Grandstream Networks, Inc. UCM6100 Asterisk Manager Interface (AMI) Guide
|
|
|
- Victor Heath
- 9 years ago
- Views:
Transcription
1 Grandstream Networks, Inc. UCM6100 Asterisk Manager Interface (AMI) Guide
2 Index Table of Contents INTRODUCTION CREATING NEW AMI USER CONFIGURING AMI PORTS ESTABLISHING CONNECTION AND USER AUTHENTICATION EXAMPLE Table of Figures Figure 1: Web UI->Internal Options->AMI... 4 Figure 2: Create New AMI User Dialog... 4 Figure 3: AMI User Created... 6 Figure 4: AMI Settings... 7 Figure 5: AMI Settings Dialog... 7 Figure 6: Telnet Settings in PuTTY... 9 Figure 7: Telnet Connection Using PuTTY Figure 8: Telnet Connection to AMI Using TCP Figure 9: Telnet Connection to AMI Using TLS Figure 10: User Authentication Successful Figure 11: AMI Command Example Figure 12: Example 1 Parked Call Status Figure 13: Example 2 Queue Status Figure 14: Example 3 Permission Denied After Query without Proper Privilege Figure 15: Example 4 Log Off Figure 16: Example 5 Authentication Failed UCM6100 Asterisk Manager Interface (AMI) Guide Page 1 of 14
3 Table of Tables Table 1: AMI User Privilege... 5 Table 2: AMI Settings Parameters... 8 This document is subject to change without notice. The latest electronic version of this document is available for download here: Reproduction or transmittal of the entire or any part, in any form or by any means, electronic or print, for any purpose without the express written permission of Grandstream Networks, Inc. is not permitted. UCM6100 Asterisk Manager Interface (AMI) Guide Page 2 of 14
4 INTRODUCTION Asterisk Manager Interface (AMI) allows a client program to connect to an Asterisk instance and issue commands or read events over a TCP/IP stream. This is particularly useful when the integrators try to track the state of a telephony client inside Asterisk. A simple key: value line-based protocol is utilized for communication between the connecting client and the Asterisk PBX. Lines are terminated by using CR/LF. In this document, we will use the term "packet" to describe a set of "key: value" lines that are terminated by an extra CR/LF. Some useful Asterisk Manager Interface information can be found in the following links: The UCM6100 provides restricted AMI access for users. In order to connect to Asterisk Manager Interface on UCM6100, please follow the steps below. 1. Create new AMI user. 2. Configure AMI ports for connection. 3. Establish connection and authenticate the user. This document introduces each step and necessary configurations in the following sections. Warning: Please do not enable AMI on the UCM6100 if it is placed on a public or untrusted network unless you have taken steps to protect the device from unauthorized access. It is crucial to understand that AMI access can allow AMI user to originate calls and the data exchanged via AMI is often very sensitive and private for your UCM6100 system. Please be cautious when enabling AMI access on the UCM6100 and restrict the permission granted to the AMI user. By using AMI on UCM6100 you agree you understand and acknowledge the risks associated with this. UCM6100 Asterisk Manager Interface (AMI) Guide Page 3 of 14
5 1. CREATING NEW AMI USER 1.1. Log in the UCM6100 web UI and navigate to PBX->Internal Options->AMI Click on Create New AMI User. Figure 1: Web UI->Internal Options->AMI 1.3. A new dialog Create New AMI User will be prompted. Figure 2: Create New AMI User Dialog 1.4. Configure the following parameters in the Create New AMI User dialog: UCM6100 Asterisk Manager Interface (AMI) Guide Page 4 of 14
6 Username Configure a name for new AMI user. The username needs to be at least 8 characters. For example, ucmamiuser1. Password Configure a password for this user to connect to AMI for authentication purpose. The password has the following requirement: - at least 6 characters - must contain numeric digit - at least one lowercase alphabet, or one uppercase alphabet, or one special character Permitted IP(s) Configure an IP address Access Control List (ACL) for addresses that should be allowed to authenticate as the AMI user. If not set, all IPs will be denied. The format is IP/subnet. For example, / Privilege Configure the privilege for the AMI user. Please see options and definitions in below table. Table 1: AMI User Privilege UCM6100 Asterisk Manager Interface (AMI) Guide Page 5 of 14
7 Privilege Option originate call cdr log agent CC DTMF AOC dialplan verbose reporting user test Definition It provides permission to originate new calls. It provides permission to access information about channels and ability to configure in a running channel. Read-only. This provides permission to obtain output of cdr-manager, if loaded. Read-only. This provides permission to obtain logging information. This provides permission to access call queue information and agents information. It also provides ability to add members to a call queue. Read-only. This provides permission to receive Call Completion events. Read-only. This provides permission to receive DTMF events. This provides permission to send Advice Of Charge messages and receive Advice Of Change events. Read-only. This provides permission to receive NewExten and VarSet events. Read-only. This provides permission to obtain verbose information. This provides ability to obtain system information. This provides permission to send and receive UserEvent. This provides ability to read TestEvent notifications sent to the Asterisk Test Suite. Please note this is only enabled when the TEST-FRAMEWORK complier flag is defined Click on Save and then Apply Changes. Figure 3: AMI User Created Now the AMI user is successfully created. After creating the AMI user, it can be edited by clicking on icon or deleted by clicking on icon. UCM6100 Asterisk Manager Interface (AMI) Guide Page 6 of 14
8 2. CONFIGURING AMI PORTS 2.1. In UCM6100 web UI->PBX->Internal Options->AMI page, click on AMI Settings. Figure 4: AMI Settings 2.2. A new dialog AMI Settings will be prompted. Figure 5: AMI Settings Dialog 2.3. Configure the following parameters in AMI Settings dialog. Users can connect AMI using TCP or UCM6100 Asterisk Manager Interface (AMI) Guide Page 7 of 14
9 TLS. If using TLS, please set TLS Enable to Yes. Table 2: AMI Settings Parameters Parameter AMI Port TLS Enable TLS Port TLS Bind Address TLS Private Key TLS Cert Definition Configures the port number to listen to for AMI connection. The default setting is Enables listening for AMI connections using TLS. The default setting is No. Configures the port to listen to for TLS-based AMI connection. The default setting is Configures the address to listen to for TLS-based AMI connections. The default setting is , which mean all addresses. Upload TLS private key for TLS-based AMI connection. The size of the key file must be under 2 MB. After uploading, the file will be automatically renamed to ami_private.pem. Upload the TLS cert for TLS-based AMI connection. It contains private key for the client and signed certificate for the server. The size of the certificate must be under 2MB. After uploading, the file will be automatically renamed to ami_certificate.pem Click on Save and then Apply Changes to save the AMI settings. UCM6100 Asterisk Manager Interface (AMI) Guide Page 8 of 14
10 3. ESTABLISHING CONNECTION AND USER AUTHENTICATION 3.1. To connect AMI using TCP, simply use Telnet to connect to UCM6100 s IP address with AMI port. If using command line, users can type in: telnet If using PuTTY, users might need change the Telnet setting Telnet Negotiation Mode to Passive first. Then initiate Telnet connection to AMI from Putty. Figure 6: Telnet Settings in PuTTY UCM6100 Asterisk Manager Interface (AMI) Guide Page 9 of 14
11 Figure 7: Telnet Connection Using PuTTY 3.2. After initiating connection, users shall see prompt like below, meaning connection is established. Figure 8: Telnet Connection to AMI Using TCP 3.3. To connect AMI using TLS, use the following format to connect the TLS port in command line: UCM6100 Asterisk Manager Interface (AMI) Guide Page 10 of 14
12 Figure 9: Telnet Connection to AMI Using TLS The IP address is the UCM6100 IP and 5039 is the TLS port After the connection is established, the system will wait for user s input. By default, if there is no input in 30 seconds, the system will disconnect automatically To log in and get authenticated, manually enter all the text below: action: login username: ucmamiuser1 secret: admin1234 Tap on ENTER and users should see response like below. Sometimes if there is no response after ENTER, please tap on ENTER again. Figure 10: User Authentication Successful 3.6. To view all executable AMI command, enter text below: action: listcommands Tap on ENTER. Users will see the following output. The highlighted command is corresponding to UCM6100 Asterisk Manager Interface (AMI) Guide Page 11 of 14
13 the options selected in Privilege setting. (Sometimes if there is no response after ENTER, please tap on ENTER again.) Figure 11: AMI Command Example UCM6100 Asterisk Manager Interface (AMI) Guide Page 12 of 14
14 4. EXAMPLE There are mainly 3 types of AMI packets: Action: packets sent by client to Asterisk to request to perform a particular action. There are a limited number of actions for the client to use and each of them is decided by the module in Asterisk server. Only one action can be performed each time and the action packet contains the action name and parameters. Response: response by Asterisk to the client action. Event: information about the events of Asterisk core or expansion modules. Here are some examples output. Example 1: Query the status of parked call Figure 12: Example 1 Parked Call Status Example 2: Query the status of queue Figure 13: Example 2 Queue Status UCM6100 Asterisk Manager Interface (AMI) Guide Page 13 of 14
15 Example 3: Execute the command exceeding the privileges Figure 14: Example 3 Permission Denied After Query without Proper Privilege Example 4: Log off and disconnect Figure 15: Example 4 Log Off Example 5: Log in authentication failure and disconnect. Figure 16: Example 5 Authentication Failed This document can be downloaded here: * Asterisk is a Registered Trademark of Digium, Inc. UCM6100 Asterisk Manager Interface (AMI) Guide Page 14 of 14
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Grandstream Networks, Inc. How To Interconnect Multiple UCM6510 IPPBX
Grandstream Networks, Inc. How To Interconnect Multiple UCM6510 IPPBX Index Table of Contents OVERVIEW... 2 CONNECT TWO UCM6510 USING PEER SIP TRUNK... 3 CREATE PEER SIP TRUNK FOR UCM6510... 3 CONFIGURE
Grandstream Networks, Inc. UCM6100 Series IP PBX Appliance CDR and REC API Guide
Grandstream Networks, Inc. UCM6100 Series IP PBX Appliance CDR and REC API Guide Index CDR REPORT... 3 CDR FILTER... 3 CDR REPORT DATA FIELDS... 4 CDR REPORT OPERATIONS... 5 CDR CSV FILE... 6 API CONFIGURATION...
Grandstream Networks, Inc.
Grandstream Networks, Inc. Interoperability Tutorial: Configuring UCM6100 Series with FreePBX Grandstream Networks, Inc. www.grandstream.com FreePBX is a Registered Trademark of Schmooze Com, Inc. Index
Grandstream Networks, Inc. UCM6510 Basic Configuration Guide
Grandstream Networks, Inc. UCM6510 Basic Configuration Guide Index Table of Contents OVERVIEW... 4 SETUP ENVIRONMENT... 5 QUICK INSTALLATION... 6 CONNECT UCM6510... 6 ACCESS UCM6510 WEB INTERFACE... 6
NetSupport DNA Configuration of Microsoft SQL Server Express
NetSupport DNA Configuration of Microsoft SQL Server Express Copyright 2016 NetSupport Ltd All rights reserved Configuration of Microsoft SQL Server Express and NetSupport DNA Installation Requirements
Avaya IP Office SIP Configuration Guide
Valcom Session Initiation Protocol (SIP) VIP devices are compatible with SIP-enabled versions of Avaya IP Office (5.0 and higher). The Valcom device is added to the IP Office system as a SIP Extension.
VoxStack GSM Gateway API. Version: 1.0.0. Author: Joe.Yung
VoxStack GSM Gateway API Version: 1.0.0 Author: Joe.Yung Change Notes Date Versions Description Author 2013.2.6 1.0.0 GSM Gateway Joe.Yung SMS API 1. Configuring AMI in VoxStack GSM Gateway. 1.1 How to
Contents. Introduction. Prerequisites. Requirements. Components Used
Contents Introduction Prerequisites Requirements Components Used Background Information Configure Step 1. Configure the Firepower User Agent for Single-Sign-On Step 2. Integrate the Firepower Management
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
PaymentNet Federal Card Solutions Cardholder FAQs
PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How
9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243054 Issue 1 Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation VPN Client User s Guide 9243054 Issue 1 Reproduction, transfer, distribution or storage of part or all of
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
NetSupport DNA Configuration of Microsoft SQL Server Express
NetSupport DNA Configuration of Microsoft SQL Server Express Configuration of Microsoft SQL Server Express and NetSupport DNA Installation Requirements If installing Microsoft SQL Server Express on Windows
Easy Setup Guide for the Sony Network Camera
-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer
CIMHT_006 How to Configure the Database Logger Proficy HMI/SCADA CIMPLICITY
CIMHT_006 How to Configure the Database Logger Proficy HMI/SCADA CIMPLICITY Outline The Proficy HMI/SCADA CIMPLICITY product has the ability to log point data to a Microsoft SQL Database. This data can
Gigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
JPMorgan Chase Treasury Workstation. Certification Setup Guide Version 2.0
EMENTS JPMorgan Chase Treasury Workstation Certification Setup Guide Version 2.0 December 2010 TABLE OF CONTENTS Introduction... 1 About this Guide... 1 When to Create the Certificates... 2 Getting Help...
Dashboard Admin Guide
MadCap Software Dashboard Admin Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
Parental Control Setup Guide
Parental Control Setup Guide This guide will show you how to setup parental controls on your Genexis router. The parental controls used in this guide are provided by OpenDNS. By using this you can either
HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0
Log server version 2.0 Contents 1 Setting up the log server for the appliance... 4 1.1 Registering the log server on the appliance... 4 1.2 Entering the Syslog server to the appliance... 6 2 Log server...
Outcall User Manual. 2003-2008 Bicom Systems
Outcall User Manual Part I 4 Outcall User Manual 1 Introduction OutCALL User Manual Part II 6 Outcall User Manual 2 Overview OutCALL application is designed for integration with MS Outlook giving users
VoIPon www.voipon.co.uk [email protected] Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299
VoiceGear/3CX Integration Guide Ver.0.1 Page 2 1. OVERVIEW... 3 1.1 SETTING UP 3CX PBX...4 1.2 SETTING UP VOICEGEAR GATEWAY...5 2. VOICEGEAR-3CX SIP INTEGRATION... 6 2.1 3CX CONFIGURATION...7 2.2 VOICEGEAR
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
Device LinkUP + Desktop LP Guide RDP
Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
MXview ToGo Quick Installation Guide
MXview ToGo Quick Installation Guide First Edition, July 2015 2015 Moxa Inc. All rights reserved. P/N: 18020000000C0 Overview MXview ToGo allows you to use your mobile devices to monitor network devices
Quick Installation Guide
Quick Installation Guide MegaPBX Version 2.1 Quick Installation Guide v2.1 www.allo.com 2 Table of Contents Initial Setup of MegaPBX... 4 Notification LEDs (On the Front Panel of the Gateway)... 5 Create
Tutorial: Using HortonWorks Sandbox 2.3 on Amazon Web Services
Tutorial: Using HortonWorks Sandbox 2.3 on Amazon Web Services Sayed Hadi Hashemi Last update: August 28, 2015 1 Overview Welcome Before diving into Cloud Applications, we need to set up the environment
1 Getting Started. Before you can connect to a network
1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote
WHMCS LUXCLOUD MODULE
èè WHMCS LUXCLOUD MODULE Update: 02.02.2015 Version 2.0 This information is only valid for partners who use the WHMCS module (v2.0 and higher). 1.1 General overview 1.2 Installing the plugin Go to your
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Network Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
Installing an Omnicast System Omnicast version 3.5
Installing an Omnicast System Omnicast version 3.5 INST-9001 Version 1.0 INST-9001 Page 1 Omnicast Install Table of Contents 1 PREAMBLE...3 1.1 DOCUMENT REVISIONS...3 1.2 OMNICAST OVERVIEW...3 1.3 SUPPORTED
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
User s Manual. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved.
Copyright 2010 Vantec Thermal Technologies. All Rights Reserved. User s Manual Package Contents: 1 NextStar FX Gigabit NAS Adapter x1 2 AC Adapter x1 3 Installation Guide x1 4 Rubber Feet x4 5 User s CD
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
802.1X Client Software
802.1X Client Software REV1.0.0 1910011339 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product
General Tips: Page 1 of 20. By Khaled Elshaer. www.bimcentre.com
Page 1 of 20 This article shows in details how to install Primavera P6 on SQL server 2012. The same concept should apply to any other versions. Installation is divided into 3 Sections. A. Installing SQL
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Lab 8.3.3b Configuring a Remote Router Using SSH
Lab 8.3.3b Configuring a Remote Router Using SSH Objectives Use SDM to configure a router to accept SSH connections. Configure SSH client software on a PC. Establish a connection to a Cisco ISR using SSH
StreamServe Persuasion SP5 Control Center
StreamServe Persuasion SP5 Control Center User Guide Rev C StreamServe Persuasion SP5 Control Center User Guide Rev C OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents
Grandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server
Grandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server Index Table of Contents OVERVIEW... 3 UCM6100 CONFIGURATION... 4 STEP 1: CREATE SIP PEER TRUNK... 4 STEP 2: CONFIGURE OUTBOUND
Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client
Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client 22/07/2014 Dear Friends, This mailer helps you in understanding and configuring PPTP VPN of Matrix NAVAN CNX200 with Windows
Contents. Welcome to the Priority Zoom System Version 17 for Windows. This document contains instructions for installing the system.
Welcome to the Priority Zoom System Version 17 for Windows. This document contains instructions for installing the system. Contents 1. Introduction... 2 2. Installing the Server... 2 3. Installing a Client...
Grandstream Networks, Inc.
Grandstream Networks, Inc. UCM6100 Basic Configuration Guide Grandstream Networks, Inc. www.grandstream.com TABLE OF CONTENTS OVERIEW... 4 SETUP GUIDE SCENARIO... 4 QUICK INSTALLATION... 5 Connecting the
Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x
Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1
FTP Server Configuration
FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,
Quick Connect. Overview. Client Instructions. LabTech
LabTech Quick Connect QUICK CONNECT 1 Overview... 1 Client Instructions... 1 Technician Instructions... 4 VNC... 5 RDP... 6 RAssist (Remote Assistance)... 8 IE (Internet Explorer browser)... 9 CMD... 10
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
Virtual Code Authentication User s Guide. June 25, 2015
Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other
ClicktoFax Service Usage Manual
ClicktoFax Service Usage Manual 1. Log in to Fax Service 2. Configure your account 3. Send a fax 4. Receive a fax/search for Faxes/View Faxes 5. Logout 6. Additional Support 1. Log into fax service: a.
If you examine a typical data exchange on the command connection between an FTP client and server, it would probably look something like this:
Overview The 1756-EWEB and 1768-EWEB modules implement an FTP server; this service allows users to upload custom pages to the device, as well as transfer files in a backup or restore operation. Many IT
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
SonicWALL Global Management System Configuration Guide Standard Edition
SonicWALL Global Management System Configuration Guide Standard Edition Version 2.3 Copyright Information 2002 SonicWALL, Inc. All rights reserved. Under copyright laws, this manual or the software described
NETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
TACACS+ Authentication
4 TACACS+ Authentication Contents Overview...................................................... 4-2 Terminology Used in TACACS Applications:........................ 4-3 General System Requirements....................................
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643)
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter Six Configuring Windows Server 2008 Web Services, Part 1 Objectives Create and configure Web
Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features
1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
How do I set up a branch office VPN tunnel with the Management Server?
Fireware How To VPN How do I set up a branch office VPN tunnel with the Management Server? Introduction Using the WatchGuard Management Server, you can make fully authenticated and encrypted IPSec tunnels
estos ECSTA for Panasonic 4.0.7.3683
4.0.7.3683 1 Introduction... 4 2 ECSTA Tapi for Panasonic... 6 2.1 Requirements... 6 2.2 Installation... 6 2.3 Driver Management... 7 2.4 Configure telephone system... 7 2.5 General Settings... 8 2.6 Line
Enterprise Server Setup Guide
Savance Phone: 248-478-2555 Fax: 248-478-3270 www.savanceenterprise.com 2014 Table of Contents Software Programs Needed 3 Create Folders 3 Install SQL Server 4 Configure SQL 13 Open Ports 22 Conclusion
EXTENDED FILE SYSTEM FOR F-SERIES PLC
EXTENDED FILE SYSTEM FOR F-SERIES PLC Before you begin, please download a sample I-TRiLOGI program that will be referred to throughout this manual from our website: http://www.tri-plc.com/trilogi/extendedfilesystem.zip
SonicWALL SSL VPN 3.5: Virtual Assist
SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following
Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook
Intel Active Management Technology with System Defense Feature Quick Start Guide
Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine
IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions
IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions Integrated SFTP server 2011 IBM Corporation The presentation gives an overview of integrated SFTP server feature IntegratedSFTPServer.ppt
JORAM 3.7 Administration & Monitoring Tool
JORAM 3.7 Administration & Monitoring Tool User Guide Author: Alexander Fedorowicz Date: October 26, 2003 Overview The JORAM Administration & Monitoring Tool (jamt) is a graphical user interface which
Remote Storage Area (RSA) Basics
Remote Storage Area (RSA) Basics Table of Contents Remote Storage Area Overview... 3 What is Remote Storage Area?... 3 Who has access to RSA?... 3 How much space is available?... 3 Basic RSA Use... 4 How
OfficeServ Link. User Guide. Version 2.1 June 2005
OfficeServ Link User Guide Version 2.1 June 2005 OfficeServ Link Version 2.1 User Guide This manual should be read before the installation and operation of the OfficeServ Link Software. COPYRIGHT This
Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)
Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:
Introduction to FileWave
Introduction to FileWave Modern Systems Management LeRoy Dennison Training & Certification Manager [email protected] Ben Byers Systems Engineer [email protected] What is FileWave? Since 1992, FileWave
Mass Announcement Service Operation
Mass Announcement Service Operation The Mass Announcement Service enables you to automate calling a typically large number of contacts, and playing them a pre-recorded announcement. For example, a weather
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
SNI Vulnerability Assessment Report
SI Vulnerability Assessment Report Generated sample report Automated Infrastructure Discovery and Analysis Scan period 2009-04-07 10:31-2009-04-07 11:27 umber of scanned hosts 12 umber of hosts requiring
APPLE PUSH NOTIFICATION IN EMC DOCUMENTUM MOBILE APPLICATION
White Paper R APPLE PUSH NOTIFICATION IN EMC R DOCUMENTUM MOBILE APPLICATION Abstract This white paper explains the Integration of Apple push notification service in EMC Documentum Mobile application.
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
Smart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations
Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation
MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA
All Information provided in this document and in the accompanying software is subject to change without notice and does not represent a commitment on the part of RamSoft. RamSoft assumes no responsibility
How to Program a Commander or Scout to Connect to Pilot Software
How to Program a Commander or Scout to Connect to Pilot Software Commander and Scout are monitoring and control products that can transfer physical environmental conditions and alarm sensor electrical
How to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes
How to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes Anonyproz provides a powerful and feature-packed customized open source OpenVPN GUI client. The latest GUI offers our subscribers
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Device Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
Integrating with IBM Tivoli TSOM
Integration Notes Integrating with IBM Tivoli TSOM The Cascade Profiler integrates with the IBM Tivoli Security Operations Manager (TSOM) through the use of SNMP traps. It has been tested with TSOM Version
Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved
Borderware Firewall Server Version 7.1 VPN Authentication Configuration Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview The BorderWare Firewall Server
