Information contained in this document is believed to be accurate and reliable at the time of
printing. However, due to ongoing product improvements and revisions, AudioCodes cannot
guarantee accuracy of printed material after the Date Published nor can it accept responsibility
for errors or omissions. Before consulting this document, check the corresponding Release
Notes regarding feature preconditions and/or specific support in this release. In cases where
there are discrepancies between this document and the Release Notes, the information in the
Release Notes supersedes that in this document. Updates to this document and other
documents as well as software files can be downloaded by registered customers at
http://www.audiocodes.com/downloads.
This document is subject to change without notice.
Date Published: November-14-2017
WEEE EU Directive
Pursuant to the WEEE EU Directive, electronic and electrical waste must not be disposed
of with unsorted waste. Please contact your local recycling authority for disposal of this
product.
Customer Support
Customer technical support and services are provided by AudioCodes or by an authorized
AudioCodes Service Partner. For more information on how to buy technical support for
AudioCodes products and for contact information, please visit our Web site at
www.audiocodes.com/support
.
Abbreviations and Terminology
Each abbreviation, unless widely used, is spelled out in full when first used.
Related Documentation
Manual Name
SIP Release Notes
Mediant 4000 E-SBC Hardware Installation Manu al
Complementary Guides
CLI Reference Guide
SNMP User's Guide
Note: The device is an indoor unit and therefore, must be installed only INDOORS. In
addition, Ethernet port interface cabling must be routed only indoors and must not exit
the building.
Note: The scope of this document does not fully cover security aspects for deploying
the device in your environment. Security measures should be done in accordance
Manual Name
AudioCodes Recommended Security Guideline s document.
Note: Throughout this manual, unless otherwise specified, the term device refers to
your AudioCodes product.
Note: Before configuring the device, ensure that it is installed correctly as instructed
in the HardwareInstallation Manual.
Note:
•This device includes software developed by the OpenSSL Project for use in the
OpenSSL Toolkit (http://www.openssl.org/).
•This device includes cryptographic software writ t en by Eric Young
(eay@cryptsoft.com).
Note: Some of the features listed in this document are available only if the relevant
License Key has been purchased from AudioCodes and installed on the device. For a
list of License Keys that can be purchased, please consult your AudioCodes sales
representative.
User's Manual 18 Document #: LTRT-40203
Page 19
User's Manual Notices
cense (LGPL), BSD and LDAP, which terms are located at:
code by contacting AudioCodes, by following the instructions available on
Enabling the HTTP Proxy Application (license ); Direct Media; Configuring SBC IP-
Note: OPEN SOURCE SOFTWARE. Portions of the software may be open source
software and may be governed by and distributed under open source licenses, such
as the terms of the GNU General Public License (GPL), the terms of the Lesser
General Public Li
http://www.audiocodes.com/support and all are incorporated herein by reference. If
any open source software is provided in object code, and its accompanying license
requires that it be provided in source code as well, Buyer may receive such source
AudioCodes website.
Document Revision Record
LTRT Description
41727 Initial document release for Version 7.2.
41729
Management (permitted user levels); Configuring TLS Certificate Contexts (TLS
versions); Configuring Physical Ethernet Ports (show command); Configuring
Underlying Ethernet Devices (max. VLANs); SIP Signaling Messag es (procedure);
First Incoming Packet Mechanism (NAT by Signali ng); Robust Receipt of Media
Streams by Media Latching (procedure); Configuring Firewall Settings (note);
Configuring General Security Settings (Web path); Viewing IDS Alarms (show
command); Viewing and Deleting DHCP Clients (show command); Configuring the
Device's LDAP Cache; Centralized Third-Party Routing Server (SIP messages and
credentials for authentication); Configuri ng Call Setup Rules (dial plan queries);
Call Setup Rule Examples; Registration Refre shes; Using Dial Plan Tags for IP-toIP Routing (example); Enabling Interworking of SIP and SIP-I E ndpoi nts (SPIROU
and SIP header X-AC-Action); Configuring WebRTC (Web path); Configuring
BroadSoft's Shared Phone Line Call Appearance f or Survivability (example);
Automatic Provisioning (CLI Script file); Configuring RTCP XR (IP Group); Enabling
Same Call Session ID over Multiple Devices (removed); Configuring Test Call
Endpoints (typo); CLI (illustration); Accessing the Web I nt erf ace (note).
New sections: VoIPerfect; Using Dial Plan Tags for Call Setup Rules; Using Dial
Patch version 7.20A.100.
Updated sections: CLI (telnet removed); Areas of the GUI (SBC Wizard); Assigning
Rows from Other Tables (search, add new, and view); Invalid Value Indicatio ns;
Creating a Login Welcome Message; Configuring Man agem ent User Accounts
(CLI); Enabling SSH with RSA Public Key f or CLI (public key); Configuring TLS
Certificate Contexts (DTLS); Assigning CSR-based Certificates to TLS Contexts;
Generating Private Keys for TLS Contexts; Configu rin g Underlying E thernet
Devices (max.); Configuring IP Network Interfaces (max.); Configuring Media
Realms (max.); SRTP using DTLS Protocol; Building and Viewing your Network
Topology; SIP-based Media Recording (multiple SRSs); Enabling SIP-based Media
Recording; Configuring SIP Recording Rules; Co nf i guring Proxy Sets (keep-alive);
WebRTC (RFCs); Configuring WebRTC; VoIPerfect; Pre-Configured IP Groups;
Normal Mode (CRP); Emergency Mode (CRP); Auto Answer to Registrations
(CRP); Network Topology Types and Rx/ T x Ethernet Port Group Settings; License
Key; Viewing the License Key; Obtaining License Key for Feature Upgrade
(removed); Installing the a New License Key; Installing License Key through Web
Interface; Upgrading SBC Capacity Licenses by License Pool Ma nager Server;
Viewing Device Information; Viewing Call Routing Status (removed); Configuring
RTCP XR (IP Group); Configuring RADIUS Accounting (typo for AccountingRequest); Automatic Provisioning (Startup CLI Script File).
New sections: Customizing the Web Interface; Replacing the Corporate Logo;
Replacing the Corporate Logo with an Image; Re placing the Corporate Logo with
Text; Customizing the Product Name; Customizing the Favicon; SRTP using DTLS
Protocol; SBC Wizard; Viewing the Device's Product Key; Saving Configuration to a
File; Loading a Configuration File; Viewing Proxy Set Status.
Updated with patch version 7.20A.150.
Updated sections: Areas of the GUI (Configuration Wizard button); Enabling
Disabling SNMP; Viewing Certificate Information (screen); Assigning Externally
Created Private Keys to TLS Contexts (pass-phrase); Generating P rivate Keys for
TLS Contexts (pass-phrase); Importing Certificates into Trusted Certifi cate S tore
(bulk import); Configuring Underlying Ethernet Devices (MTU); Configuring Firewall
Settings (note); SIP-based Media Recording (max.); Configuring Remote Web
Services (QoS routing); Centralized Third-Party Routing Server (QoS); Configuring
Proxy Sets; Alternative Routing Based on IP Connectivity; Configuring SBC IP-toRouting; Configuring IP Group Sets (dial plan tags); Configuring Dial Plans;
Software Upgrade; Installing License Key through Web Interface; Upgrading SBC
Capacity Licenses by License Pool Manager Server; SBC Configuration Wizard;
Configuring RADIUS Accounting (typo); Configuring DTM F Tones for Test Calls;
Configuring Basic Test Calls; Configuring SBC Test Call with External Proxy
(removed).
New sections: Configuring QoS-Based Routing by Routing Server; Microsoft Skype
for Business Presence of Third-Party Endpoints; Registrar Stickiness; Configuring
Pre-Parsing Manipulation Rules; Configuring Private Wire Interworking; Configuring
Rerouting of Calls to Fax Destinations; Using Dial Plan Tags for Routing
Destinations; Disconnecting and Reconnectin g HA ; Viewing the License Key;
Installing a License Key String; Viewing the Device's Product Key; Debugging Web
Services.
Updated with patch version 7.20A.152.
Updated sections: Configuring the LDAP Search Filter Attribute (Web path);
Enabling LDAP Searches for Numbers with Chara cters; Microsoft Skype for
Business Presence of Third-Party Endpoints; Configuring the Device for Skype for
Business Presence (example); Configuring Media Realm Extensio ns; Configuring
Firewall Allowed Rules; Configuring SBC IP-to-IP Routing (back to the sender);
Prerecorded Tones File; Installing on HA Devices (note); Loading a Configurati on
File (note)
Updated with patch Version 7.20A.154.007
Updated sections: Silence Suppression (removed); Fax / Modem Transparent
Mode (silnce suppression removed); Configuring SIP Recording Rul es (view
sessions in CLI); Configuring RTP Base UDP Port (note removed re SIP Int erf ace);
Centralized Third-Party Routing Server (call preemption added); Locking and
Unlocking the Device (typos); Viewing Active Alarms (max display)
New sections: Configuring Additional Management Interfaces; Configuring Specific
Updated with patch Version 7.20A.156.009
Updated sections: Configuring Management User Accounts; Device Located
behind NAT; Configuring a Static NAT IP Address for All Interfaces (removed); SIPbased Media Recording (URL of France reg.; note on S RS redundancy);
Configuring SIP Recording Rules (note re tim est am p); Configuring the OVOC
Server (note re report mode); Configuring Call Setup Rules (ENUM); Call Setup
Rule Examples (e.g., 5); Interworking SIP Early Media (figure); Prerecorded Tones
File; Automatic Configuration Methods; DHCP-based P rovisioning (note re resets)
New sections: Using Conditions for Starting a SIPRec Session; Using the
User's Manual 22 Document #: LTRT-40203
Page 23
User's Manual Notices
Contact URIs; Configuring Dual Registration; Provisioning the Device using DHCP
LTRT Description
Option 160; Enabling SIP Call Flow Diagrams in OVOC
Miscellaneous: EMS/SEM replaced with One Voice Operations Center (OVOC) –
text and screenshots
Version 7.2 23 Mediant 4000 SBC
Page 24
Mediant 4000 SBC
Documentation Feedback
AudioCodes continually strives to produce high quality documentation. If you have any
comments (suggestions or errors) regarding this document, please fill out the
Documentation Feedback form on our Web site at
feedback.
http://online.audiocodes.com/doc-
User's Manual 24 Document #: LTRT-40203
Page 25
User's Manual 1. Introduction
1 Introduction
This User's Manual describes how to configure and manage your AudioCodes product
(hereafter, referred to as device). This document is intended for the professional person
1.1 Product Overview
responsible for installing, configuring and managi ng t he device.
AudioCodes Mediant 4000 Session Border Controller (SBC), hereafter referred to as
device, is a mid-to-high scale capacity member of AudioCodes’ field-proven hardwarebased SBC product family, designed to offer enterprises and service providers a reliable
and scalable SBC solution. The device supports wide-ranging SIP interoperability,
delivering service assurance and enabling scalable, reliable and secured connectivity
between different VoIP networks.
The device provides a perfect solution for enterprises and large organizations such as
contact centers, large data centers, hosted service providers and government institutions
where security, reliability and high performan ce are critical.
The device includes comprehensive media security and SIP normalization capabilities. It
offers full interoperability with an extensive list of IP-PBXs, unified communications
solutions and SIP trunking provider network s.
The device provides robust protection for the IP communications infrastructure, preventing
fraud and service theft and guarding against cyber-attacks and other service impacting
events.
The device offers active/standby high availability and maintains high voice quality to deliver
reliable enterprise VoIP communications. Advanced call routing mechanisms, network
voice quality monitoring and branch survivability capabilities result in minimum
communications downtime.
The device can be used for the following applications:
SIP trunking Hosted PBX & UC as a Service IP contact centers Remote and mobile worker support SIP mediation between UC and IP-PBX systems Residential VoIP
Note: For maximum call capacity figures, see ''Channel Capacity'' on page 923.
Version 7.2 25 Mediant 4000 SBC
Page 26
Mediant 4000 SBC
# configure system
1.2 Typographical Conventions
This document uses the following typographical c onventions to convey information:
Courier font CLI commands. At the prompt, type the
following:
Text enclosed by square
brackets [...]
Text enclosed by single
apostrophe '...'
Ini file parameters and values. Configure the [GWDebugLevel]
parameter to [1].
Web interface parameters. From the 'Debug Level' drop-
down list, select Basic.
Notes highlight important or
-
useful information.
Warnings alert you to potentially
serious problems if a specific
action is not taken.
User's Manual 26 Document #: LTRT-40203
Page 27
User's Manual 1. Introduction
1.3 Getting Familiar with Configuration Concepts and
Terminology
Before using your device, it is recommended that you familiarize yourself with the basic
configuration concepts and terminology. An understanding of the basic concepts and
1.3.1 SBC Application
terminology will help you configure and manage you r device more effectively and easily.
The objective of your configuration is to enable the device to forward calls between
telephony endpoints in the SIP-based Voice-over-IP (VoIP) network. The endpoints (SIP
entities) can be servers such as SIP proxy servers and IP PBXs, or end users such as IP
phones. In the SIP world, the endpoints are referred to as SIP user agents (UA). The UA
that initiates the call is referred to as the user agent client (UAC); the UA that accepts the
call is referred to as the user-agent server (UAS).
The following table describes the main configuration concepts and terminology.
Table 1-2: Configuration Concepts and Terminology
Configuration Terms Description
IP Group The IP Group is a logical representation of the SIP entity (UA) with which
the device receives and sends calls. The SIP ent i t y can be a server (e.g.,
IP PBX or SIP Trunk) or it can be a group of users (e.g., LAN IP phones).
For servers, the IP Group is typically used to define the address of the
entity (by its associated Proxy Set). IP Groups are used in IP-to-IP routing
rules to denote the source and destination of the call.
Proxy Set The Proxy Set defines the actual address (IP addre ss or FQ DN) of SIP
entities that are servers (e.g., IP PBX). As the IP Group represents the
SIP entity, to associate an address with the SIP entity, the Proxy Set is
assigned to the IP Group. You can assign the sam e Proxy Set to multiple
IP Groups (belonging to the same SRD).
SIP Interface The SIP Interface represents a Layer-3 network. It defines a local
listening port for SIP signaling traffic on a local, l ogical IP network
interface. The term local implies that it's a logical port and network
interface on the device. The SIP Interface is used to receiv e and send
SIP messages with a specific SIP entity (IP Group). Therefore, you can
create a SIP Interface for each SIP entity in the V oIP network with which
your device needs to communicate. For example, i f your VoIP network
consists of three SIP entities -- a SIP Trunk, a LAN IP PBX, and remote
WAN users -- a SIP Interface can be created for each of these Layer-3
networks.
The SIP Interface is associated with the SIP entity, by assigning it to an
SRD that is in turn, assigned to the IP Group of the SIP entity.
Media Realm The Media Realm defines a local UDP port range for RTP (media) traffic
on any one of the device's logical IP network interfac es. T he M edia
Realm is used to receive and send media traffic with a specific SIP entity
(IP Group).
The Media Realm can be associated with the SIP entity, by assigning the
Media Realm to the IP Group of the SIP entity, or by assi gni ng it to the
SIP Interface associated with the SIP entity.
SRD The SRD is a logical representation of your entire S IP-based VoIP
Version 7.2 27 Mediant 4000 SBC
Page 28
Mediant 4000 SBC
network (Layer 5) containing groups of SIP user s and servers. The SRD
SRD topology, the device automatically assigns t he SRD to newly created
it
Inbound and Outbound
Inbound and Outbound Manipulation lets you mani pulate the user part of
Configuration Terms Description
is in effect, the foundation of your configuration to which all other
previously mentioned configuration entities ar e associated. For example,
if your VoIP network consists of three SIP entiti es -- a SIP Trunk, a LAN
IP PBX, and remote WAN users -- the three SIP Interfaces defining these
Layer-3 networks would all assigned to the same SRD.
Typically, only a single SRD is required and this is the recommend ed
configuration topology. As the device provides a defa ult SRD, in a single
configuration entities. Thus, in such scenario s, there is no need to get
involved with SRD configuration.
Multiple SRDs are required only for multi-tenant deployments, where it
"splits" the device into multiple logical devices. For m ultiple SRDs, the
SRD can be configured with a Sharing Policy. The Sharing Policy simply
means whether the SRD's resources (SIP Int erf aces, IP Groups, and
Proxy Sets) can be used by other SRDs. For example, if all tenants route
calls with the same SIP Trunking service provider, the SRD of the SIP
Trunk would be configured as a Shared Sharing P ol i cy. SRDs whose
resources are not shared, would be configured with an Isolated Sharing
Policy.
IP Profile The IP Profile is an optional configuration entity that defines a wide range
of call settings for a specific SIP entity (IP Group). The IP Profile includes
signaling and media related settings, for example, jitter buffer, voice
coders, fax signaling method, SIP header support (local termination if not
supported), and media security method. The IP Profile is in effect, the
interoperability "machine" of the device, enabling communication between
SIP endpoints that "speak" different call "languages".
The IP Profile is associated with the SIP entity, by assigning the IP Profile
to the IP Group of the SIP entity.
Classification Classification is the process that identifies the incoming call (SIP dialog
request) as belonging to a specific SIP entity (IP Group).
There are three chronological classification stages, where each stage is
done only if the previous stage fails. The device first attempts to classify
the SIP dialog by checking if it belongs to a user that is already registered
in the device's registration database. If this stage f ai ls, the device checks
if the source IP address is defined for a Proxy Set and if yes, it classifies
to the IP Group associated with the Proxy Set. I f thi s f ai l s, the device
classifies the SIP dialog using the Classification table, which defines
various characteristics of the incoming dialog t hat if matched, classifies
the call to a specific IP Group. The main characteristics of the incoming
call is the SIP Interface that is associated with the S RD f or which the
Classification rule is configured.
IP-to-IP Routing IP-to-IP routing rules define the routes for routing calls bet ween SIP
entities. As the SIP entities are represented by IP Groups, the routing
rules typically employ IP Groups to denote the sou rc e and destination of
the call. For example, to route calls from the IP PBX to the SIP Trunk, the
routing rule can be configured with the IP PBX as the source IP Group
and the SIP Trunk as the destination IP Group.
Instead of IP Groups, various other source and destination methods can
be used. For example, the source can be a source host nam e while the
destination can be an IP address or based on an LDAP query.
User's Manual 28 Document #: LTRT-40203
Page 29
User's Manual 1. Introduction
Manipulation
the SIP URI in the SIP message for a specific entit y (IP Group). Inbound
outbound
Configuration Terms Description
manipulation is done on messages received f rom the SIP entity;
manipulation is done on messages sent to the SIP entity.
Inbound manipulation lets you manipulate the user part of the SIP URI for
source (e.g., in the SIP From header) and destinati on (e.g., in the
Request-URI line) in the incoming SIP dialog request. Outbound
manipulation lets you manipulate the user part of the Request-URI for
source (e.g., in the SIP From header) or destination (e.g., in the SIP To
header) or calling name, in outbound SIP dialog re quests.
The Inbound and Outbound manipulation are associated with the SIP
entity, by configuring the rules with incoming char acteristics such as
source IP Group and destination host name. The manipulation rules are
also assigned a Routing Policy, which in turn, is assig ned to IP-to-IP
routing rules. As most deployments require only one Routing Policy, the
default Routing Policy is automatically assigned to the manipulation rules
and to the routing rules.
Routing Policy Routing Policy logically groups routing and manipulat ion (inbound and
outbound) rules to a specific SRD. It also enables Least Cost Routing
(LCR) for routing rules and associates an LDAP server for LDAP-based
routing. However, as multiple Routing Policies are required only for multitenant deployments, for most deployments only a single Routing Policy is
required. When only a single Routing Policy is required, handling of this
configuration entity is not required as a default Routing P ol i cy i s provided,
which is automatically associated with all relev ant configuration entities.
Call Admission Control Call Admission Control (CAC) lets you configure the maximum number of
permitted concurrent calls (SIP dialogs) per IP Group, SIP Interface,
SRD, or user.
Accounts Accounts are used to register or authent icate a "served" SIP entity (e.g.,
IP PBX) with a "serving" SIP entity (e.g., a registrar or proxy server). The
device does this on behalf of the "served" IP Group. A uthentication (SIP
401) is typically relevant for INVITE messages for warded by the device to
a "serving" IP Group. Registration is for REGIS T ER messages, which are
initiated by the device on behalf of the "serving" SIP entity.
Version 7.2 29 Mediant 4000 SBC
Page 30
Mediant 4000 SBC
The associations between the configuration ent ities are summarized in the following figure:
Figure 1-1: Association of Configuration Entities
The main configuration entities and their involvement in the call processing is summarized
in following figure. The figure is used only as an example to provide basic understanding of
the configuration terminology. Depending on configuration and network topology, the call
process may include additional stages or a diff erent order of stages.
Figure 1-2: SBC Configuration Terminology for Call Processing
1. The device determines the SIP Interface on which the incoming SIP dialog is received
and thus, determines its associated SRD.
2. The device classifies the dialog to an IP Group (origin of dialog), using a specific
Classification rule that is associated with the dialog's SRD and that matches the
incoming characteristics of the incoming dialog def i ned for the rule.
3. IP Profile and inbound manipulation can be applied to incoming dialog.
4. The device routes the dialog to an IP Group (destination), using the IP-to-IP Routing
table. The destination SRD (and thus, SIP Interface and Media Realm) is the one
assigned to the IP Group. Outbound manipulation can be applied to the outgoing
dialog.
User's Manual 30 Document #: LTRT-40203
Page 31
Getting Started with Initial
Connectivity
Part I
Page 32
Page 33
User's Manual 2. Introduction
2 Introduction
This part describes how to initially access the device's management interface and change
its default IP address to correspond with your net working scheme.
Version 7.2 33 Mediant 4000 SBC
Page 34
Mediant 4000 SBC
This page is intentionally leftblank.
User's Manual 34 Document #: LTRT-40203
Page 35
User's Manual 3. Default OAMP IP Address
3 Default OAMP IP Address
The device is shipped with a factory default IP address for operations, administration,
maintenance, and provisioning (OAMP), through its VoIP LAN interface. You can use this
address to initially access the device from any of its management tools (embedded Web
server, OVOC, or Telnet/SSH). You can also access the device through the console CLI,
by connecting the device's serial (RS-232) port t o a PC.
The table below lists the device's default IP addres s.
Table 3-1: Default VoIP LAN IP Address for OAMP
IP Address Value
Application Type OAMP + Media + Control
IP Address 192.168.0.2 (IP address assigned to the first Ethernet Port Group
User's Manual 4. Configuring VoIP LAN Interface for OAMP
4 Configuring VoIP LAN Interf ace f o r OAMP
You can change the IP address of the VoIP-LAN interface for OAMP, using any of the
following methods:
Embedded HTTP/S-based Web server - see ''Web Interface'' on page 37 Embedded command line interface (CLI) - see ''CLI'' on page 39
Note: If you are implementing the High Availability feature, see also HA Overview on
page 601 for initial setup.
4.1 Web Interface
The following procedure describes how to change the IP address of the OAMP on the
VoIP-LAN interface, using the Web-based management tool (Web interface). The default
IP address is used to initially access the device.
To configure the VoIP-LAN IP Address for OAMP through Web interface:
1. Connect the first Ethernet port group (top-left ports 1 and 2) located on the front panel
directly to the network interface of your computer, using a straight-through Ethernet
cable.
2. Change the IP address and subnet mask of your computer to correspond with the
default OAMP IP address and subnet mask of the device.
Version 7.2 37 Mediant 4000 SBC
Page 38
Mediant 4000 SBC
3. Access the Web interface:
a. On your computer, start a Web browser and in the URL address field, enter the
default IP address of the device; the Web interface' s Web Login screen appears:
Figure 4-1: Web Login Screen
b. In the 'Username' and 'Password' fields, enter t he case-sensitive, default login
username ("Admin") and password ("Admin" ).
c. Click Login.
4. Configure the Ethernet port(s) that you want to use for the OAMP interface:
a. In the Ethernet Groups table, configure an Ethernet Group by assigning it up to
two ports (two ports provide optional, port-pair redundancy). For more
information, see Configuring Physical Et hernet Ports on page 122.
b. In the Physical Ports table, configure port settings such as speed and duplex
mode (see Configuring Physical Ethernet Port s on page 122).
c. In the Ethernet Devices table, configure an Ethernet Device by assigning it the
Ethernet Group and a VLAN ID (see ''Configuring Underlying Ethernet Devices''
on page 127).
5. Modify the OAMP interface address to suite your network environment:
a. Open the IP Interfaces table (see ''Configuring IP Network Interfaces'' on page
129).
b. Select the OAMP interface ("O+M+C"), and then click Edit.
c. From the 'Ethernet Device' drop-down list, select the Ethernet Device that you
configured in the previous step.
d. Under the IP Address group, change the IP address to correspond with your
network IP addressing scheme.
e. Under the DNS group, configure the DNS server, if required.
f. Click Apply.
6. Save your settings by resetting the device with a flash burn (see ''Resetting the
Device'' on page 621).
7. Disconnect the device from your PC and re-cable it to your network. You can now
access the device with the new OAMP interface address.
User's Manual 38 Document #: LTRT-40203
Page 39
User's Manual 4. Configuring VoIP LAN Interface for OAMP
4.2 CLI
This procedure describes how to configure the VoIP-LAN IP address for OAMP through the
device's CLI. The procedure uses the regular CLI commands. Alternatively, you can use
the CLI Wizard utility to set up your device with the initial OAMP settings. The utility
provides a fast-and-easy method for initial configuration of the device through CLI. For
more information, refer to the CLI Wizard User's Guide.
To configure the OAMP IP address through CLI:
1. Connect the RS-232 port of the device to the serial communication port on your
computer. For more information, refer to the Hard ware Installation Manual.
2. Establish serial communication with the device using a terminal emulator program
such as HyperTerminal, with the following communication port settings:
• Baud Rate: 115,200 bps
• Data Bits: 8
• Parity: None
• Stop Bits: 1
• Flow Control: None
3. At the CLI prompt, type the username (default is "Admin" - case sensitive):
Username: Admin
4. At the prompt, type the password (default is "Admin" - case sensitive):
13. Cable the device to your network. You can now access the device's management
interface using this new OAMP IP address.
User's Manual 40 Document #: LTRT-40203
Page 41
Management Tools
Part II
Page 42
Page 43
User's Manual 5. Introduction
5 Introduction
This part describes the various management tools that you can use to configure the device:
Embedded HTTP/S-based Web server - see ''Web-based Management'' on page 45 Command Line Interface (CLI) - see ''CLI-Based Management'' on page 81 Simple Network Management Protocol (SNMP) - see ''SNMP-Based Management'' on
87
page
Configuration ini file - see ''INI File-Based Management'' on page 95
Note:
• Some configuration settings can only be done using a specific management tool.
• For a list and description of all the configuration parameters, see ''Configuration
Parameters Reference'' on page 803.
Version 7.2 43 Mediant 4000 SBC
Page 44
Mediant 4000 SBC
This page is intentionally leftblank.
User's Manual 44 Document #: LTRT-40203
Page 45
User's Manual 6. Web-Based Management
6 Web-Based Management
The device provides an embedded Web server (hereafter referred to as Web interface),
supporting fault management, configuration, accounting, performance, and security
(FCAPS), including the following:
Full configuration Software and configuration upgrades Loading Auxiliary files, for example, the Call Progress Tones file Real-time, online monitoring of the device, including display of alarms and t heir
severity
Performance monitoring of voice calls and various traffic parameters
The Web interface provides a user-friendly, graphical user interface (GUI), which can be
accessed using any standard Web browser (e. g. , Microsoft™ Internet Explorer).
Access to the Web interface is controlled by various security mechanisms such as login
user name and password, read-write privileges, and limiting access to specific IP
addresses.
Note:
•The Web interface allows you to configure most of the device's settings. However,
additional configuration parameters may exist t hat are not available in the Web
interface and which can only be configured using other management tools.
•Some Web interface pages and/or parameters are available only for certain
hardware configurations or software features. T he software features are
determined by the installed License Key (see ''License Key'' on page 641).
6.1 Getting Acquainted with the Web Interface
6.1.1 Computer Requirements
This section provides a description of the Web interface.
The client computer requires the following to wor k with the Web interface of the device:
A network connection to the device One of the following Web browsers:
•Microsoft™ Internet Explorer™ (Version 11.0. 13 or later)
®
•Mozilla Firefox
(Versions 5.02 or later)
•Google Chrome (Version 50 or later)
Recommended screen resolutions: 1024 x 768 pixels, or 1280 x 1024 pixels
Note: Your Web browser must be JavaScript-enabled to access the Web interface.
Version 7.2 45 Mediant 4000 SBC
Page 46
Mediant 4000 SBC
6.1.2 Accessing the Web Interface
The following procedure describes how to access the Web interface.
To access the Web interface:
1. Open a standard Web browser.
2. In the Web browser, specify the OAMP IP address of the device (e.g.,
http://10.1.10.10); the Web interface's Login window appears, as shown below:
Figure 6-1: Web Login Screen
3. In the 'Username' and 'Password' fields, enter the username and password,
respectively. The credentials are case-sensitive.
4. If you want the Web browser to remember your username and password, select the
'Remember Me' check box and then agree to the browser's prompt (depending on
your browser). On your next login attempt, the 'Username' field is automatically
populated with your username. Simply press the Tab or Enter key to auto-fill the
'Password' field, and then click Login.
5. Click Login.
User's Manual 46 Document #: LTRT-40203
Page 47
User's Manual 6. Web-Based Management
Note:
•The default login username and password is "Admin" (case-sensitive). To change
the login credentials, see ''Configuring Management Us er A ccounts'' on page 69.
•By default, Web access is only through the IP addre ss of the OAMP interface.
However, you can allow access from all of the device's IP network interfaces, by
setting the EnableWebAccessFromAllInterfac es parameter to 1.
•By default, autocompletion of the login username is enabled whereby the
'Username' field offers previously entered usernam es. To disable autocompletion,
use the WebLoginBlockAutoComplete ini file parameter.
•Depending on your Web browser's settings, a sec urity warning box may be
displayed. The reason for this is that the device's certificate is not trusted by your
PC. The browser may allow you to install the certifi cat e, thus skipping the warning
box the next time you connect to the device. If you are using Windows Internet
Explorer, click View Certificate, and then Install Certificate. The browser also
warns you if the host name used in the URL is not identical to the one listed in the
certificate. To resolve this, add the IP address a nd host name (ACL_nnnnnn,
where nnnnnn is the serial number of the device) to your hosts file, located at
/etc/hosts on UNIX or C:\Windows\System32\Drivers\ETC\hosts on Windows; then
use the host name in the URL (e.g., https://ACL_2 80152). Below is an example of
a host file:
127.0.0.1 localhost
10.31.4.47 ACL_280152
6.1.3 Areas of the GUI
The areas of the Web interface's GUI are shown in the figure below and described in the
subsequent table.
Figure 6-2: Main Areas of the Web Interface GUI
Version 7.2 47 Mediant 4000 SBC
Page 48
Mediant 4000 SBC
on page 679.)
Table 6-1: Description of the Web GUI Areas
Item # Description
1
2
3
Company logo.
Menu bar containing the menus.
Toolbar providing frequently required command buttons.
Save: Saves configuration changes to the device's flash memory (without
resetting the device). If you make a configuration change, the button is
surrounded by a red-colored border as a reminder to save your settings to flash
memory, by clicking the button.
Reset: Opens the Maintenance Actions page, which is used f or performing
various maintenance procedures such as resett i ng the device (see ''Basic
Maintenance'' on page 621). If you make a configuration chang e that takes effect
only after a device reset, the button is surrounded by a red-colored border as a
reminder to save your settings to flash memory with a device reset; otherwise,
your changes revert to previous settings if the dev ice subsequently resets or
powers off.
Actions:
Configuration File: Opens the Configuration File page, which is used for
saving the ini file to a folder on your PC, or for loading an ini fi le to the device
(see ''Configuration File'' on page
Auxiliary Files: Opens the Auxiliary Fi les page, which is used for loading
659).
Auxiliary files to the device (see ''Loading Auxili ary F i les t hrough Web
Interface'' on page
License Key: Opens the License Key page, which i s used for installing a new
627).
License Key file (see ''Installing License Key through Web I nterface'' on page
642).
Software Upgrade: Starts the Software Upgrade Wizard for upgrading the
device's software (see ''Software Upgrade Wizard'' on pag e
Switchover: Opens the High Availability Mai ntenance page, which is used for
653).
switching between Active and Redundant devices (see High Availability
Maintenance on page 624).
Configuration Wizard: Opens the SBC Configuratio n Wizard, which is used
for quick-and-easy configuration of the device (
see SBC Configuration Wizard
4
Alarm bell icon, which displays the number of activ e alarms generated by the device.
The color of the number of alarms display indicates t he highest severity of an active
alarm. If you click the icon, the Active Alarms table is displayed. For more information
on the table, see Viewing Active Alarms.
5
Button displaying the username of the currently logged in user. If you click the button,
information of the logged-in user is displayed (see ''Vi ewing Logged-In User
Information'' on page 75) and the Log Out button is provided to log out the We b
session (see ''Logging Off the Web Interface'' on page 62).
6
7
Tab bar containing tabs pertaining to the selected m enu:
Back and Forward buttons that enable quick-and-easy navigation through previously
opened pages. This is especially useful when you find that you need to return to a
previously accessed page, and then need to go bac k t o the page you just left.
User's Manual 48 Document #: LTRT-40203
Page 49
User's Manual 6. Web-Based Management
Item # Description
Back button: Goes back to the previously accessed page.
Forward button: Opens the page that you initially l ef t using the back button.
The button is available only if you have used the Back button.
8
Navigation pane, which displays the Navigation tree containing the commands
(items) for opening the configuration pages (see ''Navigation Tree'' on page 49).
9
SRD filter. When your configuration includes multi pl e SRDs, you can filter tables in
the Web interface by a specific SRD. For more information, see ''Filtering Tables in
Web Interface by SRD'' on page 337.
10
Search box for searching parameter names and v al ues (see ''Searching for
Configuration Parameters'' on page 61).
11
Work pane where configuration pages are displayed.
6.1.4 Accessing Configuration Pages from Navigat ion Tree
Accessing configuration pages is a three-fold process that consists of selecting a menu on
the menu bar, a tab on the tab bar, and then a page item in the Navigation pane. The
Navigation pane provides the Navigation tree, which is a tree-like structure of folders and
page items that open configuration pages in the Work pane. The hierarchical structure and
organization of the items in the Navigation tree allow you to easily drill-down and locate the
required item.
The Navigation tree consists of the following areas:
Home : (Call out #1) First ("home") page displayed when a menu-tab combination is
initially selected. For example, the home page of the Setup menu - Administration
tab combination is the Time & Date page.
Folders: (Callout #2) Folders group items of similar functionality. To open and cl ose a
folder, simply click the folder name.
Items: (Callout #3) Items open configuration pages. In some cases, an i tem may be
listed under a sub-item. An item can open a page containing stand-alone parameters
or a table. If it opens a page with stand-alone parame ters, the item is displayed in
italics. If it opens a page with a table, the item is displayed in regular font, or bold font
to indicate an item that is commonly required.
Figure 6-3: Navigation Tree (Example)
The items of the Navigation tree depend on the menu-tab combination, selected from the
menu bar and tab bar, respectively. The menus and their respective tabs are listed below:
When you open the Navigation tree, folders containing commonly required items are
opened by default, allowing quick access to t hei r pages.
Items that open pages containing tables provide the following indications in the Navigation
tree:
Number of configured rows. For example, the item below indicates that t wo rows have
been configured:
If you have filtered the Web interface display by S RD , the number reflects only the
rows that are associated with the filtered SRD.
Invalid row configuration. If you have configured a row with at least one invalid v al ue,
a red-colored icon is displayed next to the item, as sh own i n the following example:
If you hover your cursor over the icon, it displays the number of invalid rows (lines).
Association with an invalid row: If you have associated a parameter of a row with a
row of a different table that has an invalid configuration, the item appears with an
arrow and a red-colored icon, as shown in the following example:
If you hover your cursor over the icon, it displays t he number of rows in the table that
are associated with invalid rows.
Folder containing an item with an invalid row: If a folder contains an item wit h an
invalid row (or associated with an invalid row), the closed folder displays a red-colored
icon, as shown in the following example:
If you hover your cursor over the icon, it displays the names of the items that are
configured with invalid values. If you have filt ered t he Web interface display by SRD,
only items with invalid rows that are associated with t he f i l tered SRD are displayed.
To open a configuration page:
1. On the menu bar, click the required menu.
2. On the tab bar, click the required tab; the Navigation tree displays the items pertaining
to the selected menu-tab combination.
3. In the Navigation pane, open the folder in which the required item is located. The
folders are opened and closed by clicking the title of the folder. When opened, the
folder's arrow is displayed as ; when closed, the arrow is displayed as .
4. In the folder, click the required item; the page is displayed in the Work pane.
You can also easily navigate through previously accessed pages, using the Back and
Forward buttons located above the Navigation pane:
Back button: Click to go back to the previously accessed page or keep on clicking
until you reach any other previously accessed page.
Forward button: Click to open the page that you just lef t as a result of clicking the
Back button.
User's Manual 50 Document #: LTRT-40203
Page 51
User's Manual 6. Web-Based Management
These buttons are especially useful when you find that you need to return to a previously
accessed page, and then need to go back to the page you just left.
Note: Depending on the access level (e.g., Monitor level) of your Web user account,
certain pages may not be accessible or may be read-only (see ''Configuring
Management User Accounts'' on page 69). For read-only privileges:
•Read-only pages with stand-alone parameters: "Read Only Mode" i s displayed at
the bottom of the page.
•Read-only pages with tables: Configuration buttons (e.g., New and Edit) are
missing.
6.1.5 Configuring Stand-alone Parameters
Parameters that are not contained in a table are referred to as stand-alone parameters.
If you change the value of a parameter (before clicking Apply), the parameter' s f i eld is
highlighted, as shown in the example below:
If you change the value of a parameter from its default value and then click Apply, a
dot appears next to the parameter's field, as shown in the example below:
If you change the value of a parameter that is displayed with a lightning-bolt icon
(as shown in the example below), you must save your setti ngs to flash memory with a
device reset for your changes to take effect. Whe n you change such a parameter and
then click Apply, the Reset button on the toolbar is encircled by a red border. If you
click the button, the Maintenance Actions page opens , which provides commands for
doing this (see ''Basic Maintenance'' on page
621).
Typically required parameters are displayed in bold font. If you enter an invalid value for a parameter and then click Apply, a message box
appears notifying you of the invalid value. Click OK to close the message. The
parameter reverts to its previous value and the field is surrounded by a colored border,
as shown in the figure below:
To get help on a parameter, simply hover your mouse over the parameter's field and a
pop-up help appears, displaying a brief descript i on of the parameter.
The following procedure describes how to configure stand-alone parameters.
To configure a stand-alone parameter:
1. Modify the parameter's value as desired.
2. Click Apply; the changes are saved to the device's volatile memory (RAM).
3. Save the changes to the device's non-volatile memory (flash):
•If a device reset is not required:
Version 7.2 51 Mediant 4000 SBC
Page 52
Mediant 4000 SBC
a. On the toolbar, click Save; a confirmation message box appears:
Figure 6-4: Save Configuration Confirmation Box
b. Click Yes to confirm; the changes are save to flash memory.
• If a device reset is required:
a. On the toolbar, click Reset; the Maintenance Actions page opens.
b. Click Reset; the device saves the changes to flash mem ory and then resets.
Warning: When you click Apply, your changes are saved only to the device's volatile
memory and thus, revert to their previous settings if the device later undergoes a
hardware reset, a software reset (without saving to flash) or powers down. Therefore,
make sure that you save your configuration to t he device's flash memory.
6.1.6 Configuring Table Parameters
A typical configuration table is shown below and subsequently described:
Figure 6-5: Description of Tables
Table 6-2: General Description of Configuration Tables
Item # Button
User's Manual 52 Document #: LTRT-40203
Page 53
User's Manual 6. Web-Based Management
Item # Button
1
2
3
4
5
- Page title (i.e., name of table). The page title also displays the number
of configured rows as well as the number of invalid rows. For more
information on invalid rows, see ''Invalid Value Indications'' on page
56.
Adds a new row to the table (see ''Adding Table Rows '' on page 53).
Modifies the selected row (see ''Modifying Table Rows'' on page 55).
Adds a new row with similar settings as the selected row (i.e., clones
the row). For more information, see ''Cloning SRDs '' on page 339.
Note: The button appears only in the SRDs table.
Deletes the selected row (see ''Deleting Table Row s'' on page 55).
Changes the index position of a selected row (se e ''C hanging Index
Position of Table Rows'' on page 59).
Action
Drop-down menu providing commands (e.g. , Register and Un-
Register).
Note: The button appears only in certain tables ( e. g., Accounts table).
- Added table rows displaying only some of the tabl e parameters
(columns).
- Detailed view of a selected row, displaying all parameters.
- Link to open the "child" table of the "parent" table. A link appears only
if the table has a "child" table. The "child" table is opened for the
selected row.
6
- Navigation bar for scrolling through the table's pages (see ''Viewing
Table Rows'' on page 58).
7
- Search tool for searching parameters and value s (see ''Searching
Table Entries'' on page 60).
8
Modifies the selected row (see ''Modifying Table Rows'' on page 55).
6.1.6.1 Adding Table Rows
The following procedure describes how to add table rows. Before adding rows, the
following GUI conventions are used:
Commonly required parameters are displayed in bold font.If you change the value of a parameter (before clicking Apply), the parameter' s f i eld is
highlighted, as shown in the example below:
For indications of invalid values, see ''Invalid Value Indications'' on page 56.
To add a row:
1. Click the New button, located on the table's toolbar; a dialog box appears.
2. Configure the parameters of the row as desired. For information on configuring
parameters that are assigned a value which is a row referenced from another table,
see ''Assigning Rows from Other Tables'' on page 54.
Version 7.2 53 Mediant 4000 SBC
Page 54
Mediant 4000 SBC
3. Click Apply to add the row to the table or click Cancel to ignore your configuration.
4. If the Save button is surrounded by a red border, you must save your
settings to flash memory, otherwise they are discarded if the device resets (without a
save to flash) or powers off.
6.1.6.1.1 Assigning Rows from Other Tables
Some tables contain parameters whose value is an assigned row (referenced-row) from
another table (referenced-table). For example, the IP Groups table contains the 'Proxy Set'
parameter whose value is an assigned Proxy Set, configured in the Proxy Sets table.
These parameter types provide a drop-down list for selecting the value and a View button,
as shown in the example below:
Figure 6-6: Parameter with View Button (Example)
You can assign a referenced-row using one of the following methods:
Selecting a referenced-row from the drop-down list:
• Scroll down to the desired item and click it.
• Search for the item by entering in the field the first few characters of the desired
row, and then clicking it. The figure below shows an e xample of searched results
for items (Proxy Sets) that begin with the letter "i":
Figure 6-7: Searching a Row to Reference
Selecting an existing referenced-row directly from the referenced-table:
a. Click View; the table (e.g., IP Groups table) and dialog box in which the button
was clicked is minimized to the bottom-left corner of the Web interface and the
referenced-table (e.g., Proxy Sets table) opens.
b. Add a new row (e.g., Proxy Set), if required; otherwise, skip this step.
c. Select the desired row in the row-referenced table (e.g., Proxy Sets table), and
then click Use selected row located on the top-right of the tabl e, as shown in the
example below:
Figure 6-8: Selecting Referenced Row
Adding a new referenced-row:
User's Manual 54 Document #: LTRT-40203
Page 55
User's Manual 6. Web-Based Management
a. From the drop-down list, select the Add new option; as shown in the example
below:
Figure 6-9: Selecting Add new Option
The table (e.g., IP Groups table) and dialog box in which the Add new option was
selected is minimized to the bottom-left corner of t he Web interface and a dialog
box appears for adding a new row in the referenced-t able (e.g., Proxy Sets table).
b. Configure the referenced-row and click Apply; the referenced-table (e.g., Proxy
Sets table) closes and you are returned to the dialog box in which you selected
the Add new option (e.g., IP Groups table), where the newly added row now
appears selected.
You may want to access the referenced-table (e.g., Proxy Sets table) to simply view all its
configured rows and their settings, without selecting one. To do this, click the View button.
To return to the dialog box of the table (e.g., IP Groups table) in which you are making your
configuration, click the arrow icon on the minimized dialog box to restore it to its
previous size.
6.1.6.2 Modifying Table Rows
The following procedure describes how to modify (edit) the configuration of an existing
table row. Remember that a gray-colored dot icon displayed next to a parameter's value
(as shown in the example below), indicates that it was changed from its default value:
To edit a table row:
1. Select the row that you want to edit.
2. Click the Edit button, located on the table's toolbar; a dialog appears
displaying the current configuration settings of t he row.
3. Make your changes as desired, and then click Apply; the dialog box closes and your
new settings are applied.
4. If the Save button is surrounded by a red border, you must save your
settings to flash memory, otherwise they are discarded if the device resets (without a
save to flash) or powers off.
6.1.6.3 Deleting Table Rows
The following procedure describes how to delete a ro w f rom a table.
To delete a table row:
1. Select the row that you want to delete.
Version 7.2 55 Mediant 4000 SBC
Page 56
Mediant 4000 SBC
2. Click the delete icon, located on the table's toolbar; a confirmation message box
appears requesting you to confirm deletion, as s hown in the example below:
3. Click Yes, Delete; the row is removed from the table and the total number of
configured rows that is displayed next to the page title and page item in the Navigation
tree is updated to reflect the deletion.
Note: If the deleted row (e.g., a Proxy Set) was referenced in another table (e.g., IP
Group), the reference is removed and replaced with an empty field. In addition, if the
reference in the other table is for a mandatory parameter, the invalid icon is
displayed where relevant. For example, if you delete a SIP Interface that you have
assigned to a Proxy Set, the invalid icon appears alongside the Proxy Sets item in
the Navigation tree as well as on the Proxy Sets page.
6.1.6.4 Invalid Value Indications
The Web interface provides the following indications of invalid values when configuring
table rows:
Parameters configured with invalid values: An invalid value is a value that is not
permissible for the parameter. This can include incorrect syntax (string, numeral, or
character) or an out-of-range value. If you enter an invalid value and then click Apply,
the field is surrounded by a colored border, as shown i n the example below.
Figure 6-10: Invalid Value
If you hover your mouse over the field, a pop-up message appears providing the valid
values. If you enter a valid value, the colored border i s removed from the field. If you
leave the parameter at the invalid value and click Apply, the parameter reverts to its
previous value.
Mandatory parameters that reference rows of other configuration tables:
•Adding a row: If you do not configure the parameter and you cli ck Apply, an
error message is displayed at the bottom of the dialog box. If you click Cancel,
the dialog box closes and the row is not added to the table. For example, if you
do not configure the 'SIP Interface' field (mand atory) for a Proxy Set (in the Proxy
Sets table), the below message appears::
•Editing a row: If you modify the parameter so that it's no lon ger referencing a
row of another table (i.e., blank value), when you clos e the dialog box, the Invalid Line icon appears in the following locations:
♦ 'Index' column of the row.
♦ Page title of the table. The total number of i nvalid rows in the table is also
displayed with the icon.
User's Manual 56 Document #: LTRT-40203
Page 57
User's Manual 6. Web-Based Management
♦Item in the Navigation tree that opens the tabl e.
For example, if you do not configure the 'SIP Interface' field (mandatory) for Proxy
Set #0, the Invalid Line icons are displayed for the Proxy Sets table, as
shown below:
Figure 6-11: Invalid Line (Row) Icons
Parameters that reference rows of other configuration tables that are configured
with invalid values: If a row has a parameter that references a row of another table
that has a parameter with an invalid value, the Invalid Reference Line icon is
displayed in the following locations:
• 'Index' column of the row.
• Page title of the table. The total number of invalid rows in the table is also
displayed with the icon.
•Item in the Navigation tree that opens the table.
For example, if you configure IP Group #0 (in the IP Groups table) with a parameter
that references Proxy Set #0, which is configured with an invalid value, Invalid
Reference Line icons are displayed for the IP Groups table, as shown below:
Figure 6-12: Invalid Reference Line Icons
Invalid icon display in drop-down list items of parameters that can reference
rows of other tables:
•If the row has an invalid line (see description above ), t he Invalid Line icon
appears along side the item.
•If the row has an invalid reference line (see desc ription above), the Invalid
Reference Line icon appears along side it.
For example, when configuring an IP Group, the 'Proxy Set' parameter's drop-down
list displays items: Proxy Set #0 with indicating that it has an invalid parameter
value, and Proxy Set #1 with indicating that it has a parameter that is referenced to
a row of another table that has an invalid value:
Version 7.2 57 Mediant 4000 SBC
Page 58
Mediant 4000 SBC
delete the referenced row (in the table in which the row is configured), the
Figure 6-13: Invalid Icon Display in Drop-Down List of Parameter Referencing Other Rows
Note: If you assign a non-mandatory parameter with a referenced row and then later
parameter's value automatically changes to an empty field (i.e., no row assigned).
Therefore, make sure that you are aware of this and if necessary, assign a different
referenced row to the parameter. Only if the parameter is mandatory is the Invalid
Line icon displayed for the table in which the parameter is config ured.
6.1.6.5 Viewing Table Rows
Tables display a certain number of rows per page. If you have configured more than this
number, you can use the table's navigation bar to scroll through the table pages, as shown
below and described in the subsequent table:
Table 6-3: Table Navigation Bar Description
Item # Description
1
2
Navigation buttons to view previous table rows:
Displays the previous table page
Displays the first tabl e page (i.e., page with at least the first index row)
Navigation buttons to view the next table rows:
Displays the next table page
Displays the last table page (i.e., page with last index row)
3
Currently displayed table page. To open a specif ic t able page, enter the page number
and then press the Enter key.
4
Total number of table pages.
User's Manual 58 Document #: LTRT-40203
Page 59
User's Manual 6. Web-Based Management
6.1.6.6 Sorting Tables by Column
You can sort table rows by any column and in ascending order (e.g., 1, 2 and 3 / a, b, and
c) or descending order (e.g., 3, 2, and 1 / c, b, and a). By default, most tables are sorted by
the Index column and in ascending order.
To sort table rows by column:
1. Click the name of the column by which you want to sort the table rows; the up-down
arrows appear alongside the column name and the up button is displayed in a darker
shade of color, indicating that the column is sorted in ascending order:
Figure 6-14: Table Sorted by Index in Ascending Order
2. To sort the column in descending order, click the column name again; only the down
arrow is displayed in a darker shade of color, indicating that the column is sorted in
descending order:
Figure 6-15: Table Sorted by Index in Descending Order
6.1.6.7 Changing Index Position of Table Rows
You can change the position (index) of rows in tables. This is done by using the up-down
arrows located on the table's toolbar.
Note:
•Changing row position can only done when the table is sorted by the 'Index'
column and in ascending order; otherwise, the butt ons are grayed out. For sorting
table columns, see 'Sorting Tables by Column' on p age 59.
•Changing row position is supported only by certain tables (e.g., IP-to-IP Routing
table).
To change the position of a row:
1. Click the 'Index' column header so that the rows are sorted in ascending order (e.g., 0.
Version 7.2 59 Mediant 4000 SBC
Page 60
Mediant 4000 SBC
1, 2, and so on).
2. Select the row that you want to move.
3. Do one of the following:
•To move one index up (e.g., from Index 3 to 2): Click the up arrow; the row
moves one index up in the table (e.g., to 2) and the row t hat originally occupied
the index is moved one index down (e.g., to 3). I n other w ords, the rows have
swapped positions.
•To move one index down (e.g., from Index 3 to Index 4): Click the down arrow;
the row moves one index down in the table (e.g., t o 4) and the row that originally
occupied the index is moved one index up (e.g., to 3). In other words, the rows
have swapped positions.
4. Continue clicking the required arrow until the row has moved to the desired location in
the table.
6.1.6.8 Searching Table Entries
You can search for any parameter value (alphanumerics) in configuration tables, using the
Search tool. The Search tool, located above each table, is shown below and described in
the subsequent table:
Figure 6-16: Table Search Tool
Table 6-4: Table Search Tool Description
Item # Description
1
'Specify Columns' drop-down list for selecting t he table column (parameter) in which to
do the search. By default, the search is done in all colum ns.
2
3
Search box to enter your search key (parameter value).
Magnifying-glass icon which when clicked performs the search.
To search for a table value:
1. If you want to perform the search on all table columns, skip this step; otherwise, from
the 'Specify Columns' drop-down list, select the table column in which you want to
perform the search; the name of the drop-down list changes to the name of the
selected column.
2. In the Search box, enter the value for which you want to search.
3. Click the magnifying-glass icon to run the search. If the device finds the value, the
table displays only the rows in which the value was found. You can then select any
row and modify it by clicking the Edit button. If the search is unsuccessful, no rows are
displayed.
4. To quit the Search tool and continue configuring rows, click the icon located in the
Search box.
User's Manual 60 Document #: LTRT-40203
Page 61
User's Manual 6. Web-Based Management
6.1.7 Searching for Configuration Parameters
You can search in the Web interface for parameter names (standalone or table
parameters) and values. The search key can include the full parameter name (Web or ini
file name) or a substring of it. If you search for a substring, all parameters containing the
substring in their names are listed in the search result. For example, to search for the
parameter 'Telnet Server TCP Port', you can use a ny of the following search keys:
When the device completes the search, it displays a list of found results based on the
search key. Each possible result, when clicked, opens the page on which the parameter or
value is located. You need to click the most appropriate result.
To search for a parameter:
1. In the search box, enter the search key (parameter name or value).
2. Click the search icon; the Search Result window appears, listing found parameters
based on your search key. Each searched result displays the following:
• Navigation path (link) to the page on which the parameter appears
• Parameter's name
• Parameter's value
• Brief description of parameter
Figure 6-17: Search Result Window
3. Click the link of the navigation path corresponding to the required found parameter to
open the page on which the parameter appears.
Version 7.2 61 Mediant 4000 SBC
Page 62
Mediant 4000 SBC
6.1.8 Getting Help
The Web interface provides you with context-sensitive pop-up help of standalone
parameters. When you hover your mouse over a parameter's field, a pop-up appears with a
short description of the parameter, as shown in the following example:
Figure 6-18: Viewing Context-Sensitive Help for a Parameter
6.1.9 Logging Off the Web Interface
The following procedure describes how to log off t he Web interface.
To log off the Web interface:
1. On the menu bar, from the 'Admin' drop-down list, click Log Out; the following
confirmation message box appears:
Figure 6-19: Log Out Confirmation Box
2. Click Yes; you are logged off the Web session and the Web Login window appears
enabling you to re-login, if required.
6.2 Customizing the Web Interface
You can customize the following elements of the device's Web interface (GUI):
Corporate logo (see Replacing the Corporate Logo on page 62)
Device's (product) name (see Customizing the Product Name on page 65)
Favicon (see Customizing the Favicon on page 65)
Login welcome message (see Creating a Login Welcome Message on pag e 61)
Note:
• The product name also affects other management interf aces.
• In addition to Web-interface customization, you can customize the following to
reference your company instead of AudioCodes:
√ SNMP Interface: Product system OID (see the SNMPSysOid parameter) and
trap Enterprise OID (see the SNMPTrapEnt erpriseOid parameter).
√ SIP Messages: User-Agent header (see the UserAgentDisplayInf o parameter),
SDP "o" line (see the SIPSDPSessionOwner parameter), and Subject header
(see the SIPSubject parameter).
6.2.1 Replacing the Corporate Logo
You can replace the default corporate logo image (i.e., AudioCodes logo) that is displayed
in the Web interface. The logo appears in the following Web areas:
User's Manual 62 Document #: LTRT-40203
Page 63
User's Manual 6. Web-Based Management
Web Login screen:
Figure 6-20: Corporate Logo on Web Login Screen
Menu bar:
Figure 6-21: Corporate Logo on Menu Bar
You can replace the logo with one of the following:
A different image (see Replacing the Corporate Logo with an Image on page 63) Text (see Replacing the Corporate Logo with Text on page 64)
6.2.1.1 Replacing the Corporate Logo with an Image
You can replace the logo with a different image. The following figure displays an example
where the default logo (top) is replaced with a different image (bottom):
Figure 6-22: Customizing Web Logo Image
To customize the logo:
1. Save your new logo image file in a folder on the same PC that you are using to access
the device's Web interface.
2. In your browser's URL address field, append the case-sensitive suffix "/AdminPage" to
the device's IP address (e.g., http:// 10. 1.229. 17/AdminPage).
3. Log in with your credentials; the Admin page appears.
Version 7.2 63 Mediant 4000 SBC
Page 64
Mediant 4000 SBC
4. On the left pane, click Image Load to Device; the right pane displays the following:
Figure 6-23: Customizing Web Logo
5. Use the Browse button to select your logo file, and then click Send File; the device
loads the file.
6. If you want to modify the width of the image, in the 'Logo Width' field, enter the new
width (in pixels) and then click the Set Logo Width button.
7. On the left pane, click Back to Main to exit the Admin page.
8. Reset the device with a save-to-flash for your settings to take effect.
Note:
• The logo image file type can be GIF, PNG, JPG, or JPEG.
• The logo image must have a fixed height of 24 pixel s. T he width can be up to 199
pixels (default is 145).
• The maximum size of the image file can be 64 Kbytes.
• Ignore the ini Parameters option, which is located on the left pane of the Admin
page.
6.2.1.2 Replacing the Corporate Logo with Text
You can replace the logo with text. The following figure displays an example where the
logo (top) is replaced with the text, "My Logo Text" (bottom):
Figure 6-24: Replacing Logo with Text
To replace the logo with text:
1. Create an ini file that includes the following parameter settings:
UseWebLogo = 1
WebLogoText = < your text >
2. Load the ini file using the Auxiliary Files page (see Loading Auxiliary Files on page
627).
3. Reset the device with a save-to-flash for your settings to take effect.
User's Manual 64 Document #: LTRT-40203
Page 65
User's Manual 6. Web-Based Management
6.2.2 Customizing the Product Name
You can customize the device's product name. The name is displayed in various places in
the management interfaces, as shown below using the customized name, "My Product
Name":
Web Login screen:
Figure 6-25: Customizing Product Name (Example)
Ini file "Board" field:
Board: My Product Name
CLI prompt:
My Product Name(config-system)#
To customize the device's product name:
1. Create an ini file that includes the following parameter settings:
UseProductName = 1
UserProductName = < name >
2. Load the ini file using the Auxiliary Files page (see Loading Auxiliary Files on page
627).
3. Reset the device with a save-to-flash for your settings to take effect.
6.2.3 Customizing the Favicon
You can replace the default favicon (i.e., AudioCodes) with your own personalized favicon.
Depending on the browser, the favicon is displayed in various areas of your browser, for
example, in the URL address bar, on the page tab, and wh en bookmarked:
Version 7.2 65 Mediant 4000 SBC
Page 66
Mediant 4000 SBC
Figure 6-26: Favicon Display in Browser
To customize the favicon:
1. Save your new favicon file (.ico) in a folder on the same PC that you are using to
access the device's Web interface.
2. In your browser's URL address field, append the case-sensitive suffix "/AdminPage" to
the device's IP address (e.g., http://10.1.229.17/AdminPage).
3. Log in with your credentials; the Admin page appears.
4. On the left pane, click Image Load to Device; the right pane displays the following:
Figure 6-27: Customizing Favicon
5. Use the Browse button to select your favicon file, and then click Send File; the device
loads the image file.
6. On the left pane, click Back to Main to exit the Admin page.
7. Reset the device with a save-to-flash for your settings to take effect.
Note:
• The logo image file type can be ICO, GIF, or PNG.
• The maximum size of the image file can be 16 Kbytes.
• Ignore the ini Parameters option, which is located on the left pane of the Admin
page.
User's Manual 66 Document #: LTRT-40203
Page 67
User's Manual 6. Web-Based Management
6.2.4 Creating a Login Welcome Message
You can create a personalized welcome message that is displayed on the Web Login
screen. The message always begins with the title "Note" and has a color background, as
shown in the example below:
Figure 6-28: Creating Login Welcome Message
To create a login welcome message:
1. Create an ini file that includes the WelcomeMessage table parameter. Use the
parameter to configure your message, where each index row is a line in your
message, for example:
[WelcomeMessage ]
FORMAT WelcomeMessage_Index = WelcomeMessage_Text;
WelcomeMessage 1 = "*********************************";
WelcomeMessage 2 = "** This is a Welcome message! **";
WelcomeMessage 3 = "*********************************";
[\WelcomeMessage]
2. Load the ini file using the Auxiliary Files page (see Loading Auxiliary Files on page
627).
3. Reset the device with a save-to-flash for your settings to take effect.
To remove the welcome message:
1. Load an empty ini file, using the Auxiliary Files page.
2. Reset the device with a save-to-flash for your settings to take effect.
6.3 Configuring Additional Management Interfaces
The Additional Management Interfaces table lets you configure up to 16 management
interfaces, in addition to the OAMP management interface in the IP Interfaces table.
Version 7.2 67 Mediant 4000 SBC
Page 68
Mediant 4000 SBC
For more information on IP network interface s, see Configuring IP
Multiple management interfaces lets you access the device's management interfaces (e.g.,
Web interface and CLI) remotely through different IP addresses. Each additional
management interface can be configured to use a specific network interface (Control
and/or Media type) and TLS Context, and can be configured to restrict access through
HTTPS only.
Note:
•To allow access to the device's management interfaces through all network
interfaces in the IP Interfaces table, see the E nabl eWebAccessFromAllInterfaces
The following procedure describes how to configure additional management interfaces
through the Web interface. You can also configure it through ini file
(AdditionalManagementInterfaces) or CLI (configure system > additional-mgmt-if).
parameter. This parameter does not specify a TLS Context nor a connectivity
protocol (HTTP or HTTPS).
•Currently, additional management interface s ar e not supported for REST API
(ARM).
To configure additional management interfaces:
1. Open the Additional Management Interfaces table (Setup menu > Administration tab
> Web & CLI folder > Additional Management Interfaces).
2. Click New; the following dialog box is displayed:
3. Configure an additional management interface according to the parameters described
in the table below.
4. Click Apply, and then save your settings to flash memory.
Additional Management Interfaces Tabl e Parameter Descriptions
Parameter Description
Index
[AdditionalManagementInt
erfaces_Index]
Interface Name
interface-name
User's Manual 68 Document #: LTRT-40203
Defines an index number for the new table row.
Note: Each row must be configured with a unique i ndex.
Assigns an IP network interface (from the IP Interfaces table) to the
management interface.
Page 69
User's Manual 6. Web-Based Management
[AdditionalManagementInt
Network Interfaces on page 129.
Read/write privileges for all Web pages, except security-
Parameter Description
erfaces_InterfaceName]
TLS Context Name
tls-context-name
[AdditionalManagementInt
erfaces_TLSContextName]
HTTPS Only
https-only-val
[AdditionalManagementInt
erfaces_HTTPSOnly]
Note:
Only Control- and/or Media-type IP network interfaces can be
associated with additional management interfaces.
An IP network interface can be associated with only one additional
management interface.
Assigns a TLS Context (from the TLS Contexts table) to the
management interface. A TLS Context provides secure TLS-based
management access.
For more information on TLS Contexts, see Config uring TLS
Certificate Contexts on page 103.
Defines the protocol required for accessing the management
interface.
[0] HTTP and HTTPS = The management interface can be
accessed over a secured (HTTPS) and an unsecured (HTTP)
connection.
[1] HTTPS Only = The management interface can be accessed
only over a secured (HTTPS) connection.
[2] Use global definition = The type of management connection
(HTTP and HTTPS, or HTTPS Only) depends on the conf i guration
of the global parameter, HTTPSOnly (see Configuring Secured
(HTTPS) Web on page 77).
6.4 Configuring Management User Accounts
The Local Users table lets you configure up to 10 management user accounts for the
device's Web interface and CLI. You configure each user account with login credentials
(username and password) and with a management user level which defines the level of
read and write privileges. The table below describes the different types of user levels:
Table 6-5: Description of Management User Levels
Numeric
User Level
Security
Administrator
Master
Administrator
Representation in
RADIUS
200 Read/write privileges for all Web pages. This user l evel
220 Read/write privileges for all Web pages. This use r level
100
Privileges
can create all other user levels and is the only one that
can create the first Master user.
Note: At least one Security Administrator user must exist.
can create all user levels, including additional Master
users and Security Administrators. It can delete al l users
except the last Security Administrator.
Note: Only Master users can delete Master users. If only
one Master user exists, it can be deleted only by itself.
Version 7.2 69 Mediant 4000 SBC
Page 70
User Level
related pages and the Local Users table where this us er
Mediant 4000 SBC
Numeric
Representation in
Privileges
RADIUS
has read-only privileges.
Monitor
Note: Only Security Administrator and Master users can configure users in the Local
Users table. Administrator users have read-only privileges and Monitor users are
denied access to the table. However, Administrator and Monitor users can change
their login credentials in the Web Settings page (see ''Configuring Web Session and
Access Settings'' on page 75).
By default, the device is pre-configured with the foll owing two user accounts:
User Level Username
Security Administrator
Monitor
Note:
•For security, it's recommended that you change the default username and
password of the default users.
•To restore the device to the default users (and with their default usernames and
passwords), configure the ini file ResetWebPassword parameter to 1. If you have
configured any other accounts, they are deleted.
•If you delete a user who is currently in an active We b session, the user is
immediately logged off the device.
•Up to five users can be concurrently logged in to the Web interface; they can all be
the same user.
•You can set the entire Web interface to read-only (re gardless of Web user access
levels), using the ini file parameter DisableWebConfig (see ''Web and Telnet
Parameters'' on page 803).
•You can define additional Web user accounts using a RADIUS server (see
''RADIUS Authentication'' on page 233).
The following procedure describes how to configure user accounts through the Web
interface. You can also configure it through ini file (WebUsers) or CLI (configure system >
user).
50 Read-only privileges and access to security-related pages
is blocked.
Table 6-6: Default User Accounts
Password
(Case-Sensitive)
(Case-Sensitive)
"Admin" "Admin"
"User" "User"
User's Manual 70 Document #: LTRT-40203
Page 71
User's Manual 6. Web-Based Management
To configure management user accounts:
1. Open the Local Users table (Setup menu > Administration tab > Web & CLI folder >
Local Users).
2. Click New; the following dialog box is displayed:
Figure 6-30: Local Users Table - Dialog Box
3. Configure a user account according to the parameters described in the table below.
4. Click Apply, and then save your settings to flash memory.
Parameter Description
General
Index
[WebUsers_Index]
Username
user
[WebUsers_Username]
Password
password
[WebUsers_Password]
Table 6-7: Local Users Table Parameter Descriptions
Defines an index number for the new table row.
Note: Each row must be configured with a unique i ndex.
Defines the Web user's username.
The valid value is a string of up to 40 alphanumeric chara ct ers,
including the period ".", underscore "_", and hyphen "-" signs.
Defines the Web user's password.
The valid value is a string of 8 to 40 ASCII characters. To ensure
strong passwords, adhere to the following pass wor d complexity
requirements:
Contain at least eight characters.
Contain at least two letters that are upper case (e.g., A).
Contain at least two letters that are lower case (e.g., a).
Contain at least two numbers (e.g., 4).
Contain at least two symbols (non-alphanumeric characters) (e.g.,
$, #, %).
No spaces.
Contain at least four new characters that were not used in the
previous password.
Note:
To enforce the password complexity requirements mentioned
above, configure the EnforcePasswordComplexity to 1.
Version 7.2 71 Mediant 4000 SBC
Page 72
Mediant 4000 SBC
For security, password characters are not shown in the Web
The valid value is a string of up to 512 characters. By def aul t, no value
Parameter Description
interface and ini file. In the Web interface, they are display ed as
dots when you enter the password and then once appli ed, the
password is displayed as an asterisk (*) in the table. I n t he ini file,
they are displayed as an encrypted string.
User Level
privilege
[WebUsers_UserLevel]
SSH Public Key
public-key
[WebUsers_SSHPublicKey]
Defines the user's access level.
Monitor = (Default) Read-only user. This user can only view Web
pages and access to security-related pages is denied.
Administrator = Read/write privileges for all pages except security-
related pages including the Local Users table where this user has
read-only privileges.
Security Administrator = Full read/write privileges for all pages.
Master = Read/write privileges for all pages. This user also
functions as a security administrator.
Note:
At least one Security Administrator must exist. You cannot delete
the last remaining Security Administrator.
The first Master user can be added only by a Security
Administrator user.
Additional Master users can be added, edited and deleted only by
Master users.
If only one Master user exists, it can be deleted only by itself.
Master users can add, edit, and delete Security Administrators
(except the last Security Administrator).
Only Security Administrator and Master users can add, edit, and
delete Administrator and Monitor users.
Defines a Secure Socket Shell (SSH) public key for RS A public-key
authentication (PKI) of the remote user when loggin g into the device's
CLI through SSH. Connection to the CLI is establi shed only when a
successful handshake with the user’s private key occurs.
is defined.
Note:
For more information on SSH and for enabling SSH, see Enabling
SSH with RSA Public Key for CLI on page 82.
To configure whether SSH public keys are optional or mandatory,
use the SSHRequirePublicKey parameter.
If not configured, the settings of the global parameter,
SSHAdminKey is used.
Status
status
[WebUsers_Status]
Defines the status of the user.
New = (Default) User is required to change its password on the
next login. When the user logs in to the Web interfac e, the user is
immediately prompted to change the current password.
Valid = User can log in to the Web interface as normal.
Failed Login = The state is automatically set for users that exceed
a user-defined number of failed login attempts, set by the 'Deny
Access on Fail Count' parameter (see 'Configuring W eb Session
and Access Settings' on page 75). These users can log in only
after a user-defined timeout configured by the 'Block Duration'
parameter (see below) or if their status is changed (t o New or
Valid) by a Security Administrator or Master.
User's Manual 72 Document #: LTRT-40203
Page 73
User's Manual 6. Web-Based Management
Inactivity = The state is automatically set for users that have not
The default value is according to the settings of the
Parameter Description
accessed the Web interface for a user-defined number of days, set
by the 'User Inactivity Timer' (see 'Configuring Web Session and
Access Settings' on page
75). These users can only log in to the
Web interface if their status is changed (to New or Valid) by a
System Administrator or Master.
Note:
The Inactivity status is applicable only to Administrator and Monitor
users; Security Administrator and Master user s ca n be inactive
indefinitely.
For security, it is recommended to set the status of a newly added
user to New in order to enforce password change.
Security
Password Age
password-age
[WebUsers_PwAgeInterval]
Web Session Limit
session-limit
[WebUsers_SessionLimit]
CLI Session Limit
cli-session-limit
[WebUsers_CliSessionLimit]
Defines the duration (in days) of the validity of the password. When
the duration elapses, the user is prompted to change the password;
otherwise, access to the Web interface is blocked.
The valid value is 0 to 10000, where 0 means that the pass wor d is
always valid. The default is 90.
Defines the maximum number of concurrent We b i nterface and REST
sessions allowed for the specific user account. For example, if
configured to 2, the user account can be logged into the device’s Web
interface (i.e., same username-password combination) from two
different management stations (i.e., IP addresse s) or Web browsers at
the same time.
Once the user logs in, the session is active unti l the user logs off or
until the session expires if the user is inactive for a user-defined
duration (see the 'Web Session Timeout' paramet er below).
The valid value is 0 to 5. The default is 2.
Note: If the number of concurrently logged-in users is at the
configured maximum, the device allows an additional user to log in
through REST.
Defines the maximum number of concurrent CLI sessions allowed for
the specific user. For example, if configured to 2, t he same user
account can be logged into the device’s CLI (i.e., same usernamepassword combination) from two different management stations (i.e.,
IP addresses) at any one time. Once the user logs in, the session is
active until the user logs off or until the session expires if t he user is
inactive for a user-defined duration (see the 'Web S ession Timeout'
parameter below).
The valid value is -1, or 0 to 100. The default is -1, which means that
the limit is according to the global parameters, 'Maximum Telnet
Sessions' (TelnetMaxSessions) or 'Maximum SSH Sessions'
(SSHMaxSessions).
Web Session Timeout
session-timeout
[WebUsers_SessionTimeout]
Defines the duration (in minutes) of inactivity of a logged-in user in the
Web interface, after which the user is automatically logged off the
Web session. In other words, the session expires when the user has
not performed any operations (activities) in the Web interface for the
configured timeout duration.
The valid value is 0, or 2 to 100000. A value of 0 means no timeout.
Version 7.2 73 Mediant 4000 SBC
Page 74
Mediant 4000 SBC
WebSessionTimeout global parameter (see 'Configu ring Web Session
The valid value is 0 to 100000, where 0 means that the user can do as
Parameter Description
and Access Settings' on page 75).
Block Duration
block-duration
Defines the duration (in seconds) for which the user is blocked when
the user exceeds a user-defined number of failed logi n attempts.
[WebUsers_BlockTime]
many login failures without getting blocked. The def ault is according to
the settings of the 'Deny Authentication Timer' parameter (see
'Configuring Web Session and Access Settings' on page
Note:
To enable this feature, see the 'Deny Access On Fail Count'
parameter in 'Configuring Web Session and Access S ettings' on
page 75.
The 'Deny Authentication Timer' parameter relates to failed Web
logins from specific IP addresses.
6.5 Displaying Login Information upon Login
You can enable the device to display login information immediately upon Web login.
To enable display of user login information upon login:
1. Open the Web Settings page (Setup menu > Administration tab > Web & CLI folder
> Web Settings).
2. Under the Security group, from the 'Display Last Login Information' drop-down list,
select Enable.
3. Click Apply.
Once enabled, each time you login to the device, the Login Information window is
displayed, as shown in the example below:
75).
Figure 6-31: Login Information Window
To close the window, click Close.
User's Manual 74 Document #: LTRT-40203
Page 75
User's Manual 6. Web-Based Management
management user with Security Administrator level or Master level. For more
6.6 Viewing Logged-In User Information
The username of the currently logged in user is displayed in the top-right corner of the Web
interface. If you click the username (e.g., "A dm i n" ), a pop-up callout appears:
Figure 6-32: Logged-in User Information
The following information is displayed:
'Access Level': User level of the currently logged in user (e.g., Security Administrator). 'Session Time': Duration of the current Web session (starting from login).
The Log Out button is also provided for logging out of the Web session (see ''Logging Off
the Web Interface'' on page 62).
6.7 Configuring Web Session and Access Settings
The following procedure describes how to configure security features related to Web user
sessions and access.
Note: You can only perform the configuration described in this section if you are a
information, see ''Configuring Management Us er Accounts'' on page 69.
To configure Web user sessions and access security:
1. Open the Web Settings page (Setup menu > Administration tab > Web & CLI folder
> Web Settings).
2. Under the Session group, configure the following parameters:
Figure 6-33: Configuring Web User Sessions
•'Password Change Interval': Duration (in minutes) of the validity of the Web login
passwords. When the duration expires, the user m ust change the password in
order to log in again.
Version 7.2 75 Mediant 4000 SBC
Page 76
Mediant 4000 SBC
•'User Inactivity Timeout': If the user has not logged i nto the Web interface within
this duration, the status of the user becomes inactive and the user can no longer
access the Web interface. The user can only log in to the Web interface if its
status is changed (to New or Valid) by a Security Administrator or Master user
(see ''Configuring Management User Accounts'' on page 69).
•'Session Timeout': Duration (in minutes) of inactivity (i.e., no actions are
performed in the Web interface) of a logged-in user, after which the Web session
expires and the user is automatically logged off the Web interface and needs to
log in again to continue the session. You can also configure the functionality per
user in the Local Users table (see ''Configuring Management User Accounts'' on
page 69), which overrides this global setting.
3. Under the Security group, configure the following parameters:
Figure 6-34: Configuring Web User Security
•'Deny Authentication Timer': Interval (in se conds) that the user needs to wait
before logging in from the same IP address after reachi ng the maximum number
of failed login attempts (see next step).
•'Deny Access On Fail Count': Number of failed logi n attempts (e.g., incorrect
username or password) after which the device blocks access to the user for a
user-defined duration (previous step).
4. Click Apply.
For a detailed description of the above parameter s, see ''Web Parameters'' on page 804.
6.8 Changing Login Password for Administrator and
Monitor Users
If you are logged in as a user with Administrator level or Monitor level, you can change
your login password by performing the following procedure.
Note:
•Users with Security Administrator level or Master level can change passwords for
themselves and for other users in the Local Users tabl e (se e ''Configuring
Management User Accounts'' on page 69).
•You can only change the password if the duration configured in the 'Password
Change Interval' has elapsed (see ''Configuring Web S ession and Access
Settings'' on page 75).
User's Manual 76 Document #: LTRT-40203
Page 77
User's Manual 6. Web-Based Management
To change the login password:
1. Open the Web Settings page (Setup menu > Administration tab > Web & CLI folder
> Web Settings).
Figure 6-35: Changing Login Password for Administrator and Monitor User Levels
2. In the 'Current Password' field, type in your current login password.
3. In the 'New Password' field, type in your new password.
4. In the 'Confirm New Password' field, type in your new password again.
5. Click Change; you are logged off the Web session and prompted to login in again with
your new login password.
6.9 Configuring Secured (HTTPS) Web
By default, the device allows remote management (client) through HTTP and HTTPS.
However, you can enforce secure Web access communication by configuring the device to
accept only HTTPS.
To configure secure (HTTPS) Web access:
1. Open the Web Settings page (Setup menu > Administration tab > Web & CLI folder
> Web Settings).
2. Under the General group, configure the following:
3. From the 'Secured Web Connection (HTTPS)' drop-down list, select HTTPS Only.
4. To enable two-way authentication whereby both management client and server are
authenticated using X.509 certificates, from the 'Require Client Certificates for HTTPS
connection' drop-down list, select Enable.
5. In the 'HTTPS Cipher String' field, enter the cipher string for HTTPS (in OpenSSL
cipher list format).
6. Click Apply, and then reset the device with a save-to-flash for your settings to take
effect.
For more information on secure Web-based management including TLS certificates, see
''TLS for Remote Device Management'' on page 116.
Version 7.2 77 Mediant 4000 SBC
Page 78
Mediant 4000 SBC
6.10 Web Login Authentication using Smart Cards
You can enable Web login authentication using certificates from a third-party, common
access card (CAC) with user identification. When a user attempts to access the device
through the Web browser (HTTPS), the device retrieves the Web user’s login username
(and other information, if required) from the CAC. The user attempting to access the device
is only required to provide the login password. Typically, a TLS connection is established
between the CAC and the device’s Web interface, and a RADIUS server is implemented to
authenticate the password with the username. Therefore, this feature implements a twofactor authentication - what the user has (i.e., the physical card) and what the user knows
(i.e., the login password).
This feature is enabled using the EnableMgmtTwoFactorAuthentication parameter.
Note: For specific integration requirements for implementing a third-party smart card
for Web login authentication, contact your AudioCodes representative.
To log in to the Web interface using CAC:
1. Insert the Common Access Card into the card reader.
2. Access the device using the following URL: https://<host name or IP address>; the
device prompts for a username and password.
3. Enter the password only. As some browsers require that the username be provided,
it’s recommended to enter the username with an arbitrary value.
User's Manual 78 Document #: LTRT-40203
Page 79
User's Manual 6. Web-Based Management
6.11 Configuring Web and Telnet Access List
The Access List table lets you restrict access to the device's management interfaces (Web,
Telnet and SSH) by specifying IP addresses (up to ten) of management clients that are
permitted to access the device. Access to the device's management interfaces from
undefined IP addresses is denied. If you don't specify any IP addresses, this security
feature is inactive and the device can be accessed f rom any IP address.
The following procedure describes how to configure the Access List through the Web
interface. You can also configure it through ini file (W ebA ccessList_x).
Note:
•Configure the IP address of the computer from which you are currently logged into
the device as the first authorized IP address in the A ccess List. If you configure
any other IP address, access from your computer will be immediately denied.
•If you configure network firewall rules in the Fire wall table (see ''Configuring
Firewall Rules'' on page 165), you must configure a firewall rule that permits traffic
from IP addresses configured in the Access List table.
To add IP addresses to the Access List:
1. Open the Access List table (Setup menu > Administration tab > Web & CL I folder >
Access List).
Figure 6-36: Access List - Adding IP Address
2. In the 'Add an authorized IP address' field, configure an IP address, and then click
Add New Entry; the IP address is added to the table.
Figure 6-37: Web & Telnet Access List Table
If you have configured IP addresses in the Access List and you no longer want to restrict
access to the management interface based on the Access List, delete all the IP addresses
in the table, as described in the following procedure.
Note: When deleting all the IP addresses, make sure that you delete the IP address
of the computer from which you are currently logged into the device, last; otherwise,
access from your computer will be immediately denied.
Version 7.2 79 Mediant 4000 SBC
Page 80
Mediant 4000 SBC
To delete an IP address from the Access List:
1. Select the Delete Row check box corresponding to the IP address that you want to
delete.
2. Click Delete Selected Addresses.
User's Manual 80 Document #: LTRT-40203
Page 81
User's Manual 7. CLI-Based Management
7 CLI-Based Management
This chapter provides an overview of the CLI-based management and provides
configuration relating to CLI management.
Note:
• By default, CLI is disabled (for security purposes).
• The CLI can only be accessed by management users with the following user
levels:
7.1 Enabling CLI
√ Administrator
√ Security Administrator
√ Master
•For more information on the CLI and CLI commands, refer to the CLI Reference
Guide.
By default, access to the device's CLI through Telnet and SSH is disabled. This section
describes how to enable these protocols.
7.1.1 Enabling Telnet for CLI
The following procedure describes how to enable Telnet. You can enable a secured Telnet
that uses Secure Socket Layer (SSL) where information is not transmitted in clear text. If
SSL is used, a special Telnet client is required on your PC to connect to the Telnet
interface over a secured connection; examples include C-Kermit for UNIX and Kermit-95
for Windows.
For security, some organizations require the display of a proprietary notice upon starting a
Telnet session. To configure such a message, see ''Creating a Login Welcome Message''
on page 61.
To enable Telnet:
1. Open the CLI Settings page (Setup menu > Administration tab > Web & CLI folder >
CLI Settings).
2. Configure the following parameters:
•'Embedded Telnet Server': Select Enable Unsecured or Enable Secured (i.e,
SSL) to enable Telnet.
•'Telnet Server TCP Port': Enter the port number of the em bedded Telnet server.
Version 7.2 81 Mediant 4000 SBC
Page 82
Mediant 4000 SBC
•'Telnet Server Idle Timeout': Enter the duration of ina ct i vity in the Telnet session
after which the session automatically ends.
3. Click Apply, and then reset the device with a save-to-flash for your settings to take
effect.
For a detailed description of the Telnet parameters, see ''Telnet Parameters'' on page 809.
7.1.2 Enabling SSH with RSA Public Key for CLI
Unless configured for TLS, Telnet is not secure as it requires passwords to be transmitted
in clear text. To overcome this, you can use Secure SHell (SSH) which is the de-facto
standard for secure CLI. SSH 2.0 is a protocol built above TCP providing methods for key
exchange, authentication, encryption, and authorization. SSH requires appropriate client
software for the management PC. Most Linux distributions have OpenSSH pre-installed;
Windows-based PCs require an SSH client software such as PuTTY, which can be
downloaded from http://www.chiark.greenend.org.uk/~sgtatham/putty/. By default, SSH
uses the same username and password as the device's Telnet and Web server. SSH
supports 1024/2048-bit RSA public keys, providi ng carrier-grade security.
Follow the instructions below to configure the device with an administrator RSA key as a
means of strong authentication.
To enable SSH and configure RSA public keys for Windows (using PuTTY SSH
software):
1. Start the PuTTY Key Generator program, and then do the following:
a. Under the 'Parameters' group, do the following:
♦ Select the SSH-2 RSA option.
♦ In the 'Number of bits in a generated key' field, enter "1024" bits.
b. Under the 'Actions' group, click Generate and then follow the on-screen
instructions.
c. Under the 'Actions' group, click Save private key to save the new private key to a
file (*.ppk) on your PC.
d. Under the 'Key' group, select the displayed encoded text (pubic key) between
"ssh-rsa" and "rsa-key-….", as shown in the example below:
Figure 7-1: Selecting Public RSA Key in PuTTY
2. You can use the public key per management user or for all management users:
User's Manual 82 Document #: LTRT-40203
Page 83
User's Manual 7. CLI-Based Management
•Per user: Open the Local Users table (see Configuring Management User
Accounts on page 69), and then for the required user, paste the public key that
you copied in Step 1.d into the 'SSH Public Key' fiel d, as shown below:
Figure 7-2: Pasting Public RSA Key per User in Local Users Table
•For all users: Open the CLI Settings page (Setup menu > Administration tab >
Web & CLI folder > CLI Settings), and then paste the public key that you copied
in Step 1.d into the 'Admin Key' field, as shown below:
Figure 7-3: Pasting Public RSA Key in 'Admin Key' Field
3. On the CLI Settings page, do the following:
a. From the 'Enable SSH Server' drop-down list, select Enable.
b. For additional security, you can configure the 'Req ui re Public Key' field to Enable.
This ensures that SSH access is only possible by using the RSA key and not by
username and password.
c. Configure the other SSH parameters as required. For a description of these
parameters, see SSH Parameters on page 845.
d. Click Apply.
4. Start the PuTTY Configuration program, and then do the following:
a. In the 'Category' tree, drill down to Connection, then SSH, and then Auth; the
b. Under the 'Authentication parameters' group, click Browse and then locate the
private key file that you created and saved in Step 4.
5. Connect to the device with SSH using the username "Admin"; RSA key negotiation
Version 7.2 83 Mediant 4000 SBC
Page 84
Mediant 4000 SBC
occurs automatically and no password is required.
To configure RSA public keys for Linux (using OpenSSH 4.3):
1. Run the following command to create a new key in the admin.key file and to save the
public portion to the admin.key.pub file:
ssh-keygen -f admin.key -N "" -b 1024
2. Open the admin.key.pub file, and then copy the encoded string from "ssh-rsa" to the
white space.
3. You can use the public key per management user or for all users:
•Per user: Open the Local Users table (see Configuring Management User
Accounts on page 69), and then for the required user, paste the public key that
you copied in Step 2 into the 'SSH Public Key' field.
•For all users: Open the CLI Settings page, and then paste the public key that you
copied in Step 2 into the 'Admin Key' field.
4. Connect to the device with SSH, using the following command (where xx.xx.xx.xx is
the device's IP address):
ssh -i admin.key xx.xx.xx.xx
RSA-key negotiation occurs automatically and no pas sword is required.
7.2 Configuring Maximum Telnet/SSH Sessions
You can configure the maximum number of concurrent Telnet and SSH sessions (up to
five) permitted on the device.
Note: Before changing the setting, make sure that not more than the number of
sessions that you want to configure are currently active; otherwise, the new setting
will not take effect.
To configure the maximum number of concurrent Telnet and SSH sessions:
1. Open the CLI Settings page (Setup menu > Administration tab > Web & CLI folder >
CLI Settings).
2. For Telnet: Under the Telnet group, in the 'Maximum Telnet Sessions' field, enter the
maximum number of concurrent sessions.
3. For SSH: Under the SSH group, in the 'Maximum SSH Sessions' field, enter the
maximum number of concurrent sessions.
4. Click Apply.
7.3 Establishing a CLI Session
You can access the device's CLI using any of the following m ethods:
RS-232: The device can be accessed through its RS-232 serial port, by connecting a
VT100 terminal to it or using a terminal emulation p rogram (e.g., HyperTerminal) with
a PC. For connecting to the CLI through RS-232, see CLI on page
Secure SHell (SSH): The device can be accessed through its Ethernet interface by
the SSH protocol using SSH client software. A popular and freeware SSH client
software is Putty, which can be downloaded from
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
39.
User's Manual 84 Document #: LTRT-40203
Page 85
User's Manual 7. CLI-Based Management
sensitive), respectively. To configure login credentials and
Telnet: The device can be accessed through its Ethernet interface by the Telnet
protocol using Telnet client software.
The following procedure describes how to access the CLI through Telnet/SSH.
Note: The CLI login credentials are the same as all the device's other management
interfaces (such as Web interface). The default username and password is "Admin"
and "Admin" (casemanagement user accounts, see ''Configuring Management User Accounts'' on page
69.
To establish a CLI session with the device:
1. Connect the device to the network.
2. Establish a Telnet or SSH session using the device's OAMP IP address.
3. Log in to the session using the username and password assigned to the Admin user of
the Web interface:
a. At the Username prompt, type the username, and then press Enter:
Username: Admin
b. At the Password prompt, type the password, and the n press Enter:
Password: Admin
c. At the prompt, type the following, and then press Enter:
> enable
d. At the prompt, type the password again, and then p ress Enter:
Password: Admin
7.4 Viewing Current CLI Sessions
You can view users that are currently logged in to the device's CLI. This applies to users
logged in to the CLI through RS-232 (console), Telnet, or SSH. For each logged-in user,
the following is displayed: the type of interface (console, Telnet, or SSH), username,
remote IP address fr om where the user logged in, and the duration (days and time) of the
session. Each user is displayed with a unique index (session ID).
To view currently logged-in CLI users:
1. Establish a CLI session with the device.
2. Run the following command:
# show users
[0] console Admin local 0d00h03m15s
[1] telnet John 10.4.2.1 0d01h03m47s
[2]* ssh Alex 192.168.121.234 12d00h02m34s
The current session from which this show command was run is displayed with an asterisk
(*).
Note: The device can display management sessions of up to 24 hours. After this
time, the duration counter is reset.
Version 7.2 85 Mediant 4000 SBC
Page 86
Mediant 4000 SBC
7.5 Terminating a User's CLI Session
You can terminate users that are currently logged in to the device's CLI. This applies to
users logged in to the CLI through RS-232 (console), T el net , or SSH.
To terminate the CLI session of a specific CLI user:
1. Establish a CLI session with the device.
2. Run the following command:
# clear user <session ID>
Where <session ID> is a unique identification of eac h currently logged in user. You
can view the session ID by running the sho w users command (see ''Vi ewing Cur rent
CLI Sessions'' on page 85).
Note: The session from which the command is run cannot be terminated.
7.6 Configuring Displayed Output Lines in CLI Terminal
Window
You can configure the maximum number of lines (height) displayed in the terminal window
for the output of CLI commands (Telnet and SSH). The number of displayed lines can be
from 0 to 65,535, or determined by re-sizing the terminal window by mouse-dragging the
window's border.
To specify the number of displayed output lines:
1. Establish a CLI session with the device.
2. Access the System menu:
# configure system
3. At the prompt, type the following command:
(config-system)# cli-terminal
4. At the prompt, type the following command:
<cli-terminal># window-height [0-65535]
If window-height is set to 0, the entire command output is displayed. In other words,
even if the output extends beyond the visible termi nal window length, the --MORE-prompt is not displayed.
To configure the number of displayed output lines by dragging terminal
window:
1. Establish a CLI session with the device.
2. Access the System menu:
# configure system
3. At the prompt, type the following command:
(config-system)# cli-terminal
4. At the prompt, type the following command:
<cli-terminal># window-height automatic
When this mode is configured, each time you change the height of the terminal window
using your mouse (i.e., dragging one of the window's borders or corners), the number of
displayed output command lines is changed accordingly.
User's Manual 86 Document #: LTRT-40203
Page 87
User's Manual 8. SNMP-Based Management
8 SNMP-Based Management
The device provides an embedded SNMP agent that lets you manage it using AudioCodes
One Voice Operations Center (OVOC) or a third-party SNMP manager. The SNMP agent
supports standard and proprietary Management Information Base (MIBs). All supported
MIB files are supplied to customers as part of the release. The SNMP agent can send
unsolicited SNMP trap events to the SNMP manager.
Note:
• By default, SNMP-based management is enabled.
• For more information on the device's SNMP support s uch as SNMP trap alarms
8.1 Disabling SNMP
By default, SNMP is enabled. You can disable SNMP as described in the following
procedure.
and events, refer to the SNMP Reference Guide.
•For more information on AudioCodes OVOC, refer to the OVOC User's Manual.
To disable SNMP:
1. Open the SNMP Community Settings page (Setup menu > Administration tab >
SNMP folder > SNMP Community Settings).
2. From the 'Disable SNMP' drop-down list (DisableSNMP parameter), select Yes:
3. Click Apply.
8.2 Configuring SNMP Community Strings
SNMP community strings determine the access privileges (read-only and read-write) of
SNMP clients with the device's SNMP agent. You can configure up to five read-only SNMP
community strings and up to five read-write SNMP community strings. The device's SNMP
agent accepts SNMP Get (read-only) and Set (read-write) requests only if the correct
community string is used in the request.
You can also configure a unique password-like community string used for sending SNMP
traps. The device sends the traps with the community string.
Note:
•SNMP community strings are applicable only t o S NM P v1 and SNMPv2c; SNMPv3
uses username-password authentication along with an encryption key (see
Version 7.2 87 Mediant 4000 SBC
''Configuring SNMP V3 Users'' on page 92).
•You can enhance security by configuring Trusted Managers (see ''Configuring
SNMP Trusted Managers'' on page 91). A Trusted Manager is an IP addre ss from
which the SNMP agent accepts Get and Set requests.
Page 88
Mediant 4000 SBC
For detailed descriptions of the SNMP parameter s, see ''SNMP Parameters'' on page 810.
To configure SNMP community strings:
1. Open the SNMP Community Settings page (Setup menu > Administration tab >
SNMP folder > SNMP Community Settings).
2. Configure SNMP community strings for access privileges:
•Under the Read Only Community Strings group, configure read -only
community strings (see the table below).
•Under the Read/Write Community Strings group, configure read-write
community strings (see the table below).
3. Configure a community string for SNMP traps: Under the Misc. Settings group, in the
'Trap Community String' field, configure a community string (see the table below).
Figure 8-1: Configuring SNMP Trap Community String
4. Click Apply, and then reset the device with a save-to-flash for your settings to take
effect.
To delete a community string, delete the configured string, click Apply., and then reset the
device with a save-to-flash for your settings to take effect.
Table 8-1: SNMP Community String Parameter Descriptions
Parameter Description
User's Manual 88 Document #: LTRT-40203
Page 89
User's Manual 8. SNMP-Based Management
Parameter Description
Read Only Community Strings
configure system > snmp settings >
Trap Community String
configure system > snmp trap >
community-string
[SNMPTrapCommunityString]
Defines read-only SNMP community strings. Up to five readonly community strings can be configured.
The valid value is a string of up to 30 characters that can
include only the following:
Upper- and lower-case letters (a to z, and A to Z)
Numbers (0 to 9)
Hyphen (-)
Underline (_)
For example, "Public-comm_string1".
The default is "public".
Defines read-write SNMP community strings. Up to five readwrite community strings can be configured.
The valid value is a string of up to 30 characters that can
include only the following:
Upper- and lower-case letters (a to z, and A to Z)
Numbers (0 to 9)
Hyphen (-)
Underline (_)
For example, "Private-comm_string1".
The default is "private".
Defines the community string for SNMP traps.
The valid value is a string of up to 30 characters that can
include only the following:
Upper- and lower-case letters (a to z, and A to Z)
Numbers (0 to 9)
Hyphen (-)
Underline (_)
For example, "Trap-comm_string1".
The default is "trapuser".
8.3 Configuring SNMP Trap Destinations with IP
Addresses
The SNMP Trap Destinations table lets you to configure up to five SNMP trap managers to
receive traps sent by the device. The SNMP manager is defined by IP address and port.
You can associate a trap destination with SNMPv2 users and specific SNMPv3 users.
Associating a trap destination with SNMPv3 users sends encrypted and authenticated
traps to the SNMPv3 destination. By default, t raps are sent unencrypted using SNMPv2.
The following procedure describes how to configure SNMP trap destinations through the
Web interface. You can also configure it through ini file (SNMPManager) or CLI (configure
system > snmp trap-destination).
Version 7.2 89 Mediant 4000 SBC
Page 90
Mediant 4000 SBC
Enables the SNMP manager to receive traps and checks the
[1]
To configure SNMP trap destinations:
1. Open the SNMP Trap Destinations table (Setup menu > Administration tab > SNMP
folder > SNMP Trap Destinations).
Figure 8-2: SNMP Trap Destinations Table
2. Configure the SNMP trap manager according to the table below.
3. Select the check boxes corresponding to the configured SNMP managers that you
want to enable.
4. Click Apply.
Note:
•Rows whose corresponding check boxes are cleare d revert to default settings
when you click Apply.
•To enable the sending of the trap event,
acPerformanceMonitoringThresholdCrossing, which is sent every time a threshold
(high or low) of a performance monitored SNMP object is crossed, configure the
ini file parameter PM_EnableThresholdAlarms to 1.
•Instead of configuring SNMP trap managers with an IP address in dotted-decimal
notation, you can configure a single SNMP trap manager with an FQDN (see
''Configuring an SNMP Trap Destination with FQDN'' on page 91.
Defines the IP address (in dotted-decimal notation, e.g.,
108.10.1.255) of the remote host used as the SNMP
manager. The device sends SNMP traps to this IP address.
Defines the port number of the remote SNMP mana ger. The
device sends SNMP traps to this port.
The valid value range is 100 to 4000. The default is 162.
Associates a trap user with the trap destination. T hi s
determines the trap format, authentication level, and
encryption level.
v2cParams (default) = SNMPv2 user community string
SNMPv3 user configured in ''Configuring SNMP V3
Users'' on page 92
User's Manual 90 Document #: LTRT-40203
Page 91
User's Manual 8. SNMP-Based Management
[1]
Parameter Description
Trap Enable
[SNMPManagerTrapSendingEnable_x]
Activates the sending of traps to the SNMP Manager.
[0] Disable
Enable (Default)
8.4 Configuring an SNMP Trap Destination with FQDN
Instead of configuring SNMP trap destinations (managers) with IP addresses in dotteddecimal notation in the SNMP Trap Destinations table (see ''Configuring SNMP Trap
Destination with IP Addresses'' on page 89), you can configure a single SNMP trap
manager with an FQDN (e.g., mngr.corp.mycompany.com). The device sends the traps to
the DNS-resolved IP address. The resolved IP address replaces the IP address of the last
row (SNMP Manager 5) in the SNMP Trap Destinations table (and the last trap manager
entry in the snmpTargetAddrTable in the snmpTargetMIB).
Note: If you configure an FQDN for an SNMP trap manager:
• The device ignores your configuration in the SNMP Trap Destinations table.
• Only one SNMP trap manager can be configured.
To configure an SNMP trap destination with an FQDN:
1. Open the SNMP Community Settings page (Setup menu > Administration tab >
SNMP folder > SNMP Community Settings).
2. Under the Misc. Settings group, in the 'Trap Manager Host Name' field
(SNMPTrapManagerHostName parameter), enter the FQDN.
3. Click Apply.
8.5 Configuring SNMP Trusted Managers
The SNMP Trusted Managers table lets you configure up to five SNMP Trusted Managers.
By default, the SNMP agent accepts SNMP Get and Set requests from any IP address as
long as the correct community string is used in the request (see ''Configuring SNMP
Community Strings'' on page 87). You can enhance security by configuring Trusted
Managers, which is an IP address from which the device's SNMP agent accepts and
processes SNMP requests. If no SNMP Trusted Manager is configured, any SNMP
manager can access the device (as long as the community string is correct).
The following procedure describes how to configure SNMP Trusted Managers through the
Web interface. You can also configure it through ini file (SNMPTrustedMgr_x) or CLI
(configure system > snmp settings > trusted-managers).
Version 7.2 91 Mediant 4000 SBC
Page 92
Mediant 4000 SBC
), the trap destination
To configure SNMP Trusted Managers:
1. Open the SNMP Trusted Managers table (Setup menu > Administration tab > SNMP
folder > SNMP Trusted Managers).
Figure 8-3: SNMP Trusted Managers Table
2. Configure an IP address (in dotted-decimal notation) for one or more SNMP Trusted
Managers.
3. Select the check boxes corresponding to the configured SNMP Trusted Managers that
you want to enable.
4. Click Apply, and then reset the device with a save-to-flash for your settings to take
effect.
8.6 Enabling SNMP Traps for Web Activity
You can enable the device to send SNMP traps to notify of management users' activities in
the Web interface. A trap is sent each time an activity is done by a user. To configure the
types of Web activities that you want reported, see ''Configuring Reporting of Management
User Activities'' on page 771.
To enable traps to SNMP manager for Web activity:
1. Open the SNMP Community Settings page (Setup menu > Administration tab >
SNMP folder > SNMP Community Settings).
2. Under the Misc. Settings group, from the 'Activity Trap' drop-down list
(EnableActivityTrap), select Enable.
Figure 8-4: Enabling Trap for Web User Activities
3. Click Apply.
8.7 Configuring SNMP V3 Users
The SNMPv3 Users table lets you configure up to 10 SNMP v3 users for authentication
and privacy.
The following procedure describes how to configure SNMP v3 users through the Web
interface. You can also configure it through ini file (SNMPUsers) or CLI (configure system >
snmp v3-users).
Note: If you delete a user that is associated with a trap destination (see ''Configuring
SNMP Trap Destinations with IP Addresses'' on page 89
becomes disabled and the trap user reverts to default (i.e., SNMPv2).
User's Manual 92 Document #: LTRT-40203
Page 93
User's Manual 8. SNMP-Based Management
[2]
Authentication key. Keys can be entered in the form of a t ext password
To configure an SNMP v3 user:
1. Open the SNMPv3 Users table (Setup menu > Administration tab > SNMP folder >
SNMP V3 Users).
2. Click New; the following dialog box appears:
Figure 8-5: SNMPv3 Users Table - Dialog Box
3. Configure the SNMP V3 parameters according to the table below.
4. Click Apply, and then reset the device with a save-to-flash for your settings to take
You can configure the device through an ini file, which is a text-based file with an *.ini file
extension name, created using any standard text-based editor such as Notepad. Once you
have created an ini file with all your configuration settings, you need to install (load) it to the
device to apply the configuration. For a list of the ini file parameters, see ''Configuration
9.1 INI File Format
9.1.1 Configuring Individual ini File Parameters
Parameters Reference'' on page 803.
There are two types of ini file parameters:
Individual parameters - see ''Configuring Individual ini File Parameters'' on page 95 Table parameters - see ''Configuring Table ini File Parameters'' on page 95
The syntax for configuring individual ini file param eters in the ini file is as follows:
An optional, subsection name (or group name) enclosed in square brackets "[...]". This
is used to conveniently group similar parameters by their functionality.
Parameter name, followed by an equal "=" sign and then its value. Comments must be preceded by a semicolon ";".
[optional subsection name]
parameter name = value
parameter name = value
; this is a comment line
For general ini file formatting rules, see ''General ini Fil e F ormatting Rules'' on page 97.
9.1.2 Configuring Table ini File Parameters
Table ini file parameters allow you to configure tables, which include multiple parameters
(columns) and row entries (indices). The table ini file parameter is composed of the
following elements:
Table title: The name of the table in square brackets, e.g., [MY_TABLE_NAME]. Format line: Specifies the columns of the table (by their string names) that are to be
configured.
•The first word of the Format line must be "FORMAT", followed by the Index field
name and then an equal "=" sign. After the equal sign, the names of the columns
are listed.
• Columns must be separated by a comma ",".
• The Format line must only include columns that can be modified (i.e., parameters
that are not specified as read-only). An exception i s I ndex fields, which are
mandatory.
•The Format line must end with a semicolon ";".
Data line(s): Contain the actual values of the columns (paramet ers). The values are
interpreted according to the Format line.
Version 7.2 95 Mediant 4000 SBC
Page 96
Mediant 4000 SBC
•The first word of the Data line must be the table’s string name followed by the
Index field.
• Columns must be separated by a comma ",".
• A Data line must end with a semicolon ";".
End-of-Table Mark: Indicates the end of the table. The same string used for the
table’s title, preceded by a backslash "\", e.g., [\MY_TABLE_NAME].
The following displays an example of the structure of a table ini file parameter:
[Table_Title]
; This is the title of the table.
FORMAT Index = Column_Name1, Column_Name2, Column_Name3;
; This is the Format line.
Index 0 = value1, value2, value3;
Index 1 = value1, $$, value3;
; These are the Data lines.
[\Table_Title]
; This is the end-of-the-table-mark.
The table ini file parameter formatting rules are listed bel ow:
Indices (in both the Format and the Data lines) must appear in the same order. The
Index field must never be omitted.
The Format line can include a subset of the configurable fields in a table. In this case,
all other fields are assigned with the pre-defined default values for each configured
line.
The order of the fields in the Format line isn’t significant (as opposed to the I ndex
fields). The fields in the Data lines are interpreted according to the order specified in
the Format line.
The double dollar sign ($$) in a Data line indicates the default value for the param eter.
The order of the Data lines is insignificant.
Data lines must match the Format line, i.e., it must contain exactly the same number
of Indices and Data fields and must be in exactly the same order.
A row in a table is identified by its table name and Index field. Each such row may
appear only once in the ini file.
Table dependencies: Certain tables may depend on other tables. For exampl e, one
table may include a field that specifies an entry in another table. This method is used
to specify additional attributes of an entity, or t o spec ify that a given entity is part of a
larger entity. The tables must appear in the order of their dependency (i.e., if Table X
is referred to by Table Y, Table X must appear in the ini fi le bef ore Table Y).
The table below displays an example of a table ini file parameter:
Note: Do not include read-only parameters in the table ini file parameter as this can
cause an error when attempting to load the file to t he device.
User's Manual 96 Document #: LTRT-40203
Page 97
User's Manual 9. INI File-Based Management
9.1.3 General ini File Formatting Rules
The ini file must adhere to the following formatting rul es:
The ini file name must not include hyphens "-" or spaces; if necessary, use an
underscore "_" instead.
Lines beginning with a semi-colon ";" are ignored. These can be used for addi ng
remarks in the ini file.
A carriage return (i.e., Enter) must be done at the end of each line. The number of spaces before and after the equals sign "=" is irrelevant. Subsection names for grouping parameters are optional. If there is a syntax error in the parameter name, the value is ignored. Syntax errors in the parameter's value can cause unexpected errors (paramet ers may
must be enclosed with inverted commas, e.g., Call P rogressTonesFileName =
'cpt_usa.dat'.
The parameter name is not case-sensitive. The parameter value is not case-sensitive, except for coder names. The ini file must end with at least one carriage return.
9.2 Configuring an ini File
There are different methods that you can use for configuring an ini file before you load it to
the device.
Modifying the device's current ini file: This method is recommended if you mainly need
to change the settings of parameters that you have previ ously configured.
1. Save the device's current configuration as an ini file on your computer, using the
Web interface (see ''Saving Configuration'' on page 624).
2. Open the file using a text file editor, and then modify the ini file as required.
3. Save and close the file.
4. Load the file to the device.
Creating a new ini file that includes only updated configuration:
1. Open a text file editor such as Notepad.
2. Add only the required parameters and their settings.
3. Save the file with the ini file extension name (e.g., myconfiguration.ini).
4. Load the file to the device.
For loading ini files to the device, see ''Loading an ini F i le t o t he Device'' on page 98.
Note:
•If you save an ini file from the device and a table row is configured with invalid
values, the ini file displays the row prefixed with an exclamation mark (!), for
example:
•To restore the device to default settings through the i ni file, see ''Restoring Factory
Defaults'' on page 693.
Version 7.2 97 Mediant 4000 SBC
Page 98
Mediant 4000 SBC
9.3 Loading an ini File to the Device
You can load an ini file to the device using the following methods:
CLI:
• Voice Configuration: # copy voice-configuration f rom <URL>
Web interface:
•Auxiliary Files page (see ''Loading Auxiliary Files'' on page 627): The device
updates its configuration according to the loaded ini file while preserving the
remaining current configuration.
•Configuration File page (see ''Configuration File'' on page 659): The device
updates its configuration according to the loaded ini file and applies default
values to parameters that were not included in the loaded ini file.
When you load an ini file to the device, its configuration settings are saved to the device's
non-volatile memory.
Note: Before you load an ini file to the device, make sure that the file extension
name is *.ini.
9.4 Secured Encoded ini File
The ini file contains sensitive information that is required for the functioning of the device.
The file may be loaded to the device using HTTP. These protocols are not secure and are
vulnerable to potential hackers. To overcome this security threat, the AudioCodes
DConvert utility allows you to binary-encode (encrypt) the ini file before loading it to the
device. For more information, refer to the DCo nvert Utility User's Guide.
Note: If you save an ini file from the device to a folder on your PC, an ini file that was
loaded to the device encoded is saved as a regular ini file (i.e. , unencoded).
9.5 Configuring Password Display in ini File
Passwords can be displayed in the ini file in one of the following formats, configured by the
INIPasswordsDisplayType ini file parameter:
Obscured: The password characters are concealed and displayed as encoded. The
password is displayed using the syntax, $1$<obscured password>, for example,
$1$S3p+fno=.
Hidden: the password is replaced with an asterisk (*).
When you save an ini file from the device to a PC, the passwords are displayed according
to the enabled format. When you load an ini file to the device, obscured passwords are
parsed and applied to the device; hidden passwords are ignored.
By default, the enabled format is obscured passwords, thus enabling their full recovery in
case of configuration restore or copy to another devic e.
User's Manual 98 Document #: LTRT-40203
Page 99
User's Manual 9. INI File-Based Management
When obscured password mode is enabled, you can enter a password in the ini file using
any of the following formats:
$1$<obscured password>: Password in obscured format as generat ed by the device;
useful for restoring device configuration and copying configuration from one device to
another.
$0$<plain text>: Password can be entered in plain text; useful for configuring a new
password. When the ini file is loaded to the devi ce and then later saved from the
device to a PC, the password is displayed obscured (i .e., $1$<obscured password>).
Version 7.2 99 Mediant 4000 SBC
Page 100
Mediant 4000 SBC
9.6 INI Viewer and Editor Utility
AudioCodes INI Viewer & Editor utility provides a user-friendly graphical user interface
(GUI) that lets you easily view and modify the device's ini file. This utility is available from
AudioCodes Web site at www.AudioCodes.com/downloads, and can be installed on any
Windows-based PC.
For more information, refer to the INI Viewer & Editor User's Guide.
User's Manual 100 Document #: LTRT-40203
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.