<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.innovaphone.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Erik</id>
	<title>innovaphone wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.innovaphone.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Erik"/>
	<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Special:Contributions/Erik"/>
	<updated>2026-05-09T23:42:56Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Howto:Trizwo_Jitsi_App_-_trizwo_GmbH_IT_%26_Communication_-_Partner_App&amp;diff=60925</id>
		<title>Howto:Trizwo Jitsi App - trizwo GmbH IT &amp; Communication - Partner App</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Howto:Trizwo_Jitsi_App_-_trizwo_GmbH_IT_%26_Communication_-_Partner_App&amp;diff=60925"/>
		<updated>2022-01-26T13:20:04Z</updated>

		<summary type="html">&lt;p&gt;Erik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Trizwo_Jitsi_App_Logo.png||200px|right]]&lt;br /&gt;
&lt;br /&gt;
==Product Name==&lt;br /&gt;
&amp;lt;!-- Mandatory topic. --&amp;gt;&lt;br /&gt;
[https://www.trizwo.de/apps/trizwo-jitsi-app trizwo Jitsi App]&lt;br /&gt;
&lt;br /&gt;
==Certification Status==&lt;br /&gt;
&amp;lt;!-- do not remove comment. Will be added by innovaphone upon document check &amp;amp; app availablity on appstore --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
{{Template:Compat_Status_referral_app_new}}&lt;br /&gt;
Documentation of this product has been finalized January 11th, 2022.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;Not yet given due to missing app in store&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Category==&lt;br /&gt;
&amp;lt;!-- Do not change this section and do not remove comments. Will be done by innovaphone upon document check --&amp;gt;&lt;br /&gt;
[[Category:Partner_Apps|{{PAGENAME}}]]&lt;br /&gt;
{{Category:3rdParty_Conferencing_/_Video_Systems}}&lt;br /&gt;
[[Category:3rdParty_Conferencing_/_Video_Systems|{{PAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
==Vendor==&lt;br /&gt;
&amp;lt;!-- Mandatory topic. --&amp;gt;&lt;br /&gt;
[[Image:Trizwo_Logo_horizontal.png]] [http://www.trizwo.de trizwo GmbH]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;!-- Mandatory topic. --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Give description about the product, benefits, other information to mention to understand main product purpose --&amp;gt;&lt;br /&gt;
&amp;lt;!-- place optional product logo or functional overwiew. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The trizwo Jitsi App allows to join Jitsi videoconferences from inside innovaphone myApps. It consists of an administrator part and a user part.&lt;br /&gt;
&lt;br /&gt;
==Functions==&lt;br /&gt;
&amp;lt;!-- Mandatory topic. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Short summary of the most important features:&lt;br /&gt;
*video call&lt;br /&gt;
*chat&lt;br /&gt;
&lt;br /&gt;
With the trizwo Jitsi App videoconference rooms are simple to create and operate for adminitrators. Just the server name has to be entered to create a room link. Additionally, it is possible to create various rooms with different categories which are all saved in the Jitsi App. &lt;br /&gt;
Users will be able to access all rooms in the app for which they are authorized. They are able to enter a videoconference by merely clicking on the room button or link.&lt;br /&gt;
(Extensions of additional features are in process.)&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;!-- Mandatory topic. --&amp;gt; &lt;br /&gt;
&amp;lt;!-- If not applicable, note none --&amp;gt;&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
==Versions==&lt;br /&gt;
&amp;lt;!-- Mandatory topic. --&amp;gt;&lt;br /&gt;
&amp;lt;!-- If not present or outdated innovaphone FW is used, no certificate will be given at all --&amp;gt;&lt;br /&gt;
===Compatible innovaphone firmware versions===&lt;br /&gt;
&amp;lt;!-- List compatible major innovaphone firmware versions. Several listings are valid --&amp;gt;&lt;br /&gt;
* innovaphone V13r2&lt;br /&gt;
&lt;br /&gt;
===Application versions used for interop testing===&lt;br /&gt;
&amp;lt;!-- Give used versions for testing of both innovaphone and 3rd-pty product --&amp;gt;&lt;br /&gt;
&amp;lt;!-- replace 3rd-Pty-Application by real name --&amp;gt;&lt;br /&gt;
* trizwo Jitsi App: 131004 sr10&lt;br /&gt;
&amp;lt;!-- adjust tested innovaphone FW --&amp;gt;&lt;br /&gt;
* innovaphone V13r2 sr6&lt;br /&gt;
&lt;br /&gt;
==Configuration==&lt;br /&gt;
&amp;lt;!-- Mandatory topic. --&amp;gt; &lt;br /&gt;
&amp;lt;!-- Describe configuration steps to be done for both innovaphone and 3rd-pty application --&amp;gt;&lt;br /&gt;
&amp;lt;!-- It is required to provide a PDF-formatted config document. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- List the config steps by adding text &amp;amp; pictures --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Name used APIs to be activated in ap-objects --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- If not present, no certificate will be given at all --&amp;gt;&lt;br /&gt;
&amp;lt;!-- in any case you must be aware of the fact that any questions concerning configuration issues will be directly forwarded by innovaphone to you as manufacturer --&amp;gt;&lt;br /&gt;
For configuration, please refer to [https://www.trizwo.de/apps/trizwo-jitsi-app the manual on our website].&lt;br /&gt;
&lt;br /&gt;
==Contact==&lt;br /&gt;
&amp;lt;!-- by vendor:&lt;br /&gt;
   - add name, address, phone, fax, email, web of primary recommended sales contact&lt;br /&gt;
     if suitable, you may consider specifying several contacs, depending on your sales structure &lt;br /&gt;
     (e.g. by country or vertical market)&lt;br /&gt;
   - in case of a customer testimonial the contact details of the reseller are not disclosed here. As contact person should act sales@innovaphone.com. In order to find the reseller responsible for this product, enter also the corresponding mantis ticket number in invisible tags. &lt;br /&gt;
  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| colspan=99 | trizwo GmbH IT &amp;amp; Communication &lt;br /&gt;
|-&lt;br /&gt;
| colspan=99 | Biedenkamp 1A&lt;br /&gt;
|-&lt;br /&gt;
| colspan=99 | 21509, Glinde&lt;br /&gt;
|-&lt;br /&gt;
| Tel: || +49 40 611980 0&lt;br /&gt;
|-&lt;br /&gt;
| Fax: || +49 40 611980 21 0&lt;br /&gt;
|-&lt;br /&gt;
| Mail: || [mailto:info@trizwo.de info@trizwo.de]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Compat|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Reference12r1:Concept_Reverse_Proxy&amp;diff=50843</id>
		<title>Reference12r1:Concept Reverse Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Reference12r1:Concept_Reverse_Proxy&amp;diff=50843"/>
		<updated>2018-12-12T08:11:44Z</updated>

		<summary type="html">&lt;p&gt;Erik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category: Concept|Reverse Proxy]]&lt;br /&gt;
The Reverse Proxy is a software module, which is available on innovaphone gateways. It is designed to allow safe access to services of the innovaphone PBX from the public internet. To accomplish this the gateway must be accessible from the public internet either by NAT port forwarding, or directly. The reverse proxy forwards traffic to configurable destinations.&lt;br /&gt;
The access to internal destinations can be limited in several ways and algorithms to detect attacks are implemented, which are used to put ip addresses into a blacklist.&lt;br /&gt;
The reverse proxy supports H.323, SIP, HTTP and LDAP over TCP or TLS.&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
&lt;br /&gt;
The reverse proxy only accepts any connections on the supported protocols, if the port numbers for these protocols are configured. The well-known port numbers or &lt;br /&gt;
non standard port numbers can be used for these protocols.&lt;br /&gt;
&lt;br /&gt;
A timeout may be configured until which an entry in the blacklist is removed automatically.&lt;br /&gt;
&lt;br /&gt;
A threshold suspicious requests per minute can be used to tune detection of attacks.&lt;br /&gt;
&lt;br /&gt;
Forwarding to internal destinations is based on the addressed host. For this the received requests are analysed and for each supported protocol different elements are used to identify the addressed host.&lt;br /&gt;
&lt;br /&gt;
== Basic Operation ==&lt;br /&gt;
&lt;br /&gt;
Connections are accepted on the configured port. The received protocol is analysed to determine the addressed host and a internal connection is established to this host. If the incoming connection is TCP for the internal connection TCP is used as well, if the external connection is TLS, for the internal connection TLS is used. If only TCP or only TLS is configured for the internal connection it is used regardless if the incoming connection was TCP or TLS.&lt;br /&gt;
&lt;br /&gt;
If the Check Certificate checkmark is set, for the internal connection TLS is used only if the received certificate matches the user name within the protocol. This way a host receiving a request through the Reverse Proxy using TLS can assume that the connection was authenticated using a valid certificate, which matches the user.&lt;br /&gt;
&lt;br /&gt;
Access to a configured protocol may be limited to certain networks. This is done by configuring a list of networks in a addr:mask form.&lt;br /&gt;
&lt;br /&gt;
=== H.323 ===&lt;br /&gt;
&lt;br /&gt;
For H.323 registrations, the gatekeeper identifier received in GatekeeperRequest or RegistrationRequest messages is matched to the Name configured for the host. Only H.323 over H.225 (H.450-17) is supported.&lt;br /&gt;
&lt;br /&gt;
For calls without registration a destination in the for &amp;lt;user&amp;gt;@&amp;lt;domain&amp;gt; is expected. &amp;lt;domain&amp;gt; is matched to the Name configured for the host. This can be used for H.323 open federation.&lt;br /&gt;
&lt;br /&gt;
=== SIP ===&lt;br /&gt;
&lt;br /&gt;
For SIP registration the domain part of the FROM header of a REGISTER message is matched to the Name of the configured host.&lt;br /&gt;
&lt;br /&gt;
Also SIP INVITE messages are forwarded by the Reverse Proxy, if the FROM URI matches with the configured host.&lt;br /&gt;
&lt;br /&gt;
=== HTTP ===&lt;br /&gt;
&lt;br /&gt;
For HTTP requests the host header is matched to the Name of the configured host. If within a single TCP/TLS connection requests are sent to different hosts, the outgoing connections are terminated and for the request to the other host a new connection is established.&lt;br /&gt;
&lt;br /&gt;
The path which may be accessed can be restricted, by configuring the allowed path. If the pass is configured with a trailing &#039;/&#039; no access to folders inside this path is allowed.&lt;br /&gt;
&lt;br /&gt;
=== LDAP ===&lt;br /&gt;
&lt;br /&gt;
For LDAP the LDAP_BIND message is analysed. A user in the form &amp;lt;domain&amp;gt;\&amp;lt;user&amp;gt; is expected and the &amp;lt;domain&amp;gt; is matched to the domain part of the name of the configured host.&lt;br /&gt;
&lt;br /&gt;
== Attack detection ==&lt;br /&gt;
&lt;br /&gt;
Attacks are detected based on the frequency of unsuccessful requests. If more then a configured number of such requests are received within a sliding window of 1min the originating IP address is put into the black list.&lt;br /&gt;
&lt;br /&gt;
To provide some indication about current suspicious requests a list with the the 10 remote IP addresses with the highest number of requests is displayed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Blacklist/Whitelist ==&lt;br /&gt;
&lt;br /&gt;
A blacklist/whitelist mechanism is used to block IP addresses or grant access to IP addresses regardless of attack detection. An entry into list can be configured with a timeout, so that it will be removed after the timeout automatically. Entries generated by the attack detection use the configured timeout.&lt;br /&gt;
&lt;br /&gt;
A blacklist entry can be easily changed to a whitelist entry by setting the whitelist checkmark.&lt;br /&gt;
&lt;br /&gt;
== Reverse Proxy with innovaphone PBX ==&lt;br /&gt;
&lt;br /&gt;
The innovaphone PBX has some features implemented especially for integration with the Reverse Proxy.&lt;br /&gt;
&lt;br /&gt;
=== Controlling Authentication ===&lt;br /&gt;
&lt;br /&gt;
On the innovaphone PBX up to 8 Reverse Proxies can be configured which are used to forward requests to the PBX. A Reverse Proxy is identified by its IP address. Optionally a certificate name can be configured for a Reverse Proxy, to verify that the connection really sent by the Reverse Proxy and not just relayed by some other equipment.&lt;br /&gt;
&lt;br /&gt;
Registrations through a Reverse Proxy are only accepted if the Reverse Proxy flag at the destination device is set. This way no unexpected registration is possible. When the Assume TLS checkmark is set, a registration received from the Reverse Proxy via TLS is assumed to be authenticated with a proper TLS certificate on the Reverse Proxy already. So no further authentication is required on the PBX. Such a registration is accepted also if TLS Only is set on the device.&lt;br /&gt;
If a registration from the Reverse Proxy is received via TCP password authentication is required.&lt;br /&gt;
&lt;br /&gt;
=== Support for multiple Slave PBXs ===&lt;br /&gt;
&lt;br /&gt;
To address a specific Slave PBX through a Reverse Proxy, a GK-ID with the format &amp;lt;domain&amp;gt;/&amp;lt;location&amp;gt; can be used. A PBX ignores anything in the GK-ID after the &#039;/&#039;. This way in the Reverse Proxy for each slave PBX sharing all the same domain a separate host entry can be configured.&lt;br /&gt;
&lt;br /&gt;
On the phone this format can be used to address the correct destination PBX.&lt;br /&gt;
&lt;br /&gt;
If the registration redirect mechanism shall be used, so that all client can share the same configuration, normally the PBX redirects to the IP address of the correct slave. In this case this does not work since from the public internet the internal addresses are inaccessible, so DNS Names must be configured on all PBXs. In the external DNS these DNS names must all be resolved to the Remote Proxy. The PBX changes the redirect GK-ID to contain the new location in the above format.&lt;br /&gt;
&lt;br /&gt;
The physical location of the phone in case of redirection is the PBX to which the first registration was made. The PBX uses the &amp;lt;physical-location&amp;gt;@domain... format of the GK-ID on redirection.&lt;br /&gt;
&lt;br /&gt;
Physical location and registration PBX can be configured manually on the phone by using a GK-ID of &amp;lt;physical-location&amp;gt;@domain/&amp;lt;registration PBX&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Support for Standby PBXs ===&lt;br /&gt;
&lt;br /&gt;
To address different PBXs for the primary and the alternate registration different GK-IDs have to be used for the primary and alternate (standby) PBX in the form of &amp;lt;domain&amp;gt;/&amp;lt;location&amp;gt; with a different location for primary and alternate. This way in the reverse proxy different host entries can be configured to address the active and standby PBX.&lt;br /&gt;
To configure this on innovaphone endpoints a GK-ID in the form &amp;lt;domain&amp;gt;/&amp;lt;primary&amp;gt;:&amp;lt;alternate&amp;gt; can be configured. For the primary registration &amp;lt;domain&amp;gt;/&amp;lt;primary&amp;gt; and for the alternate registration &amp;lt;domain&amp;gt;/&amp;lt;alternate&amp;gt; is then used.&lt;br /&gt;
&lt;br /&gt;
=== SIP Federation over Reverse Proxy not functional ===&lt;br /&gt;
&lt;br /&gt;
Reverse Proxy supports SIP INVITE this allow us to have a SIP Federation interface working through the RP to make audio/video and chat calls in theory however SIP SUBSCRIBE message isn&#039;t supported by the RP this means that Presence sharing doesn&#039;t work so SIP Federation will not work 100%.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Reference12r1:Concept_Reverse_Proxy&amp;diff=50842</id>
		<title>Reference12r1:Concept Reverse Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Reference12r1:Concept_Reverse_Proxy&amp;diff=50842"/>
		<updated>2018-12-12T08:11:00Z</updated>

		<summary type="html">&lt;p&gt;Erik: LDAP: Bind is matched to domain of the host, not to the name&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category: Concept|Reverse Proxy]]&lt;br /&gt;
The Reverse Proxy is a software module, which is available on innovaphone gateways. It is designed to allow safe access to services of the innovaphone PBX from the public internet. To accomplish this the gateway must be accessible from the public internet either by NAT port forwarding, or directly. The reverse proxy forwards traffic to configurable destinations.&lt;br /&gt;
The access to internal destinations can be limited in several ways and algorithms to detect attacks are implemented, which are used to put ip addresses into a blacklist.&lt;br /&gt;
The reverse proxy supports H.323, SIP, HTTP and LDAP over TCP or TLS.&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
&lt;br /&gt;
The reverse proxy only accepts any connections on the supported protocols, if the port numbers for these protocols are configured. The well-known port numbers or &lt;br /&gt;
non standard port numbers can be used for these protocols.&lt;br /&gt;
&lt;br /&gt;
A timeout may be configured until which an entry in the blacklist is removed automatically.&lt;br /&gt;
&lt;br /&gt;
A threshold suspicious requests per minute can be used to tune detection of attacks.&lt;br /&gt;
&lt;br /&gt;
Forwarding to internal destinations is based on the addressed host. For this the received requests are analysed and for each supported protocol different elements are used to identify the addressed host.&lt;br /&gt;
&lt;br /&gt;
== Basic Operation ==&lt;br /&gt;
&lt;br /&gt;
Connections are accepted on the configured port. The received protocol is analysed to determine the addressed host and a internal connection is established to this host. If the incoming connection is TCP for the internal connection TCP is used as well, if the external connection is TLS, for the internal connection TLS is used. If only TCP or only TLS is configured for the internal connection it is used regardless if the incoming connection was TCP or TLS.&lt;br /&gt;
&lt;br /&gt;
If the Check Certificate checkmark is set, for the internal connection TLS is used only if the received certificate matches the user name within the protocol. This way a host receiving a request through the Reverse Proxy using TLS can assume that the connection was authenticated using a valid certificate, which matches the user.&lt;br /&gt;
&lt;br /&gt;
Access to a configured protocol may be limited to certain networks. This is done by configuring a list of networks in a addr:mask form.&lt;br /&gt;
&lt;br /&gt;
=== H.323 ===&lt;br /&gt;
&lt;br /&gt;
For H.323 registrations, the gatekeeper identifier received in GatekeeperRequest or RegistrationRequest messages is matched to the Name configured for the host. Only H.323 over H.225 (H.450-17) is supported.&lt;br /&gt;
&lt;br /&gt;
For calls without registration a destination in the for &amp;lt;user&amp;gt;@&amp;lt;domain&amp;gt; is expected. &amp;lt;domain&amp;gt; is matched to the Name configured for the host. This can be used for H.323 open federation.&lt;br /&gt;
&lt;br /&gt;
=== SIP ===&lt;br /&gt;
&lt;br /&gt;
For SIP registration the domain part of the FROM header of a REGISTER message is matched to the Name of the configured host.&lt;br /&gt;
&lt;br /&gt;
Also SIP INVITE messages are forwarded by the Reverse Proxy, if the FROM URI matches with the configured host.&lt;br /&gt;
&lt;br /&gt;
=== HTTP ===&lt;br /&gt;
&lt;br /&gt;
For HTTP requests the host header is matched to the Name of the configured host. If within a single TCP/TLS connection requests are sent to different hosts, the outgoing connections are terminated and for the request to the other host a new connection is established.&lt;br /&gt;
&lt;br /&gt;
The path which may be accessed can be restricted, by configuring the allowed path. If the pass is configured with a trailing &#039;/&#039; no access to folders inside this path is allowed.&lt;br /&gt;
&lt;br /&gt;
=== LDAP ===&lt;br /&gt;
&lt;br /&gt;
For LDAP the LDAP_BIND message is analysed. A user in the form &amp;lt;domain&amp;gt;\&amp;lt;user&amp;gt; is expected and the &amp;lt;domain&amp;gt; is matched to the domain part of Name of the configured host.&lt;br /&gt;
&lt;br /&gt;
== Attack detection ==&lt;br /&gt;
&lt;br /&gt;
Attacks are detected based on the frequency of unsuccessful requests. If more then a configured number of such requests are received within a sliding window of 1min the originating IP address is put into the black list.&lt;br /&gt;
&lt;br /&gt;
To provide some indication about current suspicious requests a list with the the 10 remote IP addresses with the highest number of requests is displayed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Blacklist/Whitelist ==&lt;br /&gt;
&lt;br /&gt;
A blacklist/whitelist mechanism is used to block IP addresses or grant access to IP addresses regardless of attack detection. An entry into list can be configured with a timeout, so that it will be removed after the timeout automatically. Entries generated by the attack detection use the configured timeout.&lt;br /&gt;
&lt;br /&gt;
A blacklist entry can be easily changed to a whitelist entry by setting the whitelist checkmark.&lt;br /&gt;
&lt;br /&gt;
== Reverse Proxy with innovaphone PBX ==&lt;br /&gt;
&lt;br /&gt;
The innovaphone PBX has some features implemented especially for integration with the Reverse Proxy.&lt;br /&gt;
&lt;br /&gt;
=== Controlling Authentication ===&lt;br /&gt;
&lt;br /&gt;
On the innovaphone PBX up to 8 Reverse Proxies can be configured which are used to forward requests to the PBX. A Reverse Proxy is identified by its IP address. Optionally a certificate name can be configured for a Reverse Proxy, to verify that the connection really sent by the Reverse Proxy and not just relayed by some other equipment.&lt;br /&gt;
&lt;br /&gt;
Registrations through a Reverse Proxy are only accepted if the Reverse Proxy flag at the destination device is set. This way no unexpected registration is possible. When the Assume TLS checkmark is set, a registration received from the Reverse Proxy via TLS is assumed to be authenticated with a proper TLS certificate on the Reverse Proxy already. So no further authentication is required on the PBX. Such a registration is accepted also if TLS Only is set on the device.&lt;br /&gt;
If a registration from the Reverse Proxy is received via TCP password authentication is required.&lt;br /&gt;
&lt;br /&gt;
=== Support for multiple Slave PBXs ===&lt;br /&gt;
&lt;br /&gt;
To address a specific Slave PBX through a Reverse Proxy, a GK-ID with the format &amp;lt;domain&amp;gt;/&amp;lt;location&amp;gt; can be used. A PBX ignores anything in the GK-ID after the &#039;/&#039;. This way in the Reverse Proxy for each slave PBX sharing all the same domain a separate host entry can be configured.&lt;br /&gt;
&lt;br /&gt;
On the phone this format can be used to address the correct destination PBX.&lt;br /&gt;
&lt;br /&gt;
If the registration redirect mechanism shall be used, so that all client can share the same configuration, normally the PBX redirects to the IP address of the correct slave. In this case this does not work since from the public internet the internal addresses are inaccessible, so DNS Names must be configured on all PBXs. In the external DNS these DNS names must all be resolved to the Remote Proxy. The PBX changes the redirect GK-ID to contain the new location in the above format.&lt;br /&gt;
&lt;br /&gt;
The physical location of the phone in case of redirection is the PBX to which the first registration was made. The PBX uses the &amp;lt;physical-location&amp;gt;@domain... format of the GK-ID on redirection.&lt;br /&gt;
&lt;br /&gt;
Physical location and registration PBX can be configured manually on the phone by using a GK-ID of &amp;lt;physical-location&amp;gt;@domain/&amp;lt;registration PBX&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Support for Standby PBXs ===&lt;br /&gt;
&lt;br /&gt;
To address different PBXs for the primary and the alternate registration different GK-IDs have to be used for the primary and alternate (standby) PBX in the form of &amp;lt;domain&amp;gt;/&amp;lt;location&amp;gt; with a different location for primary and alternate. This way in the reverse proxy different host entries can be configured to address the active and standby PBX.&lt;br /&gt;
To configure this on innovaphone endpoints a GK-ID in the form &amp;lt;domain&amp;gt;/&amp;lt;primary&amp;gt;:&amp;lt;alternate&amp;gt; can be configured. For the primary registration &amp;lt;domain&amp;gt;/&amp;lt;primary&amp;gt; and for the alternate registration &amp;lt;domain&amp;gt;/&amp;lt;alternate&amp;gt; is then used.&lt;br /&gt;
&lt;br /&gt;
=== SIP Federation over Reverse Proxy not functional ===&lt;br /&gt;
&lt;br /&gt;
Reverse Proxy supports SIP INVITE this allow us to have a SIP Federation interface working through the RP to make audio/video and chat calls in theory however SIP SUBSCRIBE message isn&#039;t supported by the RP this means that Presence sharing doesn&#039;t work so SIP Federation will not work 100%.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Reference11r2:Interfaces/ETH/802.1X&amp;diff=50755</id>
		<title>Reference11r2:Interfaces/ETH/802.1X</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Reference11r2:Interfaces/ETH/802.1X&amp;diff=50755"/>
		<updated>2018-11-15T14:01:57Z</updated>

		<summary type="html">&lt;p&gt;Erik: Added a reference-link Howto:Security_works_with_innovaphone&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;&#039;&#039;&#039;EAP-MD5&#039;&#039;&#039;:&lt;br /&gt;
* &#039;&#039;&#039;User&#039;&#039;&#039; Enter the user/identity to authenticate with.&lt;br /&gt;
* &#039;&#039;&#039;Password&#039;&#039;&#039; Enter the shared secret for the MD5 challenge/response handshake.&lt;br /&gt;
;&#039;&#039;&#039;EAP-TLS&#039;&#039;&#039;:&lt;br /&gt;
The EAP-MD5 settings are going to reused for EAP-TLS needs. I.e. there&#039;s currently no extra setting for EAP-TLS. The configuration for an actual certificate, being fed into the EAP-TLS session, can be found at &#039;&#039;General/Certificates/Device Certificate&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;User&#039;&#039;&#039; Enter the user/identity&amp;lt;ref&amp;gt;EAP-TLS doesn&#039;t mandate that identity to necessarily be the same as the certificates subject/CN&amp;lt;/ref&amp;gt; to be sent within the EAP Identity request.&amp;lt;ref name=&amp;quot;user-pw&amp;quot;&amp;gt;A non-empty user/password just serves as an &amp;quot;on&amp;quot;-switch&amp;lt;/ref&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Password&#039;&#039;&#039; Enter arbitrary content.&amp;lt;ref name=&amp;quot;user-pw&amp;quot;/&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;General/Certificates/Device Certificate&#039;&#039;&#039;&lt;br /&gt;
;&#039;&#039;&#039;Proxy-Logoff&#039;&#039;&#039;:&lt;br /&gt;
If the phone&#039;s LAN-port got disconnected, EAPOL-Logoff messages are going to be sent on behalf of participants connected to the phone&#039;s PC-port.&lt;br /&gt;
An EAPOL-Logoff will be sent for each MAC-address learned from traversing EAPOL-Start messages.&lt;br /&gt;
&lt;br /&gt;
=Notes=&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
[[Concept_802.1X|Concept 802.1X]]&lt;br /&gt;
&lt;br /&gt;
[[Howto:802.1X_EAP-TLS_With_FreeRadius|Howto article: 802.1X EAP-TLS With FreeRadius]]&lt;br /&gt;
&lt;br /&gt;
[[Howto:Security_works_with_innovaphone#802.1X_port_security|Howto article:Security_works_with_innovaphone]]&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://wiki.innovaphone.com/index.php?title=Reference7:Configuration/General/SNMP&amp;diff=12884</id>
		<title>Reference7:Configuration/General/SNMP</title>
		<link rel="alternate" type="text/html" href="https://wiki.innovaphone.com/index.php?title=Reference7:Configuration/General/SNMP&amp;diff=12884"/>
		<updated>2009-01-19T09:25:20Z</updated>

		<summary type="html">&lt;p&gt;Erik: coreected download-link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The VoIP device allows the operating state to be monitored using &#039;&#039;&#039;SNMP&#039;&#039;&#039; (Simple Network Management Protocol with version 1.0). Standard MIB II and a manufacturer-specific MIB (Management Information Base) are supported. Detailed information about this MIB can be obtained from a certified innovaphone dealer or downloaded directly in the download area of the innovaphone homepage. It is included in the folder &amp;quot;tools&amp;quot; together with other applications and firmware. File name: INNO-MIB.TXT (http://download.innovaphone.com).&lt;br /&gt;
&lt;br /&gt;
 Note: SNMP traps will not be send before an uptime of 90 seconds(will be collected in this time) .Due to DHCP negotiation awaiting&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|valign=top nowrap=true|&#039;&#039;&#039;Community:&#039;&#039;&#039;&lt;br /&gt;
| If the standard community name public is not being used, a different community name can be entered in this field.&lt;br /&gt;
|-&lt;br /&gt;
|valign=top nowrap=true|&#039;&#039;&#039;Device Name:&#039;&#039;&#039;&lt;br /&gt;
| For more detailed information, a device name can be specified here for the SNMP agent.&lt;br /&gt;
|-&lt;br /&gt;
|valign=top nowrap=true|&#039;&#039;&#039;Contact:&#039;&#039;&#039;&lt;br /&gt;
| As can a contact person (Contact).&lt;br /&gt;
|-&lt;br /&gt;
|valign=top nowrap=true|&#039;&#039;&#039;Location:&#039;&#039;&#039;&lt;br /&gt;
| As can a location (Location).&lt;br /&gt;
|-&lt;br /&gt;
|valign=top nowrap=true|&#039;&#039;&#039;Authentication Trap:&#039;&#039;&#039;&lt;br /&gt;
| Access via SNMP is only possible if the correct community name is entered. If this check box is checked, a trap is generated in the case of access with an incorrect community name.&lt;br /&gt;
|-&lt;br /&gt;
|valign=top nowrap=true|&#039;&#039;&#039;Trap Destination:&#039;&#039;&#039;&lt;br /&gt;
| Destinations for trap messages also have to be defined if the device is to trigger the traps defined in the manufacturer-specific innovaphone MIB.&lt;br /&gt;
|-&lt;br /&gt;
|valign=top nowrap=true|&#039;&#039;&#039;Allowed Networks:&#039;&#039;&#039;&lt;br /&gt;
| To increase security, access to the device can be restricted by restricting SNMP access to a defined list of computers or IP address ranges. To disable SNMP access completely just enter &#039;&#039;0.0.0.0&#039;&#039; as &#039;&#039;Address&#039;&#039; and &#039;&#039;255.255.255.255&#039;&#039; as &#039;&#039;Mask&#039;&#039;.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;In V7 the SNMP Traps are enhanced&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
All events with type =Alarm are send via SNMP traps.&lt;br /&gt;
SNMP Trap delivers: code,severity,txt (e.g interface down) and Alarm –source (e.g IP0/ETH1)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    innoDiagAlarm TRAP-TYPE&lt;br /&gt;
        ENTERPRISE  innovaphone&lt;br /&gt;
        VARIABLES   { &lt;br /&gt;
              trapGaugeParm,          -- Alarm Code&lt;br /&gt;
              trapDisplayStringParm,  -- Alarm Source&lt;br /&gt;
              trapGaugeParm,          -- Severity: indeterminate(0),major(1),critical(2)&lt;br /&gt;
              trapDisplayStringParm   -- Alarm Text&lt;br /&gt;
        }&lt;br /&gt;
        DESCRIPTION&lt;br /&gt;
        &amp;quot;This trap corresponds to an alarm under Administration/Diagnostics/Alarms&amp;quot;&lt;br /&gt;
        ::= 6&lt;br /&gt;
&lt;br /&gt;
    innoDiagAlarmClear TRAP-TYPE&lt;br /&gt;
        ENTERPRISE  innovaphone&lt;br /&gt;
        VARIABLES   { &lt;br /&gt;
              trapGaugeParm,          -- Alarm Code&lt;br /&gt;
              trapDisplayStringParm   -- Alarm Source&lt;br /&gt;
        }&lt;br /&gt;
        DESCRIPTION&lt;br /&gt;
        &amp;quot;This trap corresponds to an alarm clearing under Administration/Diagnostics/Alarms&amp;quot;&lt;br /&gt;
        ::= 7&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
</feed>