Tecom Co EG30WV Intelligent Gatway User Manual AH4021

Tecom Co Ltd Intelligent Gatway AH4021

Contents

Users manual 2

Administrative Guide Configuration
Click on Add to create a new Static Route. Enter the destination network address,
subnet mask, gateway AND/OR available WAN interface then click "Save Settings" to
add the entry to the routing table. (Figure 6-10-1, 6-10-2)
Figure 6-10-2. Advanced Setup – Route – Static Route – Add
6.4.3.2 RIP
To activate RIP for the device, select the 'Enabled' radio button for Global RIP Mode. To
configure an individual interface, select the desired RIP version and operation, followed
by placing a check in the 'Enabled' checkbox for the interface. Click the 'Apply' button to
save the configuration, and to start or stop RIP based on the Global RIP mode selected.
(Figure 6-11)
Figure 6-11. Advanced Setup – Route – RIP
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 37 of 107
Administrative Guide Configuration
6.4.4 NAT
It’s separated into three parts: Virtual Servers, Port Trigger, and DMZ.
6.4.4.1 Virtual Servers
Virtual Server allows you to direct incoming traffic from WAN side (identified by Protocol,
IP address and service port) to the internal server with private IP address on the LAN
side. The Internal port is required only if the external port needs to be converted to a
different port number used by the server on the LAN side. (Figure 6-12-1, Figure 6-12-2)
Figure 6-12-1. Advanced Setup – NAT – Virtual Servers
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 38 of 107
Administrative Guide Configuration
Figure 6-12-2. Advanced Setup – NAT – Virtual Servers – Add
6.4.4.2 Port Triggering
Some applications require that specific port(s) in the Router's firewall be opened for
access by the remote parties. Port Trigger dynamically opens up the 'Open Ports' in the
firewall when an application on the LAN initiates a TCP/UDP connection to a remote
party using the 'Triggering Ports'. The Router allows the remote party from the WAN
side to establish new connections back to the application on the LAN side using the
'Open Ports'. (Figure 6-13-1, 6-13-2)
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 39 of 107
Administrative Guide Configuration
Figure 6-13-1. Advanced Setup – NAT – Port Triggering
Figure 6-13-2. Advanced Setup – NAT – Port Triggering – Add
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 40 of 107
Administrative Guide Configuration
6.4.4.3 DMZ
The EUT will forward IP packets from the WAN that do not belong to any of the
applications configured in the Virtual Servers table to the DMZ host computer. (Figure 6-
14)
Figure 6-14. Advanced Setup – NAT – DMZ
6.4.5 Security
The configuration display only when WAN page’s security option is selected. It’s
separated into three parts: Incoming Filter, Output Filter, and Parental Control.
6.4.5.1 Incoming Filter
It allows the users to create a filter rule to identify incoming IP traffic by specifying a new
filter name and at least one condition. All of the specified conditions in this filter rule
must be satisfied for the rule to take effect. (Figure 6-15-1, Figure 6-15-2)
By default, all incoming IP traffic from the WAN will be blocked if it is not consistent with
the incoming filter rules. In fact, EUT has opened some necessary ports such as
web port, sip ports and rtp ports, to make sure that voice application can communicate
well.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 41 of 107
Administrative Guide Configuration
Figure 6-15-1. Advanced Setup – Security – Incoming IP Filtering
Figure 6-15-2. Advanced Setup – Security – Incoming IP Filtering – Add
6.4.5.2 Output Filter
It allows the users to create a filter rule to identify outgoing IP traffic by specifying a new
filter name and at least one condition. All of the specified conditions in this filter rule
must be satisfied for the rule to take effect. (Figure 6-16-1, Figure 6-16-2)
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 42 of 107
Administrative Guide Configuration
Figure 6-16-1. Advanced Setup – Security – Outgoing IP Filtering
Figure 6-16-2. Advanced Setup – Security – Outgoing IP Filtering – Add
6.4.5.3 Parental Control
It adds time restriction to a special LAN device connected to the Router. The 'Browser's
MAC Address' automatically displays the MAC address of the LAN device where the
browser is running. To restrict other LAN device, click the "Other MAC Address" button
and enter the MAC address of the other LAN device. (Figure 6-17-1, Figure 6-17-2)
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 43 of 107
Administrative Guide Configuration
Figure 6-17-1. Advanced Setup – Security –Parental Control
Figure 6-17-2. Advanced Setup – Security –Parental Control – Add
6.4.6 Quality of Service
It’s separated into two parts: Traffic Class, and Bandwidth Control.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 44 of 107
Administrative Guide Configuration
6.4.6.1 Traffic Class
Click on Add to create a class to identify the IP traffic by specifying at least one condition
below. If multiple conditions are specified, all of them should be satisfied to make sure
the rule will take effect. (Figure 6-18-1, Figure 6-18-2)
IP QoS is applied to the traffic from LAN to WAN; the traffic from WAN to LAN will not be
applied.
Enter the QoS class name for this policy. Define the priority for this policy, and the
priority will be used by the next bandwidth control setting. EUT will modify the IP
header with new IP Precedence and/or IP Type Of Service fields.
It’s a IP Layer QoS policy. At least (but not limited to) one condition must be configured.
Figure 6-18-1. Advanced Setup – Quality of Service – Traffic Class
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 45 of 107
Administrative Guide Configuration
Figure 6-18-2. Advanced Setup – Quality of Service – Traffic Class – Add
6.4.6.2 Bandwidth Control
This page allows you to control WAN port's upstream bandwidth according to your
settings (Figure 6-19). And it can ensure the highest priority IP packets' traffic firstly. By
default, all voice packets has been queued in the highest IP packets, and the others has
been queued in the normal IP packets if they have not been set in the priority field of the
traffic class rule.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 46 of 107
Administrative Guide Configuration
Figure 6-19. Advanced Setup – Quality of Service – Bandwidth Control
6.4.7 Dynamic DNS
The Dynamic DNS service allows you to alias a dynamic IP address to a static
hostname in any of the many domains, allowing your DSL router to be more easily
accessed from various locations on the Internet. (Figure 6-20-1, Figure 6-20-2)
Figure 6-20-1. Advanced Setup – Dynamic DNS
Figure 6-20-2. Advanced Setup – Dynamic DNS - Add
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 47 of 107
Administrative Guide Configuration
6.5 Wireless
This directory display only when wireless card is installed in your EUT board. Use
the Wireless screen to configure the EUT for wireless access. It is separated into 6
parts:
z Basic
z Security
z MAC Filter
z Wireless Bridge
z Advanced
z Station Info
The configurable items for each part would be described in the following.
6.5.1 Basic
The page (Figure 6-21) allows you to configure basic feature of the wireless LAN
interface. You can enable or disable the wireless LAN interface, hide the network from
active scans, set the wireless network name (also known as SSID) and restrict the
channel set based on country requirement.
Figure 6-21. Wireless – Basic
6.5.2 Security
The page allows you to configure security features of the wireless LAN interface. You
can set the network authorization method, select data encryption, specify whether a
network key is required to authenticate to this wireless network and specify the
encryption strength.
The following items will be configured in the page:
Network Authentication: Set the network Authentication method. 802.1X and WPA
require setting valid RADIUS parameters. WPA-PSK requires a valid WPA Pre-Shared
Key to be set. (Figure 6-22-1)
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 48 of 107
Administrative Guide Configuration
802.1X: As the IEEE standard for access control for wireless and wired LANs, 802.1x
provides a means of authentication and authorizing devices to attach to a LAN port.
This standard defines the Extensible Authentication Protocol (EAP), which uses a
central authentication server to authenticate each user on the network.
WPA/WPA2: The Wi-Fi Alliance put together WPA/WPA2 as a data encryption method
for 802.11 wireless LANs. WPA is an industry-supported, pre-standard version of
802.11i utilizing the Tempoal Key Integrity Protocol (TKIP), which fixes the problems
of WEP, including using dynamic keys.
WPA/WPA2 Pre-Shared Key: Set the WPA/WPA2 Pre-Shared Key (PSK).
WPA/WPA2 Group Rekey Interval: Set the WPA/WPA2 Group Rekey Interval in
seconds. Leave blank or set to zero to disable periodic re-keying.
Figure 6-22-1. Wireless – Security
Radius Server: Set the IP address of the RADIUS server to use for authentication and
dynamic key derivation.
RADIUS Server is responsible for receiving user connection requests, authenticating
the user, and then returning all of the configuration information necessary for the client
to deliver the server to the user.
Radius Port: Sets the UDP port number of the RADIUS server. The port number is
usually 1812 or 1645 and depends on the server.
Radius Key: Set the shared secret for the RADIUS connection.
WEP Encryption: Selecting Disabled disables WEP data encryption. Selecting
Enabled enables WEP data encryption and requires that a valid network key be set
and selected unless 802.1X is enabled.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 49 of 107
Administrative Guide Configuration
WEP, short for Wired Equivalent Privacy, is a protocol for wireless LANs or local area
networks. This WEP is defined in the 802.11 Standard. WEP is designed so security
levels are maintained at the same level as the wired LAN. WEP’s aim is to provide
security by encrypting data over radio waves. WEP protects data as it’s transmitted
from one end point to another. WEP is used at two lowest layers, the data link and
physical layer. WEP is designed to make up for the inherent security in wireless
transmission as compared to wired transmission.
Shared Key Authentication: Set whether shared key authentication is required to
associate. A valid network key must be set and selected if required. (Figure 6-22-2)
Figure 6-22-2. Wireless – Security – Encryption Keys
6.5.3 MAC Filter
Figure 6-23-1. Wireless – MAC Filter
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 50 of 107
Administrative Guide Configuration
This page allows users to Add/Remove hosts with the specified MAC addresses that
are able or unable to access the wireless network. When users decide to use Allow,
only the MAC addressed in the user-defined list can access the wireless network.
When users use Deny, only the user specified MAC addresses are unable to access
to wireless network. And if the Disable option is selected, all users will be able to
access to wireless network.
Note: The MAC addresses in the list would immediately take effect when Allow or
Deny is checked.
Figure 6-23-2. Wireless – MAC Filter – Allow/Deny
6.5.4 Wireless Bridge
It allows the users to configure wireless bridge features of the wireless LAN interface.
You can select Wireless Bridge (also known as Wireless Distribution System) to
disables access point functionality. Selecting Access Point enables access point
functionality. Wireless bridge functionality will still be available and wireless stations
will be able to associate to the AP. Select Disabled in Bridge restricts which disables
wireless bridge restriction. Any wireless bridge will be granted access. Selecting
Enabled or Enabled (Scan) enables wireless bridge restriction. Only those bridges
selected in Remote Bridges will be granted access.(Figure 6-24).
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 51 of 107
Administrative Guide Configuration
Figure 6-24. Wireless – Wireless Bridge
6.5.5 Advanced
It allows you to configure advanced features of the wireless LAN interface. You can
select a particular channel on which to operate, force the transmission rate to a
particular speed, set the fragmentation threshold, set the RTS threshold, set the wakeup
interval for clients in power-save mode, set the beacon interval for the access point, set
XPress mode and set whether short or long preambles are used
Channel: Select the appropriate channel from the list provided to correspond with your
network settings. All devices in your wireless network must use the same channel in
order to function correctly.
Rate: The default setting is Auto. The range is from 1 to 54Mbps. The rate of data
transmission should be set depending on the speed of your wireless network. You can
select from one transmission speed, or keep the default setting, Auto, to have the IAD
automatically use the fastest possible data rate.
Multicast Rate: The default setting is 54Mbps. The range is from 1 to 54Mbps. The
rate of data transmission should be set depending on the speed of your wireless
network. You can select from one transmission speed, or keep the default setting, to
have the IAD automatically use the fastest data rate for multicast packets.
Basic Rate: Select the basic rate that wireless clients must support.
Fragmentation Threshold: This value should remain at its default setting of 2346. The
range is 256~2346 bytes. It specifies the maximum size for a packet before data is
fragmented into multiple packets. If you experience a high packet error rate, you may
slightly increase the Fragmentation Threshold. Setting this value too low may result in
poor network performance. Only minor modifications of this value are recommended.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 52 of 107
Administrative Guide Configuration
Figure 6-25. Wireless – Advanced
RTS Threshold: This value should remain at its default setting of 2347. The range is
0~2347 bytes. Should you encounter inconsistent data flow, only minor modifications
are recommended. If a network packet is smaller than the packet RTS threshold size,
the RTS/CTS mechanism will not be enabled. The IAD sends Request of Send (RTS)
frames to a particular receiving station and negotiates the sending of a data frame.
After receiving an RTS, the wireless station responds with a Clear to Send (CTS)
frame to acknowledge the right to begin transmission.
DTIM Interval: The default value is 3. This value, between 1 and 255 milliseconds,
indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is
a countdown field informing clients of the next window for listening to broadcast and
multicast messages. When the router has buffered broadcast or multicast for
associated clients, it sends the next DTIM with a DTIM Interval value. Its clients hear
the beacons and awaken to receive the broadcast and multicast message.
Beacon Interval: The default value is 100. Enter a value between 1 and 65535
milliseconds. The Beacon Interval value indicates the frequency interval of the beacon.
A beacon is a packet broadcast by the router to synchronize the wireless network.
XPress™ Technology: Select to enable/disable this proprietary mode.
54g™ Mode: Select the mode to 54g Auto for the widest compatibility. Select the
mode to 54g Performance for the fastest performance among 54g certified equipment.
Set the mode to 54g LRS if you are experiencing difficulty with legacy 802.11b
equipment.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 53 of 107
Administrative Guide Configuration
54g protection: In Auto mode the IAD will use RTS/CTS to improve 802.11g
performance in mixed 802.11g/802.11b networks. Turn protection off to maximize
802.11g throughput under most conditions.
WMM (WiFi Multimedia): Select to enable/disable the support.(Figure 6-25)
6.5.6 Station Info
Authenticated wireless stations and their status will be shown here.(Figure 6-26)
Figure 6-26. Wireless – Station Info
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 54 of 107
Administrative Guide Configuration
6.6 Voice
Use the Voice screen to configure the EUT function related parameters. It allows
system administrator to configure the following topics:
z Phone
- Phone Extension
- Extension Linekey
z Trunk
- IP Trunk
- Trunk Group
- Answering Positions
- Call Restriction Table
- Call Routing Table
z System
- Numbering Plan
- Service Mode
- Transmission
- IG Dynamic Discovery
- IG Expansion Table
z Voice Mail
- General
- Extension
- Holiday
- Advanced
The configurable items for each part would be described in the following.
6.6.1 Phone
Use the phone extension screen to configure EUT’s phone extension authentication
and IP2007’s extension line key default setting.
6.6.1.1 Phone Extension
The EUT combines Proxy and Registrar servers in its application. The all phones
registered to the internal Registrar are set here. (Figure 6-27)
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 55 of 107
Administrative Guide Configuration
Figure 6-27. Voice – Phone – Phone Extension
SIP Authentication: It provides 24 IP phones registered.
Phone Number: The phone number is a station number. If it conflicts with the setting
in Numbering Plan, it fails to add or make the change. Its value range is limited by
Start Extension Number and End Extension Number settings in Numbering Plan
page.
Password: The user password of this phone. The length is up to 24 digits or
characters. It’s used for Digest Authentication.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 56 of 107
Administrative Guide Configuration
Day COS: The field assigns Class of Service for day mode operation. Acceptable
values are 0-7. At default, all extensions are unrestricted.
Night COS: The field assigns Class of Service for night mode operation. Acceptable
values are 0-7. At default, all extensions are unrestricted.
FXS Phone Start Number: It shows the FXS phone number. It’s programmed in
System – Numbering Plan.
Registration Configuration
Minimal Expire: the minimum refresh interval registrar time supported for these IP
phones managed by the Gateway Server.
SIP Port: The Gateway Server listens for requests on the SIP port. This port is used
for UDP application and 5060 is its recommended value.
6.6.1.2 Extension Linekey
This page allows you to configure the default settings for IP2007’s linekeys. While a
new-allocated IP2007 is registering to IG, IG will send these settings to the
phone.(Figure 6-28)
Figure 6-28. Voice – Phone – Extension Linekey
6.6.2 Trunk
Use the Trunk screen to configure the PSTN/IP Trunk function related parameters. It is
separated into 5 parts:
z IP Trunk
z Trunk Group
z Answering Positions
z Call Restriction Table
z Call Routing Table
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 57 of 107
Administrative Guide Configuration
6.6.2.1 IP Trunk
This page allows you to configure the proxy and registration server of IP Trunk, up to 8
lines of IP Trunk are supported. (Figure 6-29)
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 58 of 107
Administrative Guide Configuration
Figure 6-29. Voice – Trunk – IP Trunk
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 59 of 107
Administrative Guide Configuration
Subscriber Information
Trunk Number: The assigned phone number from Uplink Server.
Register Expires: how long the Gateway sends REGISTER to uplink registrar server.
It counts based on second.
Auth ID: The Account ID of registration to uplink server. It’s used for Digest
Authentication.
Auth Password: The Password of registration to uplink server. It’s used for Digest
Authentication.
SIP Proxy: the position of uplink registrar server. Digital IP address and domain
name are all supported.
SIP Proxy Port: SIP signal port of uplink registrar server.
Outbound Proxy: the address of uplink outbound proxy server. All sip request
packet will be sent to this server that will determine their next hops.
Outbound Proxy Port: SIP signal port of uplink outbound proxy server.
Local Port
Local SIP Port for IP Trunk: SIP control signal packet Port of IP Trunk Client.
Local RTP Port for IP Trunk: Real-Time Protocol packet Port of IP Trunk Client. It’s
the start RTP port address for these IP Trunks.
6.6.2.2 Trunk Group
This page allows you to configure the virtual Trunk Group, up to 4 Trunk Groups are
supported.(Figure 6-30)
Trunk Group & Label
This item allows you to assign physical Trunk to virtual Trunk Group. And you can
configure your personal string as incoming Caller ID number. For three PSTN lines
and eight IP lines you can choose from Group1 to Group 4.
Trunk Group Priority
This Item allows you to define 4 Trunk Group's interior priority. For four groups you
can choose IP first or PSTN first. This will take effect if call routing entry’s
destination has been set as Group choice.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 60 of 107
Administrative Guide Configuration
Figure 6-30. Voice – Trunk –Trunk Group
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 61 of 107
Administrative Guide Configuration
6.6.2.3 Answering Positions
Figure 6-31-1. Voice – Trunk – Answering Positions – AA(Yes)
Figure 6-31-2. Voice – Trunk – Answering Positions – AA(No)
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 62 of 107
Administrative Guide Configuration
This Item allows you to configure answering position for each Trunk line including PSTN
trunk and IP Trunk. You can choose Auto Attendant, or manual configure the target
phone number on Day/night basis.
Auto Attendant: Yes/No.
Day Answering Position: 6 extension numbers maximum
Night Answering Position: 6 extension numbers maximum
If choose Auto Attendant as Yes, an idle VAA will auto-answer this incoming trunk call.
You can continue your operation by following its indicative words. Otherwise some
extension will be called and ringing. If you pick up one of them, the other extensions will
stop ringing.(Figure 6-31)
6.6.2.4 Call Restriction Table
This page allows you to configure the call restriction table. If you choice YN in "Trunk
Access" option, it means that the entry is used in both trunk access and call routing judge.
Y means that it is only valid in trunk access judge, and N is vice versa. Only the caller's
COS priority is higher than the entry's COS value, the call is allowed.
From/To
The allowed intervals are made up of a From and To entry which establish a
numeric range. For example, an entry of “From 1700” , “To 1800” would include the
following range of numbers as the leading: 1700, 1701, 1702, …1799, 1800. Each
From/To entry can be from 1 to 13 digits long and may contain any digit 0-9, or X (X
representing any digit). The :From” entry must be less than or equal to the “To”
entry.
Trunk Access
EUT checks the field only when a call matches the associated allowed interval.
If the field is set to “Y”, the entry is valid when the trunk is accessed previously. If
the field is set to “N”, the trunk isn’t accessed previously. The trunk will be accessed
through Call Routing Table. If he option is set to “YN”, the entry is valid no matter
the trunk is accessed or not previously.
COS
The COS setting is defined by the allowed intervals. “Y” allows an extension with
the COS or higher priority to dial the number(s) specified in that range.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 63 of 107
Administrative Guide Configuration
Figure 6-32. Voice – Trunk – Call Restriction Table
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 64 of 107
Administrative Guide Configuration
6.6.2.5 Call Routing Table
Figure 6-33. Voice – Trunk – Call Routing Table
This page allows you to configure the call routing table. Each item will be a routing rule
for outgoing call. From/To define the number range, Min/Max define the match length,
Del/Insert can change the target number, Destination to define the outbound call
interface. You can click the buttons under the table to choose pages.
In the Destination field, the drop list includes a particular option: “IG Expansion”.
When selecting “IG Expansion”, the next field is a drop list, the drop list contains the
founded IG name which is maintained by the EUT, and you can select a suitable IG
name to route your calls (Figure 6-33).
6.6.3 System
Use the System screen to configure the System function related parameters. It is
separated into 4 parts:
z Numbering Plan
z Service Mode
z Transmission
z IG Dynamic Discovery
z IG Expansion Table
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 65 of 107
Administrative Guide Configuration
6.6.3.1 Numbering Plan
Figure 6-34. Voice – System – Numbering Plan
This page allows you to configure extension number range. You can also define some
special service numbers in the table.(Figure 6-33)
Start extension number: start phone number of system internal extension. All valid
extension number can’t be smaller than it.
End extension number: end phone number of system internal extension. All valid
extension number can’t be greater than it. If receiving an IP2007’s Plug & Play
request, IG will allocate the first unused number from this limited region.
Operator extension during day: system operator number. If dial Operator speed-
dial number, this extension will be called during day.
Operator extension during Night: system operator number. If dial Operator speed-
dial number, this extension will be called during night.
FXS Phone Number: It determines the FXS phone number.
Operator speed-dial number: If dial this number, the operator extension will be
called. Also it is limited on length 1 character.
Voice mail service number: If dial this number, internal user can enter IG’s vm
system and do some operations such as listening personal message.
Start PSTN Line number: IG provides 3 PSTN line at most. Every line has its own
internal alias number. You can dial these numbers directly to access PSTN trunks.
Start IP Trunk number: IG provide 8 IP Trunk line at most. Every line has also its
own internal alias number. You can dial these numbers directly to access IP Trunks.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 66 of 107
Administrative Guide Configuration
Start Trunk Group number: IG provides 4 trunk groups at most. If dialing trunk
group number, IG will choose the first idle line for caller automatically.
All Paging number: If dialing this number, all internal IP2007s will be paged.
Start Paging Group number: 3 paging groups are defined in IG. If dialing a Paging
Group number, the call will page to all internal IP2007s of the called paging group.
While pressing “Configuration” in “Start Paging Group number”, it shows Paging Group
Configuration screen (Figure 6-34).
Figure 6-35. Voice – System – Numbering Plan – Paging Group
6.6.3.2 Service Mode
This page allows you to configure the day/night service mode. You can also customize
the working time manually for each weekday.
If you choose Time Mode, it’s for the specified day of week. The time is entered in 24-
hour format. Valid entries are 00:00 to 23:59 in 1-minute increments.(Figure 6-35)
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 67 of 107
Administrative Guide Configuration
Figure 6-36. Voice – System – Service Mode
6.6.3.3 Transmission
This page allows you to configure the Audio, FXS, FXO settings. Click “Save Settings”
button to save the new configuration. Click “Cancel Changes” button you can cancel the
changes. (Figure 6-36)
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 68 of 107
Administrative Guide Configuration
Figure 6-37. Voice – System – Transmission
Audio: It is used to set many Audio-related options. It will be applied to the all FXS and
PSTN lines.
Country: It may be used to determine not only the Caller ID detection / transmission
method but also ring/tone cadence/frequency.
Voice Active Detection: Enable or Disable; VAD is a technique that detects the
absence of audio and conserved bandwidth by preventing the transmission of
“silence packets” over the network. Normally, this is set to On.
Packet Loss Concealment: Enable or Disable
Echo Cancellation Tail Length: Echo cancel time; 0 value disables Echo Canceller.
RTP Packet Size: 10/20/.../60 ms
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 69 of 107
Administrative Guide Configuration
Codec Priority: EUT can support different audio Codec (G711u, G711a, G723,
G729a) but only one is active at one time. You can choose “Preferred
Codec”, ”Secondary Codec”, ”Thirdly Codec” and ”Fourth Codec” properly.
FXS: It is used to set many FXS-related options.
Fax Support: The system supports FAX/modem tone detection with G.711 mode.
Call ID Method: The system provides the ability to detect the calling party
identification provided by PSTN lines. It also transmits the calling party identification
to POTS ports. There are four choices: NONE, DTMF_BR, DTMF_AR, FSK
Input Volume Gain: value range: -20 ~ 20. If the value increased 1, the actual
analog-voice will become louder 0.5dB. Otherwise the voice will become lower 0.5dB.
Output Volume Gain: value range: -20 ~ 20.
Inter-digit Timeout: Its range is from 0 to 30 seconds.
FXO: It is used to set many central office line options.
Input Volume Gain: value range: -20 ~ 20
Output Volume Gain: value range: -20 ~ 20
Call Abandon Time: For every PSTN/FXO call, system provides the facility to
monitor the call status. If the remote party hangs up, the ongoing call must be
terminated. The PSTN line monitor is done by the loop-break signal or busy tone.
The value range is: 100/200/…/1000 ms.
Ring Recognition Time: The timer determines the minimum ring duration
recognized as a valid incoming ring on a PSTN port. Shorter ring signals are ignored.
The timer range is 200ms to 60ms in 40ms increments.
Delay Ring Time: The timer is to allow the Central Office to send ICLID before the
call is answered. Once the timer expires, the programmed extensions will ring and
the ICLID number will be sent to the ringing extensions. The timer range is 3 to 6
seconds on 0.5 second increments.
6.6.3.4 IG Dynamic Discovery
This page allows you to configure IG dynamic discovery settings.(Figure 6-37)
IG Name: The name of IG. It will be referred for the other IGs.
Run Mode: The mode that IG is running. IG can run in Master Mode or Slave Mode.
Master Mode: When IG is running in master mode, it maintains an IG list table.
When the master found that some slave IG changes its name or IP address, it will
broadcast to all of other slave IGs in this list and let them update their own IG list
table.
Slave Mode: When IG is running in slave mode, the master IG IP address should be
configured. When its name or IP address changed, it will inform the master IG. And
then the master IG will let other IG know this change.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 70 of 107
Administrative Guide Configuration
Figure 6-38-1. Voice – System – IG Dynamic Discovery
6.6.3.5 IG Expansion Table
This page shows the all cooperated IGs. It can be got through IG Dynamic Discovery. It
also allows you to add the specified IG that our calls want to be routed into.
IG Host Name: The cooperated IG’s name.
IP Address: The cooperated IG’s IP address.
Sip Port: The cooperated IG’s SIP port.
COS: The cooperated IG’s Class of Service.
Valid: If setting “N”, it rejects the direct call from the cooperated IG.
Copy Right 2006 Tecom, Co. LTD. All rights reserved Page 71 of 107

Navigation menu