Reference11r1:DECT/Config/System

From innovaphone-wiki

Jump to: navigation, search
There are other versions of this article: Reference | Reference9 | Reference10 | Reference11r1 (this version)

The general configuration of the DECT system, as well as the allocation of the DECT system name and password are performed in this submenu.

  • Name: The name of the DECT system. This name determines the name of the LDAP object in which the system parameters are stored. For a replication from an innovaphone PBX, a corresponding object must be created in the PBX.
  • Pwd: The password for the encryption of all passwords in the LDAP database. If the user data from an innovaphone PBX is replicated, the PBX password must be configured.
  • Sys-Mask: Without configuration of a Sys-Mask, the so-called connection handover is always used. With configuration of a Sys-Mask, the faster bearer handover between the DECT base station and the associated DECT repeater can be used.For understanding the Sys-mask and bearer handover please read Howto:Understanding DECT handover with IP1200
  • Subscriptions: The type of handset registrations (subscriptions).
    • With Activation: Subscriptions are allowed for known handsets with their IPEIs and after activation of single handsets. IPEIs can be configured in the anonymous page or in the user input screen with specification of an authentication code (AC). WARNING: For anonymous handsets the system AC must be set and used. The subscription time of two minutes MUST be started with the click on the IPEI link of the anonymous handsets or in the user list.
    • Allowed: Subscriptions of all handsets are allowed without activation, also for unknown handsets.
    • Disabled: Subscriptions are not possible.
  • Authentication Code: The authentication code that must be specified when subscribing handsets without an user assignment (anonymous).
  • Tones: Various tone schemas can be used here.
  • Enbloc Dialing: A checked check box enables enbloc dialling. This is only required if the gatekeeper or SIP provider does not support single digit dialling.
  • DTMF through RTP Channel: DTMF data is transmitted via the RTP media channel rather than via the signalling connection (TCP), if this check box is checked.
  • No Transfer on Hangup: A call is being made on a telephone. A second call is received on this telephone (call waiting); the first call is put on hold and the second call is answered. If the second call is ended by replacing the handset, then the first call on hold is signalled specially on this telephone.
    If this check box is checked, then a call on hold is ended.
  • Hold/Retrieve as Notify: If you press 'R' in order to put the remote party on hold, HOLD/RETRIEVE is signalied as notification (SIP/SDP: "a=sendonly" instead of "a=inactive"). It's a compatibility issue for some SIP based PBX's and you will need this option in very rary cases only.
  • No Display of Date and Time: Do not show date and time on the portable's display.
  • Idle Display Update: Enables idle display updates.
  • Display Original Called: If this is ticked, the original called instead of the diverted party is shown if the call is diverted twice.
  • Coder: The coder is the type of voice data compression. This coder is used for all external calls. If the remote VoIP device does not support the configured encoding, an encoding supported by both parties is negotiated.
  • Framesize: The packet size/interval of the voice data in ms. Bigger frame size will enlarge delay. Smaller frame size increases network and processing load. Find a compromise that fits your needs and resources.
  • Exclusive: A checked check box enables the selected coder as exclusive. In this way, use of the configured encoding (coder) is forced. This can result in call failure in the event that this device and the remote VoIP device do not support a common coder.
  • Silence Compression: A checked check box enables Silence Compression (SC). In other words, no voice data is transmitted during pauses in the conversation.
  • Secure RTP Key Exchange: The key exchange method is to be configured here. See the phone configuration for more details.
  • Secure RTP Cipher: It enables encrypted media streams (SRTP). For perfect privacy you must use encrypted signaling protocol (e.g. SIPS) to hide exchange of SRTP keys.
Personal tools