Manual Referencia 6 en
Manual Referencia 6 en
Version 6.0
IPBRICK SA
July 2014
2
Copyright c IPBRICK SA
All rights reserved. July 2014.
The information in this manual is subject to change without prior notice. The
presented explanations, technical data, configurations and recommendations are
precise and trustful. Nevertheless, they have no expressed or implied guarantees.
2 Before Starting 19
3 IPBrick.I 25
3.1 Machine Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.2 Machine Management . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.2.1 Mass Operations . . . . . . . . . . . . . . . . . . . . . . . . 28
3.3 User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.4 Users Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.4.1 Mass Operations . . . . . . . . . . . . . . . . . . . . . . . . 36
3.4.2 XML-RPC management . . . . . . . . . . . . . . . . . . . . 37
3.4.3 User Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.4.4 User Search . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.5 Domain Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.5.1 Configure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.5.2 Users Management . . . . . . . . . . . . . . . . . . . . . . . 45
3.6 File Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.6.1 Individual Work Areas . . . . . . . . . . . . . . . . . . . . . 46
3.6.2 Group Work Areas . . . . . . . . . . . . . . . . . . . . . . . 47
3.7 E-Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.7.1 Configure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.7.2 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.7.3 Queue Management . . . . . . . . . . . . . . . . . . . . . . . 56
3.7.4 Users management . . . . . . . . . . . . . . . . . . . . . . . 57
3.7.5 Mailing Lists . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.7.6 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3.7.7 Anti-Virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3.7.8 Anti-Spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.7.9 POP/IMAP Server . . . . . . . . . . . . . . . . . . . . . . . 67
3.8 Print Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
3.9 Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
3.9.1 Remote . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4 IPBrick.C 75
4.1 Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.1.1 Available Services . . . . . . . . . . . . . . . . . . . . . . . . 76
4.1.2 Block Services . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.2 Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.2.1 Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.2.2 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
4.2.3 Auto-Configuration . . . . . . . . . . . . . . . . . . . . . . . 92
4.2.4 Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
4.3 VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
4.3.1 PPTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
4.3.2 SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
4.3.3 IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
4.3.4 GRE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
4.3.5 VPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
4.4 E-mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
4.4.1 Advanced relay . . . . . . . . . . . . . . . . . . . . . . . . . 107
4.4.2 Get Mail from ISP . . . . . . . . . . . . . . . . . . . . . . . 108
4.4.3 Mail Copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
4.4.4 POP/IMAP Server . . . . . . . . . . . . . . . . . . . . . . . 110
4.5 SMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
4.5.1 Configure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
4.5.2 Routes Management . . . . . . . . . . . . . . . . . . . . . . 111
4.5.3 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
4.5.4 Sending a SMS . . . . . . . . . . . . . . . . . . . . . . . . . 114
4.6 Web Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
4.6.1 Creating a new site . . . . . . . . . . . . . . . . . . . . . . . 116
4.6.2 Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
4.7 FTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
4.7.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
4.7.2 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
4.8 Groupware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
4.9 VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
4.9.1 Phone management . . . . . . . . . . . . . . . . . . . . . . . 129
4.9.2 Users Management . . . . . . . . . . . . . . . . . . . . . . . 130
4.9.3 Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
4.9.4 Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
4.9.5 Routes Management . . . . . . . . . . . . . . . . . . . . . . 164
4.9.6 Music on Hold . . . . . . . . . . . . . . . . . . . . . . . . . . 173
4.9.7 Voice Prompts . . . . . . . . . . . . . . . . . . . . . . . . . 173
4.9.8 Dialplan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
4.10 IM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
4.10.1 Activating / Deactivating the IM server . . . . . . . . . . . 178
4.10.2 Chat Recording . . . . . . . . . . . . . . . . . . . . . . . . . 179
5 IPBrick.GT 181
5.1 Fax Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
5.1.1 Fax2Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
5.1.2 Mail2Fax . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
5.1.3 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
5.1.4 Routes Management . . . . . . . . . . . . . . . . . . . . . . 191
5.2 UCoIP Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
5.2.1 UCoIP Page Management Interface . . . . . . . . . . . . . . 197
6 IPBrick.SEC 201
7 IPBrick.4CC 203
7.1 Hypervisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
7.2 VDI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
7.3 Terminal Configuration . . . . . . . . . . . . . . . . . . . . . . . . . 205
7.3.1 Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
7.3.2 Client configuration . . . . . . . . . . . . . . . . . . . . . . . 212
7.3.3 Broker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
This reference guide gives you a detailed description of the following IPBRICK
menus:
• IPBrick.I configuration;
• IPBrick.C configuration;
• IPBrick.GT configuration;
• IPBrick.SEC configuration;
• IPBrick.4CC Configuration;
• Advanced Configurations.
In the appendix we present the procedure to deal with the Workstation con-
figurations. You will find there, the following configurations
Before Starting
When you open a WEB session with IPBRICK you will see a login web page.
After a correct validation, IPBRICK allows you access to the main configuration
page. Here you can change the domain and the IP network of the private and
public server interfaces.
Attention: If the communication network, where you are trying to install IP-
BRICK has already a DHCP server you should deactivate this in order to avoid
conflicts.
IPBRICK web interface management is divided into five main menus (Figure
4.75):
• Advanced Configurations.
On the left panel you will find every option menu readily accessible.
1
It’s an IPBrick hardware appliance for IP telephony with analogic/ISDN telephony cards
integration
2
It’s an IPBrick hardware appliance acting as a security gateway.
Each menu may have sub-options, simply click on the desired one.
On the management interface there are links that allows you to perform these
types of operations:
• Back: Allows you to turn back to the previous page without saving changes;
• Insert: Allows you to insert new items;
• Modify: Allows you to change item settings;
• Delete: Allows you to delete an item;
You can have several tabs, making it easy to navigate between menus.
Also new is the Warning Icon on the top right corner of the screen.
This icon will blink, if there are important changes to be made to the system,
and if you click on it you will access a new window enumerating the necessary fixes
and checks to the IPBRICK configurations.
Each item in the enumeration offers you chance to alter important settings by
clicking on the Fix or Check button.
Usually, the Fix button indicates a more urgent change (e.g: Changing the
Administrator’s default password change). If you click on it you will be redirected
to the page resolving the warning.
The Check button does the exact same thing, redirects you to the page where
you need to verify the settings.
After checking for problems, you may access the warnings list and click on the
Done button so that the warning is removed from the list.
IPBrick.I
This chapter describes the IPBrick.I menus used to manage the main Intranet
services.
It is divided into the following main sections:
• Machine Groups
• Machines Management;
• User Groups;
• Users Management;
• Domain server;
• File Server;
• E-mail;
• Print Server;
• Backup;
• Terminal Server.
• Group type
– Machines: If you choose this option and Insert, it’s possible to assign
existing network machines to the group;
• Machine count: If the group is a subnet of machines, you can choose the
number of machines for the group;
• Subnet: This field defines the subnet for the group of machines. It represents
the range of IP addresses concerning the defined group.
By clicking Insert, the group is created and its settings are displayed. On
that screen you can see three links: Back to go back to the list; Modify to change
the name of the present group; Delete to remove the machine group. We can see
an example of a machine group at Figure 3.2 and the general list at Figure 3.1
• IP Phone: Hardware IP SIP phone in LAN. The name will be the SIP
username and it will always be associated to the IP address. Note that,
the phone’s password must comply with with the strong password policies,
unless you choose to disable them at Telephony - Configurations. ;
• IP Camera: This type of digital video camera is commonly used for surveil-
lance purposes, and can send and receive data via a computer network and
the Internet.
• Radio base Station: This machine is used to maintain contact with a fleet
of hand-held or mobile radios. The base station is one end of a communica-
tions link solution offered by IPBrick Radio.
• Set Top Box IPBrick: Our very own set top box, tailor-made for Corporate
TV
• Radio Control Station: The controller of the Radio Base Station. This
machine enables the IPBrick to manage and control the transmissions in up
to 8 Base Stations.
In order to insert a machine you only have to define the type, introduce the
name and IP Address. In this way the machine is registered in the LDAP and
the DNS server. If you fill in the MAC Address field with the MAC adddress of
the machine to be registered then a record is also created for this machine in the
DHCP server.
Note: The machine MAC address can be obtained from the network connection
icon in Windows XP or by executing the order ipconfig /all in the command line.
You can manage a specific machine clicking over its name in the list. You will
get the screen present at Figure 3.4. If you click the link Modify, the form from
Figure 3.3 is displayed and enables you to redefine the machine parameters. If you
click Delete, the machine will be deleted. When all the machines are registered
you can get the list at the main menu (Figure 3.5).
NOTE: If the inserted machines have become far too numerous to be displayed
or searched efficiently, it’s possible to retrieve a machine by using the various
search links displayed on the Machines Management page. There’s alphabetical
and numerical quick links, as well as the possibility to open a Search window
Figure 3.6 or to display all machines on one page (List all link).
Mandatory fields:
– 1: For Workstation;
– 3: For Workstation + Softphone;
– 14: For Linux Workstation;
– 15: For Linux Workstation + Softphone;
– 16: For Printer;
– 2: For IP Phone;
– 7: For Linux Terminal;
– 4: For Windows Terminal.
Other fields:
• callerid;
• voip_nat;
• voip_disallow;
• voip_allow;
• voip_dtmfmode;
• voip_subscribecontext;
• voip_pickupgroup;
• voip_callgroup;
• voip_canreinvite;
• voip_insecure;
• voip_athuser;
• voip_fromuser;
• voip_fromdomain;
• voip_mailbox;
• voip_quality;
• voip_call_limit;
• phonedescription;
• idphonetemplate;
• printerdescription;
• printerlocation;
• printerport.
Example of a .cvs file content for mass operations import option:
action;computernumber;machinetype;name;groupnumber;ip;mac;password
I;;1;wrk03;;172.29.1.52;00:E0:98:9B:45:06;
I;;1;wrk04;;172.29.1.54;00:E0:98:9B:45:04;
I;;3;softphone04;;172.29.1.57;00:E0:98:9B:45:54;1234
! Attention !:
• The computer’s name shouldn’t contain spaces nor diacritical marks on char-
acters neither punctuation. Its maximum length should be 15 characters;
• It is not allowed to register neither machines with the same name nor ma-
chines whose names are identical with a registered user log in;
There are two pre-defined groups that cannot be deleted or changed. These
groups are:
• Administrators;
• Users.
• The group name can contain spaces, but can’t have more than 32 alphanu-
merical characters without accents.
• When the user is created, there shouldn’t be other group with the same
name, including domains.
being installed, IPBRICK creates by default one user and two groups. The created
user has the login Administrator, this login can’t be altered and the two groups
are the Administrators and the General. The user with the Administrator
login has a work area created in the Work Area 1. This user has special charac-
teristics because he belongs to the Administrators group and is responsible for
the management of some of the system’s included sites and functions. Therefore
he can never be removed.
• Name: User’s name. Usually it’s his first and last name;
• Server: Selection of the server where the user account shall be created. The
user account stands for the hard drive space in the server where various
user contents are stored, including an email folder, Windows profile and
documents. If there are slave servers they are also listed.
• Work Areas: Partition of the server drive selected to create the account.
The users should be distributed in an equitable way, in order to efficiently
use the available space.
• Quota: Value that limits the user hard drive space in the system. The unit
os measurement is kilobytes. If you don’t indicate a limit value, the user will
have unlimited space to occupy.
At option Extra Options we can define other LDAP parameters for the users
like :
• Employee Number;
• Department Number;
• Room Number;
• Phone extension;
• Employee type;
• Business category.
! Attention:
• When inserting users, only use characters without accents for their name,
login and e-mail address.
• Spaces, brackets, full stops, small and capital letters are possible in the Name
field.
• You are not allowed to use spaces in the Login field. Avoid using capital
letters.
• Every login has to be unique. There cannot be a login with the same name
of a machine registered in IPBRICK.
In order to modify some user information you have to click over the name (Fig-
ure 3.13).
In the form where you change the user you can see all fields that were defined
when the user account was created. The only exception is the uidNumber which is
an IPBRICK user identification number. The password is not shown. All defined
fields are editable with the exception of the login and uidNumber.
• In the generated page, besides from displaying user properties, you can also
delete the user (Figure 3.14).
⇒ Note: The user’s contents (personal files, profile, e-mails) are not elimi-
nated when deleting his registration. They are moved to an administrative share
called BackupX (X representing the number of the work area where the user was
registered, 1 or 2). Only members of the Administrators group have access to
this share from any Windows station. Therefore they have to do the following:
All folders and files deleted in these administrative shares are finally eliminated
in IPBRICK.
• name: User name. If more than one word is used the " is necessary;
• password: Insert a user password. Later the user can change it at the
myipbrick site. Note that this field is not present when we export a .cvs file,
so it must be created;
Other fields:
• idserver: Slave server IP where to create the account. The 0 is for local;
• sipurl: User’s SIP url, representing the phone near the user;
• mailoutoreply: It’s the automatic reply message. The use of " is needed;
actionuser;usernumber;login;name;email;accountquota;idworkarea;password
I;10001;jdomingues;"Joao Domingues";[email protected];0;;2;123456
I;10002;jsmith;"John Smith";[email protected];0;;1;123456
https://IPBRICK_IP/xmlrpc/server.php
• Add users;
• Modify users;
• Delete users.
</param>
<param>
<value><string>login:userlogin</string></value>
</param>
<param>
<value><string>name:username</string></value>
</param>
<param>
<value><string>email:[email protected]</string></value>
</param>
<param>
<value><string>password:12345</string></value>
</param>
<param>
<value><string>mailalias:[email protected];[email protected]
</string></value>
</param>
</params>
</methodCall>
</param>
</params>
</methodCall>
Note: The first two parameters must be replaced with the IPBrick web inter-
face credentials.
By selecting YES on the presented options you will access more settings.
• Use strong passwords: By default, this option is set to NO. Select YES to
configure your password’s length and remember that:
of characters:
Uppercase letters (A through Z)
Lowercase letters (a through z)
Numbers (0 through 9)
Special characters (such as !,$,%,#)
• Lock account after password failed: By default, this option is set to NO. The
user’s account will be locked for a determined amount of time, after a set
number of unsuccessful login attempts.
• Password Validity: By default this option is set to NO this means that the
password will never expire. Select YES to set the number of days:
NOTE: If you select YES all users will have an expiration date on their
passwords, but, a new option will appear, at Users List, when you click on
an individual user Name.
This new link (User Policies) will enable you to deactivate the password
validity for that particular user.
If you return to the Users List page you will now notice that this partiular
user has no validity in his password.
– Expires in: Number of days the password will be valid (by default, 30
days);
• Block account: If the password expires, the account will be blocked (by
default, NO). If you select Yes you will have available an option to set the
number of days where your user will be able to access his account until it’s
finally locked:
– Lock account after the password expires: Set the number of days until
(by default, 0 days)
• Send notification: By default, the user will not be notified of the end of his
password’s validity. Select YES to set how many days before expiration will
the system notify him;
– Send notification before password expires: Set how many days before
expiration will the user receive a warning (by default, 1 day)
– Notification: By default, the notification’s subject and message is al-
ready set, but if you wish, you may modify it as you see fit.
To confirm the changes click on the Modify button at the bottom of the page.
The user will be able to alter his password at MyIPBrick. The login page will
prompt him to alter his authentication credential.
It’s possible to filter the search results by user Name or Login, when you access
the Search Window.
Simply type the name and/or the login and click on the Filter button to retrieve
the search results.
3.5.1 Configure
In this section you define the name of the domain served by IPBRICK as well
as this fields (Figure 3.26):
• Domain Login:
• Default account network drive: The workstation drive where the user account
will be mapped. Users with large volumes of data should store them there
and not at the profile folders. The default setting is Z;
– Roaming: In this case, when the user logs out from the workstation,
all the profile folders are synchronized to the user personal account in
IPBrick, located at \\ipbrick\user_login\.profiles. When he logs
in again at the same workstation or at a different one, the profile will
1
Primary Domain Controller
⇒ Note: The information on this section is only valid for the MS Windows
environment. The IPBRICK Domain Name field is related to the Workgroup or
Domain Name in the MS Windows environment.
• Account network drive: Z: by default (check the previous section 3.5.1 Con-
figure, for more information);
• Type of profile: Roaming or local (check the previous section 3.5.1 Configure,
for more information);
Clicking on that option the user’s list is presented. Choosing a specific user as
shown at Figure 3.27, we can configure the domain server definitions for him.
IPBRICK has two Work Areas by default: Work Area 1 and Work Area 2.
When you click on Work Areas you are given a list of all users and sharing groups
classified by Work Area as well as information about the occupied space in the
system of each individual Work Areas.
When you click on a Work Area, e.g.: Work Area 1, you are given a list of all
users introduced in this area as well as the occupied space of each user (Figure
3.29). Each user area is created in the moment you make the IPBRICK registra-
tion in IPBrick.I Users Management. In individual workareas we also have the
list of FTP accounts created in FTP menu at IPBrick.C.
! Attention !: If the occupied space in the Work Areas reaches 100%, users
can longer save their data in IPBRICK. More over, e-mails are no more delivered to
the users. They stay in the queue until some space is released in the Work Areas.
It is recommended to keep the occupation rate of each Work Areas under 95%.
! Attention !: Enabling the recycle bin for the users is not recommended in
case of small disk capacity.
• Name: Name of the share folder. Try to avoid spaces, characters with accents
and punctuation;
• Browseable: If Yes it will appear in the server browse list. If No the share
will became hidden;
• Name of the recycle bin folder: If you have chosen to enable the pre-
vious option, you can set in here the folder that will be used as a recycle
bin.
The new share may be accessed via a windows machine (Network Neighbor-
hood, \\server\share) but it can also be accessed by NFS (to be used/mapped
by Linux Machines).
In order to allow other linux clients to work in the same way, by using NFS, it
is neccessary to follow both these procedures;
At the Server:
At the Workstation:
Note: This could be done via the local fstab by typing these commands:
su - root
mkdir /nfsshares
mkdir /nfsshares/h1 /nfsshares/h2
vi /etc/fstab
(...)
/nfsshares/h1 SERVER_IP:/home1/_shares nfs defaults 0 2
/nfsshares/h2 SERVER_IP:/home2/_shares nfs defaults 0 2
Access Permissions
After creating a Group Work Area you have to give permissions to the users
in order to have access to the network share. This is done by first clicking at the
share name as shown at Figure 3.33.
There are 3 different types of permissions:
• None: No access to the share. Users have no access to open a share folder
on a workstation;
• Read Only: Users have access to share folders and its files. Nevertheless,
they are not allowed to change these files;
• Read/Write: Users have access to share folders and its files and are allowed
to change files and save changes.
Permissions are given to individual users or user groups (Figure 3.34). Users
groups are defined in IPBrick.I Group Management.
For example, in order to create a share folder for users belonging to a commer-
cial department you have to take the following steps:
• Create group ”Dept Financeiro”, in Group Management and add the users
of this department to the group.
• Give read and write permissions to the group ”Dept Financeiro”. The other
groups have either reading permissions or no access to this area.
⇒ Note: When defining user group permissions any change in the General
group leads to changes for all the other groups. This happens because all users
introduced in IPBRICK are part of General group.
⇒ Note: A deleted share is no longer available to users. All files in this share
are moved to an administrative share called BackupX (X representing the number
of the work area where the share was created, 1 or 2) that you can find in the
same Work Area. Only users belonging to the IPBRICK Administrators group
can access this folder. It’s possible to access this share from a Windows station, if
you take the following steps:
All files and folders deleted in these administrative share are permanently
deleted in IPBRICK.
3.7 E-Mail
Email is the most used network service in Internet, gradually replacing tradi-
tional mail and fax. The protocol used to send electronic messages is SMTP (Sim-
ple Mail Transfer Protocol) that runs on gate 25 TCP. It enables email sending
for one or several recipients and is implemented by MTA (Mail Transfer Agents).
IPBrick’s MTA is Qmail2 .
SMTP is only capable of sending messages, therefore, users need the POP3/IMAP
protocol to retrieve messages from the servers, these protocols are supported by
all email clients.
• Configure;
• Queue Management;
• Users Management;
• Mailing Lists;
• Statistics;
• Anti-Virus;
• Anti-Spam.
3.7.1 Configure
An important concept about the email server configuration is open relay. A
server that works in open relay processes messages between senders and recipients
out of the server’s domain, that actually can even be non-existent. Obviously,
IPBrick doesn’t work as an open relay, it only forwards Internet emails to domains
that are explicitly indicated.
2. Authorized relay domains: IPBrick forwards all the messages that have
their domains in this list and will be accepted by the server to a queue list.
Messages to other recipients that don’t belong to this domains won’t be
accepted by the server (please see 3 ).
2
http://cr.yp.to/qmail.html
3
Only e-mails from the Internet respecting these rules are processed. IPBRICK is not con-
figured as open-relay.
4. SMTP Routes: SMTP routes are configured when you want e-mails to follow
a certain way (server) in order to find their recipient. Normally, a SMTP
route is defined by default (showing the SMTP route and leaving the Domain
empty).When the server is not correctly registered with the IP name in the
Internet DNS, you have to define a SMTP route. In this route it should be
either the server responsible for the forward of company e-mails or the SMTP
server of the ISP used by firms to access the Internet. This configuration is
necessary because certain e-mail servers make additional verifications of the
sending server authenticity. If they can’t resolve the server name into the
corresponding IP address (reverse DNS check), the mail may be deleted or
sent back as SPAM. In case no SMTP route is used the server tries to send
the mails in the queue by his own. With the help of the DNS registrations
he tries to find the recipients directly in the Internet.
Each e-mail configuration option has a link to Insert new entries (Figure 3.35).
The domains for local delivery (domains with IPBRICK serves) and relay (do-
mains which IPBRICK forwards) can be edited and/or deleted. The exception is
the domain whose name is the same as that of the machine in the local networks
or that of the local domain in the relay.
2. IP address of the route server. Please give attention to the brackets 195.22.133.45.
In the following you are given three examples of configurations, one with an IP
for a specific domain, another configuration for the same domain with the FQDN
and the last presents you with a smtp route with authentication:
First Example:
Domain : abzas.miz
SMTP route : 195.22.133.45
Second Example:
Domain : abzas.miz
SMTP route : smtp.exchange.telepac.pt
Third Example (with authentication)
Domain : abzas.miz
SMTP route : 195.22.133.45 user password
Domain: domain.com
SMTP route: accounts.domain.com
Domain:
SMTP route: smtp.isp.pt
4
Fully Qualified Domain Name
3.7.2 Definitions
There is a link called Definitions (see Figure 3.36 and Figure 3.37) to define
characteristics of the e-mail server:
• Message maximum size: It’s the global message maximum size of a send-
ing/receiving message
Value by default: unlimited.
• Maximum time to hold the message in the server: Maximum time the
message will be in mail queue
Value by default: 604800 seconds (7 days)
• Reject emails from invalid domains: The server will reject incoming
mail if the sender’s domain MX record don’t exist, so it will be invalid.
Default value: Yes
• Reject emails from invalid servers: The server will reject incoming
mail if the sender’s FQDN don’t have a reverse DNS record.
Default value: No
You can see the number of e-mails that are in the queue waiting to be delivered
to their local or remote recipient as well as the total number of e-mails in the queue.
The list presents the following fields:
You can delete several e-mails at the same time by selecting the corresponding
checkboxes and clicking in the Delete Mails option. You have to confirm this
action in order to eliminate the chosen mails.
When selecting a mail you can see its complete source. This operation is done
in real time. Therefore is not necessary to Apply Configurations.
! Attention !: E-mails deleted in the queue are eliminated definitely. A email
can stand in queue for a default value of 7 days.
! Attention !: When a message in queue is deleted the qmail service is restarted.
• Default mail: The user default mail address. It’s not mandatory to be equal
to login@domain;
• Alternative addresses;
• Mail quota;
• Forward to;
Alternative Addresses
Alternative addresses (Figure 3.42) allows you to on the one hand to have
practical logins which are easy to manage and on the other hand the confort in
using more personalized e-mail addresses. This way the user can have an e-mail
address with which he identifies himself more.
All mails that are sent to any defined alternative e-mail user address are deliv-
ered to the inbox respectively.
Alternative Addresses:
[email protected]
[email protected]
[email protected]
Whenever you want to you can access the e-mail address list (IPBRICK user
e-mail address arranged in groups) and change the names or the user of an e-mail
address. Is it obvious that when you change the user of an alternative e-mail
address new mails will be delivered to the new user while the other alternative
addresses stay with the old user.
Mail Forward
Mail forward allows delivered mails to be sent to the user’s email and other
internal or external e-mail addresses.
To insert a new mail forward (Figure 3.42):
• Insert in the Automatic reply message text area, insert the content you
want. Ex: I’m not at office. Please contact my coleague John Smith.
A mailing list provides the feature of sending email from one to many.
To add a mailing list:
• Click on Insert;
• Write the address you want in the mail field (Figure 3.43);
• Click on Insert.
After you add a mailing list (Figure 3.44), you have to configure:
• Internal Users List: Set the IPBrick Users that will be part of the mailing
list;
• External Users List: Set the email addresses that don’t belong to the
LAN.
In both cases you only have to click Modify to add members to the list.
3.7.6 Statistics
Like proxy and web service, the Advanced Web Statistics are used for mail ser-
vice too. They generate helpful and important data for the network administrator:
3.7.7 Anti-Virus
An Anti-Virus is already installed in the Email section. The interface displays
the following links:
• Update: After the license expiration, you need to renew with a new license
file;
• Delete: Removes the licence;
• Configure: Provides a general configuration of notifications;
• Groups Management: Provides personalization of Antivirus configuration
and filtering;
• Statistics: Interface with specific statistics about the Anti-Virus use.
General configurations
The group default is already created. If you click on the group, the default
general settings are displayed. If you click on Modify, you can personalize the
following options:
• Enable: Anti-Virus State;
• Group administrator address: Group administrator email;
• Quarantine path: The files in the quarantine state are stored in this direc-
tories;
• Sender mask: You may add this item if a new group is created;
• Recipient mask: You may add this item if a new group is created;
The notification rules for any type of object can be changed in Notification Rules
menu.
In the Filter menu, you may set the filter rules/exceptions by the name of
the files or by mime-type.
Statistics
ClamAV
• Reject E-Mail: The message is rejected and will not enter the mail queue.
The sender will receive a notification;
• Mark E-Mail as virus: The message is marked and enter the mail queue
normally;
• Delete E-Mail: The message is deleted, will not enter the mail queue and
no notification is sended.
5
http://www.clamav.net
3.7.8 Anti-Spam
Anti-Spam is already installed, you only need to apply a license to activate this
feature at the communications IPBrick. After the activation, the following options
are displayed:
• Update: After the license expiration, you need to renew with a new license
file;
• To add every email domains of the company that the Anti-Spam should filter;
• To set Anti-Spam detection level. Standard is the default level. If the spam
reception rate is high, the level of detection should be increased;
Statistics
• Spam statistics: The display can be filtered by: Clean files, Spam, prob-
able and blacklists;
SpamAssassin
SpamAssassin6 is included in IPBrick. By default the service is inactive (Fig-
ure 3.47), to activate it just hit Modify and choose Yes at Enable configuration.
• Required Score: For each message arriving, the SpamAssassin filter will
apply rules in order to know if it’s spam or not. The final value will be a
score number. In this field we are going to define the required general score.
The default is 10, so only mail messages that match >= 10 will be considered
SPAM;
– Reject E-Mail: The message is rejected and will not enter the mail
queue. The sender will receive a notification;
– Mark E-Mail as SPAM: The message is marked and enter the mail queue
normally;
– Mark and Redirect E-Mail: The message is marked and redirected to
the mail address [email protected] (Figure 3.49);
– Delete E-Mail: The message is deleted, will not enter the mail queue
and no notification is sended.
• Body Message Structure: Active for mark’s only. The original message
can be keeped or we can choose to send the original message in attachment,
as .txt or .eml. If it goes in attachment it’s possible to define a specific
description at Body Message Description.
These following definitions, regarding specific score rules, are completely op-
tional.
To insert a score rule, we need to hit Insert. The following options are avail-
able:
– Body;
– From;
– Subject;
6
http://spamassassin.apache.org
• Definitions
scenario, this value should be, at least, the double of the number of
users. By default, it is set to 400.
– Maximum number of connections per IP: If the POP/IMAP proxy is
activated the number of connections per IP should be incremented to
half the maximum number of connections (daemons). By default, 20.
NOTE: Please, bear in mind, that these suggestions do not take into
consideration a distributed email load scenario, where various email
servers may be at play!
2. Description: Simple description about the printer. This field is not manda-
tory;
4. Interface: Interface type used between the printer and the server. There
are 4 options:
• Parallel port;
• Serial port;
• USB port;
After inserting a printer, IPBRICK has to put the drivers available for the
client stations in order to finish the configuration. Therefore the printer drivers
have to be transferred to the server:
9. At share named Printers and Faxes on IPBRICK, right click at the printer
and choose Printer Properties. You’ll be prompted with a message like
the one in Figure3.54. Choose ”No”.
10. Enter in ”Advanced”, select the new driver just added and click ”Apply”.
Now the printer is listed at ”Printers and fax’s” on the client side.
3.9 Backup
Backup consists of copying data from one device to another so that these ad-
ditional copies may be used to restore the original after a data loss event. Usually
this is made from hard disk to tape, DVD or to another disk. Nowadays, paper
is being rapidly replaced by digital files, so organizations need to be aware of the
importance of having a reliable backup system.
3.9.1 Remote
This option enables the possibility of configuring scheduled backups to a NAS7
device or to a rsync server. Rsync is a powerful backup tool included in IPBrick,
that does incremental copies of files/directories to another rsync server.
To add a backup task you must click Insert (Figure 3.55). You will have the
following fields:
Backup definitions:
7
Network Attached Storage
• Notification E-mail: Recipient that will receive all the backup notifications;
– Copy: It will copy all work areas to the backup device(/home1, /home2,
/home3...);
– Restore: It will restore all work areas from the backup device;
• Backup Device
– NAS (SMB): The backup device is a NAS8 with a SMB share created.
The backup method is done using the archiving utility tar. Options
available:
∗ IP address: Backup device’s IP address;
∗ Login: Username that has access to the share;
∗ Password: Share password;
∗ Share Name: Name of the share created in the NAS.
8
Network-attached Storage
– NAS (NFS): The backup device is a NAS9 with a NFS share created.
The backup method is done using the incremental backup utility rsync.
Options available:
∗ IP address: Backup device’s IP address:
∗ Share Name: Name of the share created in the NAS.
– Rsync Server: The backup device is a machine running a rsync server.
You can see an example of a rsync server configuration in the next
section;
∗ IP address: The rsync server’s IP address.
When a backup task is inserted, we have a Backups List with the following
options:
• Name: Clicking on the Backup Name you will have access to these options:
Note: If using the NAS(SMB) backup, the restore option will restore all the
files included, but from the beggining. Note: If using NAS(NFS) or rsync server,
the remote filesystem should be the same that IPBrick is using (E.g.: ext3);
• IP: 192.168.69.199;
• FQDN: ipbrick.domain.com;
1. Create a group workarea (share) using the Workarea 1, with the FQDN as
the share name: ipbrick.domain.com;
2. Connect by SSH to the IPBrick server and type the following command in
order to put rsync allways running when the server reboots:
9
Network-attached Storage
uid = root
gid = root
use chroot = yes
[ipbrick.domain.com]
path = /home1/_shares/ipbrick.domain.com
hosts allow = 192.168.69.199
read only = false
write only = false
5. Save the file and exit from the file editor nano;
IPBrick.C
This chapter describes the IPBRICK menus used to manage the main com-
munication services between your organization and the Internet. The menu IP-
Brick.C like the one in IPBrick.I is a menu of functional configuration. The
IPBRICK Administrator ’says’ what he wants and the software makes the con-
figurations accordingly and maintains their consistence. This chapter is divided
into the following sections:
• Firewall;
• Proxy;
• VPN;
• E-Mail;
• SMS;
• Web Server;
• FTP Server;
• Webmail;
• VoIP;
• IM.
4.1 Firewall
Note: Any rule change done to the firewall implies its reactivation. Even if
the firewall has been expressively stopped a change in one of its rules implies the
restart of the firewall.
• Web Server;
• E-mail server;
• SSH;
• FTP.
The list, Firewall -> Available Services (Figure 4.1), indicates the ser-
vice status - whether the firewall is configured to let that service work (Active)
or it is configured to block those service ports (Inactive).
Note that defining here a service as active doesn’t start the service or stops
it. The single change implemented in the Apply Configurations option will only
affect the firewall service (first it stops, reconfigures and then restarts). In other
words, here you can only configure the firewall to open or to shut the Internet
port for a defined service (whether the service is working is another configuration
besides this section).
4.2 Proxy
The proxy service acts as an intermediary for requests from clients seeking re-
sources in other servers. A client connects to the proxy, requesting a file, a web
page or any other resource. A Proxy is commonly used as way to achieve a better
network management; it caches web pages, providing a better bandwidth manage-
ment and enforces an access policy to network services or content, e.g.: to block
undesired sites, the possibility to customize web access, etc.
• Settings;
• Statistics;
• Auto Configuration;
• Monitoring;
4.2.1 Settings
The presented main proxy definition (Figure 4.22) determines the normal op-
eration of the Internet browsers. Therefore, it is recommendable to define each
Proxy type first:
1. Standard Proxy: It is not obligatory to use the proxy to access the Inter-
net. The proxy is only used by those who configure the browser to use the
proxy from the IPBRICK port 3128. Users without any additional browser
configurations continue to access the Internet without any problems. The
web accesses are registered by IP’s for statistical purposes.
2. Transparent Proxy: Every Internet access is done through the proxy. The
firewall has to be activated. Users may configure their browsers to use the
indicated proxy. They may also continue to access the Internet without any
proxy configurations in their browsers. Here the firewall makes the traffic
routing to the proxy. The web accesses are registered by IP’s for statistical
aims.
Configurations
The Configurations link enables you to access the content filtering settings.
This page (Figure 4.23) presents you with the default proxy policies.
If you click on the Default link you will access its Definitions. It is also
possible to insert a new set of policies by clicking on the Insert link.
As you can see, there’s a Modify link enabling you to alter the default general
definitions.
• Access mode: There are three modes available Filtered, Banned and Accept
All. Depending on your choice, some of the following options may not be
available;
• Block downloads: If you want the proxy to block all downloads select YES.
By default, this setting is set to NO
• Sensibility: This relates to the level to which the content will be filtered:
Very High, High, Medium, Low, Very Low, Off.
1
Platform for Internet Content Selection
There’s also a number of other links that allow you to configure what content
will be Banned or Authorized.
FQDN example:
www.facebook.com
www.marca.es
Domain example:
facebook.com
marca.es
TLD example:
com
es
On the Modify page, simply edit the Banned and or Authorized lists as you
would normally do in a text editor (remember that you should add or remove
domains bearing in mind that they should be arranged one per line).
2
Fully Qualified Domain Name
3
Top Level Domains
• URL: The page regarding URLs. On the Modify page, simply edit the Banned
and or Authorized lists as you would normally do in a text editor (remember
that you should add or remove URLs bearing in mind that they should be
arranged one per line).
• Blacklists: Displays the set of blacklists that are available. By default, only
the Adult blacklist filter is active, you may, of course, tick other blacklist in
order to activate the corresponding filter.
• Phrases: You can deny in this option the access to pages that contain certain
phrases in the page’s contents. This action is not done in a ’blind’ manner
but rather by ’weight’. Furthermore, you may authorize access to ’good
phrases’ in the whitelist. This way, access to pertinent content is assured.
• Times: The Times feature enables you to schedule the proxy policies. Just
click on the Modify link and on the new page select the day or days of the
week where the proxy will be active (You may use Ctrl or Shift to select the
desired days)
If you select NO on All day long a new set of rules will appear:
– Start time: Select the time of day when you wish to begin to enforce
the proxy policies;
– End time: Select the time of day when the proxy will be deactivated.
• Members: At this page you will be able to select Machines and IPs by
• Machine groups: You can associate to this policy an existing machine group;
• Machines: Lists the machines that are registered in IPBrick and provides
direct association to the origin group;
NOTE: If you choose the proxy with authentication mode, it’s possible to
filter the web access’s not only by the machines IP but also using LDAP. In Figure
4.20 we can see an example of a source group represented only by a LDAP group.
Remote Proxy
In this option you can indicate a list of remote proxy servers. These servers
should provide web access because they usually have a huge cache, increasing the
speed of web access (Figure 4.21).
• List of remote proxy servers: You can use several web proxy’s and after
that order that list;
• Dont use remote proxy for the following sites: If you don’t want to
use remote proxy for certain sites, you must indicate them here.
• Source groups list: Sets an origin group with access to proxy. After this
group creation, the accesses can be set by: Machine group, Machine, IP
Subnets, IP Machines and IP ranges.By default IPBrick has a LAN group
with its own defined IP Subnet.
• List of time spaces: Sets specific periods based on hours and week days;
• Access Lists: Sets access permissions from the created origin and desti-
nation groups, as well as defined blacklists and periods. For instance, you
can set that all destinations can be accessed by the LAN group, with the
exception of INVALID destination group and blacklist porn, in an undefined
period (always).
Other configurations
General Settings
It is possible to change the port from where the proxy will operate. By default
it is port 3128.
Redirect page in case of denied access
If the access for some site is blocked, the user can be automatically redirected
to the web site configured at URL address;
Blacklists
In this context, blacklists are set as site lists organized by several categories
that are considered inconvenient. You can find here the following options (Figure
4.25):
• Url for update: That URL provides a default blacklist base file that is au-
tomatically decompressed by IPBrick. Each category will have a list of sites
that is automaticaly updated, but it’s possible to do a update clicking at
Update. The proxy service can use other blacklist bases, some with other cat-
egories. Some blacklists can be found here: http://www.squidguard.org/blacklists.html.
• Current file MD5SUM: MD5 Hash of the file if it’s calculated. It lets you
check file integrity;
• Cache enabled: Activates the Proxy cache service. If the cache is activated,
every page accessed by the origin groups are stored in the server. Example:
If the page www.google.com is in the cache, the browser will only access to
IPBrick, instead of accessing the google web server, providing a better band
width management.
• Cache size: Maximum cache size. If the limit is reached, the older cache
files are removed.
• Cache location: The default is the /var partition. If you choose a big
cache size it’s a good option to choose the /home1 or /home2 partition.
Allowed connections
This list presents all the ports that are accepted by proxy. So all traffic com-
ming from LAN machines with destination ports in Internet listed here will match
proxy defined ACL’s. It’s possible to configure witch ports are accepted or not by
proxy with Remove and Add option.
In this section we can define whitelists for any destinations, including domains
and networks. So for that destinations no proxy ACL’s will be matched.
All this settings can be viewed at Figure 4.25 and Figure 4.26.
4.2.2 Statistics
Advanced Web Statistics is the software that generates several important statis-
tics for the network administrator, like detailed cache statistics, accesses (Figure
4.27).
4.2.3 Auto-Configuration
It’s possible to configure the proxy via a wpad file. Click on the Modify link.
At the new page you can now enable the configuration by selecting YES at
Enable Autodiscovery, you will notice that more options will appear.
NOTE: These are the default settings, please change them according to your
own scenario.
4.2.4 Monitoring
This page will display all proxy traffic stats for you to monitor. The information
is arranged in a simple table with columns for: Date, User, Source IP, URL, HTTP
Code and Size.
The Filter link will open a new page that will provide you with the necessary
means to retrieve the data you desire.
The Configurations link will let you set if you wish to record the browsing
history (by default, it is set to NO).
Simply click on the Modify link to activate the feature by selecting YES
4.3 VPN
VPN4 is a way of extending any network by providing a remote access (usually
via Internet) to a network’s resources.
4.3.1 PPTP
A PPTP5 VPN type works by providing a PPP session with the recipient
through the tunneling GRE protocol. It needs another network connection to
start and manage PPP session that runs on port 1723 TCP. In IPBrick’s case, you
have to indicate who are the users that access VPN-PPTP connections, as well as
the address range that will be used by clients.
Configurations
The link configurations gives you access to a form where you define the range
of IP addresses chosen for VPN connections. Remote clients will get an IP in this
group when they make an IPBRICK connection. It is as if they were connected
to the network server with an IP from this range. The user list shown on the left
side in Figure 4.34 presents the selected VPN users. On the right side you find
the users registered in IPBRICK.
4
Virtual Private Networks
5
Point-to-Point Tunneling Protocol
Access log
The access log option permits the visualization of all PPTP accesses. It’s
possible to filter by:
• IP;
• User;
• Notes:
– Connected;
– Disconnected;
– Wrong password;
– Illegal user;
– Locked;
– Timeout.
• Date;
Options available:
4.3.2 SSL
A VPN-SSL uses the SSL encryption protocol to insure data privacy and in-
tegrity between the two parts because the protocol provides data encryption and
authentication. SSL is based on TCP protocol and uses the Public key cryptogra-
phy concept (introduced by Diffie-Hellman in the 1970 decade).
This concept specifies that each part has a Private Key and a Public Key that
can be distributed by people that want to have encrypted communication. En-
crypted data with the Public Key are only decrypted by the corresponding Private
Key. Encrypted data with the Private Key are only decrypted by the correspond-
ing Public Key.
After clicking on SSL, the list of VPN SSL servers is shown. To configure the
tunnel you must click on it (Figure 4.35).
Definitions In this section you can configure the definitions of the VPN-SSL
network.
• Name/IP: Name or public IP address of the network;
• Port: The port of the VPN server. The default for SSL is 1194;
• Protocol: The transport protocol used in the communication. TCP is more
reliable buy will add an extra overhead;
• VPN Network: The IP network which will be given to the clients. When a
user connects to this vpn server, he will get an IP address in this IP network.
This network should be different from any other IP network in the company;
• Domain: The domain offered to the clients;
• DNS Servers: The DNS server passed to the clients;
• NetBios Servers: The netbios server passed to the clients;
• Routes for clients: Sets all the networks that client must have access
through the tunnel.
NOTE: If you want to use a VPN SSL and use the same email client with
the internal mail server configurations, you need to add the VPN Network to the
Relay networks definitions at the Email option;
Certificates After the Definitions configuration its necessary to create SSL dig-
ital certificates. A digital certificate has the following informations:
It will be generated a Digital Certificate for the server and for each of the clients
using the VPN SSL connection. Clicking on Insert will start the generation of
the server’s Certificate. You will then have to insert data in the following fields:
• Country Code;
• Country;
• City;
• Company;
The next certificates shall be for the clients, and it is necessary to fill the
following fields (Figure 4.36):
• Name: Certificate name. Normally the single name of the person/entity that
will connect;
Client
In the client side you have to install the specific software to create the VPN
SSL connection- OpenVPN6 . Then you must uncompress the certificate file to a
new directory in
c:\Program Files\OpenVPN\config.
To start VPN connection you have to click on the OpenVPN icon located in the
tool bar with the right button, choose the connection you want and click Connect.
The option Delete All should only be used to restart the all process.
State
This interface shows you the active tunnels and their respective traffic, users
and IP
Access policies
At main menu of SSL it’s possible to create two types of access policies (Figure
4.37):
After clicking on Insert and choosing the name, clicking on it will open a
window when it’s possible to choose the destinations. The destination options
include:
• Machine groups;
• Machines;
• IP Subnets;
• IP Machines;
• IP Ranges.
Access log
The access log option permits the visualization of all VPN-SSL accesses. It’s
possible to filter by:
• IP;
• User;
• Notes:
– Connected;
– Terminated/Timeout;
– Blocked.
• Date;
Options available:
4.3.3 IPSec
IPSec (IP security) technology is a suite of protocols that ensures confiden-
tiality, integrity and authenticity to data transmission on an IP network. SSL
protocol works at the transport layer level - IPSec operates at the network layer
and consequently provides data encryption in this level.
To configure a VPN connection between two networks you need to have the
appropriate configuration on both origin and destination IPBrick’s for the IPSec
tunnel.
The main menu presents the configured IPSec tunnels. To insert a new IPSec
tunnel click Insert. In that page we are going to configure the IPSec connection
(as you may see in Figure 4.38). The following data is necessary:
• General settings
• Keys Management
Router configuration
In case of a VPN IPSec not between two IPBrick’s but between a IPBrick and
a router, at the router side it’s important to know all parameters used by the
IPBrick that are transparent to the web interface. Here are the most important
ones:
4.3.4 GRE
The GRE10 protocol was developed by Cisco to encapsulate a multi variety of
network layer protocols inside a specific IP tunnel. So the main idea was to create
a link between Cisco routers, so two networks can stay interconnected (company
headquarters and branches for example). In these days the GRE protocol is Linux
supported, so with GRE active at IPBrick, it’s possible to create tunnels between
IPBricks or between IPBricks and Cisco routers.
To set up a new GRE tunnel click Insert. The following options are available:
• General settings
4.3.5 VPC
Amazon Virtual Private Cloud (VPC) is a cloud computing service providing
a virtual private cloud over an IPsec based virtual private network.
The Amazon VPC lets you prepare an isolated section of the Amazon Web
Services (AWS) Cloud, where you may use its resources and have control over
your virtual network, including your own IP range, subnets, and also configure
route tables and network gateways, extending your data center into a cloud.
To use this feature you will have to register and request the Amazon Web Ser-
vices VPC.
http://aws.amazon.com/vpc/
General settings
• Name: Name your VPC
• Description: Merely as a reference type a brief description of your VPC
• State: Enable or disable your VPC. By default it’s Enabled.
• Pre-shared key: Type the pre-shared key that Amazon has provided you.
IPSec Configuration
• VPC subnet: Type the value for your VPC subnet. You may insert more
subnets by clicking on the Add button.
• VPN Gateway ASN: Your Gateway ASN. By default 7224 Neighbor IP Ad-
dress: Insert her you neighbor’s IP.
When you have finished inserting all necessary data please click on the Insert
button at the bottom of the page.
4.4 E-mail
This E-mail section is repeated in both IPBrick.I and .C modules. IPBrick.I
provides Intranet services: Base Configuration, Queue Management, User Man-
agement, Distribution Lists and Anti-Virus and Anti-Spam. IPBrick.C provides
additional services:
• Advanced relay;
• Get Mail from ISP;
• Mail copy.
This feature normally called fetchmail is useful when the MX from the enter-
prise domain points to another server.
Click on Insert (Figure 4.47) to configure a external server that you want to
connect to download email and deliver it in the local server. You have to insert
data in the following fields:
To access server definitions, you must click on its name (Figure 4.47):
To access the management interface of remote mailboxes, you must click insert
and fill in the following fields:
5. Local server email: If the individual mailbox is chosen, this field is the
local email account where the downloaded emails will be delivered;
6. Drop ’Delivered-To’: If the email address in ISP is the same as the email
address in local server, this field must be active.
When you activate this service (Yes) the mails are copied to the corresponding
account, that is:
1. Sent: YES, all mails that get through this SMTP server and whose sender
is from the server domain(s) will be copied to the Sent Mails local account;
2. Received: YES, all mails that get through this SMTP server and whose
sender is not from the server domain(s) will be copied to the Received Mails
local account.
When you activate the option (Yes) the system shows the Delete Automatically
the Copies field. This field allows defining whether the mail copies that are in
the server are to be deleted or not. The Delete Copies With More Than field
allows specifying the days after which mail copies are to be deleted in the server.
NOTE: Please, bear in mind, that these suggestions do not take into
consideration a distributed email load scenario, where various email
servers may be at play!
• POP/IMAP Proxy Server
– Enable Proxy Server: By default, No
4.5 SMS
IPBrick provides now an SMS13 functionality to send SMS by using a specific
account at Ficom, Vipvoz or by using an IPBrick GSM gateway. The idea is to
send one or multiple SMS using an email client and a special FQDN created just
for that. So the method can be called Mail2SMS.
Important Note: The GSM Gateway route has only been tested with IP-
Brick GSM Gateways. Therefore, we do not guarantee that the feature will be
operational if you use another manufacturer’s gateway.
4.5.1 Configure
At the web interface access textttIPBrick .GT -¿ SMS
Click on Modify, and then choosing Yes will enable the service configuration.
At Mail2SMS definitions we should define the specific domain to use for SMS send-
ing. Normally it’s used this FQDN: sms.domain.com, replacing the domain.com
with the actual IPBrick’s domain (Figure 4.51).
In IPBrick .GT -> SMS -> SMS Users, you can control the user’s access to
the Mail2SMS service.
Click on Modify, A list with all IPBrick users will appear (Figure 4.52). You
can now check which ones you wish to grant access to this feature.
– Ficom: The SMS will be sent using XML-RPC method. Contact IP-
BRICK SA ([email protected]) to create an account;
– GSM gateway: The SMS will be sent using the telnet protocol;
– VipVoz: The SMS will be sent to a VipVoz mail account using SSL.
Contact IPBRICK SA ([email protected]) to create an account;
Depending on the selected operator option, the following fields will appear:
• Email for notification reception: It’s the email account that will receive the
notifications with the send result (only for VipVoz);
• Gateway IP address: The IP Address of the GSM Gateway (Only for GSM
Gateway) (Figure 4.53);
• SIM card: Select which SIM card to use (Only for GSM Gateway);
• User (VipVoz and Ficom): Username of the account already created (in GSM
Gateway mode, please type the web interface Username);
• Password (VipVoz and Ficom): Password from the account already created
(in GSM Gateway mode, please type the web interface Password);
After the created route, we need to click at the route name to define a prefix
in order to use that specific route. That choosed prefix will be later part of the
number and will match only that route.
4.5.3 Statistics
Displays statistics about the sent and outgoing SMS.
Sent SMS
For sent SMS these are the fields available:
• Id;
• Send date;
• Sender;
• Destination;
• Order;
• Attempts;
• Route;
• Operator;
• State;
• File.
Outgoing SMS
For outgoing SMS that are pending, the following fields are presented:
• Id;
• Sender;
• Destination;
• Order;
• Attempts;
• Route;
• Operator;
• State.
E.g.: We are using the domain sms.domain.com and a VipVoz account acti-
vated with prefix 00. To send a SMS to the Portuguese mobile number 946666666
saying ’Hello, party at 23:00 - Bar XYZ’.
To: [email protected]
Subject: Party
Body: Hello, party at 23:00 - Bar XYZ
Note that you can create a mailing list at IPBrick and insert all the mobile
numbers you want. E.g.: Create a mailing list named [email protected]
and insert at External users list some costumers mobile numbers:
[email protected]
[email protected]
[email protected]
...
CSV file
Another method to send SMS is to attach a CSV file created in a spreadsheet
program with the columns number and message splited by a ;.
E.g.:
number;message
003519191919191; Hello John
003519696969696; Merry christmas Mike
003519191919191; Meeting at 15:00.
00339696969696; Bonjour David.
00344233333333; Feliz navidad Juan.
To send it, we just need to create a new email message with the destination of
the specific mail account smslist@<mail2sms domain>.
E.g.:
To: [email protected]
Subject: SMS CSV List
Body:
Attach: sms_list.csv
If at the CSV file the message column is empty, the considered SMS text will
be the email message body (if present).
By clicking on one of the links a new page will be displayed and if you click on
the Statistics link you will access the stats table pertaining to that particular
domain.
By clicking on Insert it’s possible to create a new site. A new form is displayed
(Figure 4.55) with the following fields:
1. URL address: It’s the FQDN16 of the new site that will be hosted in the
server. It’s possible to use SSL too. Example: www.domain.com;
2. Alternative URL address: Alternative name(s) for the URL address that
was previously set. This field is not mandatory;
3. Site administrator email: E-Mail of the user that is responsible for the
site management;
4. FTP User: A new user login that will access to the site folder through FTP.
This should be the only login and shouldn’t be equal to another IPBrick
LDAP user. The site maintenance will be made through this protocol.
9. Safe mode: If the site is php based, it deny’s the access of files outside the
site folder location, so it will interfer too with the global variables. It’s the
reason that the default mode is Disabled;
16
Fully Qualified Domain Name
10. Access authorized only to the directories: By default the php have
access to the site folder location and to /tmp but it’s possible to add more
locations;
11. Character encoding: It’s the encoding that Apache will use for the website
depending of the content language;
12. Always keep the typed URL: Allows to keep always the requested URL;
4.6.2 Management
When the site is created if you click on it, you’ll have these options to choose
from:
• Alias;
• Redirect;
• Reverse Proxy;
• Delete: Remove the site from the web server. After clicking on Apply Con-
figurations the site is no longer available online. The files of the site are not
eliminated but moved to the share sites_bk1. This share is the file location
of the removed sites. When IPBrick removes these sites only the services
that are affected are reconfigured and the contents removed to an own share
accessible only to LDAP Administrators. It is like in the user accounts and
group shares;
Alias
Alias or Host Header is a simple form of having access to certain contents that
are physically dislocated from the main directory of the site. Next, we’ll present
these two examples:
Redirect
Redirect allows you to be redirected to a new URL when you type a first URL
in the browser. Some examples:
Reverse Proxy
The reverse proxy is used in front of the Webserver and has the main objective
of redirecting all connections addressed to various Webservers to be routed through
the proxy server. A reverse proxy has the function of dispatching incoming network
traffic to various servers and is totally transparent to the user (he will not know
that a proxy is being used).
• The first example stands for this situation: When someone enters the URL
http://site.domain.com they will be transfered to a internal site running
in another server. So the first step is the site creation, and after that the
reverse proxy definition (Figure 4.61);
• In the second example the idea is for someone in the Internet that wants to ac-
cess a site running in a internal machine (http://192.168.1.4:85/cgi/site).
To do this we just need to add a new reverse proxy definition at the base
domain;
Figure 4.60: Web Server - Reverse Proxy - Example 1 - Empty site created
Statistics
Each site in IPBrick uses Advanced Web Statistics to display many statistics
about the site accesses, the same software used for proxy statistics. To access the
statistics just go to IPBrick.C - Web Server, click in the desired site and after
that go to statistics.
You can get some useful information like you can at left side of Figure 4.63.
In FTP Server it’s possible to manage single FTP accounts. The accounts can
be associated to simple Unix system users or to IPBrick websites.
4.7.1 Definitions
Clicking on Insert will present this fields (Figure 4.65):
• If account location was changed: You may keep the current folder and
create a new one or choose other options, such as:
• Access permissions: Can have only read permission or read and write
permissions.
Access log
The access log option permits the visualization of all FTP accesses. It’s possible
to filter them by:
• Duration;
• User;
• IP;
• Notes:
– Upload
– Connected;
– Disconnected;
– Wrong password;
– Illegal user;
– Timeout/Locked.
• File
Available options:
4.7.2 Statistics
The FTP statistics page presents you with the global and individual user statis-
tics.
The FTP statistics presented here are based in AWStats 17 . AWStats is power-
ful log analyzer which creates ftp server statistics reports based on data contained
in server logs. Data is then graphically presented in easy to read web pages.
http://awstats.sourceforge.net/
The general Statistics page, as the name suggests presents the totality of up-
load and download traffic statistics in a multitude of forms (Graphic, tables, lists).
You may check when the FTP server has been accessed, who had access to the
FTP server, the FTP traffic (download/upload) and also the executed operations.
17
Advanced Web Statistics
4.8 Groupware
At the Groupware page you may click on the Modify link and alter the following
Groupware settings:
• Groupware definitions:
• Global Options:
– Login Image: Upload here the login image (this image is displayed at
the authentication page);
– Logo Image: Upload here the login image (regardless of the uploaded
image file, the displayed size wil be: 88x34px);
– Can export addresses from GAL?: Select YES or NO to enable user export
of IPBRICK Contacts addresses via GAL18 . By default YES
– Administration Users: Select the Groupware administration user to im-
port settings. By default, administrator
Each group of the following options presents you with a record of various set-
tings done at IPBRICK Groupware. When you click on the Import button any new
changes will be presented according to its type with the Block option to prevent
users to access the corresponding features. If there no record of any configuration
it will be displayed as No Records.
4.9 VoIP
This section deals with the management interface of the VoIP19 service available
in IPBRICK.
The VoIP (Voice Over IP) technology allows phone calls through an IP network,
thus enabling phone calls through the Internet. The main advantages for the use
of VoIP are: reduction of expenses because the rates don’t follow the conventional
telephony model; better service quality, since commutation by packs does a better
use of the existing network resources, different from the circuit commutation.
19
Voice over IP
The IP Telephony concept sometimes mixes up with VoIP, but they are not
exactly the same thing. The IP Telephony uses VoIP service and defines itself
as the group of services and applications that allow companies to reduce phone
expenditures.
Signalling VoIP service needs a protocol to signal the calls. The signalling
protocol used by IPBrick is SIP, but there are others such as H.323, MGCP,
Jingle, IAX, H.248/MEGACO etc. SIP20 allows calls and conferences through IP,
and those calls may include audio, video, images, etc. This way, the SIP protocol
is responsible for all the processed calls between users, regardless the content of the
call itself. The IPBrick.GT acts as an authentic PBX IP and it can route the calls
to/from a traditional PBX, Internet, LAN and PSTN. All the PBX management is
made by a software called Asterisk. Asterisk is compatible with several signalling
protocols, including SIP. The routing work is made by another software that is
acting as SIP proxy - OpenSER.
The VoIP features accessible through the web interface are presented next.
• Enable SRTP: It’s possible to enable or disable the SRTP21 . SRTP encrypts
your communications making them more secure.
• Description: This field should have a text description about the phone;
NOTE: If the inserted phones have become far too numerous to be displayed or
searched efficiently, it’s possible to retrieve a phone by its name, simply by using
the various search links displayed on the Machines Management page. There’s
alphabetical and numerical quick links, as well as the possibility to open a Search
pop-up window or to display all machines on one page (List all link).
• SIP address: It’s the default user email and can’t be changed here;
• Alternative addresses: It’s possible to define multiple SIP addresses for a
user. Persons can call user using the default SIP address or the alternatives
(click on the + icon to add alternative addresses);
• Default Phones: IPBRICK will manage this phone specifically for this user.
When selected here, the phone is no longer available to any other user;
• User PIN: Defines the user PIN and must be numeric. This PIN can be used
for multi functions: Phone locking, access classes, voicemail and call queues.
User can’t change PIN;
• Password: Defines a password and must be numeric. The password can be
used for phone locking, access classes, voicemail and call queues. A user can
change the password too from the myipbrick site;
• User access validation: For authentication it can be used only PIN or PIN and
password. When the authentication process begins for some funcionality, the
user will listen one Asterisk message to enter the User ID (PIN) and another
one to enter the Password.
• Caller ID: The caller’s ID message that will appear at the destination’s phone
display;
• Follow Me: This is a important field. Here we can associate users to a specific
internal phone or external. So when someone in the LAN or Internet make
a call to the user SIP address, it will ring the phone that is defined here.
Off course it will work if internal/public DNS zone is properly configured. A
user can change the phone address at myipbrick site.
– Phone: The user will be associated to an internal SIP phone registered
in IPBrick;
– User: You may associate another user’s phone by selecting this option;
– Agent: The user will be associated to an Agent registered in IPBrick
– External: The user will be associated to another phone. It can be a
external SIP account, PSTN number, PBX extension, mobile number
etc. When somebody in Internet or from the user UCoIP site make
a call, if IPBrick have routes to make the call it will call the external
number specified here.
• Follow Me Mode: It can be Group or Sequence. If it is Group the call will
ring on all phones configured in Phone Address. If it is the latter the call
will ring in sequence, according to the order of insertion;
• Voicemail enabled: By default, YES;
• Personalized voicemail: By default, NO. If you select yes a new field will
appear that will enable you to upload a personalized voicemail file (mp3/wav
only);
• PIN: 111#003512255443322
• PIN and Password:111#1234#003512255443322
Call queues
If some call queues are configured, a user can be associated as an agent (Figure
4.80). The waiting mode can be as:
• Music on hold: The phone will be immediately part of the call queue. The
user will listen to music until a call is received;
• Callback: Only if the agent receives a call from the call queue, the phone
will ring;
Figure 4.80: VoIP - Users Management - Access classes and call queues
4.9.3 Functions
This section allows you to configure all the IP PBX functionalities splitted into
inbound and outbound services.
Inbound
Call Groups
In this interface (Figure 4.81) it’s possible to define answering groups, (i.e., a
group of telephones which shall ring simultaneously when the access to the group
is made). To define a group it is necessary to fill these fields:
– DID: If the IPBrick has a ISDN telephony card, the PSTN DID (Direct
Inward Dial) that will call this service needs to be inserted;
– ANA: If the IPBrick has a analogic telephony card, will be the direct
PSTN number that will call this service;
– SIP: It’s the specific SIP address that will call this service;
• Caller IDs restriction: Will restrict the route only for the listed caller
ID’s;
Attendance seq.
– DID: If the IPBrick has a ISDN telephony card, the PSTN DID (Direct
Inward Dial) that will call this service needs to be inserted;
– ANA: If the IPBrick has a analogic telephony card, will be the direct
PSTN number that will call this service;
– SIP: It’s the specific SIP address that will call this service;
• Caller IDs restriction: Will restrict the route only for the listed caller
ID’s;
• Sequence positions
IVR Attendance
In this section it’s possible to define interactive answering menus (Figure 4.84).
You need to click Insert to add a new one:
– DID: If the IPBrick has a ISDN telephony card, the PSTN DID (Direct
Inward Dial) that will call this service needs to be inserted;
– ANA: If the IPBrick has a analogic telephony card, will be the direct
PSTN number that will call this service;
– SIP: It’s the specific SIP address that will call this service;
• Caller IDs restriction: Will restrict the route only for the listed caller
ID’s;
• Number of desired shortcuts: Choose how many options does the menu
have;
• Response timeout: Time that the user has to choose an option, after they
heard the message. By default 10 seconds
An IVR can have only an attendance message without any shortcut or direct
access, e,g.: A message just saying that the company is closed, so that IVR can
be used at the scheduling.
Call Conference
• PIN: Code which shall allow the users to connect to the conference;
– DID: If the IPBrick has a ISDN telephony card, the PSTN DID (Direct
Inward Dial) that will call this service needs to be inserted;
– ANA: If the IPBrick has a analogic telephony card, will be the direct
PSTN number that will call this service;
– SIP: It’s the specific SIP address that will call this service.
• Caller IDs restriction: Will restrict the route only for the listed caller
ID’s;
Here (Figure 4.87) it’s possible to activate or deactivate the option of calls on
hold.
Scheduling
This option (Figure 4.89) allows you to define the daily behavior of the IP
PBX. Usually this is the most important inbound service because from here, we
are able to call all the other configured services.
It is necessary to click option Insert (Figure 4.90) and configure the first
parameters:
– DID: If the IPBrick has a ISDN telephony card, the PSTN DID (Direct
Inward Dial) that will call this service needs to be inserted;
– ANA: If the IPBrick has a analogic telephony card, will be the direct
PSTN number that will call this service;
– SIP: It’s the specific SIP address that will call this service.
• Caller IDs restriction: Will restrict the route only for the listed caller
ID’s;
• Click Insert;
Fields explanation:
• Destination type: Where shall the call be routed if the rule defined next
is equalled. Options:
• Destination: Telephone address or specific service name were the call shall
be routed;
• Hours: Beginning and end hour, from the timetable in which the rule shall
be valid (format hh:mm at each field);
• Weekdays: Weekdays in which the rule shall be valid. If not chosen it will
use all days;
• Month days: Days of the month in which rule shall be verified. If not chosen
it will use all;
• Months: Months in which the rule shall be valid. If not chosen it will use all
months;
NOTE: If you don’t select any hour or days of the week/month, hour or
months, the rule shall be valid respectively for all the day. A rule like this one is
called the default rule;
DISA
DISA22 (Figure 4.92) is a service that allows that someone that is not directly
connected to IPBrick or the PBX central, to obtain an internal call sign and
execute calls as if he/she was directly connected to the internal network. The user
calls the access number to DISA and he/she should type a password followed by
the key ”#”. If the password is correct, the user shall hear the sign indicating that
he/she may dial the number. You can also enjoy this service without a password
if you want to. The fields necessary to configure a DISA are:
– DID: If the IPBrick has a ISDN telephony card, the PSTN DID (Direct
Inward Dial) that will call this service needs to be inserted;
– ANA: If the IPBrick has a analogic telephony card, will be the direct
PSTN number that will call this service;
– SIP: It’s the specific SIP address that will call this service.
• Caller IDs restriction: Will restrict the route only for the listed caller
ID’s;
• Allowed caller ID’s: Callers identifiers list which may accede to this ser-
vice. Insert only one by line.
Callback
Callback feature have the main objective to save costs on internacional calls.
It allows people to call to the IPBrick callback service, the IPBrick will hangup
the call and call back to that number that made the call. That callback usually
will be made using a VoIP operator SIP account, so with a low cost.
– DID: If the IPBrick has a ISDN telephony card, the PSTN DID (Direct
Inward Dial) that will call this service needs to be inserted;
– ANA: If the IPBrick has a analogic telephony card, will be the direct
PSTN number that will call this service;
– SIP: It’s the specific SIP address that will call this service.
• Caller IDs restriction: Will restrict the route only for the listed caller
ID’s;
• Callback type:
1. Callback any number: No matter the number that made the call, the
call will be finished, will ring a defined internal phone and when someone
22
Direct Inward System Access
Call queues
Here (Figure 4.96) it is possible to define waiting queues. When calling to the
telephone defined in Direct Access the caller shall be placed on hold if there is
another call to be answered. An answering message may be defined which shall be
heard when the call is on hold. It is also possible to choose messages by default in
Select queue information from the line which may inform the caller about his/her
position in the line and the time interval between those messages.
• Phone Display Message: You may opt to display several messages: Incoming
number, Incoming number and Queue name, Queue name and Incoming number
and finally you may create a Custom message;
– DID: If the IPBrick has a ISDN telephony card, the PSTN DID (Direct
Inward Dial) that will call this service needs to be inserted;
– ANA: If the IPBrick has a analogic telephony card, will be the direct
PSTN number that will call this service;
– SIP: It’s the specific SIP address that will call this service.
• Caller IDs restriction: Will restrict the route only for the listed caller
ID’s;
• Allow new calls in queue when there aren’t any logged users: Even
if there’s an empty queue you may Forward the call and select its Destination
• Leave queue when there are no logged users: The call wil leave the
queue if there’s no users available. By default, this option is inactive;
• Leave queue when press key: By default, NO. If you select YES a new
option to create a Shortcut will appear. Please insert the Key, select the
Destination Type and Destination. The Remove button enables you to
delete the Shortcut;
• Attendance timeout: Period of time (seconds) at the end of which the caller
shall be put on hold if the call is not answered, even if there is no one else
on hold;
• Attendance policy: How the waiting line answering telephones should an-
swer the calls:
– Ring all: All available telephones ring until one of them answers;
– Round Robin with memory: Each telephone rings at the time, but it
remembers which was the last one to ring;
– Least recently called phone: The call goes to the member that for
the longest time hasn’t answered;
– Phone with fewest completed calls: Will ring the telephone with
less answered calls.
• Wrap up time after call received After the call is answered this option
sets the time By default, 0 seconds;
• Pause users when they fail to answer a call: By default, this option
is set to No. If enabled the user who can’t answer a call will be paused;
• Listen to new call tone when user is with a call This option will
change the call tone if the user is busy. By default this otion is set to
Yes;
When a call queue is inserted there are the following options at the top: Back,
Modify, Delete and Members. So the next step is to define what IP phones or/and
LDAP users will be associated to the call queue. Clicking Members you will get a
list of phones and users, like shown at Figure 4.97.
Current Users
At this page (Figure 4.98) you will be able to visualize a table with all the
current users by Name, Login, State and Extension.
Boss/Secretary Group
You will be able to set which users, or phones, will be ’bosses’ or ’secretaries’
and add priority numbers (numbers who will ring in the same manner on both the
secretary and boss’ phones).
At the new Insert page (Figure 4.100) you will have these options available:
• Boss: Clicking on the + icon will open the boss’ options into two pop-down
lists:
– The first let’s you select the type of ’boss’, if it will be a Phone or a
User. If you select phone you will assign a particular phone to a boss.
If you select user you will assign all the user’s associated phone settings
(ie: phones, aliases) configured at the VoIP user’s management;
– The second pop-down list presents you all the available phones or users
(depending on the choice made on the previous pop-down list);
• Secretary: Clicking on the + icon will open the Secretary’s options into two
pop-down lists:
– The first let’s you select the type of ’secretary’, if it will be a Phone or
a User. If you select phone you will assign a particular phone to a sec-
retary. If you select user you will assign all the user’s associated phone
settings (ie: phones, aliases) configured at the VoIP user’s management;
– The second pop-down list presents you all the available phones or users
(depending on the choice made on the previous pop-down list);
The number 40100 will be a priority number, ringing in the same manner on
both phones.
Click on the Insert button to save the Boss/Secretary group settings (Figure
4.102).
Outbound
Access Classes
It is possible to define access rules for the existing telephones. For that it’s
necessary to click on the connection Insert and fulfil the following fields (Figure
4.103):
• Prefixes: It allows to add to the authorized prefixes list the prefixes which
may be used in the telephones under the access rules. By default all the calls
are blocked except the Authorized prefixes;
To confirm and create a defined rule, click Insert. Now it is possible to add
the members under that rule, clicking the name of the rule and then Members
(Figure 4.104). To remove or add SIP phones to the access class you only have to
click the buttons or respectively.
Speed Dial
The speed dial allows the association between an internal address and a tele-
phone external to the organization. That is to say, the users call an internal
number (or address) and this is associated to a telephone external to the organiza-
tion. Example: An external alternative address of the telephone [email protected] is
Choosing Speed Dial and clicking Insert we have two fields (Figure 4.105):
Note: If you wish you may add another speed dial, simply click on the Add
button. Click on the Remove button to erase the speed dial.
If the IPBrick has routes, it’s possible to insert in speed dial field legacy PBX
extensions, GSM and PSTN numbers etc.
4.9.4 Monitoring
Online Phones
The VoIP clients who are actually active and ready to execute and receive calls
can be visualized here (Figure 4.106).
Call Statistics
Finished Calls
Detailed statistics about all the finished calls. At the main menu we have:
General statistics relating to the filter criteria:
• Call number: Total number of calls;
• Total call time;
At Access Management (Figure 4.107) we can manage the LDAP users that
will have access to callstatistics website.
You may select the users who access to Call Statistics from the System users
by simply clicking on the desired username and then on the arrow button pointing
to the desired box.
23
Is the measure of the variability over time of the latency across a network
In the call list we have specific statistics (Figure 4.108) relating to the filter
criteria (Figure 4.109):
• #: Call identification;
• User: Username
Clicking at one of this check boxes will order the calls by that field.
Current calls
In this menu we have statistics about the current calls, with this fields:
Call Recording
NOTE: This feature is only available after installing and licensing the UCoIP
Recording .deb package available at our eshop!
Figure 4.110: Call recording requires licensing and the UCoIP recording package
It’s possible, in IPBrick, to enable the recording of all calls, placing the archived
records in the Document Management and Workflow System, iPortalDoc. Users
with higher privileges may listen to calls as they happen. Enabling configuration,
two other options will appear (Figure 4.111):
• Record format: MP3 or WAV;
• iPortalDoc URL: Specify the existant URL(s) for the iPortalDoc server(s).
If iPortalDoc is not installed, it’s not possible to use this feature.
The next step is to define which SIP phones will have their calls recorded. This
can be defined at Advanced Configurations - Telephony - Registered Phones.
A new field called Call Recording is now present with the following options (Fig-
ure 4.112):
• None: The phone will not have its calls recorded;
• Incoming: Only the incoming calls will be recorded;
• Outgoing: Only the outoing calls will be recorded;
• All: All the calls will be recorded.
The high privileged iPortalDoc users can now listen to the calls at the workflow
calls;
At the top right corner of the Call Recording page there’s two additional links
(Figure 4.113)
• Phones Management
• Additional Numbers
Phones Management
This feature enables you to manage the call recording on the internal phones.
If you click on the phone’s name a new page will be visualized (Figure 4.114)
where you will be able to select from the following options:
Additional Numbers
By clicking on this link you will be redirected to a new page where you will
visualize the list of added numbers, if you click on Insert you will be able to add
a new number or prefix (Figure 4.115). These are the available fields:
• Call Recording: This let’s you choose which calls to record. As in Phone Management
select from None, Incoming, Outgoing or All.
Call Supervision
The call supervision permits to supervise some specific IP phones. The idea is
to guide the person answering a call in a super-visioned phone. It’s a functionality
that can be useful for technical support departments.
The first step to use call supervision is the feature activation. This is done at
Advanced Configurations - Telephony - Configurations - Call Supervision
(Figure 4.116).
– Only Spy: The supervisor will only be able to listen to the call;
– Only Whisper: The supervisor will be able to speak, but only to the
person who’s answering the phone. The supervisor will not be able to
listen to the call;
– Spy and Whisper: The supervisor will be able to speak (only to the
person who’s answering the phone) and listen to the conversation.
• Call Supervision Group Members: To define what phones are able to lis-
ten/supervise calls (Figure 4.118);
• After that a beep will be listened and the supervision will start, so the call
will be listened and you can talk only to the person that is at the supervised
phone. The remote person can’t hear the supervision.
Call manager
The Call Manager (Figure 4.119) is a Flash application that allows to visualize:
the state of each extension, if it is online and if it is doing calls, state of the lines
and SIP servers. You can also end calls through this interface when authenticated.
The configuration of the call manager (Figure 4.120) is made from the IPBrick
web interface in IPBrick.C - Voip - Call Manager, and it is necessary to click the
connection Change. By default are shown the state of all registered telephones,
ports of each RDIS and analogic plate, state of the waiting lines, conferences and
SIP servers. Some of these fields cannot be shown if we remove them in Show fields.
In the configuration page you have the link to the call manager which may be
acceded from the LAN. It might be necessary to define the alias call manager in
the DNS server of the network.
If it is not possible to visualize all the extensions, lines and servers of the call
manager, it is necessary to move the mouse to the right side of the page and the
remaining ones shall be visible. In this version of Call Manager we can do some
operations when the administrator password is inserted:
In the screen appear all the telephones, routes, interfaces, etc., which shall be
registered in IPBrick. However, there are differences, if the telephone has a visible
IP address, it means that it is active, otherwise it will be deactivated. If the tele-
phone is represented in red, it means that a call is in progress and its duration is
indicated.
• SIP servers list for registering: Allow to receive calls for SIP numbers asso-
ciated to SIP accounts;
• PSTN-LAN: It allows the call routing from the telephone network to the
VoIP phones of local network. So it’s a internal IPBrick route than can
redirect the received calls from the PSTN to VoIP phones;
• PBX-LAN: It allows the call routing between the telephones connected to
the PBX and the VoIP telephones of local network;
• LAN-PBX: It allows the call routing from the VoIP telephones in local net-
work to the telephones of the PBX;
• LAN-PSTN: It allows the call routing from VoIP phones to telephone net-
work;
• INTERNET-PBX: It allows to accept VoIP calls from the Internet and route
them to PBX phones. It’s a IPBrick internal route only for call redirection;
• INTERNET-PSTN: It allows to accept VoIP calls from the Internet and
route them to the telephone network network. It’s a IPBrick internal route
only for call redirection;
• PBX-PSTN: This is a default internal route. It allows the call routing from
the PBX to telephone network. 24
24
It’s possible to call from phones connected to PBX and, if IPBrick is connected to PSTN
and to a PBX, you can also answer calls. IPBrick will work in a transparent mode, switching all
the traffic from PBX to PSTN and vice-versa.
• PSTN-PBX: This is a default internal route. It allows the call routing from
the telephone network to the PBX.
If there are other configured interfaces (acting like trunks), they may be added
to the list of routes, and for that it is necessary to click the connection Available
Local Routes (Figure 4.122) and then add the necessary routes.
The Insert in the top menu allows to insert one of the routes mentioned. After
insertion, each type of route has a connection that allows its configuration. When
acceding to this interface it is possible to choose one of these options:
• Back
• Insert: It allows to add the prefixes that must be added to this route. When
you indicate a prefix, all the calls whose initial digits coincide with that digit
are routed by that route. Choosing Advanced Options we have this options
(Figure 4.126):
– Prefix: The numeric prefix to use to make calls using that route;
– Include prefix in address: If Yes the prefix will be part of the
destination number, so the prefix will be maintained when the call is
routed. If No the prefix will be used only to identify the route. Example:
To enable the use of number 6 to route a call to the Portuguese PSTN
network, it is necessary to remove this prefix in order that the number
stays with the correct format (the format 2XXXXXXXX instead of
62XXXXXXXX).
– Postrouting prefix: It’s a prefix added by the IPBrick when the
number is received. Example: For the Portuguese PSTN network we
use the format 2XXXXXXXX. If we use has main route a SIP account
route it’s necessary to use prefix 2, include prefix in address and use
a postrouting prefix with 00351 (351 is the portuguese international
code);
– Caller IDs restriction: Will restrict the route only for the listed
caller ID’s;
– Fallback routes: It’s a backup route to use if the present one fails;
– Generate local ringing tone: Will generate a local ringing tone.
Can be used when it can’t ring at the destination phone;
– Priority: Define the prefix priority level.
Outbound routes
This option enables you to configure which calls shall be routed to a external
server which, in turn, shall be responsible for routing them to their destination
(Figure 4.123). This routing is made through prefixes that may be inserted clicking
the name of the route and then the link Insert above the prefixes table. To change
or remove a route you only have to click its name and then the option Modify or
Delete, respectively.
To add a new outbound route click Insert. The Basic Options are:
• Type: Type of signalling protocol to use: Can be SIP, SIP with TLS, IAX
or Local;
• Video support: If the VoIP server supports video, you can enable that
option;
• Registration realm: Realm is usually the SIP server FQDN but some SIP
servers have different server address and registration realm;
• Outbound proxy: Usually not used but is a server that passes the SIP mes-
sages between the SIP client and the SIP proxy server;
• Available to Internet: With this option selected, the route shall be avail-
able for VoIP telephones outside the LAN;
• Call limit: Number of possible simultaneous calls using that route, that
can be useful for bandwidth control. With 0 we can disable it;
• State check: This feature permits you to verify if the entity is online or not,
i.e.: on a phone it will check if there’s online activity, if wether by accident
or deliberate the IPBrick will know that the entity is no longer available. By
default this field is set to No;
• Name;
• Server Address;
• Server Port;
• Available to Internet;
• Call limit.
• Type: Local
• Name: Type your local server’s name
But if you click on Advanced Options a new set of fields will appear:
• Mandatory Route: A mandatory VoIP route will have priority over any
other. Dialed numbers (including prefixes) associated to a mandatory route
will overlap any other match, even if this match is with a local phone, an alias
or any other direct access (including IVRs, Attendances Sequences, queues,
etc.);
Prefixes
The prefixes inserted in any of these outbound routes shall be available auto-
matically for the SIP telephones and the telephones connected to PBX.
• Postrouting prefix: It’s a prefix added by the IPBrick when the num-
ber is received. e.g: For the Portuguese PSTN network we use the format
2XXXXXXXX. If we use has main route a SIP account route it’s necessary
to use prefix 2, include prefix in address and use a postrouting prefix with
00351 (351 is the portuguese international code);
• Caller IDs restriction: Will restrict the route only for the listed caller
ID’s. Click on the ADD button to insert a restriction;
• Fallback routes: Should any failure occur, you may set an alternative
route. Click on the ADD button to insert a fallback route;
Codecs
For each outbound route it’s possible to set which codecs are going to be used
(click on Modify) as well as their priority (Order option).
Here it’s possible to visualize the SIP28 address list which have already been
configured (Figure 4.128). When inserting a new one, the page generated asks for
the following data:
After typing in the data, it is necessary to click the button Insert to confirm
the address. The next step is to register accounts to the local SIP server. Pressing
Insert we have this options:
• Login: SIP account login. Normally it’s the nomadic SIP number;
Note: To configure the internal number to where the operator will transfer the
incoming calls from the Internet to that nomadic number, just create a Phone at
Phones Management, IVR, Call Group etc. at Functions > Inbound.
Note: In order to define the destination of the received calls, you should con-
figure a Speed Dial or use a function to that purpose.
28
Session Initiation Protocol
• Spanish: asterisksounds4ipbrick_es.tgz
• French: asterisksounds4ipbrick_fr.tgz
• Dutch: asterisksounds4ipbrick_nl.tgz
• German: asterisksounds4ipbrick_de.tgz
• Portuguese: asterisksounds4ipbrick_pt.tgz
By default, IPBrick comes with just the English voice prompts already installed
and ready to use (Figure 4.131). But as soon as you add more packages you will
be able to select them as default.
To add another language, please download the package at our eshop (or use any
other compatible packages you have in your possession) and install it, by clicking
on the Insert link, at the Voice Prompts page (Figure 4.130).
At the new page (Figure 4.132) name the voice prompt package and select the
language, this is a double-check procedure in order to ensure that you are adding
the correct file. Click on Browse... to select the .tgz voice package.
4.9.8 Dialplan
At Dialplan you will be able to check the information tables for the internal,
Inbound and Outbound routes. It will also be possible to do quick modifications,
simply by clicking on the corresponding icons.
At the top of the page there’s a Filter (Figure 4.133) where you will be able to
select if you want to visualize All or just the Internal (Figure 4.134), Inbound
(Figure 4.135), Outbound routes (Figure 4.136), simply select which one you wish
to see.
These tables are arranged by Number, Type and Interface for the source and
destination. On all of them, you will be able to select the number of entries to be
visualized (10, 25, 50, 100, 250), order the table by column, read the Description
to each row and there’s also a search box so you can make your queries.
It is also important to note that besides each row showing one element of the
table, there’s a dedicated All row for the inbound and outbound routes.
There are also three types of icons (Figure 4.137) with different results depend-
ing of their location:
• Add: Clicking on this icon will open a new window: VoIP Routes Management
Prefixes, enabling you to add prefixes.
• Edit: This will open a new window where you’ll be able to alter the corre-
sponding settings.
– At the Internal table the edit icon will open the Telephony Configurations
Modify page.
– At the Inbound table the edit icon will open the VoIP Functions
Inbound Call queues <The respective queue> Modify page.
– At the Outbound Routes table the edit icon will open the Telephony
Configurations Modify page.
• Delete: Clicking on this icon will erase the corresponding route or call queue.
At the new window simply click on the Delete button to confirm or the Close
button to cancel the action.
4.10 IM
IM (Instant Messaging) is a service that lets you exchange text messages at
near-real-time speed. IPBrick’s IM server is ejabberd, an IM server based on the
Jabber (XMPP) protocol.
With this server you can communicate both using the Jabber protocol and the
MSN protocol through a MSN gateway. Access to MSN contacts is controlled by
this web interface. By default, the IM service, when enabled, blocks access to all
MSN contacts, except the ones explicitly authorized in this web interface.
It is also possible to record all chat conversations, this will require the ucoip4iportaldoc
v2.1 package, available at our eshop in:
NOTE: This feature is only available after installing and licensing the UCoIP
Recording .deb package available at our eshop!
Figure 4.141: Chat recording requires licensing and the UCoIP recording package
IPBrick.GT
All the services except Fax and UCoIP page are presented at IPBrick.C menu:
• VoIP;
• IM;
• Fax Server;
• E-Mail;
• SMS;
• Web Server;
• Groupware.
The FAX Server configurations are implemented through the web interface in
IPBrick.GT - FAX Server (Figure 5.1).
IPBrick provides you these two services: FAX2Mail e Mail2FAX. With the
FAX2Mail service, a FAX sent by an external FAX device is received by the FAX
5.1.1 Fax2Mail
To configure this service you have to click on the Modify link and select Yes to
Enable Configuration. The following options are displayed:
• Main Fax Number: The PSTN Fax number to be present when a FAX is
sended;
• Area Code: Area phone number code to be present when a FAX is sended;
• Rings Before Answer: Number of rings before IPBrick answers to Fax. Can
be useful if another FAX equipment is connected. For example, if the FAX
equipment can’t receive the FAX, IPBrick FAX server can answer at the 5th
ring;
• Sender of notifications: It’s a internal email account that will send notifica-
tions to users that are using the Mail2FAX. Examples: Error sending fax,
task completed etc. By default we use IPBrick Fax Server that will use
the current domain;
• Attach Original File in the notification: Choose YES if you wish to attach
the file in the notification (by default this option is set to NO)
• Fax resolution: Define the vertical resolution of the fax. There are two
resolution modes, a normal resolution of 98 lines/inch and a high resolution
of 196 lines/inch;
• Number of attempts to send the fax: Number of tries attempts to send the
FAX. By default will terminate a job if 3 consecutive attempts to send a
particular page fail;
• Maximum time to send the fax: Sets the time that a fax have to be sent.
Stop the process if it does not complete in the indicated time.
If you access the menu again, there will be two new options near the link
Modify: Fax Users and Fax Interfaces
Fax users
In Fax users (Figure 5.3), you can set which users may be authenticated in the
Fax client application and which will have permissions to manage Fax queue lists.
The FAX client can be WinPrintHylafax that is available for download at:
http://winprinthylafax.sourceforge.net
The benefit in using a FAX client at the workstations side is the possibily
to print any document directly to HylaFax, so it’s an alternative to Mail2FAX
explained down.
Fax Interfaces
In this page (Figure 5.4) you will insert any number of interfaces that you deem
necessary.
Depending on the choices you make, these are the presented fields:
• Name: The name you will give to the interface, e.g: fax1
– Foip - SIP: FoIP stands for Fax over IP and refers to the process of
sending and receiving faxes via a VOIP network.
Server address: The server’s url (eg:voipbuster.sip.com)
Authentication: There are two options:
-Fixed IP: A static IP
-User/Password:
–User: Type the user’s name
–Password: Insert the desired password
–Retype Password: Confirm the password by re-typing it.
– Telefony Card: Choose the type of Interface:
-PSTN
-PBX
– Foip - T38: Fax over IP works via T381 and requires a T38 capable
VOIP gateway as well as a T38 capable fax machine, fax card or fax
software. Fax server software that can talk ’T38’ allows sending and
receiving faxes directly via a VOIP gateway and, consequently, does not
need any additional fax hardware. As with FoIP SIP you will have two
modes of Authentication:
-Fixed IP: A static IP
-User/Password:
–User: Type the user’s name
–Password: Insert the desired password
–Retype Password: Confirm the password by re-typing it.
1
T38 is a protocol that describes how to send a fax over a computer data network. T38 is
needed because fax data can not be sent over a computer data network in the same way as voice
communication.
– Serial Fax Modem: If the modem is connected to the server serial port
you should choose the port that connects to the the modem in the
Serial Ports list (S0 to S7), the Baud rate (1200 to 38400) and Class of
the modem (Class1 to Class2.1). To know the appropriate values you
should read the modem manual
• Number of virtual fax machines: Define the number of virtual FAX’s to use;
T38
We will present next, the necessary steps in order to configure the T38 protocol.
At IPBrick.GT > Fax Server you will activate the FAX service. As soon
as that is done there will appear three links on the top right corner of the page
Modify, Fax interfaces and Fax Users
Click on Fax Interfaces and there will be two types of interfaces FoIP-SIP
and FoIP-T38. Select the latter and create a new interface for your T38 operator.
Click on Insert at Outbound Routes and add a route using the previously
created interface. You may configure it as default gateway or as prefix.
In this example, the FAX default gateway is the T38 operator and the DDI
22XXXXXXX as an entry in T38.
5.1.2 Mail2Fax
In Mail2Fax definitions we have two options:
• Domain for fax sending: It’s a internal domain used just to send FAXES. You
can choose any domain you want, but the recommended one is fax.domain.com.
When the email server receives one message for that FQDN, the message at-
tachment will be forwarded to the FAX server that sends the FAX by the
PSTN;
• Presented source fax number: For each LDAP group it’s possible to define
what would be the source fax number field when someone sends a FAX to
the PSTN (public network, outside, etc.);
After updating the configurations you will be able to send Faxes from a work-
station using a simple email client. At the workstation side just:
• Map an email account pointing the SMTP to the IPBrick or use webmail;
• The subject is optional, so the next step is to attach a .pdf or a .tiff file
that will be the FAX;
Note that you can create a mailing list at IPBrick and insert all the FAX
numbers you want, e.g.: Create a mailing list named [email protected]
and insert at External users list some costumers FAX’s:
[email protected]
[email protected]
[email protected]
...
5.1.3 Statistics
This menu displays the statistics about Sent Faxes, Incoming Faxes and in
course tasks.
Sent Faxes
Visible fields:
Received Faxes
Visible fields:
• Reception date;
Running
The monthly FAX statistics are automatically sended to the Sender of notifications
email.
Outbound
The prefix definitions are as follows:
• Fax interface:
• Prefix:
• Default gateway: If you check this field. the next options will obviously be
unavailable:
Inbound
These are the available inbound number definitions:
• Fax interface: Select the desired interface, you have inserted, from the pop-
down list
• Fax Number:
• Send to: At this moment the single option available is sending to email
• Destination: Is the email address where the IPBrick incoming faxes are for-
warded;
• File type: The faxes will be delivered in these formats: pdf, ps or tiff.
At the new page you will have available the editable options for:
• Users with administrative privileges
• UCoIP Page Parameters
Each has a dedicated Modify link. Clicking on one will let you alter the corre-
sponding settings.
If you click on the user privileges you will access a new page where you will be
able to select which users, from the roster, will have administrative privileges and
access the UCoIP Page Management Interface.
The procedure is exactly the same as choosing any other user in IPBrick.
Simply select the user(s) by clicking on the desired username and then on the
arrow button pointing to the desired box. You may also double-click a user to
transfer him.
When you have finished selecting users, click on the Back link to return to the
UCoIP page settings.
If you now click on the Modify link pertaining to the UCoIP page parameters,
you will access the available editable settings.
The only parameter available for edit by the common user is the Description
visible at his/her UCoIP page. All other options are barred to the regular user,
but you may alter these settings.
• Title: Configure Yes if you wish to let the user change the UCoIP page’s
title. By default, No
• Logo: Configure Yes if you wish to let the user change the UCoIP page’s
logo. By default, No
• UCoIP Page Style: Configure Yes if you wish to let the user change the
UCoIP page’s style., No
• Social Networks Links: Configure Yes if you wish to let the user change the
UCoIP page’s links. By default, No
• Description: Configure No if you wish to block the user from changing the
UCoIP page’s description. By default, No
At the new page you will be able to access The UCoIP Page settings.
The UCoIP Page settings page presents you with several editable settings (de-
pending on your permissions). The same ones you set at the UCoIP Page Man-
agement Interface.
• Facebook URL: Type the URL for your company’s Facebook page;
• Twitter URL: Type the URL for your company’s Twitter page;
• Google+ URL: Type the URL for your company’s Google page;
• Linkedin URL: Type the URL for your company’s Linkedin page;
Also available, to the administrator, is an interface that let’s you define impor-
tant components of the UCoIP page, such as the visible logo, social media links,
page style etc. As we have seen, these components may or may not be altered by
the users.
http://ucoip.domain.com/admin/
After authentication, the interface will display the UCoIP Page Settings page.
• Logo: The page’s logo. Upload an image file with the dimensions: (max
width: 400px - max-height: 70px);
• Facebook URL: Type the URL for your company’s Facebook page;
• Twitter URL: Type the URL for your company’s Twitter page;
• Google+ URL: Type the URL for your company’s Google page;
• Linkedin URL: Type the URL for your company’s Linkedin page;
If you click on Style at the side menu you will open the Style page. Here, you
may alter the color scheme by clicking on the Modify link.
When you click on the Modify link you will be presented with the edit page
were you will be able to alter the color, for each of the available settings. Simply
click on each square to present a color palette. You may also upload a background
image (width: 1068px - height: 442px).
IPBrick.SEC
• Anti-virus;
• Intranet Security;
• Firewall;
• VPN server;
• Firewall;
• Proxy;
• VPN;
• E-Mail;
• Groupware.
IPBrick.4CC
IPBrick.4CC allows you to manage services, virtual machines, users and desk-
tops, significantly reducing the time and expense.
This solution is easily managed via a simple web interface and adapts to all en-
vironments, allowing users to have different working environments simultaneously,
e.g: Windows and Linux.
Since all the content that would be in the usual PCs happens is in a single
server, you no longer need a technician to intervene in every PC. Thanks to IP-
Brick.VDI and the cost per job decreases dramatically. In addition, the solution
reduces the time spent on maintenance, since all information is centralized in a
single server.
7.1 Hypervisor
The hypervisor is the intermediary between the virtual libraries and the GUI.
There can only be one per host, the Hypervisor is the VDI’s administrative ac-
count. When you enable the Hypervisor you are enabling the IPBRICK.4CC
virtualization solution.
On the new page select YES to enable the Hypervisor and then click on the
Modify button.
You may check, on the newly presented page, that the Hypervisor is now
enabled.
For additional please consult section 3.6 - File Server of this document.
NOTE: If you do not configure a share you will not be able to copy ISOs to it
via a GUI (Windows or Ubuntu). You will have to use the console and copy the
ISOs to the default directory.
We offer you an example of a configuration in order to help you set the 4CC
service.
The first step is to create a share, it is mandatory that you set as permissions
type ACL! ACL enables to assign different permissions to subfolders regardless of
the permissions in the main folder.
7.2 VDI
7.3 Terminal Configuration
IPBrick’s terminal server provides an Operating System to terminal stations
that have no disk (thin clients). Usually a thin client is a low-end computer ter-
minal which only provides a graphical user interface (GUI) to the end-user. The
operating system is loaded through the network and provided to the terminal, that
will have available, for example, a browser or the login console of a Windows server.
7.3.1 Settings
First, you have to activate Terminal Server in IPBrick’s web interface. To
activate, click Modify and choose Yes;
After the activation, you may configure terminal server in this fields:
• Display [2 to 7]:
• Keyboard model: It depends on the number of keys. These are the available
options:
– pc101;
– pc102;
– pc103;
– pc104;
– pc105.
• Keyboard layout:
– de: german;
– es: spanish;
– fr: french;
– pt: portuguese;
– us: english.
• Mouse protocol: Type of protocol used by the mouse in the client station;
• Printer [0...1] type: Sets the printer type you want to use;
• Mode [0...2]: Possible screen resolutions. If you leave these fields without
selection the system will auto-detect the resolution. But if you choose to
select a resolution, always type on Mode 0 the one you think best;
• Color Depth: This is the number of bits to use for the colour depth. Possi-
ble values are 8, 16, 24 and 32. 8 bits will give 256 colours, 16 will give 65536
colours, 24 will give 16 million colours and 32 bits will give 4.2 billion colours!
Not all X servers support all of these values!!! The default value for this is 24.
• Startup Script 01: You may type here a script to be executed. When the
terminal starts, it will run your command.
• Startup Script 02: In case script 01 doesn’t run, you may type here an-
other one to be executed in its place.
• DNS Server: A valid IP for domain name server. if the DNS server is in
the same machine this setting is not needed, but if the DNS is on another
machine you must set a valid IP.
• DNS Domain: Sets a valid search domain in the clients’s resolv.conf file. Used
to build the resolv.conf file. Not needed by default. Needed if DNS SERVER
is set!
• Time Server: The address of a time server (NTP) that the thin client can
set its time from. If unset, the thin client just uses the BIOS time.
• Shutdown Time: Time at which thin client will automatically shut down.
The format is hh:mm:ss in 24 hour format. The default is unset;
• LDM Theme: Type the path for the folder that will hold the LDM themes;
• Encrypted LDM Session: It allows you to turn off or on the encrypted tun-
nel via SSH, and instead run a less secure, but much faster unencrypted
tunnel. the terminal will perform faster but data transmission will be less
secure;
2
Common Unix Printing System
Boot Systems
To load Boot systems (Kernel) click on kernel link (Figure 7.11). The following
fields are displayed:
Boot system configuration:
• Kernel: If you click Archive you should select the Kernel file from the above
link.
Operating Systems
To load the Operating System you have to click in top menu on OS (Figure
7.12), and after that click insert to display the following options:
• Operating system: If you click Archive you should select the OS version
to run.
The Kernel and Operating System files can be downloaded at our eshop:
http://eshop.ipbrick.com/eshop/
At: Downloads -> Software -> IPBrick Related Software -> IPBrick 5.x
(5.2, 5.1, 5.0.1, 5.0)
Note: You have to be registered at our eshop for the Download section to be
available.
For IPBrick 5.x you will need to download the following files:
ipbrick5-ltps5-kernel_1.0.tgz
ipbrick5-ltps5-OS_1.0.tgz
For older versions of IPBrick you need the files root.tgz (OS) and 2.6.9-ltsp-3.tgz
(Boot system).
Machines
If the terminals are registered in IPBrick (IPBrick.I - Machines Management)
you may personalize configurations for a terminal in the machines link (Figure
7.13) by selecting if the default options set in the top menu of configuration are
going to be used.
After loading the boot system(s) and the operating system(s), you should click
Back and Terminal OS and choose the Kernel and the Operating System you want
to use.
After making these changes you have to confirm them by clicking the F4 key.
This procedure makes sure that the client machine will boot from the network.
After the client machine reboots, this machine will now boot via IPBrick.
NOTE: If the login screen of Linux graphic interface appears after the booting
, you have to restart X Server with the keys [CTRL] + [ALT] + [BACKSPACE].
If the same window appears even after the restart, it is possible to validate with
user ltsp and password ltsp.
Several screens may be active for the same client (depending on what was set
in the Number of Displays field of IPBrick). Browsing across screens can be made
with these key combinations: [CTRL] + [ALT] + [F2] for screen 1, [CTRL] +
[ALT] + [F3] for the screen 2, and so on.
7.3.3 Broker
The Broker feature enables the Balancing Service. Load balancing is a tech-
nique for distributing load over a number of servers.
• Memory weight: The value of importance when balancing the available mem-
ory in relation to the CPU. The combined value of memory and CPU weight
must be 1. By default: 0.5 this will mean that the memory and CPU have
equal importance for the broker.
• CPU weight: The importance when balancing the CPU resources. By de-
fault: 0.5. As stated previously the combined value must always be 1. If
you want you may prefer that the CPU has an increased importance, if you
type, for instance, 0.7, but then, the memory weight must be 0.3
• Servers: Server IP. By default: 127.0.0.1. At this option you must type
the IP address of the server(s) that will host the machines. It is possible to
add as much IPs as you deem necessary, simply click on the Add button to
add another IP. To delete one, simply click on the Remove button.
Sessions Manager
At the Broker Modify page you will also have available the Sessions Manager
link, this new page presents the list of all machines groups created in IPBrick.I.
You will need to configure the desired groups to be brokered, in order for the load
balancing to function correctly.
Click on the underlined name of a machine group to open a new page where
you will be able to check the type, server and users that constitute that particular
group.
Click on the Modify link to alter the group settings. At the new page you will
be able to select if the Group Type is made of entirely Windows or Linux machines,
what is their server IP (from the inserted hosts at the Broker modify page). It
is also possible to select from the system users, the ones that will be part of that
group.
The user selection procedure is very simple. Just select the users from the
right box (System) and click on the button with the arrow pointing to the left box
(Group) <<. To remove a user simply invert the process.
Advanced Configurations
Here you have the advanced interface for some services and configurations
present in the upper menus. This chapter is divided by the following main sections:
• IPBrick;
• Telephony;
• Network;
• Support services;
• Disaster recovery;
• System.
8.1 IPBRICK
8.1.1 Definitions
In this section will be treated some very essential IPBRICK server configura-
tions.
Domain Definitions
In Domain Definitions you configure the hostname and the server DNS do-
main. The Fully Qualified Domain Name is composed by the machine name and
the DNS domain. For example, if you have the hostname ipbrick and the DNS
domain company.com, the FQDN will be ipbrick.domain.com. In order to change
these definitions click on Modify.
Network Definitions
At network definitions it is possible to configure the following network interface
parameters:
• Mode: Inferface mode can be static or for the public interfaces it’s possible
to configure the interface as dynamic, so it will act as a DHCP client;
The Modify will change these parameters. The Insert will add a new IP alias
for the interface. Example: eth0:1, eth0:2.
If IPBrick works as an Intranet server (IPBrick.I), it is only necessary to config-
ure the private interface. The public interface may get all the default configurations
and it shall not have a network cable connected.
If the server has more network cards (ETH2, ETH3...), they are listed as private
but no rules will be added automatically to the firewall. This means that all traffic
for that new interfaces will be denied.
If IPBrick works like a Communications server (IPBrick.C) or if it accumulates
the Intranet and Communications functions (IPBrick.I + IPBrick.C), it is neces-
sary to configure the two network interfaces (in these two situations, the server
where IPBrick was installed, shall have two network cards).
To change the network interfaces definitions, it’s necessary to click ETH0 and
ETH1.
The network cards aggregation (bonding) option can provide failover, load-
balance and link speed increase. To get a good experience with bonding the switch
were the network cards are connected must support IEEE 802.3ad Dynamic link
aggregation (Figure 8.2).
For configuration this steps must be followed:
• Have one interface (ex: eth2) present but not configured yet;
• Click at the interface to bond (ex: eth0) and choose to aggregate network
interface cards;
• Click Modify, so the eth0 will be bounded with eth2 and became only one
interface - eth0.
NOTE: The private interface is the first network card detected by IPBrick in
the server where it was installed. If the server has a second network card, this shall
be configured as a public interface. The firewall is already configured by default
with specific rules to recognize the ETH0 as a private interface and ETH1 as a
public interface. If the server has more network cards (ETH2, ETH3...), they shall
be considered as private;
NOTE: The ethernet cards MAC address should be associated to all the in-
terfaces, so when the server reboots the interfaces will be always associated to the
same NIC.
Default route
This menu allows to define the gateway of IPBrick.
Access definitions
• Login: admin;
• Password: 123456.
The login admin and respective password refer, uniquely and exclusively, to
the authentication used to access IPBrick through the web interface and both can
be altered. To edit them it’s necessary to click on Change.
Note: In contrast with the Administrator user this login has no work area
in IPBRICK.
Language definition
IPBRICK is currently available in five languages:
• Portuguese;
• English;
• Spanish;
• French;
• German.
In this section it’s possible to change the language in IPBRICK (Figure 8.6). To
make this change, it is necessary to click on Modify, select the prefered language
and afterwards click on Apply Configurations so that the alterations become
effective.
IPBrick license
This section is about the licensing process of IPBrick. When installing IPBrick,
you will have a trial license of 30 days of use. When this license expires, the server
will remain reachable, since all network settings are kept, but the majority of ser-
vices will not be available until a permanent license is activated.
• Company name;
• Some information about the IPBrick server type (Intranet, Communication
or VoIP server);
8.1.4 Authentication
From the moment the user is created in IPBrick, there shall be a register in
the database of the authentication server - LDAP1 . LDAP is defined as a directory
service where the information, relating to the computer resources of the company
and its users, is kept. Whenever an user intends to authenticate in a certain service
with his/her username and password, the IPBrick LDAP database is consulted to
validate or not the access.
Modify
IPBrick allows several authentication modes and it is configured by default for
all the users to authenticate themselves in their own IPBrick (Figure 8.7):
• IPBrick Master: Default Mode. All the services in the server shall use the
LDAP server;
• Secondary Master IPBrick: Used only under High availability license. See
Appendix E for details.
• IPBrick Slave: LDAP server shall be a synchronized replica of the indi-
cated IPBrick Master server, and this mode is used in a scenery with several
servers. The users may authenticate themselves in this server, once there is a
temporized synchronization of the LDAP database with the IPBrick Master,
but there is no possibility to add users. In networks with a high number
of users where there are several authentications, it is useful the use of slave
authentication servers thus avoiding a congestion in the IPBrick Master net-
work segment. This scenery is also of a great use in networks geographically
distributed (Figure 8.8);
• IPBrick Client: The services authenticate remotely in the indicated LDAP
IPBrick server. In this case, there is no local database copy, and it is nec-
essary to specify the IPBrick Master/Slave server. Normally, this way of
authentication is used in a IPBrick.c in the extent of VPN, PPTP and Proxy
services (Figure 8.9);
1
Lightweight Directory Access Protocol
NOTE: After changing the IPBrick authentication mode, during the Apply
Configurations, the IPBrick will reboot automatically.
Distributed Filesystem
Automount
LDAP is a directory service where the relevant information of a company is
kept: Users, computer resources, contacts, etc. The Automount service combines
the LDAP information with NFS and makes automatically available the accounts
of the users virtually in any Master/Slave server.
Servers
In that option all the servers registered at Master LDAP are presented by the
IP, FQDN and the authentication type (Figure 8.10).
Compatibility Mode
The Compatibility Mode enables you to operate a server cluster with a client
IPBRICK v6.0 and a master IPBRICK v5.x, but before enabling the compatibility
mode, you have to ensure that the IPBrick v6.0 is a Master server.
Procedure
At the High Availability (HA) page you can check straight away your system’s
status, this is where you will be able to configure the HA definitions and check
both the System State and connected Interfaces (Figure 8.18). For more informa-
tion regarding High Availability please consult Appendix E of this document.
To alter the settings please click on Modify. A new page will appear (Figure
8.19)
Alert Definitions
At the top right corner you will have available the Alert Definitions link.
These ’alerts’ are warnings that will be submitted to you should any HA IP fluc-
tuation has occurred, whether by machine failure or human hand.
IP fluctuation basically means that should one machine fail, another one will
assume its virtual IP. If you click on the Alert Definitions link a new page will
appear (Figure 8.20) where you will visualize the Source and Destination email
addresses. By default, no address is set. You should click on Modify to add both
email addresses. (Figure 8.21)
NOTE: The mechanism for failure detection is based on network and service
failure (valid only for the VoIP service).
8.1.6 Update
All available updates in the Downloads section of our eshop should be installed
here. All you have to do is click on Insert, choose the update file (.deb) by clicking
on Browse confirm the package by clicking on the Insert button. The package
will then be installed in the system (Figure 8.22).
To add the URL of the IPBrick Remote Manager server click on Insert (Figure
8.23).
NOTE: Repeat this procedure on ALL IPBricks you wish to remotely manage,
including the one where you have installed the ipbmanager.deb package
8.2 Network
In this section we’ll address the advanced configuration of services related to
the structure of the organization’s network. It will be possible to define specific
rules at firewall, to add static routes for other internal networks (or external), to
define rules and priorities in the QoS service as well the configuration of service
routing at firewall.
8.2.1 Firewall
This section deals with the IPBRICK firewall management. Some of the pre-
defined rules were already mentioned in the section Firewall in the chapter IP-
Brick.C (rules that can’t be changed by the user, only deactivated). In the mean-
time the configuration of some other services demands some other rules. These
rules can only be managed in part by the user in the Order section. Nevertheless,
IPBRICK offers the administrator an advanced interface for the firewall manage-
ment. There, he can define a group of rules with high personalization (Figure
8.26).
Here you have links to:
• Insert new rules in advanced mode;
• Delete already inserted rules
• Order: Interface to order all the rules that exist in the firewall (Figure 8.30).
This option is particularly important when new rules are created. Because
the first rules the firewall does the matching will be the first to use. Then,
more specific rules should be at the top and general should be at the bottom.
You can insert three types of rules:
• DNAT Rule: Redirects the traffic that comes to a port to another port/machine
of the internal network. That rule here is only for TCP traffic (example at
Figure 8.29);
• General settings: Here you can add a completely personalized rule (ex-
ample at Figure 8.27). These are the affected fields:
– Rule:
– Interface: You should choose which interface to apply the rule (eth0,
eth1, eth2... and the loopback interface - lo);
– Protocol: Protocol(s) to which you want to apply the rule;
– Module: Shows the list of iptables modules available for use;
– Source MAC Address: The packet source’s MAC Address;
– Source IP: Source IP Address of the packet;
– Origin port: Source port of the packet;
– Destination IP: Destination IP address of the packet;
– Destination port: Destination port of the packet;
– Parameters: 16 bits field that exists in the original IP packet - it is
used to identify the type of packet to filter. Examples:
! --syn
--state INVALID
--state ESTABLISHED,RELATED
--icmp-type echo-request
– Policy:
ACCEPT: To accept a packet and let it pass the firewall rules;
DROP: Doesn’t accept the packet and eliminates it;
MARK: Saves a mark in the packet. These marks can be used to make
decisions at the forwarding level;
LOG: Saves a log of every packet that folows the rule.
– If the PREROUTING rule is used, there are the following extra policies:
REDIRECT: Used to redirect the traffic arriving from a port to
another port;
DNAT: it allows to redirect the traffic arriving at a certain
port to another machine and port belonging to the internal
network
– If the POSTROUTING rule is used, there are the following extra poli-
cies:
MASQUERADE: It allows to ’mask’ the traffic
SNAT: It allows to redirect the traffic generated in a certain
port to another machine and port.
TCPMSS: It changes the MSS field (maximum packet size) from the
TCP header. It just can be used to TCP SYN or SYN/ACK
packets because is just used in the beginning of
conections.
The rules that are defined by default can’t be eliminated, but can be deactivated
by clicking in the state of the rule and change the Deactivate option.
At body there’s a list of all the rules controled by the user (Figure 8.26). A
rule can be switched between enabled and disable state. To eliminate rules is
necessary to click Delete, select the rule or rules that you want to remove and
click the button Delete. The rules defined by default cannot be deleted, however
they can be deactivated, all you have to do is click the state of the rule and change
the option to disable.
8.2.3 QOS
The QoS service2 (Figure 8.32) in IPBrick allows the customization of traffic
priority levels, oriented to the external interface, thus assuring a certain level of
quality of the service for the final user. It is importnt to indicate immediately the
value of the band width available in the connection for the internet. From these
data we can establish priority rules among the several types of traffic in a network.
for example: instead of the internet connection being entirely occupied by the
email service, limit the band width given to that service and assure a minimum
value for the web traffic.
At the Body we have the list of the available Public Interfaces (normally
ETH1) and the state of the service for each network card. Clicking the state allows
2
Quality of Service
to move between active and inactive. Clicking the network plate allows to
accede the management formulary of that service (Figure 8.32).
• ToS3 :
• Source IP;
3
Type of Service
• Source Port;
• Destination IP;;
• Destination Port.
The Priority Class 1 has always maximum priority, and the traffic is defined in
Priority Class 3, the less importnt.
After defining a Destination, it’s necessary to add specific rules in the firewall so
that the routing of desired services becomes a reality. It will be presented firewall
configuration examples for:
3. Rule to allow the replies for port 25 by the Internet mail servers:
5. Rules to forward outgoing SMTP traffic with origin in IPBrick for the new
interface (eth2);
• Interface: eth1;
• Protocol: TCP;
• Module: Leave blank;
• Source IP: eth2 IP;
• Origin port: 25;
• Destination IP: ! eth1 IP;
• Destination port: Leave blank;
• Parameters: Leave blank;
• Politics: MARK;
• Value: 1 (firewall tag);
6. Rule to forward traffic with origin in LAN and destination the port 25 in
Internet (only when is used a external SMTP account)
2. Rule to allow the replies for port 80 by the Internet web servers:
3. Rule to allow the replys for port 443 by the Internet web servers:
4. Rule to forward traffic with origin in LAN and destination the port 80 in
Internet (only when the proxy is not used!)
5. Rule to forward traffic with origin in LAN and destination the port 443 in
Internet (only when the proxy is not used!)
6. Rule to forward traffic with origin in a machine conected to the LAN using
VPN PPTP and destination the port 80 in Internet (only when the proxy is
not used!)
7. Rule to forward traffic with origin in a machine conected to the LAN using
VPN PPTP and destination the port 443 in Internet (only when the proxy
is not used!)
NOTE: To route other services for the new internet access (local and remote
port), the idea is the same.
In this section a list is presented of the machines registered in the LDAP service
of IPBrick. To insert a new machine in the LDAP domain of IPBrick it’s necessary
to click Insert. It is also possible to Modify or Delete LDAP registers.
The insertion of machines in LDAP from here can be very useful, when there
are IP networks different from the internal interface of IPBrick, since there is no
need to indicate the IP.
Mass Operations for machines
The Export feature will export all the data to a .csv file. The Mass operations
option permits an import of a .csv file. You can edit a .csv file in a spreadsheet
application, choosing the ; to split the columns. When doing an export we can
see all this fields present:
• uidnumber: LDAP field that identifies the resource. Usually machines begin
with UID 50000.
action;uidnumber;name
N;50000;pc01
N;50001;pc02
I;50002;pc03
I;50003;pc04
I;50004;pc05
8.3.2 DNS
DNS4 is a name resolution service that translates domain names into IP ad-
dresses and vice-versa, and it is implemented in IPBrick by the software Bind using
port 53 UDP/TCP. The majority of queries consists of a simple UDP request by
the client, followed by a UDP answer of the server. There are two situations where
the TCP is used: when the data to be sent by the user exceed 512 bytes or at
the transference of zones. Some operating systems like HP-UX, for example, even
adopt DNS implementations always using TCP, thus increasing reliability.
The service acts like a database with information about the connections of a
IP network, and that information is organized into domains. The used notation
represents FQDN5 :
servername.company.region
• master: It obtains the data from a zone which it manages from its own
database;
4
Domain Name System
5
Fully Qualified Domain Name
6
Internet Corporation For Assigned Names and Numbers
• slave: It obtains the data from the primary master, existing one or more
in a network. Whenever there are changes in the configuration of the areas
served by the master, this server is always notified, proceeding to the update
of database.
So we can have master DNS servers, also called primary, and slave DNS servers
that can be named as secondary too. Regardless of being master or slave in a zone,
a server can have different purposes:
• internal DNS server: A internal DNS server (master or slave) serves pri-
vate domains and resolve names at private IP’s. They stay inside the LAN
and normally the service is running at the same server that is PDC. Example:
pc01.domain.com - 192.168.0.25. At IPBrick context, it will be a IPBrick.I;
• public DNS server: A public DNS (master or slave) serves only public do-
mains and resolve names at public IP’s that are well known at the Internet.
They can stay at company’s network DMZ, but usually the public DNS server
of a domain is managed by the company ISP or some hosting company in
Internet. Example: www.ipbrick.com -¿ 80.251.163.69. At IPBrick context,
a IPBrick.G/SEC/GT can be as public DNS server of some domain. It’s
not a good policy to have a unique server managing the same domain with
internal records and public records.
The DNS server also allows the resolution of names in a reverse mode, that is,
answer with the name (FQDN) from a certain IP address. This device allows the
confirmation of the authenticity of an IP address, important aspect in the email
service.
Domains
This is the main section of DNS configuration. Here you can handle the do-
mains managed by the server and their respective DNS records like, machines,
alias, mail exchange records etc. By default the following zones are presented:
• Forward zone: This type of zones have the name-¿IP address mapping,
and are the most used ones. By default, IPBrick serves the forward zone
domain.com;
• Reverse zones: This type of zones can map IP address-¿ names and are
mostly used by public e-mail servers, for authenticity verification. By defaut
IPBrick serves the reverse zone 192.168.69.0/24;
You can access the interface management of these zones by clicking on one of
them. (Figure 8.39 and Figure 8.40)
Clicking on the Insert link a new domain will be served by IPBrick (Figure
8.36)
Insert a new zone At top menu you have a link to get Back to the previous
list and cancel the current process of introducing a new zone. At body you see a
register form for forward and/or reverse name (Figure 8.41) resolution zones. You
find the following definitions:
2. Network: The associated IP network for which you are going to create reg-
istrations. This is used only for reverse name resolution records (PTR7 );
3. Zone type: Field that allows you to create a master or secondary zone. A
secondary zone is a copy of another DNS server master zone;
4. Server: Name of the machine that will serve8 this domain (e.g. ipbrick.domain.com)
(this field is only applied on master zones);
5. Email: E-mail of the responsible for this domain. This e-mail is registered
in the DNS under the name of the administrator for this domain (this field
is only applied on master zones);
6. Refresh time: The time of a secondary zone to see if there are any changes
in the master zone (this field is only applied on master zones);
7. Transfer retry time: The time a secondary zone has to wait to retry the
connection to the master zone, that is, if the last refresh was unsuccessfully
(this field is only applied on master zones);
8. Expiry time: The time a secondary zone has to consider the dates of a zone
as valid since the last successful refresh (this field is only applied on master
zones);
9. Default time-to-live the time in which the other DNS servers have to
consider the dates of this zone as valid (this field is only applied on master
zones);
10. Master servers: IP address of the master server for that zone (this field is
only applied on secondary zones);
If the idea is to create a sub-zone these are the necessary steps (Example:
porto.companyx.com):
• Insert a new zone at the present main menu. At domain type porto.companyx.com;
Domain: porto.companyx.com
Server: ipbrick.domain.com (no need to change that default field)
pc01 192.168.69.96
ipbrick 192.168.69.1
slave01 192.168.69.2
domain.com. 192.168.69.1
• Aliases: This is called the CNAME record (canonical name record). It’s
an alternative name for some existing machine record (this option is only
available for a forward name resolution zone). E.g.:
webmail ipbrick
im ipbrick
contacts ipbrick
voip ipbrick
mailsrv2 slave01
• Name Servers: It’s the NS record (name server record). Here we manage the
list of DNS servers for the zone. If a zone has master and slave servers, the
master should have that information defined here. E.g.:
domain.com ipbrick.domain.com
domain.com slave01.domain.com
Let’s suppose that the same IPBrick’s are serving other zone called easylinux.com.
So the configuration would be:
easylinux.com ipbrick.domain.com
easylinux.com slave01.domain.com
• Mail Servers: This is called the MX record (mail exchange record) and it’s
a crucial record. We can say what server or servers are the mail servers for
the present domain. You can have several registrations each with different
internal positive values. The values indicate which registration to use first.
The registration with the lowest value is always the first one to be used. The
names to be introduced here must always be the e-mail server FQDN (this
option is only available for a forward name resolution zone). For example:
10 ipbrick.domain.com
20 mailsrv2.domain.com
• VoIP Servers: It’s one SRV record (service locator) for new protocols, in-
cluding VoIP (SIP). The value to be introduced here is the FQDN of the VoIP
server (this option is only available for a forward name resolution zone). For
example:
voip.domain.com
• Instant Message Server: It’s also a SRV record for Jabber protocol and by
default the address is im.domain.com. The alias im exist by default;
The SRV records for VoIP and IM are very easy to configure if IPBrick is
the DNS server, because we only need to type the FQDN of the server. If
the private/public zones are managed by different DNS servers and we want
to use that services in IPBrick you need to really specify all the SRV records
that are being used, and pointing them to IPBrick.
• Valid records for sending mail (SPF): In this field we can use the SPF
in order to specify what records are valid for mail sending. So this config-
uration here will be the IPBrick’s mail server answer to the external mail
servers that are using the SPF protection. The configuration can be done at
Basic Options (Figure 8.37):
After the configuration, from the Basic Options, going to Advanced Options
will present the TXT record. There it’s possible to edit directly the TXT
record, so other specific SPF mechanisms and qualifiers can be used (Figure
8.38).
• addtorev: Option to add the record or not to reverse DNS zone. Value 1
yes, 0 no.
action;idzone;zonename;iddnsina;name;ip;addtorev
N;1;domain.com;1;ipbrick;172.29.1.154;1
N;1;domain.com;2;pc2;172.29.1.32;1
I;1;domain.com;3;pc3;172.29.1.33;1
I;1;domain.com;4;pc4;172.29.1.34;1
Note: The private reverse zones can exist at DNS LAN servers, but the public
reverse zones are maintained at .arpa9 . The configuration of that public zones
are configured at ISP DNS servers, so all the costumers public IP’s can be mapped
to the respective FQDN. It’s called a PTR record and actually they became very
important, because the number of mail servers that make that reverse zone ver-
ification is increasing. Example: Mapping the IP 195.23.45.33 with name ip-
brick.companyx.com. The ISP will insert a record like that:
Forwarders
If a DNS server receives a request for a domain which he neither serves nor has
in cache, then the server has to forward this request to other DNS servers in the
Internet. The forwarders should be the nearest ones, normally the DNS servers
of ISP. If the forwarders field is empty the DNS still working because the server
use the internet gateway to do the DNS search. If in the same network exists a
IPBrick.I and a IPBrick.C, the IPBrick.I must have the IPBrick.C eth0 address in
the forwarder field. Here you have the most appropriate interface to register the
nearest DNS servers (Figure 8.42).
Name Resolution
Regardless of the DNS service is being executed or not in this server, you can
configure the server to handle its DNS requests in another server. You can apply
this configuration to all server services (with the obvious exception of the DNS
server which uses its forwarders for requests he does not know). In order to make
the server use its own DNS you have to configure the IP address of the localhost10 ,
127.0.0.1 - by the way, its the default configuration. (Figure 8.43).
9
Internet Address and Routing Parameter Area
10
local server
Note that if IPBrick is not resolving in its own DNS service and if we dont have
machines using IPBrick as DNS server or as a forwarder, the service is not being
used at all. In that case all zones presented at DNS - Domains submenu may even
be deleted;
8.3.3 DHCP
The DHCP11 service may be defined as a protocol of dynamic attribution of
parameters for configuration of network and workstations (door 67 and 68 UDP),
an evolution of the BOOTP protocol. Basically, a DHCP client sends a broadcast
packet to a network asking an IP address, and it obtains an answer if there is a
DHCP server active in the network. The server not only attributes it an IP but
also: Network mask, route by default, DNS server and WINS server.
• Dynamic: the client obtains the address from a range of address previously
defined by the IPBrick administrator, for a defined period of time;
Subnets
This menu permits the definition of subnets to be served and the parameters
of the network configurations to attribute to the workstations. (Figure 8.44)
At the top menu you have links to Insert new subnets, configure Redundancy
parameters and define the General Options. You also have a list of the inserted
11
Dynamic Host Configuration Protocol
subnets. Each IP is a link that displays the configuration options in each one
(Figure 8.45).
Insert
The Insert links allows you to introduce subnet parameters, which shall be
attributed to the clients:
settings from the local DHCP server, avoiding thus the arduous task of
configuring independently a new network.
– When you select Remote new form options will appear, where you will
have to insert the Network address, the address of your network and
the Master Server that hosts the Local DHCP server.
• Network Address: It allows you to indicate the address of the network and
the respective mask;
• Default lease time: Default lease time during which the address can be
lent;
• Max lease time: Max lease time of an IP address for the machines. This
value surpassed, the IP address is renewed;
• Default Gateway: Address of the gateway which will serve as the default
route (by default 192.168.69.199);
• DNS Servers: List (one per line) of the DNS servers to be used by the clients
(by default ipbrick.domain.com);
• WINS servers: List (one per line) of the WINS servers to be used by the
clients (by default ipbrick.domain.com);
• TFTP server: Define the TFTP server to be used by DHCP clients. Can be
used for example for IP phones auto provisioning;
• Image Server: This server hosts the image replication service for Linux
user stations. This way every machine can be updated without the need for
individual and manual OS updates.
• Boot File: The boot file enables the user machine to restart via the image
server. It is the individual boot file in every Linux machine, including data
such as its MAC address. Each machine is thus identified by the image
server, which in turn will proceed with the appropriate updating procedure.
By default, the Linux boot file is: pxelinux.0
• DNS domain: Name of the domain indicated to the clients (by default do-
main.com).
Redundancy
It is possible for an IP network to configure two DHCP servers, one as main
(primary) server and the other as secondary. Normally, only the primary server
answers the requests, while the secondary one synchronizes its DB with the pri-
mary, if the primary fails the secondary shall assume its service. Communication
between the servers is made from the network ports which may be customized.
One of the ports shall be attending the connections from the secondary server and
the other one shall be attending the connections from the main server. (Figure
8.47)
Top Menu Here you have a link to get Back and Insert a new connection.
The following fields are presented in the insertion of redundancy and fault:
• Settings: here you can see if the server is the primary or secondary DHCP;
• Remote IP: Remote IP address from the server of the other extreme;
• Remote port: Remote port where the service in the other extreme is running;
• Max response Delay: Max time that the DHCP server can wait for a mes-
sage from the other peer. When that is out, the server assumes that the
other has failed and assumes itself as the network DHCP server;
General Options
This option (Figure 8.48) allows the insertion of general DHCP parameters,
which shall be attributed by default to the clients:
• Default lease time: Default lease time during which the ’lease’ of the
address is valid for the clients;
• Max lease time: Max lease time of an IP address for the machines. When
this value is surpassed, the IP address is renewed.
Machines
Here you see a list of the registered machines with their MAC addresses in
the DHCP service. You can register the machines in Machines Management (see
section 3.2, page 26) or directly in this section (Figure 8.50).
The Export feature will export all the data to a .csv file. The Mass operations
option permit an import of a .csv file. You can edit a .csv file in a spreadsheet
application, choosing the ; to split the columns. When doing a export we can see
all the fields present:
action;iddhcpmachine;name;ip;mac
N;1;maq1;172.29.1.66;AA:55:43:4A:AA:A1
I;2;maq1;172.29.1.67;AA:55:43:4A:AA:A2
I;3;maq1;172.29.1.68;AA:55:43:4A:AA:A3
DHCP leases
This page presents you with a list of all the DHCP leases (Figure 8.51).
8.3.4 ENUM
The ENUM12 service allows the mapping of telephone numbers (Rule E.164)
in names associated to IP addresses, using an architecture based on the DNS ser-
vice. Those names may be from the protocol SIP, H.323, Email etc. In order to
consult the DNS, ENUM inverts the telephone numbers, giving them the prefix
e164.arpa. which is the root of the tree. This tree is delegated to all countries of
the world taking into account their codes E.164. this way, the Portuguese delega-
tion shall be the inverted 351 - 1.5.3.e164.arpa.
In IPBrick, you can define the ENUM zones where a number search can be
made. For that you’ll have to click on the connection Insert and input the ENUM
zone domain. In Order it’s possible to define which are the priority zones where
the number search shall be made. In Figure 8.54 a list of the ENUM zones may
be visualized.
Once the list of the ENUM zones is defined, where to search numbers, the
ENUM may be used in VoIP routes. Next, an example is given:
2. A certain user of the network calls through the SIP/PBX to number +351 253 59 31 12;
12
Telephone Number Mapping
8.3.5 DUNDi
DUNDi is a peer to peer system for locating Internet gateways to telephony
services. Unlike traditional centralized services (such as the remarkably simple
and concise ENUM standard), DUNDi is fully distributed with no centralized au-
thority whatsoever.
Click on Insert and type your DUNDi server’s name, MAC and IP.
On Outbound Routes select YES for the DUNDi lookup. The DUNDi will tell
you which extensions are on each server. When a call is placed on a server, if the
look up is active, the search is made before the call. If the reply is a different
server from the one configured in the route, the call is made to that new server.
If there’s an addition of a new machine to the system and backup data is copied
from the old to the new machine, conflicts may arise from this fact.
At this page you will be able to alter the encoding type of the file system.
Click on the Modify link to present the edit page where you will be able to
select between UTF8 (IPBRICK v6.0 default encoding) orfor compatibility reasons
you wish to select the ISO8859-15 encoding.
IPBrick allows the time tracking of all configurations, because when you modify
something in the web interface and Apply Configurations, a new configuration is
locally saved. It is possible to store these configuration files in an USB pen and ad-
ditionally send them to a configurable email address. In the configuration filename
we have the date and the exact hour when a configuration was created. In short,
this configuration management allows a fast disaster recovery, in case of hardware
problems. When applying configurations if for some reason the configuation can’t
be saved, a warning message will be presented.
There is a configuration called default which is the IPBrick’s base configura-
tion immediately after install.
Clicking on Definitions there are the following fields that can be modified on
the link Modify:
• Source address: Source address to send the notifications (by default admin-
[email protected]);
• Message body: Should have a description about the IPBrick server type. By
default is empty.
! Attention !: After the IPBrick installation you should always insert a USB
pen connected to server. The pen must be labeled with the name IPBRICK-D and
must be FAT32 formated.
Replace
In this section you see a list of all saved copies on the USB pen. In order to
replace a setting you just have to click over it (Figure 8.57).
⇒ Note: All services will be reconfigured when replacing a copy of the set-
tings. After the configuration of all services IPBRICK restarts automatically.
• First Step: IPBrick will detect if there is connectivity with the master
at the time of the replacement of the settings. If there is, the setting is
replaced and the server reboots, ending the replacement process. If not, the
replacement process enters its first stage and the server goes into reboot, the
process will now enter its second step.
Download
This section allows you to download the copies of the configurations done to a
local computer (Figure 8.58).
With this useful option you can save IPBRICK settings on another place.
Upload
In this section it is possible to upload a previously downloaded configuration
file to the server (Figure 8.59).
8.4.2 Applications
This is a useful disaster recovering feature. When upgrading IPBrick from
version A to version B, if an old installation is detected, the following applications
will be backed up:
• PostgreSQL: All the Postgres databases will be dumped, including the sites
databases;
So, all these application files are packed and saved in a folder.
Choosing the option Applications - Restore the list of available application
data backups will be shown (Figure 8.60). To restore the desired application data
backup, click on the file and then on Restore. At this moment the backup will be
restored for the new IPBrick version.
Databases
It is possible to manage the daily backups of databases. There is an interface to
configure the mail admin to give notice that the backup is not made successfully.
The login postgres refers to the database that runs on port 5432.
8.5 System
Inside the System menu, we can find the options indicated in these following
points.
8.5.1 Services
In Services (Figure 8.61) you’ll find a list of several services available in IP-
BRICK. The State column shows you if the service is enabled or disabled. It is
possible to restart any service without having to restart IPBRICK.
In order to restart any service you have to:
The Start column defines the way in which each service has to start with the
server (whether after a reboot or after a period while the server was disconnected).
If you see Automatic in the Start column of a service then the service will start
automatically with the server. On the other hand, if you see Manual on the
column then the service will not start with the server. Nevertheless it can be
started manually in this menu by changing its State from Disable to Enable.
⇒ Note: Any changes in the Start column of a service will not have imme-
diate effects on the service start. The changed start will only be valid for the next
server start. On the other hand, a change in the State column has immediate
effects. That is, by changing the service state from Enable to Disable IPBRICK
stops this service.
In this section it is possible to stop a certain process. Therefore you only have
to click over the option Kill Task (Figure 8.62).
14
Big virtual cluster of Network Time Protocol timeservers
• Received Mail: User for the received mail copy functionality. The idea is
to map a IMAP account from a email client;
• Sent Mail: User for the sent mail copy functionality. The idea is to map a
IMAP account from a email client;
• spam: User to receive the mails from the Anti-Spam. The idea is to map a
IMAP account from an email client;
• VoIPCDR: User for FTP access, to get the asterisk full call statistics.
8.5.5 Monitoring
This section stands only for monitoring features. Main options:
• Alerts: Options for disk partitions and services with problems alerts;
Logs
The logs are an important tool for troubleshooting. In this menu we can:
• IPBrick Logs: Logs generated by the IPBrick. Useful in detecting any prob-
lem at the web interface layer. The most recent information is available in
Current Log. In case there are other log registrations then each of them
provides information generated by IPBRICK till their indicated date (Fig-
ure8.66);
Accesses
At Management clicking on the service name we can enable the accesses moni-
toring for SSH, FTP, VPN PPTP and SSL. By default the state is disabled (Fig-
ure8.67).
The Entries option permits the visualization of all accesses (Figure8.68). It’s
possible to filter by:
• IP;
• User;
• Notes:
– Connected;
– Disconnected;
– Wrong password;
– Illegal user;
– Locked;
– Timeout;
– Timeout/Locked;
– Log in attempt with root user;
– Disconnected/Timeout.
• Date;
Options available:
Traffic
Here all the active TCP connections are listed by this fields:
Alerts
At this page you can define if the Full partition alerts definitions and
the Send alerts of services with problems will be enabled or disabled (both
are enabled by default).
The full partition alerts will act if the partition reaches 85%. An email alert
will be delivered to the email present at Destination address. Changing the
source address notifier is possible too (Figure8.70).
• Web server
• Fax server
• Voice server
There’s also a protection to the VoIP service that uses the same email to notify
the system’s administrator of attacks to the VoIP service.
If more than 300 requests of an IP are made in 10 seconds, that same IP will
be blocked for 120 seconds.
Note: The same e-mail address is used regardless if the ”Send alerts of services
with problems” option is active or not.
8.5.6 SSH
The SSH menu implements a secure connection to the IPBRICKś shell, showed
in Figure 8.71.
The SSH (Secure Shell) is similar to the known Telnet application but more
secure because of the protocol SSL used.
Note: This function needs the installation of Java Virtual Machine. The
software is available in www.java.com. After the connection it’s necessary to make
an authentication. Therefore, you’ll need to input the following data:
• Username: operator;
• Password: L1opardo.
8.5.7 Reboot
This option allows you to reboot IPBRICK (Figure 8.72). After confirming
the reboot option, the web connection with the server is automatically stopped.
When IPBRICK restarts it is possible to establish a new https connection with
the server.
8.5.8 Shutdown
This option is to clearly shutdown IPBRICK (Figure 8.73), assuring that all
the services are terminated correctly. You should use this option, whenever it
is necessary to shutdown IPBRICK. Do not shutdown the server directly in the
power supply.
8.6 Telephony
To make possible the IPBrick’s interaction with telephone systems, you need
to install specific hardware. This hardware includes PCI cards that can be ana-
logic, RDIS BRI or RDIS PRI. Analogic cards provide the connection to telephone
networks working in analogic mode. If telephone networks are working in digital
mode (RDIS), cards may be BRI or PRI. A BRI (Basic Rate Interface) access
has three channels: Two 64kbit/s (B) for data/voice and one 16 kbits/s (D) for
control. The PRI (Primary Rate Interface) access corresponds to 30 B channels
plus one D channel in Europe - can also be designated as E1 circuit.
8.6.1 Cards
After physical configuration and installation in the machine you have to con-
figure IPBrick. To make this step you have to know how the card was physically
configured, i.e., each port configuration. After the physical installation of the
hardware, you can configure cards in the IPBrick web interface in the menu:
To insert click on Insert, and then indicate (as shown on Figure 8.74):
• Green: The layer 1 (physical) and layer 2 (signalling) are UP. So the port is
ready;
• Red: The layer 1 and layer 2 are DOWN. It means that we have a connection
problem (bad cable or no cable) or the port is damaged. Note that for a
PSTN BRI - PTMP mode, usually when no calls are active, the standby
status can be allways red;
• Red blinking: Hardware problem. You need to verify the card integrity /
jumpers configuration. It’s very rare to happen.
For each card inserted there are three options: Back, Modify and Delete.
If the port is connected to the landline (PSTN) you need to configure the
setting as TE. If the port is connected to the PBX gateway you have to configure
the PBX port and configure the setting as NT. A ISDN FAX usually behaves like a
PBX requiring the port configuration as FAX (to show this option requires a FAX
interface configuration) and configure the setting as NT. If there is a GSM interface
configured in one of the ports you have to choose it on the list and configure the
setting as TE. To configure a ISDN PRI you have to indicate if the line uses R2
protocol (protocol used for example in Brazil) and if the CRC4 is active on the
line. The PtP or PtMP depends of the telephone operator line type.
After the configuration, we can see a list with the configured cards, as visible
in Figure 8.75.
8.6.2 Interfaces
Interfaces represent trunks normally to non-IP world. I’ts possible to create
more interfaces than the default ones (PBX and PSTN) (Figure 8.76. Examples:
GSM ISDN or FAX’s interface. You can create them at:
• Interface Name: When created, the interface will appear by that choosed
name at Local Routes and Telephony Cards port configuration;
– BRI PSTN: Represents the PSTN side using a ISDN BRI connection;
– BRI PBX: Represents the PBX side using a ISDN BRI connection;
– PRI PSTN: Represents the PSTN side using a ISDN PRI/E1 connec-
tion;
– PRI PBX: Represents the PBX side using a ISDN PRI/E1 connection;
– ANALOG PSTN: Represents the PSTN side using a ANALOG connec-
tion;
– ANALOG PBX: Represents the PBX side using a ANALOG connec-
tion;
– OCS: Represents the Microsoft Office Communications Server. That
interface will be used only for Local Routes. For that interface type
two extra fields are present:
∗ FQDN: OCS fully qualified domain dame;
∗ Mediation Server IP: Mediation Server IP address;
• SIP Peering: The Open Peer option provides that any incoming call from the
Internet can use this interface. The Closed Peer option sets that only peers
defined in SIP Peers can use the interface(this is the best option connect to
PSTN or GSM). So peers are public IP’s authorized to use certain interface,
for instance a peer can be another IPBrick. They can be inserted at:
This operation is necessary if you want to connect a FAX to a card port, a GSM
gateway or another additional interface. If there is a GSM gateway, you may add
here a GSM interface (as an interface name). Choose a card type (analogic, PRI or
BRI) in the Interface Type, and the Closed Peer option in the SIP Peering.
Click on Insert and fill in with the necessary information (Figure 8.78):
• Phone Location
Mass Operations
As in the Mass Operations link found in IPBrick.I > Machines Management,
it’s possible to use a .csv file to insert, more rapidly, a greater number of phones.
If you click on the Export link, you will be able to save a .csv file with all your
registered phones or, if you have none, the file will serve as a template for insertion.
You can edit the .csv file in a spreadsheet application, choosing ; to split the
columns. The Registered Phones .csv field structure is as follows:
– I: To Insert a phone;
– U: To Update phone information;
– D: To Delete a phone;
– N: No change is done to the phone’s settings.
• phonedescription: A free text field. For your reference only, insert a simple
description of the phone;
Name id Template
Aastra 6731i 513
Aastra 6755i 500
Atcom 530 501
Cisco SPA303 421
Cisco SPA504G 422
Cisco SPA525G2 423
Grandstream BT200 510
Grandstream BT201 511
Grandstream GXP1200 508
Grandstream GXP2000 505
Grandstream GXP2010 506
Grandstream GXP2020 507
Grandstream GXP280 509
Snom 300 514
Snom 320 503
Snom 360 504
Snom 370 515
Snom 870 516
Thomson ST2030s 502
Yealink T20P 417
Yealink T26P 419
Yealink T28P 420
8.6.5 Configurations
In this menu it’s possible to adjust several configurations for VoIP and PBX/PSTN
integration. This are the options:
• General options;
• Voicemail Options;
• Agent Mobility;
General options
You will find the following fields in Options (Figure 8.80):
• Call pickup key activation sequence: Change here the default activa-
tion sequence (*8)
• Group call pickup: With this option active, it’s possible to pickup a call
from a ringing phone, member of the same group, by using the defined key
activation sequence (*7 by default), If the phone belongs to more than one
call group, the last call to be ringing on any of those call groups will be the
one to be picked up;
• Global call pickup: If you choose yes it will enable the global call pickup.
If a phone is ringing and the idea is to answer the call by using another phone,
we can simply use the key activation sequence (*8 by default) to pickup the
call. Example: *8, will pickup a call from a phone that is ringing. If we have
two or more calls at the same time, will be picked always the last arrived
call;
• Global call pickup key activation sequence: Change here the default
activation sequence (*8)
• Phone lock: Permits to lock a internal phone, so it will be not able to make
calls (it will still be able to receive them). To lock a phone you need to enter
the key activation sequence and wait for a message. After that message you
need to type the user PIN or PIN and password defined at IPBrick.GT -
Users Management, depending of choosed user access validation. To unlock
the phone the process is the same. If the option Allow phone unlocking by
any valid user is set to NO, only the user that locked the phone or the defined
Administrator unlock password will unlock the phone;
• Forward when busy: Can be used to forward a call when some phone is
busy and by default uses key sequence *72. Example: If phone 201 is busy,
calls will be forwarded to phone 202. So we just need to do a *72202 at
phone 201. To deactivate we type only *72;
• Forward when not answer: Can be used to forward a call when some phone
do not answer and by default uses key sequence *71. Example: If phone 201
is not answering, calls will be forwarded to phone 202. So we just need to
do a *71202 at phone 201. To deactivate we type only *71;
• Retry Dial when busy: If someone is calling a number and that phone
is busy, the caller will be notified and asked to activate the retry dial, if
he decides to activate it, this option will run an availability check on that
– Retry Dial when busy key activation sequence: Change here the
default activation sequence (5)
– Timeout: The amount of time (in minutes, by default: 60) that the
system will continue to run the availability check. When this period
ends, the retry dial function will be stopped.
– Restrict access to: Choose the addresses that may activate the
retry dial function.
• Call Supervision: If yes is active, it will only enable the call supervision
feature. By default the key activation sequence is *9;
• Enable advanced call statistics: If active will enable some fields at call
statistics like: Total packets, codec, lag, lost packets, signaling and jitter.
Note that CPU/memory load will be increased;
• Store calls details records in csv file: All the call history in the
default asterisk format will be saved to a file called Master.csv. This file
can be downloaded acceding by ftp with username voipcdr and password
L1opardo;
NOTE: Disabling this option will not deactivate the feature Boss/secretary
group in:
• Play call forwarding message: When a call is forwarded the user will
hear a message stating this fact (by default, YES)
• Default Call Limit: This option defines the maximum limit of calls for
a particular phone. By default, this feature is enabled and the default call
limit is 2
• SIP Ports: It’s possible to alter the default SIP ports (5060) and add others
by clicking on the + icon;
• TLS Port: It’s possible to alter the default TLS port 5061;
• IAX Port: It’s possible to alter the default IAX port 4569.
Voicemail Options
At this menu (Figure 8.81) you will be able to configure your Voicemail settings,
simply click on Modify to access the options.
• Voicemail: Enable or Disable the Voicemail service for, Phones, Users, Call
Groups and Attendance sequences (by default, Enabled);
• Location: Choose if the Voicemail server will be Local or External (by
default, Local). If you choose External a new field will appear:
– Server: Please type you external voicemail server’s name;
• Access voicemail by telephone: It’s possible to access your Voicemail
via telephone, to activate this feature select Enabled (by default, Disabled)
a new field will appear:
• Send Voicemail by email: This option will be visible only if you select
Local at the Location field. Select NO if you do not wish to receive emails
with your voicemail messages as attachments (by default this option is set
to YES).
• Servers to notify new messages: Indicate here the server(s) to notify
(add only one per line).
Agent Mobility
As the name suggests, this feature (Figure 8.82) enables the user to log on as
agent on any phone he wishes to use, simply by using his PIN number. Any session
on a previous phone will be terminated. By default, the Agent Mobility feature is
disabled. To enable it, click on the Modify link.
At State, select Enabled, and insert the VoIP server’s IP(s) where it will be
possible for users to register themselves as agents (Figure 8.83).
When you have finished, please click on the Modify button at the bottom of
the page.
• Channel tone zone: Country tone zone. Frequencies may vary from country
to country. Select the appropriate tone zone for your location;
• Echo cancel: Minimizes echo during calls;
• Type of Number (ISDN TON): Type of Number (TON) indicates the scope
of the address value, such as whether it is an international number (i.e.
including the country code), a ”national” number (i.e. without country
code), and other formats such as ”local” format (i.e. without an area code).
This types of number are then presented to the operator if, for example, you
leave the default option (Unknown) the operator will identify the type of
number.
– These are the available options both for the Callee (Calling Number)
and Caller (Caller Number):
• Echo cancel: The default is High. Other options: Disabled, minimum, low
and maximum (requires more CPU processing);
• Immediate digit capture: The immediate capture of digits changes the way
how the numbers sent from a PBX central are read in IPBrick. When this
option is deactivated, the routine capture of digits is changed to solve prob-
lems in the reading of numbers in some central stations, for example, when
the dialled number is wrongly identified in IPBrick (repeated digits or lack
of digits). Attention: This option should be placed No by default;
• Digit timeout: Time (seconds) from the dialling of the last number from
which IPBrick considers the dialling as ended;
• Response timeout: Time (seconds) counted from the moment the receiver is
hung up and at its end IPBrick shall cancel the channel;
• Prefixes based on ISDN TON: This option is related to the card’s call re-
ception, in such a way that, if you receive a PSTN incoming call, with an
international or national type of number, the corresponding prefix will be
added to the incoming numbers. This feature is important to facilitate the
call redial function. At BRI card options you will also be able to set the
country code;
• GSM: 13 Kbps;
• iLBC: 15 Kbps;
• G.726: 32 Kbps;
• G.722: 64 Kbps;
• G.729: 8 Kbps. You may have to buy a license to make calls with this codec
at Digium website. If this codec is enabled a link called Licence Activation
will appear, so with a valid key a G729 licence will be generated.
NOTE: In the Country field use only your country’s two letter code (e.g.:
Portugal-pt, France-fr, Angola-ao, etc.). For a complete list of all countries,
please check ISO 3166 Country Codes.
http://www.acronymsearch.com/documents/country_ISO_country_codes.
htm
Of course the bigger the required bandwidth, the smaller the number of possible
simultaneous calls. For each of the selected codec we can include an average of
more 15 Kbps of overhead.
This option allow other programs to connect to the asterisk, normally programs
running at LAN servers. Some examples: Mail plugin for calls generation, external
asterisk monitoring tools, call center for calls generation etc.
• Password;
• Network mask;
To cancel a transference, you just have to dial again the number you have
dialled to transfer. Example: you wanted to transfer a call to extension 481
but you have dialled *482. To recapture the call you shall have to dial again
*482 and then it is possible to transfer to the correct number dialling *481.
Calls capture
To capture a call ringing in another extension, dial *8 followed by the name
with which the telephone was registered or the name of the group of telephones
ringing.
By clicking insert we define the IAX servers that are authorized to forward
the calls using that IPBrick. The IPBrick will accept inbound routes from other
servers that will be specified in that list. Example at Figure 8.90.
Here is presented the full auto provisioning template list. The list shows the
template name, phone brand and model and the specific firmware version (Figure
8.91). We can manage existant templates clicking at the template name or clicking
Insert in the main menu to create a new template. The fiels are:
• Name: Name for the template. Usually is the complete phone brand and
model;
• Configuration files: Here the idea is to insert the desired configuration file.
It’s possible to have various auto provisioning configurations for the same phone
model. So we can change only some configuration parameters like ringtone, LCD
logo information, codecs etc. An example of a new template insertion is present at
Figure 8.92. A new list with some customized templates is shown at Figure 8.96
• Go to DHCP server and enable the option 66 (TFTP server) pointing the
IP to IPBrick;
• Get ready the SIP phone and connect it to the network (read next section)
The LAN DHCP server must have the option 66 active and pointing to the IP-
Brick IP. That option represents the TFTP server that will be always the IPBrick
were the auto provisioning is configured, because all the supported phones will get
the configuration stored in IPBrick using the TFTP server IP passed by DHCP. If
the IPBrick is the DHCP server, the option TFTP server at Advanced Configurations
- Support services - DHCP - Subnets must point to the IPBrick IP. It’s impor-
tant too to check that the phone firmware is the same listed at auto provisioning
template list.
Supported phones
This is a list of all the supported models:
Name Firmware version
Aastra 6731i 2.6.0.66
Aastra 6755i 1.37
Atcom 530 1.6.79.68
Cisco SPA303 7.4.8
Cisco SPA504G 7.4.8
Cisco SPA525G2 7.4.8
Grandstream BT200 1.1.6.46
Grandstream BT201 1.1.6.46
Grandstream GXP1200 1.1.6.46
Grandstream GXP2000 1.1.6.46
Grandstream GXP2010 1.1.6.46
Grandstream GXP2020 1.1.6.46
Grandstream GXP280 1.1.6.46
Snom 300 7.3.14
Snom 320 7.3.14
Snom 360 7.3.14
Snom 370 7.3.14
Snom 870 7.3.14
Thomson ST2030s 2.67
Yealink T20P 9.60.0.100
Yealink T26P 6.60.0.100
Yealink T28P 2.60.0.100
Atcom 530
Just connect the phone to the LAN. You just need to check that the DHCP
is active. If they are new the DHCP is active by default, if it’s a used phone
please change the network mode from static to DHCP or reset the configurations
by default.
16
Transport Layer Security
Fill the form with the necessary data. Note that, all generated certificates will
carry this info.
To create a certificate return to the TLS Management page and click on the
Insert link
Apply Configurations
Most changes don’t make the IPBrick server go to reboot, so a screen like
Figure 9.2 will appear. IPBrick only needs to reboot in these cases:
NOTE: The IPBrick Administrator will be notified should the VoIP service re-
quires restart, in order to apply the configurations. This will imply the momentary
loss of VoIP service, thus terminating all current calls. Please bear in mind this
when deciding to apply the changes.
And a screen like Figure 9.1 will be shown. It’s important to inform that
IPBrick will go to reboot, so the administration has the option to apply configu-
rations in that momment or at non work hours.
As we can see, we only need to change this type of configurations to get the
server in production at the costumer network. From the momment IPBrick is in
production, is becames very rare to go to a reboot because we don’t need to change
anymore of the network definitions, domain/server name and LDAP mode.
• Cancel all changes: Choosing that option, instead of Apply, will rollback
all configurations that were made. So IPBrick will stay with the settings
from the last time someone applied configurations, i.e. the last configura-
tion file that appears at Advanced Configurations - Disaster Recovery
- Configurations.
Appendix A
Join in the domain
1. Press [windows];
4. Right click on the icon Local Network Connection and select Properties;
6. Choose Get the IP Address Automatically in the open window and then
select Get the DNS server addresses automatically;
The next step is to confirm that the machine IP address is the same that was
introduced in IPBrick.I. Therefore you have to:
2. cmd [ENTER];
3. ipconfig /all;
If the IP address is not the one introduced in IPBRICK you have to release it
and renew it with the following commands:
2. cmd [ENTER];
3. ipconfig /release;
4. ipconfig /renew;
5. ipconfig /all.
If the machine IP address is right you can join the machine in the domain
EMPRESA:
2. Select ”Computer Name”, click on ”Change...” and give the computer a name
(the name must have been created in IPBrick.I before);
3. Press button ”more..” and add the dns machine domain: empresa.pt. Do
not select the option Change the primary DNS suffix when the association
to the domain is changed ;
6. Restart the machine. While the machine is starting you can already login
the domain EMPRESA.
⇒ Note: The workstation must not be with the DHCP. It can be configured
with a fix IP address. In this case you don’t have to fill in the field MAC Address
while you register the machine in IPBRICK.
Appendix B
Configuring a VPN connection
1. Press [windows]
The VPN connection is configured. In order to establish a VPN you only have
to introduce the user name and password registered in IPBRICK. IPBRICK is
now working as a VPN-PPTP server.
Appendix C
Configuration of a VPN SSL
connection (Open VPN)
The installation of this pack should be executed without changing the default
definitions. This software is installed in directory C:\Program Files\OpenVPN.
The certificate generated by IPBRICK must be unpacked into directory C:\Program
Files\OpenVPN\config.
To start a VPN connection, press the right button on icon OpenVPN in the
toolbar, choose the intended connection and press Connect.
Insert the password used to create the certificate in IPBRICK and the VPN
shall be established.
3. Extract the IPBRICK zip file to the config folder of OpenVPN. Example:
c:\Programas
\OpenVPN\config;
5. In the Windows Vista tray, click on the OpenVPN icon and connect;
NOTE: If it’s not working you need to modify the *.ovpn file in
c:\Programas\OpenVPN\config and add the following lines at the end:
route-method exe
route-delay 2
Appendix D
High Availability
13.1 Introduction
Users want their systems to be ready at all times. Downtime (i.e.: periods of
time when your system is unavailable) affects your users, your customers, sales,
revenue, productivity, and just about every other aspect of your business.
High availability (HA) is a system design protocol that garantees an operational
continuity during a given period of time and is now a possibility at IPBrick, using
a service called Heartbeat. The main idea is to have a clustering solution with two
or more IPBricks that provides:
• Availability:
• Reliability;
• Serviceability.
Note: High Availability is available solely for VoIP and E-Mail relay services.
13.1.1 Advantages
The advantage of clustering servers for HA is seen if one node in the cluster
fails, another node can resume the task of the failed node, and users experience
no interruption of access.
The advantages of clustering servers for scalability include increased application
performance and a greater number of users that can be supported. You can imagine
a cluster of servers as a single computing resource. With the total redundancy of
multiple servers that will make the system work if other servers fail, the cluster
can help achieve greater system uptime (i.e.: periods of time when your system is
available).
Clustering can be implemented at different levels,
• Hardware
• Operating systems
• Middleware
The more layers, the more reliable, scalable and manageable the cluster is.
13.2 HA Requirements
The minimum requirements to run an HA service in IPBrick are:
• At least two IPBricks (they can be more, it all depends on the client’s de-
mands, needs and expectations)
• All IPBricks have to be installed with the same IPBrick software version;
13.3 HA Configuration
To set up a high availability solution with two IPBrick’s:
– Rule: INPUT;
– Interface: lo;
– Protocol: ICMP;
– Policy: ACCEPT;
Note: The services (VoIP/E-Mail) must have exactly the same configuration
in both servers. To use the high availability an addicional licence is needed.
Appendix E
UCoIP
All enterprise communications - Voice, Mail, Instant Messaging and Web - are
managed in an integrated way, (i.e. unified through a single individual or group
address). To reach this goal, IPBrick uses only Internet communications services
(SIP, SMTP/IMAP, XMPP and HTTP) integrating them with DNS and LDAP
support services.
The generic site is ucoip.domain.com but the idea is to have one site for each
LDAP user. The following options are included:
As we can see, for SIP/SMTP/XMPP the user will be reached using the single
address [email protected]. Now we present all the necessary steps to configure a
UCoIP site for a specific LDAP user with username jsmith, with IPBrick FQDN
being ipbrick.domain.com:
Appendix F
IPBRICK.CAFE
15.1 Introduction
IMPORTANT NOTE: MyIPBrick was replaced by CAFE. You will find all
the MyIPBrick features and much more, in this new social intranet application!
Social Media plays a pivotal role in our interaction with the world around us.
As we create, share or exchange information and ideas in virtual communities and
networks.
15.1.1 Features
• Management of multi-channel presence, allowing you to see user’s availability
across various services:
– Voice;
– Video;
– Email;
– Chat.
• News/information area
• View and share documents from the Document Management and Workflow
System
• iPortalDoc
cafe.domain.com
The IPBRICK.CAFE user guide is divided into two sections, one addressing
basic user actions and another one dedicated to administrative tasks.
15.3.1 Access
Access to the CAFE is very simple, just open your browser and type the URL
address:
E.g.: ipbrickcafe.domain.com
Click on Login
After authentication you will access the home page of IPBRICK.CAFE. Where
you will find Business and Social News.
• Links menu: You may wish to customize your links menu by adding URLs
of your favourite page;
At the top right hand corner, you will find the Logout link and the user icon.
The User Icon icon opens a side window where you may check the online user
roster.
It is also possible to set your status for Chat, Video and Calls.
• Red: Unavailable
• Yellow: Absent
• Green: Available
The interface will notify you that the app was added successfully.
At the Create Link page simply type a Description (a reference name that will
be visible on the menu) and,of course, the URL address.
15.3.4 Posting
Posting is very simple, just type a text and/or upload an image. When you
have finished, simply click on the Publish button.
Where you will have all your personal files readily available.
You may perform the usual tasks; Copy, Move and Delete.
Personal Data
At the new page you may edit your personal data:
• Search Picture: Click this button, so you may upload a picture of you;
• Quota: User general quota if defined. If not defined it will show Unlimited.
Not editable;
• Password: When clicking Modify at top, the user LDAP password can be
changed too;
• Description / Biography: If you’d like, you may write something about you
so other users may read it;
VoIP Settings
• Follow Me: Phone associated to the user. Represents the phone number
that the user is using at the moment. Multiple phone numbers can be used:
Internal SIP addresses (Ex.: 201, phone01), external SIP addresses (Ex.:
[email protected]), PSTN number (Ex.: 00351221121334), GSM num-
ber, etc. No matter where, the user will always be available, the person who
wants to call, just needs to dial [email protected] and the selected
phone will ring. You may add more phones to the list, simply by clicking on
the + button;
Email Settings
• State: Shows if mail account is active or not. Not editable;
• Alternative address: Shows the user alternative mail addresses list. Not
editable;
• Mail quota: User mail quota if defined. If not defined it will show Unlimited.
Not editable;
• Forward To: The user can define other email addresses. So when someone
send a mail to [email protected], the addresses defined here will receive
a copy too;
When you have finished, click on the Save button. You may also click on the
Cancel button to abort the changes.