Aeonix Administration Manual - Version 51 Edition 73
Aeonix Administration Manual - Version 51 Edition 73
Administration Manual
Version 5.1
The Manufacturer reserves the right, without prior notice or liability, to make changes in
equipment design or specifications.
This document may contain flaws, omissions or typesetting errors; no warranty is granted nor
liability assumed in relation thereto unless specifically undertaken in the Manufacturer's sales
contract or order confirmation. Information contained herein is periodically updated and
changes will be incorporated into subsequent editions. If you have encountered an error, please
notify the Manufacturer. All specifications are subject to change without prior notice.
All trademarks contained herein are the property of their respective holders.
Disclaimer
The illustrations and other views, telephone displays or screen captures appearing in this
manual are examples used to explain more clearly, how the features and controls are used.
Therefore, what appears on the display or screen capture in the illustrations may differ from
what appears on the actual equipment, and some of the illustrations may represent something
impossible in actual operation. The functions that can be used and the information that can be
displayed will differ depending on the telephony state and external equipment being connected.
The names of companies, products, people, characters, and/or data mentioned herein are
fictitious and are in no way intended to represent any real individual, company, product, or
event, unless otherwise noted.
Record of Changes
Edition
Issue Date Brief Description
No.
1 Overview
2 Aeonix Features
3 Getting Started
4 Global Settings
6 Managing Users
7 Managing Phones
8 Managing Trunks
11 Managing Aliases
12 Configuring Services
14 Maintaining Aeonix
16 Glossary
TOC
Overview
This manual describes how the administrator configures Aeonix. The administrator
adds users and assigns them call extension numbers (aliases) and phones. Likewise,
the administrator adds and configures gateways and trunks to work with Aeonix. The
administrator is also responsible for configuring and maintaining Aeonix entities.
Finally, the administrator can define other Administration Levels with customized
Administration Tasks, authorizing other users, for example, to add new users to the
system.
Prior to using Aeonix, the application must be installed, and a soft key with the
appropriate license permissions must be uploaded and deployed on the designated
Aeonix License Key server. For details refer to the Installation procedure (see Related
Documentation, page 1-17).
Intended Audience
Chapter 3 Getting Started This chapter describes how to log in to the Aeonix
Portal and perform basic tasks. It also provides an
outline of Aeonix setup procedures and describes
how to access licensing information.
Chapter 9 Managing Trunk This chapter describes Aeonix trunk groups, how
Groups they are configured, and how their configuration
Introduction to this Manual
Chapter 13 Managing Your This chapter describes how to manage your own
Account account by utilizing the User Menu options.
Manual Conventions
NOTES:
A page that is intentionally left blank, and can be used for note-taking.
1
This section provides basic information about Aeonix and lists the devices that can be
connected to it:
About Aeonix, page 1-6
Aeonix Building Blocks, page 1-7
Supported Devices, page 1-12
Supported Codecs, page 1-13
Aeonix features and their configuration are described in Chapter 2, Aeonix Features.
Introduction to Aeonix
1
Entities
An Aeonix network consists of users, trunk groups, gateways, phones, and trunks.
Users represent individuals; trunk groups represent logical groups of trunks with a
common purpose.
Phones and trunks relate to actual hardware or software devices. Examples for
phones are a telephone or a softphone application on a user’s workstation; examples
for trunks are a SIP trunk, an analog trunk, or an E1/T1 channel to the PSTN. Phones
are associated with users, as a user needs to be logged in through a phone in order to
receive any service from the Aeonix system (such as placing and receiving calls). To
allow the logical configuration of a group of trunks, the system requires trunks to be
associated with trunk groups.
In addition, each user and each trunk group have one or more unique aliases assigned.
An alias is a specific number, range of numbers, or expression that is dialed to reach
the user or trunk group from within the Aeonix network. (External callers either dial
prefix digits or a central number followed by an extension number.) If a user’s cellular
phone or other external devices are defined in Aeonix, a call to the alias of this user
will also ring on these devices, if required.
Coral Wave Gateway and Tadiran TGW Gateway units are represented as gateways.
Gateways are used to connect legacy and non-IP equipment to Aeonix.
Introduction to Aeonix
Global Settings
Global settings are definitions and parameter values that are defined at the system
level, rather than for a specific entity.
The system provides predefined default instances for global settings. Default instances
cannot be removed, but their values can be modified. You can also create and apply
1
additional global setting instances. For example, you can use the predefined country
Country and area international and national dial codes and patterns
codes
Locations setting that indicates the country and area in which a phone
or trunk is located and used, including emergency call
configuration
Dial plans internal plans that defines the alias patterns that can be
assigned, as well as the codes dialed to make use of
Aeonix features
ARS (Automatic allows the system to route outgoing calls through the most
Route Selection) suitable transmission channel (trunk group), according to the
prefix of the calls
LDAP connections allows the system to be updated and kept synchronized with
the data residing on the organization’s LDAP server
The term 'CUG' is used throughout this manual. Currently, only the root CUG
(i.e. system-wide CUG) is supported in Aeonix.
Profiles
Introduction to Aeonix
Profiles are sets of parameters that can be associated with an entity. Dedicated profile
types for users and trunk groups exist, as well as template definitions for the different
phone and trunk types.
Profiles include a variety of general parameters, timeout settings, toll restrictions,
feature specifications, phone parameters, and trunk parameters. Profiles can also
1
define flexible routing and forwarding schemes for incoming and outgoing calls.
The administrator can define new administration level profiles with any
combination of administration tasks. Users assigned to a user profile
associated with an administration level profile that does not include any
administration tasks will not have access rights even to their own
personalized Web Portal.
The following table describes the five default administration level profiles and their Introduction to Aeonix
corresponding administration tasks.
Introduction to Aeonix
1
The following is a list of peripheral devices currently supported by Aeonix. You might
need some of the following equipment to work with Aeonix. To learn how to set them
up and connect them to Aeonix, refer to the relevant manuals as described in the
Related Documentation section of this manual.
MGCP: FlexSet-IP 280S, T200M Series (T207M, T208M/BL) IP telephone
Tadiran SIP Phones: T19P, T19P E2, T21P E2, T23G, T27P, T29G, T320,
T320P, T322, T328, T41P, T42G, T46G, T48G, T49G
SIP: P-Series (P-335, P-450) IP telephone
FlexIP Softphone (FLIPS)
SeaBeam video softphone (Version 1.5.20.2 build 62959 and higher)
Coral IPx Office with QSIG IP (Net-IP feature authorization)
Coral IPx 500 with QSIG IP (Net-IP feature authorization) and
PUGWipx/PUGW-2Gipx card
Coral IPx 800, 3000, 4000 with QSIG IP (Net-IP feature authorization) and
PUGW/PUGW-2G card
Coral FlexiCom 400 (with HDC Controller), 5000, 6000 with QSIG IP (Net-IP
feature authorization) and PUGW/PUGW-2G card
SIP-based AudioCodes FXO/FXS gateways
Tadiran TGW gateways
Sentinel Pro
Wave Gateway, as well as any voice terminals or trunks supported by and
connected through the Wave Gateway. These include FlexSet, DST, and DKT
phones; Single Line Telephones (SLT); Loop Start, Ground Start, E1/T1, BRI,
and PRI trunks; and many more. (For a full list, refer to the Wave Gateway
documentation.)
Other third-party phones (off the shelf) that have been approved for use with
Introduction to Aeonix
Aeonix. Contact the Aeonix manufacturer's representative for the approved list
of tested equipment and along with their test data.
1
Example
The initiator sends the list of codecs it has available locally, in this order:
g711
g729
g722
Aeonix will reorder the list and send to the destination:
g729
g711
g722
putting the lowest resource codecs earlier in the list. The endpoints will then negotiate
the codec based on the reordered priority of codecs.
Introduction to Aeonix
1
Upgrading Aeonix servers with the latest Aeonix ecosystem software versions,
including Aeonix, Aeonix Contact Center, and SeaMail is quick and easy. Just follow
the steps in the Aeonix Upgrade Version Wizard. A Rollback Wizard is also available.
Refer to the Aeonix Maintenance Tool Manual (see Related Documentation, page 1-17).
To obtain additional licenses, the Aeonix soft key must be updated. This is
described in detail in the Aeonix Installation Manual.
Support and Documentation
1
(Voice Messaging)
Aeonix Features
This section briefly describes the main features of the Aeonix system and refers to the
relevant pages in the Aeonix Web Portal.
For detailed instructions on activation and use of features, refer to the User
Guide of the relevant phone (see Related Documentation, page 1-17).
Aeonix Contact Center is an intuitive, flexible and easy to use all in one contact center
management solution. This out-of-the-box call routing system provides sophisticated
call blending, call proxy and automated callback features. Multimedia queue
management enables intuitive, prompt and personalized attention.
Aeonix Contact Center’s detailed historical, real time and cradle to grave reporting
allow organizations to easily and quickly measure contact center resources and to
adjust to changing business demands. It integrates seamlessly with customer CRM
solutions and can easily blend inbound and outbound calls to manage sales campaigns
and customer order processing.
The Aeonix Contact Center is designed to function in a clustered environment. A
secondary server can be defined for high availability purposes.
Feature Configuration
Licenses (License Information, page 3-35)
Aeonix Contact Center service—set up Aeonix Contact Center aliases (IRN)
numbers and configure call failover options (Configuring the Aeonix Contact Center,
page 12-17)
Set server for Aeonix Contact Center service in a clustered environment (Server
Settings for the Aeonix Contact Center Service, page 14-44).
For users that are allowed to use the Aeonix Contact Center client—download
the client on each user’s workstation (Downloading the Visor / Agent Client, page 6-103),
or instruct the users to download the client by themselves (Aeonix Contact
Center Installation and Getting Started).
Aeonix Directory
The Aeonix directory displays all the selected internal Aeonix aliases, including
Aeonix users, Aeonix Touch users, Hunt groups, ULA groups, Zone page, Conference
calls, and Meet-me conferences. Aeonix users can access, search for, and dial these
contacts directly from their supported phones.
Provisioned Tadiran SIP phones connect to the LDAP directory, while FlexSet, Setting up Aeonix Features
MGCP, and DKT phones obtain the directory directly from the Aeonix database.
Depending on phone type, the directory can be accessed using various methods,
including dialing the feature code (default: 1994), pressing the Directory soft key, or
pressing a pre-programmed button.
2
The Tadiran branded Aeonix Logger is a call recording and screen logging system that
records communication between SIP trunks and phones, as well as between
MGCP/analog/digital trunks and phones. Voice recordings in conjunction with screen
capturing capabilities allow all user activity to be thoroughly monitored and powerful
search mechanisms allow all recordings to be easily retrieved and played back by the
system administrator locally or remotely via a user-friendly web-based management
interface.
Aeonix Logger supports active recording, where streams are sent to the recorder from
a central point regardless of network topology. This method of recording allows any
endpoint and logical entity in the system to be recorded using Basic Rule Engine
(BRE) recording rules, including analog phones, digital phones, digital trunks, VoIP
phones, SIP trunks, user entities, ULA and more.
Selective recording can also be performed on demand by Aeonix users on supported
phones and applications via CSTA. A CSTA link can be used to send CTI information
(caller ID, dial number, alias, and DNIS) from the Aeonix to the Aeonix Logger, which
then generates meta data for storage purposes.
Feature Configuration
Setting up Aeonix Features
Aeonix can be configured to use the SeaMail product as a call recording center. In
some cases it may required to provide Record On Demand capability for Aeonix
without the need to deploy an additional server. This can be the case in an Aeonix
system deployed to a small- to mid-sized business. In this solution the recordings are
stored in the user's mailbox, and can be retrieved by either listening to them via the
phone or by sending them to the user's email address as an attachment.
Recording with SeaMail is initiated by the user on demand (RoD). The user initiates
the recording by activating the RoD feature during or before the call.
Limitations:
Recording by Rules - Not Supported
Total recording - Not Supported
Keep Control - Not Supported
Sticky Recording - Not Supported
Feature Configuration
Call Recording service—in the absence of an Aeonix Logger configured as the
recording center, Aeonix will use the SeaMail as the recording center if it has
been activated and licensed (Configuring Call Recording, page 12-23)
Programmed phone button (Programmable Button Dial Functions, page 5-60) or
Record on demand code (Table 4-10, Feature Codes for Dial Plans)
Aeonix Web Portal for Users (refer to the Aeonix Configuration Guide for End
Users)
The Aeonix Maintenance Tool is designed for support personnel who monitor Aeonix:
Identify and solve issues with Aeonix calls
View and analyze call details to prevent problems Setting up Aeonix Features
Aeonix Touch is a comprehensive, feature rich unified communications client that can
be operated from a desktop computer, offering a full range of capabilities that combine
all the benefits of a standard phone with the convenience and flexibility of an
interactive software application.
Feature Configuration
Licenses (Licenses, page 3-29)
Download the Aeonix Touch client on each user’s workstation (Aeonix Clients for
Users, page 6-99), or instruct the users to download the client by themselves
(Aeonix Configuration for End Users).
The ANI number refers to the phone from which the call is made. ANI restriction
allows a user’s ANI to be hidden from the external call destination.
Feature Configuration
For all calls—in the user’s Feature Configuration profile (Feature Configuration
Sub-profiles, page 5-15)
For a specific call—Programmed phone button (Programmable Button Dial Functions,
page 5-60) or ANI Restriction code (Table 4-10, Feature Codes for Dial Plans)
Auto Answer
Auto Answer sets the phone to automatically accept incoming calls, that is, activate
the speaker or the headset when an incoming call is received. This feature is mainly
used by call center agents in telemarketing and support centers.
This feature can be turned on and off directly from the phone or in the user’s Feature
Configuration profile.
Setting up Aeonix Features
Feature Configuration
User’s Feature Configuration profile (Feature Configuration Sub-profiles, page 5-15) or
Auto Answer code (Table 4-10, Feature Codes for Dial Plans)
2
Auto Redial allows users to automatically dial busy and non-answering destinations
according to the predefined number of ring attempts by pressing a dedicated soft key,
programmed button, or code.
This feature can be suspended by activating the Freeze Auto Redial feature.
Feature Configuration
Auto Redial—set number of ring attempts and time intervals between attempts,
in the Feature Configuration profile (Feature Configuration Sub-profiles, page 5-15). This
parameter can be overridden for individual users.
Programmed phone button (Programmable Button Dial Functions, page 5-60) or
Auto Redial and Freeze Auto Redial codes (Table 4-10, Feature Codes for Dial
Plans)
The Aeonix distributed ACD feature allows Aeonix users to function as call center
agents via ACD and Hunt groups. When used in conjunction with the Aeonix Contact
Center, the ACD feature allows for a complete call center solution.
An ACD/Hunt group is assigned an alias number and includes specified users and/or
user groups. A call to this number is directed to the first available user (agent)
according to the specified call distribution method. If all logged-in ACD/Hunt group
members are busy or on break, the incoming call is put on the group’s waiting queue.
According to the ACD/Hunt group definition, the caller either hears a recorded
message or music until an ACD group member becomes available, is automatically
transferred to a specified overflow destination such as voicemail, or is disconnected.
ACD/Hunt group members can make use of ACD related features, including:
Answer, reject, and place ACD calls on hold, during which time the agent
becomes unavailable to answer other calls (including private calls)
The trunk groups (channels) through which Aeonix routes outgoing calls can be
flexibly defined to improve call quality and throughput while reducing costs. Taking
into account calling user location, destination number, and applicable call routing
rules, ARS tables route the calls through the optimal available trunk group. For further
details, see Automatic Route Selection (ARS), page 4-43.
Feature Configuration
Define trunk groups (Chapter 9, Managing Trunk Groups).
Define countries and areas (Defining a Country, page 4-4).
Define the ARS table (Defining an ARS Table, page 4-46).
Test the ARS table definition (Testing an ARS Table, page 4-49).
Setting up Aeonix Features
2
Multiple users and their phones can be imported into the Aeonix system from a CSV
file. Prior to the import, the administrator specifies which fields are included in the file
and in what order.
Feature Configuration
See Importing / Exporting Users, page 6-79.
Break-in
Break-out
An authorized Aeonix user can perform a Break-out on a target destination. Any call
that the destination is involved with is put on hold for the destination, and then a call
is created between the user and the target destination..
Feature Configuration
The system supports on demand and online CDR applications that provide
information on each call in Aeonix.
Feature Configuration
CDR service (Configuring Call Detail Records (CDR), page 12-97)
The Aeonix administrator can set an outbound and transit call duration limit for
individual users., for cost protection.
Feature Configuration
Call Time Limit (Feature Configuration Sub-profiles, page 5-15, Figure 5-6, Table 5-6)
Call Groups
A call group includes several users and/or user groups under a dedicated alias number.
When this number is called, the phones of all members belonging to the call group ring
until one of them answers the call.
Feature Configuration
See Feature Parameters, page 5-17.
Call Log
This feature allows users to view and redial their most recent outgoing and incoming
calls to their telephone, including unanswered incoming calls. The call display
Setting up Aeonix Features
includes the caller number and the name associated with that number, as available.
Call Pickup
A ringing phone can be picked up from any phone within your system or from a
pre-programmed Pickup Group, as follows:
2
Call Preemption
Call Preemption can be defined for user, conference call, and zone page aliases. It
ranks the priority of calls (medium, high, or urgent). When dialing a lower ranked alias
that is currently making a call or being called, Call Preemption causes the call attempt
to be dropped in favor of the higher priority incoming call.
Similarly, Call Preemption determines the action to be taken when the destination is
currently busy with a lower ranked call:
Call Waiting – the called user is notified by a special call waiting indication
tone that there is an incoming call of higher priority (even though the called
user’s call waiting feature is not activated). This is the default action.
Break In – the called user is notified by a special break-in indication tone and
the call turns into a three-way conference call between the existing parties and Setting up Aeonix Features
the incoming call of higher priority. In the event a conference call cannot be
established, the original call is dropped and the incoming call of higher priority
begins a private call with the called user.
Hold – the party with which the called user is conversing is put on hold and
the incoming call of higher priority rings at the called user.
2
When a caller calls to a phone on which call waiting is activated and the phone is
engaged, the caller does not receive a busy signal but is put into a wait queue instead.
While in the wait queue, the caller hears either a regular ringing tone or a call waiting
ringback tone. The called user is notified by a special call waiting indication tone.
On display-equipped phones, the number or name of the callers are indicated on the
phone display. A waiting party can also be indicated by a lit Line button on the user’s
phone. More than one Line button can be programmed for multiple waiting calls.
Call waiting can be activated for all calls (internal and external).
Feature Configuration
Call waiting activation—Feature Configuration profile (Feature Configuration
Sub-profiles, page 5-15)
Line buttons—button programming (Phone Profiles, page 5-54)
Camp-on
available by being first busy and then idle again. This option is for when it is
known that the other destination is out of the office and cannot get back to the
user right away.
Camp-on busy informs the user that the called busy user or alias has become
idle. This option is for when it is known that the other destination is in the
office and can get back to the user shortly.
Camp-on auto the system automatically makes the camp-on request based on
2
the destination and state (busy or idle) of the last outgoing internal call. In this
Aeonix provides Camp On features for SLT / POTS telephones for low-cost
deployments.
Currently only the root CUG (i.e. system-wide CUG) is supported in Aeonix.
The use of Closed User Groups (CUG) enables multiple organizations or departments
to co-exist as separate, fully independent units in the same Aeonix system. Each of the
CUGs is treated as a totally different exchange, even though they are managed in the
same Aeonix system.
With CUGs, the same system can be shared by multiple companies, or by different
departments within a company. This feature can be used to create hosted and co-hosted
systems for ASPs and ITSPs (Application Service Providers and Internet Service
Providers).
Dial patterns and feature codes can be separately defined for each CUG.
Administrators assigned to a CUG can view and manage the settings and entities of
this CUG and its subordinated CUGs; Root CUG administrators have access to all
settings and entities in the system (see also Administrator Levels, page 3-4).
Users of different CUGs can be assigned the same ID and alias number. A member of
another CUG can be called by dialing the relevant CUG code followed by the alias
number of this user, provided inter-group access is allowed.
When put on hold or transferred to another number, callers to a CUG are played a
music on hold.
Feature Configuration
Define dial plans (Dial Plans, page 4-19)
Define the Closed User Groups (Closed User Groups (CUG), page 4-29).
Define global settings: When adding profiles, sub-profiles, schedules, and ARS
tables, assign them the relevant CUG. (Once saved, the CUG assignment
cannot be changed.)
Define entities: When adding users, phones, trunk groups, trunks, gateways,
user groups, and pickup groups, assign them the relevant CUG. (Once saved,
Setting up Aeonix Features
Feature Configuration
CTI service—set the CTI port (Computer Telephony Integration (CTI), page 12-99).
Conference Calling
A call with more than two participants is called a conference call. Aeonix supports the
following conference types:
Conference call — the initiator dials the conference call number and all the
members join the conference call. In addition, authorized users can also join an
existing conference call. Up to 125 members can participate in this type of
conference call.
Meet-me conference — a dial-in teleconference. Each of the participants dials
the same previously agreed conference alias number to join the conference.
N-way (add-on) conference — the conference initiator calls the other
participants and invites them to join. The maximum number of participants Setting up Aeonix Features
depends on the number of Aeonix servers and available resources.
Secure meet-me conferencing with password (access code) protection is also
available. Conference owners can set or remove access codes. Conference participants
2
This feature allows users to divert an incoming call while actively engaged in another
call, or while an idle telephone is ringing, without answering it. The call the user is
engaged in is not interrupted, nor is the incoming caller aware of the diversion.
Feature Configuration
Programmed phone button (Programmable Button Dial Functions, page 5-60)
Dial Lock
Dial Lock allows a user to lock their phone so that no outbound calls can be made from
the phone. The user can answer an incoming (emergency) call by entering their PIN,
and the phone will remain in Dial Lock after the call is disconnected.
Feature Configuration
Define profiles and sub-profiles, or modify default profile settings (Chapter 5,
Profiles).
This feature allows outside callers to dial a user number and be directly connected to
the user, without going through the system auto-attendant or operator.
2
Dispatch Console
The Dispatch Console application is used to monitor and coordinate responses to both
emergency and day-to-day operations across multiple locations. Dispatchers can
easily communicate with peers at the click of a button and all calls in the Dispatch
Console can be recorded and stored for future analysis and review.
The Dispatch Console also supports interoperable communications among users of all
devices, wherever they are located, and provides control of remote extensions through
an easy-to-use on-screen interface.
The Dispatch Console is composed of a left phone, a right phone, and a PC between
them. It can be run from a web browser via a PC or touch screen portable devices, such
as a tablets and smart phones. When a user connects to the Dispatch Console, the grid
and buttons are displayed as defined by the administrators of the Dispatch Console,
according to the profile associated with the Dispatch Console.
Feature Configuration
Define dispatch consoles (Defining a new Dispatch Console, page 12-106)
Define dispatch console profiles (Defining a Dispatch Console Profile, page 12-107)
Dispatch user configuration—set up a user as a dispatch console user (Defining
User Identity Settings, page 6-14)
Automatically conference aliases (System Information, page 14-25)
Emergency Conference calls include several users and/or user groups under dedicated
alias numbers. These alias numbers function as virtual conference rooms. When an
initiator dials a conference call number, all the members join the conference call.
Authorized users can also join an existing conference call. The system can be
configured to notify participants of the incoming conference call. Up to 125 members
can participate in a conference call.
Emergency Conference Service implements a special Conference Call template,
which has the following specific aspects:
Emergency Conference Call supports the Tadiran Panic Button SIP device.
An Emergency Conference is initiated when a SIP endpoint dials the alias of
an Emergency Conference.
The Emergency Conference displays the name of the endpoint caller. A name
can be associated with the Tadiran Panic Button device, so that conference
members receiving an invite to join can see who/what initiated the Emergency
Conference.
The Emergency Conference call is created from a pool of aliases. If no alias is
available, the Emergency Conference call will be created without an alias, so
that emergency calls will always be supported.
Setting up Aeonix Features
Unlike the normal Conference Call, there is no Announcers Tab for setting up
announcers. An emergency call should not be cluttered with announcer
prompts.
Feature Configuration
See Defining Emergency Conference Calls, page 12-71
2
Where emergency centers are available, the system can be configured to support
emergency calls. Users in distress can call for help without having to tell the
emergency operator where they are; this information is automatically provided
through the phone from which they are calling. Call blocking definitions, such as toll
barrier rules and ANI restrictions, are not applied to emergency calls. Emergency calls
can be placed from any phone connected to Aeonix, regardless of the login status of
the phone. The only exceptions are immediate hot station phones, which call an
individually specified emergency number.
Aeonix 4.1 supports Link Layer Discovery Protocol (LLDP) for emergency
Emergency Line / Location Identification Number (ELIN) processing. The ELIN
number for a SIP end-point can be defined in Aeonix, in which case the ELIN will be
added by Aeonix during an emergency call. Alternatively, the ELIN can be defined in
the terminal switch to which the end-point is connected. In this default case, the ELIN
is loaded to the phone from the switch by the switch firmware, and from there is loaded
up into the Aeonix database. Aeonix Administrators must be aware that any ELIN
programming on the switch will take precedence over an Aeonix-defined ELIN .
Feature Configuration
For users—set emergency call settings for their location (Defining Emergency Call
Settings, page 4-16).
For a specific phone—set ELIN (Defining a Phone in Aeonix, page 7-10).
Allocate trunk groups per location, or as described in Reserving a Trunk Group for
Emergency Calls, page 9-24.
Enable emergency callback feature (System Parameters, page 14-27)
ESF allows users of Tadiran SIP phones to configure programmable buttons such as
Break-in, Conference call, Deflect, Silent monitoring, and Aeonix Contact Center
In order to benefit from high availability (see Redundancy, page 2-34) a DNS server must be
2
FlexiCall allows users to receive calls on any of their devices. An incoming call rings
on all or specific phones associated with the relevant user until the user answers the
call on one of the phones. If the answering phone is an external device, the call
automatically becomes a mobility call (see Mobility, page 2-27).
Feature Configuration
User—define the user’s phone numbers by their external or alias numbers
(Assigning Aliases to Users, page 6-19 and Specifying External Phone Numbers, page 6-27).
User’s Incoming Call Routing profile—specify which phone will ring on an
incoming call (Defining Basic Rules for Incoming Call Routing, page 5-33). Incoming call
routing can also be done by the user.
FlexIP Softphone
Aeonix is a pure VoIP system and requires gateways to connect to legacy equipment
to the PSTN network and to interface digital and analog devices.
Tadiran TGW gateways provide residential telephony and fax services through
broadband networks via FXS and FXO ports, enabling vast deployment in delivering
Aeonix as enterprise-based voice applications.
The Wave Gateway allows Aeonix to integrate the existing hardware of a Coral
IPx/FlexiCom systems. All features of Aeonix are applied to the trunks and phones
(stations) of the Coral IPx/FlexiCom legacy equipment.
Feature Configuration
Licenses (Licenses, page 3-29)
TGW gateway configuration (Configuring Tadiran TGW Gateways, page 10-41)
Wave gateway configuration (Configuring Wave Gateways, page 10-7)
Define Wave Gateway phones (Chapter 7, Managing Phones).
Define Wave Gateway trunks (Chapter 8, Managing Trunks).
Set default user code (Table 4-10, Feature Codes for Dial Plans)
Group Listening
The speaker key or another dedicated key can be programmed for combined audio to
activate the Group Listening feature. This feature allows simultaneous use of the
speaker and the handset. The conversation is carried on as usual through the handset,
while the conversation is also broadcast through the speaker.
Feature Configuration
Speaker button with toggle option (Assign dial functions to programmable phone buttons:,
page 5-59) or
Programmed phone button (Programmable Button Dial Functions, page 5-60)
Setting up Aeonix Features
Headset Only mode can be used by ACD agents, operators and any other T207M,
T208M/BL, FlexSet-IP 280S IP, as well as FlexSet phone users via the Wave Gateway,
to conduct conversations via a headset. Calls are conducted via the headset even if the
cradle switch is on-hook, enabling users to make full use of the hands-free operation.
A zip tone is heard via the headset indicating incoming calls.
2
Hot Station
A user’s phones can be configured to act as hot stations. An immediate hot station
automatically calls a specified destination when the user lifts the phone handset or
presses any key on the dial pad. A delayed hot station calls the specified destination
if after an internal dial tone was received, no key is dialed within a certain time period.
Outgoing call routing also includes the capability of defining a user’s phones as hot
stations. A hot station automatically calls a specified destination when the user
operates the phone.
Feature Configuration
Feature setup and activation is part of the procedure described in Outgoing Call
Routing Sub-profiles, page 5-41.
Aeonix can add, delete, and update users from an Active Directory or any LDAP based
directory. This capability allows for using a central LDAP based organizational
directory as the primary reference in the enterprise for user data. Any change in user
data in the directory can then be updated in the Aeonix configuration. Prior to the
update, the system provides the administrator the ability to preview and edit the
changes before saving them to the Aeonix database.
Feature Configuration
Define LDAP connections (Defining an LDAP Connection, page 4-55).
Verify LDAP parameters (Testing LDAP Connections Parameters, page 4-61).
Import LDAP users (Importing LDAP Users, page 6-87).
Aeonix allows users to log out from their phones and log in to other phones connected
to the system, provided guest login is not restricted for these phones. This feature is
useful in call centers, where one telephone can be used consecutively by several agents
working in separate shifts. It also allows temporary assignment of a phone to a guest
or to IT personnel for maintenance purposes.
Setting up Aeonix Features
Once a user has logged in to a phone, the user’s profile settings are applied to this
phone. A user is automatically logged in to a phone if the user is defined as its default
user.
Feature Configuration
Set the user alias and PIN code for authorized login / logout (Defining User Identity
Settings, page 6-14). The PIN code can also be specified by the user.
2
Mobility provides an internal dial tone and Aeonix services to users of remote and
cellular phones. Once recognized by the system, external callers, as Aeonix users, can
place calls and benefit from Aeonix features. An authentication process, based on a
combination of the caller number, user name, and PIN password, prevents service
abuse by hackers or unauthorized callers.
Mobility significantly cuts costs by allowing traveling personnel and employees to
place calls through the Aeonix network, rather than through expensive cellular and
long-distance lines. The service can be implemented through:
Call-through—the external user calls a dedicated number and receives a dial
tone after successfully completing the authentication process.
Callback—the external user calls a dedicated number. Aeonix identifies the
user, disconnects the call, and calls the user back at a predefined callback
number. Upon answering the call, the user receives a dial tone.
During a mobility call, a DTMF-tone based interactive subscriber’s menu allows the
user to activate basic call features by pressing keys on the phone dial pad. Users can
transfer calls to their desk phones or mailboxes, divert calls to other users, monitor
calls, place new calls, and more.
Feature Configuration
Mobility service—set up call-through and callback alias numbers. For each alias,
define call parameters and access rules. (See Defining Mobility Aliases, page 12-89.)
User—set the user alias and PIN code (Defining User Identity Settings, page 6-14) and
configure mobility access rules (Configuring Mobility Rules for a User, page 6-62).
User—set Callback and Call-through settings to determine whether the caller’s
external number (ANI) or alias number is displayed to the party receiving the call
(Feature Configuration Sub-profiles, page 5-15).
Multi-Level Administration
Aeonix allows for complete multi-level administration by assigning administration Setting up Aeonix Features
level profiles and their associated administration tasks (see Administration Levels and
Tasks, page 1-9) to subsets of users. This determines which users in the system have the
authority to access and/or manage which particular pages in the Aeonix Web Portal.
In addition to the default levels (see Table 1-3 on page 1-9), the administrator is
authorized to define additional administration level profiles with customized
administration tasks. When defining administration level profiles, the administrator
2
Multi-Tenant Mode
Feature Configuration
Root CUG (Closed User Group)—specify the default music on hold source for
G729, PCM-A and PCM-U codecs when no specific MOH was defined for the
target alias (Defining a Closed User Group, page 4-32).
Music service–specify the music source (file or IP stream) and the aliases that
use this MOH (Configuring a Music Source and MOH Alias Numbers, page 12-114)
Mute Microphone turns off the microphone before or during a conversation, so that
the other party cannot hear the user. Mute Ringing turns off the ringing of an
incoming call.
Both mute types are activated by pressing a dedicated soft key or programmed button
on an MGCP keyset (FlexSet-IP 280S, T207M, T208M/BL) or on a digital keyset
2
Network Alarms
Aeonix creates and displays alarm messages when system resources or licenses are
becoming scarce or malfunctioning (see Alarms, page 14-1). Depending on system
configuration, these alarms are displayed in the Alarms report, sent to an external
SNMP / NMS server, or sent to specified email addresses.
Feature Configuration
Set the alarm threshold and notification method for each alarm type (Configuring
Alarm Notification Options, page 14-22).
Set parameters for accessing SNMP / NMS server or sending emails to SMTP
addresses (Configuring Alarm Access Parameters, page 14-18).
Setting up Aeonix Features
2
Outgoing Aeonix calls can be manipulated and rerouted by the system. Outgoing call
routing is flexible and based on configurable Automatic Route Selection tables. The
system supports a variety of operations for truncating, modifying, or replacing all or
specific outgoing call numbers, and redirects the calls accordingly. In addition, the
caller (user) ID information displayed to external destinations can be hidden or
redefined.
Feature Configuration
For a specific user—define or modify outgoing call routing settings (Overriding
Outgoing Call Routing Parameters and Rules, page 6-43). Rules defined in an Outgoing
Call Routing sub-profile cannot be modified at the user level.
For multiple users—define or modify the relevant Outgoing Call Routing
sub-profile (Outgoing Call Routing Sub-profiles, page 5-41).
See also Page Queue, page 2-31.
Page Queue
A call can be put on hold by dialing a dedicated page queue alias number and then
retrieved by dialing this number from any other phone in the system. For example, an
office manager or hotel operator places a call received for a certain user in page queue
and then announces to this user which page queue alias to dial in order to retrieve the
call.
User settings are defined through user profiles. Parameters set up in profiles include
general and timeout settings; call feature configuration; incoming call forwarding or
rejection; manipulation rules for outgoing calls; toll barrier restrictions; and
programming of phone buttons.
Some profile parameters are configured by the administrator only, while others can be
overridden by the users depending on override permissions. Trunk groups are
programmed using trunk group profiles.
Feature Configuration
Define profiles and sub-profiles, or modify default profile settings (Chapter 5,
Profiles).
Assign sub-profiles to User or Trunk Group Profiles (Defining a User Profile, page 5-84
and Defining a Trunk Group Profile, page 5-86)
Assign the profiles to users and trunk groups (Assigning a Profile to a User, page 6-30
and Defining Trunk Group Settings, page 9-9)
Override sub-profile parameters for a specific user or trunk group (Overriding User
Profiles, page 6-29 and Overriding Trunk Group Profiles, page 9-10). Sub-profiles may be
override-protected.
Users can configure programmable buttons on their phones to call any user or external
number, or to activate a specific feature. A button programmed to ring a specific
number will light up when that number is occupied or flash when there is an incoming
call from the programmed number.
Feature Configuration
For a specific user—define or modify phone button programming (Configuring a
User’s Phone Profiles, page 6-49). Locked buttons can only be reprogrammed in the
relevant phone sub-profile.Aeonix 4.1 and later support Programmable Button
Sync between Aeonix and Tadiran SIP phone memory. See Configuring a User’s
Phone Profiles, page 6-49 for details.
Setting up Aeonix Features
For multiple users—define or modify the relevant phone sub-profile (Phone Profiles,
page 5-54).
See also Page Queue, page 2-31.
The Provisioning service allows Tadiran SIP phones and P-Series phones (see
2
Supported Devices, page 1-12) to be automatically updated in Aeonix with the latest
Feature Configuration
Provisioning service—specify the polling interval to check for new phone
configurations including firmware updates (Configuring PnP / Provisioning Service,
page 12-123)
Define provisioning profiles (Managing Provisioning Profiles, page 5-91)
Define new configuration sets (Defining New Configuration Sets, page 12-130)
Assign provisioning profiles to phones (Provisioning Parameters, page 7-16)
Importing PnP users (Importing / Exporting Users, page 6-79)
Recall on Transfer
When a call is transferred to a destination that does not answer, the call is returned
(recalled) to the initiator of the transfer, according to the transferor’s Recall on
2
Redial
Redial allows users to dial the last dialed number by pressing a dedicated soft key,
programmed button, or code.
Feature Configuration
Programmed phone button (Programmable Button Dial Functions, page 5-60) or
Redial code (Table 4-10, Feature Codes for Dial Plans)
Redundancy
continue unaffected.
In order to benefit from redundancy, a DNS server must be present in the network and
accessible to the Aeonix server.
2
Endpoint registration can be effectively controlled on the cluster level. This improves
resource usage by optimizing phone allocation among the servers. A Load Balancing
Logic (LBL) algorithm takes into account server and endpoint locations, as well as the
maximum number of endpoints allowed per server. Endpoints can migrate to any
server as per their call agent list, thereby creating the best mix of endpoint allocation
among the servers of a cluster.
Feature Configuration
Feature setup (Configuring the Cluster for Registration Load Balancing, page 14-41) and
activation (Displaying Cluster Information, page 14-34)
Aeonix servers can be configured and maintained from a remote workstation through
a secure programming interface designed for low bandwidth resources.
Server maintenance functions include server IP address configuration, version
upgrade, cluster setup, and more. Standard and proprietary Linux shell script
commands facilitate efficient debugging tasks, including event tracing, resource
monitoring, and identification of call failure causes. Detailed log files and third-party
network analysis tools are also available. For details, see Server-based Maintenance
Tools, page 14-79.
Room Recording
Room recording allows a room to be continually recorded for monitoring purposes via
the microphone of the designated device.
CP860 IP conference phone is the Tadiran certified device for Room Recording. It
comes equipped with three built-in microphones for 360º voice pickup over a distance
of 10 feet.
Optional expansion microphones are available for even greater reception for
larger conference rooms.
Feature Configuration
Call Recording Rule—set up the call recording rule associated with the room
recording device (Defining a Call Recording Rule, page 12-28)
Room Recording—set Continuous connection in the Feature Configuration
profile (Feature Configuration Sub-profiles, page 5-15). This parameter can be
overridden for individual users.
Setting up Aeonix Features
Schedules are used to have a system activity, such as forwarding calls to a mailbox, be
performed only at a specific time or at regular intervals.
Schedules consist of one or more time frames. Each time frame specifies a once-only
time and date or a yearly, monthly, or weekly recurrence pattern. Complex scheduling
specifications can be defined as well, for example, every year on the last Thursday in
November between 11 AM and 1 PM.
Feature Configuration
System-wide schedules (Schedules, page 4-37)
Schedules to be assigned to a User or Trunk Group profile (Schedule Sub-profiles,
page 5-28)
Schedules for a specific user or trunk group (Overriding Schedules, page 6-39)
Sea Attendant
Sea Attendant can be used with the following phones: Tadiran SIP phones,
P-Series, FlexSet via Wave Gateway, FlexSet-IP 280S, FlexIP Softphone,
T200M series (T207M, T208M/BL).
No Support for: SLT via Wave Gateway, SLT via Tadiran-TGW gateway, or
any other third-party SIP phones.
The number of users that can have the Sea Attendant installed on their computer
depends on the system license settings and is displayed on the License Information
page (see Figure 3-15 on page 3-35).
Feature Configuration
Licenses (License Information, page 3-35)
For a specific user—specify whether the user is allowed to use the
Sea Attendant (Overriding Feature Parameters, page 6-36).
For multiple users—allow or restrict the use of the Sea Attendant in the relevant
Feature Configuration sub-profile (Feature Configuration Sub-profiles, page 5-15).
See also Page Queue, page 2-31.
For users that are allowed to use the Sea Attendant—download the Sea
Attendant on each user’s workstation (Downloading the Sea Navigator / Sea Attendant
Client, page 6-102), or instruct the users to download the Sea Attendant by
themselves (Aeonix Configuration Manual for End Users).
Setting up Aeonix Features
2
Sea Navigator can be used with the following phones: Tadiran SIP phones, Setting up Aeonix Features
P-Series, FlexSet via Wave Gateway, FlexSet-IP 280S, FlexIP Softphone,
T200M series (T207M, T208M/BL).
No Support for: SLT via Wave Gateway, SLT via Tadiran-TGW gateway, or
any other third-party SIP phones.
2
Silent monitoring refers to the practice of call center managers or senior agents
listening in on conversations between agents and customers, as well as for voice
recording purposes. It is generally used in training as well as day-to-day call center
interactions to ensure that customer service and productivity goals are being met. For
quality assurance purposes the agent is not aware if the call is being monitored or not.
Feature Configuration
Assign users that are authorized to perform Silent Monitoring (Defining Permission
Settings, page 6-74)
Authorize trunk group members to perform Silent Monitoring (Authorizing Trunk
Group Members to perform Silent Monitoring, page 9-26)
Programmed phone button (Programmable Button Dial Functions, page 5-60) or
Silent Monitoring codes (Table 4-10, Feature Codes for Dial Plans)
Single Sign On
page 4-67.
Turn Aeonix SSO integration on / off System Parameters, page 14-27.
2
Timeout Programming
A timeout defines the amount of time the system waits before it performs a certain
activity (for example, disconnects a call or rings again for a held call). Several timeout
values can be set.
Feature Configuration
For a specific user or trunk group—define or modify timeout values (Overriding
Timeout Parameters, page 6-35). Some timeouts are preset and cannot be modified.
For multiple users or trunk groups—define or modify the relevant Timeout
sub-profile (Timeout Sub-profiles, page 5-12).
See also Page Queue, page 2-31.
Toll Barrier
Toll barrier rules can be set up to block outgoing calls depending on the destination.
Exceptions to these rules can be defined as well. The system performs an analysis on
the dialed digits in order to allow or restrict the call according to these rules.
This feature is mostly used for preventing employees from placing costly Setting up Aeonix Features
premium-rate service calls or international calls.
Feature Configuration
For a specific user—set or modify toll barrier rules (Overriding Toll Barrier Rules,
page 6-37).
For User or Trunk Group profile—define or modify the relevant Toll Barrier
sub-profile (Toll Barrier Sub-profiles, page 5-24).
See also Page Queue, page 2-31.
2
An Aeonix user can transfer both internal and external calls to another destination
within the system or outside it. During the transfer, the other call participant or
participants are put on hold and hear music or an announcement defined for the system
(see Multi-Tenant Mode, page 2-28).
Call transfer can be screened or unscreened:
Screened transfer—the user announces the call before transferring.
Unscreened transfer—the user transfers the call without a prior announcement
or without notifying the recipient.
To transfer a call, the user presses a programmed button or soft key on the phone.
Feature Configuration
Programmed phone button (Programmable Button Dial Functions, page 5-60)
Flash mode (Feature Configuration Sub-profiles, page 5-15).
Aeonix includes SeaMail as its fully integrated default voicemail and Unified
Messaging (UM) application.
The Aeonix system can also be set up to work with additional voicemail programs,
such as Microsoft Exchange connected through SIP Trunk presenting the UC, as it can
be connected to MS LYNC Mediator.
SeaMail users can receive voice and fax messages as email attachments, or have their
emails converted to voice files and listen to them from their voice mailbox.
SeaMail users can:
Receive voice and fax messages as email attachments, or emails as
text-to-speech converted voice messages (depending on the system
Setting up Aeonix Features
configuration)
Hear and manage voice messages
Record and forward messages to mail boxes or groups
Specify their own voicemail settings, including password, introductory
greeting, and wake-up calls
Activate or disable call screening
SeaMail provides an automated attendant facility, enabling callers to a “main”
2
ULA provides workgroup shared line button functionality. A user can be defined as
the owner of a ULA group, in which an incoming call can ring, as well as flash a
programmed shared line button, at the devices of the group members. The members
can also place calls on behalf of their group owner.
ULA is ideal for management positions in which a manager (the group owner) is
assisted by one or more assistants (the regular group members). An incoming call to a
ULA group owner’s alias can be answered and handled by any of the assistants.
Each ULA group consists of its group owner and one or more regular members (up to
25 members per group). The manager (owner) and assistants (regular members) can:
View and answer incoming calls to the ULA owner
Have incoming calls to their ULA ringing at their phones immediately, after a
delay, or not at all
Put a call on hold for consultation. Any member can retrieve a held call unless
the call is put on exclusive hold.
Transfer the call
member answers an incoming call, the devices of the other members stop ringing, but
User Presentation
The system identifies users by their unique User ID. The display of user information
on internal phones is specified through profiles. This parameter can be overridden for
all phones of an individual user or for specific phones belonging to this user.
When a user connecting from outside places an internal call (mobility call), the ANI
number or the internal display name of this user is displayed at the called destination,
as specified in the mobility settings of this user.
Feature Configuration
User—set the display name (Defining User Identity Settings, page 6-14)
Phone—override the display name for a specific phone (Configuring a User’s Phone
Profiles, page 6-49)
Mobility—set Callback and Call-through settings to determine whether the
caller’s external number (ANI) or alias number is displayed to the party receiving
Setting up Aeonix Features
The Virtual Endpoint service enables external customer applications (such as IVR
systems) to manage the control flow of incoming calls, allowing these applications to
perform operations on calls.
Feature Configuration
Virtual Endpoints service—define virtual endpoint alias numbers (Defining Virtual
Endpoint and Virtual Agent Alias Numbers, page 12-152).
Voice Page
This feature allows an Aeonix user to place a call and talk without having to wait for
the called person to manually answer the call. Similar to receiving an intercom call,
the called user hears the paging via the telephone speaker and can answer directly or
after picking up the handset. Each user also has the option of blocking this feature and
receiving voice page calls as regular calls.
Voice page calls are of higher priority than regular calls and announced by a special
ring tone. Call forwarding and rejection rules are not applied to these calls.
Feature Configuration
User’s Feature Configuration profile (Feature Configuration Sub-profiles, page 5-15)
The Aeonix Web Portal is a centralized, Java-based web interface that can be accessed
from any workstation connected to the network. To enhance network security, the
Portal can be set up for access via HTTPS (secured HTTP).
The Web Portal’s well-arranged, intuitive structure provides administrators with a
convenient tool to manage Aeonix settings and entities. The Portal supports multiple
languages.
A restricted version of the Aeonix Web Portal is available for each user in the system.
Users access the portal to manage their own parameter settings and presence status.
For more information, refer to the Aeonix Configuration Guide for End Users (see
Related Documentation, page 1-17).
Zone Page
Zone Page calls include several users and/or user groups under dedicated alias
numbers. When an initiator dials a Zone Page number, the system places calls to all
the members (Auto Answer mode). During the dialing period, which can take a few
seconds, the system plays the mandatory announcement to members that are already
connected to the zone page call. This message is then optionally followed by a user
defined First announcement. During the Zone Page, all the members’ phones will be
muted. Up to 125 members can participate in a Zone Page call.
Feature Configuration
See Defining Zone Page Calls, page 12-159
Setting up Aeonix Features
2
Getting Started
3.4 Licenses..............................................................................3-29
The layout of the Aeonix Web page and its functional areas have been designed to be
easy to understand and to use. The figure below shows an example page that
exemplifies the basic structure of the Aeonix Web Portal.
Currently only the root CUG (i.e. system-wide CUG) is supported in Aeonix.
An administrator’s display and monitoring capabilities are defined by the Closed User
Group (CUG) to which the administrator belongs (see Closed User Groups (CUG),
page 4-29). The default administrator aeonixadmin and Root CUG administrators can
view and manage all entities and settings in the system. (If not mentioned otherwise,
the screen shots in this manual reflect the aeonixadmin display level.)
CUG administrators can view and manage only entities and settings belonging to their
CUG and sub-CUGs related to this CUG. For example, if the following CUG structure
has been defined:
f
administrator’s user entity is added in the Aeonix Web Portal. This assignment is
mandatory and cannot be changed for entities that have already been defined.
Basic Tasks
3
Aeonix administrators can configure HTTPS secured layer mode access to the Aeonix
web portal by running the aeonix_https.sh script, as follows:
[root@bart ~]# aeonix_https.sh on
If you do not want to use the secured mode, run the script with the off
parameter instead or do not run the script at all.
In order for the script to take effect, the Aeonix service must be restarted. Depending
on the case, use one of the following scripts to ensure that the service is started:
The aeonix_https.sh changes the settings for the single server (the one it
runs on). If you want to apply the same change for another server in a
cluster, just repeat the procedure on that specific server. This approach
allows you to have different configurations for different servers in a cluster.
Basic Tasks
After running the script and starting the aeonix service, the Aeonix web portal can be
accessed in the usual manner by typing http:// and the address string in the Internet
Explorer Address bar (see To log in to Aeonix:, page 3-8).
3
The Security Alert may vary according to browser and browser version.
Click View Certificate and follow the instructions to accept the certifying authority.
The next time you browse to the Aeonix web portal, the Security Alert does not appear.
Basic Tasks
3
Aeonix administrators log into the Aeonix system as described in the following
procedure. The Aeonix Web Portal runs on most internet browsers, such as Internet
Explorer, Google Chrome, and Firefox Mozilla.
Before logging in, make sure the Aeonix service is running on one of the
Aeonix servers and the soft key containing the required licenses is uploaded
and deployed on the designated Aeonix License Key server. Refer to the
Aeonix Installation Manual for details (see Related Documentation, page 1-17).
To log in to Aeonix:
1 From the workstation, open your Internet browser.
2 Enter either of the following text strings in the Address bar:
http://<aeonixserver IP>:8080/aeonix (replace <aeonixserver IP> with the
IP address of the Aeonix server)
http://<hostname>:8080/aeonix (replace <hostname> with the host name of
the Aeonix server)
By default, after running the Aeonix kickstart, the Aeonix Admin static IP
address Login page address is http://10.0.0.50:8080/aeonix.
3 Click the Go button or press ENTER. The Aeonix Login page is displayed.
Basic Tasks
3
The Aeonix version and build number is displayed at the bottom right of the
login screen.
The user name and password for accessing the Aeonix Web Portal for
Administrators are aeonixadmin and anx, respectively. Users defined as
administrators automatically access the Web Portal for Administrators after
logging in with their user name (ID) and password.
6 Enter the Security Code from the Captcha text that is displayed to the right.
The field is not case-sensitive. If you have trouble matching the text, click the
New Captcha Text icon (circular arrow) to be provided with a new text.
Basic Tasks
Password Strength
The user can change their password in the same way as before but password strength
is checked on the fly (character by character) as the user types it in and the strength
meter shows the strength. The system is using the same mechanism used for SIP phone
passwords.
When the user types in the new password in the New password or Confirm password
fields the display shows the characters typed (not “*”).
The user can automatically generate a password with 100% strength from the system.
Basic Tasks
In both cases (of manual password change or system generated) the user needs to
confirm the password and press the Save button in order for the password to take
effect.
The system accepts password strength of 70% or higher.
3
Reuse of Password
Aeonix keeps the history of all passwords of all users. A history of maximum 1000
passwords are stored for each user. If the new password selected by an Administrator
is already in the history file, the password is not accepted and the system displays an
error message: “Password reuse is not allowed. Please try again”.
Basic Tasks
3
The Aeonix Password Aging Period can be set in the range 0 to 365. If the value is
set to 0, the aging check mechanism is disabled.
Aeonix checks the Administrator passwords age per administrator and uses 2
thresholds
75% of the aging period - generate an alarm.
100% of the aging period - block the administrator.
A Password Aging Alarm generated when password age has reached 75% of the aging
period. See details in the alarm section
When password age reaches the full aging period, the Administrator access is blocked.
The aging period is valid for administrators that use weak passwords or default
password. The administrators are blocked.
When a user becomes a non-administrator the system sends an alarm "Administrator
access blocked due to password age reached the full aging period".
When a user in "blocked" status tried to login into the system, they get the Change
Password screen and must change the old password in order to login to the system.
The password is checked for strength and not-reused as described in Password Strength,
page 3-10, and Reuse of Password, page 3-11.
Basic Tasks
3
3-Strikes Out
To block hacking, the system counts the number of failed logins per user per 10 minute
period. If 3 successive failures of the login process are detected in the 10 minute
period, the user access to Aeonix Admin is blocked for a further 10 minutes and a
“Admin hacking attempt alarm” is generated.
Weak Admin Aeonix checks all administration Login normally with the old password
Password Detected passwords strength once every 24 and change the password.
hours, and generates an alarm for
every Admin with a weak password
(lower than 70% strength).
Default Admin Aeonix checks all administration Login normally with the default
Basic Tasks
Password Detected passwords every 24 hours and password and change the password.
generates an alarm for every Admin
that is using the system default
password.
3
Password Aging Aeonix checks all adinistration Login normally with the old password
passwords every 24 hours and and change the password.
generates an alarm for every Admin
whose password has reached 75% of
the its age limit.
Administrator Hacking 2 possible events can generate this None. Warning only.
Alert alarm:
1 3 failed login attempts by the same
Admin within a 10-minute window.
2 3 failed login attempts by multiple
Admins within a 10-minute window.
Aeonix features context-sensitive online help offering easy and fast access to topics
on which assistance is required.
Click (Help icon) at the top of the page to access general online help.
2 Using the search and index tabs, browse to refine the search.
displayed.
Basic Tasks
3
After running the Aeonix kickstart software package or launching the Aeonix
ecosystem in a cloud / virtual environment, you will be redirected to the Aeonix
Configuration wizard upon logging into the Aeonix Admin.
For cloud / virtual operation, Aeonix supports VMware using the Open
Virtualization Format (OVF) platform, Hyper-V (VHD), and Amazon AWS
(AMI). Aeonix does not support vMotion under VMware.
The wizard simplifies the initial setup of Aeonix and Aeonix Contact Center, allowing
you to define basic configuration settings.
Configuration definitions will only take effect after completing the wizard.
2 Read the Tadiran Telecom (TTL) end-user License Agreement, select the I
Accept check box if you agree, and then click Next. The Aeonix
In cluster environments, you are first prompted to select which server you
want to configure. If you select another server than the current one, you are
automatically redirected to that server’s IP address (no login required). The
Configuration Wizard must be run on all servers in the Aeonix cluster.
IPv4 Configuration
Static IP address The static local IP address of Aeonix in the network (in
(Default: 10.0.0.50) IPv4 format).
Subnet mask (Default: The subnet mask address of the gateway in the network
255.255.255.0) (in IPv4 format).
Default router address The default router address to which Aeonix is connected
in the network (in IPv4 format)
IPv6 Configuration
Static IP address The static local IP address of Aeonix in the network (in
IPv6 format).
Prefix Mask The prefix mask address of the gateway in the network
(in IPv6 format).
Default router address The default router address to which Aeonix is connected
in the network (in IPv6 format)
Primary DNS server The primary DNS server used by Aeonix in the network
(in IPv4 format)
Secondary DNS server The secondary DNS server used by Aeonixin the
network (in IPv4 format)
Bonding ethernet ports If the server has 2 NIC cards installed, Aeonix can
(Only displayed when configure them to be used in a Linux Network Bonding
2 NIC cards are configuration. Click the checkbox to enable Network
installed in server.) Bonding. ETH0 and ETH1 logical ports will be
configured to operate in Mode-1 Active-Backup. This
mode is used for failover. Only one logical port is active
at anytime. If unchecked, ETH0 NIC is used normally,
and the second NIC is ignored.
Any changes made to the Network Parameters page will cause Aeonix to Initial Aeonix Configuration
restart after completing the wizard.
4 Click Next. The Aeonix Configuration Wizard - Time and Date page is
displayed.
3
5 On the Aeonix Configuration Wizard - Time and Date page, set the following
parameters:
Date & Time The current date and time associated with Aeonix
NTP server address 1 The name or IP address of the first NTP server address
according to which time is set for Aeonix.
NTP server address 2 The name or IP address of the second (backup) NTP
(Default: server address according to which time is set for
il.pool.ntp.org) Aeonix.
Any changes made to the date and time parameters will cause Aeonix to
restart after completing the wizard.
If you manually change a password, make sure that it contains at least one
digit, one special character, one upper case letter, one lowercase letter, and
is at least 7 characters long. Alternatively, you can automatically change a
password by clicking Generate password.
User default password The default user password assigned to users by Aeonix
When creating a cluster, the database will be taken from the server on which
the configuration wizard was activated.
All the servers in the cluster must be installed with the same Aeonix
software version
Initial Aeonix Configuration
3
Aeonix Contact Center The primary or secondary Aeonix server associated with
Aeonix Contact Center for High Availability purposes (for
details, see Server Settings for the Aeonix Contact Center
Service, page 14-44)
State / Province The name of the state or province associated with the
area in which the Aeonix server is located, if relevant
Any changes made to the Cluster Configuration Parameters page will cause
Aeonix to restart after completing the wizard.
11 This page displays a summary of all the configured items. Review the Initial Aeonix Configuration
You can click the Restart Wizard button to run the wizard again.
3
For details about how to purchase licenses, refer to the Aeonix Installation
Manual (see Related Documentation, page 1-17).
These licenses are stored on a soft key, which must be uploaded and deployed on the
designated Aeonix License Key server. This soft key holds the maximum number of
licensed resources that can be implemented in the system. Each Aeonix system,
whether based on one server or configured as a cluster of servers, must have exactly
one soft key license. Consequently, in a cluster, only one server requires a soft key
license.
Aeonix Users and the devices they use while connected to Aeonix require licenses.
The licenses are stored in pools, so that as the Aeonix Administrator creates new users,
and the users log onto Aeonix with their devices, the licenses are consumed from the
pools. When a user logs a device off from Aeonix, that license is returned to the user
device license pool.
The Aeonix Administrator can create two different kinds of users. An Advanced User
can have up to six devices defined. A Gateway User can have a single
Gateway-connected device defined.
When a user is created by the Aeonix Administrator, a user license for that type of user
is consumed for the duration of the existence of that user in the system.
In the case of the Advanced User, the user can have one device defined that does not
consume an additional device license. The first Advanced User device can be one of:
Tadiran SIP phone
Tadiran MGCP phone
Licenses
Licenses
3
The License Information page (Figure 3-13) displays the purchased licenses of the
Aeonix system and the Aeonix Contact Center (Figure 3-15) and the date on which
Technical support expires. It includes a list of all resource types that require a separate
license, the allowed number of resources, and the currently used resources.
The License Information page is displayed if there is a licensing related problem every
time the default administrator aeonixadmin logs in to the Aeonix Web Portal:
The system requires a You log into a system for which there is no valid
valid license to operate. license key deployed on the designated Aeonix
License Key server. Please add your license key
(see Activating the First License, page 3-40) or contact
your manufacturer's representative to obtain a
license key.
The system could not You log into a system for which there is no longer a
detect a license key, and valid license key deployed on the designated
has entered Grace Period Aeonix License Key server. The system has entered
mode. Grace Period mode, a 30 day period during which
time you can rectify the problem.
The system detected that There are more Aeonix servers in the cluster than
the number of servers the maximum allowed according to the number of
exceeded its limit, and has licensed servers (see Table 3-7 on page 3-36).
entered Grace Period
mode.
Your grace period is about This message is displayed every time you log in to
to expire in [x] days. remind you how many days are left before the
Grace Period ends. Please contact your
manufacturer's representative to rectify the problem.
Your Aeonix support This message is displayed every time you log in to
contract will expire in [x] remind you how many days are left before the
day(s). Technical support expires. Please contact your
manufacturer's representative to renew your
Technical support license.
Your Aeonix support The Aeonix system is running without the Technical
contract has now expired. support license.
This message is displayed until the Technical
support license is renewed. Please contact your
manufacturer's representative to renew your
Technical support license.
Licenses
3
License Information
The License Information page (Figure 3-13 above) provides the following
information:
General license information (see Table 3-6 below)
Resource-specific license information, including available number of resources
that the license allows and the currently used number or resources. For a
description of the resource types that require licenses, see Table 3-7 on
page 3-36.
Click Refresh License to update the License Information page with the
latest license details.
Licenses
3
License key server The designated Aeonix server on which the soft key license
is uploaded and deployed
Technical support The date on which the Aeonix technical support expires
expiration
Aeonix Tadiran Allows Advanced Aeonix users to log in to their Tadiran SIP
devices phones, MGCP phones (including FlexSet-IP 280S and
T200M Series phones), FlexIP softphones (FLIPS), and
Bria softphones.
Aeonix Gateway Allows Aeonix Gateway users and Advanced Aeonix users to log in
devices to their FlexSet, DST, DKT, and SLT phones connected to
Aeonix gateways, including Tadiran TGW gateways, Wave
Gateways, and Audiocodes gateways purchased from
Tadiran.
Attendant Console The number of concurrent users that can make use of the
users Aeonix Attendant application (that is, can have the Sea
Attendant option selected in their Feature Configuration
profile)
Aeonix SIP Trunks The maximum number of concurrent SIP trunk or gateway
/ Gateways calls that can be transmitted via trunks or gateways
(concurrent calls)
Aeonix Touch users The maximum number of users that are authorized to use
Aeonix Touch on their computer as a softphone in the
system.
G729 single media The maximum number of G.729 codec channels allowed in
channels the system
Mobility users The maximum number of users that can place and receive
mobility calls (that is, Callback and Call-through calls)
Navigator users The number of users that can make use of the
Sea Navigator application (that is, can have the Sea
Navigator option selected in their Feature Configuration
profile)
In a new system where no license exists you are prompted upon login to activate the
first license:
When selecting a server on which to install the soft key license, take into
consideration the architecture of your system. For example, if there are 4
servers geographically located at one site and 1 server located remotely, it
makes more sense to select one of the local servers over the remote server
to act as the designated License server.
2 In the Enter product key text box, enter the product key (a 32 alphanumeric
string).
If you do not have the product key, contact your Aeonix representative.
Licenses
3 Read and accept the Tadiran Telecom (TTL) end-user License Agreement.
4 Click Activate to save the product key in the Aeonix server and retrieve the
license from the Tadiran Licensing server.
3
5 Click Activate at the bottom of the page to store and activate the license on
the Aeonix server.
The Aeonix server on which the licenses are installed cannot be changed
unless it is down. See Activating Another License Key Server, page 3-46.
Licenses
7 Click OK. The Aeonix server is now activated with the license.
3
Once the first license has been activated (see Activating the First License, page 3-40), you
can activate license updates automatically or on-demand from the Manage License
Page.
If this check box is not selected but access to the server is available and an
update found, the administrator will be notified that the update is available
when logging into the system next time.
3
5 Click Save.
3 Click Update. If there are valid updated v2c files on the Tadiran Licensing
server, Aeonix retrieves these files.
4 Click Update at the bottom of the page to store and activate the licenses in the
proper order on the Aeonix server.
Licenses
The Aeonix server on which the licenses are installed cannot be changed
unless it is down. See Activating Another License Key Server, page 3-46.
3
6 Click OK. The Aeonix server is now activated with the license updates.
License update was not successful. Please make sure you have online
access from the machine you are attempting to activate from. If you
continue having this problem, please contact your Tadiran support
representative.
Activation was not successful. The error returned is <error message
text>. Please contact your Tadiran support representative and provide
them with this information.
Licenses
3
In the event that the Aeonix server on which the license is installed is down, you are
prompted to activate another server in the Aeonix cluster instead.
3 Click Activate New Server, and then proceed to install the license on the new
Aeonix server (see Activating the First License, page 3-40).
Licenses
3
Use this procedure to manually create the soft key license and activate your Aeonix
system or to manually add a license to a system that has already been activated.
4 From the Download the signature file (.c2v) from drop-down list, select the
Aeonix server from where you want to retrieve the C2V signature file.
Licenses
7 Enter your product key (a 32 alphanumeric string) and click Login. The
Aeonix Product Key Registration screen is displayed.
If you do not have your product key, contact your Aeonix representative.
displayed.
3
9 Click Offline Activation to generate the license file. The Generate License
screen is displayed.
Licenses
10 Click to upload the fingerprint (signature) C2V file from the location
you stored it (see Step 5), and then click Generate. The V2C file is generated.
3
11 Click Download V2C File to download the new V2C file to the server.
12 Copy the V2C file to the location you stored the original C2V file (see Step 5).
13 In the Aeonix Admin, open the Manage License page again (see Figure 3-24).
14 Click Choose File to open the V2C file.
15 If this is the first license, from the Into server drop-down list select the
Aeonix server you want to designate as the Aeonix server on which the soft
key license is uploaded and deployed.
When selecting a server on which to install the soft key license, take into
consideration the architecture of your system. For example, if there are 4
servers geographically located at one site and 1 server located remotely, it
makes more sense to select one of the local servers over the remote server
to act as the designated License server.
Before saving the license, you must read and accept the Tadiran Telecom
(TTL) EULA.
Licenses
16 Click Save. Aeonix will load this file, thereby creating the soft key license and
activating your Aeonix system. The status of the activation is indicated at the
top of the page.
3
The soft key license is now configured with the appropriate license settings.
Licenses
3
The following tables describe the licensing related messages that might be displayed
while working with the Manage License page.
Activation was not The license update did not succeed because of a
successful. The problem in the Aeonix Product Key application.
error returned is See Table 3-7 on page 3-36 for a description of the
<error code>. specified message.
missing or invalid.
protection key
OR:
length 32 KB)
General procedures are procedures that are performed in the same way throughout the
Web Portal. They include:
Navigating, page 3-64
Entering Information, page 3-64
Saving, page 3-64
Cloning Entities, page 3-65
Deleting Entities, page 3-66
General Procedures
3
Use the category and menu option buttons in the left navigation pane to display the
required Web page.
Each entity has its own main page from which it is configured. For example, each user
has their own User page. From this page, you can access all parameters that are
directly related to the relevant user.
Some configuration procedures require the opening of secondary pages from the
entity’s main page. For example, overriding a user’s general information parameter
values is performed from the General Information Profile page of this user.
Entering Information
You can define a large number of parameters in the Aeonix Web Portal. To specify the
value of a parameter, either select it from a drop-down list, type it in the field, or start
typing and then select from a list of suggested entries.
Saving
After making the required changes on the currently displayed page, click Save to
permanently store the changes in the Aeonix database, or Cancel to discard the
changes.
On secondary pages, an OK button is available instead of the Save button. Clicking
OK temporarily saves the changes and returns to the previous page. To make the
change permanent, click OK to navigate back to the entity’s main page, and then click
Save.
If you make changes to an entity and do not click Save on the entity’s main
page, the changes will not be saved.
General Procedures
If a mandatory field has not been filled in or an invalid value has been entered, a
corresponding message is displayed when you click Save. You can save the entity and
close its page only after entering a valid entry in the field.
3
On pages that include a list of entities, you can create a copy of an existing entity. For
example, you can clone users on the User List page.
To clone an entity:
1 On the relevant List page, click (the Clone icon) to the right of the
relevant entity, as in the following figure of the User List page.
General Procedures
An indexing suffix is automatically added to the entity’s ID. In the example
above, the original User ID is x2050; the cloned ID is x2050_1.
3
On pages that include a list of entities, you can delete one or multiple listed items. For
example, you can delete phones on the Phone List page.
Default entities pre-configured in the system, such as the Default Dial Plan, cannot be
deleted. Some entities that are used by other entities cannot be deleted either. For
example, it is not possible to delete a user profile if this profile is assigned to a user.
Once an entity has been deleted, it is completely removed from the database
and cannot be restored. It is therefore recommended to back up the
database before deleting crucial or multiple items (see Creating a Backup,
page 14-56).
To delete an entity:
1 On the relevant List page, select the check box left of the item or items to be
deleted, as in the following figure of the Phone List page.
Before configuring the system, read Aeonix Building Blocks, page 1-7, which
provides an overview of the components that comprise an Aeonix network.
Once Aeonix is installed and running with the proper license settings, you can start
configuring the system. Configuring the network in the Aeonix Web Portal includes
the procedures below:
4 Defining global settings (optional)
Aeonix provides default values for most global setting parameters. You can
override these values, or add global setting instances and use them instead of
the default values.
Define global settings in the following order:
Country-specific Dial Codes, page 4-1
Locations, page 4-9
Dial Plans, page 4-19
Closed User Groups (CUG), page 4-29
Schedules, page 4-37
Prior to defining Automatic Route Selection tables, define the relevant trunk
groups (see Step 8).
5 Defining profiles and phone templates (optional)
Just as with global settings, preconfigured default profiles and templates are
Aeonix Setup Procedure
included in the system and can be modified. You can also define additional
profiles and templates, and use them instead (see Chapter 5, Profiles).
6 Adding and configuring users (see Chapter 6, Managing Users)
7 Adding phones and associating them with their users (see Chapter 7, Managing
Phones). The phones can also be added and some of their parameters defined
while configuring their users (in Step 6).
3
The domain name of the Aeonix system can be modified only as long as no
phones or trunks have been added (see System Parameters, page 14-27).
Aeonix Setup Procedure
3
Global Settings
Every country has its own set of access codes, including international, long distance
carrier, and area dial codes, as well as emergency numbers and other short numbers.
These settings are defined in international and country-wide numbering plans, and
used for making calls to external numbers (that is, to destinations outside the local
network).
To allow Aeonix users to call external numbers, the applicable country and area dial
codes must be configured in the Aeonix system. These dial codes are managed from
the Country List Page. Managing country and area dial codes are described in Defining a
Country, page 4-4.
To associate country and area dial codes with Aeonix users, phones, or
trunks, they must be assigned to locations. For details, see Locations, page 4-9.
The Country List page displays the countries defined in the system. To open this page:
1 On the navigation pane, click Settings. The pane displays the Settings menus.
2 Select the Locations menu, and then click Country List.
The country list is sorted by the Name column. If the list includes more than
one page, use the page navigation bar at the bottom of the list to navigate
between the pages.
Country Code The call prefix used for calling this country from abroad
Long Distance The call prefix used for making long distance calls
Country-specific Dial Codes
To define a country:
1 On the Country List page (see Figure 4-1), do one of the following:
To add a country, click Add, or select Add Country from the Locations
menu in the navigation panel.
To update a country, select it from the country list.
The Country page is displayed.
Country code The call prefix that callers dial when calling this
country from another country.
Example: Country code of the United States is 1.
Long distance access code The prefix dialed before the area code when making
a long distance call.
Example: US long distance access code is 1.
3 International access codes are prefixes used to dial out of the country. Define
them as follows under the General tab:
To add an access code, click Add right of the International Access Codes
box, enter the access code in the displayed Access Code field, and click
OK.
For example, the international access code used in the United States is 011.
To update an access code, select it and click Update to display the Access
Code field. Enter the correct access code and click OK.
To delete an access code, select it and click Delete.
4 Country-wide numbers are short numbers and prefixes used country-wide for
Government).
Defining an Area
Area code The call prefix that callers dial to access the area.
Example: New York City has multiple area codes, including
917, 212, 347, 646, and 718, according to the region and the
network type. For each area code, a separate area must be
defined.
NOTE: To access the area from within the same country, the
long distance access code must be dialed before the
area code if the Mandatory check box is selected. The
long distance access code is defined country-wide
(see Defining a Country, page 4-4).
State / province The name of the state or province associated with the area, if
relevant
Use long If this check box is selected, the long distance access code
distance and and the area code must be dialed even for local calls. If the
area code on check box is cleared, local numbers are dialed without long
local calls distance access and area codes.
3 Area-wide numbers are short numbers and prefixes used within the area for
accessing services. Define the phone number patterns of the area:
To add a area-wide number, click Add right of the Area-wide Numbers
box, enter the pattern in the displayed Number field, and click OK.
For example, in many US and Canadian cities, 311 is dialed to access
non-emergency municipal services.
To update an area-wide number, select it and click Update. Enter the
correct pattern in the Number field and click OK.
To delete an area-wide number, select it and click Delete.
4 At the bottom of the page, click OK. The name and area code of the area are Country-specific Dial Codes
displayed on the Country page under the Area tab.
5 Click Save to save the new settings.
4
Once country and area codes have been configured (see Country-specific Dial Codes,
page 4-1), they are associated with locations. A location relates to a specific country
and area within this country, and additionally defines basic emergency call (E-911)
settings. Multiple locations can be defined for any country and area, even if no Aeonix
server is installed there.
Locations are managed from the Location List Page. Managing locations includes the
following procedures:
Defining a Location, page 4-12
Defining Emergency Call Settings, page 4-16
Assigning Locations
Locations are assigned to Aeonix devices and specify the country and area in which
these devices are located and used. Devices include:
Phones (see Defining a Phone in Aeonix, page 7-10)
Trunks (see Defining a Trunk in Aeonix, page 8-10)
Wave Gateways (see Defining a Wave Gateway, page 10-8)
SIP voicemail services (see Defining Voicemail Applications in Aeonix, page 12-140)
Locations are also assigned to users. Users do not have to dial the codes and prefixes
of their associated location even when calling from another country, provided they are
connected to Aeonix (see Assigning a Location to a User, page 4-17).
Locations
4
The Location List page displays the locations defined in the system. To open this page:
1 On the navigation pane, click Settings. The pane displays the Settings menus.
2 Select the Locations menu, and then click Location List.
The location list is sorted by the Name column. If the list includes more than
one page, use the page navigation bar at the bottom of the list to navigate
between the pages.
Locations
4
Name The name for the location, for example, Main Office.
Default Sub Chose a Default Sub Location from the list. Default Sub
Location Locations are defined in the Sub Locations tab.
Devices at this Device and user attributes will be included in the updates to
location will be the E911 service provider database.
included in the
E911
Local Emergency The number to be dialed for emergency. 911 for example.
Number
Sub Location The name for the sub location, for example, Chemistry
Name Building.
3 Click Ok. The General tab of the Location page is displayed. The new Sub
Location is now available in the Default Sub Location list. Click Save to
save the newly defined Sub Location.
4
Aeonix provides basic support of Enhanced 911, a feature supplied by the 911
emergency-calling system in the USA and Canada. This feature allows 911 operators
in PSAP (Public Safety Answering Point) and local emergency centers to be notified
of the emergency location without the person calling for help having to provide it.
Emergency calls have to reach their destination as fast as possible. For this purpose,
dedicated trunks are required to route them directly to the closest emergency service
node. In Aeonix, the trunk groups containing these trunks can either be specified as in
the following procedure, or on the relevant Trunk Group pages as described in
Reserving a Trunk Group for Emergency Calls, page 9-24.
Emergency call settings are configured at the location level on the relevant Location
page (see ) and applied to all 911 calls placed from this location (except for immediate
hot station devices). Toll barrier and ANI restrictions do not apply to emergency calls.
The emergency location (ELIN) can also be specified at the phone level. The
ELIN defined for a phone overrides the ELIN of the location if an emergency
call is placed from this phone.
To make a reserved trunk group available for all calls, remove it from the
Reserved box by selecting it there and clicking (the left arrow). You can
reserve or free multiple trunk groups by holding down the CTRL or SHIFT
4
Assigning a location at the user level allows users to make calls using the dial codes
appropriate to this location rather than the dial codes relevant to the location of the
phone.
A user associated with a location dials according to the rules of this location even
when calling from an office abroad, provided this office is connected to the
organization’s Aeonix network. For example, users associated with “New York” do
not have to dial the international and long distance carrier access codes when calling
a destination in New York, even if they are calling from an office located outside of
the USA.
Location assignments are configured in the General Information sub-profile.
Depending on profile override permissions, location assignments can be overridden
for specific users (or trunk groups). For a detailed description of profiles,
see Chapter 5, Profiles.
If override is allowed, users can also set their location themselves in the
Aeonix Web Portal for Users. Refer to the relevant User Guide listed in
Related Documentation, page 1-17.
Locations
4
When connecting to Aeonix from external systems (via SIP trunks, for example) ensure
that the dial plans of the two systems are different. If there is overlap, you can add ANI
manipulation rules to the Trunk Group of the external system to ensure there is no clash
between the dial plans (see Configuring Incoming Call Routing, page 9-12).
Dial Plans
4
The Dial Plan List page displays the dial plans defined in the system. To open this
page:
1 On the navigation pane, click Settings. The pane displays the Settings menus.
2 Select the Dial Plans menu, and then click Dial Plan List.
The dial plan list is sorted by the Name column. If the list includes more than
one page, use the page navigation bar at the bottom of the list to navigate
between the pages.
Update dial In the list, click the dial plan name to update the
—
plan details of this dial plan.
Delete dial Select the check box next to the dial plan or dial
plan plans and click Delete (see Deleting Entities, page 3-66).
following:
When you clone a dial plan, all parameter values are copied to the new dial
plan except for the dial plan name.
3 Click the Aliases tab to display a list of predefined alias numbering patterns.
Add, update, or delete patterns as required:
To add a pattern, click Add, enter the number in the Pattern field that is
Dial Plans
displayed at the bottom of the list, and click OK. Use the X wildcard to
represent any digit.
For example, 2XXX includes all numbers from 2000 to 2999. 706X
4
5 In each field under the Features tab, enter the digit or digit sequence to be
dialed, as described in the following table. (If necessary, feature codes can be
defined as is or start with the # (pound) sign, except for the Activate and
Deactivate features.)
In each field, you can enter more than one digit combination. Separate them
Dial Plans
using commas.
For information on how to use these codes, refer to the User Guide of the
4
Allow identity 14440 If dialed before placing a call, this code displays
presentation the calling user’s number to the call destination
party.
Outside line 9 Provides the access tone for making calls outside
access code of the organization.
Restrict identity 14441 If dialed before placing a call, this code hides the
presentation calling user’s number from the call destination
party.
Set default 159 Allows a user to set the default user of their
user registered Tadian SIP phone (and existing MGCP
or digital phones) by dialing 159 on the user’s
phone followed by the alias of the user, thereby
associating the phone with the user.
Turn off MWI 175 Turns off the message waiting indicator lamp on
the user’s phone, which is lit if the user has
unretrieved messages waiting in the voicemail box.
Voice page 191 Allows a user to place a voice page call to another
user, provided the called user is configured to
Dial Plans
6 Click Save to save the dial plan. The dial plan is included in the list on the
Dial Plan List page.
Dial Plans
4
Currently only the root CUG (i.e. system-wide CUG) is supported in Aeonix.
Closed User Groups (CUG) are used to manage different companies within the same
VoIP system. Each CUG is treated as a unique exchange, even though the CUGs are
managed in the same Aeonix system. CUGs allow for building up hosted and
co-hosted systems, in which members of one CUG do not have access to the
information of other independent CUGs.
Each CUG can contain one or more subordinated CUGs (sub-CUGs). While
administrators of the CUG can access information related to this CUG and all its
sub-CUGs, sub-CUG administrators can only access the information in the
subordinated CUG to which they belong (see also Administrator Levels, page 3-4).
The assignment of settings to an entity might be restricted depending on the CUG
associated with these settings. For example, if the CUGs Company A and Company B
have been defined at the same hierarchy level, it is not possible to select and assign a
sub-profile belonging to Company A to a Company B user profile. However, a user
profile assigned to sub-CUG Company B Marketing can include a Company B
sub-profile.
You can define new Closed User Groups, edit the settings of an existing CUG and
delete obsolete CUGs. Aeonix comes with a default Closed User Group named Root.
This CUG contains all existing and future CUGs in the system and cannot be deleted.
Each Closed User Group must be assigned a dial plan, which specifies the applicable
dial patterns and feature codes. For the Root CUG (meaning system-wide), you can Closed User Groups (CUG)
also define the music or message that is played when a caller is put on hold or
transferred to another number. Confirmation and rejection tones can be used to notify
users of SIP phones as to whether or not they succeeded in activating a feature.
When a new entity (user, trunk group, phone, trunk, Wave Gateway, or user/pickup
group) is defined in Aeonix, it must be assigned a Closed User Group. An existing
entity cannot be moved to another CUG. This applies also to ARS tables, schedules,
4
Currently only the root CUG (i.e. system-wide CUG) is supported in Aeonix.
CUGs are configured and managed on the Closed User Group Tree page.
The Closed User Group Tree page shows the CUGs defined in the system in a
hierarchical tree structure.
From this page, you can perform the following actions:
Delete CUG Click to delete a CUG (see Deleting a Closed User Group,
page 4-35).
Currently only the root CUG (i.e. system-wide CUG) is supported in Aeonix.
Access code A unique number for accessing the CUG from within the
telephone dialing system.
Dial plan The dial plan applied to the CUG (see Dial Plans, page 4-19)
3 The Music and Tone Files parameter box lists the audio files for messages
played to callers put on hold.
Music On Hold The file containing the music or message played to callers
while they are put on hold
In the current version, music on hold parameters can be modified for the
Root CUG only.
You can define the audio source for each codec type (G711 A-law,
G711 µ-law, and G.729) as described in the following table.
4 Scroll down to the bottom of the dialog box and click OK to close the dialog
box.
5 Click Save. The Closed User Group is saved and displayed at the relevant
place in the hierarchy tree.
4
Currently only the root CUG (i.e. system-wide CUG) is supported in Aeonix.
CUG members can be Aeonix users, trunk groups, phones, or trunks. It is not possible
to add members to a CUG through the Closed User Group Tree page. Entities are
associated with Closed User Groups only as part of the initial entity definition process.
An entity’s CUG membership cannot be modified.
Administrators assigned to the Root CUG have access to all entities and settings
defined in the system. In contrast, administrators and users assigned to a CUG can
display or monitor only entities and settings that belong to this CUG, or to sub-CUGs
related to this CUG.
Currently only the root CUG (i.e. system-wide CUG) is supported in Aeonix.
When you delete a Closed User Group, all its sub-groups are also deleted.
To delete a CUG:
1 From the Closed User Group tree (see Figure 4-10), select the required CUG.
2 Click Remove CUG. The Delete CUG confirmation message is displayed.
3 Click Yes to delete the CUG and all its sub-groups from the system.
Schedules can be used to control when selected routing rules for forwarding or
rejecting incoming calls will be in effect. A schedule consists of time frames for
special situations, such as holidays or emergency situations, and for repeating
situations, such as working hours, night hours, or weekends.
Once a schedule has been defined, it can be used to apply an incoming call routing rule
only at the specified time frame or frames. For example, on holidays, incoming calls
can be automatically forwarded to the users’ mailboxes. Schedules can also be defined
or overridden for a specific user, as in the case in which night calls are forwarded to
the user’s cellular phone number.
Global schedules are managed from the Schedule List Page. Managing schedules is
described in Defining a Schedule, page 4-39.
To learn about incoming call routing and the use of schedules within incoming call
routing rules, see Incoming Call Routing Sub-profiles, page 5-31.
Schedule Levels
Schedules can be defined at the following three levels:
Global—these are system-wide schedules that can be assigned to any schedule
profile, user, or trunk. Managing global schedules is described in this section.
Schedule profile—a schedule profile can include global schedules, as well as
schedules created specifically for this profile (see Schedule Sub-profiles,
page 5-28).
Individual user—an assigned schedule profile can be modified for a specific
user, or replaced by a global schedule (Overriding Schedules, page 6-39). Schedules
4
Global schedules are created and managed from the Schedule List page. To open this
page:
1 On the navigation pane, click Settings. The pane displays the Settings menus.
2 Select the Schedules menu, and then click Schedule List.
The Schedule List page shows the schedules defined in the system. If a schedule
includes more than one time frame, they are displayed in a drop-down list.
From this page, you can perform the following actions:
2 If this is a new schedule, enter a name in the Name field, for example,
Holidays or Work Hours.
3 Use the Time Frame List area to define or remove time frames as described in
the following procedures:
Defining a Time Frame, page 4-39
Deleting Entities, page 3-66
4 On the Schedule page, click Save. The schedule is saved and displayed on the
Schedule List page.
click the name of the time frame to be updated. The Time Frame page is
displayed.
4
2 If this is a new time frame, enter a name in the Name field, such as
Independence Day or Regular Work Hours.
If you select All day event, the time frame covers the whole day.
Consequently, the drop-down lists for specifying the hours are not displayed.
5 For a recurring time frame, select Recurrence. The Recurrence parameters are
displayed on the page.
Schedules
4
Schedules
4
Range of The start date and, optionally, the end date of the
recurrence period during which a routing rule based on this time
frame is activated. If no end date is required, select No
end date.
Schedules
6 Click OK. The name of the time frame, as well as its type, start time, and end
time, are displayed in the Time Frame List on the Schedule page.
7 Click Save.
4
Automatic Route Selection (ARS) tables specify the trunk groups through which
external calls are routed. This feature provides the capability of routing outgoing calls
through the most cost-effective channels while maintaining acceptable call quality.
Before ARS tables can be created, the required trunk groups must be
defined (see Chapter 9, Managing Trunk Groups), as well as the applicable
country and area codes (see Country-specific Dial Codes, page 4-1).
Automatic Route Selection tables are managed from the ARS Table List Page. Managing
Automatic Route Selection includes the following procedures:
Defining an ARS Table, page 4-46
Testing an ARS Table, page 4-49
The system includes a predefined default ARS table, which can be modified, but not
deleted. Which ARS table is used for routing a call depends on the Outgoing Call
Routing sub-profile of the calling user (see Assigning Automatic Route Selection Tables to
Users, page 4-50).
according to the corresponding trunk group. If the trunk group of a prefix number of
Routing tables are defined and managed from the ARS Table List page. To open this
page:
1 On the navigation pane, click Settings. The pane displays the Settings menus.
2 Select the ARS menu, and then click ARS Table List.
The ARS Table List page displays the names of all Automatic Route Selection tables
defined in the system.
Automatic Route Selection (ARS)
4
Update ARS In the list, click the routing table name to update the
—
table details of this table.
Delete ARS Select the check box next to the routing table or
table tables to be deleted and then click Delete
(see Deleting Entities, page 3-66).
Access Click Help to receive online help.
online help
When you clone a routing table, all parameter values are copied to the new
routing table except for the ARS table name and the Closed User Group.
The page displays a list of the defined prefixes, the prefix details (country
code, area code, and number), and the trunk groups (channels) through which
the relevant calls are routed.
2 If this is a new automatic routing table, enter the table name in the Name
Automatic Route Selection (ARS)
field.
3 In the Prefix List, specify outgoing call prefixes and their Automatic Route
Selection trunk groups. Use the following procedures as required:
Defining a Prefix Routing Definition, page 4-47
Deleting Entities, page 3-66
4 Verify that the Automatic Route Selection table definitions are correct
(see Testing an ARS Table, page 4-49). Make corrections as required.
5 Click Save. The routing table is saved and displayed on the ARS Table List
4
page.
To apply the prefix routing definition to calls of a specific country, enter the
Country code (without the international access code).
To apply the prefix routing definition to calls of a specific area, enter the
Country code and the Area code (without the long distance access code).
To apply the prefix routing definition for numbers that begin with the same
digits, enter the Country code and the Area code, and enter the digits in
4
To remove a trunk group from the Selected Trunk Groups box, select it and
click (the left arrow). You can add or remove multiple trunk groups by
holding down the CTRL or SHIFT key while selecting them.
4 Use (the Up and Down arrows) to define the routing order of the trunk
groups in the Selected Trunk Groups box. The system routes outgoing calls
with the specified prefix number through the first available trunk group listed
in the box.
5 Click OK. The prefix routing definition is displayed in the prefix list.
6 Click Save.
Automatic Route Selection (ARS)
4
For complex routing schemes, it is recommended to check whether the prefix routing
definitions are correct. The ARS testing feature allows you to view through which
trunk group a specific dial number is routed.
2 In the Dial number field, enter a dial number as it would be dialed from the
selected origin location (see the following step).
3 Select the Origin location from which the call is placed. The system
automatically adds the country code and area code to the destination number as
required by the origin location.
4 Click the Test button. The trunk group or groups for routing the specified call
are displayed.
If more than one prefix definition applies to the specified call, the trunk groups
of the closest prefix match are displayed first. If no Automatic Route Selection
scheme is defined for the prefix of the specified call, the system displays none.
If the test yields unexpected results, check the following:
The ARS table prefixes and their associated trunk group or groups (see Defining
an ARS Table, page 4-46).
An Automatic Route Selection table can be associated with Outgoing Call Routing
sub-profiles (see Outgoing Call Routing Sub-profiles, page 5-41) and applied to the calls
placed by users that are assigned the relevant sub-profile. For a specific user, the
assigned routing table can be replaced by another, just like other outgoing call routing
parameters (see Overriding Outgoing Call Routing Parameters and Rules, page 6-43).
The use of profiles allows you to apply different routing tables to different users. For
example, to route calls from the CEO through a dedicated high-quality trunk group,
define the relevant routing table, include this table in an Outgoing Call Routing
sub-profile, and assign the sub-profile to the CEO user profile.
This example assumes the relevant countries, area codes, locations, and
trunk groups have been previously defined (see Country-specific Dial Codes,
page 4-1, Locations, page 4-9, and Chapter 9, Managing Trunk Groups).
In this example, an organization has two offices in the United States (country code 1):
one in Brooklyn (area code 718) and one in Manhattan (area code 212). In addition,
the organization has an office in Switzerland (country code 41).
Automatic Route Selection (ARS)
For each of the office locations, a gateway is defined as a trunk group in Aeonix. These
trunk groups are referred to as GW_Brooklyn, GW_Manhattan, and GW_Swiss
respectively.
The following ARS table (prefix list) defines how the organization’s outgoing calls are
routed.
4
The LDAP Connection List page displays the LDAP connections defined in the
system. To open this page:
1 On the navigation pane, click Settings. The pane displays the Settings menus.
2 Select the LDAP menu, and then click LDAP connection List.
The LDAP Connection List page shows the LDAP connections defined in the system.
For each LDAP connection, the list displays the following information.
Server Address The LDAP server address (IPv4 or IPv6) to which LDAP
requests are sent
Server Port The TCP/IP port on which the LDAP server is listening
(Default:
389)
CUG The Closed User Group associated with the LDAP connection
(see Closed User Groups (CUG), page 4-29).
View / Edit In the list, click the server ID to view or edit the
LDAP — details of this LDAP connection.
connection
Delete LDAP Select the check box next to the server ID or server
connection IDs and click Delete (see Deleting Entities, page 3-66).
LDAP Connections
2 If this is a new LDAP connection, enter a name of the LDAP server in the
Server ID field
4
Server address The LDAP server address (IPv4 or IPv6) to which LDAP
requests are sent.
User name A valid user name required for accessing the LDAP server.
At time of day What time the daily synchronization will be run automatically.
Display The LDAP attribute name corresponding to the Display name field
name in Aeonix (optional).
Select the Display name check box and set the relevant option:
displayName—display name LDAP directory attribute
Other—enter another LDAP attribute to map to the Aeonix user
ID.
First name The LDAP attribute name corresponding to the First name field in
Aeonix (optional).
Select the First name check box and set the relevant option:
givenName—given name LDAP directory attribute
Other—enter another LDAP attribute to map to the Aeonix user
ID.
Last name The LDAP attribute name corresponding to the Last name field in
Aeonix (optional).
Select the Last name check box and set the relevant option:
sn—surname LDAP directory attribute
Other—enter another LDAP attribute to map to the Aeonix user
ID.
Aeonix (optional).
Select the Description check box and set the relevant option:
Description—description LDAP directory attribute
Other—enter another LDAP attribute to map to the Aeonix user
ID
4
Email The Email attribute name corresponding to the Email field in Aeonix
(optional).
Select the Email check box and set the relevant option:
email—email LDAP directory attribute
Other—enter another LDAP attribute to map to the Aeonix user
ID
8 Click on a search filter Name to open a search filter, or click Add to create a
new search filter. The Search Filter page is displayed as shown in the
following figure.
LDAP Connections
10 In the Filter box, enter search filters to specify which records are returned by
the LDAP Directory Server (optional).
11 Click on the New User Settings tab to set parameters for how new Aeonix
users will be created for entries in the LDAP database that have not previously
been defined in Aeonix.
The following fields can be defined in the New Users Settings tab.
LDAP Connections
User profile A User Profile defined in the Aeonix system (see Defining a
User Profile, page 5-86).
Voicemail service The TCP/IP port on which the LDAP server is listening.
LDAP Connections
4
If the connection to the LDAP server or LDAP attribute mapping failed, one
or more fields defined on the LDAP Connection Page may contain incorrect
values. Make the required corrections and click Test again.
2 Click Export to save the test results as a .CSV file on the local client machine,
or click Back to return to the LDAP Connection page.
LDAP Connections
4
Aeonix is configured to connect to the Aeonix LDAP server for the purpose of
retrieving Aeonix directory entry information. The parameters on the Default LDAP
Directory page, as well as other LDAP connection parameters (see Other Provisioning
Parameters, page 7-19), are included as part of the provisioning process, allowing users
of supported provisioned Tadiran SIP phones to conveniently access, search for, and
make calls to contacts in the Aeonix directory.
The default LDAP Directory page consists of the following connection parameters:
Server address The LDAP server address to which LDAP requests are
(Default: 127.0.0.1) sent.
Port (Default: 389) The TCP/IP server port on which the Aeonix LDAP
server is listening.
LDAP Connections
User name (Default: The user name required for accessing the Aeonix
cn=Directory Manager) LDAP server.
Click Test Definitions if you want to verify the LDAP connection (see Testing
LDAP Connections Parameters, page 4-61).
LDAP Connections
4
This section describes the Single Sign capability of Aeonix. This feature allows
Aeonix to be deployed in a Kerberos-based secure Active Directory domain.
Single Sign On
Assumptions
Your Aeonix Linux server host name: linuxserver
Your Aeonix domain account: linuxuser
Your domain name: example.com
Your realm: EXAMPLE.COM
Active Directory and KDC (Key Distribution Center) server: kdcserver.example.com
Pre-Installation Requirements
Single Sign On
A central part of Kerberos' trusted third party authentication scheme is the Key
Distribution Center (KDC), which is a centralized repository for users' password
information. Before deploying Kerberos, a server must be selected to take on the role
of KDC. Physical and network security will be critical for this server, since a
4
Installation
Join your Aeonix Linux machine into the domain active directory according to the the
instructions given in the section below: How to Join a Linux Server into an Active Directory
Domain on page 4-72.
3 Host Names
Each (Aeonix) server in a Kerberos authentication realm must be assigned a Fully
Qualified Domain Name (FQDN).
For example, a device with the hostname linuxserver in the parent domain
example.com has the fully qualified domain name linuxserver.example.com
The FQDN must be forward-resolvable and reverse-resolvable.
Single Sign On
Configuration
[realms]
EXAMPLE.COM = {
kdc = kdcserver.example.com
default_domain = EXAMPLE.COM
}
[domain_realm]
.EXAMPLE.COM = EXAMPLE.COM
2 login.conf
Edit the file /home/aeonixadmin/aeonix/webadmin/login.conf.
Replace the linuxuser with your Aeonix domain account user name.
spnego-client {
com.sun.security.auth.module.Krb5LoginModule required;
};
spnego-server {
com.sun.security.auth.module.Krb5LoginModule required
storeKey=true
isInitiator=false
useKeyTab=true
keyTab="/home/aeonixadmin/aeonix/webadmin/anx.keytab"
principal=linuxuser;
};
ktab.exe -l -k anx.keytab
4
Domain Browsers
All domain clients must configure their browsers to Enable Integrate Windows
Authentication
Firefox
At the desktop, log in to the windows active directory domain and activate
Firefox.
At the address field, type about:config.
In the Filter, type network.n
Double click on network.negotiate-auth.trusted-uris. This preference lists the
sites that are permitted to engage in SPNEGO Authentication with the browser.
Enter a comma-delimited list of trusted domains or URLs.
Click OK. The configuration appears as updated.
Restart your Firefox browser to activate this configuration.
Time Synchronization
The Kerberos protocol requires the time of the client and server to match: if the system
clocks of the client does not match that of the server, authentication will fail. The
simplest way to synchronize the system clocks is to use a Network Time Protocol
(NTP) server.
Firewalls
Single Sign On
As with all network services, Kerberos service must be allowed to pass through any
firewalls between hosts.
4
Install Prerequisites
[root@AeonixPM2 ~]# yum -y install nss-pam-ldapd sssd_client sssd-client
ypbind nscd krb5-workstation ipa-client mlocate samba
Procedure
1 Click Next.
Single Sign On
4
Single Sign On
4
6 On the LDAP Settings panel, enter the name for the LDAP server (Domain
Controller), the Base DN (the domain name). Click Next.
Single Sign On
4
Single Sign On
4
In order for Aeonix Call Center to function in a Single Sign On (SSO) environment,
the Domain Controller for the SSO environment must be configured.
General
1 Create general user ACC-SSO-user with password (my is ASU@ANXtestAD).
Set 'password never expires'.
2 Run 'cmd' as administrator (otherwise you'll get error 0x2098/8344 ->
Insufficient access rights to perform the operation.).
3 Execute following command, where 'ACC-SSO/ACCSERVER' is principal
name of ACC service and 'ACC-SSO-user' is user used for ACC:
setspn -A ACC-SSO/ACCSERVER ACC-SSO-user
Generate keytab
1 Linux:
a run ktutil
[root@alishervm3 etc]# ktutil
b Execute following command in ktutil console:
ktutil: addent -password -p ACC-SSO/[email protected] -k 3 -e
arcfour-hmac
where: 'ACC-SSO/[email protected]' is service principal
name in domain ANXTESTAD.COM, '3' - is key version number, 'arcfour-hmac'
is encryption method
c Enter same password as you set for user 'ACC-SSO-user'
Password for ACC-SSO/[email protected]:
d Check that principal was applied
ktutil: l
slot KVNO Principal
---- ---- ----------------------------------------------------------
1 3 ACC-SSO/[email protected]
e Save keytab and exit:
Single Sign On
In case this file already exist, and principal names inside this file are needed,
then you may join current file and new file using ktutil
NOTE: In case this file already exist, and principal name inside this file are needed,
then you may join current file and new file using ktutil
ktutil: rkt <keytab1>
ktutil: rkt <keytab2>
ktutil: wkt <target_keytab>
Single Sign On
4
Profiles
5.1 Profiles..................................................................................5-1
Profiles are sets of parameter values that can be associated with an Aeonix user or
trunk group.
When a user or a trunk group is added to the system, the entity is automatically
assigned the values of its profile. If profile values are changed, any entity that is
assigned this profile is modified accordingly.
A profile includes several sub-profiles, each of them specifying values for a set of
parameters. The same sub-profile can be assigned to several profiles. Whether a
sub-profile or its parameter values can be overridden at the user (or trunk group) level
depends on the specific profile configuration. For an example of an Aeonix profile
structure, see Profile Definition Example, page 5-2.
Profile modifications are not implemented for a specific entity if the relevant
sub-profile parameter values have been overridden. To learn about
overriding the profile of a user or a trunk group, see Overriding User Profiles,
page 6-29.
Aeonix provides at least one default profile for each profile and sub-profile type. All
values of a default profile can be modified. Additional profiles of any profile type can
be defined as well; however, default profiles cannot be deleted.
Profiles are managed from the Profiles tab area under the Settings menu of the Aeonix
Web Portal. Managing profiles includes the following procedures:
Profiles
The following table provides a model example of the user profiles and sub-profiles
defined in an Aeonix system, how they are related, and whether sub-profiles can be
overridden for specific users.
Toll barrier Manager Toll Barrier Sales Toll Barrier R_D Toll Barrier
Override allowed Override not allowed Override not allowed
When defining a sub-profile, either leave the default values in the text fields
or change these values. If a sub-profile text field is empty, the sub-profile
cannot be saved.
A profile includes one sub-profile of each type. (Incoming Call Routing, Outgoing
Call Routing, Feature Configuration, and Administration Level sub-profiles, as well
as phone profiles, are not used in trunk group profiles.) By default, this is a predefined
sub-profile, but it can be replaced. Profiles are described in detail in Managing Profiles,
page 5-83.
Aeonix users and trunk groups have the sub-profiles of their profiles
indicated on their pages (under the Profile tab). To learn about managing
profiles at the entity level, see Overriding User Profiles, page 6-29.
Managing Sub-profiles
5
A Profile List page is available for each sub-profile type. It displays the available
sub-profiles of the relevant type.
The sub-profile list is sorted by the Name column. If the list includes more
than one page, use the page navigation bar at the bottom of the list to
navigate between the pages.
Managing Sub-profiles
5
Language The language for users who are applied the sub-profile
(General Information (for details, see Table 5-4 on page 5-10)
sub-profiles only)
Local Display The text displayed on the panel of the phone if their
(phone profiles only) users are applied the phone profile
Routing Table Name The ARS table the sub-profile uses to route the calls
(Outgoing Call Routing (see Automatic Route Selection (ARS), page 4-43)
sub-profiles only)
Managing Sub-profiles
5
Managing Sub-profiles
5
General Information sub-profiles are defined similarly for user profiles and for trunk
group profiles, although some parameters are not used in trunk groups.
When you clone a sub-profile, all parameter values are copied to the new
sub-profile except for the sub-profile name and the Closed User Group.
Managing Sub-profiles
5
The Name and the Closed User Group of an existing sub-profile cannot be
modified.
Location is the only relevant and displayed parameter for trunk groups.
5
Always use dial rules If selected, the system automatically applies the dial rules
of this location defined for the location selected below.
Date format The format in which dates are displayed for the user in
the Aeonix Web Portal.
The date format syntax uses M for month, d for day,
and y for year. The number of times the digits are
repeated determines the length of the entry. To illustrate,
the fifth day of 2013 will be displayed as follows in the
formats available by default:
M/d/yy—1/5/13
M/d/yyyy—1/5/2013
MM/dd/yy—01/05/13
MM/dd/yyyy—01/05/2013
yy/MM/dd—13/01/05
yyyy/MM/dd—2013/01/05
dd/MMM/yy—05/Jan/13
dd/MMM/yyyy—05/Jan/2013
d/M/yy—5/1/13
d/M/yyyy—5/1/2013
Managing Sub-profiles
Date separator The character used for separating the date units.
To illustrate, if - (dash) is selected, the example above will
be displayed as 05-Jan-13 for date format dd/MMM/yy.
The available separators are defined in the System
Parameters table (see System Parameters, page 14-27).
5
Time format The format in which the time is displayed for the user:
A.M / P.M.—the time is displayed in 12-hours format
and followed by AM for hours before noon, or by PM for
hours after noon.
24H—the time is displayed in 24-hours format.
Required security The signaling and media security level for the user:
level Unencrypted—Aeonix uses TCP or UDP only for the
signaling session (not TLS) and uses RTP for the
media (not SRTP).
Best Effort—Aeonix attempts to establish TLS
signaling and can revert to TCP or UDP if the endpoint
does not support it.
User License The user license type for the user that, when used in
conjunction with the relevant device licenses (see
Table 3-7page 3-36), allows users to log into their devices.
Advanced Aeonix user—allows a user to operate up
to six devices (default option).
7 Click Save. The sub-profile is included in the list on the General Information
Profile List page.
Managing Sub-profiles
5
Timeout sub-profiles are defined similarly for user profiles and for trunk group
profiles.
When you clone a sub-profile, all parameter values are copied to the new
sub-profile except for the sub-profile name and the Closed User Group.
Managing Sub-profiles
5
Dial tone timeout Number of seconds the dial tone is heard before the
system disconnects for internal calls
Managing Sub-profiles
Reorder timeout During a call, the number of seconds a reorder tone
is heard before a call is disconnected.
When activating or deactivating a feature from the
phone, the number of seconds a confirmation tone is
heard before the feature is activated or deactivated.
Recall on hold timeout When a caller is put on hold, the number of seconds
(MGCP phones only) after which the phone rings again for this call. Not
supported as an Aeonix feature on SIP phones, but can
be set as a feature of the phone firmware and URL
interface -- however it is not supported in provisioning.
7 Click Save. The sub-profile is included in the list on the Timeout Profile List
page.
Managing Sub-profiles
5
Feature Configuration sub-profiles are assigned to user profiles only and define the
way the following Aeonix features are applied to users:
Call Waiting
Call Time Limit for External Calls
Auto Answer
Voice Page
Callback and Call-through (Mobility)
ANI Restriction
Exclusive Hold (for ULA)
Call Pickup
Client Applications (Aeonix Touch and Sea Navigator / Sea Attendant)
Recall (on Transfer)
ESF for Tadiran SIP Phones
Auto Redial
Flash Mode
Instant Messages
LDAP Single Sign-on Allowed Applications
Permissions by User Level
For a description of these features, see Chapter 2, Aeonix Features.
When you clone a sub-profile, all parameter values are copied to the new
sub-profile except for the sub-profile name and the Closed User Group.
6 Click one or more features to display the parameters of these features. (Click
Toggle Panels to display hidden and hide displayed parameters).
7 Set or view the sub-profile parameters as described in the following table.
5
Call Waiting Allow call Allows call waiting for both internal and external
waiting calls. When receiving a call during a phone
conversation, the user hears a call waiting tone
and can put the ongoing call on hold to answer
the call.
If not selected, call waiting is disabled for calls.
Calls are rejected if the user is on the phone,
and the caller hears a busy tone.
Auto Allow auto Activates auto answer on the user’s phones. Managing Sub-profiles
Answer answer Auto answer picks up the phone in
speakerphone mode.
Call Time Call time limit Activates the Call Time Limit feature. This limits
Limit for the number of minutes a user can run an
External external outbound or transit call.
Calls
After...minutes Enter the number of minutes after which the call
will be disconnected.
Voice Page Accept voice Allows the user’s phones to accept voice page
page calls. If this check box is cleared, an incoming
voice page call is considered as a regular call
and handled accordingly.
Exclusive Exclusive hold If selected, only the user who put a ULA call on
Hold hold can retrieve the held call.
If not selected, a held ULA call can be retrieved
by the ULA group owner or by any member of
the group.
default).
Flash Mode Continuous Specifies the default flash mode when defining a
conference or Flash Transfer programmable button (see Flash
Swap or mode, page 5-68).
Consultation
5
Aeonix
Administration
Seamail
User level Sets the User Level in the profile. User Level
can be 0 - 255. 0 is the default. Higher values
represent users with greater permission to
perform invasive operations.
5
8 Click Save. The sub-profile is included in the list on the Feature Configuration
Profile List page.
Managing Sub-profiles
5
Toll Barrier sub-profiles are defined similarly for user profiles and for trunk group
profiles. These parameters define call numbers and destinations that are blocked for
outgoing calls and call forwarding. Toll barrier restrictions also apply to calls
manipulated by Outgoing Call Routing rules (see Outgoing Call Routing Sub-profiles,
page 5-41).
For an example of a Toll Barrier sub-profile, see Toll Barrier Sub-profile Example,
page 5-26.
When you clone a sub-profile, all parameter values are copied to the new
sub-profile except for the sub-profile name and the Closed User Group.
5
You can use the Search box to textually search for and display specific items
in the list.
7 Use the Allow calls to box to define numbering patterns (partial or complete
phone numbers) of the destinations that users are allowed to call.
Add new, update, or remove patterns as required:
To add a pattern, click Add, enter the number in the displayed Pattern box,
and click OK.
In the United States, for example, you can enter 1900XXXXXXX to
prevent users from making premium rate phone calls.
To update a pattern, select it and click Update. Modify the number that is
displayed in the Pattern box and click OK.
To delete a pattern, select it and click Delete. You can select more than one
pattern for deletion by using the CTRL and SHIFT keys.
8 Use the Do not allow calls to box to define numbers and numbering patterns
of destinations that users are not allowed to call, regardless of the value in the
Basic behavior field and the entries in the Do not allow calls to box (if
available). Add new, update, or remove patterns as described in the previous
step.
9 To override the Direct incoming calls to external destinations parameter,
which blocks users from redirecting incoming calls to external destinations,
select Allow (the default option is Restrict.)
10 Click Save. The sub-profile is included in the list on the Toll Barrier Profile
List page.
Managing Sub-profiles
Managing Sub-profiles
5
Just as global schedules (see Schedules, page 4-37), schedules defined in a Schedule
sub-profile are used for defining advanced call forwarding and rejection rules in
Incoming Call Routing sub-profiles.
However, in contrast to global schedules, the schedules and time frames of a Schedule
sub-profile can be a component of a user’s call forwarding rules only if this sub-profile
is included in the user profile associated with this user.
When you clone a sub-profile, all parameter values are copied to the new
sub-profile except for the sub-profile name and the Closed User Group.
5
Incoming Call Routing sub-profiles are assigned to user profiles only. They define to
which devices incoming calls are routed and allow the forwarding or rejection of calls
upon a combination of conditions. Possible conditions include the result of the call,
the availability of the called user, the number of the caller, as well as the date,
weekday, or time the call was placed.
The routing conditions and call forwarding destinations are defined using rules. These
rules can be of the following types:
Mandatory—high priority rules. These rules are defined in the sub-profile and
cannot be overridden at the user level.
Optional—sub-profile rules that can be overridden at the user level
User’s rules—rules that are defined for a specific user. These rules are only
set at the user level and override the optional rules (see Overriding Incoming Call
Routing Rules, page 6-40).
You can define basic and advanced incoming call routing rules. Basic rules are applied
to all incoming calls regardless of the caller. Advanced rules forward or reject calls
according to caller, user presence, and timing conditions. The priorities of the rules can
be configured as well.
When you clone a sub-profile, all parameter values are copied to the new
sub-profile except for the sub-profile name and the Closed User Group.
6 Define basic call routing rules as required (see Defining Basic Rules for Incoming
5
To learn about advanced incoming call routing rules, see Defining Advanced
Rules for Incoming Call Routing, page 5-35.
The basic rules are defined on the Incoming Call Routing Profile page of the relevant
sub-profile (see Figure 5-13). The following basic rules are available:
Forward on busy—forwards calls when the phone line is busy. This rule does
not apply if call waiting is activated (see Call Waiting (Multi-appearance),
page 2-14).
Forward all—forwards all calls
Forward on DND—forwards or rejects calls when the user’s presence status
is DND (see the User Guide of the relevant telephone)
On logout—forwards calls, or routes calls to the members of the user’s ULA
group, if the user is logged out from all internal devices assigned to this user
and has no external phone number defined
Ring on—specifies whether incoming calls ring on a user’s internal phone,
external phones, and/or devices of members belonging to the user’s owned
ULA group. An incoming call rings (or is indicated) on all selected devices
and stops ringing when the call is answered.
If an incoming call is not answered within a specified time period, it is Managing Sub-profiles
forwarded to another user or number (external number or Coral extension), or
rejected. This rule also applies to call waiting when callers put on hold are not
answered.
Forward on busy Call forward destination: Next to the rule, select User and
Forward all enter the relevant user, or select Number and enter the
Forward on DND number of an external destination, a group, a service, or a
connected Coral extension.
For DND rules, you can also select Reject to reject incoming
calls and disconnect the callers.
extension.
To reject calls, select Reject the call.
4 Click Save.
5
To learn about basic incoming call routing rules, see Defining Basic Rules for
Incoming Call Routing, page 5-33.
The rules of an Incoming Call Routing sub-profile are either mandatory or optional.
While mandatory rules cannot be overridden at the user level, optional rules can be
overridden (but not removed) for a specific user.
This procedure describes how to define advanced rules for an incoming call
routing sub-profile. The procedure is similar for setting up advanced
incoming call routing rules for a specific user, except that no mandatory or
optional rules can be defined at the user level. To learn more about how to
adjust incoming call routing parameters for a user, see Overriding Incoming Call
Routing Rules, page 6-40.
Managing Sub-profiles
5
You can use the Search box to textually search for and display specific items
in the list.
2 Click Mandatory and Optional to view or hide the required types of rules.
Each box lists the rules in the order in which they are executed. Select a rule
to display its full syntax underneath the list box. (This option is available for
all types of incoming call routing rules.)
Managing Sub-profiles
5
The icons and labels to the left and the right of the boxes are described in the
following table.
4 To limit the rule to calls from specific callers, select from. You can define the
callers in the following ways:
from—applies the rule only to calls from the listed callers
from everyone except—applies the rule to all incoming calls except for
calls placed by the callers listed in the adjacent box
Add a caller or callers to the list:
a Click Add.
b Select the caller or callers:
Option Description
Starts with Enter the digits with which the calling number starts.
Restricted All incoming calls for which the ANI (calling number)
number information is not provided
5
c Select the relevant schedules to include all their time frames in the rule, or
select specific time frames.
The user presence is defined individually by the users themselves from the
Aeonix Web Portal for Users. For details, refer to the User Guide of the
relevant telephone (see Related Documentation, page 1-17). Managing Sub-profiles
Option Description
Reject the call Rejects the calls and disconnects the callers
Outgoing Call Routing sub-profiles are assigned to user profiles only. They define
how the system routes and handles calls placed by users that are assigned the relevant
profile.
An Outgoing Call Routing sub-profile defines which Automatic Route Selection table
is applied to outgoing external calls. It is also used for the following:
Enabling and configuring the hot station feature. If this feature is enabled, the
user’s phone automatically dials a specified number when the user operates the
phone.
The operations that induce the phone to call depend on the hot station mode
and on the type of the phone. Hot station triggers are lifting the phone handset
or pressing a key. Refer to the User Guide of the relevant phone for details
(see Related Documentation, page 1-17).
Outside line access code parameters. If enabled, the system automatically adds
the outside line access code when a call is placed to an external number. In
this case, you do not have to dial the outside line access code when placing
calls to external numbers.
Manipulating digits of outgoing calls, mainly for assigning speed dial functions
to dial pad keys. Unlike speed dial functions set in phone profiles (see Phone
Profiles, page 5-54), these functions apply to all phones of a user, regardless of
their type.
Outgoing call routing parameters (except the Outside line access code
parameters) and rules can be overridden for a specific user (see Overriding
Outgoing Call Routing Parameters and Rules, page 6-43).
Managing Sub-profiles
When you clone a sub-profile, all parameter values are copied to the new
sub-profile except for the sub-profile name and the Closed User Group.
6 Select the relevant ARS table name. (To learn more about routing tables and
how they are defined, see Automatic Route Selection (ARS), page 4-43).
7 To activate and configure the hot station feature:
a Select the Enable hot station check box. The hot station parameters are
displayed.
b Select the Hot station mode as follows:
Immediate—the phone calls the hot station destination immediately after
the phone handset has been lifted or any key or number (including 911 and
emergency numbers) has been pressed.
Delayed—the phone calls the hot station destination if after an internal dial
tone was received, and no key is dialed during the Interdigit Timeout
defined in the relevant Timeout sub-profile (see Table 5-5 on page 5-13).
c In the Call to fields, specify the destination user or number for hot station
calls.
Managing Sub-profiles
SIP phones call the hot station destination only after the user dials at least
two digits and presses the Send button.
The Delayed hot station mode can only be used with MGCP-based phones
(FlexSet-IP 280S, T207M, T208M, T207M/NP, T208M/BL) and
digital keysets (FlexSet 120, 120D, 120L, 120S, 121S, 280, 280D, 280D-HS,
280S, 281S, DKT and DST; connected through a Wave Gateway).
By default, this check box is cleared, requiring the user to dial the outside
line access code to place calls to external numbers.
When you enable the feature by clicking the check box, a system
information message is displayed: “Verify that there is no conflict between
the system dial plan and ARS”.
Click a rule to display its full syntax underneath the list box.
11 Click Save. The sub-profile is saved and displayed on the Outgoing Call
Routing List page.
Managing Sub-profiles
5
2 Select the relevant call type (DNIS or ANI) from the drop-down list, then
define the condition of the rule using the If the dialed number fields:
To apply the rule to all dialed numbers beginning with a specific prefix or
set of digits, select starts with and enter the prefix or the first digits of the
number (digits only). Managing Sub-profiles
To apply the rule to a specific dialed number, select is and enter the number
(digits only).
To apply the rule to all outgoing calls, select is any number.
To apply the rule to a range of dialed numbers, select is between and
specify the range.
5
To apply the rule to any call that has a number that is restricted or empty.
3 To cancel outgoing routing rules that are to be executed after this rule, select
Stop processing other rules.
4 To define an action for the rule, click Add. The Action fields are displayed.
You can use any combination of digits (0-9), asterisks ('*'), and pound ('#')
signs, and any combination of the following variables, which can be used a
multiple of times.
You can modify or delete any of the defined actions by selecting it and
clicking Update or Delete respectively.
11 Click OK at the bottom of the page. The rule is listed in the Digit
Manipulation Rules box on the Outgoing Call Routing Profile page.
12 Click Save.
To delete a rule:
1 On the Outgoing Call Routing Profile page (see Figure 5-18), select the
relevant rule from the Dialed Number Manipulation Rules box. You can
delete multiple rules by holding down the CTRL or SHIFT key while selecting
them.
2 Click Delete. The rule is removed from the box.
Managing Sub-profiles
5
Administration Level sub-profiles are assigned to user profiles only. These parameters
define administration task privileges granted to users whose user profile is associated
with the particular administration level profile, authorizing them to access and/or
manage the Aeonix Web Portal pages associated with this administration level profile.
Figure 5-22
Administration Levels
Profiles Page
The Name and the Closed User Group of an existing sub-profile cannot be
modified.
6 Set or view the sub-profile’s task privileges as described in the following table.
5
Dial Plans and Digit Allows users to access and/or manage the following
Mappings Aeonix Web Portal pages:
Dial Plans–see Dial Plans, page 4-19
Managing Sub-profiles
5
Trunks and ARS Allows users to access and/or manage the following
Aeonix Web Portal pages:
Trunk Groups–see Trunk Groups, page 9-1
Trunks–see Chapter 8, Trunks
Configuring Trunks–see Configuring Trunks in Aeonix,
page 8-9
Trunk Templates–see Trunk Templates, page 8-27
ARS–see Automatic Route Selection (ARS), page 4-43
Schedules–see Schedules, page 4-37
Trunk Group Profiles–Managing Profiles, page 5-83
General Info., Timeouts, and Toll Barrier
Sub-Profiles–see Managing Sub-profiles, page 5-3
ACD and CTI Allows users to access and/or manage the following
Services Aeonix Web Portal pages:
ACD Groups–see Defining ACD Groups, page 12-5
CTI–see Computer Telephony Integration (CTI), page 12-99
Hunt Groups–see Defining Hunt Groups, page 12-45
Aliases–see Chapter 11, Managing Aliases
System and Clusters Allows users to access and/or manage the following
Aeonix Web Portal pages:
Locations–see Locations, page 4-9
Countries–see Country-specific Dial Codes, page 4-1
Clusters–see Clusters, page 14-33
Backup and Restore–see Data Backup and Restoring via
Web, page 14-55
System–see System Information, page 14-25
Restarting Aeonix–see Upgrading Aeonix via Web, page 14-63
Licensing (view only)–see License Information Page,
page 3-32
7 Click Save. The sub-profile is included in the list on the Administration Levels
Information Profile List page.
5
Phone profiles are sub-profiles that define the properties (speed dial and other
functions of the phones’ programmable buttons) of the following MGCP, SIP, and
digital phones connected to Aeonix:
MGCP IP phones: FlexSet-IP 280S, T207M, T208M, T207M/NP, T208M/BL
Tadiran SIP phones: T19P, T19P E2, T21P E2, T23G, T27P, T29G, T322,
T328, T41P, T42G, T46G, T48G, T49G
P-Series phones: P-335, P-450
FlexSet 28x Series digital phones connected through a Wave Gateway:
FlexSet 280S, FlexSet 281S, FlexSet 280D, FlexSet 280D-HS, and FlexSet 280
FlexSet 12x Series digital phones connected through a Wave Gateway:
FlexSet 120S, FlexSet 121S, FlexSet 120D, and FlexSet 120
DKT and DST digital phones connected through a Wave Gateway:
DKT 2320, DKT 2300, DKT 2120, DKT 2100, DKT 1110, DKT 1100, and
DST
The values and functions defined for a phone profile are applied by default to the
relevant phones of users whose assigned profile includes this phone profile. At the
user level, additional phone profiles can be defined and associated to specified phones
(see Configuring a User’s Phone Profiles, page 6-49).
This section describes the following:
Defining a Phone Profile, page 5-54
Programmable Button Dial Functions, page 5-60
Programming TEM Buttons of T207M, T208M, T207M/NP, T208M/BL Phones,
page 5-78
on page 5-54.
When you clone a phone profile, all parameter values are copied to the new
phone profile except for the profile name and the Closed User Group.
5
6 Click Properties to display the phone properties and set them as described in
the following table.
Managing Sub-profiles
b Specify the function for the button. For example, select Deflect from the
Feature type drop-down list and specify the destination user, number, or
5
c Select Lock if you do not want the button function to be modifiable for
users of this profile.
d If you want to customize the name of the function as it is displayed on the
phone, enter the required text in the Label field.
e Click OK. The icon of the selected function is displayed to the left of the
button.
8 Click Save. The phone profile is included in the list on the Phone Profile List
page.
Aeonix Contact Center See Table 5-14, Programmable Phone Button Dial
Functions for Aeonix Contact Center.
Alarm agent Press the unlit button (which indicates that the
phone is currently set to RFC 2833 mode) - the
button flashes until the phone provisioning process
has been completed.
Auto Redial Press the Auto Redial button to add the last busy
or non-answering external destination number
dialed to the auto redial queue (up to 20 numbers Managing Sub-profiles
can be stored in the Redial list).
Press the Freeze Auto Redial button to suspend
the Auto Redial feature; Auto Redial and Freeze
Auto Redial buttons flash.
Pressing any of the flashing buttons unfreezes all
the numbers in the Redial list and the buttons stop
flashing.
User—Aeonix user
Alias—Aeonix user alias
Speed dialing—In this mode, the Camp-on button
works in conjunction with a Speed Dialing button.
Once pressed, the Camp-on button LED will blink
for 5 seconds. During this time, pressing any
Speed Dialing button will set the Camp-on target to
the value of the Speed Dialing target.
Managing Sub-profiles
5
a held call
Line—to place a call
Not provisionable—to reserve this programmable
button for direct configuration via the phone itself
(provisioning definitions will not affect this
button)
5
User—Aeonix user
Number—Any valid internal or external number
Speed dialing—In this mode, the Forward button
works in conjunction with a Speed Dialing button.
Once pressed, the Forward button LED will blink Managing Sub-profiles
for 5 seconds. During this time, pressing any
Speed Dialing button will set the Forward target to
the value of the Speed Dialing target.
In addition, you can optionally specify a prefix
number that will enable you, for example, to
reroute the forwarded call via a specific trunk.
Group pickup Press this button to pick up a ringing call for your
pickup group.
Room status Press the button and enter the relevant room
status code (01-16).
Managing Sub-profiles
5
Shared line button NOTE: The number of shared line buttons that can
be used depends on the Max. number of
waiting calls threshold defined in the user’s
Feature Configuration sub-profile (see Table
5-6 on page 5-17).
Press this button to answer or place a call on
behalf of a ULA group. This button can always be
configured but works only for members of the
specified ULA group.
Users press a shared line button to answer an
incoming call to the specified ULA group, or to
place a call on behalf of the group. Pressing the
button twice allows ULA members to directly call
the group owner.
A shared line button flashes to indicate incoming
ULA calls, or calls put on hold. The button is lit
when the user answers or has placed a ULA call,
as well as when another ULA member puts a call
on exclusive hold.
ULA owner—specifies the ULA group for which
the button will be used. Enter the user of the
relevant ULA group owner.
Line no.—specifies the order at which shared line
buttons assigned to a ULA group are activated if
several ULA calls are received or placed at the
same time.
Single step Press the button while engaged in a call to put the
transfer second party on hold and establish a call
connection between the second party and another
specified user, external number, Coral extension,
or call group.
Alternatively, if the destination is defined as Speed
dialing and a separate Speed dialing button has
been defined, press the Single step transfer button,
and while it flashes, press the Speed Dial button to
send it to the specified destination. A prefix
number can be added before the number to be
dialed.
Speed dialing NOTE: Users cannot speed dial to numbers that are
blocked by their toll barrier settings (see Toll
Barrier Sub-profiles, page 5-24).
Used for calling a specified user, external number,
Coral extension, call group, or service by pressing
the button instead of dialing the number.
If the speed dialing destination is a user, the button
lights if any of this user’s alias numbers is busy.
If the speed dialing destination is a service (such
as Voice Page), the button lights if all alias
numbers assigned to this service are busy.
On supported Tadiran SIP phones, if the speed
dialing destination is a user, the button shows user
presence, as follows:
Off–User B is logged out of Aeonix
Green–User B is in idle state
Red–User B is in busy state
Flashing red–User A put user B on hold, in
which case user A can resume the held call by
pressing the flashing red LED
OR
User B has a ringing incoming call, in which
case authorized user A (see Pickup on page 5-19)
can pick up the call by pressing the flashing red
LED.
Wakeup Press the button and enter the time you want to be
awoken.
Group Login & Press the button to log in to the Aeonix Contact Center
Logout group specified.
Use the same procedure to log out of this specific Aeonix
Contact Center group, which you are currently logged into
(toggle feature).
Release & Resume Press the button to indicate that you are unavailable to
receive ACC calls for all your Aeonix Contact Center
groups to which you are logged in.
Press the button again to return to all your Aeonix Contact
Center groups (toggle feature).
Release & Resume Press the button and enter the specified release code to
with Code indicate that you are unavailable to receive ACC calls for
all your Aeonix Contact Center groups to which you are
logged in.
Press the button again and enter the release code to
return to all your Aeonix Contact Center groups (toggle
feature).
Managing Sub-profiles
Extend Wrap-up Press the button to ignore the Wrap-up timeout and
continue in the Wrap-up state.
Wrap-up with Code During a call or while in Wrap-up state press the button
and specified Wrap-up code to enter the Wrap-up
associated with the call.
5
Group Queue Info Press the button to display the number of calls waiting in
queue for the Aeonix Contact Center group specified.
This information is displayed for approximately five
seconds.
Managing Sub-profiles
5
2 If required, set the phone profile identity parameters and assign dial functions
to the four programmable buttons on the phone (see Defining a Phone Profile,
Steps 5-7 on page 5-58).
3 Program the TEM buttons. For each of these buttons, you can additionally
assign an alternate function using the Shift button of the phone.
5
Managing Sub-profiles
5
b Specify the function for the button. For example, select Speed Dial from
the Feature type drop-down list and specify the destination user or number
in the Dial to fields.
c Select Lock as required. If this check box is selected, the button function
cannot be modified for the specified user.
d Click OK. The icon of the selected function is displayed next to the button.
(Shift function icons are displayed indented in the row under the button.)
The following figure shows an example for a TEM button definition with a
basic and an alternate function. In this example, the top left TEM button is
used for putting a caller on hold; however, if the relevant Shift button is
pressed before this button, the phone calls a specified user or number. The top
right TEM button is used for calling two different numbers; which number is
dialed depends on whether the Shift button was pressed.
Managing Sub-profiles
5
4 Click Save.
If the profile is applied to a phone that does not have a TEM, the functions
assigned to the TEM buttons are not relevant for this phone.
Managing Sub-profiles
5
Managing Profiles
5
The User Profile List page displays the user profiles defined in the system; the Trunk
Group List page displays the trunk group profiles.
The profile lists are sorted by the Name column. If the list includes more than
one page, use the page navigation bar at the bottom of the list to navigate
between the pages.
CUG The Closed User Group associated with the profile (see Closed User
Groups (CUG), page 4-29)
5
Update In the list, click the profile name to update the details
—
profile of this profile.
Delete profile Select the check box next to the profile or profiles to
be deleted and then click Delete (see Deleting Entities,
page 3-66).
Managing Profiles
5
When you clone a user profile, all parameter values are copied to the new
profile except for the profile name and the Closed User Group.
5 Select the Phone Profiles check box to allow overriding of phone profiles for
a user, or clear this check box to make the override impossible.
6 To replace a phone profile:
a In the Phone Profiles box, select the assigned phone profile for the relevant
phone type. (If this is a new user profile, this is the relevant default phone
profile.)
b Click Replace and select the required phone profile from the drop-down list
that is displayed under the box.
c Click OK.
Before phone profiles (except for the default phone profiles) can be selected,
they must be defined in the system as described in Phone Profiles, page 5-54.
7 Click Save. The profile is displayed in the list on the User Profile List page.
Managing Profiles
5
When you clone a trunk group profile, all parameter values are copied to the
new profile except for the profile name and the Closed User Group.
5 Click Save. The profile is included in the list on the Profile List page.
Managing Profiles
5
To take advantage of this on boot up, the DHCP server must have option 66
set to the hostname or IP address of the Aeonix server (it is recommended to
use the hostname for redundancy purposes).
Provisioning profiles are managed from the Provisioning Profile List Page. Managing
Auto Provisioning profiles includes the following procedures:
Provisioning Profile List Page, page 5-92
Defining a Provisioning Profile, page 5-94
The Provisioning Profile List page displays the provisioning profiles defined in the
system.
The provisioning profile list is sorted by the Name column. If the list includes
more than one page, use the page navigation bar at the bottom of the list to
navigate between the pages.
For each provisioning profile, the list displays the following information.
SIP Server The IP address (IPv4 or IPv6) or host name of the Aeonix
Address server on which the provisioning service is hosted and to
which phones send all requests
Tadiran SIP The Tadiran SIP phones configuration set associated with
Phones this provisioning profile
Configuration Set
5
6 Set or view the profile’s time parameters as described in the following table.
7 Set or view the profile’s Network VLAN parameters for Tadiran SIP phones,
as described in the following table.
The Network VLAN parameters are only applicable for Tadiran SIP phones.
DHCP VLAN Active Select Yes to enable the WAN port VLAN
setting from DHCP server
T322
T328
T40G
T41P
T41S
T42G
T42S
T46G
T46S
T48G
Managing Provisioning Profiles
T48S
T49G
T58V
5
TGW 8-2G Default: Use the default firware version which is delivered
and installed with the Aeonix upgrade version.
TGW 16-3G Custom: You can load customized firmware versions for
testing purposes using an SSH program such as WinSCP
TGW 24-3G and store them in the Aeonix directory under
/home/aeonixadmin/aeonix/webadmin/webapps/aeonix/Pro
TGW 96-2G visioning. Click Custom and enter the file name of the
relevant custom firmware version
TGW x E1-2G Firmware name: The name of the firmware file used for
this TGW type.
10 View and set the profile’s Tadiran TGW Time-Division Multiplexing (TDM)
parameters:
Dial now rules The dial plan from which to apply the phone’s dial now
rules to the provisioning profile (see Dial Plans, page 4-19).
LCD logo mode The logo setting for the phones, as follows:
System logo intermittently displays the Aeonix logo
on the phones’ screen during idle.
Custom logo if you want to use a different logo,
such as a company logo.
Disabled displays no logo on the phones (default
option).
High availability retry The number of times the phone attempts a request
count before switching to another Aeonix server in the cluster.
Tadiran SIP phones The customized Tadiran SIP phones configuration set
configuration set associated with this provisioning profile
5
TGW configuration set The customized TGW configuration set associated with
this provisioning profile
12 Click Save. The profile is displayed in the list on the Provisioning Profile List
page.
Provisioning definitions will take effect after the phone's next configuration
check.
Managing Users
A user is a person using a telephone or another device in the Aeonix system to make
and receive calls. A user usually has one or more unique alias numbers defined (see
Chapter 11, Managing Aliases) and is assigned to one or more phones (see Chapter 7,
Managing Phones).
Aeonix trunk groups are very similar to users but refer to gateways and IP
trunks connected to Aeonix. See Chapter 9, Managing Trunk Groups for
details.
The users available in the system are listed on the User List Page. Managing users
includes the following procedures:
Defining a User, page 6-9
Importing / Exporting Users, page 6-79
Importing LDAP Users, page 6-87
Associating Users with Groups, page 6-93
Users
6
The User List page displays the existing users in the system. It also contains an area
(click Search to display this area) in which search criteria can be defined to find and
display specific users.
The users listed with a green circle icon are currently logged into the system. Click
Refresh to manually update the list.
The user list is sorted by the Login Name column. If the list includes more than one
page, use the page navigation bar at the bottom of the list to navigate between the
pages according to the following table:
These navigation options are available on any list page that comprises more
than one page.
To fast forward
6
To fast rewind
Users
6
Status icon A circle icon to the left of each user indicates the following:
(circle) Green - the user is logged into Aeonix
Red - the user is logged out
Login Name Unique identifier of the user. Typically, the worker ID or other
unique number or name is used.
Closed User The Closed User Group to which the user is assigned.
Group Closed User Groups are used for creating sub-groups of
users.
Sea Navigator / Is displayed for users that are allowed to use the
Sea Attendant Sea Navigator or Sea Attendant application on their desktop,
User icon that is, have the Sea Navigator or Sea Attendant check box
selected in their Feature Configuration profile.
Icons are displayed as follows:
(Active Sea Navigator)—indicates that the Sea
Navigator is installed and running on the user’s desktop
(Active Sea Attendant)—indicates that the Sea
Attendant is installed and running on the user’s desktop
To learn about how to install the Sea Navigator or Sea
Attendant, see Aeonix Clients for Users, page 6-99. Using the client
is described in the corresponding Online Help.
Users
6
Update user In the list, click the Login name to update the details
—
of this user.
Delete user Select the check box next to the user or users to be
deleted and then click Delete (see Deleting Entities,
page 3-66).
Refresh Click Refresh to update the list to the current status.
display
Reset user’s Click to reset the password of this user to the default
password value (see Resetting a User’s Password, page 6-73).
Users
6
Login name Users that contain the specified search value in their
Login name field
Description Users that contain the specified text in their Description field
Display name Users that contain the specified search value in their Display
name field
Closed User Users that belong to the specified Closed User Group
Group
User ID Users that contain the specified search value in their User ID
field
LDAP user from Users that were uploaded to Aeonix from the last LDAP
last import import.
(when selected)
Click the Search bar to display the search fields and fill in one or more fields as
required. When you start filling in the Login name, Description, Display name,
Alias, or User ID, all existing entities containing the entered value are displayed
below the field. Select the required value (if available) or type it in.
Users
6
Click Search to filter the display by the entered criteria. The User List will include all
users that have values corresponding to the search values or containing them in the
relevant fields. Example: If you enter jo in the User ID field and click Apply, users
with the user ID johns, major, 2jo3, and so on are displayed (provided these users are
defined in the system).
Users
6
The following procedure describes how to define a user in the Aeonix system.
Prior to addin g users, make sure Aeonix global settings and user profiles
are properly defined. See Chapter 4, Global Settings and Chapter 5, Profiles
for details.
To define a user:
1 In the navigation pane, click Administration. The pane displays the
Administration menus.
2 In the navigation pane, select the Users menu, and then do one of the
following:
Option a
Option b
Option c
a To define a new user, click Add User. When you add a new user, an
indexing suffix is automatically attributed to the user in the following
format: User_x, where x is a running number. For example, when adding
the first user to the system, the Login name will be User_1. The next Login
name will be User_2, and so forth.
In addition to the Login name, the following parameter field values are
automatically filled in by the system when adding a new user:
b To update an existing user, click User List. On the User List page, click the
Login name of the relevant user.
c To create a new user based on the settings of an existing one: From the
User List page (see Figure 6-1), click (the Clone icon) to the right of
the relevant user; a new page is opened for creating a cloned entity. An
indexing suffix is automatically added to the user. For example, if the
original Login name is Mike, the cloned user’s Login name will be Mike_1.
In addition to the Login name, the following fields and tabs are
automatically cloned by the system when cloning a user: Display name,
Closed User Group, Profile, First name, Last name, User ID,
Description, PIN, Dispatch user, Profiles tab, and Permissions tab.
The remaining fields and tabs are not cloned. For example, the Aeonix
Contact Center agent number field is a unique number used to identify the
agent and cannot be cloned.
3 Fill in the fields to define the general and identity settings of the user
(see Defining User Identity Settings, page 6-14).
4 Optionally set a photo for the user (see Uploading a User Profile Photo,
page 6-18).
5 Specify the user’s internal alias numbers (see Assigning Aliases to Users,
page 6-19).
6 Create a mailbox for the user (see Managing Voicemail Boxes for Users,
page 6-24).
Defining a User
7 Specify external numbers, such as cellular phone or home phone numbers and
outside line access code prefix setting (see Specifying External Phone Numbers,
page 6-27).
8 Customize the profile values as required (see Overriding User Profiles, page 6-29).
6
This includes, among many others, call routing and forwarding definitions.
Alternatively, if you want to save and clone the current user, click
at the bottom of the page; a new page is opened for
creating a cloned entity, where an indexing suffix is automatically added to
the user’s Login name. For example, if the original Login name is Mike, the
cloned user will be Mike_1 (as described above).
how to quickly locate the user entry in the list, see Searching for Users,
page 6-6.
On the user’s Phones tab (see Figure 6-22), a green circle icon to the left of
the user’s phone indicates that it is working (registered in Aeonix).
The user’s phone
6
Defining a User
6
General user settings are defined in the upper part of the User page; user identity
parameters are defined under the Identity & Aliases tab. The following table
describes these parameters.
Defining a User
6
NOTE: When this field is defined for a new user, its value is
retained as the User ID (see below) of the user.
Display name Name of the user as it is shown on the display panel of the
phone or phones associated with the user. This name is
also displayed at the other phone when calling another user
and as the contact’s name in the Aeonix Dispatch Console
Phonebook.
When this field is defined for a new user, there is an option
to use this name as the first and last name of the user. In
this case, use a space to separate the display name into two
names. The system will automatically fill in the First name
and Last name fields below with these names once you
click Save, provided that you leave these fields blank.
Closed User The Closed User Group to which the individual belongs
Group (see Closed User Groups (CUG), page 4-29).
(Default: Root)
NOTE: This field cannot be modified after the user is added to
the system.
Email The email address of the user. This is required for Aeonix
Touch clients to sign into the Aeonix Touch server and for
Aeonix Touch presence purposes.
Display in Clear if you do not want the system to include the user in
directory (Default: the Aeonix directory.
selected)
User ID Unique ID for the user derived from the login name when
(read-only) defining a new user (see above).
It is used by Aeonix to identify the user when it
communicates with other applications.
Dispatch user Select to define the user as a Dispatch user, and then select
the permission level for the user:
User: The user can use the Aeonix Dispatch Console
Admin: The user can configure the Aeonix Dispatch
Console grid and buttons
Super Admin: The user can, in addition to configure the
Aeonix Dispatch Console, set up the first install instance
of the Aeonix Dispatch Console
Allow automatic NOTE: This option is only applicable to Dispatch users and is
tab selection only displayed if the Dispatch user option above is
selected.
Select if you want the grid on the Dispatch Console to
automatically display the tab on which the incoming call to
this user is defined in the Dispatch Console;
Defining a User
6
You can upload a photo, which will be included as part of the user’s profile entry in
the phonebook.
To avoid aspect ratio distortion, ensure the photo is square (height and width
are equal). You can use any graphic editor program to resize your photo.
3 Select Upload photo, click Choose File, and then use the displayed dialog
box to locate the required photo (in JPG, PNG, or GIF format).
Alternatively, select Delete photo if you want to remove the photo from the
Defining a User
user’s profile.
An already used alias cannot be assigned to a new user. View the already
assigned aliases on the Alias Lists page as described in Chapter 11,
Managing Aliases. In addition, the alias number must follow the patterns
defined in the applicable dial plan (see Dial Plans, page 4-19).
Make sure that the alias number to be assigned is not already in use and
complies with the patterns of the applicable dial plan.
Defining a User
6
2 To the right of the Aliases box, click Add, or select an existing alias in the
box and click Update. The Alias Configuration page is displayed on the User
page.
Type Description
Prefix Use to define prefix digits and route all aliases beginning with this
prefix to the user.
Select Prefix and enter the prefix in the text box.
Select Limit length and enter a number to restrict the amount of
digits, including the prefix, that can be dialed to reach the user
associated with this alias.
4 Click OK.
5 Click Save.
6
To delete an alias:
1 On the User page, click the Identity & Aliases tab (see Figure 6-5).
2 In the Aliases box, select the alias number and click Delete. The alias is
removed from the box.
3 Click Save to delete the alias.
If you delete an alias number that has a voicemail box assigned, the mailbox
is also deleted.
marked as the new default alias (see alias 2002 in the example below).
6
If an alias range is selected as the default, the first alias in the range is
assigned as the default alias.
Defining a User
6
You can create a voicemail box for the first complete alias number of a new user. This
voicemail box is automatically removed from the system if the alias number is deleted.
You can also delete only the voicemail box.
This section describes the following procedures:
Creating a Mailbox for a New User, page 6-25
Deleting a Mailbox, page 6-26
2 Select the required service from the Voicemail service drop-down list.
3 Select the adjacent Create mailbox check box.
A voice mail box can only be created if the user has at least one complete
alias number assigned.
The default alias is automatically associated with the mailbox (see Setting
the Default Alias for a User, page 6-22).
Defining a User
4 Click Save.
6
External phone numbers belong to phones that are not located in the organization, such
as a user’s cellular phone or home phone.
Specifying the external phone numbers is necessary for making use of the Multiple
Devices per User (FlexiCall) feature. This feature allows a user to have an incoming
call ring simultaneously on the user’s internal and external devices until the call is
answered.
This section describes the following procedures:
Specifying an External Phone Number for a User, page 6-28
Deleting a User’s External Number, page 6-29
Defining a User
6
2 To the right of the External Numbers box, click Add, or select a number in
the box and click Update.
3 In the External number box, enter the external number as dialed from the
user’s default location.
To enter a full number with prefixes and suffixes, add + (the Plus sign) at the
beginning of the number.
4 Click OK. The number is added to the External Numbers box.
5 Clear the Add outside line access code prefix check box if you do not want
Defining a User
the system to add the outside line access code when placing calls to external
numbers (selected by default).
6 Click Save.
6
A user profile consists of several assigned sub-profiles, one for each sub-profile type.
A sub-profile includes a set of content-related parameters. Whether a sub-profile can
be overridden for a specific user, depends on the definition of the profile assigned to
this user. Profiles and sub-profiles are described in detail in Chapter 5, Profiles.
By default, a new user is assigned the Default User Profile and the sub-profiles related
to this profile. The user’s profile assignment and sub-profile values can be modified
as described in the following sections:
Assigning a Profile to a User, page 6-30
Replacing a User’s Sub-profiles, page 6-30
Overriding Sub-profile Parameter Values, page 6-33
Defining a User
6
You cannot change the Administration Level of a specific user. However, you
can set full administrator rights for the user (see Viewing Administration Level
Parameters, page 6-44).
If necessary, a sub-profile replacement can be cancelled and the link between the
user’s profile and the sub-profile recreated (see Canceling a Sub-profile Replacement,
page 6-32).
Example: Mr. Smith, a software programmer, is assigned the R&D profile, which
includes the R_D Timeout sub-profile. When he has to join a two-week conference
abroad, the Aeonix administrator replaces his R_D Timeout sub-profile with the Sales
Timeout sub-profile. After Mr. Smith comes back, the administrator cancels the
Defining a User
change. (This example is based on the profile structure defined in Profile Definition
Example, page 5-2.)
6
Replacing a Sub-profile
The following procedure describes how to modify a user’s sub-profile assignment. To
learn about how to override specific sub-profile parameters, see Overriding Sub-profile
Parameter Values, page 6-33.
To learn how to replace a user’s phone profiles, see Configuring a User’s Phone
Profiles, page 6-49.
1 On the User page (see Figure 6-3), click the Profiles tab.
Defining a User
6
If the Change sub-profile check box is disabled, the profile assigned to the
user does not allow modifications of this sub-profile.
You can override the parameters of a sub-profile only if their Override check
boxes are enabled. Whether a sub-profile can be overridden is defined in the
profile assigned to the user (see Managing Profiles, page 5-83).
3 Select the Override check box next to the relevant parameters. The
parameters’ link to the source sub-profile is broken, and the parameters can be
6
modified as required.
4 Click OK. On the Profiles tab, an overridden comment is displayed after the
name of the sub-profile.
5 Click Save.
You can override the parameters of a sub-profile only if their Override check
Defining a User
3 Select the Override check box next to the relevant parameters. The
parameters’ link to the source sub-profile is broken, and the parameters can be
modified as required.
6
4 Click OK. On the Profiles tab, an overridden comment is displayed after the
name of the sub-profile.
5 Click Save.
You can override the parameters of a sub-profile only if their Override check
boxes are enabled. Whether a sub-profile can be overridden is defined in the
profile assigned to the user (see Managing Profiles, page 5-83).
4 Select the Override check box next to the relevant parameters. The
6
parameters’ link to the source sub-profile is broken, and the parameters can be
modified as required.
5 Click OK. On the Profiles tab, an overridden comment is displayed after the
name of the sub-profile.
6 Click Save.
Click the Base Toll Barrier toggle bar to display or hide the details of the toll
barrier sub-profile assigned to the user.
The Basic behavior drop-down list below can only be modified if the
Change Method is set to Override.
6
If Basic behavior is set to Reject all calls, the Do not allow calls to box is
not displayed. In this case, skip the following step and continue with Step 6.
5 Use the Do not allow calls to box to define numbering patterns (partial or
complete phone numbers) of destinations that users are not allowed to call.
Add new, update, or remove patterns as required:
To add a pattern, click Add, enter the number in the displayed Pattern box,
and click OK. Use the X wildcard to represent any digit.
To update a pattern, select it and click Update. Modify the number that is
displayed in the Pattern box and click OK.
To delete a pattern, select it and click Delete. You can select more than one
pattern for deletion by using the CTRL and SHIFT keys.
6 Use the Allow calls to box to define numbers and numbering patterns of
destinations that users are allowed to call, regardless of the value in the Basic
behavior field and the entries in the Do not allow calls to box (if available).
Add new, update, or remove patterns as described in the previous step.
7 To override the Direct incoming calls to external destinations parameter,
which determines whether or not to block user-defined incoming call
redirections to external destinations, select the relevant check box (Allow or
Restrict.)
Defining a User
8 Click OK. On the Profiles tab, an overridden comment is displayed after the
name of the sub-profile.
9 Click Save.
6
Basic rules that are disabled in the sub-profile assigned to the user (Enable
check box not selected)
Advanced mandatory rules defined for the sub-profile
For more information, see Incoming Call Routing Sub-profiles, page 5-31.
6
You can override the basic incoming call routing rules only if the Override
check box of the relevant sub-profile is enabled. Sub-profile override
permissions are defined in the profile assigned to the user (see Managing
Profiles, page 5-83).
3 Select the Override check box next to the relevant rules. The rules’ link to the
source sub-profile is broken, and the rules can be modified as required.
For a description of the rules, see Defining Basic Rules for Incoming Call Routing,
page 5-33.
Defining a User
4 Click Advanced. The fields for viewing and setting advanced rules are shown.
6
You can use the Search box to textually search for and display specific items
in the list.
5 Click Mandatory, User’s Rules, and Optional to view or hide the required
types of rules. (The User’s Rules are displayed by default.) Each box lists the
rules in the order in which they are executed.
6 Using the buttons to the left and the right of the User’s Rules box, manage the
user’s incoming routing rules as required:
Click a rule to display its full syntax underneath the box. (This option is
available for all types of incoming call routing rules.)
Use (the Up and Down arrows) to set the priority order of the user
rules. (All user rules have a lower priority than the sub-profile’s mandatory
rules, but a higher priority than its optional rules.)
Use the Add or Update button to add new or update existing user rules.
(For detailed instructions, see Defining Advanced Rules for Incoming Call
Routing, page 5-35.)
Click Delete to delete a selected user rule.
Defining a User
7 Click OK. On the Profiles tab, an overridden comment is displayed after the
name of the sub-profile.
8 Click Save.
6
You can use the Search box to textually search for and display specific items
in the list.
Defining a User
6
3 Select the Override check box next to the relevant parameters. The
parameters’ link to the source sub-profile is broken, and they can be modified
as required.
4 In the Dialed Number Manipulation Rules box at the bottom of the page,
add, update, or delete user-specific rules as required. These procedures are
performed as described in Defining Dialed Number Manipulation Rules, page 5-45
and Deleting Dialed Number Manipulation Rules, page 5-48, but from the User page
instead of the Outgoing Call Routing Profile page.
5 Use (the Up and Down arrows) to set the priority order of the rules.
6 Click OK. On the Profiles tab, an overridden comment is displayed after the
name of the sub-profile.
7 Click Save.
the sub-profile.
5 Click Save.
6
4 Click OK to return to the Profiles tab. If all parameter overrides have been
canceled, the overridden comment after the sub-profile name is removed.
5 Click Save.
6
Click the Base Toll Barrier toggle bar to display or hide the details of the toll
barrier sub-profile assigned to the user.
3 From the Change Method drop-down list, select None. The Basic behavior
field and the pattern boxes are disabled and display the settings of the
sub-profile.
If None is already selected, clear the Override check box next to the Direct
calls to external destinations parameter instead.
4 Click OK to return to the Profiles tab. If all parameter overrides have been
canceled, the overridden comment next to the sub-profile name is removed.
5 Click Save.
1 On the User page, click the Profiles tab (see Figure 6-10).
2 Click the Incoming Call Routing sub-profile. The parameters are displayed for
the user (see Figure 6-17).
3 Clear the Override check box next to the relevant rules. The parameter fields
6
Phone profiles define the settings and dial functions of phones. The profile assigned
to a user includes a phone profile that is applied by default to Aeonix phones
associated with this user.
Default phone profiles cannot be associated with a specific phone. However, you can
define additional phone profiles for specific phones, which apply when the user uses
these phones. (These phones must be defined in the system, as described in Configuring
Phones in Aeonix, page 7-9.)
The user of the phone can change the button definitions from the Aeonix
Web Portal for Users. For more information, refer to the Configuration Guide
for End Users (see Related Documentation, page 1-17).
Defining a User
6
The following procedure describes how to define phone profiles for the
phones of a specific user. To learn about defining phone profiles that can be
applied to multiple users, see Defining a Phone Profile, page 5-54.
3 To break the link to the profile assigned to the user, select the check box next
to the Override profile drop-down list. The drop-down list is enabled.
Clearing the Override profile check box re-links the phone profile to the
user’s profile.
4 To base the phone settings on a different phone profile than the phone profile
of the assigned user profile, select the relevant phone profile from the
Override profile drop-down list. (This option is only available if the Override
profile check box is selected and if profiles have been defined for this phone -
see Defining a Phone Profile, page 5-54.)
Defining a User
5 If this is a new phone profile, select from the Phone ID drop-down list the
phone to which the phone profile settings are applied when operated by the
user.
6
Clearing the check boxes re-links the parameters to the phone profile of the
assigned user profile.
You cannot assign or modify dial functions to a button that has been locked
Defining a User
8 When you have finished configuring the buttons, click OK. The main User
6
page is displayed.
Programming
The following procedures are used to program buttons in Aeonix 4.1
Deleting Buttons
Deleting a programmed button via the phone physical interface, or the phone
URL interface -- the button will be restored almost immediately from the
Aeonix database. To clear a user-programmed button, set it to empty via the
Aeonix User Configuration Portal.
If the button is set in the Aeonix Administration Phone Profile page, it will
always be restored when the phone is provisioned.
For a fully clear (empty) button, the button must be clear in both the Aeonix
User Configuration Portal and the Aeonix Administration Phone Profile page.
Defining a User
be converted to the Aeonix format. The following table shows examples of the
conversion for different function types.
event=button_pressed&button_id=4322
Button Lock
If the user programs a button via the phone physical interface or the phone URL
interface, and the button is protected by Lock in the Aeonix User Configuration Portal
or the Aeonix Administration Phone Profile, the phone will display an error message:
“Program failed, button is locked”.
Defining a User
6
The user cannot make or receive calls without at least one phone. This phone (or an
external number) must be defined in the system and associated with the user.
The following procedure describes how to define a user’s phone in Aeonix and
configure basic phone parameters. Advanced settings of this phone are defined
through the Phone page (see Configuring Phones in Aeonix, page 7-9).
In addition, the phone itself must be configured to work with the system. Only then
will the user be able to place and receive calls. For instructions on how to configure
the phone, refer to the relevant phone documentation (see Related Documentation,
page 1-17).
Managing a user’s phone includes:
Adding a User’s Phone, page 6-57
Viewing and Editing User’s Phones, page 6-59
Defining a User
6
Select Auto-Detect if you want the system to automatically detect the phone
model.
4 Enter the MAC address of the phone in the field that is displayed below.
5 In the Phone ID fields, enter the MAC address (MGCP phones), SIP User
Name (SIP phones), or shelf/slot/card assignment (Wave Gateway phones) of
the phone, as well as the name of the domain (server) to which the phone is
connected.
6 From the Location drop-down list in the New Phone Configuration section,
select the location where the phone is used. (To learn about defining locations
in the Aeonix system, see Locations, page 4-9.)
7 Click Save at the bottom of the User page.
You can repeat the above procedure to define multiple phones for the user. The defined
phones are displayed in the user’s My Phones table and added to the Phone List Page
(see page 7-3).
Defining a User
6
Default User A check mark indicates that the user is the default
user of this phone. If the user is currently logged in
through the phone but is not its default user, this
field is left blank.
Allow Auto Answer Select to permit the phone to receive Voice and
Zone Pages, and to allow Auto Answer.
Dial Lock Allows the user to lock the phone with the Dial Lock
feature. Dial Lock feature for Tadiran phones is
described in Aeonix Configuration Guide for End
Users.
Ring Control (Default: Always - the phone will ring on all incoming calls
Always) Internal call - the phone will only ring on
incoming internal calls
External call - the phone will only ring on
incoming external calls
Never - the phone will not ring on any incoming
call
is registered.
Force Logout Select to log out the phone when guest login is
being used.
Defining a User
6
Mobility rules allow outside users calling a mobility alias number to obtain internal
dial tone and internal system services. For a general description of the mobility
feature, see Mobility, page 2-27.
If mobility service aliases have been configured in the system, mobility rules can be
defined (see Defining Mobility Aliases, page 12-89). These rules are either defined while
configuring a mobility alias, or for a specific user as described in Defining a Mobility Rule
for a User, page 6-63.
You can define one or more mobility rules. To avoid ambiguity, the system makes sure
a new rule does not conflict with an existing rule before saving it. For details,
see Non-conflicting Rules, page 12-93.
Defining a User
6
2 Click Add, or click the Service Number of the rule to be updated. The Add
Rule or Update Rule page is displayed.
3 Select Rule enabled to have the rule activated once it has been saved. If this
check box is not selected, the other rule parameters cannot be modified.
4 From the Service number drop-down list, select an available mobility service
alias. (Mobility service numbers are defined as described in Defining Mobility
Defining a User
The service number is an internal alias and not intended for outside callers.
To obtain the number that the user must dial to access the mobility service
from outside, contact your IT manager.
6
Tips:
To learn more about the ULA feature, see User Line Appearance (ULA), page 2-43.
You can set up a ULA group for any user (see Configuring a User’s ULA Group,
page 6-67). The user for which you define the group will be the owner of this group. A
user can also be member of one or more ULA groups owned by other users. To view
the configuration of these groups, see Viewing the Configuration of a ULA Group Owned by
Another User, page 6-70.
The ULA groups a user belongs to are displayed on the user’s ULA tab. The ULA tab
is divided into two main parts:
My Owned Group—lists the members of the ULA group in which the user is
the group owner
Membership in Groups—lists all ULA groups to which the user belongs as a
regular member (not owner)
For each of the listed groups, you can define whether the user is logged in, and whether
incoming calls will ring on the user’s phone (see .Specifying the ULA Login Status and
Ring Policy of ULA Group Members, page 6-70).
A ULA group consists of the group owner and at least one additional member. To
delete a ULA group, remove the owner or all its members from the group, as described
Defining a User
3 Click Configure. (Alternatively, if the ULA group has already been defined,
you can click the first Member ID entry in the My Owned Group list.) The
ULA Group page is displayed.
Defining a User
The Unassigned box includes the users that are not assigned to the ULA
group.
6
A ULA group must contain the group owner and at least one regular group
member.
4 To add a user to the ULA group, select the relevant user entry in the
Unassigned box and click (the right arrow). (You can use the Search box
for this purpose.) The selected user is moved to the Assigned box.
Repeat this step to add other users to the group. You can add multiple users by
holding down the CTRL or SHIFT key while selecting them.
5 To specify a user’s ring policy for incoming calls to the ULA group owner,
select the user entry and click the relevant option to the right of the Assigned
box.
assigned.
To allow delayed ringing, the delayed ring timer must be smaller than the
system-wide predefined ring timeout and, if specified in the incoming call
routing’s Ring on rule, the No Answer timeout (see Incoming Call Routing
Sub-profiles, page 5-31).
8 Select the Ignore incoming routing rules of ULA members (excluding the
ULA owner) check box if you want ULA group members to receive FlexiCall
ULA members. Calls received directly to this device are not affected by this
parameter.
9 Click OK to return to the ULA tab (see Figure 6-26 on page 6-65). The
members of the user’s ULA group are listed in the My Owned Group box.
The first entry in the list is the ULA group owner (that is, the current user).
10 At the bottom of the User page, click Save.
Defining a User
6
Specifying the ULA Login Status and Ring Policy of ULA Group Members
On a user’s ULA tab (see Figure 6-26 on page 6-65), you can specify the ULA login
status and ring policy for the following group members:
The user as ULA group owner—represented in the My Owned Group list by
the first entry
Other members belonging to the user’s ULA group—represented in the My
Owned Group list by the subsequent entries
The user as a member of a ULA group belonging to another user—represented
in the Membership in Groups list by the entry with the relevant Group Owner
relevant list entry. (For an explanation of the options, see Table 6-3 on
page 6-68.)
Defining a User
6
If the user has been specified as the owner of a meet-me conference alias, the
conference access code can be modified from the relevant User page.
To learn more about meet-me conferences and how to define their owners, see Defining
Meet-Me Conference Aliases, page 12-79.
The My Conferences table lists the alias numbers and access codes of the
meet-me conference for which the user has been specified as their owner.
3 In the Access Code field of the relevant conference alias, enter or remove the
code as required. (The access code cannot be modified if a call is currently
using the conference alias.)
4 At the bottom of the User page, click Save.
Defining a User
6
You can reset any user’s password to the system's default value.
For administrators, the default password is anx; for regular users, the
default user password is automatically generated by the system, as
displayed on the System Parameters page (see Figure 14-6).
Users can modify their own passwords as described in Admin Password Policy,
page 3-10.
Defining a User
6
You can view the ACD and/or Hunt groups to which the user belongs, if any, from the
ACD & Hunt tab.
To learn more about the ACD feature and how to define ACD groups, see Defining ACD
Groups, page 12-5; To learn more about the Hunt feature and how to define Hunt
groups, see Defining Hunt Groups, page 12-45.
The Permissions tab allows you to define permissions for the following features:
Silent Monitor—who the user is authorized to monitor (and the users that can
monitor the user).
Break-in / Break-out—who the user is authorized to break-in to (and the
users that can break-in to the user). Who the user can perform Break-out on
(and the users who can perform Break-out on the user).
Call Pickup—who the user is authorized to perform call pickup for (and the
users that can perform call pickup on the user).
1 On the User List page (see Figure 6-1), click the Login Name of the user. The
relevant User page is displayed (see Figure 6-3).
2 Click the Permissions tab.
6
The Unassigned boxes include the users and groups that cannot perform the
corresponding call intrusion action.
Below the boxes, you can use the (right arrow) to display the next items
Defining a User
or the Search box to search for and display specific items in the list.
The Assigned boxes display the current users and groups on which the user
can perform the corresponding call intrusion action.
6
3 To add a user or group, select the relevant entry in the Unassigned box and
click (the right arrow). (You can use the Search box for this purpose.) The
selected user or group is moved to the Assigned box.
Repeat this step to add other users or groups. You can add multiple users or
groups by holding down the CTRL or SHIFT key while selecting them.
4 Select the Allow silent monitor on trunk to trunk calls check box to allow
the user to perform Silent Monitoring on trunk to trunk calls (transit calls).
5 At the bottom of the User page, click Save.
This area is disabled for users whose Feature configuration profile setting
does not allow for directed call pickup (see Pickup, page 5-19).
The Unassigned box includes the users and groups the user cannot perform
direct call pickup on.
Below the box, you can use the (right arrow) to display the next items or
the Search box to search for and display specific items in the list.
The Assigned box displays the current users and groups the user can perform
call pickup on.
The adjacent box displays the users and groups that can perform call pickup
on this user.
5 To add a user or group, select the relevant entry in the Unassigned box and
click (the right arrow). (You can use the Search box for this purpose.) The
selected user or group is moved to the Assigned box.
Repeat this step to add other users or groups. You can add multiple users or
groups by holding down the CTRL or SHIFT key while selecting them.
6 At the bottom of the User page, click Save. Defining a User
6
The Aeonix Web Portal supports batch import and export of users from a CSV
(comma-separated) file.
Prior to the import, specify the fields to be imported, the order in which they are
arranged in the file, and ensure that the CSV file is in UTF-8 encoding format.
If a user cannot be created, a record including the reason of the failure is written to an
error file. This error file is located under the same directory as the import file and has
the same name extended by ERR. For example, the error file of the import file
NewUsers.csv is called NewUsersERR.csv.
In addition, batch import of users from a CSV file for PnP purposes is supported. The
Phone provisioning MAC parameter can accept the value 'PNP' as the phone's MAC
address and the Phone provisioning model parameter as the PnP phone model,
allowing the imported user to be associated with the new phone when Auto Phone &
User PnP mode is used. (see Configuring PnP Provisioning, page 12-126).
In this mode, when a Tadiran SIP phone makes requests for plug and play, Aeonix
attempts to link the newly created phone to the user in the following manner:
First priority is given to imported users having the same phone models. Aeonix
looks up the first available user that has the PnP flag with the user’s PnP
model being identical to the phone’s model, and links the phone to that user.
Second priority is given to imported users with no associated phone models. Importing / Exporting Users
Aeonix looks up the first available user with the PnP flag with no phone model
definition and links the phone to that user.
Upon successful linkage, the phone ID gets the value of the alias, and Aeonix
associates the user as the phone’s Default User.
6
The following table describes the fields that can be imported if available in the CSV
file.
Display name The name of the user as viewed by other users. This field must
not exceed 15 characters.
If no display name is provided, the system uses the first name
and the last name of the user separated by a space, such as
John Smith.
Internal The alias numbers assigned to the user. Only complete aliases
aliases separated by spaces are imported.
NOTE: A user is not created if the alias number of this user cannot
be imported, for example, because it already exists in the
Aeonix system or does not comply with the relevant dial
plan patterns.
Login name Unique identifier of the user. Typically, the worker ID, name of
the worker, or some other unique number used by the Aeonix
user to log in to the Aeonix Web Portal, as well as for logging in
to other Aeonix applications, such as the Aeonix Dispatch
Importing / Exporting Users
Console.
Phone domain The domain (server) to which the phone is connected. This is the
phone ID part after the @ sign.
6
Phone The MAC address of the phone, according to which the Aeonix
provisioning server identifies the phone for provisioning purposes
MAC
Phone The model number of the Tadiran SIP phone: T19P, T21P,
provisioning T23P, T27P, T320, T322, T328, T41P, T42G, T46G, T48G,
model T49G
Phone The name of the provisioning profile associated with this phone
provisioning
profile
Phone type The type of the phone to be added (see Table 6-1 on
page 6-57).
Profile name The Profile assigned to the user. If no profile is specified for a
user, this user is assigned the default user profile.
NOTE: Should be equal to one of the user profiles already defined Importing / Exporting Users
in Aeonix. See Figure 5-34 on page 5-86.
SIP voicemail The service where a voicemail box can be assigned to the user.
User ID Unique user identifier; mandatory for the import of the user
The fields that can be imported are described in Table 6-4 on page 6-80.
Importing / Exporting Users
3 To import a field, select it in the Available Fields box and click (the right
arrow). The selected field is moved to the Import Fields box and added to the
list of fields to be included in the import procedure.
Repeat this step to add other fields.
6
4 Use (the Up and Down arrows) next to the Import Fields box to specify
the order in which the fields appear in the CSV file.
5 Click Choose File and use the displayed dialog box to locate the required CSV
file on your workstation or network.
Ensure that these fields correspond to the actual fields in the CSV file. For
example, when selecting the fields as shown in Figure 6-33, the CSV file
should appear as follows:
For example, entry one in the CSV file above corresponds to the following fields:
When importing users with multi-devices, this check box must be selected.
7 If a SIP Voicemail service has been defined in the system (see Defining
Voicemail Applications in Aeonix, page 12-140), select Create mailbox if you want
to create voicemail boxes for the imported users.
The Aeonix Web Portal supports import of LDAP (Lightweight Directory Access
Protocol) users from an Active Directory or any LDAP based directory according to
predefined LDAP connections (see Defining an LDAP Connection, page 4-55). This
capability allows for using a central LDAP based organizational directory as the
primary reference in the enterprise for user data. Any change in user data in the
directory can then be updated into the Aeonix configuration.
Prior to the import, you can specify the action or actions to perform (import new users,
update existing users, and delete users) according to basic or advanced filtering
options. In addition, you can preview and edit the changes before saving them to the
Aeonix database.
If a user cannot be created, a record including the reason of the failure is written to an
error file. This error file is located under the same directory as the import file and has
the same name extended by ERR. For example, the error file of the import file
NewUsers.csv is called NewUsersERR.csv.
Aeonix does not perform any operations that affect the LDAP values of the
Active Directory.
3 From the LDAP connection drop-down list, select the LDAP connection from
which to import users.
The search settings (Base DN, Filter, and Scope) are displayed as defined
Importing LDAP Users
for the LDAP connection (see Figure 4-25). However, you can override these
settings for specific import instances in steps 4 through 6.
4 Edit the base distinguished name in the Base DN field as required (optional).
5 In the Filter box, edit the search filters to specify which records are returned
by the LDAP Directory Server as required (optional).
6 From the Scope drop-down list, change to one of the following as required
6
(optional):
In the sub-options that are displayed you can assign default values (optional).
If you do not fill in default values and these values are not imported from
LDAP Directory, Aeonix assigns the same default values as when a new
user is manually created by an administrator of the same level.
Update existing users—to update existing users from the LDAP Directory.
Delete users—to delete LDAP users from the Aeonix database.
8 Select the Use these settings in future import check box to save these
settings for subsequent import instances (optional).
9 Click Import. The LDAP User List page is displayed (see Figure 6-38).
If the connection to the LDAP server or LDAP attribute mapping failed, one
or more fields contain incorrect values. Make the required corrections and
click Import again.
Importing LDAP Users
6
The LDAP User list is sorted by the User ID column. If the list includes more
than one page, use the page navigation bar at the bottom of the list to
navigate between the pages.
10 The LDAP User List page displays the LDAP users that are ready to be
synchronized with the LDAP Directory in the New, Updated, and Deleted
tabs.
11 In each tab, select the users (or click Select all and Clear all for multiple
selections) to synchronize with the LDAP Directory.
Importing LDAP Users
The Updated tab displays the values of both the LDAP Directory (first row)
and the current Aeonix (second row) values. You can edit the values you
want to be saved in the Aeonix database.
13 Click Yes to synchronize the Aeonix user list with the Active Directory. The
imported users are displayed on the User List page (see Figure 6-1).
In the event of an error message, click Download File to view details in the
newly created LDAPErrorLogFile.cvs file.
Aeonix supports forming groups of specific users. Groups are used for reflecting
organization departments and hierarchies, as well as for applying group-related
services.
User groups and pickup groups are defined and managed in the same way from their
respective list pages (see Group List and Pickup Group List Pages, page 6-93). Managing
groups is described in Defining a Group, page 6-96.
You can add available users and groups as members of a user group, and build a
hierarchy of groups and sub-groups to reflect the organization structure. User groups
also allow you to conveniently include multiple users in another group, instead of
assigning each user separately.
In a pickup group, a call to a member of this group can be retrieved by any member
dialing the group alert call pickup code (see Group Call Pickup, page 2-13).
The group lists are sorted by the ID column. If the list includes more than one
page, use the page navigation bar at the bottom of the list to navigate
between the pages.
You can create a group and assign individual users or groups as its members.
2 In the Group ID text box, enter a unique identifier for the group.
3 In the Description text box, enter a short description of the group (optional).
4 To view the members of a group, select the group from the list and click View
Associating Users with Groups
Group. A tree of the users and sub-groups belonging to the group is displayed
at the bottom of the page.
Below the box, you can use the (right arrow) to display the next items or
the Search box to search for and display specific items in the list.
5 To add a user or group to this group, select it and click (the right arrow).
(You can use the Search box for this purpose.) The selected item is moved to
6
the Assigned box and added to the list of items to be included in the group.
To remove an item from the Assigned box, select it and click (the left
arrow). You can add multiple users and groups by holding down the CTRL or
SHIFT key while selecting them.
6 Click Save. The new group is added and is included in the list of the Group
List page.
Sea Attendant
Sea Navigator
FLIPS
TAPI Service Provider & Dialit
Aenix Maintenance Tool
Users can download and install the clients by themselves from the Aeonix
Web Portal for users. For details, refer to the Aeonix Configuration Guide
for End Users (see Related Documentation, page 1-17).
6
1 On the user’s workstation, log in to the Aeonix Web Portal (see Logging in to
Aeonix, page 3-8).
2 On the navigation pane, click Settings. The pane displays the Settings menus.
3 Select the Downloads menu, and then click Navigator / Attendant Client.
The Navigator / Attendant Console Client Download page is displayed.
To learn how to install, configure, upgrade, and uninstall the client, refer to
the Sea Navigator or Sea Attendant Quick Start. To learn how to use the Sea
Navigator and Sea Attendant, refer to the corresponding online help.
Aeonix Clients for Users
6
To download the Aeonix Contact Center Visor / Agent client onto a user’s
workstation:
1 On the user’s workstation, log in to the Aeonix Web Portal (see Logging in to
Aeonix, page 3-8).
2 On the navigation pane, click Settings. The pane displays the Settings menus.
3 Select the Downloads menu, and then click Aeonix Contact Center. The
Aeonix Contact Center Download page is displayed.
You can run the .msi installer for Aeonix Contact Center Agent for a first-time
installation on the client PC by launching it with a Double-Click. For an
upgrade installation over an existing installation, the .msi installer must be
copied to the PC hard disk. Then the following command must be from a
Windows Command Shell:
Aeonix Clients for Users
msiexec /i Aeonix_Contact_Center_Agent_3.2.111.msi
REINSTALLMODE=vomus REINSTALL=all
The .msi installer can also be used for group installations under policy by the
Aeonix Administrator / IT team.
6
1 On the user’s workstation, log in to the Aeonix Web Portal (see Logging in to
Aeonix, page 3-8).
2 On the navigation pane, click Settings. The pane displays the Settings menus.
3 Select the Downloads menu, and then click FlexIP Softphone Client. The
FlexIP Softphone Client Download page is displayed.
To learn how to install, configure, and use the FlexIP Softphone client, refer
to the FlexIP Softphone User Guide and online help.
Aeonix Clients for Users
6
To download the TAPI Service Provider and DialIt application onto a user’s
workstation:
1 On the user’s workstation, log in to the Aeonix Web Portal (see Logging in to
Aeonix, page 3-8).
2 On the navigation pane, click Settings. The pane displays the Settings menus.
3 Select the Downloads menu, and then click TSP and DialIt Application. The
TAPI Service Provider (TSP) Download page is displayed.
To learn how to install, configure, and use the TAPI Service Provider and
DialIt application, refer to the TAPI Service Provider Quick Start.
To learn how to run and use the Aeonix Maintenance Tool, refer to the
Aeonix Maintenance Tool Reference Manual.
Aeonix Clients for Users
6
1 On the user’s workstation, log in to the Aeonix Web Portal (see Logging in to
Aeonix, page 3-8).
2 On the navigation pane, click Settings. The pane displays the Settings menus.
3 Select the Downloads menu, and then click Aeonix Touch. The Aeonix Touch
Download page is displayed.
To learn how to use Aeonix Touch, refer to the Aeonix Touch Reference
Manual.
Managing Phones
7.1 Phones..................................................................................7-1
This section describes how to define a phone device in Aeonix, including in the
Wave Gateway and TGW units. To learn about how to program phone buttons,
see Phone Profiles, page 5-54.
Phones are physical devices on which users place and receive calls. A phone can be a
telephone, a handset, or a workstation with virtual telephone software running. It is
necessary to define telephones in Aeonix before any calls can be routed to them.
It is important to remember that for the purposes of a VoIP system, the physical
location of the phone is not relevant. That is, if an IP phone is moved from one office
to another, the system recognizes the phone and not the extension number of the local
outlet as with a traditional phone. This means that when a user moves to another office,
the user simply has to take the telephone to the new office, and the call is automatically
routed to this phone.
Furthermore, if Support guest login is set, a user can log into any phone and the relevant
definitions for this user profile will apply to the phone. A user can even have more than
one set of definitions for the phone, for example, to set different speed dial buttons for
home and office. Logging in to and making use of a phone is described in the User
Guide of the relevant phone (see Related Documentation, page 1-17).
With SIP-based virtual software telephone applications (softphones), the actual
workstation running the SIP softphone is not the phone device– the softphone
application is. Therefore, the phone is set at any workstation where the user installs
and logs onto the SIP softphone. Moving the physical workstation has no effect on this
definition.
Users can have multiple concurrently active telephony devices. When setting a user
feature or changing user presence the change affects all the user's devices.
Presence – For example, when the user is in a call, all of the user’s devices
will reject new calls (unless Call Waiting is enabled by the user).
Phones
Incoming Calls – All of the user’s phones will simultaneously ring (default
ring policy).
7
MWI – the message waiting indicator lamp (if exists) on all of the user’s
phones will light if a message is left for the user.
DND – When Do Not Disturb is set on any of the user’s phones, all of them
will ignore regular incoming calls, as well as voice page and zone page calls.
FWD – All of the user’s phones will forward calls in the same manner
(according to the user’s incoming call routing rules).
The Phone List page displays the phones configured in the system. It also contains an
area in which search criteria can be defined to find and display specific phones.
The phones listed with a green circle icon are currently registered in Aeonix. Click
Refresh to manually update the list.
Phones
7
Status icon A circle icon to the left of each phone indicates the following:
(circle) Green - that the phone is registered in the system
Red - that the phone is not registered
Green/Red -
Changes made in Aeonix are currently not synchronized with
the phone. Once provisioning is executed and, as a result,
synchronization between Aeonix and the phone is restored, the
icon will revert to green.
NOTE: View the icon’s tooltip for more information (for example,
the tooltip for the red ‘do not enter’ icon indicates the time
remaining before the specified server stops blocking the
registration.
Description Optional text description of the phone. This can include the name
of the user, the serial number, or another identifying label on the
physical phone.
Phones
Default User The default user defined for this phone (if any). The default user
is automatically logged into the system if the phone is registered.
Click the user entity to view or modify its details (see Defining a
User, page 6-9).
Model The model of the phone (see Table 7-4 on page 7-10 for a list of
possible phone types)
Registered on The Aeonix server on which the phone device is registered. This
information is of importance in clusters of multiple servers.
IP Address The IP address (IPv4 or IVp6) assigned to the phone (if any).
This address is defined on the phone and retrieved from the
Aeonix system when the phone is registered.
Go back
Access
online help
Default user Phones that contain the specified search value in their
Default user field
Type Phones that match the specified phone type in their Type
field. Select All to search for all phone types.
This section describes the activities involved in managing phones in the Aeonix Web
Portal:
Defining a Phone in Aeonix, page 7-10
Defining the Default User of a Phone, page 7-24
To manage trunks and gateways, use the procedure described in Chapter 8, Managing
Trunks.
Each phone must be defined in the Web Portal to operate in the Aeonix system.
The only phone type that is supported in A4C is “SIP Terminal”. All other
phone types are not supported.
A user’s phones can also be directly defined through the user’s page, as
described in Managing a User’s Phones, page 6-56.
To update an existing phone, click Phone List and select the relevant ID in
the list.
To create a copy of an existing phone, click Phone List. On the Phone List
page (see Figure 7-1), click (the Clone icon) to the right of the
relevant phone.
When you clone a phone, all parameter values are copied to the new phone
except for the Phone ID and the Closed User Group.
The Phone page displays the phone parameters as in the following figure for a
new Tadiran SIP phone.
2 If this is a new phone, define the Phone ID fields as described in Table 7-5:
In the first field (before the @ sign), enter the phone name.
7
3 On the General tab, define the parameters described in Table 7-6 for any
phone type.
Closed User Group The Closed User Group to which the phone belongs
Configuring Phones in Aeonix
phones.
Default user The user associated by default with the phone. (For
more information, see Defining the Default User of a
Phone, page 7-24).
Ring control (Default: Always - the phone will ring on all incoming calls
Always) Internal call - the phone will only ring on
incoming internal calls
External call - the phone will only ring on
incoming external calls
Never - the phone will not ring on any incoming
call
Support guest login Whether users can log in to this phone even if they
(Default: Yes) are not its default user (see above).
Force logout Select to log out the phone when guest login is
being used.
Configuring Phones in Aeonix
All other phone parameters are derived from the SIP Terminal template (see
Chapter 7, Phone Templates).
4 Click the Provisioning tab (applicable for Tadiran SIP phones and P-Series
phones), and then select the Device model of the phone, such as T328.
Select Auto-Detect if you want the system to automatically detect the phone
model.
7
5 In the MAC address field, start filling in the MAC address to display a list of
all the existing MAC addresses containing the entered value, and then select
the required value.
6 Select the name of the Provisioning name associated with this phone.
7 View or define the parameters described in Table 7-7.
7
SIP server address 1 The IP address (IPv4 or IPv6) or host name of the
first Aeonix server on which the provisioning service
is hosted and on which the phone registers
Port The SIP port of the first Aeonix server on which the
phones are registered on (by default 5060, or, when
transport protocol TLS is used, secured port 5061)
SIP server address 2 The IP address (IPv4 or IPv6) or host name of the
second Aeonix server on which the provisioning
service is hosted and on which the phone registers
NTP server address 1 The name or IP address (IPv4 or IPv6) of the first
NTP server address according to which time is set
for the phone
Dial now rules The dial plan from which to apply the phone’s dial
now rules to the provisioning profile (see Dial Plans,
page 4-19).
High availability retry count The number of times the phone attempts to connect
to the server before the phone with fail over to the
next Aeonix server in the cluster.
VLAN WAN port active Whether VLAN for the Internet port via the users’
phone interface is set.
VLAN PC port active Whether the VLAN for the PC port via the users’
phone is set.
VLAN DHCP active Whether the VLAN DHCP discovery via the phone’s
web user interface is set
Number of line keys The maximum line accounts defined for this phone
Calls per line The number of active or held calls on the line until a
busy signal is returned to a caller.
8 Expand the Codecs area to view the codecs currently being used by the phone.
9 To associate an available codec, select it from the Unused box, and click
(the right arrow). The selected item is moved to the In use box.
10 The following table describes additional provisioning parameters that are
defined from other pages of the Aeonix Admin:
7
Automatic The Tadiran SIP and P-Series Firmware files that are
firmware upgrade currently used in Aeonix.
Button label The Local display text displayed on the user’s phone (see
Table 5-12).
ESF protocol The protocol by which the ESF server and phones
communicate with each other - "HTTPS" or "HTTP" (see
Table 5-6).
Interdigit timeout For Tadiran SIP phones, the Interdigit timeout after which
dialed digits are sent when attempting to establish an
internal call (see Table 5-5).
NOTE: Digits can still be sent by pressing the pound (#) sign.
Offset time from The Time zone according to the Location of the phone (see
GMT Table 4-7 and Table 7-6).
Phone web The Phone password used for allowing enhanced SIP
Features functionally and for accessing the phone’s web
7
interface
password portal (see Table 5-6).
Provisioning The interval check period used for new phone configurations
polling interval and firmware updates (see Figure 12-67).
SIP account The Device Name of the SIP phone (see Table 7-5).
authorization
name
SIP account The SIP password used during the phone registration
authorization process (see Table 7-6).
password
Time DST The system’s Daylight Savings Time based on the phone
location time zone.
Time format The Time format (12 or 24 hours) in which the time is
displayed for the user (see Table 5-4).
User display name The Display name of the logged in user as shown on the
user’s phone (see Table 6-5).
User DSS keys The Programmable buttons assigned to the logged in user
(see Table 5-13).
Voicemail number The Voice mail service Alias associated with the user’s
voicemail (see Figure 6-8).
Session-Expires The Aeonix proposal time for the Session-Expires Time (in
Send 181 - when Determines whether or not SIP message 181 is sent when a
call is forwarded call is forwarded. Select Yes to send SIP message 181.
Select No not to send SIP message 181.
Supported transfer Select Refer if the REFER command can be used for call
method transfer. Select Re-Invite if the RE-INVITE command can be
used for call transfer.
Ringback tone Whether the ringback tone is provided by the local phone or
by Aeonix. Select from the following:
Provided by local phone (180) - local ringback (default
option)
Provided by Aeonix (183+SDP) - Aeonix ringback
Configuring Phones in Aeonix
Waiting tone Whether the waiting tone is provided by the local phone or
by Aeonix. Select from the following:
Provided by local phone (182) - local ringback
Provided by Aeonix (183+SDP) - Aeonix ringback
(default option)
7
Call progress tone Whether the call progress tone is provided by the local
phone or by the destination phone, or the call is considered
as being answered (for billing purposes). Select from the
following:
Provided by remote side (183+SDP) - by remote side
(default option)
Provided by local phone (180) - by local phone
Answer the call (200+SDP) - call is answered
Alarm agent Reflects the current agent mode of the phone (Yes indicates
that the DTMF transport method is set to SIP INFO and No
indicates that it is set to RFC 2833). You can change this
setting, thereby changing the setting in the phone’s
corresponding “DTMF Type” entry (for phones that support
provisioning) accordingly. This synchronization allows you to
change the agent mode for phones that are either not ESF
enabled or do not have an Alarm agent button defined.
A phone is usually assigned a default user. This can be done when adding the phone
to the system or while updating an already existing phone.
When a phone is connected, it automatically uses the default user’s relevant phone
profile settings (if existing), which include features such as speed dial buttons. For
details about setting a profile, see Configuring a User’s Phone Profiles, page 6-49.
A phone template defines the initial default values for a phone of a specific type. When
a phone is added to the system, it is automatically assigned the appropriate default
values. Unlike profiles (see Chapter 5, Profiles), phone template values are only
applied to new phones. Changes in a template are not reflected in phones that have
already been defined in Aeonix.
For each phone type, the system includes a template. You cannot add or remove
templates, but you can modify the template values.
Managing Trunks
Trunks are the channels through which Aeonix trunk groups route calls. A trunk can
be a SIP trunk, SIP gateway trunk, or Coral IPnet trunk. It is necessary to define trunks
in Aeonix before any calls can be routed through them.
Trunks must be assigned to trunk groups to operate in the system. A trunk group can
be a SIP gateway trunk or Wave Gateway telephony system. To learn more about trunk
groups, see Chapter 9, Managing Trunk Groups.
The trunks available in the system are listed on the Trunk List Page.
Changing any aspect or parameter of trunks which are present in the Trunk
List page is not allowed in A4C.
Configuring the trunks is described in Configuring Trunks in Aeonix, page 8-9; defining
default settings for new trunks is described in Trunk Templates, page 8-27.
SIP Trunk and Gateway For a SIP trunk (such as Aeonix Contact Center)
and SIP gateway (such as: Tadiran TGW,
AudioCodes M/MP) or for a SIP-based
Coral Teleport FXO gateway trunk
Wave Gateway trunk For an E&M (ear and mouth) trunk connected
(E&M) through a Wave Gateway
Wave Gateway trunk (PRI For a PRI ISDN trunk connected through a
8
Wave Gateway trunk (PRI For a PRI QSIG trunk connected through a
QSIG) Wave Gateway
SIP trunk / gateway The maximum number of concurrent SIP trunk or gateway
licenses calls that can be transmitted via trunks or gateways
Used on reserved The total number of licenses being used by all reserved
trunks trunks
The trunks listed with a green circle icon are currently registered in Aeonix. Click
Refresh to manually update the list.
For Wave Gateway trunks, a card’s trunk list includes only the trunks
belonging to this card (see Chapter 10, Managing VOIP Gateways).
The list displays up to 10 rows by default. To change the number of rows
displayed, enter the number in the Rows per page field and click Set.
The trunk list is sorted by the ID column. If the list includes more than one
page, use the page navigation bar (see Table 6-1) at the bottom of the list to
navigate between the pages.
Trunks
8
Status icon A circle icon to the left of each Wave Gateway trunk indicates the
(circle) following:
Green - the trunk is registered in the system and logged in to
a trunk group.
Red - the trunk is not registered in the system or not logged in
to a trunk group.
Blue - N/A
Red/Green - N/A
A circle icon to the left of each SIP and IPnet Gateway indicates
the following:
Green - the trunk is registered in the system and logged in to
a trunk group.
Red - the trunk is not registered in the system.
Blue - the trunk registration status is unknown.
Red/Green - the trunk is registered in the system but not
logged in to a trunk group.
Description Optional text description of the trunk. This can include the name
of the trunk, the serial number, or another identifying label.
Default Trunk The ID of the default trunk group defined for this trunk (if any).
Group The default trunk group is automatically logged into the system if
the trunk is registered.
Click the trunk group entity to view or modify its details
(see Defining a Trunk Group, page 9-5).
Type The type of the trunk (see Table 8-5 on page 8-10 for a list of
possible trunk types)
Registered on The Aeonix server on which the trunk device is registered. This
information is of importance in clusters of multiple servers.
IP Address The IP address and port assigned to the trunk. This address is
defined on the trunk and retrieved from the Aeonix system when
the trunk is registered.
Trunks
Reserved The total number of licenses that are reserved for the trunk.
Licenses
8
Max The maximum number of concurrent calls that can be made via
Concurrent the trunk.
Calls
Trunks
8
Update trunk In the list, click the trunk ID to update the details of
—
this trunk.
Delete trunk Select the check box next to the trunk or trunks to
be deleted and then click Delete (see Deleting Entities,
page 3-66).
Refresh Click Refresh to update the list to the current status.
display
Trunks
8
This section describes the activities involved in managing trunks in the system:
Defining a Trunk in Aeonix, page 8-10
Defining the Default Trunk Group of a Trunk, page 8-25
To manage phones, use the procedure described in Chapter 7, Managing Phones.
Each trunk must be defined in the Aeonix Web Portal to operate in the Aeonix system.
SIP Trunk / For a SIP Internet trunk or SIP gateway (such as: Tadiran
Gateway TGW, AudioCodes M/MP) or for a SIP-based
Coral Teleport FXO gateway trunk
Wave Gateway For an E&M (ear and mouth) trunk connected through a
trunk (E&M) Wave Gateway
Wave Gateway For a PRI ISDN trunk connected through a Wave Gateway
trunk (PRI ISDN)
Wave Gateway For a PRI QSIG trunk connected through a Wave Gateway
trunk (PRI QSIG)
NOTE: For a description of the Wave Gateway and its configuration see Chapter 10,
Managing VOIP Gateways.
Configuring Trunks in Aeonix
To update an existing trunk, click Trunk List and select the relevant ID in
the list.
To create a copy of an existing trunk, click Trunk List. On the Trunk List
page (see Figure 8-1), click (the Clone icon) to the right of the
relevant trunk.
8
The Trunk page displays the trunk parameters as in the following figure for a
new Coral IPnet trunk.
2 If this is a new trunk, define the Trunk ID fields as described in the following
table:
In the first field (before the @ sign), enter the trunk name.
In the second field (after the @ sign), enter the name of the domain to
which the trunk is connected. The default domain name of Aeonix is
aeonix.com, but it can be changed as long as no phones and trunks have
been defined (see System Parameters, page 14-27).
SIP trunks and The SIP User Name aeonix.com (or Aeonix
gateways domain)
The following tables list the various parameters that are defined for a trunk:
All other trunk parameters are derived from the SIP Trunk template (see
Chapter 8, Trunk Templates).
Table 8-7 describes the parameters that are defined on the General tab for
trunks of any type.
Table 8-8 describes the parameters on the Configuration tab of Coral IPnet
trunks.
Table 8-9 describes configuration and SIP session related parameters for SIP
trunks and gateways. These parameters are available on the Configuration tab
of SIP trunks and gateways, and are applicable to all registration modes.
Table 8-10 describes SIP registration parameters. These parameters are
available on the Configuration tab for SIP trunks and gateways that are
registered to external systems.
Table 8-11 describes SIP registration parameters. These parameters are
available on the Configuration tab for SIP trunks and gateways that are
registered to Aeonix systems.
Table 8-12 describes SIP registration parameters. These parameters are
available on the Configuration tab for SIP trunks and gateways that are not
registered to any server.
Table 8-13 describes the in-line call destination parameters on the
Configuration tab of Wave Gateway trunks.
Table 8-14 describes SIP protocol settings. These parameters are available on
the Protocol Settings tab of SIP trunks and gateways.
Table 8-15 describes Provisioning settings. These parameters are available on
Closed User Group The Closed User Group to which the trunk belongs
(Default: Root) (see Closed User Groups (CUG), page 4-29).
Default Trunk Group The trunk group associated by default with the trunk. The
location and profile settings of this trunk group are
automatically applied to the trunk when it is connected.
(For more information, see Defining the Default Trunk Group of a
Trunk, page 8-25.)
Configuring Trunks in Aeonix
8
PCM encoding Select the required encoding method used for digitalizing
analog signals.
Make sure the same option is selected on the side of the
Coral device. For details, refer to the Coral documentation
(see Related Documentation, page 1-17).
NOTE: This field must also be set for Wave Gateway trunks.
UGW Addresses To define the Coral device through which Aeonix should
route outgoing calls, click Add and enter the IP address or
Host name of the device, as well as its Port. The device is
added to the box.
If the network contains several Coral systems, you can add
more than one device for redundancy. To update or delete
a previously entered Coral definition, select it in the list box
and click Update or Delete as required.
Reserved licenses The number of licenses that can be reserved for this trunk or
gateway.
Outbound Proxy Select the Outbound proxy check box if an outbound proxy
is required by the ITSP side, and specify the following fields:
Host—the IP address or name of the outbound proxy
(IPv4 or IPv6)
Port—the SIP port of the outbound proxy (for secured
communications, use port 5061)
Protocol—the protocol used to communicate with the
outbound proxy (for secured communications, use TLS)
SBC SIP Address Allows SIP trunks that cross a NAT server or firewall to
register and make calls with a SIP service provider when
using an SBC in Aeonix.
Select the SBC SIP Address check box if an SBC is used
on the Aeonix side, and specify the following fields:
Host—the IP address of the SBC (IPv4 or IPv6)
Port—the SIP port of the SBC (for secured
communications, use port 5061)
Protocol—the protocol used to communicate with the
SBC (for secured communications, use TLS)
NAT External When the SIP service provider can cross the NAT server
Address in without need for an SBC, the external address of the NAT
‘contact’ and ‘via’ will be used in the ‘contacts’ and via’ parameters of INVITE
and REGISTER messages:
Host—the IP address of the NAT (IPv4 or IPv6)
Configuring Trunks in Aeonix
Require session Select Yes if the proxy server of the SIP device requires
timer periodical refreshing of SIP sessions to determine whether
they are still active.
8
Session-Expires NOTE: This field is only relevant when the registration mode is
Time Aeonix registers on SIP trunk. In these cases, this
parameter is sent to the remote trunk side.
The length of the time period before which a SIP session
must be refreshed. This is the value the device proposes for
a SIP session.
The receiving party can accept the proposed value only if it
is equal or higher than the receiving party’s Minimum timer
(see below).
Enter a number between 90 and 10000. The value of this
field must not be lower than the Minimum timer.
Minimum NOTE: This field is only relevant when the registration mode is
Session-Expires SIP trunk registers on Aeonix. In these cases, if the
remote trunk side tries to register with a value that is
lower than the minimum allowed for this parameter, the
registration will be rejected.
The required minimum amount of time which must separate
one session refresh from the next.
The value of this field depends on the system configuration
and load, and must not be higher than the Session expires
field above.
Enter a number between 90 and 10000. The value of this
field must not be higher than the Session expires value.
Allow incoming Select Yes for applications (such as Aeonix Contact Center)
call deflection that connect to Aeonix as though they were trunks but that
require full phone functionality (such as deflecting incoming
calls) while connected to the system.
8
Supported transfer Select REFER if the REFER command can be used for call
method transfer. Select re-INVITE if the RE-INVITE command can
be used for call transfer.
Late media Determines whether Aeonix starts call negotiation via the
support trunk, without supplying a list of suggested media codecs,
and getting from the remote side a reply with its supported
media.(selected by default).
Persistent media Sets the RE-INVITE negotiating algorithm such that: The IP
address and Port of the RE-INVITE command is kept on the
ITSP side. If the Trunk is known to not change the CAP on
RE-INVITE, the system will take for granted that the same IP
and Port will be used, in order to save the time of
interrogating and waiting for a response from the Trunk.
Support RFC 2833 Specifies whether or not the SIP trunk supports RFC 2833.
Add contact Setting that indicates whether to add the contact user as a
user as prefix prefix to the dial number of an outgoing call. Select Yes or No
as required.
Account name The name of the Aeonix system as defined in the IP trunk /
gateway. It is the user part of the contact URI (Uniform
Resource Identifier) and identifies the system at the SIP trunk
/ gateway service provider.
NOTE: In the contact URI, the user part is the number or string
that stands before the @ sign.
Add account Setting that indicates whether to add the account name (see
name as prefix above) as a prefix to the dial number of an outgoing call.
Select Yes or No as required.
Trunk user The user name required for accessing the trunk / gateway.
name
Trunk password The password required for accessing the trunk / gateway.
Registration If the registration process fails, the time period after which
backoff timer Aeonix retries to register to the registrar.
Configuring Trunks in Aeonix
8
Proxy SIP To define the SIP server details in IPv4 or IPv6 (IP address or
Address hostname, protocol, and port):
If several addresses are available, you can add more than one
address for redundancy. The system uses the first available
address, according to the order in which the addresses are
listed.
To update or delete a previously entered address, select it in
the list box and click Update or Delete as required.
Add contact Setting that indicates whether to add the contact user as a
user as prefix prefix to the dial number of an outgoing call. Select Yes or No
as required.
Trunk user The user name required for accessing the trunk.
name
Add contact Setting that indicates whether to add the contact user as a
user as prefix prefix to the dial number of an outgoing call. Select Yes or No
as required.
Trunk user The user name required for accessing the trunk.
name
Invite timeout If several proxy SIP addresses are defined for the SIP server
(Default: 6 (see below), the number of seconds the system waits until it
seconds) assumes the proxy is malfunctioning and attempts to send
requests to the next address in the list.
Configuring Trunks in Aeonix
8
Proxy SIP To define the SIP server details (IP address or hostname,
Address protocol, and port):
1 Click Add.
2 In the text box that is displayed, enter the address of the
SIP server.
3 From the Protocol drop-down list, select the transport layer
used for connecting to this trunk. For secured
communications, select TLS. In this case, if the user that
calls the trunk or receives a call from this trunk is defined
with Best Effort security level, Aeonix will establish an
encrypted SRTP session.
Direct in-line The user or external number to which incoming calls are Configuring Trunks in Aeonix
destination directed.
To direct the call to an internal user, select User from the
drop-down list and choose the user.
To direct the call to an external number, select Number from
the drop-down list and enter the number.
NOTE: For Wave Gateway trunks, this field is only enabled if the
field Direct in-line calls above is set to Yes.
8
Waiting Whether the waiting tone is provided locally or by the remote side
tone or by Aeonix. Select from the following:
indication Ringback (180)
Local waiting tone (182)
Provided by Aeonix (183+SDP)—default option
Call The method by which progress tones from remote trunks and
progress gateways are handled when a call from a SIP is outgoing to another
tone trunk and the trunk requests to open the media before answering.
Select from the following:
Provide ringback locally by remote side (180)—no SDP
Provided by destination transparently (183+SDP)—default
option
Answer the call (200+SDP)
to
From Determines the format of the From header for outgoing calls
header according to the requirements of the SIP service provider.
field
Device From the drop-down list, select the Tadiran TGW gateway model to
model which this SIP trunk is connected.
MAC From the drop-down list, select the MAC address of the Tadiran
address TGW gateway to which this SIP trunk is connected.
Physical From the drop-down list, select the physical line on the TGW
line gateway to which the trunk is connected.
A trunk is usually assigned a default trunk group. This can be done when adding the
trunk to the system or while updating an already existing trunk.
A trunk template defines the initial default values for a trunk of a specific type. When
a trunk is added to the system, it is automatically assigned the appropriate default
values.
For each trunk type, the system includes a template. You cannot add or remove
templates, but you can modify the template values.
4 Fill in the fields as described in Trunk Parameters, page 8-13. (The fields Closed
User Group and Default trunk group are not available for trunk templates.)
Trunk Templates
An Aeonix trunk group is a logical grouping of trunks connected to the Aeonix system
that serve a common purpose. A trunk group usually has one or more unique alias
numbers defined (see Chapter 11, Managing Aliases) and is assigned to one or more
trunks (see Chapter 8, Managing Trunks). Typical examples of trunk groups include a
group of trunks connecting Aeonix to the PSTN, or trunks connecting a Coral IPx to
Aeonix.
Aeonix trunk groups are defined in a very similar way as Aeonix users
(see Chapter 6, Managing Users).
The trunk groups available in the system are listed on the Trunk Group List Page. For
trunk group configuration details, see Defining a Trunk Group, page 9-5.
Trunk Groups
9
The Trunk Group List page displays the existing trunk groups in the system.
The trunk groups listed with a green circle icon are currently registered in the system
through associated trunks. Click Refresh to manually update the list.
The trunk group list is sorted by the Trunk Group ID column. If the list
includes more than one page, use the page navigation bar (see Table 6-1) at
the bottom of the list to navigate between the pages.
Status icon A circle icon to the left of each trunk group indicates the
(circle) following:
Green - at least one trunk related to the trunk group is
registered in Aeonix.
Red - the related trunks are not registered.
Trunk Group Unique identifier of the trunk group. Typically, a name indicating
ID the purpose of the gateway or IP trunk is used.
Display Name The name of the trunk group as viewed by Aeonix users
Update trunk In the list, click the trunk group ID to update the
—
group details of this trunk group.
Delete trunk Select the check box next to the trunk group or
group groups to be deleted and then click Delete
(see Deleting Entities, page 3-66).
A new trunk group that is connected to the network must be assigned an endpoint
(IP trunk or gateway) and an alias (extension number or numbers). The following
procedure describes how to create a new trunk group with new equipment and an alias.
Prior to adding trunk groups, make sure Aeonix global settings and trunk
group profiles are properly defined. See Chapter 4, Global Settings and
Defining a Trunk Group Profile, page 5-88 for details.
ARS Table Name (on the Incoming Default outgoing routing table
Routing tab)
The remaining fields and tabs are not cloned. For example, the Members
tab fields are not cloned.
3 Fill in the fields to define the general and identity settings of the trunk group
(see Defining Trunk Group Settings, page 9-9).
4 Add an alias (see Assigning Aliases to Trunk Groups, page 9-10).
5 Optionally override the trunk group profile values (see Overriding Trunk Group
Profiles, page 9-10).
6 Set up rules for incoming and outgoing call routing (see Defining Incoming and Defining a Trunk Group
Outgoing Call Routing for Trunk Groups, page 9-11).
7 Add a trunk or trunks to the trunk group (see Defining the Trunk Members of a
Trunk Group, page 9-23).
8 Optionally reserve the trunk group for emergency purposes (see Reserving a
Trunk Group for Emergency Calls, page 9-24).
9
9
Alternatively, if you want to save and clone the current trunk group, click
at the bottom of the page; a new page is opened for
creating a cloned entity, where an indexing suffix is automatically added to
the entity’s ID. For example, if the original Trunk Group ID is Loopback, the
cloned ID will be Loopback_1 (as described above).
Defining a Trunk Group
9
General trunk group settings are defined in the upper part of the Trunk Group page;
trunk group identity parameters are defined under the Identity & Aliases tab. The
following table describes these parameters.
NOTE: This field must only be defined for new trunk groups.
Closed User Group The Closed User Group the trunk group belongs to
(Default: Root) (see Closed User Groups (CUG), page 4-29).
Each trunk group defined must have at least one alias number assigned to operate in
the system.
Aliases are assigned to trunk groups exactly as they are assigned to users (see Assigning
Aliases to Users, page 6-19).
An already used alias cannot be assigned to a new trunk group. View the
already assigned aliases on the Alias Lists page as described in Aliases
(“Phone Extensions”), page 11-1. In addition, make sure the new alias number
complies with the patterns of the applicable dial plan (see Dial Plans,
page 4-19).
Limitation: There is no support for presence indication for aliases that are
specified via a Prefix or a Range.
A trunk group profile consists of several assigned sub-profiles, one for each
sub-profile type. A sub-profile includes a set of content-related parameters. Whether
sub-profiles can be overridden for a specific trunk group, depends on the definition of
the profile assigned to this trunk group. Profiles and sub-profiles are described in
detail in Chapter 5, Profiles.
By default, a new trunk group is assigned the Default Secured Trunk Group profile and
the sub-profiles related to this profile. The profile assignment and sub-profile values
of a trunk group can be modified similarly as for a user (see Overriding User Profiles,
page 6-29). The only differences are:
In the General Information sub-profile, some parameters are not relevant for
Defining a Trunk Group
trunk groups.
Phone, Schedule, Incoming Call Routing, Outgoing Call Routing, or Feature
Configuration sub-profiles are not assigned to trunk groups. Incoming and
outgoing routing rules are defined separately for each trunk group as described
in Defining Incoming and Outgoing Call Routing for Trunk Groups, page 9-11.
No phone profiles are assigned to trunk groups.
9
To specify how a trunk group routes incoming and outgoing calls, you can define rules
for manipulating digits of calls that are transmitted or received through the trunk
group. A digit manipulation rule consists of one or more manipulations performed on
calling or called numbers.
Digit manipulation rules can be created for the following call numbers:
DNIS—the number dialed by the caller placing a call through the trunk group
ANI—the phone number of the caller
Manipulated DNIS—the number dialed by the caller placing a call through
the trunk group based on the result of the previous DNIS manipulation
Manipulated ANI—the phone number of the caller based on the result of the
previous ANI manipulation
Which calls are routed through the trunk group depends on the Automatic Routing
Selection (ARS) settings. To enable trunk-to-trunk routing, you can assign an ARS
table to the trunk group, which defines how incoming trunk calls are routed. ARS
tables and their configuration are described in Automatic Route Selection (ARS),
page 4-43.)
Aeonix automatically removes the External access code defined in the dial
plan (usually 9) that users dial to place external calls. Therefore, no rule
must be defined for this action. To learn about dial plans, see Dial Plans,
page 4-19.
Use the following procedures for defining routing parameters and call digit
manipulation rules:
Configuring Incoming Call Routing, page 9-12
Configuring Outgoing Call Routing, page 9-13
Defining Digit Manipulation Rules for Trunk Groups, page 9-14
Defining a Trunk Group
Deleting Digit Manipulation Rules for Trunk Groups, page 9-20
For a detailed example of defining digit manipulation rules for a trunk group,
see Example for Digit Manipulation Rules in a Trunk Group, page 9-21.
9
2 Under ARS Table Name, select an ARS table. This table defines how
incoming trunk calls are routed and is required for trunk-to-trunk grouping
scenarios.
Defining a Trunk Group
with Rules
9
3 To the right of the box, click Add to define a new rule, or select a rule from
the box and click Update to modify an existing rule.
The fields for defining the condition of the rule are displayed, as well as
previously defined actions, as in the following figure for incoming external
calls.
4 Select the relevant ANI or DNIS call type from the drop-down list:
original ANI - The ANI manipulation will be based on the original ANI.
original DNIS - The DNIS manipulation will be based on the original
DNIS.
manipulated ANI - The ANI manipulation will be based on the result of Defining a Trunk Group
the previous ANI manipulation.
If the first original ANI manipulation on 9265xxx is to remove the first three
digits (result 5xxx), and the second manipulated ANI manipulation (on the
result) is to replace the first digit with the digit ‘2’, the final result will be 2xxx.
9
5 From the adjacent drop-down list, define the condition of the rule:
To apply the rule to all numbers beginning with a specific prefix or set of
digits, select starts with and enter the prefix or the first digits of the
number (digits only).
To apply the rule to a specific number, select is and enter the number (digits
only).
To apply the rule to all calls, select is any number.
To apply the rule to a range of numbers, select is between and specify the
range.
To apply the rule to any call that has a number that is restricted or empty.
6 To cancel incoming routing rules that are to be executed after this rule, select
Stop processing other rules.
7 To define an action for the rule, click Add. The Action fields are displayed.
Defining a Trunk Group
9
You can use any combination of digits (0-9), asterisks ('*'), and pound ('#')
signs, and any combination of the following variables, which can be used a
multiple of times.
OK & Add to add this action and proceed to add more actions to the
Action box above.
11 Use (the Up and Down arrows) to set the priority order of the actions.
12 Click OK at the bottom of the page. The rule is listed in the relevant
Manipulation Rules box under the Incoming Routing or the Outgoing
Routing tab of the trunk group.
13 Use (the Up and Down arrows) to set the priority order of the rules.
14 Click Save.
The following local dial rules must be taken into account when defining digit
manipulation rules for the trunk group:
All calls in or to the 407 area include the long distance and area codes
(1-407-XXX-XXXX).
All long distance calls to the 941 area include the long distance and area codes
(1-941-XXX-XXXX).
Local calls in the 941 area use only the last seven digits (XXX-XXXX) for the
exchanges 227, 234, 238, 295, 406, 531, 803, 806, 879, and 932. All other
exchanges in the 941 area require local calls to include the long distance and
Defining a Trunk Group
area codes, just like long distance calls.
9
A trunk group cannot operate in the network without trunks. These devices must be
defined in Aeonix and associated with the trunk group. Only then the trunk group will
be able to function in the network.
2 The Trunk List box displays the ID values of the trunks belonging to the
Closed User Group of the trunk group. Defining a Trunk Group
To include a trunk in the trunk group, select it in the Trunk List box and click
(the right arrow). (You can use the Search box for this purpose.) The
selected item is moved to the Members box and added to the list of items to
be included in the trunk group.
Repeat this step to add other trunks.
9
To remove an included item from the trunk group, select it in the Members
box and click (the left arrow). You can include or exclude multiple trunks
by holding down the CTRL or SHIFT key while selecting them.
3 Click Save.
A trunk group can be dedicated to be used for emergency calls only. Calls on an
emergency trunk group bypass the ARS mechanism and are directly routed to the
closest emergency center.
The same emergency trunk group can be associated with one or multiple locations
defined in Aeonix and handle emergency calls placed from these locations. The
association can be specified either as described in the following procedure, or on the
relevant Location pages as described in Defining Emergency Call Settings, page 4-16.
2 To reserve the trunk group for emergency calls from a specific location, select
it in the Available Locations box and click (the right arrow). The selected
location is moved to the Selected Locations box and added to the list of
locations associated with the emergency trunk group.
Repeat this step to add other locations.
3 Click Save.
A Trunk Group can be dedicated to be used by users to direct outbound calls over a
specific Trunk.
Trunk Group Speed Dial allows the user to specify that a call about to be dialed is be
routed through a specific Trunk. The user first presses the Trunk Group Speed Dial
button, followed by a speed dial button or dial pad number.
A Trunk Group for Trunk Group Speed Dial must be specified as follows:
The Trunk Group contains only one member, as defined below.
The member Trunk can only be an analog trunk: Coral Wave Gateway (IPx)
4/8T or TGW FXO Gateway.
When one or more Trunk Groups for Speed Dial have been defined as described
above, they can be assigned by a user or system administrator as a Speed Dial Button
to be pressed before entering an outbound call via Speed Dial or Dial Pad. Refer to the
Section “Programmable Button Dial Functions” in Chapter 4 “Configuring Your
Telephone” in Aeonix Configuration Guide for End Users.
The Trunk Group Speed Dial button supports Busy, Idle, Alert (incoming), and Hold
presence indications.
Authorized trunk group members can monitor Aeonix users and meet-me conference
aliases.
2 Select the Allow silent monitoring check box to allow trunk group members
to perform Silent Monitoring on Aeonix users and meet-me conference aliases.
3 Click Save.
9
The Aeonix Web Portal supports the batch import and export of incoming and
outgoing trunk group rules in Aeonix from CSV (comma-separated) files. These files
can be managed externally in a spreadsheet editor.
The following table describes the Trunk Group parameters (not case sensitive) that can
be imported if available in the CSV file.
Manipulation Rule DNIS – the number dialed by the caller placing a call
Stop Process Rule TRUE – routing rules that are executed after the
specified rule are canceled
FALSE – routing rules that are executed after the
specified rule are not canceled
Change Action Add offset – adds the specified offset number to the
number
Add prefix – adds the specified prefix number to the
beginning of the number
Add suffix – appends the specified suffix number to
the number
Remove first digits – removes the specified number
of digits from the beginning of the number
Remove last digits – removes the number of digits
from the end of the number
Replace the number with – replaces the number with
the specified number (unless the number is restricted
Importing / Exporting Trunk Group Rules
or empty)
Change Action Value The value that is relevant to the specified change action
Prior to performing the import, ensure that the trunk groups that you want to import
rules for already exist in the system. In addition, ensure that the parameters being
imported and the order they are arranged correspond to the parameters described in
Figure 9-11. For example, the CSV file should be constructed as follows:
9
Trunk groups that already exist in Aeonix but are not included in the CSV will
not be affected.
3 Select Overwrite all existing rules with imported rules if you want to
replace all the existing rules with the rules you are about to import.
9
You will be informed in the event of any errors in the import; however, errors
do not stop the import process.
You can export trunk group call routing rules to a CSV (comma-separated) file.
Alternatively, to export the rules of all trunk groups, select the All groups
check box.
2 Select the required trunk group, and click Export; the .csv file is downloaded
to your computer.
Importing / Exporting Trunk Group Rules
9
10.1 Gateways............................................................................10-1
Aeonix is a pure VoIP system and requires gateways to connect to legacy equipment
to the PSTN network and to interface digital and analog devices. Depending on its
type, a gateway allows the system to integrate legacy phones, legacy trunks, or both.
This chapter describes how to configure Wave gateways through the Aeonix Web
Portal.
To learn how to configure the gateway phones and trunks in Aeonix, see:
Chapter 7, Managing Phones
Chapter 8, Managing Trunks
To learn how to configure Tadiran TGW gateways, see Configuring Tadiran TGW
Gateways, page 10-41.
Tadiran TGW gateways provide residential telephony and fax services through
broadband networks via FXS and FXO ports, enabling vast deployment in delivering
Aeonix as enterprise-based voice applications. Tadiran TGW gateways can be auto
provisioned. In addition, batch configuration allows Aeonix administrators to
automatically define Tadiran TGW gateways and their related physical and logical
entities, including users, trunk groups, phones, and trunks in one quick and easy
operation.
Gateways
For a detailed listing of all Tadiran TGW models, refer to the Aeonix Product
Description (see Related Documentation, page 1-17).
10
The Wave Gateway series includes the Coral IPx Office, 500, 800, 3000, 4000; Coral
FlexiCom 400 (with HDC controller), 5000, 6000; and Coral III-4GC models.
The Wave Gateway allows Aeonix to integrate the existing hardware of a Coral
IPx/FlexiCom systems. All features of Aeonix are applied to the trunks and phones
(stations) of the Coral IPx/FlexiCom legacy equipment. Aeonix supports multiple
Wave Gateway units.
The Coral IPx and FlexiCom systems that can be upgraded to Wave Gateway systems
are displayed in Figure 10-1.
The Wave Gateway can be installed along with Aeonix as a completely new system,
or it can be upgraded from an existing Coral IPx/FlexiCom system. To learn more
about the Wave Gateway, refer to the relevant documentation (see Related
Documentation, page 1-17).
The Wave Gateways configured via the Web Portal are listed on the VOIP Gateway List
Page. For configuration details, see Configuring Wave Gateways, page 10-7.
Gateways
10
PSTN
OK
OK
AL T
AL T
1 2 3 1 2 3
4 5 6 4 5 6
7 8 9
7 8
8 99 8 9
0
0
IPx Office IPx 500 IPx 800 IPx 3000/4000 FlexiCom 5000/6000 FlexiCom 400
Voice over
Internet Protocol
(VoIP)
Aeonix
1
2 A BC
3D EF
4 GH I
5 JK L
6 MNO
7
P QRS
8 TU V
9
W XY Z
* 0
#
-
+
IP phones
Gateways
The Coral IPx 4000 system cannot be converted to a Wave Gateway unless
it is converted to IPx 3000 first. The Coral FlexiCom 6000 system cannot be
converted to a Wave Gateway unless it is converted to FlexiCom 5000 first.
10
The VOIP Gateway List page lists the configured Tadiran TGW Gateways and Wave
Gateways and their corresponding statuses.
To open the VOIP Gateway List page:
1 On the navigation pane, click Administration. The pane displays the
Administration menus.
2 Select the VOIP Gateways menu, and then click VOIP Gateway List {1}.
The gateways listed with a green circle icon are currently registered with Aeonix.
Click Refresh to manually update the list.
The VOIP Gateway List page displays the gateway units in the system, sorted by their
ID.
If the list includes more than one page, use the page navigation bar at the bottom of
the list to navigate between the pages.
Gateways
10
Status icon A circle icon to the left of each TGW Gateway indicates the
(circle) following:
Green - at least one of the TGW Gateway phones is currently
registered on an Aeonix server; provisioning may be required
(see tooltip)
Red - none of the TGW Gateway phones is currently
registered on any Aeonix server; provisioning may be required
or provisioning has failed (see tooltip)
Green/Red - at least one of the TGW Gateway phones is
currently registered on an Aeonix server, but provisioning has
failed and is pending (see tooltip). Once provisioning is
executed and, as a result, synchronization is restored, the icon
will revert to green.
Location The location where the gateway is used (see Locations, page 4-9)
Registered on All Aeonix servers on which the gateway is registered. This field
is blank if none of the gateway’s devices (phone or trunk) is
registered.
Configure {2} In the list, click to configure this Wave Gateway (see Defining
Wave Gateway Setup/Synchronization/Alarm Parameters, page 10-10).
This section describes the activities involved in managing Wave Gateways in the
Aeonix Web Portal.
This procedure includes adding a Wave Gateway and specifying its basic (Aeonix
related) parameters.
When you clone a Wave Gateway, all parameter values are copied to the
new gateway except for the gateway ID and the Closed User Group. The IP
address of the gateway is not copied to a new gateway.
The Wave Gateway page is displayed (to define a TGW Gateway, see Defining
a Tadiran TGW Gateway, page 10-42).
Closed User Group The Closed User Group the gateway belongs to
(Default: Root) (see Closed User Groups (CUG), page 4-29).
3 Click Save. The Wave Gateway is included in the VOIP Gateway list.
Use this section to define location, setup, digital clock synchronization, and alarm
parameters for the Wave Gateway.
2 Set the Location and Setup parameters as described in the Table 10-4.
Record the IP addresses of the Coral IPx/FlexiCom MAP/PUGW/PUGW-2G x
interface elements in Table 10-5 and save for future use.
Default router The IP address of the nearest router to the Aeonix server
address
Servers A list of available Aeonix servers. Select the servers you want to
use with this Wave Gateway.
Subnet mask
Survivability Select this check box to display the Cluster mode drop-down list.
Configuring Wave Gateways
10
Cluster mode From the drop-down list, select the role of this cluster survivability
mode (Primary or Secondary). Primary designates that this is
the cluster the Wave Gateway normally connects to, while
Secondary designates the cluster to be used in the event that all
the servers in the Primary cluster are down.
Servers The list of available Aeonix servers in the primary cluster. Select
the servers you want to use with this Wave Gateway.
Other cluster The list of the Aeonix servers in the secondary cluster. Click the
servers link to quickly access the relevant Aeonix server.
5 Click the Synchronization tab. This tab is used to define the clock reference
source with which the Wave Gateway switching is synchronized.
Figure 10-5
Synchronization Tab
The Peer drop-down list is available when the 2DT card is selected from the
Shelf, Slot drop-down list. Select the peer from the corresponding
drop-down list as required. Select Both for synchronization redundancy.
Current Clock shows the current clock reference source with which the
Wave Gateway is synchronized. If no source is available, the gateway uses its
internal Self (master) clock.
7 Click the Card List tab and configure the Wave Gateway cards and devices.
(For detailed instructions, see Configuring Wave Gateway Cards, page 10-17).
8 Click the Alarms tab. This tab is used to configure the Wave Gateway to send
alarms to Aeonix, which in turn sends the alarms to the NMS system.
Report Now Click this button to automatically update Aeonix with the latest
Wave Gateway status.
System type IPx 500 / IPx 4GC / FlexiCom 4GC / IPx SVC / HDC / MEX /
Office
Monitored by The server that is connected to the WG and gets the WG alarms
Fault alarm The port through which the gateway sends alarms to Aeonix
port (read-only)
(preset to
11015)
Refresh The frequency (in minutes) that Aeonix is updated with the latest
alarm Wave Gateway status
frequency
(preset to 15)
For the Wave Gateway1 and its connected phones and trunks to operate in Aeonix, the
Wave Gateway peripheral cards must be properly configured. The Wave Gateway
phones and trunks must be defined as well.
Once a Wave Gateway has been defined and successfully connected to Aeonix, its
inserted peripheral cards are displayed and can be managed in the Aeonix Portal
through the Wave Gateway Card List tab. Managing Wave Gateway peripheral cards
includes the following:
Card List, page 10-18
Managing Wave Gateway Phones or Trunks, page 10-22
Configuring Card Parameters, page 10-24
Adding a Card, page 10-37
Deleting a Card, page 10-38
Wave Gateway devices can be defined in Aeonix through their Phone and
Trunk pages. For instructions, see Chapter 7, Managing Phones and
Chapter 8, Managing Trunks.
1. The Coral Gateway series includes the Coral IPx Office, 500, 800, 3000; FlexiCom 400
(with HDC controller), 5000
Wave Gateway peripheral cards are accessed and configured from the Card List tab.
The Card List tab displays the peripheral cards of the Wave Gateway unit, including
trunk, station, media resources, and PCM resources peripheral card types. If further
cards are inserted into the Wave Gateway, click Refresh to update the list with the new
cards.
Configuring Wave Gateway Cards
The peripheral cards are sorted by Shelf/Slot. Active cards are displayed first. For each
card, the list displays the following information and links.
10
Shelf / Slot The shelf and slot physical location of the peripheral card in the
Wave Gateway unit. For trunk or station type peripheral cards,
click to set up and manage phones or trunks of this card from the
Trunk List page.
NOTE: When adding a new trunk, select the check box to add all
the available endpoints that are on the specified card.
Table: If this value is different from the I_Type value, the inserted
card will not function.
I_Type Install type—the peripheral card name for which the slot has
been initially configured.
NOTE: The card list does not include empty shelf/slots for which no
IType is specified.
Status The current status of the peripheral card. Possible values are:
ACTIVE
ACTIVE/P—partially active
8DRCF/8DRCM/8DRCM-2 card: not enough resources to
support sub-circuits
iDSP card: not all tone generators are being used
REPLACED—P_Type and I_Type do not show the same card
names
Phones and trunks that have not been defined in Aeonix are not included in
the list, even if they are connected to the Wave Gateway unit.
Configuring Wave Gateway Cards
The information provided in the Phone List and Trunk List is the same as in
Phone List Page, page 7-3 and Trunk List Page, page 8-2, except that only devices
belonging to the relevant card are listed.
2 Do any of the following:
To update the list display, click Refresh.
To add a phone or trunk definition, click Add. See Defining a Phone in
Aeonix, page 7-10 or Defining a Trunk in Aeonix, page 8-10.
To update a phone or trunk definition, click the relevant ID in the list.
To search for a phone or trunk related to the card, use the Search utility.
See Searching for Phones, page 7-7 or Searching for Trunks, page 8-7.
To view or edit the default entity of a phone or trunk, click the relevant
Default User or Default Trunk Group in the list.
To delete one or more phone or trunk definitions, select the check box left
of the relevant items and click Delete.
3 Click Back to return to the Card List tab on the Gateway page.
4 Click Save.
To configure a card:
1 On the Card List tab (see Figure 10-7), click Configure to the right of the
relevant card (in the Card Configuration column). The card parameters are
displayed.
2 View or set card parameters:
CUGW, PUGW and PUGW-2G cards—see Media Channel Configuration for
PUGW/PUGW-2G Cards, page 10-25
ISDN PRI and BRI cards (2DT, PRI-23, PRI-30, 4TBR, and 8TBR)—
see D-Channel Configuration for ISDN Cards, page 10-29
Non-ISDN digital cards (30T, T1, and UDT)— see Signaling Channel
Configuration for Non-ISDN Digital Cards, page 10-36
3 Click OK to return to the Card List tab on the Gateway page.
4 Click Save.
Configuring Wave Gateway Cards
10
Updating any parameters causes a card to be restarted and terminates all calls related
to this card:
Global IP The static global IP socket (IP address and IP port) for the
address PUGW/PUGW-2G card signaling. This address is used for
remote IP endpoints or nodes.
NOTE: When no router or NAT server is used, the Local and the
Global IP addresses are identical (see Local IP address
above).
address
MAC This field is relevant for the MG modules only. Therefore, any
value can be entered in this field or the field may be left blank.
The entered value is saved regardless of the true MAC
address.
In order to view the true MAC address for any MRC, browse to
its PUGW/PUGW-2G address via any Internet Browser. The
MRC MAC address can also be found on the inside of the
Wave Gateway (Coral IPx Office) motherboard.
Local IP The static local IP socket (IP Address and IP Port) for the
address media module.
The local IP address is the address of the PUGW/PUGW-2G
card when accessed from the LAN.
PUGW port: 16400
UGW port: 30000
Global IP The static, global IP Socket (IP Address and IP Port) for the
address media module.
The global IP address is the address of the PUGW/PUGW-2G
card when accessed from the other side of the NAT (the
outside world).
PUGW port: 16400
UGW port: 30000
Echo The echo cancellation period required for this UGW or UGWipx
cancellation card.
period
NOTE: An echo cancellation period of longer than 32 msec
reduces the MG endpoint capacity. The MG will provide
Physical Capacity
(only displayed if the physical PUGW/PUGW-2G card is installed)
Resource types The type of system resources supported by the MRC located
(Read-only) on this card (if available)
Max G.711 The maximum number of media channels that are available
media channels when using G.711 protocol, when this card is used only for
(Read-only) media channels.
When other media protocols are used, or if MRC resources are
used, this number of media channels cannot be achieved.
Required Capacity
Media channels The maximum number of media channels that the media
Configuring Wave Gateway Cards
module can support based on its type (24, 30, 48, 60, or 72).
Media channels are needed when one of the calling parties is
not an IP host, for Wave Gateway phones to any phone that is
not a Wave Gateway phone and to any Aeonix application.
The actual number of channels that the media module can
support (see Media channels under Physical Capacity above)
The corresponding value defined in Sizes (refer to the
Wave Gateway Program Interface Reference Manual)
Only when none of the media gateway compression definitions
match the compressions defined for the IP phones, then the
call cannot be completed.
10
NOTE: This field can only be selected for BRI and 2DT cards.
For PRI cards, the D-channel is always 0.
Protocol side Defines the DSL side at the particular exchange (channel) as
the User or Master side.
A Digital Subscriber Line (DSL) must always have one
exchange side defined as User (slave) while the other side is
defined as Network (master). The Network side resumes call
control in restart (protocol failure) situations. In glare situations,
Configuring Wave Gateway Cards
Extension NOTE: This field is only displayed if all of the following apply:
The card is a BRI card.
Protocol ID is not set to QSIG.
Protocol side is set to Network.
Defines the Network extension as a port or trunk:
Yes—connects the BRI line to an external application or
terminal equipment such as video, router, ISDN telephone,
and so on
No—connects the BRI line to another PBX, thus defining the
BRI line as a trunk
Local ringback NOTE: This field is only displayed if all of the following apply:
The card is a PRI card.
Protocol ID is not set to QSIG.
Protocol side is set to Network.
The source of the ringback tone sent to the caller making a call
over a PRI trunk:
Yes—the local Aeonix system sends the ringback tone to the
calling party.
No—the remote PBX sends the ringback tone.
Set this field to Yes when the remote PBX does not support
the requested ringback tone.
Connect when NOTE: This field is only displayed if Protocol ID is not set to
destination is QSIG.
not ISDN This field applies only to overlap calls and is only relevant
for the Italian market.
This field is used in situations when an overlap call is sent to a
system (e.g., Interactive Voice Response - IVR) that sends
back the ISDN progress message Dest_is_not_ISDN.
Yes—allows Aeonix to switch to a connect state and start
sending DTMF tones to the terminating device or terminating
non-ISDN switch after receiving the Dest_is_not_ISDN
message.
After incoming digits have been received, the system sends
DTMF tones before connecting when a PRI progress
message Dest_is_not_ISDN is received from the far side
(CO or PBX).
No—the system cannot read the Dest_is_not_ISDN
message and therefore can send and receive DTMF tones
only after a preconfigured timeout period.
Power supply NOTE: This field is only displayed for BRI cards and does only
apply to 4/8TBR-P cards.
Defines whether the 4/8TBR-P card, when installed, supplies
power (-48V: US systems or -42V: European Systems) for the
BRI lines to the ISDN terminal equipment.
TEI assignment NOTE: This field is only displayed for BRI cards.
The Terminal Endpoint Identifier (TEI) for layer 2 of the
protocol communications.
Select Fixed if a pre-assigned value defined as 0 is used.
Generally, select this option if Aeonix is connected to a PBX or
to a public network (the CO).
External line is NOTE: This field is only displayed for BRI cards.
physically
Select Yes to identify the BRI port as active and connected to
connected
a physical line. This option is recommended unless there are
particular problems with the specific channel.
Select No if the port is not connected to a line and a reset
option is required for the BRI line. When this option is selected,
the BRI line is disabled and the channel LED is lit.
Configuring Wave Gateway Cards
10
Field Description
Protocol profile Defines the Protocol Profile field in QSIG Facilities for Aeonix
features used in this network node. The Protocol Profile is
defined as 11H for ECMA or as 1FX for ISO.
E&M Ear and Mouth tie trunk All non-ISDN digital cards
This procedure allows you to define a card configuration for a specific shelf/slot, and
insert the card at a later stage into the Wave Gateway unit, such as
Coral IPx Office, 500, 800, 3000 and FlexiCom 5000.
2 In the I_Type column, select the card type for the relevant Shelf/Slot entry.
3 Click OK.
4 Click Save at the bottom of the Card List tab. The VOIP Gateway List page is
displayed.
The following procedure removes a card, as well as all its phones or trunks, from the
Wave Gateway database. However, the phone or trunk definitions are not deleted from
the Aeonix database and displayed on the general Phone List or Trunk List page.
Deleting a card configuration removes a slot assignment and thereby frees
Wave Gateway database resources.
This section describes how to configure Tadiran TGW Gateways in the Aeonix Web
Portal.
Defining a Tadiran TGW Gateway, page 10-42
This procedure describes how to add a Tadiran TGW Gateway, including specifying
its basic (Aeonix related) parameters, provisioning settings, and batch configuration
settings.
When a Tadiran TGW gateway is physically connected to the Aeonix network, it is
automatically identified by the system according to its MAC address, as follows:
The gateway is plugged in and connected to the network
The gateway accesses the DHCP server to get its IP address and the
provisioning server address
The gateway initiates a provisioning request to the Aeonix server URL and
specifies its MAC address in this request
If the gateway is unlisted with Aeonix, the MAC is added to the MAC list of
gateways that are pending batch or manual configuration
At this point, the gateway and its related entities can be configured by manually
entering the gateway’s MAC address, or by selecting the gateway’s MAC address
from the Select from Plug & Play option (see Table 10-10).
For Auto Generation options, see Table 10-13, Table 10-14, Table 10-15,
and Table 10-16.
gateway model.
To update an existing Tadiran TGW Gateway, click VOIP Gateway List
and select the relevant ID in the list.
To create a copy of an existing Tadiran TGW Gateway, click VOIP
Gateway List. On the VOIP Gateway List page (see Figure 10-2), click
(the Clone icon) to the right of the relevant gateway.
10
Closed User Group The Closed User Group the gateway belongs to
(Default: Root) (see Closed User Groups (CUG), page 4-29).
10
MAC address Start filling in the MAC address of the gateway to display a
list of all the existing MAC addresses containing the
entered value, and then select the required value.
Alternatively, select the adjacent check box, and then
select the gateway’s MAC address from the Select from
Plug & Play drop-down list. See the following section
Defining Tadiran TGW Gateways with Plug and Play Deployment
beginning on page 10-50 for the procedure to deploy a Tadiran
TGW via the Plug and Play feature.
3 For auto provisioning, set the parameters as described in the following table.
10
IP address or The IP address, host name, or DNS name of the Aeonix server
host name on which the phones connected to the gateway register, as
defined from the Provisioning Profile page (see Table 5-20).
SIP account The Device Name of the SIP phone used during the registration
authorization process of phones connected to the gateway, as defined from
10
SIP account The SIP password used during the registration process of
authorization phones connected to the gateway when the Auto-Detect option is
password used, as defined from the Phone page (see Table 7-6).
Dial Plan The dial plan from which to apply Dial now rules to phones
connected to the gateway, as defined from the Provisioning
Profile page (see Table 5-25).
Country code The Country/ Region tone selection setting, as defined in the
Tadiran TGW box.
Offset time The Time zone according to the Location of the phone (see
from GMT Table 4-7).
NTP server The name or IP address of the first NTP server address
address 1 according to which time is set for phones connected to the
gateway, as defined from the Provisioning Profile page (see
Table 5-17).
5 All other parameters must be manually configured via the Tadiran TGW box
itself, which can be accessed directly by clicking the gateway’s ID via the
VOIP Gateway List page of the Aeonix Admin.
6 For Auto Generation of users and trunk groups batch configuration, set the
parameters as described in the following table.
Configuring Tadiran TGW Gateways
User alias starts at The starting alias according to which newly created
(Default: 4000) users are assigned available aliases during the batch
configuration process.
10
Trunk group alias The starting alias according to which newly created
starts at (Default: trunk groups are assigned available aliases during the
7000) batch configuration process.
In addition, when the Users Auto Generation option is used, Aeonix attempts
to link the newly created TGW gateway phones to the user in the following
manner:
First priority is given to imported users having the same TGW models.
Aeonix looks up the first available user that has the PnP flag with the user’s
PnP model being identical to the TGW model, and links the TGW to that
user.
Second priority is given to imported users with no associated TGW models.
Aeonix looks up the first available user with the PnP flag with no TGW
7 For Auto Generation phones and trunks, set the parameter as described in the
following table.
10
In this case, no default user is assigned to the phone. When Auto Generation
mode is activated without users, a default user can be assigned using
feature code 159 (see Set Default User in Table 4-10).
Physical line The physical line on the TGW gateway to which the
phone is connected.
Default user The default user defined for this phone, in case Users
Auto Generation is used
10
Physical line The physical line on the TGW gateway to which the
trunk is connected.
Default Trunk The default trunk group defined for this trunk, in case
Group Trunk Groups Auto Generation is used.
All other trunk parameters are derived from the SIP Trunk template (see
Chapter 8, Trunk Templates).
This procedure describes how to add Tadiran TGW Gateways and Phones using the
TGW Plug and Play Deployment feature.
For full TGP Plug and Play support, DHCP and DNS services are
required in the installation.
DHCP
DHCP is required to:
Assign the Gateway its IP address (mandatory)
Provide the device the address of the DND (recommended)
Provide the device the address or name of the Aeonix server for provisioning
by using Option 66 (recommended)
Start Time
Precondition - TGW box provisioning is set correctly
Immediate after the TGW device is restarted
10
The MAC addresses appear in the Select from Plug & Play list drop down list for a
certain period of time, as defined in Time Window for MAC Address Availability in Aeonix,
page 10-51. If the time period expires (72 hours), a "Non-configured TGW is
10
connected" alarm is generated by Aeonix. Choose a MAC address from the list, or
enter a MAC address manually.
Fill out the fields for the TGW. See the subsections in Defining a Tadiran TGW Gateway,
page 10-42 for detailed description of each of the fields and options.
For Auto Generation options, see Table 10-13, Table 10-14, Table 10-15,
and Table 10-16.
By default, Auto Generation of users is based on the Default User Profile in
which users will consume Advanced User Licenses. To have the users
consume GW User Licenses instead, use a profile that is set for GW User
10
License.
For Auto Provisioning options, see Table 10-11 and Table 10-11.
When you have completed the definitions of the TGW, click Save. The VOIP Gateway
List page is displayed with the new TGW entity as shown in the following figure.
To verify and/or edit the details of the new entity, click on the ID of the new TGW
entity to display the VOIP Gateway page for that entity, as shown in the following
figure.
10
To see the new user and phone entities that were created by the Auto Generation
process, click on the Phone List link. The Phone List page for the TGW is displayed
as shown in the following figure.
To see the new trunk entities that were created by the Auto Generation process, click
on the Trunk List link in the VOIP Gateway page. The Trunk List page for the TGW
is displayed as shown in the following figure.
Configuring Tadiran TGW Gateways
10
If you don’t want to use the Auto Generated user IDs described above, you can import
a CSV users definition file during the Plug and Play installation process.
See Importing / Exporting Users on page 6-79 for details on importing a users definition
file.
The TGW definition process uses the range of user IDs to create user entities and
assign them to the new TGW entity.
The CSV file must have the following format with the following fields defined in it
(the column headers are not included in the file):
All fields are string fields that must have the exact string value in them.
Defining a PRI gateway is similar to defining other TGW gateways. Fill in the
parameter fields and choose the MAC Address from the Select from Plug & Play list.
Fill in the Auto Generation and Auto Provisioning fields as required.
Click Save to create the new PRI TGW entity. In the VOIP Gateways List page, click
Configuring Tadiran TGW Gateways
on the ID of the new PRI TGW entity. Verify and/or edit the fields in the PRI TGW
entity as required.
10
Managing Aliases
Aliases resemble internal phone extensions; however, they are associated with a
specific Aeonix user or trunk group rather than with a particular device or wall outlet.
Aliases are also assigned to certain services, such as call groups, ACD groups,
conference call servers, mobility services, and voicemail servers.
When an internal call is received at any of the user’s aliases, the user’s phone or
phones will ring. You cannot assign the same alias to more than one user. However,
you can define many aliases per user.
The following alias types exist in Aeonix:
Complete number—the exact number or extension assigned to a user.
Range—a range of numbers assigned to a user. Any dialed number that falls
into this range is routed to its associated user.
Prefix—a prefix assigned to a user. Any time a number starting with the prefix
is dialed, the user identified with that prefix receives the call.
When a number is dialed, the Aeonix system first searches for a matching complete
alias number. If no complete number is available, the system checks whether the dialed
number falls into one of the assigned alias ranges. If not, the system checks whether
the dialed number can be associated with a defined prefix.
When a call is placed to a prefix alias number, the system automatically removes the
Aliases (“Phone Extensions”)
prefix digit or digits.
11
The Alias Lists page displays the alias numbers assigned to users. It is divided into
Aliases (“Phone Extensions”)
tabs as follows:
Click the Complete tab (see Figure 11-1 above) to view a list of assigned
complete alias numbers.
11
Click the Range tab (see Figure 11-2) to display a list of assigned alias
number ranges.
Click the Prefix tab (see Figure 11-3) to view a list of assigned prefix aliases.
Each alias list is sorted by its first column. If the list includes more than one
page, use the page navigation bar (see Table 6-1) at the bottom of the list to
navigate between the pages.
Assigning Aliases
11
Configuring Services
Aeonix services are centralized applications that provide the basis for Aeonix features
and capabilities. For a description of the telephony features that Aeonix supports,
see Chapter 2, Aeonix Features.
Some services relate to specialized groups to which members are assigned. Other
services are used for specifying connection parameters and access numbers to servers
supporting a certain feature.
Services
12
The Service List page displays the configurable services (see Figure 12-1),
as well as a short description of each service.
12
Services
12
Automatic Call Distribution (ACD) groups are managed from the ACD Group List Page.
Tips:
To learn more about the ACD feature, see Automatic Call Distribution (ACD) and
Hunt Groups, page 2-9.
The ACD Group List page displays the ACD groups defined in the system sorted by
alias number. To open this page, click ACD in the table on the Service List page
(see Figure 12-1).
The ACD group list is sorted by the Alias column. If the list includes more
than one page, use the page navigation bar (see Table 6-1) at the bottom of
the list to navigate between the pages.
For each ACD group, the list displays the following information.
Update ACD group In the list, click the ACD group alias to update
—
the details of this ACD group.
Delete ACD group Select the check box next to the ACD group or
groups to be deleted and then click Delete
(see Deleting Entities, page 3-66).
Access online help Click Help to receive online help.
Define announcer ACD & Hunt On the Services menu in the navigation pane,
codecs Codecs (menu click this link to define codecs for ACD
option) announcers (see Setting Codecs for ACD & Hunt
Announcers, page 12-16).
2 Enter a free alias number in the Alias text box. This number is the internal call
number of the ACD group.
The alias number must consist of at least three digits and cannot be modified
for an existing ACD group. You can click the Suggest Available Aliases
Defining ACD Groups
3 In the Description text box, enter a short description of the ACD group
(optional).
4 From the Group tab, the Unassigned box below the tab displays the ID values
of all users and groups belonging to the selected Closed User Group
12
To view the members of a group, select the group from the list and click View
Group. A tree of the users and sub-groups belonging to the group is
displayed at the bottom of the page.
5 To add a user or group to the ACD group, select it in the Unassigned box and
click (the right arrow). The selected item is moved to the Assigned box and
added to the list of items to be included in the ACD group.
Repeat this step to add other users or groups.
Below the box, you can use the (right arrow) to display the next items or
the Search box to search for and display specific items in the list.
To delete an item from the ACD group, remove it from the Assigned box by
selecting it there and clicking (the left double-arrow). You can add or
remove multiple users and groups by holding down the CTRL or SHIFT key
while selecting them.
6 To sort a user or group, select it from the Assigned box and use (the Up
and Down arrows) to move the item to the required position.
Repeat this step to sort other users or groups.
7 Select one of the following Call Distribution Method options:
Terminal—the system selects the first user that becomes available
according to the order in the Assigned box. This is the default selection.
Circular—the system selects the next agent after the last one to have Defining ACD Groups
answered.
Longest time in idle—the system selects the agent that has been idle the
longest in the campaign.
9 Clear the check box next to the relevant announcement file to prevent it from
being played to callers.
10 For each music file configuration field, click Edit. The corresponding dialog
12
box is displayed for specifying the location of the music or announcement file.
11 For the required codec, select the name of the audio file to be played.
Tips:
To learn how to add additional audio files, see Importing Audio Files, page 12-133.
When you select an audio file, Aeonix will first attempt to play the
corresponding file in the language specified in the user profile (see General
Information Parameters, page 5-10). If such a language does not exist, the default
file will be played instead.
Ensure that:
The default audio files are located on the Aeonix server in:
/home/aeonixadmin/aeonix/resources/audio
In the audio folder there are sub-directories per language named
according to ISO-639 conventions (for example, zh for Chinese)
Defining ACD Groups
The file names in the language sub-directories are identical to the file
names in the parent directory
There is a file for each codec type (G.711Alaw, G.711µlaw, and G.729)
In cluster environments, the files are stored on all of the Aeonix servers
13 Click the Overflow tab. The tab displays the possible overflow situations.
All agents are released Agents are logged in but all of them are temporarily
released, therefore none is available for calls.
Waiting in queue time The caller has not been answered for longer than
expiration the Waiting in queue timeout threshold.
14 For each overflow option, you can define what happens if the overflow
threshold has been exceeded. Click Edit to the right of the appropriate option.
Defining ACD Groups
For the first three overflow options, the default is Put in queue; for the last
two overflow options, the default is Disconnect.
12
This option is only available for the Maximum queue capacity has been
reached overflow option.
Put in queue—the caller remains in the waiting list even after the threshold
has been reached.
Redirect to—the caller is forwarded to a specified user or external number.
Select the user or enter the external number as required.
16 Click OK. The dialog box is closed.
17 Click the Parameters tab. The tab displays the interval and timeout
parameters and is used for defining thresholds.
18 If Default Server is selected, the service uses the server as defined in the
cluster configuration (see Setting Server for ACD and Hunt Services, page 14-43);
otherwise, to assign a specific server in an Aeonix cluster instead, select the
server on which the ACD service runs from the Handled by drop-down list
and then, from the adjacent drop-down list, select the back up server.
19 Define the interval and timeout fields according to the following table.
20 Click Save. The ACD group is included in the list of the ACD Group List
page.
Aeonix supports G.711 a-law, G.711 µ-law, and G.729 codec type files for all ACD and
Hunt announcers.
2 The Supported box displays the codecs defined in the system. To disassociate
a codec from ACD and Hunt announcers, select the codec and click (the
left arrow). The selected item is moved to the Not Supported box.
Repeat this step to add other codecs to the Not Supported box.
You can add or remove multiple codecs by holding down the CTRL or SHIFT
key while selecting them.
Defining ACD Groups
3 Use (the Up and Down arrows) to define the order of the codecs in the
Supported box. The system negotiates the best codec match for incoming
ACD and Hunt calls according to the order of the codecs listed in the box.
4 For ACD and Hunt calls announcers for phones that are not set to SIP INFO
mode, select the Support RFC 2833 check box.
5 Click Save.
12
The Aeonix Contact Center service enables the management of Aeonix Contact
Center aliases (IRN) numbers, which determine the routing of incoming Aeonix
Contact Center calls.
In addition, the Aeonix Contact Center service can be used to configure Call failover
options for each alias, which determines how Aeonix Contact Center calls are handled
in the event that the Aeonix Contact Center is down or experiencing an overload.
The Aeonix Contact Center is managed from the Aeonix Contact Center Service List Page.
Managing Aeonix Contact Center aliases is described in Defining Aeonix Contact Center
Aliases and Call Failover Options, page 12-20.
The Aeonix Contact Center Service List page displays the Aeonix Contact Center IRN
alias numbers) defined in the system. To open this page, click Aeonix Contact Center
in the table on the Service List page (see Figure 12-1).
The list is sorted by the Alias / IRN column. If the list includes more than one
page, use the page navigation bar (see Table 6-1) at the bottom of the list to
navigate between the pages.
Call Failover Details of the call Aeonix Contact Center alias failover policy
Configuring the Aeonix Contact Center
12
Figure 12-11
Des
2 In the Description text box, enter a short description of the Aeonix Contact
Center alias (optional).
3 To associate a user profile (including location and routing rules settings) with
outgoing external calls, enter the required profile in the For outgoing external
calls, use profile of text box.
12
Type Description
Range Use to define a range of numbers used to reach the Aeonix Contact
Center.
Enter the lowest number of the range in the Start of range box.
Enter the highest number of the range in the End of range box.
7 Define the audio sources for the required codec types (see Table 4-14 on
page 4-34), and, if you selected File, select the required audio file from the
adjacent drop-down list.
Tips:
To learn how to add additional audio files, see Importing Audio Files, page 12-133.
9 Click Save. The Aeonix Contact Center alias is included in the Aeonix Contact
Center Service List page.
12
The Call Recording service is used to configure selective recording rules and for
associating recording servers with recording centers.
Tips:
To learn more about call recording, see Aeonix Logger (Call Recording), page 2-6.
Call Recording settings are managed from the Call Recording List Page. Managing the
Call Recording service includes the following procedures:
Defining a Call Recording Rule, page 12-28
Defining a Recording Server, page 12-32
The Call Recording page displays the recording rules and centers defined in the
system. To open this page, click Call Recording in the table on the Service List page
(see Figure 12-1).
The Selective Recording tab of the Call Recording page contains an area (click Search
to display this area) in which search criteria can be defined to find and display specific
rules.
This tab can be sorted by any column. Select the required column from the Sort by
drop-down list. Once selected, you can toggle the sort order of the column items by
Configuring Call Recording
The Call Recording list is sorted by the Name column. If the list includes
more than one page, use the page navigation bar (see Table 6-1) at the
bottom of the list to navigate between the pages.
12
Entity Type The entity type of the recording target: User, Phone, Trunk
Group, Trunk, ULA, ACC Agent, and All (for when no specific
entity was defined for the rule)
Update recording In the list, click the name of the recording rule
rule — to update the details of this recording rule
configuration.
Delete recording Select the check box next to the recording rule
rule or rules to be deleted and then click Delete
(see Deleting Entities, page 3-66).
Access online help Click Help to receive online help.
Name Rules that contain the specified text in their Name field
Entity ID Rules that contain the specified text in their Entity ID field
Caller ID Rules that contain the specified text in their Caller ID field
DNIS Rules that contain the specified text in their DNIS field
NOTE: All searches for rules for which no specific entity was
defined.
Click the Search bar to display the search fields and fill in one or more fields as
required. When you start filling in the Name, Entity ID, Caller ID, or DNIS all
existing entities containing the entered value are displayed below the field. Select the
required value (if available) or type it in. Or select the required Entity Type.
Click Apply to filter the display by the entered criteria. The Call Recording Rules List
will include all the rules that have values corresponding to the search values or
containing them in the relevant fields. Example: If you enter 00 in the DNIS field and Configuring Call Recording
click Apply, rules for recording outbound international calls are displayed.
12
When you clone a call recording rule, all parameter values are copied to the
new rule except for the rule name.
2 Enter the name of the call recording rule in the Name box.
3 In the Description text box, enter a short description of the call recording rule
12
(optional).
If you do not select on, all the entities are automatically selected, indicating
that call inbound / outbound calls will be recorded.
If you do not define details of a specific entity, all the entities of this type are
automatically selected.
User / ULA / Number: Enter the internal alias number of the user, ULA
Aeonix Contact or Aeonix Contact Center agent or Conference Call. See
Center agent / also Table 12-10, Wildcards.
Conference Call
NOTE: When you start filling in the number, all existing aliases
containing the entered value are displayed below the
Number field.
Trunk group In the adjacent box, enter the trunk group ID.
7 To set the rule to continuously record calls until they are terminated (even if
the call is transferred), select continuously (sticky recording mode).
If this check box is not selected, the recording rule is re-evaluated after each
call event (transfer, hold, etc.) and if the recording entity is still part of the
call, the recording continues.
8 To include a time frame for the rule, select at a time frame as the following.
Every day Clear this check box, and then select one or more weekdays
(default: selected) to include these days in the time frame.
NOTE: If you do not clear this check box, all the days of the
week are automatically selected.
All day (default: Clear this check box, and then specify the hour in the Start
selected) time and the End time drop-down lists.
NOTE: If you do not clear this check box, all the hours of the
day are automatically selected.
Configuring Call Recording
Time zone Select this check box, and then specify the relevant time
(default: cleared) zone from the drop-down list.
NOTE: If you do not select this check box, the time zone
defined in Aeonix is automatically selected.
10 To include a caller ID for the rule, select and the caller ID is the following.
12
12 To include a DNIS number for the rule, select and DNIS is the following.
15 By default, the rule is set to be active. If you want to temporarily disable the
rule, clear the Activate the rule check box.
16 Click OK at the bottom of the page. The rule is added to the Selective
Recording list.
17 Click Save.
The recording centers tab list is sorted by the Recording Center column. If
12
the list includes more than one page, use the page navigation bar (see Table
6-1) at the bottom of the list to navigate between the pages.
Status icon A circle icon to the left of each recording center indicates the
(circle) following:
Green - a recording server is defined for the recording
center
Red - no recording server is defined for the recording
center
Call Recording Centers are derived from Aeonix locations that have an
Aeonix server and as such cannot be added, removed, or modified.
4 In the Name text box, enter the name of the recording server.
5 In the Address text box, enter the IP address, host name, or DNS name of the
SIP server on which the call recordings register.
6 Click OK.
When adding a recording server for the first time, the system automatically
generates the AeonixLoggerTKGrp trunk group with which all recording
servers are associated. This trunk group cannot be deleted.
12
Aeonix can be configured to use the SeaMail product as a call recording center. In
some cases it may required to provide Record On Demand capability for Aeonix
without the need to deploy an additional server. This can be the case in an Aeonix
system deployed to a small- to mid-sized business. In this solution the recordings are
stored in the user's mailbox, and can be retrieved by either listening to them via the
phone or by sending them to the user's email address as an attachment.
Recording with SeaMail is initiated by the user on demand (RoD). The user initiates
the recording by activating the RoD feature during or before the call.
Limitations:
Recording by Rules - Not Supported
Total recording - Not Supported
Keep Control - Not Supported
Sticky Recording - Not Supported
Recorder Configuration
When RoD is activated the Aeonix selects the recoding target based on the following
logic.
If an Aeonix Logger Server is Configured (at least 1 server is defined):
Use the Aeonix logger for recording.
Else if no Aeonix Logger Server is configured:
If the user that pressed RoD has SeaMail voicemail configured:
Use the VM configured for the user for recording.
Else no SeaMail voicemail is configured for the user that pressed RoD
Do not record.
Configuring Call Recording
Aeonix Logger and SeaMail recording cannot be mixed on the same system.
12
Persistency
ROD feature is activated for one call only. If activated before the call it would
record the next call. If activated during the call it would record the current call.
Persistent Recording (of all calls) requires activation of a recording rule and
cannot be activated via the phone.
Permission
RoD can be activated by any phone (no control by the phone profile)
Stickiness
Recording is not sticky and terminates in case of transfer
Recording resumes (new record) after hold/resume
Configuring Call Recording
Desktop Application
RoD can be activated from desktop Applications like ACC Agent, A-Touch or
ADC.
ROD can be activated by either party of the call or both parties, however the
Aeonix initiates only one recording session with the Seamail for the call. The
Seamail needs to attach the recording to the mailbox of the party that is
indicated as 'internal' by the Aeonix. If both parties are 'internal' the SeaMail
12
Aeonix GUI
In the Aeonix Selective Recording page a warning can be displayed:
"Selective recording requires that at least one Aeonix logger server would be
registered with the Aeonix in order to function"
Tips:
To learn more about Hospitality features, see Hospitality, page 2-25.
The Hospitality List page displays the Hospitality services defined in the system
sorted by facility name. To open this page, click Hospitality in the table on the Service
List page (see Figure 12-1).
The Hospitality list is sorted by the Facility name column. If the list includes
more than one page, use the page navigation bar (see Table 6-1) at the
bottom of the list to navigate between the pages.
For each Hospitality service, the list displays the following information.
Closed User The Closed User Group associated with the facility (see
Group Closed User Groups (CUG), page 4-29).
7 For the required codec, select the name of the audio file to be played.
Tips:
12
To learn how to add additional audio files, see Importing Audio Files, page 12-133.
Ensure that:
The default audio files are located on the Aeonix server in:
/home/aeonixadmin/aeonix/resources/audio
In the audio folder there are sub-directories per language named
according to ISO-639 conventions (for example, zh for Chinese)
The file names in the language sub-directories are identical to the file
names in the parent directory
There is a file for each codec type (G.711Alaw, G.711µlaw, and G.729)
In cluster environments, the files are stored on all of the Aeonix servers
9 Enter the name of the room status in the corresponding field. Configuring the Hospitality Service
11 Define up to four guest call levels for this facility by associating the required
toll barrier with the corresponding hospitality permission number.
For example, you can associate toll barriers that restrict guests to only dial internal,
local, regional, or national calls. Default Toll Barrier is the default setting.
12 Click Save. The Hospitality service is included in the list of the Hospitality
List page.
Configuring the Hospitality Service
12
Hunt groups are managed from the Hunt Group List Page.
Tips:
To learn more about Hunt groups, see Automatic Call Distribution (ACD) and Hunt
Groups, page 2-9.
For a description of Hunt group and related features, see Automatic Call
Distribution (ACD) and Hunt Groups, page 2-9.
The Hunt Group List page displays the Hunt groups defined in the system sorted by
alias number. To open this page, click Hunt in the table on the Service List page
(see Figure 12-1).
The Hunt group list is sorted by the Alias column. If the list includes more
than one page, use the page navigation bar (see Table 6-1) at the bottom of
the list to navigate between the pages.
For each Hunt group, the list displays the following information.
Update Hunt group In the list, click the Hunt group alias to update
—
the details of this Hunt group.
Delete Hunt group Select the check box next to the Hunt group or
groups to be deleted and then click Delete
(see Deleting Entities, page 3-66).
Access online help Click Help to receive online help.
Define announcer ACD & Hunt On the Services menu in the navigation pane,
codecs Codecs (menu click this link to define codecs for Hunt
option) announcers (see Setting Codecs for ACD & Hunt
Announcers, page 12-16).
2 Enter an available alias number in the Alias text box. This number is the
internal call number of the Hunt group.
The alias number must consist of at least three digits and cannot be modified
Defining Hunt Groups
for an existing Hunt group. You can click the Suggest Available Aliases
button to view a list of available aliases and alias ranges.
3 In the Description text box, enter a short description of the Hunt group
(optional).
4 From the General tab, select one of the following Presentation format of
playing DTMF to agent options:
12
You can use any combination of digits (0-9), asterisks ('*'), and pound ('#')
signs, and any combination of the following variables, which can be used a
multiple of times.
[ANI] [ANI] will be replaced with the ANI of the incoming call
Examples:
[N:7] can produce a counter result that can contain a
minimum of one digit and a maximum of 7 digits.
[N:0] can produce a counter with unlimited digits (use if
you do not want counters to be repeated)
[N:07] will always produce a counter with seven digits
12
[P:<wait time ms>] When dialing the number, a pause can be used to insert a
delay during the digit string transmission.
5 In the DTMF digit duration text box, enter the Digit On period (50-500ms),
as generated by the gateway. (The default value is 70.)
6 Select one of the following Replace incoming call ANI options:
Never—the system does not change the ANI of the incoming call. This is
the default selection.
Always—the system always changes the ANI of the incoming call
according to the digits specified in the Format field that is displayed,
which determines the ANI replacement format.
If empty—if the incoming call has no ANI, the system uses the digits
specified in the Format field that is displayed, which determines the ANI
replacement format.
You can use any combination of digits (0-9), asterisks ('*'), and pound ('#')
signs, and any combination of the following variables, which can be used a
multiple of times).
[ANI] [ANI] will be replaced with the ANI of the incoming call
7 From the Group tab, the Unassigned box below the tab displays the ID values
of all users and groups belonging to the selected Closed User Group
(see Closed User Groups (CUG), page 4-29).
Below the box, you can use the (right arrow) to display the next items or
the Search box to search for and display specific items in the list.
To view the members of a group, select the group from the list and click View
Group. A tree of the users and sub-groups belonging to the group is
displayed at the bottom of the page.
8 To add a user or group to the Hunt group, select it in the Unassigned box and
click (the right arrow). (You can use the Search box for this purpose.) The
selected item is moved to the Assigned box and added to the list of items to be
included in the Hunt group.
Repeat this step to add other users or groups.
To delete an item from the Hunt group, remove it from the Assigned box by
selecting it there and clicking (the left double-arrow). You can add or
remove multiple users and groups by holding down the CTRL or SHIFT key
while selecting them.
9 To sort a user or group, select it from the Assigned box and use (the Up
and Down arrows) to move the item to the required position.
Repeat this step to sort other users or groups.
10 Select one of the following Call Distribution Method options:
Terminal—the system selects the first user that becomes available
according to the order in the Assigned box. This is the default selection.
Circular—the system selects the next agent after the last one to have
answered.
11 Click the Announcers tab. This tab contains the music file configuration
parameters for defining the music and messages to be played to callers.
Defining Hunt Groups
12
NOTE: If not selected, the caller will hear a ring back tone
until an agent becomes available.
Aeonix supports G.711 a-law, G.711 µ-law, and G.729 codec type files for all
Hunt announcers. To learn how to set codecs for Hunt announcers, see
Figure Setting Codecs for ACD & Hunt Announcers, page 12-16.
13 For the required codec, select the name of the audio file to be played.
Tips:
To learn how to add additional audio files, see Importing Audio Files, page 12-133.
When you select an audio file, Aeonix will first attempt to play the
Defining Hunt Groups
corresponding file in the language specified in the user profile (see General
Information Parameters, page 5-10). If such a language does not exist, the default
file will be played instead.
Ensure that:
12
The default audio files are located on the Aeonix server in:
/home/aeonixadmin/aeonix/resources/audio
Waiting in queue The caller has not been answered for longer than the
time expiration Waiting in queue timeout threshold.
16 For each overflow option, you can define what happens if the overflow Defining Hunt Groups
threshold has been exceeded. Click Edit to the right of the appropriate option.
The Overflow dialog box is displayed.
For the first three overflow options, the default is Put in queue; for the last
two overflow options, the default is Disconnect.
12
This option is only available for the Maximum queue capacity has been
reached overflow option.
Put in queue—the caller remains in the waiting list even after the threshold
has been reached.
Redirect to—the caller is forwarded to a specified user or external number.
Select the user or enter the external number as required.
18 Click the Parameters tab. The tab displays the interval and timeout
parameters and is used for defining thresholds.
Defining Hunt Groups
12
19 If Default Server is selected, the service uses the server as defined in the
cluster configuration (see Setting Server for ACD and Hunt Services, page 14-43);
otherwise, to assign a specific server in an Aeonix cluster instead, select the
server on which the Hunt service runs from the Handled by drop-down list
and then, from the adjacent drop-down list, select the back up server.
20 Define the interval and timeout fields according to the following table.
21 Click Save. The Hunt group is included in the list of the Hunt Group List
page.
Defining Hunt Groups
12
A call group includes several users and/or user groups under a dedicated alias number.
When this number is called, the phones of all members belonging to the call group ring
until one of them answers the call.
Call groups are managed from the Call Group List Page. Managing call groups is
described in Defining a Call Group, page 12-61.
The Call Group List page displays the call groups defined in the system sorted by alias
number. To open this page, click Call Group in the table on the Service List page
(see Figure 12-1).
The call group list is sorted by the Alias column. If the list includes more than
one page, use the page navigation bar (see Table 6-1) at the bottom of the
list to navigate between the pages.
For each call group, the list displays the following information.
Update call group In the list, click the call group alias to update
—
the details of this call group.
Delete call group Select the check box next to the call group or
groups to be deleted and then click Delete
Defining Call Groups
2 Enter a free alias number in the Alias text box. This number is the internal call
number of the call group.
The alias number must consist of at least three digits and cannot be modified
for an existing call group. You can click the Suggest Available Aliases
button to view a list of available aliases and alias ranges.
3 The Unassigned box below the Alias field displays the ID values of all users
and groups belonging to the selected Closed User Group (see Closed User
Defining Call Groups
To view the members of a group, select the group from the list and click View
Group. A tree of the users and sub-groups belonging to the group is
displayed at the bottom of the page.
12
To delete an item from the call group, remove it from the Assigned box by
selecting it there and clicking (the left arrow). You can add or remove
multiple users and groups by holding down the CTRL or SHIFT key while
selecting them.
4 Click Save. The call group is included in the list of the Call Group List page.
Defining Call Groups
12
Conference calls include several users and/or user groups under dedicated alias
numbers. These alias numbers function as virtual conference rooms. When an initiator
dials a conference call number, all the members join the conference call. Authorized
users can also join an existing conference call. The system can be configured to notify
participants of the incoming conference call. Up to 125 members can participate in a
conference call.
Tips:
To learn more about conference calls, see Conference Calling, page 2-17.
Conference calls are managed from the Conference Call List Page.
Managing conference calls is described in Defining Conference Call Alias Numbers,
page 12-65.
The Conference Call List page displays the conference call alias numbers defined in
the system. To open this page, click Conference Call in the table on the Service List
page (see Figure 12-1).
The conference call list is sorted by the Alias column. If the list includes more
than one page, use the page navigation bar (see Table 6-1) at the bottom of
the list to navigate between the pages.
For each conference call configuration, the list displays the following information.
Update conference In the list, click the alias to update the details of
—
call alias this conference call configuration.
Delete conference Select the check box next to the alias or
call alias aliases to be deleted and then click Delete
(see Deleting Entities, page 3-66).
Access online help Click Help to receive online help.
12
2 Enter the conference call number in the Alias text box. This number is
internally dialed to initiate or join the conference call.
The alias number must consist of at least three digits and cannot be modified
for an existing conference call. You can click the Suggest Available Aliases
button to view a list of available aliases and alias ranges. Defining Conference Calls
3 In the Description text box, enter a short description of the conference call
(optional).
4 Specify the Call Preemption priority and behavior to be used on conference
call members when this conference call alias is dialed. For example, from the
Priority drop-down list, select High and then, from the Action drop-down list,
12
select Call Waiting. For more information, see Call Preemption, page 2-13.
5 Specify the required General conference call parameters by selecting from the
following options:
Participants will automatically join the conference––to activate the
speaker or headset of all members when an incoming conference call is
received.
9 The Unassigned box displays the ID values of all system users and groups that
are not assigned to the conference as members (upper list) or managers (lower
list).
Below the boxes, you can use the (right arrow) to display the next items
or the Search box to search for and display specific items in the list.
To view the members of a group, select the group from the list and click View
Group. A tree of the users and sub-groups belonging to the group is
displayed at the bottom of the page. Defining Conference Calls
conference call.
by selecting it there and clicking (the left arrow). You can add or remove
multiple users and groups by holding down the CTRL or SHIFT key while
selecting them.
10 Use the External Members box (middle list) to define external users as a
conference members.
12 For each audio file configuration field, click Edit. The corresponding dialog
box is displayed for specifying the location of the announcement file.
13 Define the audio sources for the required codec types (see Table 4-14 on
page 4-34), and, if you selected File, select the required audio file from the
adjacent drop-down list.
12
Emergency Conference calls include several users and/or user groups under dedicated
alias numbers. These alias numbers function as virtual conference rooms. When an
initiator dials a conference call number, all the members join the conference call.
Authorized users can also join an existing conference call. The system can be
configured to notify participants of the incoming conference call. Up to 125 members
can participate in a conference call.
Emergency Conference Service implements a special Conference Call template,
which has the following specific aspects:
Emergency Conference Call supports the Tadiran Panic Button SIP device.
An Emergency Conference is initiated when a SIP endpoint dials the alias of
an Emergency Conference.
The Emergency Conference displays the name of the endpoint caller. A name
can be associated with the Tadiran Panic Button device, so that conference
members receiving an invite to join can see who/what initiated the Emergency
Conference.
The Emergency Conference call is created from a pool of aliases. If no alias is
available, the Emergency Conference call will be created without an alias, so
that emergency calls will always be supported.
Unlike the normal Conference Call, there is no Announcers Tab for setting up
announcers. An emergency call should not be cluttered with announcer
Tips:
To learn more about Emergency Conference Calls, see Emergency Conference
Calling, page 2-20.
Emergency Conference calls are managed from the Emergency Conference Call List
Page.
Managing conference calls is described in Defining Emergency Conference Call Alias
12
The Emergency Conference Call List page displays the conference call alias numbers
defined in the system. To open this page, click Emergency Conference Call in the
table on the Service List page (see Figure 12-1).
The Emergency Conference Call list is sorted by the Alias column. If the list
includes more than one page, use the page navigation bar (see Table 6-1) at
the bottom of the list to navigate between the pages.
For each conference call configuration, the list displays the following information.
2 Enter the conference call number in the Alias text box. This number is
The alias number must consist of at least three digits and cannot be modified
for an existing conference call. You can click the Suggest Available Aliases
button to view a list of available aliases and alias ranges.
3 In the Description text box, enter a short description of the conference call
(optional).
12
The Action drop-down list is only available when Medium, High, or Urgent is
selected from the Priority drop-down list.
5 Specify the required General conference call parameters by selecting from the
following options:
Participants will automatically join the conference––to activate the
speaker or headset of all members when an incoming conference call is
received.
9 The Unassigned box displays the ID values of all system users and groups that
are not assigned to the conference as members (upper list) or managers (lower
list).
Below the boxes, you can use the (right arrow) to display the next items
or the Search box to search for and display specific items in the list.
To view the members of a group, select the group from the list and click View Defining Emergency Conference Calls
Group. A tree of the users and sub-groups belonging to the group is
displayed at the bottom of the page.
by selecting it there and clicking (the left arrow). You can add or remove
multiple users and groups by holding down the CTRL or SHIFT key while
selecting them.
10 Use the External Members box (middle list) to define external users as a
conference members.
Aeonix supports meet-me and 3-way conference calling. The access to a call
conference can be password-controlled. For information about conference calls and
directions for use, see Conference Calling, page 2-17.
Meet-me conference calling requires dedicated alias numbers for conference calls.
These alias numbers function as virtual conference rooms.
Tips:
To learn more about conference calls, see Conference Calling, page 2-17.
Alias numbers, as well as meet-me conference security parameters and settings, are
managed from the Meet Me Conference Configuration List Page.
Configuring a meet-me conference alias includes the following procedures:
Defining Default Values for Meet-me Conference Security Settings, page 12-82
Defining Meet-me Conference Alias Numbers, page 12-86
The Meet Me Configuration List page displays meet-me conference alias numbers
defined in the system. To open this page, click Meet-Me Conference in the table on
the Service List page (see Figure 12-1).
The meet-me configuration list is sorted by the Alias column. If the list
includes more than one page, use the page navigation bar (see Table 6-1) at
the bottom of the list to navigate between the pages.
For each meet-me configuration, the list displays the following information.
The Default meet-me configuration includes the default values for meet-me security
parameters. Except for announcements, these values can be overridden for the specific
meet-me alias numbers (see Defining Meet-me Conference Alias Numbers, page 12-86).
4 Set default values for the fields described in the following table.
Access code The digit the user enters after entering the access
termination digits code. You can define more than one digit (no need
to separate them with commas).
NOTE: If the user does not enter a termination digit
after the access code, the system waits until
the Access code timeout (see below) before it
checks the code.
Access code timeout The time within which the user must enter an access
code
12
6 Define the audio sources for the required codec types (see Table 4-14 on
page 4-34).
Tips:
To learn how to add additional audio files, see Importing Audio Files, page 12-133.
When you select an audio file, Aeonix will first attempt to play the
corresponding file in the language specified in the user profile (see General
Information Parameters, page 5-10). If such a language does not exist, the default
file will be played instead.
Defining Meet-Me Conference Aliases
Ensure that:
The default audio files are located on the Aeonix server in:
/home/aeonixadmin/aeonix/resources/audio
In the audio folder there are sub-directories per language named
according to ISO-639 conventions (for example, zh for Chinese)
The file names in the language sub-directories are identical to the file
names in the parent directory
There is a file for each codec type (G.711Alaw, G.711µlaw, and G.729)
12
In cluster environments, the files are stored on all of the Aeonix servers
When you clone a meet-me configuration alias, all parameter values are
copied to the new alias except for the meet-me conference number.
2 Enter the meet-me conference number in the Alias field. This number is
internally dialed to reach the meet-me conference.
12
If the Access code field is left blank, the placed meet me conference calls
are not password-secured, and the meet-me configuration parameters are
not relevant (except for the Transferring to conference and Conference
not available announcements).
5 In the Owner field, enter any character of the relevant user’s first name, last
name, or login name and select the user from the list displayed below the field.
A conference owner can modify the access code (see above) and control other
participants in a conference call. The same user can be owner of several
meet-me conference aliases.
6 To define or modify a meet-me configuration parameter, select the Override
check box next to the relevant field and enter the required value. (The
parameters are described in Table 12-31 on page 12-82.)
7 If needed, specify the source for any of the announcements (see Step 5 in
Mobility allows authorized users to receive an internal dial tone and access Aeonix
services from their cellular or other external handset. After successful user
authorization, the system either provides the dial tone directly (call-through), or
disconnects the call and calls the user back (callback).
Tips:
To learn more about the mobility feature, see Mobility, page 2-27.
A mobility alias number is the internal number associated with a mobility service.
The system matches this alias with an IT-defined mobility access number, which users
call from outside to access mobility services. Mobility aliases, as well as general
mobility call parameters and rules, are managed from the Mobility List Page.
Configuring a mobility alias is described in Defining a Mobility Alias, page 12-91.
The Mobility List page displays mobility alias numbers defined in the system. To open
this page, click Mobility in the table on the Service List page (see Figure 12-1).
The mobility list is sorted by the Alias column. If the list includes more than
one page, use the page navigation bar (see Table 6-1) at the bottom of the
list to navigate between the pages.
For each mobility alias, the list displays the alias number and an optional description
of the alias.
From this page, you can perform the following actions:
Update mobility In the list, click the alias to update the details of
—
alias this mobility alias configuration.
Delete mobility Select the check box next to the alias or
alias aliases to be deleted and then click Delete
(see Deleting Entities, page 3-66).
Access online help Click Help to receive online help.
When you clone a mobility alias, all parameter values are copied to the new
alias except for the alias number.
2 At the top of the page and on the General tab, set the parameters as described
in the following table.
Maximum call Once the mobility user has received an internal dial tone,
attempts the number of calls or call attempts the user can make
before the mobility session is disconnected
Answer delay For an authorized outside user using the internal dial
time tone to place a call, the maximum number of seconds
the system waits for the called party to answer
3 Click the Rules tab to view or set up mobility rules (see Configuring Rules for a
Mobility Alias, page 12-93).
4 At the bottom of the Mobility Alias page, click Save. The mobility alias is
Defining Mobility Aliases
Mobility rules specify how a calling user is authorized and granted mobility services.
These rules are defined per mobility alias as described in this section, or per user as
described in Configuring Mobility Rules for a User, page 6-62.
This section includes the following:
Non-conflicting Rules, page 12-93
Defining a Rule for a Mobility Alias, page 12-94
Non-conflicting Rules
For each new mobility rule that is created, the system verifies that the rule does not
conflict with already existing rules before saving it. When defining a rule, make sure
it is constructed according to the following guidelines:
When defining a rule, make sure it does not conflict with already existing
rules. For details, see Non-conflicting Rules, page 12-93.
Aeonix provides online CDR output for any type of call in the system. CDR reports
include call details such as start time and date, call duration, IP address, etc.
When defining online mode, you must set the IP address of the Windows host server
and port on which the CDR application resides.
2 In the Description text box, enter a short description of the CDR configuration Configuring Call Detail Records (CDR)
(optional).
3 From the Mode drop-down list, select the required CDR mode (default: None,
where CDR records are not sent to any application).
Offline and Online & Offline modes are not in use - they are reserved for
12
Computer Telephony Integration integrates and coordinates data with voice systems
to enhance telephone service. For example, CTI allows Caller ID information to be
displayed on a PC, or coordinates phone and data transfer between two parties.
Each Aeonix server has a default port assigned for Computer Telephony Integration
(CTI). You can change the port, if necessary.
Aeonix provides a special Directory Group management feature for Aeonix Touch
users.
This advanced feature is still being developed for a future release of Aeonix. It is not
currently operable except at select Beta Sites.
Directory
12
Tips:
To learn more about the Dispatch Console, see Dispatch Console, page 2-19.
To learn how to configure and use the Dispatch Console, refer to the
Dispatch Console Online Help.
Dispatch Consoles are managed from the Dispatch Console List Page (page 12-104).
Managing Dispatch Consoles includes the following procedures:
Defining a new Dispatch Console, page 12-106
Defining a Dispatch Console Profile, page 12-107
The Dispatch Console List page displays the dispatch consoles defined in the system.
To open this page, click Dispatch Console in the table on the Services List page
(see Figure 12-1).
The dispatch console list is sorted by the Name column. If the list includes
more than one page, use the page navigation bar at the bottom of the list to
navigate between the pages.
For each dispatch console, the list displays the following information.
Status icon (circle) A circle icon to the left of each dispatch console indicates
the following:
Green - the dispatch console is logged into Aeonix
Red - the dispatch console is logged out of Aeonix
Profile Name The name of the profile associated with this dispatch
console
Defining Dispatch Consoles
Left Alias The alias number assigned to the left phone of the
dispatch console
Right Alias The alias number assigned to the right phone of the
dispatch console
12
When you clone a dispatch console, all parameter values are copied to the
new dispatch console except for the name.
to associate with this dispatch console (see Defining a Dispatch Console Profile,
page 12-107).
5 In the Left alias text box, enter the first digit of the relevant alias and select
the alias from the list displayed below the field.
6 In the Right alias text box, enter the first digit of the relevant alias and select
the alias from the list displayed below the field.
7 Click Save. The profile is displayed in the list on the Dispatch Console List
12
page.
To copy a profile, select it and click Clone. The new name in the displayed
in the Profile name box. An indexing suffix is automatically added to the
cloned dispatch console profile name. For example, if the original name is
12
QA Team, the cloned name will be QA Team_1. All the other attributes of
The E911 databse update service sends Aeonix device and user update information to
an E911 service provider, which allows them to update their NEMA database.
The E911 Dabase Connector page allows you to define a prefix string that will identify
email sent from Aeonix to the E911 service provider containing database updates (as
a .CSV file attachment). To open this page, click E911 Database Connector in the
table on the Service List page (see Figure 12-1).
Enter the file prefix string in the File Prefix for E911 Email Update field. Click Save
to save the information into the Aeonix system.
The Send Now button can be used to force an immediate send of the Aeonix device
parameters to the E911 service provider for testing.
Configuring the E911 Database Connector
12
The Music service enables parties put on hold to hear music or messages played from
audio files or IP streaming music sources. Up to 10 music services with IP stream
source and an unlimited number of music services with file source can be defined. A
list of aliases and alias ranges can be assigned to each music source.
Callers placed on hold by aliases associated with the music source are played music
or messages as defined for the specified source. Callers placed on hold by aliases not
associated with a specific Music source continue hearing music or messages from the
default system-wide music audio file as defined in the root CUG (see Defining a Closed
User Group, page 4-32).
The Music service is managed from the Music Service List Page. Managing the Music
service is described in Configuring a Music Source and MOH Alias Numbers, page 12-114.
The Music Service List page displays the music sources defined in the system. To open
this page, click Music in the table on the Service List page (see Figure 12-1).
The Music Service list is sorted by the Name column. If the list includes more
than one page, use the page navigation bar (see Table 6-1) at the bottom of
the list to navigate between the pages.
For each music service configuration, the list displays the following information.
Figure 12-62
Configuration Page for a
New Music Source
2 In the Name text box, enter the name of the music source.
Configuring the Music Service
3 In the Description text box, enter a short description of the music source
(optional).
4 Define whether the music source is from an audio file or IP stream:
a File - click Edit. The Audio Files dialog box is displayed.
12
Dialog Box
Define the audio sources for the required codec types (see Table 4-14 on
page 4-34), and, if you selected File, select the required audio file from the
adjacent drop-down list, and then click OK. The dialog box is closed.
Tips:
To learn how to add additional audio files, see Importing Audio Files, page 12-133.
Or
b IP stream - select the incoming IP port and the codec of the RTP stream.
The music input sampling rate must be 8kHz mono (64kbit/sec).
5 To the right of the Assign MOH to Alias box, click Add, enter an alias or
range of aliases or click Update to modify an existing entry.
6 Click OK. The dialog box is closed.
7 Click Save. The music service is included in the list of the Music Service List
page.
1 In the Assign MOH to alias box, select the alias number and click Delete.
The alias is removed from the box.
2 Click Save to delete the alias.
12
Aeonix supports various types of call parking and call pickup. One of them, Page
Queue Park/Pickup, involves parking calls to predefined alias numbers.
Tips:
To learn more about the page queue feature, see Page Queue, page 2-31.
Defining Alias Numbers for Page Queue Park/Pickup, page 12-118 describes how to
dedicate alias numbers for the queue call park/pickup service.
2 In the Display name field, enter the text to be displayed to the parking user,
the parked user, and the user retrieving the parked call.
3 Click Add to add a new alias, or select an alias from the list to update it. The
Alias page is displayed.
Make sure that the alias number to be assigned is not already in use and that
it does not comply with the alias patterns of the applicable dial plan (see Dial
Plans, page 4-19).
12
The Action drop-down list is only available when Medium, High, or Urgent is
selected from the Priority drop-down list.
5 Select the required alias type and define the alias as follows:
Type Description
Range Use to define a range of numbers used to park calls and pick up
parked calls.
Enter the lowest number of the range in the Start of range box.
Enter the highest number of the range in the End of range box.
Note: For performance it is recommended to not specify a Queue
greater than 100 numbers.
Prefix Use to define prefix digits and dedicate all aliases beginning with this
prefix for page queue park/pickup.
Select Prefix and enter the prefix in the text box.
Select Limit length and enter a number to restrict the amount of
digits, including the prefix, that can be dialed to park or pick up a
call. For example: if you specify a 3-digit Prefix, and a Limit
length of 4, the Queue will be 10 deep -- the 3-digit Prefix with
one more digit allowed to range from 0 to 9. If in the same case
you specify a Limit length of 5, the Queue will be 100 deep, with
6 Click OK. The alias number is displayed in the alias list on the Page Queue
Park/Pickup page.
12
The Provisioning service is responsible for keeping Tadiran SIP phones, as well as
P-Series phones, up-to-date in Aeonix. The system automatically updates phone
configurations that comprise SIP Terminal provisioning profile parameters (see
Managing Provisioning Profiles, page 5-91) and Configuration Sets (see Defining New
Configuration Sets, page 12-130), which are files that contain additional pre-configured
sets of features and parameters.
In addition, Plug and Play (PnP) modes can be used to quickly and easily define on
premise and remote (via VPN) Tadiran SIP phones on site. PnP can be used in parallel
to regular telephony operations.
A Tadiran SIP phone that is physically connected to the Aeonix network is
automatically identified by the system according to its MAC address, as follows:
The phone is plugged in and connected to the network
The phone accesses the DHCP server to get option 66
The phone initiates a provisioning request to the Aeonix server URL
The phone enters into the MAC list
At this point, the phone can be configured manually according to the MAC list (see
Select from Plug & Play drop-down, as shown in Figure 7-3), or automatically using
one of the PnP modes (see Configuring PnP Provisioning, page 12-126).
The following requirements must be met when configuring PnP and the Provisioning
For P-Series phones, the server URL must be defined in non-secured mode in
the following format: http://<aeonixserver IP>:8080/aeonix/Provisioning
(replace <aeonixserver IP> with the IP address of the Aeonix server or the
Aeonix servers DNS name in a cluster environment). It is recommended to use
the DNS name for redundancy purposes.
Configuring the server includes the following procedures:
Viewing Updated Phone Firmware Files, page 12-124
Defining New Configuration Sets, page 12-130
Configuring PnP includes the following procedures:
Configuring PnP Provisioning, page 12-126
Aeonix functions as the provisioning server, which includes built-in firmware files.
When polled, provisioned phones that have firmware files that are different from these
files will automatically receive these updated files from Aeonix.
Provisioning definitions will take effect after the phone's next configuration
check.
The Plug and Play tab is used for PnP provisioning of Tadiran SIP phones.
There are two PnP modes:
Auto Phone mode – Used to generate new Tadiran SIP phone entities upon
phone requests for provisioning (see Table 12-41). In this case, no default user
is assigned to the phone. When Auto Phone mode is activated, a default user
can be assigned using feature code 159 (see Figure 4-9)
Auto Phone & User mode – Used to generate new Tadiran SIP phone entities,
and, in addition, used to automatically generate users for these phones (see
Table 12-40)
Aeonix attempts to establish a provisioning session with all the phones in the MAC
list that are pending PnP provisioning and are not yet associated with any phone
definition.
Each entry in the MAC list must be refreshed by a request for provisioning
from the phone at least once a day; otherwise, the phone is automatically
removed from the list (see Table 14-2 - Stale MAC removed from MAC list
alarm).
Plug & Play The time (30 minutes, 1 hour, or 4 hours) after which
timeout (Default: 1 PnP mode is deactivated. PnP mode can be extended
hour) during this period by clicking Save again.
User login name When in Auto Phone & User PnP mode, the user login
prefix (Default: prefix assigned to newly created users. For example, if
PNP) the first available alias is 2000, then the newly created
user’s login name would be PNP2000.
Provisioning profile The name of the provisioning profile associated with this
(Default: None) phone, which is used to define various phone
parameters such as SIP server, Time server, etc.
A PnP icon is displayed at the top of each Aeonix Admin page to remind you
that you are in PnP mode. View the icon’s tooltip for the time remaining in
PnP mode.
Aeonix comes with predefined profile configuration sets, which by default are
assigned for provisioning purposes for Tadiran SIP phones, P-Series phones, and
Tadiran TGW gateways. These configuration sets can then be associated with profiles
(see Defining a Provisioning Profile, page 5-94).
However, you can create additional Configuration Sets based on this default set by
using an SSH program, such as WinSCP (http://winscp.net/eng/download.php).
Password: Aeonix
or
8 Save the configuration file. The Configuration Set is now available when
defining provisioning profiles (see Advanced Parameters, page 5-100).
12
The Prompt and Message service enables administrators to import Wav and MP3 input
audio files. These files are then converted to G.711Alaw, G.711µlaw, and G.729 format
and replicated to all the servers of the Aeonix cluster. These files are used for playing:
Aeonix–Music on Hold (MOH), as well as announcers for ACD / Hunt group,
Wake-up call, Conference call, virtual endpoint, Zone Page announcers, etc.
Aeonix Contact Center–Music on Hold (MOH), queue music, and IVR
announcers
SeaMail–recorded message prompts
For best results, ensure that the quality of the input files are of high quality.
1 In the table on the Service List page (see Figure 12-1), click the Prompt and
Message service. The Prompt and Message page is displayed.
If the imported recorded file exceeds 5 minutes, it will be truncated to the first
5 minutes. Multiple files can be uploaded in zip files of up to 40MB.
3 Select the required system module (Aeonix, Aeonix Contact Center, or SIP
voicemail).
4 In the corresponding Audio language drop-down list, select the language of
the audio file or files (if a zip file) being imported.
For Aeonix and SeaMail, ensure that you define a default audio file. That
way, if the file to be played does not exist in the user’s designated language,
the default language file will be played instead.
For customized Aeonix Contact Center audio files, click the Custom folder
check box, and select the required folder location from the drop-down list.
Repeat Step 2 o Step 5 to import additional audio files for the same or a
different system module.
Aeonix automatically converts the files to the supported formats and then
distributes them to each server in the Aeonix cluster into the specified
language sub-folders, as follows:
Importing Audio Files
/home/aeonixadmin/aeonix/resources/audio/ACC-IVR
The folders where the audio files are located are kept in sync on all the
servers in the cluster. When adding a new server to the cluster, the files are
replicated to the new server within an hour after the server is up and running.
Aeonix voicemail applications provide users with advanced voicemail and unified
messaging capabilities.
Tips:
To learn more about the voicemail feature, see Unified Messaging and Voicemail,
page 2-42.
Aeonix includes by default the SeaMail voicemail application, but can be configured
to support multiple SIP voicemail applications. Before voicemail can be used, the
relevant application must be defined as an Aeonix service through the SIP Voicemail List
Page. Integrating a voicemail application into Aeonix is described in Defining Voicemail
Applications in Aeonix, page 12-140.
SeaMail
Once the application has been defined as a SIP voicemail in Aeonix, the system
provides direct access to all voicemail properties and settings (see Accessing SeaMail,
page 12-148). Users can be assigned a voicemail box for their alias number
(see Managing Voicemail Boxes for Users, page 6-24).
Configuring Voicemail
12
The SIP Voicemail List page displays the voicemail applications defined in the system.
To open this page, click SIP Voicemail in the table on the Service List page
(see Figure 12-1).
For each voicemail application, the list displays the following information.
Status icon A circle icon to the left of each voicemail application indicates
(circle) the following:
Green - for voicemail applications that are configured to
register on Aeonix, indicates that the voicemail is currently
registering on Aeonix
Red - for voicemail applications that are configured to
register on Aeonix, indicates that the voicemail is currently
not registering on Aeonix
Blue - the voicemail has been configured to not register on
Aeonix
registration).
Device Address The URI (Uniform Resource Identifier) address and port at
which the voicemail application can be accessed
Configuring Voicemail
12
Aeonix can have one or more voicemail applications installed. This section describes
how to define voicemail application parameters and alias numbers that allow users to
access their mailboxes.
You can update the properties and alias numbers of an already defined voicemail
application as well.
2 Set the SIP voicemail general identity parameters as described in the following
table and in Table 8-9.
3 Set and manage the voicemail aliases as described in the following procedures:
Defining Alias Numbers for a Voicemail Application, page 12-146
4 Deleting Voicemail Alias Numbers, page 12-147Click the Registration tab.
Voicemail SIP The URI (Uniform Resource Identifier) address at which the
address Aeonix can reach the voicemail application. Specify the
following fields:
The IP address (IPv4 or IPv6) of the application
Port—the SIP port of the application (by default 5060, or,
when transport protocol TLS is used, secured port 5061)
Protocol—the protocol used to communicate with the
application
Requires Select Yes if Aeonix initiates calls with session timer refresh,
session timer which is used to determine whether the SIP session is still
active.
Session-Expires The Aeonix proposal time for the Session Expires Time (in
Time seconds).
Authenticate Whether a valid user name and password must be supplied for
inbound incoming calls (currently set to No).
messages
NOTE: This field cannot be modified.
Diversion The diversion header specifies the user for which voicemail
header format messages are diverted to the mailbox. This field specifies the
diversion header prefix the voicemail uses (currently set to Sip
URI).
Send 181 - Determines whether or not SIP message 181 is sent when a
when call is call is forwarded (currently set to Yes).
forwarded
NOTE: This field cannot be modified.
Configuring Voicemail
Supported Whether the Refer or Re-invite command is used for call
transfer method transfer (currently set to re-INVITE).
Call progress NOTE: The method by which progress tones from remote trunks
tone are handled when a call from a SIP is outgoing to
another trunk and the trunk requests to open the media
12
Forward to This field is relevant for incoming calls that are redirected once
mailbox of or several times because the called user or extension does not
(Default: Last answer. In this scenario, the non-answering parties can be
redirection) internal Aeonix destinations or external PBX (Coral)
destinations with Aeonix mailboxes.
Select Last redirection to route the call to the mailbox
assigned to the last number to which the call was redirected.
Select Original destination to route the call to the mailbox
assigned to the called destination.
For calls to an external PBX extension that are redirected to
an Aeonix user, specify the original destination as follows:
Prefer external PBX destination—route the call to the
mailbox of the external extension. If this mailbox is not
available, try the Aeonix user mailbox instead.
Prefer internal destination—route the call to the mailbox of
the Aeonix user. If this mailbox is not available, try the
external PBX mailbox instead.
Forward on Select the check box, and enter the name of the user, number,
logoff or other voicemail application you want to forward incoming
calls to in the event that this voicemail service is not registering
on Aeonix.
Forward on Select the check box, and enter the name of the user, number,
busy or voicemail application you want to forward incoming calls to in
the event that this voicemail service is not available to receive
calls
ARS Table Specify which ARS table the SIP voicemail service will use to
Name dial outbound calls.
NOTE: To learn more about routing tables and how they are
defined, see Chapter 4, Automatic Route Selection
(ARS).
10 Click Save.
Configuring Voicemail
12
Make sure that the alias number to be assigned is not already in use and
complies with the alias patterns of the applicable dial plan (see Dial Plans,
page 4-19).
2 When the Complete alias type is used (default), specify the Call Preemption
priority and behavior to be used when this voicemail alias is dialed. For
example, from the Priority drop-down list, select High and then, from the
Action drop-down list, select Call Waiting. For more information, see Call
Preemption, page 2-13.
Configuring Voicemail
The Action drop-down list is only available when Medium, High, or Urgent is
selected from the Priority drop-down list.
12
Type Description
NOTE: You can click the Suggest Available Aliases button to view a
list of available aliases and alias ranges.
Prefix Use to define prefix digits and route all aliases beginning with this
prefix to the voicemail application.
Select Prefix and enter the prefix in the text box.
Select Limit length and enter a number to restrict the amount of
digits, including the prefix, that can be dialed to reach voicemail.
4 Click OK. The new alias number is displayed in the Aliases box on the SIP
Voicemail page.
5 Click Save.
You can select more than one alias number by using the CTRL and SHIFT
keys.
2 Click Yes. The alias or aliases are removed from the Aliases box on the SIP
Voicemail page.
3
12
Click Save.
This procedure describes how to access the SeaMail Web Portal. The
SeaMail properties and settings are described in detail in the
SeaMail Administration and Configuration Manual for Aeonix.
The Virtual Endpoint service enables external customer applications to manage the
control flow of incoming calls. An incoming call to one of the service's assigned
aliases will be answered by the Virtual Endpoint service. From that moment on the
customer's external application can, via CTI, receive the call associated events (e.g.,
when the user presses digits, the call is disconnected, etc.) and perform operations on
the call (e.g., play sound files to the user, transfer the call to an agent, etc.). An
example of such an external application is a customer IVR system.
In addition, the Virtual Endpoint service can be configured with multiple sub-aliases
referred to as Virtual Agents, which can only be reached via the Virtual Endpoint
service (they cannot be called directly). When an incoming call arrives to a Virtual
Endpoint Service that has Virtual Agents, it transfers the call to the first available
agent. If all agents are busy, the incoming call will be parked.
Parked calls are transferred on a FIFO basis (i.e., the first incoming call will
be serviced first) to the first available agent.
Virtual Endpoint services are managed from the Virtual Endpoint List Page.
Managing Virtual Endpoint services are described in Defining Virtual Endpoint and Virtual
Agent Alias Numbers, page 12-152.
The Virtual Endpoint List page displays the virtual endpoint alias numbers defined in
the system. To open this page, click Virtual Endpoint in the table on the Service List
page (see Figure 12-1).
The virtual endpoint list is sorted by the Alias column. If the list includes more
than one page, use the page navigation bar (see Table 6-1) at the bottom of
the list to navigate between the pages.
For each virtual endpoint configuration, the list displays the following information.
Figure 12-80
Configuration Page for a
New Virtual Endpoint
Defining Virtual Endpoints
You can use the Search box to textually search for and display specific items
in the list.
12
The alias number must consist of at least three digits and cannot be modified
for an existing virtual endpoint. You can click the Suggest Available Aliases
button to view a list of available aliases and alias ranges.
3 In the Description text box, enter a short description of the virtual endpoint
(optional).
4 To associate a user profile (including location and routing rules settings) with
outgoing external calls, enter the required profile in the For outgoing external
calls, use profile of text box.
5 Select Auto answer to automatically activate auto answer on the virtual
endpoint.
6 To associate a user profile (including location and routing rules settings) with
outgoing external calls, enter the required profile in the Virtual Endpoint page
of the Aeonix Admin.
7 By default, incoming calls to a Virtual Endpoint alias are handled by the server
that received the calls. In cluster environments, to assign a specific server or
all the servers in an Aeonix cluster instead, select the servers from the
Handled by and backed up by drop-down lists.
In the event that these servers are not available, an incoming call will be
handled by the server that received the call.
10 Define the audio sources for the required codec types (see Table 4-14 on
page 4-34), and, if you selected File, select the required audio file from the
adjacent drop-down list.
Tips:
To learn how to add additional audio files, see Importing Audio Files, page 12-133.
13 Specify the Call failover threshold for incoming calls that are not handled
within a predefined time (default: 20 seconds), and then select one of the
following overflow options:
No action—the call continues ringing even after the threshold has been
reached.
Disconnect with busy reason—the call is disconnected, and the caller
receives a busy reason for the disconnection. This is the default selection.
Disconnect—the call is disconnected.
Redirect to—the call is forwarded to a specified user or external number.
Select the user or enter the external number as required.
14 To play an audio file before the selected overflow action, select the check box
below the options, and then click Edit to specify the file name for the required
codec.
15 Click Save. The virtual endpoint is included in the list of the Virtual Endpoint
List page.
1 To the right of the Virtual Agents List box, click Add, or select an existing
alias in the box and click Update. The Alias Configuration page is displayed
on the Virtual Endpoint List page.
12
2 Select the alias type (usually Complete for a virtual agent) and define the alias
as follows:
Type Description
Range Use to define a range of numbers used to reach the virtual agent.
Enter the lowest number of the range in the Start of range box.
Enter the highest number of the range in the End of range box.
5 Click Save.
Aeonix searches for an alias number in the following order:
It tries to find a number matching a complete alias.
If no match is found, the system checks if the number falls into a defined alias
range.
If still no match is found, the system checks whether the number has a prefix
12
Zone Page calls include several users and/or user groups under dedicated alias
numbers. When an initiator dials a Zone Page number, the system places calls to all
the members in Auto Answer mode.
During the dialing period, which can take a few seconds, the system plays the
mandatory announcement to members that are already connected to the Zone Page
call. This message is then optionally followed by a user defined First announcement.
During the Zone Page, all the members’ phones will be muted. Up to 125 members
can participate in a Zone Page call.
Zone Page calls are managed from the Zone Page List Page. Managing Zone Page calls
is described in Defining Zone Page Call Alias Numbers, page 12-161.
The Zone Page List page displays the zone page alias numbers defined in the system.
To open this page, click Zone Page in the table on the Service List page (see Figure
12-1).
The zone page list is sorted by the Alias column. If the list includes more
than one page, use the page navigation bar (see Table 6-1) at the bottom of
the list to navigate between the pages.
For each zone page configuration, the list displays the following information.
Update zone page In the list, click the alias to update the details of
—
alias this zone page configuration.
Delete zone page Select the check box next to the alias or
alias aliases to be deleted and then click Delete
(see Deleting Entities, page 3-66).
Access online help Click Help to receive online help.
12
Figure 12-85
Configuration Page for a
New Zone Page
2 Enter the zone page number in the Alias text box. This number is internally
dialed to activate the zone page.
The alias number must consist of at least three digits and cannot be modified
for an existing zone page. You can click the Suggest Available Aliases
button to view a list of available aliases and alias ranges. Defining Zone Page Calls
3 In the Description text box, enter a short description of the zone page
(optional).
4 Specify the Call Preemption priority and behavior to be used on zone page
members when this zone page alias is dialed. For example, from the Priority
drop-down list, select High and then, from the Action drop-down list, select
12
Call Waiting. For more information, see Call Preemption, page 2-13.
5 Specify the settings for the following General zone page parameters:
Terminate the zone page when the playback ends––to disconnect all
members when the predefined announcement ends.
Terminate the zone page when the initiator disconnects––to disconnect
all members when the initiator disconnects.
Zone page initiator will have audio priority––Aeonix usually grants
speaking privilege to the three members with the strongest signals. Enabling
this feature ensures that the initiator is included as one of the three sources,
even if their signal is not one of the three strongest in the call.
6 Select one of the following to define who can activate zone page calls:
Managers only—only managers can activate zone page calls.
Managers and members—managers and members can activate zone page
calls. This is the default selection.
Everyone—any user can activate zone page calls.
To allow incoming external calls to start zone pages, set this parameter value
to Everyone.
7 Click the Group tab to define the managers and members of the zone page
call.
Defining Zone Page Calls
12
8 The Unassigned box displays the ID values of all users and groups that are not
assigned to the zone page as members (upper list) or managers (lower list).
Below the boxes, you can use the (right arrow) to display the next items Defining Zone Page Calls
or the Search box to search for and display specific items in the list.
To view the members of a group, select the group from the list and click View
Group. A tree of the users and sub-groups belonging to the group is
displayed at the bottom of the page.
12
by selecting it there and clicking (the left arrow). You can add or remove
multiple users and groups by holding down the CTRL or SHIFT key while
selecting them.
9 Use the External Members box (middle list) to define external users as a
conference members.
Because it cannot be known in advance if the initiator of the Zone Page Call
will have “dial out without ‘9’ access code” configured or not, you must
specify External Member numbers with the ‘9’ prefix explicitly included in the
External Members box.
11 For each audio file configuration field, click Edit. The corresponding dialog
box is displayed for specifying the location of the announcement file.
12 Define the audio sources for the required codec types (see Table 4-14 on
page 4-34), and, if you selected File, select the required audio file from the
adjacent drop-down list.
12
Just as regular users, administrators have their own ID number, identity parameters,
alias numbers, voicemail boxes, and routing definitions. These settings can be
configured from the My Account menu located at the bottom of the navigation pane.
This section describes or refers to the procedures for setting up your account through
the My Account menu:
Defining Your Presence Status, page 13-4
Modifying Your Identity Settings, page 13-5
Managing Your Phone Numbers, page 13-5
Managing Your Voicemail Settings, page 13-6
Overriding Your Profile Configuration, page 13-6
Defining Your Phones, page 13-7
Managing Your Phone Profiles, page 13-7
Setting the Access Code for a Meet-me Conference Alias, page 13-7
Managing Your Mobility Rules, page 13-8
Managing Your ULA Settings, page 13-8
Installing the Sea Navigator on Your Workstation, page 13-9
Installing the Sea Attendant on Your Workstation, page 13-9
Installing the Aeonix Contact Center Client on Your Workstation, page 13-10
Installing the FlexIP Softphone Client on Your Workstation, page 13-10
Installing TAPI Service Provider and DialIt on Your Workstation, page 13-10
Installing Aeonix Touch on Your Workstation, page 13-11
You can set your presence to reflect your current online status. Your presence status
can be used as a condition for forwarding or rejecting calls (see Defining Advanced Rules
for Incoming Call Routing, page 5-35).
2 If the page indicates you are currently not logged in to any of your devices,
click Refresh.
If the offline indication remains, verify that you and your associated phone are
correctly defined and registered in the Aeonix system.
3 Select the relevant Status When Logged In option—Online, DND, or At a
meeting.
4 Click Save.
Configuring Your Account
13
On the navigation pane, select My Settings from the My Account menu. Your identity
settings are defined in the upper part of your User page and under the Identity &
Aliases tab.
You can modify your identity parameters as described in Table 6-5 on page 6-15,
except for your Login name, Profile, and User ID.
On the navigation pane, select My Settings from the My Account menus. Your
numbers are displayed under the Identity & Aliases tab in the Internal Aliases and
External Numbers boxes (see Figure 13-3).
Update or delete your numbers as required (see Assigning Aliases to Users, page 6-19 and
Specifying External Phone Numbers, page 6-27). If you delete an alias number that has a
13
You can also access the settings of your or another voicemail box as
described in Accessing SeaMail, page 12-148.
On the navigation pane, select My Settings from the My Account menus, and then
click the Profiles tab.
Adjust your profile configuration and values as described in Overriding User Profiles,
page 6-29.
To override incoming or outgoing call routing parameters, you can also use the My
Incoming Routing or My Outgoing Routing menu. The parameters and rules that
can be defined are described in Overriding Incoming Call Routing Rules, page 6-40 and
Overriding Outgoing Call Routing Parameters and Rules, page 6-43.
13
On the navigation pane, select My Settings from the My Account menus, and then
click the Phones tab.
The My Phones table displays your phones that have already been defined in the
system (see Viewing and Editing User’s Phones, page 6-59). Under New Phone
Configuration, you can add your phones to Aeonix and configure their basic
parameters (see Managing a User’s Phones, page 6-56). Advanced phone parameters are
set as described in Configuring Phones in Aeonix, page 7-9.
You can update a phone profile by selecting it from the navigation pane. (If necessary,
click the Phone Profiles node to display the available phone profiles.) For detailed
instructions, see Configuring a User’s Phone Profiles, page 6-49.
If you are defined as the owner of a meet-me conference alias, you can specify the
Configuring Your Account
access code for joining conferences at this alias.
On the navigation pane, select My Settings from the My Account menus, and then
click the Conferences tab.
13
Set or remove access codes as described in Setting the Meet-me Conference Access Code,
page 6-72.
To learn more about meet-me conferences and how to define their owners, see Defining
Meet-Me Conference Aliases, page 12-79.
On the navigation pane, select My Settings from the My Account menus, and then
click the Mobility tab (see Figure 13-7). This tab displays the mobility rules that have
been defined for you.
Add, change, or delete mobility rules as described in Configuring Mobility Rules for a User,
page 6-62.
Configuring Your Account
On the navigation pane, select My Settings from the My Account menus, and then
click the ULA tab (see Figure 13-8). This tab displays the members of your ULA
group if available, and also lists the ULA groups to which you belong as a regular
13
member.
You can add members to your ULA group (up to 50 members per group), set your and
their ULA login status and ring policy, or remove members. You can also specify your
login status and ring policy in groups to which you are assigned as a regular member;
to manage these groups, however, you have to navigate to the User page of their
owners. For detailed instructions, see Managing a User’s ULA Settings, page 6-65.
The Aeonix Contact Center is an advanced telephony and ACD application. For an
introduction to the Aeonix Contact Center, see Aeonix Contact Center, page 2-5. The
Aeonix Contact Center client download and installation procedure is described in
Aeonix Clients for Users, page 6-99.
You can download and install the Aeonix Contact Center client on your workstation
from the Settings>Downloads menu (see Downloading the Visor / Agent Client,
page 6-103).
This is a configuration package that allows you to make calls from your Outlook
contacts and to make calls from anywhere on your workstation. For an introduction,
see Single Sign On, page 2-40. The download and installation procedure is described in
Aeonix Clients for Users, page 6-99.
13
You can access your Call Log directly through the My Account menus in order to
view a list of all incoming and dialed numbers. In addition, you can remove and export
call log entries from the Call Log list.
Viewing Your Call Logs, page 13-13
Deleting Call Log Entries, page 13-14
Exporting Your Call Logs, page 13-15
The Call Log page displays details of your latest call logs, including date and time of
the call, duration of the call, and the phone and contact name of the caller. It also
contains an area in which search criteria can be defined to find and display specific
call logs.
The Call Log list is limited to 100 entries. Oldest entries are bumped out of
the list as new entries are entered, if the list is full. Entries are maintained in
the list for 30 days, after which they are automatically deleted.
Field Description
Contact Name The name of the person you called (outgoing calls) or person
that called you (answered and missed calls).
3 Click Yes to delete the entry or entries from the Call Log page.
Maintaining Aeonix
14.1 Alarms.................................................................................14-1
14.3 Clusters.............................................................................14-33
Aeonix can create alarm messages (traps) on system malfunction and shortage of
resources. The system sends these messages to external SNMP Network Management
System applications or NMS servers, or to specified email addresses using SMTP.
Alarm types are sent for server related reasons, such as when CPU, disk space, and
memory resources are becoming insufficient in an Aeonix server. Alarms are also
triggered on missing license permissions, or on license resources that are becoming
scarce. Finally, alarms are sent for Wave Gateway faults, such as when there is no
communication with a card.
For each alarm type, you can specify a threshold. If the resource usage exceeds this
threshold, the system sends an alarm.
This section describes the following alarm-related procedures:
Viewing Alarms, page 14-2
Configuring Alarm Access Parameters, page 14-18
Configuring Alarm Notification Options, page 14-22
Alarms
14
The Alarm lists are sorted by the Time column with the most recent alarms
displayed first.
Column Information
Server The Aeonix server for which the alarm has been created
Description The alarm content. View the description text’s tooltip for more
information.
Column Information
Wave Gateway The Wave Gateway for which the alarm has been created
NOTE: Click the name to view more details of the fault and the
Alarms
Description The alarm content. View the description text’s tooltip for more
information.
Clear display Click Clear All to remove all the alarms from the list.
14
You can view all alarms in the system or only the current alarms. Displayed are:
Server alarms—(see Table 14-2 below for a description of server alarms)
License alarms—alarms on license resources that are almost used up or have
expired (see Table 3-7 on page 3-36 for a description of license alarms)
Wave Gateway alarms—(see Table 14-4 below for a description of Wave
Gateway alarms)
Aeonix Contact One or more Aeonix Contact Center servers Check that the ACC service/s at the
Center Server is down. Linux level are running. Run the
Connection accstat command for indications that
a restart is needed. Restart the ACC
service: Service > ACC > Restart. If
this doesn’t resolve the problem,
open a service ticket with Customer
Support.
Aeonix Support This notification is displayed one month Contact your authorized Tadiran
About to Expire before Technical support expires. representative to renew technical
support.
Aeonix Support This notification is displayed when Technical Contact your authorized Tadiran
Expired support expires. representative to renew technical
support.
Concurrent Calls The total number of concurrent calls on all Consider purchasing additional
Count trunks has exceeded its threshold value and licenses to increase your system
there are no more available SIP capacity.
trunk/gateway resources for calls to be
made.
Connection failure Aeonix failed to connect to email server Contact Customer Support.
to email server “xxx”
Alarms
14
Cluster Connection One or more servers in the cluster is down. 1 Verify there is communication
between all servers.
2 Check if the disconnected server is
up or has any type of malfunction.
3 Renew network/communication
between servers.
4 If it was a network problem, the
cluster will connect automatically
as connection is resorted.
5 Restart server if needed.
6 Contact Customer Support with the
relevant information
Cluster Fatal 100% of the redo-log has been reached. Cluster auto-recovery cannot be
Disconnection performed. Once the network has
been restored, manually restore the
cluster (see below).
1 The same as Cluster Connection,
above.
2 As soon as connection is restored
or down servers are up and
running, the System Administrator
needs to follow the pop-up panel
instructions for server/s restart.
Cluster Manual The network connection was restored after Log in to Aeonix and follow the
Restoration 100% of the redo-log has been exceeded. restart server instructions.
Cluster 30% - 50% of the redo-log was reached. No action required. Cluster
Recoverable auto-recovery will be performed.
Disconnection
CPU usage CPU usage of the server has exceeded its View Aeonix sysHealth files to
threshold value. determine if this is a steady state or
a momentary state.
If it is a steady state, check that
your servers meet Tadiran server
specifications.
In virtual machine environment, it
is crucial to check that you have
enough CPU's per the spec
If it is a momentary state, your
Alarms
Support to discuss.
Default Admin Aeonix checks administrators’ passwords Change the administrator password
Password Detected every 24 hours, and generates an alarm per via the Aeonix login dialog box.
each administrator that is using the system
default password.
Default Password System detected that the system default Update the relevant SIP endpoints
Alert password is being used by SIP endpoints with secured passwords.
Disk Usage Server disk space usage has exceeded its Check that your server spec meets
threshold value. Tadiran specifications.
Login to your server file system to
check what is taking the disk
space.
Do not delete anything unless you
are sure it will NOT cause
problems.
Consult with Tadiran Customer
Support if there is any doubt
Duplicate ELIN The same ELIN appears several times This is a configuration issue within
Aeonix.
Check your configuration and
remove every duplicated ELIN in
Aeonix location programming.
If it does not resolve the problem,
open a service ticket with
Customer Support.
E911illegal mail The E911 service destination address is This is a configuration issue within
address ill-formed Aeonix.
Check the email address you
configured in Aeonix. Try sending
email from a “regular” client using
the same credentials.
If this does not resolve the
problem, open a service ticket with
Customer Support.
E911 missing file The E911 service “xxx” does not define the This is a configuration issue within
name name of the report file Aeonix.
The prefix file name is missing in
the Aeonix programming. The
Prefix file name is programmed in
Alarms
Empty E911 report The E911 report created by the service is Open a service ticket with Customer
empty Support.
ESF Server The ESF server on which the Provisioning The ESF (Provioning Server) is
service resides is not available defined in Settings > Profiles >
Provisioning Profile list. It is
either one of the servers SIP
Server1/2, or another when using
DNS. Either way, the ESF server
is always one of the Aeonix
servers in the cluster.
Check the communication with the
ESF server. PING is a good start
but you might need to verify SIP
etc. are not blocked.
Check that the specific Aeonix
server is up and running.
Check your DNS server.
Contact Tadiran Customer
Support.
External Music The music source is not transmitting audio Check your audio source to see it is
Source as set in the service configuration. still connected or contact customer
support.
Failed to send E911 service “xxx” failed to send report to This is a configuration issue within
E911 report “yyy” Aeonix.
Check the email address you
configured in Aeonix. Try to
sending email from “regular” client
using the same credentials.
If this does not resolve the
problem, open a service ticket with
Customer Support.
Grace Period System is running without the necessary Check the Aeonix license server to
licenses and will stop working once the see if it is down or disconnected.
grace period has ended. Check if the Aeonix license file
was tampered with or is corrupted.
Contact your authorized Tadiran
representative.
Incorrect SIP Model One or more Tadiran SIP phones and Update the relevant SIP endpoints
Alarms
P-Series phones cannot register because with the correct device model.
there is a mismatch between the model
numbers in the Aeonix database and the
actual model numbers.
14
Keep-Alive Status While monitoring replication transport The Cluster management module will
functionality the connection between the handle this situation to gain full
server and cluster nodes was problematic. cluster functionality. Check the
network connection between servers
as it might be unstable.
If this does not resolve the problem,
please open a service ticket with
Customer Support.
Location Without Location has no country definitions. Associate the location with a country.
Country Warning
Memory Usage Server memory usage has exceeded its View Aeonix sysHealth files to
threshold value. determine if this is a steady state
or a momentary state.
If this is a steady state, or you
have frequent alarms, check that
your servers meet Tadiran server
specs.
If not resolved by the above, open
a service ticket with Tadiran
Customer Support and attach all
logs including sysHealth.
No E911 active There is no active E911 active service. This is a configuration issue in
service Aeonix.
Locations in Aeonix have the box
checked "Devices at this location
will be included in the E911" but
the service is not activated.
Activate the service in Aeonix.
No email for E911 The E911 service “xxx” has no destination This is a configuration issue in
service email service. Aeonix.
Open up a SSH session in Aeonix
and use the following commend to
define the email address where E911
update file will be sent:
>aeonix_aparms.sh -set
911ETC_RECEIVERS
[[email protected]]
Add the email address required.
No email server Email server is not defined. Set the email server address in
Aeonix Admin > System > Alarms
> Alarms Configuration
No sub-location Location “xxx” does not have a default This is a configuration issue in
sub-location. Aeonix.
Add the sub-location in the location
programming in Aeonix.
If this does not resolve the problem,
open a service ticket with Customer
Support.
Online CDR Server The Online CDR server is down. Check that the CDR server is up
Connection and running.
Check that the network connection
to the CDR server is working.
Check that the CDR server is not
stuck.
Restarting the CDR server might
address the problem.
If not, open a service ticket with
Tadiran Customer Support and
attach the required information and
logs.
PMS Connection The connection to the PMS server is down. Check whether the PMS server is
operational and network connection
exists or contact Customer Support.
Alarms
Recording License The number of concurrent calls allowed by Obtain additional recording licenses.
Exceeded the Aeonix Logger license were fully utilized.
14
Recording Aeonix internal resources were fully utilized. Make sure you are not reaching the
Resources limit of recording channels per Aeonix
Depletion server.
An additional Aeonix server
deployment might be required.
Contact Customer Support.
Recording Server Aeonix cannot connect to the recording Check whether the Logger server is
Failure server. operational and network connection
exists.
Restart Logger server.
Open ticket with Tadiran support
including Logger and Aeonix logs.
Server Overload An alarm is sent warning that the system is View Aeonix sysHealth and
Warning almost overloaded. anxOverload files to determine if this
is a steady state or a momentary
state.
If this is a steady state, or you have
frequent alarms, check that your
servers meet Tadiran server specs.
If not resolved by the above, open
service ticket with Tadiran Customer
Support and attach all logs including
sysHealth and anxOverload.
Server Overloaded System is overloaded according to the View Aeonix sysHealth and
Server_Config.xml. Registered endpoints will anxOverload files to determine if this
not be able to make and receive calls and is a steady state or a momentary
new endpoint registration requests will be state.
rejected by the system in an effort to correct If it is a steady state, or you have
the overload. frequent alarms, check that your
servers meet Tadiran server specs.
NOTE: Emergency calls are supported during
overloads. If not resolved by the above, open a
service ticket with Tadiran Customer
Support and attach all logs including
sysHealth and anxOverload.
SIP Password System detected password hacking attempts Contact the person responsible for
Hacking on SIP endpoints. security in your organization.
SIP Registration System detected and blocked registration Contact the person responsible for
Alarms
Potential Rogue attempts from potential rogue SIP endpoints security in your organization.
(i.e., more than one registration IP address
is being assigned for the same endpoint).
14
SIP Registration System detected “xxx” registration attempts Contact the person responsible for
Scan to non-existent SIP endpoint “yyy” within a security in your organization.
10 minute period.
Stale MAC System detected that the specified phones Most likely, the phone is physically
removed from MAC have not requested provisioning for over 24 disconnected from the system. No
list hours. action required.
Too many E911 More than one E911 service are active. Open a service ticket with Tadiran
services Customer Support.
Transient Threshold Transient data is out of sync. Aeonix service restart is required to
Exceeded regain full cluster functionality.
Unauthorized Aeonix detects that an unauthorized phone Program the phone or remove it from
Phone Detection with IP “xxx” and MAC “yyy” has been the system.
registered to the system.
Unknown email The E911 email server “xxx” is unknown. Check that the E911 email server
server address has been specified correctly.
If problem persists, open a service
ticket with Tadiran Customer Support.
Unused phones System detected that the specified phones Program the phone or remove it from
that have requested provisioning during the the system.
last 3 days have not yet been programmed
in the system.
Weak Admin Aeonix checks administrator password Change the administrator password
Password Detected strength every 24 hours and generates an via the Aeonix login dialog box which
alarm for each administrator password that provides an indicator of password
is weak (lower than 70% strength). strength.
Weak SIP System detected weak passwords for SIP Update the relevant SIP endpoints
Password endpoints after an Aeonix upgrade. with secured passwords.
users The notification is generated whenever licenses. For that, contact your
number of defined users is greater than the authorized Tadiran representative
threshold set in the Aeonix. "
14
"
14
Battery Type This notification is generated whenever the Replace the battery on the DBMS
battery on the RAM memory card of the card in the Wave Gateway.
Wave Gateway is low and needs to be
replaced.
Card This notification is generated whenever a Reset card and observe. If the
card in the Wave Gateway has a minor problem continues, replace the card.
failure and needs attention.
Card Port This notification is generated whenever a Reset card and observe. If the
port on a card in the Wave Gateway has a problem continues, replace the card.
minor failure and needs attention.
Digital Trunk This notification is generated whenever a Reset card and observe. If the
digital trunk card in the Wave Gateway has problem continues, replace the card.
Alarms
Duplication This notification is generated whenever a Replace the defective card or power
duplication of common control in the Wave supply.
Gateway has a major failure and needs
immediate attention.
Duplication Slave This notification is generated whenever the Replace the defective card or power
slave side of duplicate common control in supply.
the Wave Gateway has a major failure and
needs immediate attention.
Expansion This notification is generated when an alarm Correct the programming in the Wave
Configuration is raised in Office Wave Gateway system if Gateway
there is expansion shelf with installed cards
installed but the expansion type is not
defined in sysgen-->0 in the Wave Gateway
Office.
HDLC This notification is generated whenever the Contact field support at Tadiran.
HDLC highway in the Wave Gateway has a
failure to communicate to peripheral cards
and needs attention.
IOM Type This notification is generated is a problem Reset card and observe. If the
with the IOM channel of the SDT/SFT cards problem continues, replace the card.
installed in the Wave Gateway
Memory This notification is generated whenever the Replace the DBM memory card.
RAM memory card of the Wave Gateway
has an error and needs to be replaced.
PCM Hardware This notification is generated is a PCM Contact field support at Tadiran.
problem (audio problem on the PCM HW)
existing in the Wave Gateway.
PCM Time Slot A time slot problem (audio problem on a Contact field support at Tadiran.
specific timeslot) is detected in the Wave
Gateway cabinet.
Power Supply A power supply in the Wave Gateway has a Replace the defective power supply.
major failure and needs immediate attention.
Protection Level A hardware problem in the memory card Replace the DBM memory card.
(MEX/DBX…) in the Wave gateway has
Alarms
been detected.
Real Time Clock A problem with the real time clock in the Reset card and observe. If the
14
Type MEX card in the Wave Gateway has been problem continues, replace the card.
detected.
Synchronization Generated whenever the synchronization of Reset card and observe. If the
digital trunk card in the Wave Gateway fails problem continues, replace the card.
and needs immediate attention.
Wait State This notification is generated because of a Replace the DBM memory card.
detected hardware problem in the memory
card (MEX/DBX…) in the Wave Gateway.
Wave Gateway This notification is generated in the Wave Reset card and observe. If the
Card is Out gateway when a card is installed (CLIS problem continues, replace the card.
-i_type) but is not active (CLIS -p_type) for
some reason.
Wave Gateway This notification is generated whenever the Check the network.
Fault communications between the Wave Check wave gateway for hardware
Gateway and Aeonix fails and needs failures.
immediate attention. Check wave gateway site log for
errors.
Contact Customer Support at
Tadiran.
Weak Admin Aeonix checks all administration passwords Login normally with the old password
Password Detected strength once every 24 hours, and and change the password.
generates an alarm for every Admin with a
weak password (lower than 70% strength).
Default Admin Aeonix checks all administration passwords Login normally with the default
Password Detected every 24 hours and generates an alarm for password and change the password.
every Admin that is using the system default
password.
Password Aging Aeonix checks all adinistration passwords Login normally with the old password
every 24 hours and generates an alarm for and change the password.
Alarms
Administrator 2 possible events can generate this alarm: None. Warning only.
Hacking Alert 3 failed login attempts by the same Admin
within a 10-minute window.
3 failed login attempts by multiple Admins
within a 10-minute window.
Alarms can be retrieved from an SNMP server or received by email. Alarm access
parameters therefore include:
SNMP—the user name and password required for connecting the SNMP server
to the Aeonix server
NMS—the IP address or server name of the NMS server to which SNMP
alarm messages are sent
SMTP—SMTP email server IP address or name and the email addresses to
which the alarms are to be sent
Changing the “SNMP Server” and the “NMS System” parameters is not
allowed in A4C.
3 If your organization uses an SNMP server, specify the relevant user name and
password:
a Enter the User name and Password the system must use for connecting to
the Aeonix SNMP server. (The default user name and password is
AeonixUser and AeonixPassword respectively.)
b In the Retype password box, enter the password again for verification.
The entered values must match with the user name and the password
defined in the SNMP server, otherwise the connection will fail.
IP address or host The IP address or host name of the NMS server to which
name SNMP alarm messages are sent.
User name The user name used to access the NMS server.
Privacy protocol The SNMP Privacy Protocol the Aeonix server uses for
communicating with the NMS server.
Privacy password The SNMP privacy password configured for use when
communicating with the NMS server.
Retype privacy Enter the SNMP privacy password again for verification
password purposes.
You can use the Search box to textually search for and display specific items
in the list.
14
a In the IP address or host name box, enter the IP address or host name of
the SMTP email server.
b In the port box, enter the TCP port the email server uses for sending
emails. (If this field is left empty, the default port 25 is used.)
c In the Sender name box, enter a valid email address from which alarm
messages are to be sent.
7 In the Email List box, specify the email addresses to which alarm messages
are to be sent:
It is permitted to add email addresses to the Email list, but predefined email
addresses should not be modified or deleted in A4C.
To add an email address, click Add, enter the email address in the Email
box, and click OK. The email address is added to the Email List box.
To update an email address, select it in the list box and click Update. Make
changes as required and click OK.
To delete an email address, select it and click Delete.
To make sure the email addresses have been correctly defined and are
working, click Test Email. The system sends a test email to each specified
address and notifies you of the outcome.
8 At the bottom of the Alarms Configuration page, click Save.
Alarm notification settings determine which alarm messages are sent, and how.
1 At the bottom of the navigation pane, click System. The pane displays the
System menus.
2 Select the Alarms menu, and then click Notification Options. The
Notification Options page is displayed.
3 The Notification Options table lists the available alarm types. Specify the
Alarms
Send by Mail Select this check box to have the alarm messages sent to
the email addresses specified in Configuring Alarm Access
Parameters, page 14-18.
Send by SNMP Select this check box to have the alarm messages sent to
the SNMP application / NMS server.
Show in Report Select this check box to have these alarm messages
included in the Current Alarms and All Alarms report
pages if the specified Threshold is reached.
(For a description of the alarm reports, see Viewing Alarms,
page 14-2.)
4 Click Save.
Alarms
14
The following sections describe how to access Aeonix system information in the Web
Portal:
Displaying Aeonix Version Information, page 14-26
Clusters, page 14-33 (relevant for clustered systems)
System Parameters, page 14-27
System Information
14
System parameters define the initial system configuration and interface settings. The
parameters described in this section can be displayed and programmed in the Aeonix
Web Portal.
System Information
14
Parameters
Customer (Cluster) The name assigned to the Aeonix cluster. This name
name appears between the user name and date at the top of
Aeonix Web pages.
14
SeaMail role assigned The SeaMail role assigned to CUG administrators. This
to CUG administrators role must be defined in the SeaMail Web Portal.
Alarm agent DTMF The DTMF digits duration when in ‘Agent’ (SIP INFO)
duration mode (see Alarm agent, page 7-23).
The default value is 500 ms (milliseconds).
Layer 3 QoS voice The DSCP value used to determine the priority
priority assigned to outbound voice traffic for Tadiran SIP
Phones.
The default value is 0.
Layer 3 QoS signaling The QoS Layer 3 setting for Tadiran SIP Phones.
priority The default value is 0.
System domain name The system domain name. This name appears in
phone and trunk IDs after the @ sign (see Table 7-5
on page 7-12 and Table 8-6 on page 8-11).
The default system domain name is aeonix.com.
Additional date format The character currently used for separating the date
separators units in the Default General Information sub-profile
Separator of date format The character used for separating between the date
options format options. The default character is a comma (,).
Available date format The date formats that can be selected in the General
options Information sub-profile. Use Java conventions when
entering date formats.
System Information
4 Click Save.
System Information
14
The following sections describe how to access Aeonix cluster related pages in the Web
Portal:
Displaying Cluster Information, page 14-34
Restarting Servers After Network Connection Restored, page 14-39
Configuring the Cluster for Registration Load Balancing, page 14-41
Setting Server for ACD and Hunt Services, page 14-43
Server Settings for the Aeonix Contact Center Service, page 14-44
Enabling and Configuring High Availability, page 14-51
These sections are only relevant for systems consisting of two or more
clustered Aeonix servers.
Clusters of Aeonix servers are created during system installation. For details,
refer to the Aeonix Installation Manual (see Related Documentation, page 1-17).
Clusters
14
The Cluster Status page displays information about your Aeonix network, including
connection status, number of registered endpoints, and voicemail server associated
with each server in the cluster.
In the event that cluster functionality is compromised, the system will prompt you as
to which server or servers need to be restarted in order to recover the cluster.
Cluster Status Displays the operational status of the servers in the cluster.
Status icon (circle) A circle icon to the left of each server indicates the
connection status of the server in relation to the server the
administrator is currently logged in to, as follows:
Green - the server is running and connected to your
server
Red - the server is disconnected from your server
NOTE: The first row displays the server you are logged in to.
In Start Time The date and time of the last change in the server’s
receive status.
Out Start Time The date and time of the last change in the server’s
transmission status.
Clusters
Call Recording The location name of the call recording instance running on
that server. Red text indicates that the call recording
service has a problem.
Server Local Time Displays the Server Local Time. It is recommended that
servers in a cluster be set to synchronize their time with an
NPT Internet time server. By assigning the servers in a
cluster the same NPT Internet time server, they will be kept
in synchronization with each other.
See Table 3-2, Time and Date Parameters for a description of
setting the NPT Internet time server for an Aeonix server.
Total registered The total registered endpoints in the system (sum of the
endpoints EPs column).
Server columns The columns in the Cluster Integrity table also show the
Clusters
Server rows The rows in the Cluster Integrity table show the servers in
the cluster “from” which connectivity is known.
14
Server integrity The items in the table map all the possible server-to-server
table items connections in the cluster. In each server-to-server
relationship the status is represented as one of the
following color and text label combinations (as shown in the
legend below the table display).
Red Pend restart. The pair of servers are connected, but the
synchronization log file has reached maximum filesize and
is no longer being written to.
Grey N/A. The identity diagonal through the matrix in which there
is no server-to-server relationship.
To investigate the reason of a server malfunction, you can use the tools
described in Server-based Maintenance Tools, page 14-79.
This pop-up will be displayed when logging in after the network connection
has been restored and auto-recovery cannot be performed. This pop-up will
reappear in the event not all the servers reconnected successfully to the
cluster and auto-recovery cannot be performed.
To recover a cluster:
Clusters
1 Select the connection status group for which you want to perform a restart:
Red – To restart all the servers with connection status Red.
14
Servers with Yellow connection status cannot be selected because they are
still disconnected from the server.
2 Click Restart; Aeonix restarts all the selected servers. This process may take a
few minutes.
If you click Cancel instead, the pop-up will be displayed the next time you log
in to Aeonix.
Clusters
14
You can configure server location and capacity settings for endpoint registration load
balancing purposes. In addition, you can set the reconnection method to use in the
event one or more of the servers in a cluster requires a restart because it is not
synchronized with the other servers in the cluster or its functionality has been
compromised.
Endpoint Capacity Enter the optimal number of endpoints that can register
to the server under normal conditions (when all the
other servers are connected and functioning properly).
Click the icon to store the aeonixadmin user’s SSH password in the
Aeonix database, which is used when accessing this Aeonix server via an
SSH interface.
4 Select one of the following reconnection methods to use in the event one or
more of the servers in a cluster requires a restart because it is not synchronized
with the other servers in the cluster or because its functionality has been
compromised:
Manually to be prompted (see Restarting Servers After Network Connection
Restored, page 14-39) as to when the restart will occur.
Automatically to set a specific time of day for the restart from the Hour
and Minutes drop-down lists. (In this case, you will not be prompted for a
restart.)
Schedule to set a specific day and time for the restart from the Day, Hour
and Minutes drop-down lists. (In this case, you will not be prompted for a
restart.)
5 Click Save.
Changes are applied only after clicking the Start Load Balance on the
Cluster Status page.
Prior to activating Load Balancing for systems that include Wave
Clusters
Gateway keysets, ensure that all the Aeonix servers are recognized in the
Wave Gateway (see Servers, page 10-11).
14
As a distributed solution, the Aeonix ACD and Hunt services are designed to function
in a clustered environment. This means that call center agents attending calls for the
same campaign can be logged in at any server within the cluster. The Aeonix ACD and
Hunt service itself, however, must be run from one specific server. Main and backup
servers for the ACD and Hunt services can be configured from the ACD & Hunt
Service Page.
To set the default server on which the ACD and Hunt services are run:
1 At the bottom of the navigation pane, click System. The pane displays the
System menus.
2 Select the Cluster menu, and then click ACD & Hunt Service. The ACD and
Hunt Service page is displayed.
3 From the Service runs by default at drop-down list, select the server on
which the ACD and Hunt services run by default. Then, from the adjacent
drop-down list, select the back up server.
4 Click Save.
5 Click Restart. A confirmation box is displayed.
6 Click Yes. After Aeonix has been restarted, the system informs you whether
the operation was successful, or specifies that the server could not be restarted.
Clusters
14
In Standalone Mode, a single Aeonix Contact Center module is Active and provides
the service without High Availability failover protection. All other Aeonix servers in
Clusters
the cluster do not have their installed Aeonix Contact Center modules activated -- the
modules are Inactive.
14
In the case of Cluster Mode in which the Active Aeonix Contact Center module fails,
the Passive module takes over and becomes the Active module. When the other
module is restarted, it joins the cluster now as Passive. In order to restore the original
configuration, the administrator must click the Switch to active button as shown in
Figure 14-11.
Clusters
In the case of Island Mode, where both Aeonix Contact Center modules become
Active because of a network connectivity failure, the original configuration is
14
To set the servers on which the Aeonix Contact Center service is run:
1 At the bottom of the navigation pane, click System. The pane displays the
System menus.
2 Select the Cluster menu, and then click Aeonix Contact Center Service. The
Aeonix Contact Center Service page is displayed.
3 From the Primary drop-down list, select the Aeonix server on which the
Aeonix Contact Center service runs.
Clusters
14
4 From the Secondary drop-down list, select the secondary Aeonix server used
for high availability purposes.
5 Click Save and wait a few minutes for the configuration changes to take effect.
If the configuration does not succeed, the reason is displayed instead. See
Table 14-13 below for a list of possible errors. Click Reconfigure and wait
until the system configures the Aeonix Contact Center again. If the error
persists, contact customer support for assistance.
A circle icon to the left of each server indicates the Aeonix Contact Center
connection status to the Aeonix server:
Green – Aeonix Contact Center is running and connected to the Aeonix
server
Clusters
The connection status also indicates which server is the Active server and
which is the Passive server, which is the server that passively monitors all
Aeonix Contact Center calls.
To set the other server as the active server, click Switch to active.
In the event that either the primary or secondary Aeonix Contact Center server
malfunctions, changes to the Aeonix Contact Center configuration cannot be performed.
Instead, in order to retain high availability, the following must be performed via the Aeonix
Configuration Wizard:
If the Secondary server malfunctions - assign a third server as the secondary server and
remove the malfunctioning server from the cluster
If the Primary server malfunctions - replace the primary server with the secondary server,
assign a third server as the secondary server, and then remove the malfunctioning server
from the cluster
Clusters
14
The primary Aeonix Contact Center service at <xxx> could not be stopped.
The secondary Aeonix Contact Center service at <xxx> could not be stopped.
The primary Aeonix Contact Center service at <xxx> could not be started.
The secondary Aeonix Contact Center service at <xxx> could not be started.
The Aeonix Contact Center backup file at <xxx> could not be created.
The Aeonix Contact Center tar.gz backup file at <xxx> could not be created.
The MYSQL service on the primary Aeonix Contact Center server <xxx> could
not be stopped.
The MYSQL service on the secondary Aeonix Contact Center server <xxx>
could not be stopped.
The MYSQL service is not running on the secondary Aeonix Contact Center
server <xxx>.
The MYSQL service is not running on the primary Aeonix Contact Center
server <xxx>.
The copy file process to the secondary Aeonix Contact Center server <xxx>
did not succeed.
The primary and secondary Aeonix Contact Center servers are running
different Aeonix Contact Center versions.
You can enable the High Availability feature to work on servers both within and
among Aeonix cluster locations.
High Availability requires higher bandwidth capacities. Ensure that your Aeonix network
meets bandwidth requirements before enabling this feature. Refer to the Aeonix
Installation - Hardware and Software Guidelines for details (see Related Documentation,
page 1-17).
If some server suffers a failure and the High Availability feature is enabled, the
workload of the failed server is distributed among the other servers. This allows
ongoing Tadiran SIP phone calls and call options (such as transfer, hold, and retrieve)
to continue unaffected in the event of a failure on the server where the phone is
originally registered on.
In order for the High Availability parameters to take effect, these phone must
be configured via their phone web page. Refer to the User Guide of the
relevant phone for details (see Related Documentation, page 1-17).
In addition, you can configure server locations for High Availability purposes,
including which locations backup the other, the timeout duration for servers within the
same location, and the timeout duration between servers in different locations. The
timeout specifies how long the corresponding server waits before initiating the
failover process.
Green indicates that High Availability is also enabled to work among the
other defined Aeonix cluster locations; Red indicates that it is not enabled
among these server locations; Grey indicates a cell in the table where a high
availability setting is not applicable.
3 For each Aeonix cluster location, set or view the high availability parameters
in the following table:
Clusters
14
Database backup and restore utilities are also available on each Aeonix
server and described in Aeonix Server Database Export and Import Procedures,
page 14-83.
The backup and restore procedures must be performed while Aeonix is
running.
A backup of the Aeonix database can be created at any time. Using HTTP, the system
downloads the data in zipped XML format and saves the file at a destination specified
by the administrator. The backup file name includes the name of the server and a
timestamp.
Restoring the Aeonix database causes the Aeonix service to be restarted on all Aeonix
servers in the system. Restarting Aeonix disconnects all ongoing calls in the system
and discards any unsaved changes in entity definitions.
The database restoring procedure is used for repairing a corrupted Aeonix database, or
for importing a database from another Aeonix system. In clustered Aeonix systems
with multiple servers, the restored database contents are replicated to each server if or
as soon as it is up and running.
To ensure reliable system operation, the restore procedure validates the backup file
before importing it into the database. The validation makes sure the file format and
structure are correct, and verifies database integrity. It also looks for the database
version and automatically performs version upgrade if necessary.
Immediately before restoring the database, the system backs up the database and saves
it in the default backup directory. If the restore procedure fails, the backup is imported
back into the database.
The page warns you of the impact database restoring might have on system
operation. It also lists the numbers of currently active calls, all of which will
be disconnected by the restoring procedure.
3 To restore the database with a manually created backup file, select Upload
backup file, and then click Choose File to specify the destination of the file.
Select the required XML file, or a ZIP file containing the required file. The
system supports the uploading of remote files via HTTP.
4 To restore the database with an automatically created backup file, select Use
scheduled backup file and click the relevant file in the table.
5 Click Restore. The restoring process can take up to several minutes,
depending on the system configuration. Once the database has been restored,
the Restore button changes to Restart.
6 Click Restart to restart the Aeonix service on all servers and re-log in to the
Aeonix Web Portal. The content of the selected backup file will be replicated
to all servers in the cluster.
Data Backup and Restoring via Web
If the system could not restore the database, an error message is displayed.
Depending on the reason of the failure, Aeonix may have to be restarted.
Scheduled Backup programs the Aeonix system to automatically back up the database
14
on a regular basis. This section describes how to configure the automatic backup
By default, every night at 03:00 AM, each Aeonix server automatically backs
up its database in an XML file, compresses this file, and stores it under
/home/aeonixadmin/aeonix/local/backup. If more than 60 backup files are
stored in this folder, the system deletes the oldest files.
For each server, the Scheduled Backup page lists the last backup and the
destination of the backup file, if created. Failed backup attempts are displayed
in red.
Starting from The date of the day from which the backup schedule is
applied
You can back up the database at any moment and have the backup file
saved at the specified scheduled backup destinations. Click Backup Now to
instantly back up the database at the scheduled destinations.
Port The port the remote server uses for SFTP transmission
(Default: 22)
Remote directory The path and directory where the file is to be saved on the
remote server
User name The user name SFTP requires for logging in to the remote
14
server
Click Check Connection to verify that Aeonix can connect to the remote
server.
5 To use the specified destination for the scheduled backup files of all servers in
the cluster, click Apply to All Servers.
6 Click Save.
Data Backup and Restoring via Web
14
This section describes how to download and upgrade the version of Aeonix, ACC, and
SeaMail using the Aeonix Upgrade feature in the Aeonix Web Portal.
Upgrade Preparation
2 Backup the old Aeonix, ACC, and SeaMail, and their databases, for recovery
purposes. See the application note AN1801-001 Consistent Full Backup of
Aeonix Product Ecosystem for instructions and use-cases of full backups of the
Upgrading Aeonix via Web
entire suite of Aeonix modules.
3 Download the Aeonix update file from the Tadiran website Partner Page. The
Update feature can only operate with auhorized Tadiran update files. These
files are .zip archives that have the following naming convention:
Aeonix_Update_x.x.x.zip
where each “x” is a part of the version number. For example:
14
Aeonix_Update_3.0.678
4 Select the location of the Aeonix Upgrade package on either the local client
PC, or on the host Aeonix server in as noted in Step 2.
a Local PC - If the file resides on your local PC choose this option. Use the
file navigation field to navigate to and select the file on your PC. You can
upload the file to the host server, and then run the upgrade later, by clicking
on the Upload button. Or you can upload the file and start the upgrade
process by clicking on the Upload & Upgrade button, after selecting the
servers to be upgraded.
b Aeonix Repository - If the file already resides in the repository directory
on the host server, choose this option. The Upload and Upload & Upgrade
Status Messages
As the Upload or the Upgrade progresses, Aeonix displays status message as shown
in the following figure.
Upgrading Aeonix via Web
14
Logs
The Upgrade process also records status in an Aeonix system log file. Use the Log
Download feature to download an Aeonix system log files archive. See Downloading
Logs via Web beginning on page 14-71. In the log file archive, the Upgrade log file can
be found at:
AnxLogs/home/aeonixadmin3.2/aeonix/logs/web/anxConfSys.log.[sessionID]
This section describes how to use the Aeonix Web Portal to restart the Aeonix service
on a stand-alone Aeonix server, or on one or more servers belonging to the same
Aeonix cluster. You can also directly restart Aeonix on a server without using the
Portal. For instructions, see Restarting Aeonix from the Server, page 14-81.
Restarting the Aeonix service disconnects all ongoing calls in the system and discards
any unsaved changes in entity definitions.
This section describes how to use the Aeonix Web Portal to set System Logs
parameters and to download the System Log files..
The Aeonox Logs page is accessed from Aeonix Admin > System > Maintenance >
Aeonix Logs as shown in the following figure.
Click on the Create Dump banner to expand or collapse the Packet Sniffer and
Memory Dump details.
14
New log If a log collection .zip file exists on the Aeonix server due to a
collection previous Collect only run (see below), the Aeonix Logs
page is displayed with New log collection unchecked, and
the log collection file displayed as available for download to
the Local PC or an SFTP server. To proceed with a new log
collection, click the New log connection checkbox.
If there is no log collection .zip file on the Aeonix server when
you open the Aeonix Logs page, the page will be displayed
will all fields available for specifying the new log collection.
Create Dump Click on the Create Dump banner to expand or collapse the
Packet Sniffer and Memory Dump details.
Packet Capture Select the servers for which PCAP (Wireshark) network
(Sniffer) packet capture (sniffer) will be done.
Memory Dump Select the servers for which Java memory dump will be done.
(Java)
Collect logs Choose the dates when the log collecting will be active.
created between Dates in the future will be interpreted as “up to the current
moment” of the collection run.
Downloading Logs via Web
Time zone Choose the time zone to apply to the dates for the log
collection. Times in the future will be interpreted as “up to the
current moment” of the collection run.
14
Of the following Choose the Aeonix components for which logs will be
components collected:
Aeonix
SIP
Aeonix Contact Center
Aeonix Contact Center core
SeaMail
Select all - selects all the components.
Clear all - clears all the component selections.
From servers Choose the servers from which logs will be collected.
Select all - selects all the components.
Clear all - clears all the component selections.
Compress the Enter a suffix to be appended to the filename which has the
resulting files into form of:
one ZIP file with AnxLogs_YYY-MM-DD_HH-MM-SSsuffix.zip
name suffix where “suffix” is the string that you specify.
Time zone Enter the time zone for the date and time the problem
occurred. The text will be included as a descriptor field at the
top of the main problem-info.txt file in the .zip archive.
14
Description Enter a small text that describes the problem being analyzed.
The text will be included as a descriptor field at the top of the
main problem-info.txt file in the .zip archive.
When you click the Start button, the status of the log files collection process is
displayed as shown in the following figure.
When the collecting process has completed, the status is indicated as shown in the
following figure.
14
Click the Back button to go back to the Aeonix Log page and specify a download
target location.
Choose Local PC or SFTP Server from the drop down list. If you choose an SFTP
server, the fields for specifying the SFTP server are displayed as shown in the
following figure.
Downloading Logs via Web
14
Enter the fields as detailed in Table 14-17. Click the Start button to start the download,
or click the New log collection checkbox to define a new log collection run.
This section describes maintenance tools and procedures that are not included in the
Aeonix Web Portal, but are available on Aeonix servers. System maintenance can be
performed locally via the Aeonix server or remotely by using any standard SSH
(Secure Shell) command line utility.
Aeonix is installed on a dedicated server and runs on CentOS Linux (UNIX).
To learn how to install and configure Aeonix on the server, refer to the
Aeonix Installation Manual (see Related Documentation, page 1-17).
The Aeonix service can be restarted, on any or all servers in a cluster, via the Aeonix
Web Portal (see Upgrading Aeonix via Web, page 14-63).
Aeonix can also be directly restarted on a server, as described in the following
procedure. (The service aeonix start command is also used to start Aeonix
for the first time.)
Restarting the Aeonix service disconnects all ongoing calls in the system and discards
any unsaved changes in entity definitions.
To restart Aeonix:
1 Log in to the Aeonix server if necessary (see Accessing the Aeonix Server,
page 14-79).
2 At the end of the command line prompt, type service aeonix stop and
press ENTER.
3 Type service aeonix start and press ENTER.
Upon successful startup, the terminal window displays the messages Starting
Aeonix service...OK
and (for conference call support) Starting aeonixMP service...OK.
This procedure allows you to view the status of the Aeonix service. It is not intended
for restarting the service.
Do not restart Aeonix from the Service Configuration dialog box, as this can cause
unwanted system resets. Instead, restart Aeonix as described in Upgrading Aeonix via Web,
page 14-63 or Restarting Aeonix from the Server, page 14-81.
4 In the list of services, scroll down to the aeonix service and select it. Do NOT
clear the check box to its left.
14
Aeonix database export (backup) and import (restore) can be performed via the
Aeonix Web Portal (see Data Backup and Restoring via Web, page 14-55), or on any
server belonging to an Aeonix cluster as described in the following procedures.
Export Procedure, page 14-84
Import Procedure, page 14-84
If the exported XML file is used for backup purposes, store it at a secure
location.
Import Procedure
The import procedure erases all previous Aeonix data on the server.
./aeonix_importDB.sh <DataBase>
while replacing <DataBase> with the path and the file name of the XML
file to be imported.
3 Press ENTER.
4 Restart Aeonix (see Restarting Aeonix from the Server, page 14-81). The updated
data is available for display in the Aeonix Portal.
14
Use the --help option to display a description about the current command.
Help information is also displayed whenever you type an incorrect
expression.
NOTE: You can specify multiple regex values. Separate them using the
characters \| (a backslash followed by the pipe symbol)
without spaces.
CG Call group
CO Camp-on
You can define multiple services in the service parameter. Separate them
using | (the pipe symbol) without spaces.
14
-u users The users to be monitored. This option must be defined for at least
one user.
-d Displays only the phones for which the specified user is defined as
the default user.
-l Displays only the phones through which the user has logged into the
Aeonix.
NOTE: You can specify more than one service by separating them
using | (the pipe symbol) without spaces.
Server-based Maintenance Tools
14
top View online information about the available resources on the Aeonix
server.
This section relates to the log files that are created and stored on the Aeonix server:
Aeonix Log Files, page 14-91
Aeonix Conference Log Files, page 14-91
Linux Log Files, page 14-91
The log files are in Log4J format. To view log details using the Chainsaw Open Source
application, type aeonix_chainsaw.sh in the command-prompt line of a terminal
window.
The /server and /web directories include archive sub-directories for each
weekday (/Sun, /Mon, /Tue, /Wed, /Thu, /Fri and /Sat). Every midnight, log
files from the previous day are moved to the appropriate sub-directory. A log
file is deleted after eight days.
Network analyzers are used for understanding and solving network problems. One of
the commonly used network analysis tools is Ethereal.
The Ethereal network analyzer allows you to capture, in real time, information about
data transmission between endpoints on the network. Ethereal provides details about
each transmitted data package. It can also indicate if the communication between two
specific endpoints works only in one direction.
The Ethereal network analyzer is installed by default on each Aeonix server. Ethereal
includes a GUI for convenient capturing and browsing of network data. In addition,
Ethereal provides a terminal-based version called Tethereal, which allows users to
display the captured network data on a terminal window.
What to do:
1 Run the aeonix_mapUser.sh command (see aeonix_mapUser.sh [options],
page 14-88) to detect the ID of the phone through which the user is logged in to
the Aeonix system.
For example, if the user ID is johns, type in the command prompt line
aeonix_mapUser.sh -u johns
2 Run the aeonix_tevent.sh command (see aeonix_tevent.sh [options],
page 14-86) to trace the actions the user has performed from his phone.
For example, if the user’s phone ID includes the digits 0c:72, type
aeonix_tevent.sh -e 0c:72 -d -l 50
in the command prompt line to receive detailed information about the last 50
actions.
3 Based on the above information:
Check whether the user dialed the correct number
Check the reason for the call rejection.
What to do:
Use a network analyzer tool (such as the Ethereal Network Analyzer, page 14-92)
to ensure that the Aeonix server receives the register requests. (For optimal
What to do:
Run the top command (see General Linux Commands, page 14-89) and check the
CPU usage of the Aeonix server. You may be required to move the conference
media server module to a different server.
Use a network analyzer tool (such as the Ethereal Network Analyzer, page 14-92)
to ensure the conference call RTP packets are appropriately sent and received.
Server-based Maintenance Tools
14
This section describes Aeonix error messages. It also suggests how common failures
can be solved.
The following error message types can be displayed in the Aeonix Web Portal:
Access and Password-related Error Messages, page 14-100
General Error Messages, page 14-101
Global Settings Error Messages, page 14-103
Group-related Error Messages, page 14-104
Phone and Phone Profiles-related Error Messages, page 14-105
Phone and Phone Profiles-related Error Messages, page 14-105
Routing and Digit Manipulation Error Messages, page 14-106
Schedules-related Error Messages, page 14-107
Voicemail-related Error Messages, page 14-108
The following table lists error messages related to program access failures, as well as
password-resetting error messages (see Admin Password Policy, page 3-10).
Check Server (appears at On the Aeonix server, the Check the Aeonix database
login) Aeonix database is not connectivity.
available or corrupted.
Only for first-time login after Load the license key into the
Aeonix installation: No soft server and restart the Aeonix
key license key is loaded in system.
the Aeonix server.
The license limit has been The licensed resources are Contact Customer Support to
exceeded. used up. upgrade the soft key license.
Wrong user name or When logging in to the Log in again using the correct
password system, you entered a wrong user name and password.
user name or a wrong
password.
Your session has expired, Too much time passed since Click Login and log in to the
please log in again. your last action using the Aeonix.
Aeonix Web Portal. Your
login is no longer valid.
Your session is invalid, The IP communication Click Login and log into the
please log in again. session was interrupted, for Aeonix.
example, due to a network
failure.
“New password” and When trying to change your Fill in the Change Password
“Confirm password” fields password, you entered fields again while taking care to
do not match. different values in the New enter the same value in the New
password and Confirm password and Confirm
password fields. password fields. (The system is
case-sensitive.)
Wrong password When trying to change your Fill in the Change Password
password, you entered a fields again while entering the
wrong password in the Old current password name correctly
Aeonix Error Messages
The following table lists common error messages that are not limited to a specific
Aeonix element or entity.
<Field value> should have The value you typed in the Type a shorter text that does not
less than <number of> specified field has too many exceed the permitted length.
characters. characters or digits. For
example, the display name
you typed for a user is too
long.
<Field value> should have The value you typed in the Type a value that has at least
more than <number of> specified field has less than the required minimum number of
characters. the minimum of characters or characters or digits.
digits required. For example,
you defined a new alias
number with less than three
digits.
<Field> is not in the right The value you entered for Enter the value in the correct
format. the specified field has the format.
wrong format and can
therefore not be processed
by the system.
This error message can
include a description of the
required format. For
example, while defining a
new FlexSet-IP 280S phone,
you entered its MAC address
in the wrong format.
<Field> must be entered. The specified field is Specify a value for this field.
mandatory. For example, you
tried to save a new user
without specifying a Login
name for the new user. Aeonix Error Messages
<Field> must be selected. An option must be selected Select an option from the list.
from the specified drop-down
list. For example, you did not
select a dial plan for a new
CUG.
<Item> already exists. The value you typed for a Enter another value that is not
new item already exists for already in use for an existing
an existing item. For item of the same type.
example, you entered an
14
Internal error. Please try An internal server error has Close the Aeonix page of the
again. occurred on the Aeonix browser, open the Aeonix Web
server. Portal again and log in. If this
does not solve the problem,
contact your network system
administrator.
Invalid <field>. The value you entered for Enter a valid value.
the specified field is not
valid, although it may have
the required format.
Last <item>. You cannot scroll down Scroll up the list to locate the
further because you already required item. Use the Search
reached the last item in the facility to find a user in the user
list. list.
Only one <item> must be You selected multiple items Select only one item and click
selected. from a list and tried to Update. If necessary, edit other
update them simultaneously. items one by one.
The value is higher than The value you entered Enter a value that is lower than
the allowable maximum of exceeds the preset or equal to the maximum value.
<maximum value>. maximum. For example,
when defining a prefix alias,
you set the Limit length field
to a value higher than the
predefined maximum value
of 64.
The value is lower than The value you entered is Enter a value that is higher than
the allowable minimum of below the preset minimum. or equal to the minimum value.
<minimum value>.
Aeonix Error Messages
14
The following table describes the error messages that are displayed in connection with
global setting definitions.
Area <area name> cannot The area you are trying to If you need to delete the area,
be removed. It is used by delete is assigned to one or assign to the user’s phone a
<location>. more users. location that is not associated
with this area and/or select
another location from the
Always use dial rules of this
location drop-down list in the
user’s general settings.
At least one international No international access code Under the General tab of the
access code needs to be was defined for the country new country, define at least one
inserted. you try to create. international access code before
saving the country.
Cannot remove dial plan You tried to delete a dial If you need to delete the dial
<dial plan name> because plan that is assigned to a plan, assign another dial plan to
it is used by CUGs: <CUG Closed User Group. the CUG.
name or names>.
Country <country name> The country you are trying to If you need to delete the country,
cannot be removed. It is delete is assigned to one or assign to the user’s phone a
used by <location>. more users. location that is not associated
with this country and/or select
another location from the
Always use dial rules of this
location drop-down list in the
user’s general settings.
Country/area <country or You typed the name of a Select the country or area from
area name> does not non-existent country or area. the list, or type it in correctly.
exist.
The following table describes the error messages that can be displayed in context with
user groups, call groups, or ACD groups.
A file name is required. In the Audio Configuration Either select None, or select File
dialog box, you selected the and type the appropriate file
File option and clicked OK name.
without specifying the file.
No item was selected. On a group’s page, you First select a group and then
clicked View Group without click View Group.
first selecting an item in the
Unassigned box.
Only a group can be In the Unassigned box, you Select a group and click View
selected. selected a non-group item Group.
and clicked View Group.
Only one group can be You selected more than one Select one group and click View
selected. item in the Unassigned box Group.
before you clicked View
Group.
Aeonix Error Messages
14
The following table describes the error messages that relate to phones and phone
profiles.
The following table describes the error messages that are displayed in connection with
routing definitions and digit manipulation rules.
At least one digit When defining a digit Define at least one action in the
manipulation action needs manipulation rule, the Actions box (see Defining Dialed
to be inserted. condition was specified, but Number Manipulation Rules,
the corresponding actions page 5-45).
were not.
Aeonix Error Messages
14
The following table describes the error messages that are displayed in connection with
schedules and time frames.
The recurrence pattern is The recurrence pattern of the Correct the recurrence pattern
invalid. time frame you are defining definition of the time frame.
is invalid. For example, no
week day was selected for a
weekly recurrence pattern.
The start time must For a recurrence pattern of a In the recurrence’s Start time
precede the end time. time frame, either the start and End time fields, make sure
time was set to be later than the start time is earlier than the
the end time, or the start end time.
date was set to be later than Under Range of recurrence,
the end date. make sure the start date is
earlier than the end date (if
defined).
The following table describes the error messages that are displayed when creating or
deleting a user’s voicemail box.
For a detailed description of the SeaMail Web Portal, refer to the SeaMail
Administration and Configuration Manual for Aeonix (see Related
Documentation, page 1-17).
Could not create voicemail The system could not create Check the network status. If the
box <mailbox number>. a voicemail box for the alias problem persists, contact
number, usually due to a Customer Support.
network problem.
Could not delete voicemail The system could not delete Check the network status. If the
box <mailbox number>. a user’s existing mailbox, problem persists, contact
usually due to a network Customer Support.
problem.
Incorrect source: <mailbox When replacing a user’s In the SeaMail Web Portal, either
number> or destination: main alias number, the redefine the source mailbox or
<mailbox number>. mailbox number should be manually assign a non-occupied
changed accordingly by the mailbox number as required.
system. This error occurs if
the source mailbox number
was previously deleted in
SeaMail, or if the mailbox
number to be assigned is
already in use.
Unknown voicemail error Trying to create or delete a Check the network status. If the
user’s mailbox resulted in an problem persists, contact
error of an unknown type. Customer Support.
Aeonix Error Messages
Voicemail box <mailbox The system cannot In the SeaMail Web Portal, either
number> already exists. automatically create a delete the relevant mailbox or
voicemail box for the alias, create a mailbox with another
because a mailbox with this number for the user.
number has already been
manually created.
Voicemail role <role The role (permissions) In the SeaMail Web Portal,
name> does not exist. assigned to the user has redefine the relevant role. You
been deleted. can view the assigned role in the
user’s mailbox properties.
14
15.1 Overview.............................................................................15-1
15.6 Phones..............................................................................15-39
The goal of Aeonix Multi-Tenant Mode is to reduce the overall hosting costs in the
Aeonix4Cloud environment, and to pass those cost savings to dealers and their
tenants/customers.
This chapter describes the following Multi-Tenant features:
Tenant List, page 15-3
Dial Plan, page 15-7
Tenants and Users, page 15-11
Service List, page 15-23
Overview
The Tenant List page is the entry point to the Aeonix system in Aeonix Multi-Tenant
Mode. The Tenant List page is used to view the tenants that have been created by and
are managed by a single dealer, and for selecting a Tenant for parameter configuration.
. Selecting a Tenant sets the Aeonix system to that Tenant, so that only services and
user for that Tenant will be shown. Many parameter fields require that a Tenant be
selected before you can edit them.
The Tenant List is for Tenant selection only. You cannot create new tenants,
or delete tenants from the Tenant List page in an A4C Aeonix instance in
Multi-Tenant Mode. You can only create or delete tenants via the
Aeonix4Cloud Portal.
The Tenant List page is accessed from Settings > Tenants > Tenant List as shown in
the following figure.
Tenant List
15
Column / Information
Button
Alias Prefix The 4-digit prefix that is assigned to all aliases associated with
the tenant. The Alias Prefix is in the range 8000-8999
representing a capacity of 1000 tenants in a single Aeonix
Multi-Tenant Mode instance. The Alias Prefix for a tenant is
determined automatically by the A4C Portal when the tenant is
Tenant List
created.
Licensed The total number of licenses that have been purchased and
made available for the tenant.
15
DIDs The tenant DID numbers and ranges. This column is only
updated when the dealer has updated the DIDs via the A4C
Portal.
Search Displays search fields and activation buttons for the list. Search
fields:
Tenant Name: A tenant name as defined in the first column
of the list. Substrings are accepted.
Alies Prefix: An alias prefix as defined in the second column.
Search activation buttons:
Apply: Apply the filter to the list, and only display matches.
Show All: Return to displaying the full list.
Tenant List
15
Aeonix Multi-Tenant Mode assigns a default dial plan to Tenants. The System and
Default Tenant Dial Plans are accessed at System > Dial Plan List as shown in the
following figure.
Click on System Dial Plan in the Dial Plan List to display the System Dial Plan page
as shown in the following figure.
Dial Plan
15
The System Dial Plan in Aeonix Multi-Tenant Mode includes the following Patterns:
8xxx2xx
8xxx3xx
8xxx4xx
8xxx5xx
89999xx
68xxxxxx (aliases on a Trunk Group to Voice for “Direct Transfer to Voice
Mail”)
The Dial Plans assigned to Tenants are not modifiable by the dealer /
administrator.
The Default Tenant Dial Plan can be opened in Settings > Dial Plan > Dial Plan
List as shown in the following figure.
The Default Tenant Dial Plan is assigned automatically to the Default Provisioning
Profile as shown in the following figure.
Dial Plan
15
The assigned Default Tenant Dial Plan cannot be changed by the dealer.
Dial Plan
15
Aeonix Multi-Tenant Mode supports a maximum of 998 Tenants. The list of defined
Tenant User Profiles can be seen at Settings > Profiles > User Profile List as shown
in the following figure.
Each User Profile is associated with its corresponding User Outgoing Call Routing
definition. The association is read-only and cannot be changed by the dealer. The
dealer can modify Tenant User Profile details in the User Profile page, but cannot
select a different User Outgoing Call Routing.
Tenants and Users
15
A Tenant is created with a default Outgoing Call Routing Profile as shown in the
following figure.
Click on the Name of the Outgoing Call Profile for a given Tenant to see the Outgoing
Call Routing Profile as shown in the following figure.
The dealer can add Dialed Number Manipulations Rules as required for an
individual Tenant.
The Dialed Number Manipulation Rules of each tenant's outgoing Call Routing
Profile will automatically include the following lines. These lines cannot be modified.
"If DNIS 'is between 76-77 then Add prefix 1 and Remove first 1 digits and
stop processing other rules.
If DNIS 'is between' 200-599 then add prefix <Tenant's Prefix> and stop
processing other rules.
If DNIS 'is between' 7000-7999 then add prefix 7<Tenant's Prefix> and stop
Tenants and Users
The User List displays all users (end points) in the dealer’s Aeonix Multi-Tenant Mode
instance. The assignment of each user to a Tenant is shown in the Tenant Name
column.
Note that the alias of a user is composed of the Tenant-specific Alias prefix and the 3
digits of the user phone number.
New User
Tenants and Users
To add a new User (end point) to a Tenant, choose User > Add User. The New User
page is displayed as shown in the following figure.
15
The administrator specifies the Tenant Name for the new user, as well as any other
details for the user. When adding an Aeonix Internal Alias, the Tenant-specific prefix
is automatically included as shown in the following figure.
In Aeonix Multi-Tenant Mode you cannot add an Alias to a user until you
have defined a Tenant for the user. The system will display an error message
in the New User page as shown in the following figure.
In Aeonix Multi-Tenant Mode the Import and Export processes include the Tenant
field, and the alias field has the Multi-Tenant Mode style structure of 8xxxyyy where
8xxx is the Tenant-specific Alias-prefix, and yyy is the 3-digit user phone number.
Aeonix checks the validity of the User Tenant and Alias fields during Import: User
Tenant is a Tenant Name, and the Internal Alias must include a Tenant-specific Alias
prefix in the form 8xxx corresponding to the Tenant Name. If any records have
problematic fields, an error message is displayed on the Import / Export Users page
for that record, and the record is not added / updated to the database.
Tenants and Users
15
In Aeonix Multi-Tenant Mode the User Permissions page now only displays users
from the same Tenant as the user that is being defined, in the Unassigned list box.
In Aeonix Multi-Tenant Mode, the Tenant field has been added to most service
entities, and the Search function has been added to allow viewing user instances for a
Tenant in service instances.
Aeonix Multi-Tenant Mode has a reduced set of Aeonix Services for smaller
tenant telephony systems. The following Aeonix Services are not available in
a tenant system:
ACC
Call Group
Call Recording
CTI
Dispatch Console
E911 database Connector
Emergency Conference
Hospitality
Virtual Endpoints
LDAP
In Multi-Tenant Mode the Services List appears as shown in the following figure.
Service List
15
In Multi-Tenant Mode most Service pages display the additional Tenant field, which
allows the dealer to select which tenant services he wishes to review or edit. The
following sections describe specific changes to Service pages that support
Multi-Tenant Mode.
Service List
15
The ACD Group List page now displays the Tenant Name column as shown in the
figure below.
Service List
15
Click on the Search button to display the Search fields as shown in the figure above.
You can search by Tenant Name, or by Alias, or by both combined. After specifying
the search criteria, click on the Apply button. The list of ACD Group aliases will be
filtered according to the search criteria and redisplayed. Click the Show All button to
clear the filter and display all ACD Group aliases.
Service List
15
Service List
15
In Aeonix Multi-Tenant Mode, the New ADC Group page now requires you to
specify the Tenant Name.
Service List
15
The Hunt Group List page now displays the Tenant Name column and the Search
facility as shown in the figure below.
Service List
15
In Aeonix Multi-Tenant Mode, the New Hunt Group page now requires you to
specify the Tenant Name.
The Suggest Available Aliases button and the Unassigned group members list box,
show only selections available for the Tenant that is defined in the Tenant Name field.
Service List
15
The Conference Call List now includes the Tenant Name column, and the Search
facility with Tenant Name field.
Click the Add button to create a new Conference Call. The New Conference Call
page is displayed as shown in the following figure.
Service List
15
The Suggest Available Aliases button, the Group Members, and Group Managers,
show only selections available for the Tenant that is defined in the Tenant Name field.
Service List
15
In the New Meet-Me Conference Configuration page the Suggest Available Aliases
button and the Owner field show only selections available for the Tenant that is
defined in the Tenant Name field, as shown in the following figure.
Service List
15
In the Music Source page the Tenant Name field is used to define the Tenant, and the
Assign MOH to Alias fields show the Tenant prefix that will be used in the
assignment, as shown in the following figure.
If you choose Range instead of Alias in the drop down list, the Start of Range and End
of Range fields also show the Tenant prefix.
Service List
15
Adding a new Page Queue Park / Pickup alias requires you to specify a Tenant as
shown in the following figure.
Service List
15
PnP / Auto Provisioning requires you to specify a Tenant. The Tenant prefix is
displayed in the User Alias Starts At field as shown in the following figure.
In Aeonix Multi-Tenant Mode, the Voicemail Service has a default alias of 8999999
and cannot be changed.
The administrator cannot Add or Delete aliases. The buttons on the Aliases panel are
greyed-out as shown in the following figure.
Service List
15
Adding a New Zone Page requires the administrator to define the Tenant in the
Tenant Name field. After the Tenant is defined, the Alias field displays the Tenant
prefix, and the Suggest Available Aliases function displays alias ranges for that
Tenant. Additionally, the Group Members Unassigned list and the Group Managers
Unassigned list display aliases from the defined Tenant.
Feature Codes
Aeonix completes the 3 digits of “destination” to a valid alias by adding the tenant
prefix of this user. The following figure shows the required System Dial Plan fields
for feature codes:
Phones
15
The administrator can program a button via 'User' and 'Alias' modes.
When the administrator selects 'User' mode, Aeonix admin only displays the
users of the phone's 'default user' tenant.
When the administrator selects 'Number' mode, type a 3-digit number. There is
no need to complete it to a 7-digit number.
The following figure shows programming a phone button via the Aeonix Admin in
Aeonix Multi-Tenant Mode.
If Aeonix does not find a match on any of the User Outgoing Call DNIS manipulation
Rule, then it assumes it is an external number. “Add Outside Number Access Code” is
set by default in Aeonix Multi-Tenant Mode.
Call Log and ANI of internal calls show the 3-digit number of the user.
SeaMail Operation
SeaMail includes the mailboxes of all users in the Aeonix Multi-Tenant Mode system.
The user’s mailbox is user alias 8xxxyyy. The user can only change their mailbox
preferences and listen to their messages.
The following phones and applications are not supported in Aeonix 5.1 Multi-Tenant
Mode:
MGCP Phones and GW
Navigator
Sea Attendant
ADC client
ACC agent
The following Aeonix features are not supported in Aeonix 5.1 Multi-Tenant Mode:
ACC
Call Group
Call Recording
CTI
Dispatch Console
E911 Database Connector
Emergency Conference
Hospitality
Virtual Endpoints
LDAP
VOIP FXS Provisioning
FXO
Phones
15
Glossary
ACD (Automatic Call In Automatic Call Distribution, an alias number is assigned for multiple users and user
Distribution)
groups. A call to this number is routed to the first available user (and not to all users
as with call groups). If all answering positions are busy, ACD plays a recorded
message or music and puts the caller on hold until an answering position becomes
available.
Aeonix Contact Center An intuitive, flexible and easy to use all in one contact center management solution for
(ACC)
Aeonix systems.
Alias The number used to reach a specific Aeonix user from within the system. Unlike a
traditional extension number, an alias is associated with the user, rather than a
particular telephone or wall outlet. If a user's cellular phone or other external devices
are defined in Aeonix, a call to the alias of this user can also ring on these devices.
Aliases can also be assigned to trunk groups or to certain services, such as call groups,
ACD groups, conference call servers, mobility services, and voicemail servers.
ARS (Automatic Route A feature used for optimizing the routing of outgoing calls. Automatic Route Selection
Selection)
allows administrators to specify the channels (trunk groups) through which calls are
transmitted, depending on the prefix of the call destination.
Auto answer A feature that sets the phone to automatically accept incoming calls.
Call forwarding Redirects an incoming call to another alias or external number. Call forwarding and
call rejection are part of incoming call routing.
Call group In a call group, an alias number is assigned for multiple users and user groups. When
this number is called, the telephones of all users included in the call group ring until
Glossary of Terms
Call muting A feature that turns off the microphone before or during a conversation, so that the
other party cannot hear the user.
Dial The entering of the relevant digits for operating a feature or sending a call to a
16
Feature A telephony capability Aeonix supports that can be activated by dialing a code.
Gateway A network device that translates call data between networks or protocols in real time.
For example, data can be translated between the public/private switched telephone
network (PSTN) and an IP network. For a VoIP gateway, the primary functions include
voice and fax compression/decompression, packetization, call routing, and control
signaling. Gateways include interfaces to external controllers (gatekeepers or
softswitches), billing systems, and network management systems.
Hot station A telephone that automatically dials to a specified number when the handset is lifted
or a key is pressed. The routing can take place immediately upon off-hook or after a
programmable delay to allow the user to start dialing.
Idle The state of a phone or trunk that is not ringing or busy, and is therefore available for
use.
Incoming call routing The way incoming calls are forwarded or rejected. Incoming calls can be rejected or
routed to different destinations depending on user availability, caller, and call time.
Internal phone / alias A phone that is directly connected to Aeonix, or connected through a Wave Gateway
/ SIP gateway. Internal callers can reach the user of this phone by dialing the user’s
alias number without prefixes.
Typically, office phones are internal phones.
License key A software-based license key that holds the number of purchased Aeonix and SeaMail
(optional) licenses. The license key must be uploaded and deployed on the designated
Aeonix License Key server.
Lightweight Directory A networking protocol for querying and modifying directory services running over
Access Protocol (LDAP)
TCP/IP. This feature enables managers to quickly and conveniently import new users
or to update details of existing users.
Location Setting that indicates the country and area in which a phone or trunk is located and
Glossary of Terms
Long distance access code Code dialed to make long distance calls.
MAC (Media Access A unique hardware address burned on a specific phone, computer, gateway, or other
Control) Address
hardware device.
16
Music on hold A service that plays music or a message to callers while they are on hold or transferred
to another number. Music on Hold indicates to callers that they are still connected and
makes the waiting time appear shorter, thereby causing them to stay longer on the line.
Off-hook The state of a phone when its cradle is lifted. Off-hook provides the dial tone, enabling
you to dial or activate a feature.
On-hook The state of a phone when its phone handset is in its cradle.
Outgoing call routing A set of parameters and rules that define the way outgoing calls are routed. Outgoing
call routing includes ARS and hot station definitions, caller ID display parameters, and
rules for manipulating call dial numbers.
Phone The actual hardware or software that “rings” when called. A phone can be:
An MGCP keyset, such as: FlexSet-IP 280S, T207M, T208M, T207M/NP,
T208M/BL
A digital keyset connected through a Wave Gateway, such as: FlexSet 120,
120D, 120L, 120S, 121S, 280, 280D, 280D-HS, 280S, 281S, DKT, and
DST
A SIP phone, such as: Tadiran SIP phones and P-Series phones
An analog phone SLT connected through a gateway, such as Wave Gateway
A softphone application on the user’s workstation, such as: Bria, SeaBeam
and FlexIP SoftPhone (FLIPS). Glossary of Terms
If a default user has been defined, a newly connected phone can be used to
make calls to other users in the network. To receive calls, however, the phone
must first be associated with a specific user.
Phone profile Defines the basic behavior of a telephone for a user, as well as the functions of the
phone’s programmable buttons. Currently only in use for MGCP keysets (FlexSet-IP
16
280S, T207M, T208M, T207M/NP, T208M/BL) and digital keysets (FlexSet 120,
Pickup group A call to a member of a pickup group can be retrieved by any member dialing the
group alert call pickup code.
Profile A set of parameter values that can be associated with an Aeonix entity. There are
dedicated profile types for users and for trunk groups.
PSAP (Public Safety An emergency call center to which 911 calls are routed.
Answer Point)
Schedule A set of time frames for special weekdays, dates, or hours. Schedules are used for
timing of call routing activities.
Sea Attendant An advanced desktop unified communications manager application for operators that
runs on top of the Aeonix system.
Sea Navigator A multi-media communications desktop application that runs on top of Aeonix.
Service A centralized application required for using specific Aeonix features and capabilities.
SIP Session Internet Protocol (SIP). A signaling protocol for Internet conferencing,
telephony, presence, events notification and instant messaging. The Aeonix system
supports telephones, gateways, and applications that comply with SIP. The Aeonix
system supports SIP phones such as: Tadiran SIP phones and P-Series phones.
Soft key For a telephone with a display panel, a key at the bottom/top/side of the panel used to
directly activate the currently displayed feature.
Softphone An application that simulates a real phone and runs on a general purpose workstation,
rather than a dedicated telephony device. It is usually used with a headset connected
to the sound card of the computer. The Aeonix system supports softphone applications
such as: SeaBeam and FlexIP.
Station Coral legacy phones connected to Aeonix through a Wave Gateway are also referred
to as stations.
Subnet mask A mask used to tell how many places (bits) in an IP address identify the subnetwork,
Glossary of Terms
Template A set of parameter values that defines the initial default values for new phones,
gateways, and trunks.
Transfer/Xfer While engaged in a call, a user can initiate this feature by pressing the XFER
(Transfer) key. XFER has a distinctive dial tone and allows transfer of the call or the
activation of a feature. XFER puts the second party on hold and provides a tone or
plays a message.
Trunk An external line from the phone company that terminates at the customer’s location.
Trunk group A gateway or telephony system connected to Aeonix that usually has a unique alias
number (or multiple numbers) defined and is assigned to one or more trunks.
UM (Unified Messaging) A feature enabling users to receive voice messages, faxes, and emails at one unified
access point.
UGW (Universal Gateway A Coral-internal gateway enabling the Coral system to operate with Aeonix and IP
card)
phones using the QSIG networking protocol.
ULA group A ULA group is a group of users in which an incoming call can ring, as well as flash
a programmed shared line button, at the devices of these users. ULA group members
can also place calls on behalf of their group.
Each ULA group consists of its group owner and one or more regular members (up to
50 members per group). The same user can be the owner of one ULA group only.
User An individual connected to the Aeonix system that usually has one or more unique
alias numbers defined and is associated with one or more phones.
User group A collection of users. User groups allow administrators to treat multiple users as one
unit.
Voicemail A centralized system (such as SeaMail) of managing telephone messages for a large
group of people. The system stores incoming messages in personalized mailboxes
associated with the user’s phone number.
Wave Gateway A Coral IPx or FlexiCom unit that has been modified to be controlled by Aeonix,
Glossary of Terms
enabling Aeonix to integrate legacy IPx or FlexiCom legacy hardware and equipment.
All Aeonix features are applied to the legacy trunks and phones connected to the Wave
Gateway.
16
USA +1-678-506-7200
Russia +7-495-7750855
China +86-10-58696418