While reasonable efforts were made to ensure that the infor mation in this
document was complete and accurate at the time of printing, Avaya Inc. can
assume no liability for any errors. Changes and corrections to the information
in this document may be incorporated in future releases.
Documentation disclaimer
Avaya Inc. is not responsible for any modifications, addition s, or deletions to
the original published version of this Documentation unless such modifications,
additions, or deletions were performed by Avaya.
Link disclaimer
Avaya Inc. is not responsible for the contents or reliability of any linked third
party Web sites referenced elsewhere within this Documentation and Avaya
does not necessarily endorse the products, services, or information descri bed
or offered within them. We cannot guarantee that these lin ks will work all of the
time and we have no control over the availability of the linked pages.
License
USE OR INSTALLATION OF THE PRODUCT INDICATES THE END USER'S
ACCEPTANCE OF THE TERMS SET FORTH HEREIN AND THE GENERAL
LICENSE TERMS AVAILABLE ON THE AVAYA WEBSITE AT
http://support.avaya.com/LicenseInfo/
YOU DO NOT WISH TO BE BOUND BY THESE TERMS, YOU MUST
RETURN THE PRODUCT(S) TO THE POINT OF PURCHASE WITHIN TEN
(10) DAYS OF DELIVERY FOR A REFUND OR CREDIT.
Avaya grants End User a license within the scope of the license types
described below. The applicable number of licenses and units of capacity for
which the license is granted will be one (1), unless a different number of
licenses or units of capacity is specified in the Documentation or other
materials available to End User. "Designated Processor" means a single
stand-alone computing device. "Server" means a Desi gnated Processor that
hosts a software application to be accessed by multiple users. "Software"
means the computer programs in object code, originally licensed by Avaya and
ultimately utilized by End User, whether as stand-alone Products or
pre-installed on Hardware. "Hardware" means the standard hardwa re
Products, originally sold by Avaya and ultimately utilized by End User.
License Type(s):
Concurrent User License (CU). End User may install and use the Software on
multiple Designated Processors or one or more Servers, so long as only the
licensed number of Units are accessing and using the Software at any given
time. A "Unit" means the unit on which Avaya, at its sole discretion, bases the
pricing of its licenses and can be, without limitation, an agent, port or user, an
e-mail or voice mail account in the name of a person or corporate function
(e.g., webmaster or helpdesk), or a directory entry in the administrati ve
database utilized by the Product that permits one user to interface with the
Software. Units may be linked to a specific, identified Server.
Database License (DL). Customer may install and use each copy of the
Software on one Server or on multiple Servers provided that each of the
Servers on which the Software is installed communicate with no more than a
single instance of the same database.
Copyright
Except where expressly stated otherwise, the Product is protected by copyrigh t
and other laws respecting proprietary rights. Unauthorized reproduction,
transfer, and or use can be a criminal, as well as a civil, offense un der the
applicable law.
Third-party Components
Certain software programs or portions thereof included in the Product may
contain software distributed under third party agreements ("Third Party
Components"), which may contain terms that expand or limit rights to use
certain portions of the Product ("Third Party Terms"). I nformation identifying the
copyright holders of the Third Party Components and the Third Party Terms
that apply is available on Avaya's web site at:
http://support.avaya.com/ThirdPartyLicense/
For full information, please see the complete document, Avaya Third Part y
Terms, Document number 04-601558. To locate this document on the web si te,
simply go to http://www.avaya.com/support
number in the search box.
Warranty
Avaya Inc. provides a limited warranty on this product. Refer to your sales
agreement to establish the terms of the limited warran ty. In addition, Avaya’s
standard warranty language, as well as information regarding support for this
product, while under warranty, is available through the following Web site:
http://www.avaya.com/support
("GENERAL LICENSE TERMS"). IF
and search for the document
.
Avaya fraud intervention
If you suspect that you are being victimized by toll fraud and yo u need technical
assistance or support, call Technical Service Center Toll Fraud Intervention
Hotline at +1-800-643-2353 for the United States and Canada. Suspected
security vulnerabilities with Avaya Products should be reported to Avaya by
sending mail to: securityalerts@avaya.com.
For additional support telephone numbers, see the Avaya Web site:
http://www.avaya.com/support
Trademarks
Avaya and the Avaya logo are registered trademarks of Avaya Inc. in the
United States of America and ot her j urisdictions. Unless other wise provided in
this Documentation, marks identified by "®," "™" and "SM" are registered
marks, trademarks and service marks, respectively, of Avaya Inc. All other
trademarks are the property of their respective owners.
8 Administration and Maintenance of the S6200/S6800 Servers
Preface
This guide describes S6200/S6800 Media Server features and how to configure
audioconferencing and network settings for the S6200/S6800 Media Server audioconferencing
system, which is referred to as the “system” throughout the remainder of this guide unless
specified otherwise. Although this guide includes basic information about system hardware,
maintenance procedures, and tasks you can perform from the system’s Linux shell interface, it
primarily describes configuration options available from the system’s text-based management
interface and how to configure those options for your particular audioconferencing
requirements.
Audience
This guide is intended for qualified personnel who manage the system. It describes procedures
that have a direct impact on system functions. System administrators should have a working
knowledge of teleconferencing concepts, customer requirements, and, under some
circumstances, telecommunication protocols and specifications, TCP/IP protocols, and Linux
commands.
Contact a technical support representa tive if you require assistance with configuring system and
audio conference settings or require in-depth training on using the S6200/S6800 Media Server
or Avaya desktop products.
Conventions
This guide uses the following conventions:
ConventionDescription
SMALLCAPSUsed for keystrokes. For example: Press the ESC key.
Courier
Courier BoldUsed for text you enter at the command line.
BoldUsed for menu options. For example: Select Call
Used for text the system displays.
For example:
For example:
Branding.
ERROR: Digit collection in progress.
rlogin host [-ec] [-8]
Issue 1 August 20079
Preface
ConventionDescription
ItalicUsed for references to publications. For example:
See the Bridge Talk User’s Guide.
Menu > OptionUsed to indicate the path to management interface options.
For example: Select System Administrator Main >
Configurations.
Note:
Note:Provides information of special importance.
Tip:
Tip:Provides information about alternative procedures or shortcuts.
!
CAUTION:
CAUTION:Provides information about actions that may disrupt or damage
system resources.
Related Documents
The following documents may provide additional information:
•Release Notes S6200/S6800 Media Server 5.0
•Installing the S6200/S6800 Media Server 5.0
•Relational Database Guide 5.0
•User’s Guide Bridge Talk 5.0
•Administration and Configuration Guide for Multi Site
10 Administration and Maintenance of the S6200/S6800 Servers
How to Get Help
Information
Telephone+1-877-742-8351
Web sitehttp://www.avaya.com/support
US and Canada Technical Support+1-800-242-2121
International Technical Support+353-1-207-5667 (CS700/CS780)
12 Administration and Maintenance of the S6200/S6800 Servers
Chapter 1:System Features
Includes system configuration, audioconferencing, and hardware features. This chapter also
describes client applications supported by the system and provides an overview of the different
ways conferees gain access to conferences.
Introduction
S6x00 media servers are SIP-based voice and web conferencing solutions that extend A vaya's
conferencing applications including reservation-less, attended, event, mobile, and web
conferencing- to support various IP network implementations. These systems offers a flexible,
comprehensive conferencing solution in a pure IP environment.
It can be configured as a software media server, or combined with an external hardware media
server. Both configurations support these capabilities:
l RFC 2833 DTMF support
l In-band DTMF support
l Up to 2016-user and 115-operator conferences
l Full support of the Media Server Interface
l Support for up to four digitally recorded music sources, which are locally stored on the
hardware media server.
l Support for one recorded music channel, and up to four connection based (FDAPI) music
channels
l Support the Meeting Exchange applications for administration and maintenance.
Software Media Server (S6200)
The S6200, provides the media resources required for up to 300 ports of G.711 a-law or u-law.
This configuration runs on a standard Linux host server.
Issue 1 August 200713
System Features
Hardware Media Server (S6800)
The hardware media server can be configured to support up to 2016 calls by using third party
hardware media servers. The hardware media server configuration supports any combination of
G.711 a-law or u-law, G.729, G723, G726-16, G726-24, G726-32, or G726-40 codecs. The
number of supported calls varies with system hardware and software configuration.
In a system configured with the S6800 media server, video conferencing is supported as an
optional feature. For a description of video conferencing see
page 23
Note:
Note:Currently, the system is compatible with the Convedia Media Server.
Server Hardware
Video Conferencing Features on
The S6200 media server consists of a single 1U Dell™ PowerEdge™ 1950 server.
Figure 1: ,Dell™ PowerEdge™ 1950 front view
Figure notes:
1. Power button
2. NMI button used for troubleshooting
3. System identification butto n
4. LCD display
5. USB connectors (2)
6. Video connector
7. Hard drives (optional)
8. Optical drive (optional)
14 Administration and Maintenance of the S6200/S6800 Servers
Figure 2: Dell™ Poweredge™ 1950, rear view
Audioconferencing Features
Figure notes:
1. Optional remote access controller
2. Serial connector
3. Video connector
4. USB Connectors (2)
5. NIC1 connector
6. NIC2 connector
7. Power supply
8. Optional power supply
9. System status indicator
10. System identification but to n
11. System status indiczator connector
12. Left PCI expansion slot (slot 2)
13. Center PCI expansion slot (slot 1)
Optionally, the server may also be configured with:
2
1
l redundant power supplies
l hard disk mirroring
Audioconferencing Features
This section provides an overview of the system’s audioconference feature set. It also
introduces concepts and terminology used throughout the remainder of this manual.
Attended Conferences
An attended conference is a conference in which an operator, using the Bridge Talk application
for managing and scheduling conferences, places callers into the conference and remains
available to assist conferees and moderators throughout its du ration. T he S6 200/S6800 can be
configured for support operators, who can manage and monitor conferences alone or as part of
Issue 1 August 200715
System Features
a team. They can also record annunciator messages, create and edit dial lists, dial out to
conference participants, record and playback recorded conference dialog, run question and
answer and polling sessions, and print conference reports directly from their workstations.
Attended conferences are scheduled and configured with the Conference Scheduler
application. To join an attended conference, conferees either dial in at a designated time or an
operator dials out to conferees. When dialing out, an operator can either dial a phone number
directly from the keyboard or launch an automated dialing function that dials numbers from a list
stored on the system (blast dialing).
See the Bridge Talk User’s Guide for details on the Conference Scheduler.
Unattended Conferences
An unattended conference is a conference in which conferees g ain access to and participate in
a conference without operator assistance. (Operator assistance, however, can be provided as
necessary .) When callers dial in to the unattended conference they are prompted to provide one
or more security codes to enter the conference. Once the system validates the code(s), the
caller is routed directly to the conference, but the system can also be configured to rou te callers
to a waiting queue to receive operator assistance.
Like attended conferences, specific conference features are set up using the Conference
Scheduler application from Bridge Talk. For instance, Auto Blast, a feature that enables
moderators to initiate a blast dial or enables the system to initiate a blast dial when the
moderator enters a conference is a conference-specific feature. System-wide operational
parameters for unattended conferences are specified by the Conference Scheduler
Configuration set up by a system administrator. See Chapter 8:
Configuring Conference
Scheduler on page 131 for details on configuring the Conference Scheduler and other
unattended conference features.
Other features that can be configured for unattended conferences on a system-wide basis
include:
l Auto Extend Duration — The system attempts to extend a conference beyond its
scheduled end time.
l Auto Extend Ports — The system attempts to allocate additional ports to conference to
accommodate additional conferees.
l Early Start Minutes — Conferees can enter a conference 1 to 30 minutes earlier than the
scheduled start time if ports are available.
l External Passcode Validation — An external database validates the first access code
submitted for entry to a conference and then uploads conference parameters to the
system.
l PIN Mode — Specifies whether PIN code implementation is optional, whether non-unique
PIN codes are required (all conferees enter same PIN code), or whether unique PIN codes
are required (all conferee enter a different PIN code).
16 Administration and Maintenance of the S6200/S6800 Servers
Flex Conferences
Flex is a type of unattended, on-demand conference in which participants can join a conference
directly. This “reservationless” conference uses a profile to keep track of all the selected
conference features, such as Hang up or Name Record/Playback.
Audioconferencing Features
Once the system administrator has defined the settings in a profile, participants can join Flex
conferences on a first-come, first-served basis. However, there can be only one moderator
(leader). Leaders can change profile settings before a conference begins, and create, control,
and end a conference call using DTMF telephone commands. For example, moderators can:
l SPECIFY A CONFERENCE PASSWORD. Leaders can optionally add another layer of
security by specifying a passcode that participants must enter before they can join the
conference.This password is valid only for the duration of the conference and is not stored
on the system.
Note:
Note:If Music is turned on for the conference, participants who arrive early wait on
standby. If the moderator specifies a passcode upon arrival, the waiting
participants must enter the p asscode before they are allowed into the conference.
However, if Music is turned off, participants who arrive before the moderator can
enter the conference without the passcode.
l CHANGE CONFERENCE OPTIONS. When a participant enters a leader PIN code and
assumes leader (moderator) status, the system immediately prompts the lead er to press 1
to start the conference. However, the leader can press 2 to change several conference
options before the conference starts. After changing options, the leader can press 1 to
start the conference.
l USE SPECIAL STAR COMMANDS. Flexconferences require that leaders and participan ts
use special DTMF commands during the conference. A leader can create, control, and
end a conference call using keypad star commands, which toggle on and off.
For more information on the default call flow and Flex options, see Reservation Features
page 36. For instructions on configuring bridge settings for Flex conferences, see Flex
Configuration Settings on page 76.
For more information on scheduling Flex conferences and using Flex DTMF commands, refer to
the Bridge Talk User’s Guide.
Note:
Note:Flex does not support Polling or Q&A.
Conference Overbooking
The system’s overbooking feature enables you to specify the percentage of system lines you
want available for Conference Overbooking. Overbooking enables you to schedule more
on
Issue 1 August 200717
System Features
conference lines than the system supports. In light of the fact that some conference p articip ants
do not attend conferences as scheduled, this feature ensures that those scheduled yet unused
lines are immediately available for other conferences.
Refer to Chapter 8:
a percentage of system lines for Conference Overbooking that will meet your requirements.
Sub-Conferences
Sub-conferencing enables a group of participants to leave a main conference to discuss topics
of a confidential nature or that are unrelated to the topic of discussion in the main conference.
The S6200/S6800 can be configured to allow a conferee, a moderator, or both to convene a
sub-conference from a main conference. Both conferees and moderators, however, can join a
sub-conference regardless of which type of conference participant started the conference.
The system allows up to nine concurrent sub-conferences to be created from a main
conference, but it does not impose any limits on the number of successive sub-conferences that
can be created. The system does not permit creation of a sub-conference from another.
See System Configuration
system.
Although it inherits most of the configuration settings of the main conference from which it is
created, a sub-conference is essentially a distinct conference:
l A sub-conference can be secured (no one allowed entry into the conference) by a
moderator in the sub-conference. Whether or not a main conference is secured has no
effect on the sub-conference.
Configuring Conference Scheduler on page 131 for details on apportioning
on page 45 for details on enabling the sub-conference feature o n the
l Once a moderator secures a main conference, participants in a sub-conference may not
rejoin the main conference until the moderator unsecures it. When the participant attempts
to rejoin a secured main conference:
l the system plays the moderator a notification message such as, “Your conference is
currently secured. A participant of the Sub Conference is requesting re-e ntry. Please turn
off security to unlock the conference.”
l the participant hears a message such as, “The main conference has been secured and
entry is not allowed at this time. The moderator has been notified of your request, please
stand by...” Once the moderator removes the security, the system plays a message such as, “Re-entry to the main conference is now allowed.
l A sub-conference’s roster is played independently of its main conference roster.
l The system generates a Conference Detail Record (CODR) for each sub-conference
”
created from a main conference. (A CODR is a daily report that contains data from all
conferences that occurred for the day. See CODR Configuration, screen 1
on page 226 for
details.)
Important information about main and sub-conference CODRs:
18 Administration and Maintenance of the S6200/S6800 Servers
l The values for the Cross Ref fields and the values for the Conference ID fields for main
and sub-conference CODRs are identical. This enables billing or auditing personnel to
correctly associate sub-conferences with main conferences.
l The User Conf Type field in a sub-conference CODR identifies the conference as a
sub-conference.
l Sub-conferences are recorded separately from the main conference.
The following system-wide conference features applicable to a main conference are not
applicable to a sub-conference:
l Auto-Extend-Ports — The system does not extend ports for a sub-conference. Ports
added to a main conference are also available for any new or existing sub-conference
created from the main conference. Any additional participants that wish to join a
sub-conference can enter the main conference and then transfer to the sub-conference.
l Auto-Extend-Duration — The system does not extend the duration of a sub-conference.
The duration of an existing sub-conference extends as long as the main conference
duration extends.
How Participants Access and Exit a Sub-Conference
Audioconferencing Features
A conference participant (moderator or conferee uses t he keypad command, *93, to create and
transfer to and from a sub-conference:
l When a participant presses *93 plus a digit 1- 9, where the digit corresponds to the
subconference, while in the main conference, the system creates a sub-conference or, if
sub-conference has already been created, the system routes the participant to that
sub-conference.
l Participant lines are transferred to the sub-conference and thus subtracted from the main
conference. The Call Detail Record (CDR) the system generates for each line in a
conference indicates that the line was transferred.
l When a participant presses *930 while in the sub-conference, the system returns the
participant (and the line) to the main conference.
A sub-conference ends when all participants have left the sub-conference.
Role of the Conference Moderator
A sub-conference “shares” the moderator(s) from the main conference. That is, no additional
moderators are required to manage a sub-conference; moderators can enter and exit a
sub-conference at will.
The following are common questions and answers about the role of a moderator in a main
conference and a sub-conference:
Issue 1 August 200719
System Features
l What happens when the only or last moderator in the main conference joins a
sub-conference and the system is configured to automatically end a conference (Auto
Hang-up feature enabled) when the last moderator in the conference disconnects?
The system does not end the main conference. The feature is applicable only when the last
moderator leaves the main conference.
l What happens when the only or last moderator in the main conference disconnects from a
sub-conference and the system is configured to automatically end a conference (Auto
Hang-up feature) when the last moderator in the conference disconnects?
The system ends both the main conference and the sub-conference.
l When a moderator secures a main conference (disallows entry to any additional
participants) is the sub-conference secured as well?
No. A moderator can secure a sub-conference only while in the sub-conference.
l Can participants become stranded in a sub-conference (unable to transfer back to the
main conference) if the only moderator transfers from a secured main conference to
sub-conference?
No. An annunciator message notifies the moderator to unsecure the main conference
before transferring to the sub-conference. The moderator cannot transfer to the
sub-conference until the main conference is unsecured.
l Can participants become stranded in a sub-conference (unable to transfer back to the
main conference) if the only moderator disconnects from a secured main conference and
the Auto Hang-up feature is not in effect (the conference continues as scheduled)?
This scenario is possible. If a conference requirement is that all particip ants must b e able to
re-join a main conference before it ends, the moderator must ensure that all participants can
re-join the conference by not securing the conference prior to hanging up.
Conference Scheduler
The Conference Scheduler, which can be accessed from the Bridge Talk application, enables
you to schedule every type of conference supported by the system — attended, unattended,
and on-demand conferences. The system stores and automatically activates schedules for up
to twelve months.
The Scheduler lets you specify conference setup information such as, but not limited to, start
time, end time, and number of lines. Also, the Scheduler notifies you if it detects scheduling
conflicts such as those related to the availability of lines or security codes, and it allows you to
modify the schedule as required. You can use the Scheduler to modify scheduled conference
settings at any time prior to a conference, and you can also modify the number of lines and the
duration of the conference and its security code while a conference is in progress. The
Scheduler also enables to view and print scheduling reports, and purge expired conference
information.
See the Bridge Talk User’s Guide for Conference Scheduler details.
20 Administration and Maintenance of the S6200/S6800 Servers
Auto Blast
The optional Auto Blast feature provides blast-dial capability for moderators in unattended
conferences. From the Conference Scheduler application, Auto Blast can be disabled, set for
manual implementation, or set for automatic implementation.
l Manual implementation — The conference moderator enters *92 on the telephone keypad
to initiate the blast dial.
l Automatic implementation — The system initiates the blast dial when the first moderator
enters the conference (enters a moderator code).
The total number of blast dial recipients called from the blast dial list is dependent on the
maximum number of lines available for the conference. A system message announces to the
conference how many numbers from the dial list are dialed.
Conference Call Modes
See Blast Dial Configuration
important details on setting the CLPG (call in progress) timeout period for Auto Blast used in
unattended conferences.
on page 70 for information about blast dial settings, including
Saved Roster Recordings
The system can be configured to generate and save an audio recording of information provided
by conference participants (name, af filiation, and so on). For conferences that include the r oster
recording feature, participants provide the information in response to an audio prompt when
they attempt to enter a conference.
A raw audio file is created and saved on the system as soon as a participant records his name.
Each time a participant records his name, the information is appended to the raw audio file—so
the file grows as conference participation grows. The audio files are saved in pcm format.
See System Configuration
Roster Audio Files on page 168 for more information on roster recording files.
on page 45 for details on enabling roster recordings. See Saved
Conference Call Modes
A call mode is the method by which a conferee gains access to a conference. The system
supports several call modes to accommodate various customer requirements. A conference
can be conducted several ways. The system accommodates attended and unattended
conferences simultaneously, and even allows semi-attended calls, depending upon system
configuration.
In an attended conference, the participant is greeted by an operator who places the participant
directly into a conference. No passcode is required. In an unattended conference the p articipant
Issue 1 August 200721
System Features
enters a passcode to be placed directly into a conference. No operator is required. Operators
can manage participants in both attended and unattended conferences.
For example, if you have an operator, you can arrange unattended coded conferences, which
allow conferees, who forget their conference codes, to reach an operator, rather than being
automatically disconnected. In addition, you can run a conference that is unattended except for
the initial call setup, which can be a blast dial.
The system also permits combinations of certain modes. For example, the moderator of an
attended dial-in conference can ask an operator to dial out to a conferee who has not dialed in.
How a Conferee Is Placed in a Conference
Conferees gain access to conferences in eight different ways.
l Five ways involve dial-outs from the system to the conferee.
l Three ways involve dial-ins from conferees to the system.
Dialing Out to Conferees
There are different ways for operators and moderators to di al out to a participant:
Operator Dial Out
l Immediate — An operator manually dials a phone number directly from the keyboard.
l Fastdial — An operator dials participants from a list stored on the system.
l Blast Direct — An operator has the system simultaneously dial an entire list of numbers.
Conferees are automatically placed in the conference after they answer the call and enter
a “1.”
l Blast Direct to Conference—An operator invokes the system’s blast dial feature to
simultaneously dial an entire list of numbers. The system places answered lines directly
into a conference.
l Blast Coded — An operator invokes the system’s blast dial feature to simultaneously dial
an entire list of numbers. The system prompts conferees for a conference code, befo re the
system places them in the conference.
Moderator Dial Out
l Originator Dial Out (ODO) — A moderator dials out to a conferee during the conference.
l Automatic Blast—As soon as the moderator joins the conference, the system dials a pre
configured blast list.
l Manual Blast—A moderator dials a pre configured list using DTMF commands.
22 Administration and Maintenance of the S6200/S6800 Servers
Dialing In to Conferees
The system provides three methods of processing conferee calls to the system:
l Direct — The system automatically routes incoming callers directly to a specified
conference. No access code is required.
l Coded (Unattended) — The system requests that a caller enter a pre-specified access
code to enter the conference. The system automatically routes the caller to the specified
conference. An additional security layer is available by using PIN codes.
l Attended — Operator places callers into the conference.
While not all calls require an operator to respond to incoming calls, there is often the need to
have one or more operators available to initiate and/or process calls, and to be availa ble to help
moderators or conferees needing assistance.
Conference Call Modes
Table 1
summarizes the operator involvement in the various conference call modes..
Table 1: Operator Involvement in Various Conference Call Modes
Conference
Call Mode
Operator
Initiated?
Operator
Processed?
Operator
Attended?
Code
Required?
DirectNoNoNoNo
CodedNoNoNoYes
Dial In
AttendedNoYesYesNo
ImmediateYesYesYesNo
FastdialYesYesYesNo
Blast DirectYesNoYesNo
Blast CodedYesNoYesYes
Dial Out
Video Conferencing Features
Point to point video conferencing is available on systems configured with the S6800 media
server. If video is enabled on your system, obtain video setting information to advise end users
of the supported connection rate. Inform end users that they can connect in video mode, as long
as resources are available. The system supports video conferencing with the following
limitations:
Issue 1 August 200723
System Features
l The following video endpoints are supported for the S6X00:
l The system supports G.711 and G.722 audio codecs.
l The system supports G.263 video codec for SIP video.
l Callers must connect at the bandwidth configured on the system.
l The system supports voice activated switching only.
l The number of video callers per system is limited to the video licenses purchased.
l A maximum of 16 video callers is allowed per conference.
l Video callers join the system on a first-come first-served basis.
l Once all video licenses are in use, subsequent callers join their conference in audio only
Conferences can have a combination of video and audio callers.
Tip:
Tip:For information on configuring video channels for the S6800 media server, see:
Meeting Exchange® 5.0
Configuring the S6200/S6800 Media Servers
24 Administration and Maintenance of the S6200/S6800 Servers
Chapter 2:Using the System Management Interface
Lists how to log in to the system’s management interface, the content and organization of
management interface menus and options, and how to work with menus and options. It also
describes how to create and manage login accounts (sign-ins) for Bridge Talk users.
In this chapter you will gain an understanding of how system configuration options are
organized in the System Management Interface menus and the keyboard operations for
selecting and setting options. This chapter describes how to use the management interface to
perform the administrative and maintenance functions.
This chapter is organized as follows:
l Working with the Management Interface on page 25 describes login options, configuration
options provided by the management interface and how they are organized, and
conventions for setting, modifying, and saving configuration parameters in management
interface screens.
l Managing User Sign-Ins on page 33 describes how to create and manage Bridge Talk
user login (sign-in) accounts.
Working with the Management Interface
The text-based management interface provides access to all conference settings.
Logging In
You can log in to the management interface from a serial terminal connected to the COM 1 port
on the system CPU card from any remote PC with Bridge Talk, or from any remote PC or
workstation with telnet or any telnet-based application. This section describes how to log in to
the management interface using the using Bridge Talk’s Session tool.
Note:
Note:See the Bridge Talk User’s Guide for more information on Bridge Talk’s Session
option.
Issue 1 August 200725
Using the System Management Interface
To log in to the Bridge Talk interface:
1. Select File > Session, and then click either Administrator or Maintenance. Both options
are available if you have a maintenance-level sign-in. Only the Administrator option is
available if you have an administrator-level sign-in. See Managing User Sign-Ins
page 33 for more information.
Depending on the session you selected, the system displays either the System
Administrator Main Menu) or the System Maintenance Main Menu.
on
!
CAUTION:
CAUTION:The dcbmaint and dcbadmin logins provide read/write access to critical system
settings. Avaya recommends that you change the default passwords for the
logins to prevent unauthorized users from accessing these settings. Contact
Avaya Customer Support for assistance. (Changing default passwords requires
root access to the system’s Linux interface.)
Menus and Options
The System Maintenance Main menu and the System Administrator Main menu serve as the
gateways to the system and conference configuration options described in this manual. The
Maintenance Main menu includes all system and conference configuration options, including
those provided by the Administrator Main menu.
Management interface menus and screens are organized in a hierarchical arrangement
branching from the System Maintenance and System Administrator menus. From these menus
you can directly access configuration screens and other menus. Organization of Maintenance
Menus and Screens illustrates the organization of menus and screens available from the
System Maintenance Main Menu
organization of menus and screens available from the System Administrator Main menu. Both
illustrations serve as a quick reference for locating specific menus and screens.
, and System Administrator Main Menu illustrates the
26 Administration and Maintenance of the S6200/S6800 Servers
Working with the Management Interface
Figure 3: Organization of Maintenance Menus and Screens
Issue 1 August 200727
Using the System Management Interface
Figure 4: Organization of Administrator Menus and Screens
System Maintenance Options
The System Maintenance Main Menu includes options that enable you to configure advanced
system settings, reboot and shut down the system, and access the Administrator Menu. See
System Administrator Options on page 29 for information on Administrator Menu settings.
System Maintenance Main Menu
System Maintenance Main Menu
Network Configuration
FDAPI Configuration
LAN Configuration
Administrator Menu
Re-Initialization
System Shutdown
Transmission Level
EXIT
28 Administration and Maintenance of the S6200/S6800 Servers
Working with the Management Interface
Table 3 lists and describes System Maintenance Main Menu options.
Table 3: System Maintenance Options
OptionsTasks
Network ConfigurationConfigure, manage, and view various network layer and
physical layer network interface settings:
l Load Outbound Port Group.
l Load Inbound Port Group.
FDAPI ConfigurationConfigure digital phone lines as auxiliary lines for
operator, music, analog record/playback, and link line
functions.
LAN ConfigurationAdd, modify, delete, or view entries in the system hosts
file.
Administrator MenuAccess System Administrator Main menu options.
Re-InitializationRe-initialize (reboot) the system.
System ShutdownShut down the system.
Transmission LevelAdjust the transmission volume (in decibels) for all lines.
System Administrator Options
The System Administrator Main Menu includes options that enable you to configure conference
and system settings.
lists and describes System Administrator Main menu options.
Issue 1 August 200729
Using the System Management Interface
Table 4: System Administrator Options
Option Task(s)
BackupBack up various configuration files and reports:
RestoreRestore various configuration files and reports:
l System Configuration
l Call Detail Records (CDRs)
l Dial Lists
l Logs
l Sign-ins
l Tag files
l Meeting Exchange
l System Configuration
l Dial Lists
l Sign-ins
l Tag files
l Meeting Exchange
ConfigurationsProvides a menu of items used to configure these
system settings:
l Blast Dial parameters.
l Call Detail Records (CDRs) format.
l Conference Detail Records (CODRs) format.
l Call Routing parameters.
l Operator Configuration.
l Supervision Configuration.
l System Configuration.
l Timed Assist Configuration.
l Voice Messages.
l Warning Tone frequency for unattended
conferences.
30 Administration and Maintenance of the S6200/S6800 Servers
1 of 2
Loading...
+ 278 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.