VoIP FMS: A Comprehensive Voice over IP Fraud Management System. User / Developer Guide. Authors

Size: px
Start display at page:

Download "VoIP FMS: A Comprehensive Voice over IP Fraud Management System. User / Developer Guide. Authors"

Transcription

1 VoIP FMS: A Comprehensive Voice over IP Fraud Management System User / Developer Guide Authors Yacine Rebahi Roman Busse Mateusz Khalil Isabel Peters Simon Hohberg Tran Quang Thanh

2 Contents 1 Introduction Background Voice over IP (VoIP) Fraud in VoIP networks Call Data Records (CDRs) Geolocation XMPP VoIP FMS description User Guide Quick Start Menu Alarms Users Rules Installation Guide Requirements Installation Running SUNSHINE... 22

3 1 Introduction The current document is a reference guide for the VoIP Fraud Management System (VoIP FMS) that was developed in the context of the SUNSHINE project (where it was referred as CDR analysis ). This document can be seen as a user-guide as well as a reference for users and developers interested in contributing to this framework. 2 Background 2.1 Voice over IP (VoIP) VoIP is a set of technologies enabling voice calls to be carried over the Internet. Contrary to the traditional telephone system - the Public Switched Telephone Network (PSTN) -, the potential driving the use of the VoIP technology is not only the very low cost or free voice calls, but also its ability to converge with other technologies, in particular presence and instant messaging, which in turn will result in new services and applications. Voice-over-IP (VoIP) communication based on the Session Initiation Protocol (SIP) (RFC 3261) has evolved as de-facto standard for voice communication. SIP is an application-layer control protocol that allows users to create, modify, and terminate sessions with one or more participants. It can be used to create two-party, multiparty, or multicast sessions that include Internet telephone calls, multimedia distribution, and multimedia conferences. In SIP, a user is identified through a SIP-URI in the form of user@domain. This address can be resolved to a SIP proxy that is responsible for the user s domain. To identify the actual location of the user in terms of an IP address, the user needs to register his IP address at the SIP registrar responsible for his domain. Thereby, when inviting a user, the caller sends his invitation to the SIP proxy responsible for the user s domain, which checks in the registrar s database the location of the user and forwards the invitation to the callee. The callee can either accept or reject the invitation. The session initiation is then finalized by having the caller acknowledging the reception of the callee s answer. During this message exchange, the caller and callee exchange the addresses at which they would like to receive the media and what kind of media they can accept. After finishing the session establishment, the end systems can exchange data directly without the involvement of the SIP proxy. 2.2 Fraud in VoIP networks Different definitions of fraud are reflected in the literature. However, fraud can simply be seen as any activity that leads to the obtaining of financial advantage or causing of loss by implicit or explicit deception. In traditional telecommunication networks, fraud is already a threat depriving telecom operators from huge amounts of money every year. With the migration from circuit-switched networks to packet-switched networks, it is expected that the related situation will be worse due, partly, to the issues discussed earlier. Potential examples of fraud in VoIP environments include,

4 Abuse of the flat rate services. Such services are intended for personal use only, some subscribers offer this service to other people family and friends- as well resulting in high usage and high losses to the operator Some access control schemes of the VoIP protocols are still based on the MD5 hash technology which is not robust enough. This could lead to an identity theft The service usage does not match the subscription type. For instance, a customer can subscribe for a residential service which is usually cheaper than a business one and use it for business purposes. Another case is where the customer subscribes for the option that allows it to use its own PBX, and then use this PBX as a dialer for call center purposes. This severely affects the performance of the VoIP provider platform An offender could attack a VoIP telephone with IP methods and change the telephones settings to forward incoming calls to value added services the offender setup before. Each call to the victims telephone will result in costs for the value added service with a gain for the offender. 2.3 Call Data Records (CDRs) Every time a call is placed on a telecommunication network, descriptive information about the call is saved as a Call Data Record (CDR). The number of CDRs generated every day and stored is huge. In addition, at a minimum, each Call Data Record has to include the originating and terminating phone numbers, the date and time of the call and the duration of the call. The CDRs might also include some other kind of data which is not necessary but required for billing, for instance, the identifier of the telephone exchange writing the record, a sequence number identifying the record, the result of the call (whether it was answered, busy, etc), any fault condition encountered, and any facilities used during the call, such as call waiting. An example of CDRs made available by a VoIP provider include the fields: Time - start time of call -; SIP Response Code: 2xx, 3xx, 4xx, 5xx or 6xx; SIP Method: INVITE (mainly); User-name: From URI; To URI; To-Tag; From-Tag; User-Agent; Source IP; RPID: Remote Party ID; and Duration. 2.4 Geolocation In VoIP FMS, geolocation is also utilized to detect fraudulent activities. Here, the location information of the call is generated based on the IP address of the caller in combination with a geolocation database. Geolocation simply enables to determine where the service users are physically located based on their IP addresses as VoIP CDRs often include the IP address of the caller. For example: When the input IP address is , the output will be location number 57 (which belongs to Germany). The geolocation database, geolitecity from MaxMind 1, is used in our current implementation. Another important feature that MaxMind offers is the incorporation of open proxies detection. Often, fraudsters use such components to hide their identities and integrating mechanisms to detect such components reveals to be crucial. The location profile is implemented as follows: The first time the user starts using the service, the geolocation of the used IP address is determined and stored together with a timestamp. If over time another IP address was used by the caller, its corresponding geolocation information is not stored except if it differs from the previous one. In this case, a timestamp reflecting the last time the previous 1

5 location was seen is also stored. The location profile can be used in different ways. In fact, it is impossible for a subscriber to make calls from different places (e.g. different countries) in a short period of time. If this occurs, this means that the same account is being used by two different persons - which might be a fraud indicator. This suspicion is reinforced if one of the persons using the account is behind an open proxy. Also, based on the location profile, we calculate the distance between two consecutive calls made from different locations by using the Spherical law of cosines formula. The location profile can also be used by the rule based system to check whether the location change occurred in a country that is blacklisted which gives a stronger indicator of fraud. It can also be used as input data to more complex techniques such as NN-SOM. 2.5 XMPP The Extensible Messaging and Presence Protocol (XMPP) is a XML-based message-oriented communications protocol. This protocol was introduced in January 1999 with the name Jabber as an open technology for instant messaging and presence. As open, secure, extensible and real-time protocol, XMPP is being used by big companies such as Google, Apple, Skype, and MSN. There are many XMPP implementations. Openfire 2, a Java-based open source XMPP server, is selected in this project as the central component in our event-based system. Other open source XMPP client stacks are also integrated into other components such as Smack (Java), txmpp (C++), xmppy(python). 2.6 VoIP FMS description Our framework has a modular architecture. This permits the incorporation of additional detection, correlation, analysis, and notification tools. Some of the detection algorithms need to be scheduled over sufficiently large time intervals to be able to operate. The profiling-based technique is a particular case of such techniques. In contrast to this, a rule-based technique can be launched on demand. Indeed, the rule engine can be configured to apply a given rule to any new call (or CDR) that is made to suspected destinations. In addition to that, an alarm can be sent (in urgent cases) by or by another means to the fraud management expert. For these reasons, we decided to implement the CDR analysis framework in an event-based manner, i.e., the components communicate by generating and receiving notifications. An event reflects the occurrence of an item of interest to some of the system components, e.g., the arrival of a new CDR or the creation of a new rule. The event-based architecture is well suited for large scale distributed applications and provides easy integration of autonomous and heterogeneous components. The VoIP FMS is composed from the following components as shown in Figure 2, A fraud management interface. In brief, this interface will enable the administrator to configure the different components of the CDR analysis framework, visualize the detection results as well as the alarms. The Web interface is based on Django 3 which is a high level Python Web framework that encourages rapid development and clean, pragmatic design. The detection techniques and algorithms. The techniques include a rule-engine, call profiling, geolocation profiling, and Neural Networks Self Organizing Map (NN-SOM). The event-based system. The latter is the backbone that coordinates the tasks and links the different components together. This system is based on the XMPP protocol

6 Figure 1: CDR analysis architecture 3 User Guide In brief, the management interface will enable the administrator to configure the different components of the VoIP FMS framework, visualize the detection results as well as the alarms. The Web interface is based on Django 4 which is a high level Python Web framework that encourages rapid development and clean, pragmatic design. 3.1 Quick Start To start the Web interface, you can either run our script cd <sunshine_installation_folder_path> python run.py or you start Django manually using cd <sunshine_installation_folder_path> python manage.py runserver After successfully starting Django you can switch to a browser and open the Web page 4

7 We provide a simple password-protected single-user authentication mechanism. We strongly recommend employing a different authentication middleware. At least, make sure to change the default password (user: admin password: tran) in WharfWebinterface/wharf/views.py. Figure 2: Log-in menu 3.2 Menu The menu can be found on the webpage s left side, which contains the following menu entries: Alarms Users Rules (expandable) Neural Network Profiling

8 Figure 1: Menu 3.3 Alarms The first menu point is Alarms. On this site you will see all the alarms which satisfy the user defined filters. The filters specify an interval (start- and end-date), but optionally a user-id may be set, as well. The alarms are sorted and displayed regarding the date in an ascending order. If a user-id needs to be specified, the web interface supports the user with auto-completion. Upon selecting a user the alarm menu is reloaded. Displayed alarms may also be filtered in an additional step concerning their detection component, which may be the Rule System, NN-SOM or Call Profiling. It is possible to select alarms from multiple categories by simply using the <CTRL> Button.

9 Figure 2: Alarms Overview

10 3.4 Users In the users menu you can retrieve information about a certain user. The common workflow: 1. Specifying a User 2. Retrieve Information Specifying a user can be achieved using either the search formula or browsing all users. Figure 3: Specific User Selection

11 Figure 4: All Users View Retrieve information related to the user using the tabs, which are the following: General Information Call Profile Charts Used IP Addresses Location Profile Latest Alarms Tabs General Information In this tab some very basic information about the specified user are provided. Call Profile In this tab you can view all profiles the user has regarding a specific date. This date can be changed on the upper right side. A call profile consists of different types of calls, which are additionally grouped by the day time. If the actual value is an outlier the entry would be colored red, otherwise green. Each entry specifies: Name which consists of a type call and day time Mean of latest long call profile concerning the specified date Standard Deviation of latest call profile concerning the specified date

12 Actual is the value of the call profile concerning the specified date (for the time being, the profiling module is not open source) Figure 5: Call Profile

13 Charts The charts tab includes three different charts: Call types chart Number of calls on one day Durations These charts are created with jqplot, which is a plugin for JQuery. The charts base on all calls made by the specified user. Call Types: Relates different type calls with each other Figure 6: Pie Chart Number of calls on each day: On the x-axis there are all days and the y-axis specifies the number of calls. Series for different call types such as morning, afternoon, evening and night calls can be viewed. Figure 7: Series Chart Durations: On the x Axis there are the duration numbers; the y-axis specifies the amount of calls, which took the given duration.

14 Figure 8: Duration Series Used IP Addresses In the tab Used IP Addresses there is a table, which describes from where the user has made his calls, the number of calls made from this IP and geographic location information attached to the IP address. Figure 9: Used IP Addresses Example Location Profile The location profile view groups all successive user calls having the same location into one location profile entry. Two successive location profile entries describe two different locations, where information can be extracted, such as: Distance of the locations First Call in the location Next Call in a different location Time Elapse (time difference between First and Next Call)

15 Latest Alarms This tab shows the latest user s alarms. Figure 10: Location Profile Example Figure 11: Latest Alarms Example 3.5 Rules Rules can be created in order to detect fraud. After saving a rule, it will be applied to the CDRs and run by the rule system. Alarms will be raised if there are CDRs satisfying this rule. There are rules containing just a condition you can create. Or also rules that are more complicated and contain some counters. Generic Rule Interface More sophisticated rules can be created in this view by expert users. The user needs to write the rules by himself, nevertheless he is supported by an autocompletion and hint system. Besides that rule syntax validation is performed on the fly (valid syntax is expressed by the green background in the rule field, red otherwise).

16 In this expert mode, the user is able to specify a rule group, where multiple rules may correspond to the rule group. One rule group consists of at least one rule. Multiple rules aggregated to one rule group can be created by pressing the Add Rule button. Apply the Rule later creates a rule without actually executing the rule system immediately. The rule system periodically performs saved rules automatically. A Cluster is a set of entities violating the specified rule. Entities can be either Destination Country Source Country Source Id Create Cluster enables the user to create a cluster as described before. Where No Cluster means that no cluster is created. Apply Rule for Clusters applies the rule for a specific set of entities only. Clusters (cluster ids or cluster names) can be combined using AND / OR. Examples: using cluster ids: 1 AND 2 OR 3 using cluster names: ClusterA AND ClusterB OR ClusterC using both variant: ClusterA AND 3 OR ClusterC Existing Clusters can be displayed by pressing the View Clusters button.

17 Figure 12: Expert Mode Normal rule The Fig. 13 shows the first kind of rule. Type in your description of the rule and the alarm text you want to see if a fraud was detected. The condition contains: NOT (!) commas an option (the options can be duration, daily quarter etc. All the fields of the database table for the CDRs) operation (==,!=, >=, &&, etc) value and don't forget to close the comma.

18 You can add more conditions by clicking on Add more conditions and combine them with AND or OR. Example:!(daily_quarter==1) & (dst_ip== ) Than click on Submit. Figure 13: Normal rule

19 Counter rule with frequency 1 Click on Or create rule with counter. Figure 14: Rule with counters This kind of rule is a bit complicated. For example, you want an alarm to be raised if a user has made more than 20 premium calls in 2 weeks. You have to enter a counter name, the condition (is_pemium==1), a window size (in this case, 14 days, 0 hours, 0 minutes), the date before the Calls have been made, increase counter with 1 (the standard value), the max result number that is allowed in 14 days (in our case, 20), and the frequency of the event is 1 (could be 2. It will be explained in the next paragraph). Enter the description and the alarm text. Click on Show rules(s) to see how the rule looks like. Some parts of the rule are generated at the backend. 19

20 Counter rule with frequency 2 Figure 15: counter rule with frequency 2 Let's take the same example with the premium calls. Now you want to check whether there are more than 20 premium calls made by some user in 2 weeks, and this event happened more than twice in 2 Months. This means, in this period of time (60 days) the rule system found more than 20 premium calls in 2 weeks, and after that it found another 20 calls in 2 weeks. Both of the detections were within two months. Alarm will be raised because this is your rule. To create this kind of rule, just select Frequency of the event : 2. Enter a period of time for the second event and the result that is the limit of the counter. When you click on submit, you should see a message if the action was successful. Then you can follow the link to see all the rules you have created until now. Or navigate to menu Rules Show rules. 20

21 Show rules In the table of rules there is a button Deactivate or activate after each rule. Here you can activate or deactivate your rules, and remove them from the rule system. But the rule will still exist in the Database, in case you want to activate it again. Rule Structure The condition and the action are separated by a comma. Conditions can consist of multiple logical operators, as an or or an and, combining two sub-conditions. The grammar is left associative. The condition keywords are either columns of the calls table from the db or logical functions working on top of these column. The action can either be an other logical function (e.g. a counter) or an alarm text. It is also possible to define more than one (sub)- action for one condition by adding a space character after the first action followed by the second action. An alarm text can reference the calls values by having a $ followed by the column name of the call (a column of the calls table). Note that the implemented functions usable for conditions and actions differ. A Rule can consist of multiple sub-rules (sub-rules reference one rule-id in the db). Sub-rules will be evaluated sequentially. This means the sub-rules follow a fixed order (as can be seen in the second example and why it works). Usable functions can be seen in the gui (with examples) or in the rule-system token.py -> parser.py and operations.py within the rulesystem package rule_parser. Examples of rules In the following, we provide some examples of rules, that can be generated without the need of the gui and show the structure of the Rule-System-internaly used structure. Example 1: The first example is relatively simple and intends to have a first experience on how to create a rule. The following rule creates an alarm with the text The Call with id $id and user $src_id from ip $src_ip to $dst_ip is shorter or equal to two seconds., when the duration of a call is smaller than 2 seconds and the status is 200 (in SIP->OK). '(duration <=2 ) & (status == 200)', 'alarm(the Call with id $id and user $src_id from ip $src_ip to $dst_ip is shorter or equal to two seconds.)' Example 2: The second example shows a more complex rule and consists of 3 sub-rules. The following rule creates an alarm with the text Premium counter for $src_id is over 10, when a user creates more than ten premium number calls within 1hour (3600 seconds). is_premium &!have_counter( $src_id premium ), init_counter( $src_id premium 3600) is_premium == 1, count( $src_id premium 1 timestamp) get_counter( $src_id premium ) > 10 & (is_premium == 1), alarm( Premium counter for $src_id is over 10 ) del counter( src_id premium ) The structure can be explained as follows: the first sub-rule checks for and creates a counter variable for the src_id of the user, when none is present, having a sliding window size of 3600 seconds. The second sub-rule increments the counter by one. While the last subrule resets the counter by deleting it, after incrementing the counter 10 times (it will be new 21

22 created in the next occurrence of a premium call as the first sub-rule will re-match). To reduce the variable creation, a more efficient restart counter version is also available in the gui function selection. 4 Installation Guide 4.1 Requirements Before starting the installer, please make sure that the following software is installed: Python 2.7 Java JDK 6 or higher MySQL 5.0 or higher 4.2 Installation Note that the installation script needs to be started in administrator mode (sudo). The actual installation can be easily run using: cd <SUNSHINE_INSTALLATION_DIRECTORY> sudo python install.py -i For configuration purposes, please follow the installation procedure, where all necessary parameters are asked. 4.3 Running SUNSHINE After finishing the installation the SUNSHINE system can be run using: cd <SUNSHINE_INSTALLATION_DIRECTORY> python run.py 22

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Programming SIP Services University Infoline Service

Programming SIP Services University Infoline Service Programming SIP Services University Infoline Service Tatiana Kováčiková, Pavol Segeč Department of Information Networks University of Zilina Moyzesova 20, 010 26 SLOVAKIA Abstract: Internet telephony now

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration Hosted VoIP Phone System Admin Portal User Guide for Call Center Administration Contents Table of Figures... 4 1 About this Guide... 6 2 Accessing the Hosted VoIP Phone System Administration Portal...

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

Web Portal User Guide

Web Portal User Guide Web Portal User Guide Fusion Hosted Voice Web Portal User Guide, Revision 2, September 2013 NCTC North Central 872 Highway 52 Bypass E Lafayette, TN 37083 615-666-2151 www.nctc.com Fusion Hosted Voice

More information

Business Communicator for Android

Business Communicator for Android Business Communicator for Android Product Guide Release 9.3.0 Document Version 1 Copyright Notice Copyright 2012 BroadSoft, Inc. All rights reserved. Microsoft, MSN, Windows, and the Windows logo are registered

More information

LifeSize UVC Manager TM Deployment Guide

LifeSize UVC Manager TM Deployment Guide LifeSize UVC Manager TM Deployment Guide May 2014 LifeSize UVC Manager Deployment Guide 2 LifeSize UVC Manager Network administrators who use UVC Manager to manage video and voice communications systems

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

NCAS National Caller ID Authentication System

NCAS National Caller ID Authentication System NCAS National Caller ID Authentication System The National Telecom Security Border Controller OmniBud INC. 2003 2013 Dedicate to Internet Communication and Access Security NCAS Registration Module PSTN

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration Hosted VoIP Phone System Admin Portal User Guide for Call Center Administration Contents 1 About this Guide... 4 2 Accessing the Hosted VoIP Phone System Administration Portal... 5 3 Hosted VoIP Phone

More information

System Administrator Training Guide. Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger.

System Administrator Training Guide. Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger. System Administrator Training Guide Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger.com Contents Contents... 2 Before You Begin... 4 Overview... 4

More information

3rd Party VoIP Phone Setup Guide (Panasonic 500-550b)

3rd Party VoIP Phone Setup Guide (Panasonic 500-550b) 3rd Party VoIP Phone Setup Guide (Panasonic 500-550b) We are changing how we add 3rd party VoIP phones to accounts. Going forward, you can simply add a 3rd Party Softphone and use those credentials to

More information

Integrating a Hitachi IP5000 Wireless IP Phone

Integrating a Hitachi IP5000 Wireless IP Phone November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition

More information

Hosted VoIP Phone System. Desktop Toolbar User Guide

Hosted VoIP Phone System. Desktop Toolbar User Guide Hosted VoIP Phone System Desktop Toolbar User Guide Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installing the Telesystem Hosted VoIP Toolbar... 4 3 Accessing the Hosted VoIP Toolbar...

More information

Corporate Telephony Toolbar User Guide

Corporate Telephony Toolbar User Guide Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...

More information

A Comprehensive Framework for Detecting and Preventing VoIP Fraud and Misuse

A Comprehensive Framework for Detecting and Preventing VoIP Fraud and Misuse A Comprehensive Framework for Detecting and Preventing VoIP Fraud and Misuse Dirk Hoffstadt, Erwin Rathgeb Computer Networking Technology Group University of Duisburg-Essen Essen, Germany {dirk.hoffstadt,erwin.rathgeb}@iem.uni-due.de

More information

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide Pandora FMS 3.0 Quick User's Guide April 27th, 2009 1 Contents How to monitor a network computer/device?...3 Concepts...3 What's an agent?...3 What's a module?...3 Data transfer modes...3 What is an alert?...3

More information

About. IP Centrex App for ios Tablet. User Guide

About. IP Centrex App for ios Tablet. User Guide About IP Centrex App for ios Tablet User Guide December, 2015 1 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,

More information

Hosted VoIP Phone System. Admin Portal User Guide for. Enterprise Administrators

Hosted VoIP Phone System. Admin Portal User Guide for. Enterprise Administrators Hosted VoIP Phone System Admin Portal User Guide for Enterprise Administrators Contents Table of Figures... 3 1 About this Guide... 4 2 Accessing the Hosted VoIP Phone System Administration Portal... 5

More information

Telephony Toolbar Corporate. User Guide

Telephony Toolbar Corporate. User Guide Telephony Toolbar Corporate User Guide Release 7.1 March 2011 Table of Contents 1 About This Guide...7 1.1 Open Telephony Toolbar - Corporate... 7 1.2 First Time Login... 8 1.3 Subsequent Use... 11 2 Using

More information

Quick Installation Guide

Quick Installation Guide Quick Installation Guide MegaPBX Version 2.1 Quick Installation Guide v2.1 www.allo.com 2 Table of Contents Initial Setup of MegaPBX... 4 Notification LEDs (On the Front Panel of the Gateway)... 5 Create

More information

AT&T Voice DNA User Guide

AT&T Voice DNA User Guide AT&T Voice DNA User Guide Page 1 Table of Contents GET STARTED... 4 Log In... 5 About the User Dashboard... 9 Manage Personal Profile... 15 Manage Messages... 17 View and Use Call Logs... 22 Search the

More information

Mizu Callcenter Platform Tutorial

Mizu Callcenter Platform Tutorial Mizu Callcenter Platform Tutorial About This is a quick introduction for understanding the Mizu Callcenter platform. The Mizu Callcenter is based on the MizuManage with the addition of the following functionalities

More information

A Guide to Connecting to FreePBX

A Guide to Connecting to FreePBX A Guide to Connecting to FreePBX FreePBX is a basic web Graphical User Interface that manages Asterisk PBX. It includes many features available in other PBX systems such as voice mail, conference calling,

More information

Load testing with. WAPT Cloud. Quick Start Guide

Load testing with. WAPT Cloud. Quick Start Guide Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica

More information

GpsGate VehicleTracker

GpsGate VehicleTracker GpsGate VehicleTracker Application Manual Version: 2.0 Rev: 01 Table of Contents 1 Introduction...3 2 System Requirements...4 3 Device Management...4 3.1 Device Mapper...4 3.2 Channel Mapper...6 4 Account

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Online Control Panel User Guide. Document Version 1.0

Online Control Panel User Guide. Document Version 1.0 Online Control Panel User Guide Document Version 1.0 Table of Contents 1 About This Guide...8 2 Profile...9 2.1 Access Profile Menu... 9 2.2 Profile... 10 2.3 Addresses... 12 2.4 Passwords... 13 2.4.1

More information

Setting Up an AudioCodes MP-114

Setting Up an AudioCodes MP-114 Setting Up an AudioCodes MP-114 Gateway to Work With Comrex STAC VIP The setup of Gateway devices for use with IP devices such as STAC VIP is not for the meek. Here is a list of the settings required to

More information

The following is a list of the features available with the managed Intersoft IP Telephony Services.

The following is a list of the features available with the managed Intersoft IP Telephony Services. The following is a list of the features available with the managed Intersoft IP Telephony Services. Call Forwarding When you are not at your desk, be sure not to miss important calls. Forward call to another

More information

End User Setup and Handling

End User Setup and Handling on IM and Presence Service, page 1 Authorization Policy Setup On IM and Presence Service, page 1 Bulk Rename User Contact IDs, page 4 Bulk Export User Contact Lists, page 5 Bulk Export Non-Presence Contact

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

VoIPon www.voipon.co.uk [email protected] Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299

VoIPon www.voipon.co.uk sales@voipon.co.uk Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299 VoiceGear/3CX Integration Guide Ver.0.1 Page 2 1. OVERVIEW... 3 1.1 SETTING UP 3CX PBX...4 1.2 SETTING UP VOICEGEAR GATEWAY...5 2. VOICEGEAR-3CX SIP INTEGRATION... 6 2.1 3CX CONFIGURATION...7 2.2 VOICEGEAR

More information

3rd Party VoIP Phone Setup Guide (Panasonic UT113-123)

3rd Party VoIP Phone Setup Guide (Panasonic UT113-123) 3rd Party VoIP Phone Setup Guide (Panasonic UT113-123) We are changing how we add 3rd party VoIP phones to accounts. Going forward, you can simply add a 3rd Party Softphone and use those credentials to

More information

domovea remote access tebis

domovea remote access tebis domovea remote access tebis SUMMARY SUMMARY Page 1. INTRODUCTION... 2 1.1 PURPOSE OF THE DOCUMENT... 2 1.2 PRELIMINARIES... 2 2.... 3 2.1 CONNECTING TO THE DOMOVEA.COM PORTAL... 3 2.2 CREATING A PERSONAL

More information

This document is an application note for connecting the GS8 modular gateway with Zed-3 SE family IP PBX.

This document is an application note for connecting the GS8 modular gateway with Zed-3 SE family IP PBX. Zed-3 501 Valley Way Milpitas CA 95035 USA GS8 Modular Gateway Connecting to the SE Family IP PBX Voice: +1-408-587-9333 Fax: +1-408-586-9038 www.zed-3.com Application note, 96-90000-00, July 2008 This

More information

Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.

Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.0 Abstract These Application

More information

Grandstream Networks, Inc. UCM6510 Basic Configuration Guide

Grandstream Networks, Inc. UCM6510 Basic Configuration Guide Grandstream Networks, Inc. UCM6510 Basic Configuration Guide Index Table of Contents OVERVIEW... 4 SETUP ENVIRONMENT... 5 QUICK INSTALLATION... 6 CONNECT UCM6510... 6 ACCESS UCM6510 WEB INTERFACE... 6

More information

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs

More information

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3 SIP Proxy Server Administrator Installation and Configuration Guide V2.31b 09SIPXM.SY2.31b.EN3 DSG, DSG logo, InterPBX, InterServer, Blaze Series, VG5000, VG7000, IP590, IP580, IP500, IP510, InterConsole,

More information

Business Telephone User Guide

Business Telephone User Guide Business Telephone User Guide 1 Proud to provide Conway s Electric, Water, Cable, Internet and Telephone services. Welcome to Conway Corporation Business Telephone Service We take pride in providing superior

More information

FLX VoIP Registering with Avaya IP Office 500

FLX VoIP Registering with Avaya IP Office 500 FLX VoIP Registering with Avaya IP Office 500 Date: April 5 th, 2012 This technical note gives a detailed description on how to register a Revolabs FLX conference phone with Avaya IP Office 500 PBX. On

More information

Enswitch Administrator Guide

Enswitch Administrator Guide Enswitch Administrator Guide July 2012 Enswitch Administrator Guide 1 Contents 1 Introduction... 5 1.1 The Purpose of this Document...5 1.2 Features...5 1.3 Workflows...5 2 User Enrollment... 6 3 User

More information

MyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC

MyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC MyOra 3.0 SQL Tool for Oracle User Guide Jayam Systems, LLC Contents Features... 4 Connecting to the Database... 5 Login... 5 Login History... 6 Connection Indicator... 6 Closing the Connection... 7 SQL

More information

User guide: Managing your telephone account via the Kiosk

User guide: Managing your telephone account via the Kiosk User guide: Managing your telephone account via the Kiosk This document gives you an overview of how you can manage your telephone account in the Kiosk. The functions are available for Single, Family,

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

SyncSwitch Quick Start Guide For Making First Test Call V 2.1

SyncSwitch Quick Start Guide For Making First Test Call V 2.1 SyncSwitch Quick Start Guide For Making First Test Call V 2.1 This version is a revision of V. 2.0, some gramatical mistakes has been corrected on this version. There are no major changes between V.2.0

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

Webmail Instruction Guide

Webmail Instruction Guide Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with

More information

How to configure Linksys SPA 941 942 for VOIP Connections

How to configure Linksys SPA 941 942 for VOIP Connections How to configure Linksys SPA 941 942 for VOIP Connections Congratulations. Welcome to VOIP Connections family. 1.) Connect the phone properly. Make sure the phone is connected securely to your router or

More information

Quick Installation Guide

Quick Installation Guide Quick Installation Guide PRI Gateway Version 2.4 Table of Contents Hardware Setup... 1 Accessing the WEB GUI... 2 Notification LEDs (On the Front Panel of the Gateway)... 3 Creating SIP Trunks... 4 Creating

More information

PIKA µfirewall Cloud Management Guide

PIKA µfirewall Cloud Management Guide Version 1.0 April 2015 Introduction... 2 Installation... 2 Configuring the Unit... 10 Changing Parameters... 10 Adding Blacklists and White lists... 12 Upgrading Firmware... 15 Disclaimer... 18 Frequently

More information

Step 1: Checking Computer Network Settings:

Step 1: Checking Computer Network Settings: Configuring your 3G18WV for VOIP The following steps will take you through the process of setting up your VOIP connection. Step 1: Checking Computer Network Settings: You will need to connect your computer

More information

Jive Connects for Openfire

Jive Connects for Openfire Jive Connects for Openfire Contents Jive Connects for Openfire...2 System Requirements... 2 Setting Up Openfire Integration... 2 Configuring Openfire Integration...2 Viewing the Openfire Admin Console...3

More information

SAP BusinessObjects Financial Consolidation Web User Guide

SAP BusinessObjects Financial Consolidation Web User Guide SAP BusinessObjects Financial Consolidation Document Version: 10.0 Support Package 18 2016-02-19 SAP BusinessObjects Financial Consolidation Web User Guide Content 1 General user functions....12 1.1 To

More information

SIP Trunking using Optimum Business SIP Trunk Adaptor and the Cisco Call Manager Express Version 8.5

SIP Trunking using Optimum Business SIP Trunk Adaptor and the Cisco Call Manager Express Version 8.5 CISCO SIP Trunking using Optimum Business SIP Trunk Adaptor and the Cisco Call Manager Express Version 8.5 Goal The purpose of this configuration guide is to describe the steps needed to configure the

More information

ez Service Portal User Guide version 2.5.1

ez Service Portal User Guide version 2.5.1 ez Service Portal User Guide version 2.5.1 Revised June 18th 2015 1 Table of contents Introduction... 3 Conventions... 3 Contacting ez... 3 Copyright and trademarks... 3 Portal access... 4 Service Portal

More information

Sample Configuration for SIP Trunking between Avaya IP Office R8.0 and Cisco Unified Communications Manager 8.6.2 Issue 1.0

Sample Configuration for SIP Trunking between Avaya IP Office R8.0 and Cisco Unified Communications Manager 8.6.2 Issue 1.0 Avaya Solution & Interoperability Test Lab Sample Configuration for SIP Trunking between Avaya IP Office R8.0 and Cisco Unified Communications Manager 8.6.2 Issue 1.0 Abstract These Application Notes describe

More information

Opacus Outlook Addin v3.x User Guide

Opacus Outlook Addin v3.x User Guide Opacus Outlook Addin v3.x User Guide Connecting to your SugarCRM Instance Before you can use the plugin you must first configure it to communicate with your SugarCRM instance. In order to configure the

More information

BlackBerry Mobile Voice System. Version: 5.3. Administration Guide

BlackBerry Mobile Voice System. Version: 5.3. Administration Guide BlackBerry Mobile Voice System Version: 5.3 Administration Guide Published: 2013-06-27 SWD-20130627112233808 Contents 1 Overview...7 2 Preparing to manage BlackBerry MVS user accounts... 8 3 Managing user

More information

Using Avaya Flare Experience for Windows

Using Avaya Flare Experience for Windows Using Avaya Flare Experience for Windows Release 9.0 Issue 02.01 September 2013 Contents Chapter 1: About Flare Experience... 5 About Flare Experience... 5 Main window... 6 Button descriptions... 10 Chapter

More information

Welcome to XO WorkTime

Welcome to XO WorkTime Quick Start Guide End User s Quick Start Guide (for Smartphones) Welcome to XO WorkTime for IP Flex, IP Flex with VPN, Enterprise SIP, and SIP Services Go mobile with your office telephone numbers and

More information

Easy Manage Helpdesk Guide version 5.4

Easy Manage Helpdesk Guide version 5.4 Easy Manage Helpdesk Guide version 5.4 Restricted Rights Legend COPYRIGHT Copyright 2011 by EZManage B.V. All rights reserved. No part of this publication or software may be reproduced, transmitted, stored

More information

Grandstream Networks, Inc.

Grandstream Networks, Inc. Grandstream Networks, Inc. UCM6100 Basic Configuration Guide Grandstream Networks, Inc. www.grandstream.com TABLE OF CONTENTS OVERIEW... 4 SETUP GUIDE SCENARIO... 4 QUICK INSTALLATION... 5 Connecting the

More information

WorkTime UC Mobile Admin Guide

WorkTime UC Mobile Admin Guide WorkTime UC Mobile Admin Guide Release: 20.1.1 Android 20.1.2 ios Document Version 1.0 Table of Contents 1 About XO Hosted PBX UC Mobile Client...1 2 Use Cases...2 2.1 Placing Outbound Calls... 2 2.2 Receiving

More information

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook) MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE

More information

PORTA ONE. Porta Switch. Handbook: Unified Communications Maintenance Release 24. www.portaone.com

PORTA ONE. Porta Switch. Handbook: Unified Communications Maintenance Release 24. www.portaone.com PORTA ONE Porta Switch Handbook: Unified Communications Maintenance Release 24 www.portaone.com Porta Switch PortaSwitch Handbook: Unified Communications Copyright Notice & Disclaimers Copyright 2000-2012

More information

Foreword. 1 How to Login to Your Account 2 Activate Key. Remote Support Remote Access. Web Conference 4 Hosted Service. How to Write Filters

Foreword. 1 How to Login to Your Account 2 Activate Key. Remote Support Remote Access. Web Conference 4 Hosted Service. How to Write Filters Contents 2 Table of Contents Foreword 0 Part I 3... 1 How to Login to Your Account 3... 2 Activate Key 6... 3 Products 7... Remote Support 9... Remote Access 9... Live Chat 9... Web Conference 10... 4

More information

Monitoring MySQL database with Verax NMS

Monitoring MySQL database with Verax NMS Monitoring MySQL database with Verax NMS Table of contents Abstract... 3 1. Adding MySQL database to device inventory... 4 2. Adding sensors for MySQL database... 7 3. Adding performance counters for MySQL

More information

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header. Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments

More information

iview (v2.0) Administrator Guide Version 1.0

iview (v2.0) Administrator Guide Version 1.0 iview (v2.0) Administrator Guide Version 1.0 Updated 5/2/2008 Overview This administrator guide describes the processes and procedures for setting up, configuring, running and administering the iview Operator

More information

Motorola TEAM WSM - Cisco Unified Communications Manager Integration

Motorola TEAM WSM - Cisco Unified Communications Manager Integration Motorola TEAM WSM - Cisco Unified Communications Manager Integration Summary This setup covers the of the TEAM VoWLAN solution with a Cisco Unified Communications Manager 7.1.2. This integration will be

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Assistant Enterprise. User Guide. www.lumosnetworks.com 3-27-08

Assistant Enterprise. User Guide. www.lumosnetworks.com 3-27-08 Assistant Enterprise User Guide www.lumosnetworks.com 3-27-08 Assistant Enterprise (Toolbar) Guide Copyright Notice Trademarks Copyright 2007 BroadSoft, Inc. All rights reserved. Any technical documentation

More information

NF1Adv VOIP Setup Guide (for Generic VoIP Setup)

NF1Adv VOIP Setup Guide (for Generic VoIP Setup) NF1Adv VOIP Setup Guide (for Generic VoIP Setup) Configuring your NF1Adv for VOIP Service The following steps will take you through the process of setting up your VOIP connection. Step 1: Checking Computer

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip no: 188 Release Date: September 27, 2007 Region: GLOBAL Verifying IP Office SIP Trunk Operation IP Office back-to-back SIP Line testing IP Office Release 4.0 supports SIP trunking.

More information

Enterprise Toolbar User s Guide. Revised March 2015

Enterprise Toolbar User s Guide. Revised March 2015 Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

Using Spectralink IP-DECT Server 400 and 6500 with Cisco Unified Communication Manager, 3 rd party SIP

Using Spectralink IP-DECT Server 400 and 6500 with Cisco Unified Communication Manager, 3 rd party SIP Using Spectralink IP-DECT Server 400 and 6500 with Cisco Unified Communication Manager, 3 rd party SIP Technical Bulletin Page 1 Introduction This document provides introductory information on how to use

More information

X Series Application Note 43:

X Series Application Note 43: X Series Application Note 43: Using the Remote Viewing & Web Pages of the X - Series & GR Series Recorders The Remote Viewing function of the X-Series and GR Series Recorders provide the user with the

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Assets, Groups & Networks

Assets, Groups & Networks Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Elastix Server VoIP Intercom Setup Guide

Elastix Server VoIP Intercom Setup Guide The IP Endpoint Company Elastix Server VoIP Intercom Setup Guide CyberData Corporation 2555 Garden Road Monterey, CA 93940 T:831-373-2601 F: 831-373-4193 www.cyberdata.net 2 1.0 Setup Diagram Figure 1

More information

OpenTouch Conversation for Android Smartphone Release 2.1

OpenTouch Conversation for Android Smartphone Release 2.1 OpenTouch Conversation for Android Smartphone Release 2.1 OmniPCX Office Rich Communication Edition OpenTouch Business Edition OpenTouch Multimedia Services User guide 8AL90640USAB ed01 1514 1 README FIRST

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Whitepaper: Voice Call Notifications via VoIP and existing Dialogic Diva Boards

Whitepaper: Voice Call Notifications via VoIP and existing Dialogic Diva Boards Whitepaper: Voice Call Notifications via VoIP and existing Dialogic Diva Boards derdack gmbh. all rights reserved. this document is for information only. derdack gmbh makes no warranties, express or implied,

More information

OmniTouch 8400 Instant Communications Suite. My Instant Communicator Desktop User guide. Release 6.7

OmniTouch 8400 Instant Communications Suite. My Instant Communicator Desktop User guide. Release 6.7 OmniTouch 8400 Instant Communications Suite My Instant Communicator Desktop User guide Release 6.7 8AL 90219 USAE ed01 Sept 2012 Table of content MY INSTANT COMMUNICATOR FOR THE PERSONAL COMPUTER... 3

More information

NF3ADV VoIP Setup Guide (for TPG)

NF3ADV VoIP Setup Guide (for TPG) NF3ADV VoIP Setup Guide (for TPG) Configuring your NF3ADV for TPG VoIP The following steps will take you through the process of setting up your VoIP connection. This guide assumes that the NF3ADV already

More information

How To Guide. SIP Trunking Configuration Using the SIP Trunk Page

How To Guide. SIP Trunking Configuration Using the SIP Trunk Page How To Guide SIP Trunking Configuration Using the SIP Trunk Page For the Ingate SIParators and Firewalls using software release 4.9.2 or later. Updated to show features available from release 4.10.x May

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Avaya IP Office SIP Configuration Guide

Avaya IP Office SIP Configuration Guide Valcom Session Initiation Protocol (SIP) VIP devices are compatible with SIP-enabled versions of Avaya IP Office (5.0 and higher). The Valcom device is added to the IP Office system as a SIP Extension.

More information

RingCentral Office. Configure Aastra phones with RingCentral

RingCentral Office. Configure Aastra phones with RingCentral TM RingCentral Office Configure Aastra phones with RingCentral Configuring Aastra phones Overview... 2 Getting ready to setup your Aastra phones... 2 Configuring the Aastra Phone... 4 Overview Aastra s

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide

SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24 Data Federation Administration Tool Guide Content 1 What's new in the.... 5 2 Introduction to administration

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information