels

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 164

Category Function Description

in use and active calls.

Database Displays the PBX configuration database

Set log level brief Enable logging of notices, warnings and errors only

Set log level verbose Enable logging of DTMF, verbose messages, notices, warnings and errors

Configuration

DHCP Configuration

Dahdi system Dahdi span configuration (/etc/dahdi/system.conf)

Dahdi channels Dahdi channel configuration (/etc/asterisk/chan_dahdi.conf)

Day/Night

Extensions Extension configuration file (/etc/asterisk/extensions.conf)

IAX peers IAX peer configuration file(/etc/asterisk/iax_additional.conf)

IAX registrations IAX registrations configuration file(/etc/asterisk/iax_registrations.conf)

Network interfaces System nerwork interface configuration file (/etc/network/interfaces)

SIP peers SIP peer configuration file/etc/asterisk/sip_additional.conf

SIP registrations SIP registrations configuration file(/etc/asterisk/sip_registrations.conf)

mISDN ports mISDN configuration file(/etc/asterisk/misdn.conf)

mISDN configuration mISDN stack configuration file (/etc/mISDN.conf)

Reload

Reload Asterisk Reloads the Asterisk PBX. Results in reload of SIP, IAX, dahdi and mISDN. Complete service loss during reload.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 165

Category Function Description

Reload IAX Reloads the IAX module.

Reload SIP Reloads the SIP module. Causes SIP trunks and extensions to re-register.

Reload mISDN Reloads the mISDN module. Service to BRI channels will be lost while reloading.

Reload Dahdi Reloads the dahdi module. Service to analogue and PRI channels will be lost while reloading.

Restart

Apache Restart the web server

Asterisk and drivers Restart the PBX software as well as DAHDI and mISDN drivers

MySQL Restart the database server

System

Audit Performs a system audit and present items requiring attention to the user

Disk usage Displays system mount points, their capacity and usage statistics.

Network status System network interface status (ifconfig) Displays interfaces, whether they are Up and their Rx, Tx and error statistics. Also shows IP configuration for each interface.

Performance Displays system performance snapshot, including CPU performance, active processes, memory usage and page file usage.

System log Displays the system-wide log. This includes information, warning and error messages from system-wide applications and services (/var/log/syslog)

Telephony

Dahdi channels Asterisk CLI (dahdi show channels) Displays the list of channels visible to the telephony driver.

Dahdi spans status Asterisk CLI (dahdi show status) Displays the current dahdi span status. If spans are in error here, there may be a configuration problem,

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 166

Category Function Description

or a Comma device might not be reachable.

Dahdi statistics Displays statistics related to the dahdi dynamic spans, including slips and skips. If these numbers do not remain constant, it might indicate network performance issues that could result in a decrease in call quality.

Device discovery Displays the list of Comma devices visible to the Comma Manager on all networks, including their ethernet and IP configuration status.

IAX peers Asterisk CLI (iax2 show peers). Displays IAX peers that have registered with the PBX and their status.

IAX registry Asterisk CLI (iax2 show registry). Displays the PBX IAX registry. IAX trunks should be listed here when registered with IAX providers.

Manager log Displays the Comma Manager log. This is a useful resource for finding problems with Comma devices booting and channel events.

SIP peers Asterisk CLI (sip show peers). Displays SIP peers that have registered with the PBX and their status.

SIP registry Asterisk CLI (sip show registry). Displays the PBX SIP registry. SIP trunks should be listed here when registered with SIP providers.

misdn channels Asterisk CLI (misdh show channels) Displays available BRI channels

misdn stack status Asterisk CLI (misdn show stacks) Displays the ISDN BRI software stack status, including link enumeration, TE/NT configuration, point to point and multipoint configuration and status.

Web Server

Access Log of web server access events (/var/log/apache2/access.log)

Errors Log of web server error events (/var/log/apache2/error.log)

GUI Client Log Debugging information, warnings and errors generated by the GWT-based GUI running in

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 167

Category Function Description

the browser.

Table 48: Monitoring functions

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 168

6 Advanced Administration

6.1 Console accessNote: Any customisation or third party integration not explicitly endorsed and supported by Far South Networks will result in the software warranty becoming void.

6.1.1 AuthenticationDefault username: comma

Default password: farsouth

It is advisable to change the authentication information from the default if the unit is accessible over the network via secure shell.

6.1.2 Accessing the unitOn power-on the unit can be accessed either via serial cable or via a secure shell using ssh if the IP address is known from a DHCP server.

A serial connection can also be used to obtain the IP address allocated by a DHCP server.

6.1.2.1 Serial access

Connect a serial cable to the unit's serial port and configure a terminal emulator such as putty with the following settings: 115200,8,N,1

The cable should be a “null modem” serial cable, with pin 2 (RxD) and pin 3 (TxD) crossed and pin 5 (ground signal) connected to pin 5 (ground signal).

Note: Com.X10 and Com.X5 units feature serial ports with Rj45 connections.

The DHCP-assigned IP address can be obtained from the serial console using the ifconfig command, or from the external DHCP server's administration application.

Figure 89: "ifconfig eth0" shows network configurations of eth0 (Lan1)

6.1.2.2 Secure shell access

Secure shell login is supported on the default SSH port 22:

The unit can be accessed using ssh on any of the external LAN ports using their default or configured IP addresses).

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 169

6.1.2.3 Editing system files

To edit a file, use the 'jed <filename>' file editor. If superuser privileges are required to edit the file, use 'sudo jed <filename>'.

6.1.2.4 Changing the shell login password

Log in as the comma user. To change the password, type: 'passwd'. Enter and confirm the new password.

6.2 Rebooting the system

The system can safely be rebooted using the “sudo reboot” command. Stopping

Asterisk using the 'sudo asterisk -r “stop when convenient” ' command, is recommended. This stops the Asterisk service as soon as no calls are in progress and ensures that rebooting the system does not affect any active calls.:

Figure 90: 'sudo asterisk -rx "stop when convenient" ' stops the asterisk service, so that no calls are cut off, then 'sudo reboot' reboots the Com.X system.

6.3 Configuring email services

6.3.1 Configuring voicemail to emailTo enable the voicemail to email service on an extension, add an email address and a pin to the email and pin fields in the advanced configuration options of the extension. Voicemail recordings will be sent to the address when they are created,

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 170

Figure 91: If an email address is listed in this field, voicemail recordings and notifications will be sent to the address.

6.3.2 Configuring sendmail for mail relayNote: Mail relay configuration is not backed up by the Com.X backup utility.

The Com.X product range makes use of sendmail for outbound SMTP mail delivery. The sendmail server will attempt to directly resolve destination mail server addresses and contact these servers directly for mail delivery.

If your network design requires the use of a mail relay server for mail delivery, sendmail can be configured to deliver outbound mail into the relay server's queue. An authentication username and password can also be configured.

The mail relay server may be configured to only allow emails from a specific domain, in which case the sendmail server could need to be configured to masquerade as originating email from that domain.

From the Start menu, select Configure and General settings. Enter the mail relay server host, username and password and masquerading domain in the appropriate fields and apply.

Note: The relay server's hostname must be entered, not its IP. If the hostname is

not known, create an entry called 'mailrelay' in /etc/hosts with the IP and use 'mailrelay' as the hostname:

xxx.xxx.xxx.xxx mailrelay mailrelay.local

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 171

Figure 92: Sendmail configuration

6.3.3 Sending a test emailYou can send a test email by using the 'mail' command. The first parameter of the mail command is the destination email address. After entering a subject, enter the message body. A '.' on an empty line signals the end of the message.

For example:

comma@comx1:~$ mail [email protected]

Subject: Test email

This is a test email.

This is line 2.

.

Cc: [email protected]

6.3.4 Monitoring outgoing emailEach outgoing email attempt and the result of the delivery attempt is recorded in the sendmail log files. To view, from the command line, use one of the following commands:

less /var/log/mail.info (navigate through the log)

tail /var/log/mail.info (list the last few lines)

tail -f /var/log/mail.info (real-time monitoring)

6.4 Asterisk PBX software management

6.4.1 Accessing the Asterisk PBX consoleLog in using ssh as described in 6.1.2.2. From the console, type:

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 172

sudo asterisk -vvvr

'sudo' executes the command with root privileges.

'asterisk' launches the CLI (command line interface) for the PBX software subsystem.

'-vvvr' indicates three levels of verbosity (v) enabled, and remote console (r) access.

6.4.2 Stopping and restarting the Asterisk PBX softwareFor certain maintenance tasks it may be necessary to temporarily stop or restart the AsterisPBX software.

6.4.2.1 Restarting Asterisk

To restart the Asterisk PBX software:

sudo /etc/init.d/asterisk restart

6.4.2.2 Stopping Asterisk

To stop the Asterisk PBX software, waiting until there are no longer any active calls, but allowing new calls in the interim:

sudo asterisk -rx “stop when convenient”

To stop the Asterisk PBX software, waiting until there are no longer any active calls, without allowing new calls in the interim:

sudo asterisk -rx “stop gracefully”

To stop the Asterisk PBX software immediately:

sudo /etc/init.d/asterisk stop

6.4.2.3 Starting Asterisk

To start the Asterisk PBX software:

sudo /etc/init.d/asterisk start

6.4.2.4 Notify when no calls

In some situations you may want to wait until there are no calls on the sytem before performing some action. The script below will print the message “0 active channels” when no calls are active:

#!/bin/bash

while [ 1 -lt 2 ]; do

printf "."

sudo asterisk -rx "core show channels" | grep -x "0 active calls"

sleep 1

done

6.5 FreePBX accessThough we strongly recommend using the Com.X GUI for all configuration tasks, occasional advanced configuration might be required that necessitate the use of FreePBX.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 173

To access the FreePBX configuration GUI, point your browser at:

http://<ip-of-pbx>/freepbx

The login username is 'admin' and the password is the same as the password configured for the Com.X GUI.

6.6 Manually backing up and restoring the configurationThough we strongly recommend using the Com.X GUI for backup and restore, conditions may arise where the GUI is unavailable and a backup or restore is required to be manually executed. To do so:

sudo /usr/share/freepbx/modules/backup/bin/ampbackup.pl "backupname" yes yes yes yes no

The five flags indicate whether the following components should be backed up, listed in order from left to right as presented on the command line:

voicemail, system recordings, system configuration, CDR, operator panel

To confirm successful backup or to restore a backup manually, you can view the backups list on the FreePBX restore page:

http://<host>/freepbx/config.php?type=tool&display=backup&action=restore

Alternatively you can view the list of backups from the command shell:

sudo ls /var/lib/asterisk/backups

6.7 Setting the system's date, time and timezoneThe Com.X unit tries to obtain date and time from an NTP server on the internet. Failing this, or in the case where the date / time discrepancy on a unit is large, the date and time can be configured as follows:

1. Log into the system as described in 6.1.

2. If the system is unable to contact an internet NTP server to derive time from, date and time might be presented using UTC (GMT+0) which may not be desirable.

3. To reconfigure the system's timezone, issue the following command and select the correct settings:

sudo dpkg-reconfigure tzdata

4. Set the date / time using the 'sudo hwclock' command and the format “mm/dd/ccyy hh:mm:ss”

5. For example, to set the date to 10 Mar 2011 and the time to 18:12:

sudo hwclock --set --date="3/10/2011 18:12"

6. Propagate the hardware clock setting to the running operating system:

sudo hwclock --hctosys

7. Confirm that both the hardware clock and the operating system time matches:

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 174

sudo hwclock

sudo date

8. Ensure that the commamgr is logging using the correct time. Warning: this will disrupt service on all iTAs and analogue interfaces:

sudo /etc/init.d/commamgr restart

6.8 Video call support (H.263 and H.263+)The Com.X platform may be configured to support video calls. Care should be taken to evaluate potential performance impacts of video codec translation on the platform in question.

To enable video support:

Add the following to the [general] section of /etc/asterisk/sip.conf:

videosupport=yes

In /etc/asterisk/sip_additional.conf, on extensions supporting video, add h263 and h263p to the supported codec list.

Restart the PBX.

Ensure that all phones that take part in video calls have these codecs included in their codec list.

6.9 Recovering / resetting the Com.X comma user passwordWhile GRUB is loading, press escape and select recovery mode and select “Drop to the root shell prompt”.

If the system was booted from a USB disk, mount the hard drive as follows:

mount /dev/sda1 /mnt

chroot /mnt

Change the comma user password as below:

passwd comma

Enter the desired password.

reboot

6.10 Adding static routes to the networkIt may be desirable to add static routes for routing of specific subnets via specific gateways or over specific interfaces.

Applying networking changes from the Com.X GUI over-writes the /etc/network/interfaces file. Any changes made to this file may be lost after an apply.

Rather, static routes should be placed in /etc/network/if-up.d/static-routes. This script will be run when-ever an IP interface comes up. The

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 175

interface that triggered the script is available via the IFACE environment variable.

For example:

#!/bin/bash

if [ "$IFACE" == "eth0" ]; then

sudo ip route add x.x.x.x via y.y.y.y

fi

if [ "$IFACE" == "eth1" ]; then

sudo ip route add x.x.x.x/24 dev eth1

fi

Ensure the script is executable:

sudo chmod +x /etc/network/if-up.d/static-routes

Restart the interface or alternatively the Com.X:

sudo ifdown eth<N> && sudo ifup eth<N>

Note: It is not recommended to have more than one default route in the Com.X routing table.

6.11 Booting the Com.X in recovery mode

6.11.1 Booting in recovery modeUsing the serial console cable, while GRUB is loading, press escape and select recovery mode and select “Drop to the root shell prompt”.

From the root recovery shell, perform the necessary tasks, such as scanning and fixing hard drive problems, or resetting the comma user password.

Once completed, reboot the system, enter the BIOS and remove the USB drive from the boot priority list.

6.12 Third Party ModulesPlease note that Far South Networks does not actively support third party modules and installations.

Note: third party configurations and data may not be backed up by the Com.X backup utility.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 176

6.13 Telephone Management Systems (TMS)

6.13.1 MAN 3000

6.13.1.1 Installing MAN 3000 support

The Com.X supports logging of call records to a MAN 3000 buffer across ethernet.

To enable support for MAN 3000 on a Com.X unit, from the shell, install the MAN3000 support package:

sudo aptitude install commaman3000

For Man3000 releases prior to 11.02:

Install the TCPIP2MAN3000 software on the MAN3000 Windows platform from:

C:\Program files\Man3000\App Feature Installation\Install_TCPIP2MAN3000.exe

Run the TCPIP2MAN3000 software and configure it with the IP address of the Com.X PBX, using port 8989

For Man3000 releases post 11.02:

Activate the Man3000 TCP/IP configuration by enabling Soft Online Authentication, or your Man3000 USB software dongle:

Figure 93: Man3000 settings menu

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 177

Figure 94: Man3000 port settings

Configure the TCP/IP settings with the IP address of the Com.X PBX:

Figure 95: Man 3000 TCP/IP configuration

Installing the PBX templates:

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 178

Download the Far South Networks MAN3000 PBX format template from the Far South Networks website at http://farsouthnet.com/support/technical-notes/(right-click Save Target As, or Save Link As)

Alternatively, download the formats directly (using a downloader such as wget) from:

http://archive.farsouthnet.com/support/fsnInbound.PBX

http://archive.farsouthnet.com/support/fsnOutbound.PBX

Configure the MAN3000 software to use the Far South Networks Inbound PBX format for PABX format 1 and Outbound PBX format for PABX format 2:

Figure 96: Man3000 format settings

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 179

Figure 97: Importing a Man3000 format template

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 180

6.13.1.2 CDR format

Records are streamed to MAN 3000 in the following format:

Column: 1 2 3 4 5 6 7 8 9

Type / Line Type / Line Date Time Channel Source Destination Bill Account Code

Table 49: Man3000 CDR format column headers

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 181

Field Content

Type / Line In the first column, a value of 'I' indicates that the record is for an incoming call. Any other value indicates the line number as defined in /etc/commagui/man3000.patterns for an outgoing call, or 9 in case the channel for the outgoing call was not pattern matched.

Type / Line In the second column, a value of 'O' indicates that the record is for an outbound call or 9 as the line number for an incoming call.

This process cannot correctly cater for all conditions, since the specific configuration details of any given system is variable. The outbound pattern match requires the following conditions in order to match a call as outbound:

• The call context must be “from-internal”

• The destination may not be a local extension

• The destination may not include “Local”

• It may not be a follow-me call or internal transfer.

If any of these conditions are not met, the call is flagged as internal.

Configuring a line number pattern match as described in section 6.13.1.3 overrides the checks above and is the recommended way of ensuring that outbound calls are correctly classified.

Date The date of the start of call (including channel access / call setup / ringing) in the following format: ccyy/mm/dd

Time The time of the start of call (including channel access / call setup / ringing) in the following format: hh:mm:ss

Channel The channel from which the call originated in the inbound case or over which the call was placed in the outbound case. The values of this field will be pattern matched against the entries in /etc/commagui/man3000.patterns to determine the line number. If a match cannot be made, the line number is set to 9.

Source The originating number for the call. This can be the CID of the caller for an incoming call, or the CID (extension number) of the caller for an outgoing call.

Note: If the CID on the trunk used to place the outgoing call overrides the caller's CID (e.g. extension number), the trunk's override CID will be logged here.

Destination The destination number of the call in the outbound case, or the destination extension or service of the call in the inbound case.

Bill The billable duration of the call in seconds, excluding call setup

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 182

Field Content

(ring) time.

Account Code The account code assigned to the Com.X, FlexPath or extension (defaults to 0000).

Table 50: Man3000 CDR format field descriptions

Example CDR output:

9 I 2010/05/07 06:36:23 n/a 9905 *97 37 0000

9 I 2010/05/07 06:56:11 n/a 9906 *98 13 0000

9 I 2010/05/07 06:56:38 n/a 9906 *98 3 0000

9 I 2010/05/07 06:56:43 n/a 9906 *98 3 0000

2 I 2010/05/07 06:59:15 SIP/9905-00000e9 9902 9905 18 0000

9 I 2010/05/07 07:12:39 n/a 9930 *97 20 0000

2 I 2010/05/07 07:20:46 SIP/9905-00000e9 9906 9905 5 0000

2 I 2010/05/07 07:39:04 SIP/9901-00000e9 9921 9901 22 0000

O 3 2010/05/07 07:39:52 mISDN/1-u3809 01154XXXXX 01266YYYYY 26 0000

2 I 2010/05/07 07:40:23 SIP/9901-00000e9 9921 9901 12 0000

3 I 2010/05/07 07:42:08 mISDN/1-u3813 01154XXXXX 02159ZZZZZ 37 0000

3 I 2010/05/07 07:42:24 mISDN/2-u3818 01154XXXXX 01231AAAAA 25 0000

6.13.1.3 Defining outbound line numbers

By default all outbound calls will be labeled with line number 9 to indicate that the outbound line is unknown to the Com.X. One-digit line numbers (0-8) can be assigned to outbound channels for recognition in the MAN 3000 system.

This assignment is done by creating a /etc/commagui/man3000.patterns file in the Com.X file system. This file can be created on a separate system or laptop and copied onto the Com.X as follows:

scp man3000.patterns comma@<ip-of-com.x>:/etc/commagui/

The man3000.patterns file contains entries of the following format:

pattern=line

For example:

mISDN/=1

Zap/=2

SIP/hookd=3

Pattern matching matches the <pattern> if it is part of the outgoing call record channel field. If more than one entry matches, the last entry matched determines the line number. The same line number may be assigned to multiple patterns.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 183

6.13.1.4 Logging records from a specific date

The Com.X remembers the last record logged and will only log records once new records have become available. To configure the Com.X to start logging records again at some date in the past, modify the /var/lib/commaman3000/lastdate file located in the Com.X file system. This file can be created on a separate system or laptop and copied onto the Com.X as follows:

scp lastdate comma@<ip-of-com.x>:/var/lib/commaman3000/

The format of lastdate is as follows: ccyy/mm/dd hh:mm:ss

For example:

2010/05/04 10:15:34

In this example, all calls placed after 10:15 and 35 seconds on 4 May 2010 will be streamed to MAN3000.

6.13.2 Asterisk TMS systemsThe Com.X may support TMS systems that are compatible with Asterisk.

We strongly recommend installing third party TMS software on a separate machine, accessing the Com.X CDR files and database with read-only access.

Third party TMS systems have access to Com.X CDR records via one of the following tools:

• After installation of the commaman3000 package, CDRs are served on the port described in section 6.13.1.

• By default the commaman3000 server module will only output new CDR entries every 10 seconds. To disable this back-off and deliver data on every request, edit the file /usr/bin/commaman3000srv and remove the sleep 10 statement at the end of the file

• Downloading and parsing the Master.csv file (please see section 5.3.2)

• Accessing the CDR database (please see section 5.3.3)

6.13.3 P$X (PBillX) hotel management systemThe Com.X has been successfully tested and integrated with PBillX Inc's hotel management software suite. For installation instructions and contact details, please see PBillX Inc at http://www.pbillx.org

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 184

6.14 Setting up a streaming music serverThough setting up a streaming server is dependent on the software and hardware platform selected, we include an example configuration here that is compatible with Ubuntu linux, using the free GNU mp3 daemon for your convenience.

Download the GNU MP3 streamer from http://www.gnu.org/software/gnump3d/

The .tar.gz file can be downloaded from:

http://ftp.cc.uoc.gr/mirrors/nongnu.org/gnump3d/gnump3d-3.0.tar.gz

Alternatively download from:

http://archive.farsouthnet.com/support/tools/gnump3d-3.0.tar.gz

Extract the archive and install the software:

tar xvfz ../gnump3d-3.0.tar.gz

sudo make install

Configure the music location, port and other options by editing the following configuration file, then run the server:

sudo vi /etc/gnump3d/gnump3d.conf

sudo /usr/bin/gnump3d

Configure the music collection on the streaming server by pointing your browser to:

http://<ip>:<port>

Configure a streaming category as in section 4.8.1:

/usr/bin/mpg123 -q -s --mono -r 8000 -f 8192 -b 100 -@ http://<ip>:<port>/recurse.m3u

Warning: If the above application entry is incorrectly configured, applying might result in the apply freezing up. To fix this, restart the Com.X, correct the application entry, or remove the streaming music on hold category and apply.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 185

6.15 Microsoft Outlook integrationThe Com.X product range is compatible with Microsoft Outlook by means of the Outcall or asttapi plugins.

6.15.1 OutcallOutcall supports only SIP extensions, but in addition to making outbound calls also pops up contact details for incoming calls. Outcall has been tested with the Com.X using Outlook 2000 and Outlook 2007.

Download the Outcall installer from http://code.google.com/p/outcall/downloads/list

Install the application and configure as follows:

Tab Field Value

Server Server IP address of Com.X

Server Username AMI username, see below

Server Password AMI password, see below

Server Port 5038

Dialing Rules Outgoing context from-internal (or the flexpath context for class of service configurations)

Table 51: Outcall configuration

Figure 98: Outcall dialing rules configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 186

Figure 99: Outcall server configuration

Add the extension to be used for the PC running outlook. This must be a SIP extension:

Figure 100: Outcall extension configuration

Log in via the ssh shell onto the Com.X and create an AMI user account as follows in /etc/asterisk/manager.d/outcall.conf:

[testuser]

secret = fsntestuser

deny=0.0.0.0/0.0.0.0

permit=192.168.0.0/255.255.255.0

read = call,user

write = call,user

Restart the manager module:

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 187

sudo asterisk -rx "reload manager”

In Outlook, select the contact to call and select the “Outcall” button. When a call is received by the Com.X, the calling contact, or a new contact window should appear in Outlook.

Figure 101: Outlook contacts integration

6.15.2 asttapiasttapi allows dialing from both analogue and SIP extensions, but does not pop up contact details on incoming calls like Outcall.

Download and install the asttapi setup program from http://sourceforge.net/projects/asttapi/files/asttapi/

Select Start – Control panel – Phone and modem options

Select the Advanced tab and select 'Omnis TAPI Driver for Asterisk', then Configure

Figure 102: asttapi configuration

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 188

Field Value

Host IP address of Com.X

Port 5038

User AMI username, see below

Password AMI password, see below

User Channel The extension channel (e.g. SIP/8263 or Zap/8)

Line name The name of the line as displayed in Outlook (e.g. Far South Networks Com.X)

Context from-internal (or the flexpath context for class of service configurations)

Called ID The caller ID for the extension

Table 52: asttapi configuration

Apply the configuration. You may be required to restart Windows.

To place a call, right-click a contact and select “Call contact” and select “Dialing options”.

Figure 103: Calling a contact

Figure 104: Selecting Asterisk as dial option

Select the correct line name. You may have to scroll down the list if the line is not visible.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 189

6.16 fail2ban integrationCom.X systems are shipped with fail2ban installed and enabled.

fail2ban provides a comprehensive and flexible mechanism for preventing unauthorized access to Com.X systems. The fail2ban application acts as a security monitor and firewall manager, detecting multiple failed attempts to access a service (such as ssh or SIP) from the same IP address and then blocks the address for a configured period of time.

6.16.1 Configuration

The default configuration blocks the source IP address of 4 consecutive SSH access failures for 10 minutes and 10 consecutive SIP failures for 1 hour:

Note: Ensure that fail2ban is running by checking the Services screen under the Status tab.

6.17 ViBE

The ViBE application from Voipex addresses the common issue of limited ADSL upstream bandwidth. With many small offices relying on an ADSL line for both data and VOIP traffic, typically, the upstream link becomes a limiting factor in the number of simultaneous calls the network can support.

The audio stream of a typical VOIP call is only 8kbit/s, however the protocol and network overheads introduced during transmission can often exceed a further 34kbits/s bandwidth requirements.

The ViBE application creates a tunnel between two ViBE end points, significantly reducing protocol overheads on multiple packets and dynamically optimizing voice compresssion, resulting in a much higher permissible call density over a single ADSL link.

Where a typical upstream ADSL link of 256kbits/s can support a maximum of 6 simultaneous G729 VOIP calls, a ViBE-enabled line of the same bandwidth can support a maximum of approximately 28 similar simultaneous calls.

For further details on ViBE configuration and integration, please see the white paper located at :

http://farsouthnet.com/wp-content/uploads/2011/05/Runway-X-ViBE.pdf

Note: The White paper referenced above describes the integration of a “Runway” branded Com.X PBX with ViBE. The document is, however, relevant for Runway and Com.X products.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 190

6.18 Flash operator panel

6.18.1 Flash Operator Panel demo versionCom.X units featuring 1.2 software include a demo version of the Flash operator panel version 2 (FOP2), which shows graphically and dynamically the status of extensions, trunks and advanced features.

From the operator panel, calls can be answered, transferred, originated, recorded and ended, using simple clicks of a mouse.

The demo version of the Flash operator panel included as stock on Com.X products allows for up to 15 extensions, trunks, queues or parking lots. By default, the panel will show buttons for the first 15 such mechanisms configured, but not for any configured thereafter. Should the full version of the Flash operator panel be required, licenses can be purchased through Far South Networks.

6.18.2 FOP2 accessBy default, full access to the Flash operator panel is granted to only the user of the operator extension. This extension has access to the full suite of features on the flash operator panel, regular users have access to a limited operator panel, containing only some of the complete functionality.

Note: If no operator extension is configured, then the extension with the lowest numerical DID will be assigned as the default operator extension for FOP2 access.

6.18.3 Setting the operator extensionThe operator extension of the system is configured on the Com.X GUI, from “General Settings” page, found in the “advanced” menu. The operator extension will be permitted full access to the operator panel, whilst other extensions have limited, or no access.

Figure 105: An Operator extension can be manually configured.

6.18.4 Limiting Flash Operator Panel access to operator onlyOn the “General Settings” list on the “Setup” page of the GUI, the flash operator panel can be configured to allow (limited) access to users of all extensions, and full access to the operator user or to allow access only to the operator extension. Setting the “FOP only available to Operator” field to “true” will bar any other extensions from accessing the flash operator panel at all, whilst setting this field to “false” will allow full access to the operator user, and limited access to all other extensions. Select the desired setting and then “Review/Apply” to activate the changes.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 191

Figure 106: FOP access can be limited to the operator only, if required.

6.18.5 Accessing Flash operator panelThe flash operator panel is accessed by selecting the “Operator Panel” icon on the launch page of the GUI.

Figure 107: Select "Operator panel" to access the Flash operator panel

A log in page will be presented. Enter the extension number and the associated (voicemail) pin of that extension to gain access.

Figure 108: Login with an extension number and voicemail pin.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 192

6.18.6 Using FOP2Once logged in to the Flash operator panel, the extension of the logged in user will be displayed on the top left button, with the extension number in bold. Operator extensions will be presented with more functionality options than regular users, controlled by black button icons listed above the extensions. Hovering a cursor above an icon displays a brief description of the function triggered by the button.

Figure 109: Extension 1000 logged in. Notice the nine icons above the extensions each of which performs a function.

Trunks, parking lot slots and queues are shown also displayed on the Flash operator panel, and also offer visual indications of their busy state.

Figure 111: Trunks, queues and parking slots are also displayed. Notice the Sip Trunk has one active call, indicated by the orange colour and the external caller, 5000.

6.18.7 Generating internal phone callsTo generate a call, first select the target extension, click on it so that the outline becomes blue. Then click on the “dial” icon. Generating calls is a feature enabled for operator and regular Flash operator

©2010 – 2013 Far South Networks

Figure 110: Extension 2000 is logged in on this operator panel. Notice only four function buttons above the listed extensions.

Com.X Administrator Guide

Page 193

panel users.

Figure 112: Dialling extension 2000 from extension 1000. Notice the blue outline around extension 2000.

This first causes extension 1000 to ring, and upon a user answering, dials extension 2000 from extension 1000.

Figure 113: Notice the change of colour of extension 1000, as well as the incoming call from "1000" shown on extension 2000.

6.18.8 Answering CallsIncoming calls to other extensions can be answered through the Flash operator panel by simply clicking on the ringing extension (again, notice the blue outline) and then on the “Call Pickup” function button.

Figure 114: Picking up a call to extension 1003. Pushing the "Call Pickup" button will connect the caller to the extension of the FOP user.

The call pickup feature on the Flash operator panel is available to operator and regular FOP users.

6.18.9 Transferring callsA Flash operator panel user is able to transfer an active call in which they are involved, by selecting the target extension, while a call is active, and clicking on the “transfer” feature button.

Figure 115: The call between extension 1000 and external caller 5000 will be transferred to extension 1001.

A call can be transferred by operator and regular FOP users.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 194

The operator user is allowed further transfer capabilities with an option to transfer to a voicemail box. The operator can transfer a call between themselves and another party to the voicemail of any extension on which voicemail is enabled. To transfer to the voicemail of an extension, simply select the target extension (the voicemail box of which is going to receive the call) while a call is active and then click the “Transfer to mailbox” function button.

6.18.10 Listening to callsOperator users are able to listen in on calls in which they are not involved.

6.18.10.1 Listen

The listen feature allows the operator to listen in on a call in which they are not involved. To listen to call, select the local extension involved in the call (notice again, the blue outline) and then click the “Listen” feature button.

Figure 116: Select the active call, then click "Listen"

After clicking “Listen” the operators extension will ring, and on answer will play the audio of the selected call. The operator extension is muted and neither party of the call is informed of the operator listening.

6.18.10.2 Listen and Whisper

The listen and whisper feature allows the operator to listen in on a call in which they are not involved. Further,any audio from generated on the operator handset is audible only to the internal extension, and not to the external party. To listen and whisper, select the local extension involved in the call (notice again, the blue outline) and then click the “Listen and Whisper” feature button.

Figure 117: The Listen and whisper feature allows the operator to listen in on other calls, and talk to the local user on the call.

6.19 Nagios

The Nagios application provides an expandable and highly customisable platform for monitoring of system services and network health. Com.X units are shipped with a Nagios Core suite preconfigured to monitor the state of selected services and interfaces on the system.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 195

6.19.1 HostsNagios can be configured to monitor network and service status on mulitple hosts. The Nagios application on the Com.X system has the localhost defined as the only host, however more hosts can be defined and monitored, if required.

Please consult the Nagios Core administrator guide for more details: http://nagios.sourceforge.net/docs/nagioscore-3-en.pdf

6.19.2 Accessing NagiosThe Nagios login portal is presented on the landing page of the Com.X GUI.

Point your browser to the IP of your Com.X and select the “Monitor” icon.

Enter the default username (nagiosadmin) and password (admin).

6.19.3 ServicesThe installed Nagios Core package is preconfigured to monitor an assortment of sevices and features as listed in Table 196. To access feedback on all monitored services and click the Services button under the Current Status heading.

©2010 – 2013 Far South Networks

Figure 118: The landing page of the Com.X Gui.

Com.X Administrator Guide

Page 196

Service What is monitored?

BRI mISDN Port Status

Provides the status of each BRI mISDN port on the system. Including the link type (Point-to-point or point-to-mulitpoint), the network or terminal status of the port, as well as the status of the L1 and L2 links.

Current Load Offers a report of the current, medium and long term load averages of the system.

Current Users Monitors the number of users logged in to the system.

Disk Space Monitors the available disk space on the system and reports when free space becomes critically low.

Ethernet LAN Interfaces

Provides the status of each individual ethernet port on the system. Indicates whether the port is enabled (up or down) and whether or not a connection is active (running or not running).

Ethernet Vibe Interface

Pending Final Release.

Ethernet WAN Interface

Pending Final Release.

FXO ports The activity status of each FXO port is displayed individually. This allows reporting on unused ports to be disabled.

HTTP Pending final release!

PRI Spans Provides details on PRI Span status. If a PRI span is reporting a fault, Nagios informs the user of the fault and which span is reporting it.

SIP TRUNKS Indvidually lists each SIP trunk and its connection status.

SSH Pending final release!

Total Processes Indicates the total number of processes running on the system.

Table 53: Services and interfaces monitored by the Nagios application.

Services for which a warning is detected are highlighted in yellow, whilst services that are in error are highlighted in red.Healthy services feature a green highlight.

6.19.4 Disabling active Nagios Checks on a Service or PortReporting on individual FXO, mISDN and Ethernet ports, allows for the disabling of Nagios monitoring on unused ports. From the Services menu, click on the desire port or service.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 197

Figure 119: Options available for configuring Nagios monitoring on a port or a service.

Select “Disable active checks of this service” . This will prevent the Nagios application from monitoring the service or port. Thereafter, select “Submit passive check result for this service” and set the check result to “OK”. This will set the status to “OK” until such time as active checks are re-enabled and provide a different result.

6.19.5 Customised Monitoring and ReportingNagios offers an incredibly customisable platform. Scripts can be written to monitor any thing of interest, and added to the Nagios application.

Please see the Nagios wesite: www.nagios.com or click the “Documentation” link on the Nagios web GUI.

Illustration 3: The Documentation link provides a link to the documentation page of the nagios website.

©2010 – 2013 Far South Networks

Com.X Administrator Guide

Page 198

7 TroubleshootingPlease refer to the Com.X Troubleshooting Guide for trouble-shooting information. This guide can be accessed from http://farsouthnet.com/support/

©2010 – 2013 Far South Networks