Application Note. Overview. ShoreTel VPN Concentrator and VPN Phone Deployment and Configuration Guide. ST AppNote (AN 10352) October, 2011
|
|
|
- Brice Clarke
- 10 years ago
- Views:
Transcription
1 Application Note ST AppNote (AN 10352) October, 2011 ShoreTel VPN Concentrator and VPN Phone Deployment and Configuration Guide Description: This application note provides detailed information on the network requirements and configuration settings for the proper deployment of the ShoreTel VPN Concentrator and its associated VPN phones. Environment: ShoreTel IP-PBX: Versions 8 12 ShoreTel VPN Concentrator 4500/5300: Firmware version and above ShoreTel Gb IP Phones: IP 230g, IP 560g, IP 565g and IP 655 Overview As more businesses are looking for ways to cut costs, one trend is to move workers out of leased office space and into the Small Office/Home Office (SOHO) environment. This trend is assisted by technologies such as virtual private networking (VPN) and Unified Communications (UC). Use of a ShoreTel VPN phone permits a person working in a SOHO environment to take advantage of a physical phone at their remote office location. The phone is truly an extension on the corporate ShoreTel system and grants all of the capabilities of the system to the remote user including features like transfer, conference, directory and UC functions such as voic and presence. Once properly setup, the VPN phone becomes an integral part of the home office environment.
2 Contents Overview... 1 Contents... 2 Architecture Overview... 3 Internet Voice Quality Considerations... 4 Configuration Steps... 5 HQ Network Topology and IP addressing... 5 First-time setup of the VPN Concentrator... 6 Configuration of the VPN Concentrator... 8 Stunnel IP Address Pool... 9 Stunnel Configuration Remote Site Topology Configure the VPN Phone Emergency (911) Calls Testing VoIP Call Quality Conclusion Additional Resources
3 Architecture Overview ShoreTel VPN Phone connected via the Internet through the Corporate Firewall to the ShoreTel VPN Concentrator 3
4 Internet Voice Quality Considerations The Internet possesses several challenges that, if left unaddressed, can severely interfere with voice quality. Bandwidth, Delay and Congestion ShoreTel, as with any IP Telephony solution, uses a stream of IP packets (a Real-Time Protocol, or RTP, media stream) to carry voice between two different endpoints. An IP-based stream of voice packets actually consumes a very small amount of bandwidth about kbps in each direction, depending on the codec being used. Most broadband Internet connections are rated at speeds well above what is required to adequately transport IP voice packets. For example, a typical Executive Suite environment may use a full T1 connection to the Internet and is often rated at ~1.5Mbps both up and down. A typical consumer-grade Cable Modem Internet connection might be rated at 5Mbps down and 2Mbps up. Fiber-to-the-Home connections (FTTH) are often rated at much higher speeds ranging from 5Mbps down/2mbps up to 150Mbps down/35mbps up. Since voice packets only require Kbps of bandwidth and typical Internet connections are commonly well over 1Mbps, voice problems are almost never about bandwidth; they are almost always about delay and packet loss. Voice problems are almost never about bandwidth; they are almost always about delay and packet loss. Delay and packet loss are most commonly caused by congestion. Congestion occurs when more packets arrive at a device s inbound interface than can be successfully transmitted outbound in a timely fashion. Packet loss and delay are the leading causes of poor voice quality in any IP telephony system. In order to guarantee excellent quality voice between two locations you need to be able to guarantee that packet loss and delay will be kept to a minimum. This is most commonly done by implementing prioritization mechanisms on each device that could potentially be a point of congestion. Private devices and WAN connections allow for such administrative Quality of Service (QoS) settings. Public devices and connections such as Internet-based VPNs do not. There are many effective methods for identifying and prioritizing voice packets as detailed in the ShoreTel Application Note AN Best Practice Recommendations for VLANs and QoS with ShoreTel. The key is that the network device where congestion is occurring must be able to be programmed to identify and prioritize the voice packets for transmission ahead of other packets. In order to do this you need some degree of administrative control over those devices. The simplest WAN networking environment might be in the form of a private, point-to-point leased line on which you connect routers that you own and administrate. You can implement any type of prioritization you choose and can guarantee perfect quality voice for every call no matter what other data is being transmitted. The most difficult case might be voice being transmitted from a home-based user to a corporate PBX over an oversubscribed, consumergrade, broadband Internet connection with no QoS or other Service Level Agreements (SLAs) from their ISP. 4
5 Configuration Steps The remainder of this document will prompt you through the following steps to help guide you in the proper setup and configuration of the ShoreTel VPN Concentrator. 1. Determine the best network topology at the Host (Corporate) site 2. Plan an IP address scheme to be utilized for the VPN Concentrator 3. Install and configure the VPN Concentrator 4. Program the VPN phone user s extension and privileges in the ShoreTel PBX system 5. Determine the best network topology at the Remote (Home/SOHO) site 6. Program the remote site s router to pass VPN traffic and provide traffic prioritization (if available) 7. Configure the VPN phone 8. Test the installation and VoIP call quality HQ Network Topology and IP addressing To secure, restrict or inhibit pass-through traffic to the VPN Concentrator, it must be deployed behind an enterprise firewall. Connect the WAN port of the VPN Concentrator to the DMZ network (or port) of the firewall. The Concentrator s WAN port should be assigned a private IP address (RFC 1918), or an appropriate IP address that can be used within the DMZ subnet. Note: The VPN Concentrator does not act as a firewall. It should never be placed directly on the Internet. It should always be placed behind the corporate firewall. See the Architecture Overview diagram above. Connect the LAN port of the VPN Concentrator to the internal LAN network using an IP address from the LAN s IP subnet. A valid pool of IP addresses from the corporate LAN's internal (private) IP subnet will be assigned to and used by the VPN Concentrator to assign IP addresses to the external VPN phones via a virtual PPP connection over the SSL VPN for each phone. An IP address pool on LAN-based IP addresses has to be preconfigured on the VPN Concentrator by the administrator so that a valid IP address can be assigned to each externallylocated VPN phone connected to the VPN Concentrator. Once positioned within the corporate firewall s DMZ and configured with a DMZ-based IP address (see below) you will need to create a port-forwarding rule on the corporate firewall. Select a valid public (routable) IP address that is routed to the external (public) interface of the firewall and create a port-forwarding rule to map any inbound traffic to that public IP on port 443 to be NATted to the IP address assigned to the ShoreTel VPN Concentrators WAN interface IP on port
6 The port forwarding rule should look similar to the following: External NATted to DMZ From To To External IP Any Firewall IP Public IP assigned to Firewall external interface DMZ IP IP Address of VPN Concentrator s WAN Interface on DMZ Port 443 Port 443 First-time setup of the VPN Concentrator Note: Please refer to the Initial Configuration section of the ShoreTel VPN Concentrator 4500/5300 Installation and Configuration Guide for additional detail. You configure the ShoreTel VPN Concentrator 4500 or 5300 using a web browser such as Internet Explorer or Firefox. The 4500/5300 is shipped with the pre-configured IP address of assigned to the LAN port. To connect to the 4500/5300, follow these steps: 1. Assign a static IP address of using a subnet mask of to the Ethernet interface of a computer that is connected to the LAN port of the concentrator 2. Launch a web browser on the PC and enter the following URL: 3. Press Return. The following login window should appear: 4. Enter the username root and the password default to log into the system 6
7 5. The System configuration page should appear 6. Select Network from the left-hand Configuration Menu 7. Perform the following steps in the LAN Interface Settings section: a. Set the IP Address to an IP address that can be reached from the corporate LAN network b. Set the proper Subnet Mask 8. Perform the following steps in the WAN Interface Settings section: a. Choose Static IP Address b. Set the IP Address to an IP address that is within the subnet of your firewall s DMZ. Note: The IP address can be a private IP address if desired c. Set the proper Subnet Mask 9. Perform the following steps in the Network Settings section: a. Set the Default Gateway to the upstream firewall s IP address on the DMZ b. Set the "Primary DNS Server" and "Secondary DNS Server" to the primary and secondary DNS servers, respectively 10. Click the Submit button to apply the above changes 11. Remove the Ethernet cable connecting the computer s Ethernet interface to the VPN Concentrator. Connect the LAN interface of the Concentrator to an Ethernet switch port on the internal Corporate LAN network 7
8 12. Re-IP address your PC to an appropriate IP address on the corporate LAN 13. Launch a web browser on any computer on the LAN network and enter the new LAN IP address of the 4500/5300. Press Return and log into the system as explained above 14. Start general configuring of the system Configuration of the VPN Concentrator The network deployment options of the ShoreTel VPN concentrator have several nonchangeable requirements: The ShoreTel VPN Concentrator does NOT have a built-in firewall. Therefore it MUST be deployed behind, and protected by, your corporate firewall, preferably in a DMZ. The ShoreTel VPN Concentrator is REQUIRED to have each interface (internal & external) on a different IP subnet. Therefore, you CANNOT configure both interfaces to be connected to the internal LAN s IP subnet. When behind a corporate firewall, deployment in a DMZ is a requirement. The following three authentication modes are supported on the VPN Concentrator: User name and password validation The SSL VPN client on the remote phone is expected to provide a username and password to be matched against either of the following databases: - Local database (default) A list of valid usernames and their associated passwords configured for the authentication in the local database on the VPN Concentrator itself, set by the administrator. - LDAP server database (optional) This option requires an external LDAP server, such as Microsoft Active Directory, containing the username and password information for authentication. LDAP needs to be enabled in the VPN Concentrator before this database can be used instead of the local database. MAC Address Whitelist Validation (optional) When enabled, a local database of MAC addresses is used to validate the MAC address of a remote VPN phone. If the MAC address of a remote VPN phone is not found in this database, the SSL VPN connection request is rejected. MAC Address Blacklist Rejection (optional) When enabled, a local database of MAC addresses is used to identify remote phones that should be denied access to the network. If the MAC address of a remote phone is found in this database, then the SSL VPN connection request is rejected. This option is useful to disable remote VPN phones for users, such as contractors, who are no longer employed by the company. 8
9 Stunnel IP Address Pool The Stunnel IP address pool specifies the specific IP addresses to be assigned to each external SSL VPN phone. The permissible format is to specify a valid IP address, or a range of IP addresses. For example: , or Overlapping IP Address ranges are not supported. The IP address ranges configured in the Stunnel IP address pool must not be used by any other device. Be sure that the IP address ranges added to the Stunnel IP address pool do not include any IP address used by any other device on the LAN, including the VPN Concentrator itself. It is important to remember that every incoming VPN phone session requires a unique IP Address to be assigned from the Stunnel IP address pool. If the number of addresses in the pool is not adequate, it imposes a limitation on the max simultaneous Stunnel connections, irrespective of the configured Max Clients parameter value. By default, this IP address pool list is empty. Newly added values in the Stunnel IP pool will not become effective until after the next restart of the Stunnel service on the VPN Concentrator. To restart the Stunnel service, choose the Stunnel submenu from the left-hand Configuration Menu. Click submit on this page to restart network services and the Stunnel service. Note: Restarting the Stunnel service will terminate all active SSL VPN sessions. Perform this during a designated maintenance window. 9
10 Important: The IP addresses in the Stunnel IP address pool must be part of the internal LAN subnet, and must not overlap with the pool used by any DHCP server(s) on the same internal LAN subnet. All IP addresses configured in the VPN Concentrator s address pool should be removed from any DHCP server(s) scopes on the internal LAN. Stunnel Configuration Select the Stunnel submenu from the left-hand Configuration Menu. Enter and edit the following parameters: 1. Stunnel Enable: Check this box to enable Stunnel on the ShoreTel VPN Concentrator 2. Stunnel Server IP Address: This must be same IP address as the VPN Concentrator s LAN interface. 3. Stunnel Server Port Number: Keep the default value of Enable Stunnel Server Timeout: Enable this option if you want to enable Stunnel session timeout. This will cause IP phones to be disconnected and reconnected from Stunnel session after a definable period of time. Network security policies and security bestpractices may require a VPN session timeout and re-authentication process to avoid network attacks. Check with the network administrator during deployment of the VPN Concentrator to determine if this setting should be enabled. 5. Stunnel Server Tunnel Timeout: If enabled in accordance with 4 (above), enter the desired Stunnel timeout value. The unit is in seconds. 6. Enable TCP No Delay: Leave this option enabled. When enabled (checked), the Stunnel server will send packets to remote clients without any delay, rather than combining packets to save overhead. This is important for voice traffic since it is very sensitive to delay. This parameter is enabled by default. 7. MAC Whitelist Validation: Select this option only if you want to enable Whitelist checking. Note: Only phone MAC addresses listed on the Whitelist will be allowed to establish Stunnel sessions. Other VPN phones will be blocked. 8. MAC Blacklist Validation: Select this option only if you want to enable Blacklist checking. All the blacklisted users MAC addresses in the Blacklist table will be blocked. Note: The Blacklist supersedes the Whitelist. If a phone s MAC is defined in the both the Whitelist and the Blacklist tables the phone will be blocked. 9. Max Clients: This value corresponds to your Stunnel Session user license. To check your license, click View license key under Registration Status on the System page. 10. Stunnel IP Pool: In the last section on the Stunnel page, you will see the Stunnel IP pool where you need to define the Stunnel IP pool range. This range corresponds to the 10
11 maximum number of clients. For example, if Max Client=20, the IP Pool range must have at least 20 IP addresses. To define the range, use the following format: and click ADD. Note: The Stunnel IP Pool range must include valid and unique IP addresses from the internal LAN. Verify that the Stunnel Server IP address is not in this range and that none of the IP addresses are in use or configured to be assigned by a DHCP server. Remote Site Topology Review the remote location s network to determine what other devices and associated traffic flows may exist on the SOHO network. As cited earlier, the most common problems are packet loss and delay due to congestion. It is important to understand whether the SOHO-based router provides a business-class level of capabilities. If a traffic flow prioritization setting is available on the SOHO router, set it to specify the packets from the ShoreTel VPN phone to be given priority over other, non-real-time traffic. Other methods to consider are cited in the Testing VoIP Call Quality section of this document. Configure the VPN Phone Follow this procedure to configure a VPN-enabled phone: 1. Connect the VPN-enabled phone to an Ethernet network that has access to the Internet. The phone boots up. Note: The Phone must be powered by a Power over Ethernet (PoE, 802.3af) port or by a local power injector (power brick). 2. At the password prompt enter the IP Phone password provided by your ShoreTel or network administrator. The default password is 1234 #. 3. The phone is now ready for you to enter the following configuration parameters: VALUE / MESSAGE OPTIONS COMMENT CLEAR ALL Press # for Yes and * for No YES/NO VALUES For first time configuration, select Yes DHCP ON/OFF ON IP ADDRESS This information will be automatically obtained via DHCP MASK This information will be automatically obtained via DHCP 11
12 GATEWAY This information will be automatically obtained via DHCP FTP IP Address Enter the internal (private) IP Address of the HQ Server MGC Leave blank. It will obtain this parameter automatically SNTP IP Address Enter the NTP Server s IP address 802.1Q TAGGING ON/OFF OFF VLAN ID N/A DNS Leave at the default of VPN GATEWAY Enter the public IP address used on the corporate firewall that is mapped to the VPN Concentrator s DMZ (WAN) interface VPN PORT Use the default of 443 (unless changed under the Stunnel page in ShoreTel VPN Concentrator GUI) VPN ON/OFF ON VPN USER ON/OFF ON The user will be prompted for their VPN Phone User ID PROMPT VPN PASSWORD PROMPT ETHERNET 1 ETHERNET 2 ON/OFF AUTO/FD/HD AUTO/FD/HD COUNTRY Leave at the default value LANGUAGE Leave at the default value SAVE CHANGES YES/NO Yes ON The user will be prompted for their VPN phone password ShoreTel recommends leaving this parameter at a default setting of Auto, unless your network environment requires modification. ShoreTel recommends leaving this parameter at a default setting of Auto, unless your network environment requires modification. After saving this configuration, the phone should reboot and the VPN Authentication Prompt should appear. Input the appropriate user information and your phone will successfully login. Gigabit Phones No special build or firmware of the ShoreTel system is needed in order to support VPN-based IP Phones. All versions of ShoreTel 8.1 and higher have native VPN phone support. All that is required is the ShoreTel VPN Concentrator and Concentrator licenses. Any ShoreTel IP phone with a built-in Gigabit (Gb)-speed Ethernet switch will automatically be upgraded with the firmware to support the VPN features when attached to a ShoreTel 8.1 or higher PBX. Only ShoreTel IP phones with internal Ethernet switches supporting Gb speeds have enough extra processing power to support the encryption used by the VPN process. Therefore, only those phones with Gb ports will contain the necessary firmware and configuration settings for supporting VPN use. The current line of ShoreTel IP Phone that support GB-speed, and therefore VPN use, are: IP 230g, IP 560g, IP 565g and IP
13 Emergency (911) Calls If ShoreTel VPN phones will be deployed at remote locations, emergency calls placed from these phones will be routed to the Public Safety Answering Point (PSAP) servicing the site that hosts the ShoreGear voice appliances that the VPN phones are connecting to. This is commonly the same site that the VPN concentrator is located at. Note: For complete details on proper emergency settings please see the ShoreTel documentation. For emergency (e.g. 911) calls, there are settings within the user s User Group which control what number gets sent to the PSAP as the Caller s Emergency Service ID, or CESID, number. When the VPN phone user places an emergency call: If Send Caller ID as CESID is checked, and a value has been entered in the user s Caller ID field, that information will be sent as the CESID on the outbound call to the PSAP Otherwise, if Send DID as CESID is checked, and a value has been entered in the user s DID field, that information will be sent as the CESID on the outbound call to the PSAP Otherwise, if a CESID has been set for the IP Phone Address Map used by the VPN IP phones, that information will be sent as the CESID on the outbound call to the PSAP Otherwise, if a CESID has been set for the site the phone is assigned to, that information will be sent as the CESID on the outbound call to the PSAP It is strongly recommended that, for VPN phone users who are located at a fixed location (such as a home-based worker), you work with your local trunk provider and PSAP to enter the user s actual location & address for each user s DID in the Public Safety Automatic Location Identification (PS-ALI) database that is used for display on the screens of dispatchers at the PSAP. By doing so, any emergency call placed by a VPN phone user will display the actual address of the caller on the screen of the dispatcher that fields the call at the PSAP. 13
14 Testing VoIP Call Quality Be sure that test calls are performed using several scenarios. If the remote user also uses a PC during their workday, be sure to make test calls while using the PC at the same time. Evaluate the call quality during various times and during various data traffic loads. In the event that call quality is not up to the expected level, consider the suggestions below. 1) Codec Selection Configure your IP Phone Address Map in the ShoreTel PBX to use the Teleworkers checkbox. Create an IP Phone address map that matches the Stunnel IP Pool Address range, assigned to the same site that hosts the VPN Concentrator. Check the Teleworker box to instruct all remote VPN phones to use the Inter-site Codec List thereby using a smaller, tighter codec. 2) The amount of traffic that is being sent by your computer when connected behind an IP/VPN phone and the ability of the IP Phone to prioritize outbound traffic Each ShoreTel IP Phone has a built-in, two-port Ethernet switch. Connecting your computer s Network Interface Card (NIC) into the IP Phone s Ethernet switch means that all traffic sent to and from your PC will pass through the IP phone. Each ShoreTel IP phone has a built-in QoS/prioritization mechanism so that all voice packets that are being sent out from the phone will always be queued ahead of any data packets that are being received from the PC for re- 14
15 transmission. This built-in QoS means that large amounts of outbound traffic from the PC will not affect the ability of the phone to transmit its voice packets to the LAN in a timely fashion. Consider placing your computer (or all computers) behind the IP phone. Doing so will ensure that your outbound voice traffic will be prioritized ahead of your outbound data traffic. 3) The amount of traffic being sent by other PCs on your cabled LAN The amount of traffic being sent and received by other devices on your Ethernet network will affect the total amount of traffic that is being sent to and from your shared Internet connection. Some consumer grade Ethernet switches are not able to re-transmit packets fast enough to keep up with heavy network usage. Consider using an Ethernet switch that is capable of near line-rate packet forwarding and is as close to non-blocking as possible to reduce the possibility of added delay or packet loss on a heavily trafficked LAN. 4) The amount of traffic being sent & received by Wi-Fi devices. Many consumer-grade, multi-function devices perform the task of router, wireless access point (WAP), firewall, and Ethernet switch all in one, single device. These devices must split their processing power between each of these multiple functions. Be careful not to use a device that can be overloaded by requests to do too many tasks as once. Consider using a business-grade, multi-function device with more processing power. Or consider splitting up the functions so that you have a dedicated device for each purpose: wireless access point, Ethernet switch, router, and dedicated firewall. 5) The ability of the Ethernet switch/router to identify and prioritize traffic Inbound traffic from the Internet, through the LAN to the IP Phone, passes through the Ethernet switch on your LAN. The Ethernet switch/router/firewall device needs to be able to receive large amounts of inbound traffic from the Internet and successfully re-transmit 100% of those packets towards the phone and connected PC without adding any delay or packet loss. Many consumer-grade firewall devices can identify different types of traffic in order to allow or disallow the traffic but do not have any mechanism to prioritize one type of traffic over another. Also, many firewall-oriented devices are built primarily to inspect and block traffic and may not be as capable, or as fast at forwarding, the allowed traffic. This can be especially true of consumer-grade firewalls. Some newer firewalls allow you to specify a single port, IP address, or MAC address on the internal LAN to be considered high priority. Sometimes this is called a Game port or Game Device and is intended to allow the prioritization of traffic from this real-time device over regular traffic. If your device has such a port, consider assigning the IP/MAC address of the VPN phone for this purpose. 15
16 Consider using a business-grade firewall that can inspect and forward traffic with minimal delay. Consider using a business-grade firewall that has the ability to prioritize voice traffic over other types of traffic. Consider using a business-grade firewall that has QoS tools to rate-shape and adjust transmission speeds of both inbound and outbound traffic. 6) The congestion and buffering capabilities of the Internet border device (e.g. cable or DSL modem) Often you are limited in the choice of edge routers/modem devices when connecting to a broadband Internet connection. This device can be a congestion point between the high speed LAN (100Mb+) and the relatively slow speed WAN (1-15 Mb). Therefore, any delay or packet loss introduced by this device often needs to be compensated for via other mechanisms. Consider upgrading your device to a newer, faster device that supports faster speeds, introduces less delay and has QoS features. 7) The Internet Service Provider s QoS, SLA, peering, and oversubscription characteristics If your Internet Service Provider (ISP) is heavily oversubscribed then you will experience greater congestion. If your ISP is peered to other upstream ISPs in a fashion that routes your corporate/vpn/voice traffic in a slower, more circuitous route, your packet latency will be longer. If your ISP does not offer any method of identifying and prioritizing your voice traffic then all your packets are at the mercy of their best effort queuing mechanisms. Consider using an ISP that is as minimally oversubscribed at their aggregation points as possible. Consider using an ISP whose Internet peering creates fewer hops to your corporate headquarters. Consider using a Tier 1 ISP that has better connection speeds, less oversubscription, less congestion and better peering than the mom and pop ISP (i.e. you get what you pay for ). Consider using an ISP that offers some degree of Service Level Agreements (SLAs) for classifying and prioritizing traffic. Be wary of so-called business-grade broadband connection as these are commonly only the same consumer services with more bandwidth. Remember: Bandwidth plays effectively no role in delivering high-quality voice. Remember: There is no way to guarantee quality voice over the Internet. These recommendations can help improve connection quality but cannot guarantee voice quality over the Internet. 16
17 Conclusion Successful VPN phone use depends upon a careful review of the deployment environment and business processes along with consideration of multiple network parameters. A review of network policies and practices implemented within the enterprise is also highly advised. Prior to configuration of the VPN Concentrator, discussions must take place with respect to IP address schemes, corporate firewall settings, traffic prioritization, and link utilization. Remote environments should also be reviewed and proper expectations set with the VPN phone user community. ShoreTel VPN phones and VPN Concentrators provide an option for those SOHO workers who desire a physical instrument at their remote location. Once setup and deployed, this solution makes it simple for remote workers to take advantage of the benefits and features of the ShoreTel IP phone system. Additional Resources KB11826 VPN Concentrator/Phone Configuration Guides AN10112 Optimizing the ShoreTel VPN Phone Solution AN10119 VPN Phone Solution: Configuration Examples ShoreTel VPN Concentrator 4500/5300 Installation & Configuration Guide Special thanks to Resilient Intelligent Networks, Argyle, TX for their assistance in testing and documenting this Application Note. Version Date Contributor Content 1.0 October, 2011 D. Cristofano Original App Note 17
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
Broadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
User Manual. Page 2 of 38
DSL1215FUN(L) Page 2 of 38 Contents About the Device...4 Minimum System Requirements...5 Package Contents...5 Device Overview...6 Front Panel...6 Side Panel...6 Back Panel...7 Hardware Setup Diagram...8
Chapter 1 Configuring Basic Connectivity
Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
Edgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Cisco Unified Communications 500 Series
Cisco Unified Communications 500 Series IP PBX Provisioning Guide Version 1.0 Last Update: 02/14/2011 Page 1 DISCLAIMER The attached document is provided as a basic guideline for setup and configuration
Voice Gateway with Router
Voice User Guide Model No. SPA3102 Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates
Edgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Installation of the On Site Server (OSS)
Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
V310 Support Note Version 1.0 November, 2011
1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
Chapter 1 Configuring Internet Connectivity
Chapter 1 Configuring Internet Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
Initial Access and Basic IPv4 Internet Configuration
Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
DSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
Skype Connect Getting Started Guide
A P P N O T E TPP-10251 Date : September 2010 Product: ShoreTel Ingate Skype System version: ShoreTel 10.x Skype Connect Getting Started Guide SIP Trunking allows the use of Session Initiation Protocol
Chapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
Firewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
ADSL MODEM. User Manual V1.0
ADSL MODEM User Manual V1.0 CONTENTS 1.OVERVIEW... 3 1.1 ABOUT ADSL... 3 1.2 ABOUT ADSL2/2+... 3 1.3 FEATURES... 3 2 SPECIFICATION... 4 2.1 INTERFACE INTRODUCTION... 4 2.1.1 INDICATOR AND INTERFACE...
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011
Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Solution Overview... 3 Network Topology... 4 Network Configuration...
IPitomy 1000 User Guide
IPitomy 1000 User Guide Table of Contents Introduction... 1 About the IPitomy 1000... 1 Benefits of VoIP Technology... 1 How This Guide Works... 2 Web-based System Setup... 2 The Installation Worksheet...
Best Practices: Pass-Through w/bypass (Bridge Mode)
Best Practices: Pass-Through w/bypass (Bridge Mode) EdgeXOS Deployment Scenario: Bridge Pass-Through This document is designed to provide an example as to how the EdgeXOS appliance is configured based
Linksys SPA2102 Router Configuration Guide
Linksys SPA2102 Router Configuration Guide Dear 8x8 Virtual Office Customer, This Linksys guide provides instructions on how to configure the Linksys SPA2102 as a router. You only need to configure your
Chapter 4 Customizing Your Network Settings
Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.
SOYO G668 VOIP IP PHONE USER MANUAL
SOYO G668 VOIP IP PHONE USER MANUAL Inglos Networks Industrial Global Solutions Teléfono: +1 (585) 217-9864, Fax: + 1 (585) 872-9627, Email: [email protected] Table of Content SAFETY INFORMATION... 1 INTRODUCTION...
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
ADTRAN 3120 / 3130 Internet Configuration Guide
AdTran Internet Configuration Guide v1.15 ADTRAN 3120 / 3130 Internet Configuration Guide 169 Saxony Road, Suite 212 Encinitas, CA 92024 Phone & Fax: (800) 477-1477 Table of Contents Introduction... 1
Optimum Business SIP Trunk Set-up Guide
Optimum Business SIP Trunk Set-up Guide For use with IP PBX only. SIPSetup 07.13 FOR USE WITH IP PBX ONLY Important: If your PBX is configured to use a PRI connection, do not use this guide. If you need
Business VoIP Solution Training 04/2009
Business VoIP Solution Training 04/2009 IP Phone Deployment Scenario 1 Company LAN All the IP Phones and PBX are within the same local area network, no firewall and NAT traversal issues IP PBX 2 IP Phone
How to Configure a DIR-120 Broadband Router
CONTENTS About This User s Guide...iv Before You Start...iv Installation Notes...v Installation Information...vi INTRODUCTION... 1 Router Description and Operation...1 Front Panel...3 Rear Panel...4 CONNECTING
Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking
Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking 2012 Advanced American Telephones. All Rights Reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property licensed
VoIP Network Configuration Guide
The owner friendly phone system for small business VoIP Network Configuration Guide Release 7.10 Copyright 2011 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiGuard, FortiCare, FortiManager,
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
Application Note. IP8000 Conference Phone Configuration Guide. Table of Contents. Overview. Requirements. ST-10010 October 25, 2007
Application Note ST-10010 October 25, 2007 IP8000 Conference Phone Configuration Guide This application note provides the details on adding the IP8000 conference phone to the ShoreTel IP phone system.
BROADBAND INTERNET ROUTER USER S MANUAL. Version 1.0. - Page 1 of 13 -
Version 1.0 - Page 1 of 13 - 10/100M Broadband Router GETTING TO KNOW 2 3 4 1 5 7 6 - Page 2 of 13 - LED Indicator S/N Indicator Function 1 Power LED (Green) LED lights up steadily indicate that the power
Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide
Fonality Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide Fonality Table of Contents 1. Overview 2. SIP Trunk Adaptor Set-up Instructions 3.
WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide
WEB CONFIGURATION Configuring and monitoring your VIP-101T from web browser The VIP-101T integrates a web-based graphical user interface that can cover most configurations and machine status monitoring.
Protecting the Home Network (Firewall)
Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection
Thank you for purchasing a Panasonic Pure IP-PBX. Please read this manual carefully before using this product and save this manual for future use.
IP Networking Guide Model No. Pure IP-PBX KX-NCP500 KX-NCP1000 Thank you for purchasing a Panasonic Pure IP-PBX. Please read this manual carefully before using this product and save this manual for future
Chapter 3 LAN Configuration
Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections
Overview. Introduction
Table of Contents Manual... 1 Overview... 3 Introduction... 3 Package Contents... 4 System Requirements... 4 Hardware Overview... 5 Rear Panel... 5 Front Pannel... 6 Features... 7 Configuration... 8 Log
FortiVoice. Version 7.00 VoIP Configuration Guide
FortiVoice Version 7.00 VoIP Configuration Guide FortiVoice Version 7.00 VoIP Configuration Guide Revision 2 14 October 2011 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and terms are subject
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
Technical Configuration Notes
MITEL SIPCoE Technical Configuration Notes Configure Inn-Phone SIP Phone for use with MCD SIP CoE NOTICE The information contained in this document is believed to be accurate in all respects but is not
BR-6104K / BR-6104KP Fast Ethernet Broadband Router User s Manual
BR-6104K / BR-6104KP Fast Ethernet Broadband Router User s Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 4 Back Panel...
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Quick Installation Guide
Quick Installation Guide PRI Gateway Version 2.4 Table of Contents Hardware Setup... 1 Accessing the WEB GUI... 2 Notification LEDs (On the Front Panel of the Gateway)... 3 Creating SIP Trunks... 4 Creating
Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide
Dramatically simplifying voice and data networking HOW-TO GUIDE Bundle Quick Start Guide 2 edgebox How-To Guide - Table of Contents Scope of the Quick-Start Guide...3 edgebox bundles...3
Internet and Intranet Calling with Polycom PVX 8.0.1
Internet and Intranet Calling with Polycom PVX 8.0.1 An Application Note Polycom PVX is an advanced conferencing software application that delivers Polycom's premium quality audio, video, and content sharing
Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
A Division of Cisco Systems, Inc. Broadband Router. with 2 Phone Ports. Voice Installation and Troubleshooting Guide RTP300. Model No.
A Division of Cisco Systems, Inc. Broadband Router with 2 Phone Ports Voice Installation and Troubleshooting Guide Model No. RTP300 Copyright and Trademarks Specifications are subject to change without
Building Networks For People. DIR-100 Ethernet Broadband Router User Manual
Building Networks For People DIR-100 Ethernet Broadband Router User Manual CONTENTS About This User s Guide... iii Before You Start... iii Installation Notes... iv Installation Information... v INTRODUCTION...1
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
P160S SIP Phone Quick User Guide
P160S SIP Phone Quick User Guide Version 2.2 TABLE OF CONTENTS 1.0 INTRODUCTION... 1 2.0 PACKAGE CONTENT... 1 3.0 LIST OF FIGURES... 2 4.0 SUMMARY OF KEY FUNCTIONS... 3 5.0 CONNECTING THE IP PHONE... 4
ADMINISTRATION GUIDE Cisco Small Business
ADMINISTRATION GUIDE Cisco Small Business SA500 Series Security Appliances Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries.
How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking
Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance
Wireless Broadband Router. Manual
Wireless Broadband Router Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 5 Back Panel... 5 Front Panel... 6 Setup
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring a Virtual Private Network (VPN) for Avaya IP Office using the Edgewater Networks EdgeMarc 4500 VoIP VPN Appliance - Issue 1.0
Broadband Router ESG-103. User s Guide
Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits
TELEPHONE MAN OF AMERICA. Earning Your Business Every Step of the Way!
TELEPHONE MAN OF AMERICA Earning Your Business Every Step of the Way! Specializing in Telecom Equipment of all Brands, Carrier Services, Technician Services, Maintenance Agreements & Purchasing Excess
How To Set Up A 9339 Voip Phone For The First Time
Interquartz 9339HS VoIP Phone Quick Start User Guide Rev 3a 1/16 9339HS VoIP Phone Quick Start Up Guide The 9339HS VoIP (Voice over Internet Protocol) Phone provides a cost-saving solution for small business/home
VoIP CONFIGURATION GUIDE FOR MULTI-LOCATION NETWORKS
VoIP CONFIGURATION GUIDE FOR MULTI-LOCATION NETWORKS INTRODUCTION About this guide This guide is designed to help you plan and configure a TalkSwitch multi-location network for Voice over IP (VoIP). NOTE:
Broadband Router ALL1294B
Broadband Router ALL1294B Broadband Internet Access 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...
VOIP NETWORK CONFIGURATION GUIDE RELEASE 6.10
TALKSWITCH DOCUMENTATION VOIP NETWORK CONFIGURATION GUIDE RELEASE 6.10 CT.TS005.002606 ANSWERS WITH INTELLIGENCE INTRODUCTION About this guide This guide will help you plan and configure a TalkSwitch system
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features
How To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online
1 IP PBX SD Card Slot FXO Ports PBX LAN port PBX WAN port FXO Ports LED, RED means online 2 Connect the IP PBX to Your LAN Internet PSTN Router Ethernet Switch FXO Ports 3 Access the PBX s WEB GUI The
Setup Reference guide for PBX to SBC interconnection
Setup Reference guide for PBX to SBC interconnection Method of connection by "LAN interface only" i.e. SBC is placed behind the Perimeter Router / Fire-wall. Panasonic PBX (KX-TDE, NCP series), Media5
Proscend 120. VDSL2 Router. User Manual. Version 0.01
Proscend 120 VDSL2 Router User Manual Version 0.01 Tables of Contents 1 INTRODUCTION... 3 1.1 FEATURES... 3 1.2 SPECIFICATION... 4 1.3 DEVICE REQUIREMENTS... 5 2 GETTING TO KNOW THE DEVICE... 6 2.1 PARTS
Configuration of the Intertex IX78 E-SBC with IP-PBXs and Telia SIP Trunking Services
2010-03-07 Configuration of the Intertex IX78 E-SBC with IP-PBXs and Telia SIP Trunking Services For the IX78 ADSL T8 GW2 model with Telia SIP-anslutning using Telia Bredband Företag or Telia ProLane Table
TL-R460 Cable/DSL Router
Cable/DSL Router Rev: 2.0.0 1910010471 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names
Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the configuration
NetComm V90 VoIP Phone Quick Start Guide Draft Release 0.1
NetComm V90 VoIP Phone Quick Start Guide Draft Release 0.1 Copyright NetComm Ltd Overview NetComm V90 SIP VoIP Phone User Guide Table of Contents Overview... 3 V90 VoIP Phone Specification...4 Shipping
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX NOTE: This is an advisory document to be used as an aid to resellers and IT staff looking to use the Edgewater 4550 in conjunction with
Appendix C Network Planning for Dual WAN Ports
Appendix C Network Planning for Dual WAN Ports This appendix describes the factors to consider when planning a network using a firewall that has dual WAN ports. This appendix contains the following sections:
Internet Telephony PBX System. IPX-300 Series. Quick Installation Guide
Internet Telephony PBX System IPX-300 Series Quick Installation Guide Overview PLANET IPX-300/IPX-300W IP PBX telephony systems ( IP PBX in the following term) are designed and optimized for the small
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
VOI-7000 VOI-7100 SIP IP Telephone
VOI-7000 VOI-7100 SIP IP Telephone User Manual 1 Ver 2.01-0609 Table of Contents 1. INTRODUCTIONS... 1 1.1. FEATURES... 1 1.2. PACKING CONTENTS... 2 1.3. LCD DISPLAY AND KEYPADS... 2 2. INSTALLATIONS &
V101 SIP VoIP Telephone Adaptor User Manual V1.1m
V101 SIP VoIP Telephone Adaptor User Manual V1.1m Quick Guide Step 1: Broadband (ADSL/Cable Modem) Connections for V101 A. Connect V101 LAN port to ADSL NAT Router as the following connection. B. Connect
Best Practice Recommendations for Implementing VLANs in a ShoreTel VoIP Environment with IP Phones
Application Note ST-0131 April 28, 2006 Best Practice Recommendations for Implementing VLANs in a ShoreTel VoIP Environment with IP Phones This application note discusses the use of LANs and DHCP scopes
LevelOne. User Manual. FBR-1430 VPN Broadband Router, 1W 4L V1.0
LevelOne FBR-1430 VPN Broadband Router, 1W 4L User Manual V1.0 Table of Contents CHAPTER 1 INTRODUCTION... 1 VPN BROADBAND ROUTER FEATURES... 1 Internet Access Features... 1 Advanced Internet Functions...
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
TW100-BRF114 Firewall Router. User's Guide. Cable/DSL Internet Access. 4-Port Switching Hub
TW100-BRF114 Firewall Router Cable/DSL Internet Access 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION...1 TW100-BRF114 Features...1 Package Contents...3 Physical Details...
Digium Switchvox AA65 PBX Configuration
Digium Switchvox SIP Trunking using Optimum Business SIP Trunk Adaptor and the Digium Switchvox AA65 IP-PBX v23695 Goal The purpose of this configuration guide is to describe the steps needed to configure
Savvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
Chapter 2 Preparing Your Network
Chapter 2 Preparing Your Network This document describes how to prepare your network to connect to the Internet through a router and how to verify the readiness of your broadband Internet service from
