Cisco Linksys PAP2, RT31P2 User Manual

PHONE ADAPTER Administration Guide
August 2004
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
1
Disclaimer – Please Read:
This document contains implementation examples and techniques using Linksys and, in some instances, other company’s technology and products and is a recommendation only and does not constitute any legal arrangement between Linksys and the reader, either written or implied. The conclusions reached and recommendations and statements made are based on generic network, service and application requirements and should be regarded as a guide to assist you in forming your own opinions and decision regarding your particular situation. As well, Linksys Technology reserves the right to change the features and functionalities for products described in this document at any time. These changes may involve changes to the described solutions over time.
Use of Proprietary Information and Copyright Notice:
Major portions of this document are the sole property of Sipura Technology, Inc. and are provided to its licensee, Linksys LLC., and protected by United States and international copyright laws. (c)2003-2004 Sipura technology, Inc. - All rights reserved.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
2
Table of Contents
1. Introduction.................................................................................................................................... 6
1.1. The Session Initiation Protocol............................................................................................. 6
1.1.1. Components of a SIP Network....................................................................................................... 8
1.1.2. Provisioning Overview.................................................................................................................... 9
1.1.3. Security Overview .........................................................................................................................10
1.1.3.1. Proxy Servers......................................................................................................................11
1.1.4. SIP Services..................................................................................................................................11
1.1.4.1. Basic Services.....................................................................................................................12
1.1.4.2. Enhanced Services..............................................................................................................12
1.1.4.3. PSTN Interworking...............................................................................................................14
1.2. Network Address Translation (NAT) Traversal................................................................... 15
1.2.1. What is a NAT or NAPT (Network Address Port Translator)? .......................................................15
1.2.2. VoIP-NAT Interworking..................................................................................................................16
1.3. Voice Quality Overview....................................................................................................... 16
2. Hardware Overview..................................................................................................................... 17
2.1. Phone Adapter LED Status................................................................................................. 19
2.2. Broadband Router (RT31P2) LED Status .......................................................................... 19
3. Software Configuration Mechanisms........................................................................................... 20
3.1. Configuration Profile Formats............................................................................................. 21
3.1.1. Using the Supplemental Profile Compiler......................................................................................23
3.1.2. Encrypting and Compressing XML configuration files ...................................................................24
3.2. Secure Initial Configuration................................................................................................. 25
3.3. Web Interface ..................................................................................................................... 26
3.3.1. Web Interface Conventions...........................................................................................................26
3.3.2. Administration Privileges...............................................................................................................27
3.3.3. Basic and Advanced Views...........................................................................................................27
3.4. Functional Configuration URLs........................................................................................... 27
3.4.1. Upgrade URL ................................................................................................................................27
3.4.2. Resync URL..................................................................................................................................28
3.4.3. Reboot URL ..................................................................................................................................28
3.5. Configuration via the IVR (PAP2 only) ............................................................................... 29
4. Configuration Parameters ........................................................................................................... 32
4.1. Data Types.......................................................................................................................... 32
4.1.1. Conventions ..................................................................................................................................35
4.2. Provisioning Related Parameters....................................................................................... 35
4.2.1. Firmware Upgrade.........................................................................................................................43
4.2.2. Provisioning Server Redundancy ..................................................................................................46
4.2.3. Configuring the Web Server and IVR ............................................................................................46
System Configuration ..................................................................................................................................46
4.3. Basic Networking Configuration ......................................................................................... 47
Network Configuration.................................................................................................................................47
4.4. Basic Account Configuration............................................................................................... 48
4.5. Configuration for NAT Traversal......................................................................................... 49
4.6. Media and SDP (Session Description Protocol) Configuration.......................................... 51
4.6.1. DTMF and Hookflash ....................................................................................................................51
4.6.2. Codec and Audio Settings.............................................................................................................52
4.6.3. Dynamic Payload Types and SDP Codec Names.........................................................................53
4.6.4. Secure Media Implementation:......................................................................................................54
4.6.5. Outbound Call Codec Selection Codes:........................................................................................56
4.7. Supplementary Services..................................................................................................... 57
4.7.1. Supplementary Services activated internally.................................................................................58
4.7.2. Call Forwarding Implemented internally........................................................................................60
4.7.3. Supplementary Services implemented in the service provider network.........................................60
4.8. Dial Plan Configuration....................................................................................................... 61
4.8.1. Speed Dialing Settings..................................................................................................................66
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
3
4.9. Progress Tone and Ring Configuration.............................................................................. 67
4.9.1. Distinctive Ring and Other Ring Settings ......................................................................................67
4.9.2. Progress Tones.............................................................................................................................69
4.10. Less Frequently Used Paramters....................................................................................... 70
4.10.1. Advanced Protocol Parameters................................................................................................70
4.10.2. Additional User Account Information ........................................................................................73
4.10.3. Per-Line Polarity Settings.........................................................................................................75
4.10.4. Additional Timer Values (sec)...................................................................................................75
4.10.5. Miscellaneous Parameters .......................................................................................................76
5. Expected Feature Behavior......................................................................................................... 79
5.1. Originating a Phone Call..................................................................................................... 79
5.2. Receiving a Phone Call ...................................................................................................... 79
5.3. Caller ID.............................................................................................................................. 80
5.4. Calling Line Identification Presentation (CLIP)................................................................... 80
5.5. Calling Line Identification Restriction (CLIR) – Caller ID Blocking..................................... 81
5.6. Call Waiting......................................................................................................................... 81
5.7. Disable or Cancel Call Waiting........................................................................................... 82
5.8. Call-Waiting with Caller ID.................................................................................................. 83
5.9. Voice Mail ........................................................................................................................... 83
5.10. Attendant Call Transfer....................................................................................................... 84
5.11. Unattended or “Blind” Call Transfer.................................................................................... 85
5.12. Call Hold ............................................................................................................................. 85
5.13. Three-Way Calling.............................................................................................................. 86
5.14. Three-Way Ad-Hoc Conference Calling............................................................................. 86
5.15. Call Return.......................................................................................................................... 87
5.16. Automatic Call Back............................................................................................................ 87
5.17. Call FWD – Unconditional................................................................................................... 88
5.18. Call FWD – Busy ................................................................................................................ 89
5.19. Call FWD - No Answer........................................................................................................ 89
5.20. Anonymous Call Blocking................................................................................................... 90
5.21. Distinctive / Priority Ringing and Call Waiting Tone........................................................... 90
5.22. Speed Calling – Up to Eight (8) Numbers or IP Addresses................................................ 91
6. Troubleshooting........................................................................................................................... 92
6.1. Call Statistics Reporting...................................................................................................... 92
6.2. Enabling Logging and Debugging ...................................................................................... 93
6.3. Error and Log Reporting..................................................................................................... 93
6.4. Internal Error Codes ........................................................................................................... 93
6.5. Provisioning and Upgrade result codes.............................................................................. 94
6.6. Table of SIP Response Codes (Error Codes) .................................................................... 94
7. Summary of Implemented Features and Specifications.............................................................. 95
7.1. Data Networking Features.................................................................................................. 95
7.1.1. MAC Address (IEEE 802.3)...........................................................................................................95
7.1.2. IPv4 – Internet Protocol Version 4 (RFC 791) upgradeable to v6 (RFC 1883)..............................96
7.1.3. ARP – Address Resolution Protocol..............................................................................................96
7.1.4. DNS – A Record (RFC 1706), SRV Record (RFC 2782)...............................................................96
7.1.5. DiffServ (RFC 2475) and ToS – Type of Service (RFC 791/1349)................................................96
7.1.6. DHCP Client – Dynamic Host Configuration Protocol (RFC 2131)................................................96
7.1.7. ICMP – Internet Control Message Protocol (RFC792) ..................................................................96
7.1.8. TCP – Transmission Control Protocol (RFC793)...........................................................................96
7.1.9. UDP – User Datagram Protocol (RFC768)....................................................................................96
7.1.10. RTP – Real Time Protocol (RFC 1889) (RFC 1890).................................................................96
7.1.11. RTCP – Real Time Control Protocol (RFC 1889).....................................................................96
7.2. Voice Features.................................................................................................................... 96
7.2.1. SIPv2 – Session Initiation Protocol Version 2 (RFC 3261-3265)..................................................96
7.2.1.1. SIP Proxy Redundancy – Static or Dynamic via DNS SRV .................................................96
7.2.1.2. Re-registration with Primary SIP Proxy Server....................................................................96
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
4
7.2.1.3. SIP Support in Network Address Translation Networks – NAT............................................96
7.2.2. Codec Name Assignment..............................................................................................................96
7.2.3. Secure Calls..................................................................................................................................97
7.2.4. Voice Algorithms: ..........................................................................................................................97
7.2.4.1. G.711 (A-law and mµ-law)...................................................................................................97
7.2.4.2. G.726...................................................................................................................................97
7.2.4.3. G.729A ................................................................................................................................97
7.2.4.4. G.723.1................................................................................................................................97
7.2.5. Codec Selection............................................................................................................................97
7.2.6. Dynamic Payload ..........................................................................................................................97
7.2.7. Adjustable Audio Frames Per Packet............................................................................................97
7.2.8. Fax Tone Detection Pass-Through................................................................................................97
7.2.9. DTMF: In-band & Out-of-Band (RFC 2833) (SIP INFO *)..............................................................97
7.2.10. Call Progress Tone Generation................................................................................................98
7.2.11. Call Progress Tone Pass Through............................................................................................98
7.2.12. Jitter Buffer – Dynamic (Adaptive)............................................................................................98
7.2.13. Full Duplex Audio .....................................................................................................................98
7.2.14. Echo Cancellation – Up to 8 ms Echo Tail ...............................................................................98
7.2.15. Voice Activity Detection with Silence Suppression & Comfort Noise Generation .....................98
7.2.16. Attenuation / Gain Adjustment..................................................................................................98
7.2.17. Signaling Hook Flash Event .....................................................................................................98
7.2.18. Configurable Flash / Switch Hook Timer ..................................................................................99
7.2.19. Configurable Dial Plan with Interdigit Timers............................................................................99
7.2.20. Message Waiting Indicator Tones – MWI.................................................................................99
7.2.21. Polarity Control.........................................................................................................................99
7.2.22. Calling Party Control – CPC.....................................................................................................99
7.2.23. International Caller ID Delivery.................................................................................................99
7.2.24. Streaming Audio Server – SAS ..............................................................................................100
7.2.25. Music On Hold – MOH............................................................................................................100
7.3. Security Features.............................................................................................................. 102
7.3.1. Multiple Administration Layers (Levels and Permissions) ...........................................................102
7.3.2. HTTP Digest – Encrypted Authentication via MD5 (RFC 1321) ..................................................102
7.3.3. HTTPS with Client Certificate......................................................................................................102
7.4. Administration and Maintenance Features....................................................................... 102
7.4.1. Web Browser Administration and Configuration via Integral Web Server....................................102
7.4.2. Telephone Key Pad Configuration with Interactive Voice Prompts..............................................102
7.4.3. Automated Provisioning & Upgrade via TFTP, HTTP and HTTPS..............................................102
7.4.4. Periodic Notification of Upgrade Availability via NOTIFY or HTTP..............................................102
7.4.5. Non-Intrusive, In-Service Upgrades ............................................................................................102
7.4.6. Report Generation and Event Logging........................................................................................102
7.4.7. Syslog and Debug Server Records .............................................................................................102
8. List of all configuration parameters ........................................................................................... 102
9. Acronyms................................................................................................................................... 113
10. Glossary................................................................................................................................ 115
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
5
1. Introduction
This guide describes basic administration and use of the Linksys Technology PHONE ADAPTER phone adapter – an intelligent low-density Voice over IP (VoIP) gateway. The PHONE ADAPTER enables carrier class residential and business IP Telephony services delivered over broadband or high-speed Internet connections. By intelligent, we mean the PHONE ADAPTER maintains the states of all the calls it terminates. It is capable of making proper decisions in reaction to user input events (such as on/off hook or hook flash) with little or no involvement by a ‘middle-man’ server or media gateway controller.
Examples of proper reactions are: playing dial tone, collecting DTMF digits, comparing them against a dial plan and terminating a call. With intelligent endpoints at the edges of a network, performing the bulk of the call processing duties, the deployment of a large network with thousands of subscribers can scale quickly without the introduction of complicated, expensive servers. As described later in this section, the Session Initiation Protocol (SIP) is a good choice of call signaling protocol for the implementation of such a device in this type of network.
The phenomenal growth of broadband Internet access (DSL, Cable, FTTH, etc.), has brought the realization of reliable packet switched IP Telephony Services with circuit switched toll-quality and subscriber feature transparency with that of the PSTN’s CLASS feature-set. In addition to basic offerings comparable to traditional PSTN services, many service providers have integrated their IP Telephony offering with a large number of web-based productivity applications like unified messaging and call management features such as, remote call forward configuration via the web. Such advances over traditional phone services, with equal or better voice quality and lower per-minute prices, have made IP Telephony service a viable business. In fact, IP Telephony service providers in the US and abroad have seen their subscriber base growing at a rapid pace.
The technical challenges in deploying and operating a residential IP Telephony service, however, are not small. One of the main challenges is to make the service transparent to subscribers: The subscribers shall expect to use their existing phones to make or receive calls in the same way as with the existing PSTN service. To enable this level of transparency, the IP Telephony solution has to be tightly integrated. A key element in this end-to-end IP Telephony solution is the provision of an endpoint device that sits at a subscriber’s premises that serves as an IP Telephony gateway or telephone adapter. This phone adapter offers one or more standard telephone RJ-11 phone ports – identical to the phone wall jacks at home – where the subscriber can plug in their existing telephone equipment to access phone services. The IP Telephony gateway may connect to the IP network, like the Internet, through an uplink Ethernet connection.
Important!! Please note: The information contained herein is not a warranty from Linksys Customers planning to use the PHONE ADAPTER in a VoIP service deployment are warned to test all functionality they plan to support in conjunction with the PHONE ADAPTER before putting the PHONE ADAPTER in service. Some information in Section 1 of this guide is written for educational purposes and describes functionality not yet implemented in the PHONE ADAPTER.
1.1. The Session Initiation Protocol
There are many excellent articles and books that discuss the advantages of SIP.i Here are some of the more popular details:
SIP message construc ts are very similar to those of HTTP which is well-known to be IP Network (Internet) friendly.
SIP is transport agnostic – meaning it can be used over TCP/IP or UDP/IP, with or without security.
SIP has a better chance of traversing NATs than other control protocols.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
6
SIP enables the implementation of intelligent endpoints to support scalable advanced services.
In a nutshell, SIP is a distributed signaling protocol (as opposed to a centralized protocol such as SS7, MGCP or MEGACO/H.248). With a distributive protocol, the intelligence does not necessarily reside on a central server, but can be built into the individual endpoints. By moving the intelligence to reside within the endpoints at the edge of the network, the processing load of the network application and associated call servers are significantly reduced, thus making the network a very scalable solution.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
7
1.1.1. Components of a SIP Network
Phone Adapter
P
rivate IP
Net
work
PC
PC
Service Provider Domain
Provisioning
Server
ISP
Broadband
Modem
Router
NAT
Subscriber
Domain
SIP
Proxy Server
IP
Network
(Internet)
Billing
Server
Subscriber
Database
Application
Server
PSTN
Gateway
PSTN
Gateway
PSTGN
ateway
Application
Server
PSTN
Figure 1 -- Components of a SIP IP Telephony Network
IP Teleph subscribe up to two interface device to the servic
Home/SO between . If the ISP provides only one
ony Gateway (PHONE ADAPTER): The PHONE ADAPTER is a small device that sits at the r’s premises. It converts between analog telephone signals and IP Telephony signals. It has
RJ-11 ports where standard analog telephones can be directly attached, and an RJ-45
for the Ethernet connection to the home or business LAN. Intelligence can be built into this
provide a wide range of features to the subscribers in association with the other elements in e. The PHONE ADAPTER functions as a SIP User Agent (UA).
HO Routers with NAT Functionality: A home/SOHO router is used for routing IP packets
the subscriber’s private network and the ISP’s public network public IP address to the subscriber, the devices attached to the private network will be assigned private IP addresses and the router will perform network address translation (NAT) on packets sent from the private network to the public network via the router. Home routers offer the following features:
An R-J45 WAN interface for connection to the ISP’s public network and one or more RJ-45 LAN interfaces for connection to the subscriber’s private network. The router d
irects
packets between the private network and the public network.
A PPPoE client to connect with the ISP through a DSL modem.
A DHCP client where the router will obtain an IP address, subnet mask, default router
assignment, etc., for its WAN interface from a DHCP server on the public network.
A DHCP server for auto-assignment of private IP addresses, subnet mask, and default router assignment to devices attached to the private network, i.e. computers, IP Telephony
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
8
gateways, etc. The default router in this case is the IP address of the LAN interface of the router itself.
Performs NAT on packets sent from the private network to the public network. This is an important feature such that recipients of the private packets will perceive them as originated from a public IP address (the router’s WAN interface) and will therefore return messages to the proper public IP address and port. Different routers may use different rules for allocating port numbers at the WAN interface to forward packets from a private IP address/port to a public IP address/port. The allocated port number is also used for routing packets from external IP addresses to a private address. Most routers will accept a number of static port mapping rules for forwarding packets received on a specific port at the WAN interface to a specific IP address/port in the private network.
PSTN - VoIP Gateways: These devices are required if user agents are expected to make calls to or receive calls from the PSTN. Many gateways may be deployed in order to service a wide area. Gateways also behave like SIP user agents. The proxy server can be configured with cost-saving rules based call routing information so that it may decide which gateway to use depending on the destination and the time of the call. The IP Telephony service provider will assign each subscriber an E164 telephone number so that it may be reached from the PSTN just like any other tele
phone.
Billing Servers: Billing servers are us service. Typically, the service provider subscribers (on-net-to-on-net calls). Per use or minute chargers will be incurred only when the subscriber makes calls to PSTN numbers (on-net-to-off-net calls) through one of the PSTN gateways. CDR (call detail record) data are generated by the PSTN gateway and sent to the billing servers.
Provisioning Servers: Provisioning servers are used to provision the subscriber user agent devices, e.g. the PHONE ADAPTER. When a subscri appropriate service level and enters his personal information including billing information. This information is processed by the provisioning server and stored into the service provider’s customer database. The provisioning server generates a device profile based on the subscriber’s choice of options. The device profile, which is list of configuration parameters, is downloaded into the PHONE ADAPTER from the provisioning server. The PHONE ADAPTER can be configured to contact the provisioning server periodically to check for any update of the device profile, which may include a firmware upgrade or configuration modification to the
Application Servers: Application servers are used to provide value added services, such as call forwarding, outgoing or incoming call blocking
Voice Mail Servers: Specialized servers provide voice mail services to the IP Telephony service subscribers. When the subscriber is busy or the PHONE ADAPTER is out of service for maintenance or other reason, incoming calls to the subscriber may be redirected to the voice mail servers where the caller can leave a voice mail. The voice mail server will then notify the subscriber’s PHONE ADAPTER of the availability of voice mail(s) in his mailbox. The subscriber can then contact the voice mail server to retrieve his voic status to the subscriber through a number of methods such as stuttered dial tone heard through the telephone every time the subscriber lifts up the handset until the voice mail is retrieved.
e mail(s). The PHONE ADAPTER can indicate the message-waiting
ed to generate billing data per usage of the IP Telephony
will charge a flat fee for unlimited calls between IP Telephony
ber signs up for IP Telephony service, he selects an
PHONE ADAPTER.
1.1.2. Provisioning Overview
The PHONE ADAPTER is configurable in many ways such that it can provide a wide range of customizable services and operate in many diverse environments with a variety different vendors’ SIP Proxy Servers, VoIP Gateways, Voice Mail Servers, NAT applications, etc. Provisioning is the process by which the PHONE ADAPTER obtains a set of configuration parameters in order for it to operate in the Service Provider’s network.
The complete set of configuration parameters for an PHONE ADAPTER corresponding to an individual subscriber is referred to as a configuration profile or simply a Profile. The Profile can be encoded as an XML file or a simple plain text file with a list of tag/value pairs. When the PHONE
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
9
ADAPTER unit is shipped from the factory, it contains a default common Profile and is considered Unprovisioned. To save costs and expedite delivery, however, it is very desirable that an Unprovisioned unit can be shipped directly from the factory to the subscriber’s location without any preprocessing by the Service Provider.
The PHONE ADAPTER contacts the Service Provider’s provisioning server via the IP network or Internet when it is plugged into the subscriber’s home or business Local Area Network (LAN) – assuming the provisioning server is reachable from the subscriber’s home network – to pull the designated profile to be installed in that particular PHONE ADAPTER unit. Furthermore, th ADAPTER unit will periodically contact the provisioning server to download an updated profile. The protocol for downloading the configuration profile can be “clear text” TFTP or HTTP data or it can be encrypted TFTP, HTTP or HTTPS data if security is required. Security will be discussed in more details in a later section.
This type of autonomous remote provisioning, where the individual PHONE ADAPTER unit pulls the profile large number of PHONE ADAP periodically.
However, some basic information must be provided to the PHONE ADAPTER before it can be provisioned in this fashion: a) the IP address or and b) a specific su the subsc need to p enter this audio in for the shipped to
from the provisioning server is very scalable and flexible. Using this provisioning method, a
TER units can be provisioned simultaneously and updated
domain name of the provisioning server to contact,
n ID and/or a password to send to the provisioning server such that it can associate it with a
bscriber and obtain the corresponding profile. This information can be sent out-of-band to
riber via secured email or in a letter inside a welcome kit, for example. The subscriber might
unch in some numbers using a telephone connected to the PHONE ADAPTER in order to
information into the unit. The PHONE ADAPTER provides an easy-to-use interface with
structions to make this initial configuration process as painless as possible. An alternative is
unit to be provisioned with this basic information by the Service Provider before the unit is
the subscriber.
e PHONE
In addition e PHONE ADAPTER allows an interactive mode o (accesse menu to c may be subscrib
A third m
tegral web server via a browser on a PC. The subscriber has the option to set and adjust
in configuration parameters vi method of provisioning mig ADAPTER over a secure corporate/in user.”
to the batch mode of remote provisioning, th
f local provisioning. One way to offer this feature is through the use of an IVR system
d through an attached telephone set). The user can access a diagnostic or configuration
heck the status of the device or to change some of the settings. This method of provisioning
applied by an administrator when the device is at the Service Provider’s office, or by the
er under the guidance of trained personnel during over-the-phone troubleshooting.
ethod of entering provisioning information into the PHONE ADAPTER is by way of its
a an easy-to-use, password protected graphical user interface. This
ht be preferred by administrators who wish to access the PHONE
stitutional LAN or by the residential subscriber who is a “power
1.1.3. Security Overview
Security may be applied at many levels in the context of the PHONE ADAPTER. The following are examples of information that should be secured:
The configuration profile pulled from the provisioning server – The downloading of the profile should be secured since it contains authentication (password/user name ID / number) information for accessing subscriber telephony services. It may also contain other passwords and/or encryption keys used for a variety of management and service operations.
The administration password to the PHONE ADAPTER unit – The unit must disallow access to administrative functions to unauthorized users. This access can be controlled with an administrator password. The administrator password can be one of the parameters in the PHONE ADAPTER configuration profile.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
10
The SIP signaling messages – The SIP messages exchanged between the SIP proxy server and the PHONE ADAPTER should be encrypted with a secret key. This can be achieved, for instance, by transporting SIP over TLS.
RTP packets – The RTP payload exchanged between SIP user agents can be encrypted with a secret key to protect against eavesdropper. The secret key can be negotiated with proper SIP signaling messages. Hence the signaling path must be secured also.
1.1.3.1. Proxy Servers
Proxy servers handle two functions:
1. Accept registrations from the SIP user age
2. Proxy requests and responses between user agents. Registration is the process by which a user agent tells the proxy who it is and at what IP address and
port that it can be reached via SIP. Registration usually expires within a finite period (e.g., 60s or 3600s) and the UA shall renew their registration periodically before the last registration expires. When a user agent initiates a call, it sends a SIP INVITE request to the proxy server and indicates the target recipient of the call. The proxy server then consults a database to determine where to forward the request to the destination us the user agent before granting the service. The credentials are computed by the user agent based on a pre-provisioned password and a challenge “nonce” dynamically generated by the proxy server per request. This mechanism prevents unauthorized user agents from getting IP Telephony services through the proxy server. SIP proxy servers are operated by the IP Telephony service provider and resides at the service provider’s domain. They may be implemented in many different ways. They can be stateless, stateful, or B2BUA. proxy the requests and responses between the user agents scalable, but provide the least types of services. Advanced IP Telephony services are possible with these proxies only with intelligent user agent devices that are capable of delivering these services without proxy intervention. Stateful proxies maintain the call state of each call and can provide more intelligent services at the expense of more processing load per call. B2BUA proxies process every request and response from the user agents and are capable of providing very advance services even with relatively simple user agent devices. Obviously B2BUA proxies have the highest processing load per call.
er agent. The proxy server can request authentication credentials from
Stateless proxies do not maintain states of each call; they simply
nts,
. Hence they are the simplest, most
1.1.4. SIP Services
Today’s PSTN offers a large number of enhanced services in addition to basic phone services. Most of the services offered by the PSTN are accessed by the subscribers through their telephone sets. The subscribers provide their input by talking into the handset, pressing the keypad, the switch hook or flash button, while the PSTN presents instructions/information/confirmation to the subscribers through a variety of audio tones, beeps and/or announcements. The PHONE ADAPTER supports a comparable range of services via a similar user interface in order to make the IP Telephony service transparent to subscribers.
The PHONE ADAPTER is fully programmable and can be custom provisioned to emulate just about any traditional telephony service available today. This ability to transparently deliver legacy services over an IP network coupled with the availability of Internet connected devices (PCs. PDA, etc.) and browsers opens up a new world of potential offerings that a provider can use to differentiate their service and grow their business.
The following is a list of commonly supported phone services:
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
11
1.1.4.1. Basic Services
1.1.4.1.1. Making Calls to PSTN and IP Endpoints
This is the most basic service. When the user picks up the handset, the PHONE ADAPTER provides dial tone and is ready to collect dialing information via DTMF digits from a touch tone telephone. While it is possible to support overlapped dialing within the context of SIP, the PHONE ADAPTER collects a complete phone number and sends the full number in a SIP INVITE message to the proxy server for further call processing. In order to minimize dialing delay, the PHONE ADAPTER maintains a dial plan and matches it against the cumulative number entered by the user. The PHONE ADAPTER also detects invalid phone numbers not compatible with the dial plan and alerts the user via a configurable tone (reorder) or announcement.
1.1.4.1.2. Receiving Calls from PSTN and IP Endpoints
The PHONE ADAPTER can receive calls from the PSTN or other IP Telephony subscribers. Each subscriber is assigned an E.164 phone number so that they may be reached from wired or wireless callers on the PSTN. The PHONE ADAPTER supplies ring voltage to the attached telephone set to alert the user of incoming calls.
1.1.4.2. Enhanced Services
Enhanced Services are provided in addition to Basic calling services and accessed by way of a touchtone phone through a series of menus. Since the service enabled by the PHONE ADAPTER are Internet in nature, these enhanced services can be made better by offering users a web browser based interface to control certain aspects of some or all service s.
1.1.4.2.1. Caller ID
In between ringing bursts, the PHONE ADAPTER can generate a Caller ID signal to the attached phone when the phone is on-hook.
Calling Line Identification Presentation (CLIP) Some subscribers will elect to always block their Caller ID information, yet there may be a
circumstance where sending Caller ID information for a particular call is desired, i.e. trying to reach a party that does not accept Caller ID blocked calls.
The subscriber activates this service to send his Caller ID when making an outgoing call. To activate the service, the subscriber enters the corresponding * or # code prior to making the call. This service is in effect only for the duration of the current call.
Calling Line Identification Restriction (CLIR) – Caller ID Blocking The subscriber activates this service to hide his Caller ID when making an outgoing call. To activate
the service, the subscriber enters the corresponding * or # code prior to making the call. This service is in effect only for the duration of the current call.
1.1.4.2.2. Call Waiting
The subscriber can accept a call from a 3rd party while engaging in an active call. The PHONE ADAPTER shall alert the subscriber for the 2nd incoming call by playing a call waiting tone.
Disable or Cancel Call Waiting By setting the corresponding configuration parameter on the PHONE ADAPTER, the PHONE
ADAPTER supports disabling of call waiting permanently or on a per call basis. Call-Waiting with Caller ID In between call waiting tone bursts, the PHONE ADAPTER can generate a Caller-ID signal to the
attached phone when it is off hook.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
12
1.1.4.2.3. Voice Mail
Message Waiting Indication Service Providers may provide voice mail service to their subscribers. When voice mail is available
for a subscriber, a notification message will be sent from the Voice Mail server to the PHONE ADAPTER. The PHONE ADAPTER indicates that a message is waiting by, playing stuttered dial tone (or other configurable tone) when the user picks up the handset.
Checking Voice Mail The PHONE ADAPTER allows the subscriber to connect to their voice mail box by dialing their
personal phone number.
1.1.4.2.4. Call Transfer
Three parties are involved in Call Transfer: The transferor, transferee, and transfer target. There are 2 flavors of call transfer: Attended Transfer (Transfer with consultation) and Unattended Transfer (“Blind” Transfer).
Attendant Transfer The transferor dials the number of the transfer target, then he hangs up (or enters some * or # code)
when the transfer target answers or rings to complete the transfer. Unattended or “Blind” Transfer The transferor enters some * or # code and then dials the number of the transfer target to complete
the transfer (without waiting for the target to ring or answer).
1.1.4.2.5. Call Hold
Call Hold lets you put a caller on hold for an unlimited period of time. It is especially useful on phones without the hold button. Unlike a hold button, this feature provides access to a dial tone while the call is being held.
1.1.4.2.6. Three-Way Calling
The subscriber can originate a call to a 3rd party while engaging in an active call.
1.1.4.2.7. Three-Way Ad-Hoc Conference Calling
The PHONE ADAPTER can host a 3-way conference and perform 3-way audio mixing (without the need of an external conference bridge device or service).
1.1.4.2.8. Call Return
The PHONE ADAPTER supports a service that allows the PHONE ADAPTER to automatically dials the last caller’s number.
1.1.4.2.9. Call Return on Busy
If the last called number is busy, the subscriber can order this service to monitor the called party and to receive a notification from the PHONE ADAPTER (such as special phone ring) when that party becomes available.
1.1.4.2.10. Automatic Call Back
This feature allows the user to place a call to the last number they tried to reach whether the call was answered, unanswered or busy by dialing an activation code.
1.1.4.2.11. Call Forwarding
These services forward all the incoming calls to a static or dynamically configured destination number based on three different settings. These services may be offered by the PHONE ADAPTER or by the SIP proxy server. They can be activated by entering certain * or # code, followed by entering a
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
13
telephone number to forward calls to. The PHONE ADAPTER provides audio instructions to prompt the user for a forwarding number and confirms that the requested service has been activated.
Call FWD – Unconditional All calls are immediately forwarded to the designated forwarding number. The PHONE ADAPTER
will not ring or provide call waiting when Call FWD – Unconditional is activated. Call FWD – Busy Calls are forwarded to the designated forwarding number if the subscriber’s line is busy because of
the following; Primary line already in a call, primary and secondary line in a call or conference. Call FWD - No Answer Calls are forwarded to the designated forwarding number after a configurable time period elapses
while the PHONE ADAPTER is ringing and does not answer.
1.1.4.2.12. Anonymous Call Blocking
By setting the corresponding configuration parameter on the PHONE ADAPTER, the subscriber has the option to block incoming calls that do not reveal the caller’s Caller ID.
1.1.4.2.13. Distinctive / Priority Ringing
The PHONE ADAPTER supports a number of ringing and call waiting tone patterns to be played when incoming calls arrive. The choice of alerting pattern to use is carried in the incoming SIP INVITE message inserted by the SIP Proxy Server (or other intermediate application server in the Service Provider’s domain).
1.1.4.2.14. Speed Dialing
The PHONE ADAPTER supports speed dialing of up to eight (8) phone numbers or IP addresses. To enter a telephone number speed dial using a touch tone telephone, the user dials a feature code (*74), followed by a number (2-9), then the destination speed dialed target number. When the user wishes to speed dial a target number, they press the corresponding speed dial assigned number followed by the “#” (pound) key.
Users may also enter/review speed dials from User1/User2 web-pages. This interface or similar is required to enter IP address targets.
1.1.4.3. PSTN Interworking
The PHONE ADAPTER is designed to provide a transparent interworking relationship with the PSTN. Service providers can deploy the PHONE ADAPTER in such a way that PSTN endpoints – wired or wireless – communicating with PHONE ADAPTER endpoints do so without modification to their configuration or network settings.
The service provider may choose to deploy a multi-protocol VoIP network, much the same way the PSTN supports multiple signaling schemes today. Most telecommunication providers operate equipment that supports CAS or channel associated signaling, ISDN signaling and SS7 signaling. When VoIP is introduced or used in the telecommunications landscape, it is likely that the service provider will implement a signaling gateway that supports multiple IP Telephony protocols along with legacy PSTN protocols. The signaling gateway is commonly referred to as a Softswitch.
Architecture and functionality can vary greatly amongst the different softswitch vendors. The protocols used will depend on the types of connections that will be set-up across the service provider’s network. If the provider is simply providing transport of calls to/from their network to another provider’s network, but not originating or terminating calls with the endpoints, SIP will likely be used for softswitch to softswitch communication.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
14
If the service provider is offering origination and/or termination on endpoint equipment then it is very likely that the softswitch chosen for network operations will support multiple PSTN and VoIP signaling protocols.
The table below lists the most commonly accepted, de-facto standards used when implementing a VoIP signaling scheme based on the type of gateway or endpoint equipment being deployed:
VoIP Equipment Type Typical Port Density De-Facto Signaling Standards Trunking Gateways Greater Than 500 Ports H.248-Megaco / MGCP / IPDC Access Gateways Between five and 500 Ports SIP / H.323 PBX/KTS Platforms Between ten and 500 Ports SIP / H.323 / SCCP PBX/KTS Telephone Sets One Port SIP / MGCP / SCCP Phone Adapters and IP Centrex
Phones The PHONE ADAPTER supports SIP today. It has the capability to communicate with a variety of
endpoints and signaling entities via SIP messages.
Up to four Ports SIP / MGCP
1.2. Network Address Translation (NAT) Traversal
1.2.1. What is a NAT or NAPT (Network Address Port Translator)?
A NAT allows multiple devices to share the same external IP address to access the resources on the external network. The NAT device is usually available as one of the functions performed by a router that routes packets between an external network and an internal (or private) one. A typical application of a NAT is to allow all the devices in a subscriber’s home network to access the Internet through a router with a single public IP address assigned by the ISP. The IP header of the packets sent from the private network to the public network can be substituted by the NAT with the public IP address and a port selected by the router according to some algorithm. In other words, recipient of the packets on the public network will perceive the packets as coming from the external address instead of the private address of the device where the packets are originated.
In most Internet protocols, the source address of a packet is also used by the recipient as the destination to send back a response. If the source address of the packets sent from the private network to the public network is not modified by the router, the recipient may not be able to send back a response to the originator of the message since its private source IP address/port is not usable. When a packet is sent from a device on the private network to some address on the external network, the NAT selects a port at the external interface from which to send the packet to the destination address/port. The private address/port of the device, the external address/port selected by the NAT to send the packet, and the external destination address/port of the packet form a NAT Mapping.
The mapping is created when the device first sends a packet from the particular source address/port to the particular destination address/port and is remembered by the NAT for a short period of time. This period varies widely from vendor to vendor; it could be a few seconds, or a few minutes, or more, or less. While the mapping is in effect, packets sent from the same private source address/port to the same public destination address/port is reused by the NAT. The expiration time of a mapping is extended whenever a packet is sent from the corresponding source to the corresponding destination.
More importantly, packets sent from that public address/port to the external address/port of the NAT will be routed back to the private address/port of the mapping session that is in effect. Some NAT devices actually reuse the same mapping for the same private source address/port to any external IP address/port and/or will route packets sent to its external address/port of a mapping from any external
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
15
address/port to the corresponding private source address/port. These characteristics of a NAT can be exploited by an PHONE ADAPTER to let external entities send SIP messages and RTP packets to it when it is installed on a private network.
1.2.2. VoIP-NAT Interworking
In the case of SIP, the addresses where messages/data should be sent to an PHONE ADAPTER are embedded in the SIP messages sent by the device. If the PHONE ADAPTER is sitting behind a NAT, the private IP address assigned to it is not usable for communications with the SIP entities outside the private network. The PHONE ADAPTER must substitute the private IP address information with the proper external IP address/port in the mapping chosen by the underlying NAT to communicate with a particular public peer address/port. For this the PHONE ADAPTER needs to perform the following tasks:
Discover the NAT mappings used to communicate with the peer. This could be done with the help of some external device. For example a server could be deployed on the external network such that the server will respond to a special NAT-Mapping-Discovery request by sending back a message to the source IP address/port of the request, where the message will contain the source IP address/port of the original request. The PHONE ADAPTER can send such a request when it first attempts to communicate with a SIP entity in the public network and stores the mapping discovery results returned by the server.
Communicate the NAT mapping information to the external SIP entities. If the entity is a SIP Registrar, the information should be carried in the Contact header that overwrites the private address/port information. If the entity is another SIP UA when establishing a call, the information should be carried in the Contact header as well as in the SDP embedded in SIP message bodies. The VIA header in outbound SIP requests might also need to be substituted with the public address if the UAS relies on it to route back responses.
Extend the discovered NAT mappings by sending keep-alive packets. Since the mapping is only alive for short period, the PHONE ADAPTER continues to send periodic keep-alive packets through the mapping to extend its validity as necessary.
1.3. Voice Quality Overview
Voice Quality perceived by the subscribers of the IP Telephony service should be indistinguishable from that of the PSTN. Voice Quality can be measured with such methods as Perceptual Speech Quality Measurement (PSQM) (1-5 – lower is better) and Mean Opinion Score (MOS) (1-5 – higher is better).
The table below displays speech quality metrics associated with various audio compression algorithms:
Algorithm Bandwidth Complexity MOS Score G.711 64 kbps Very Low 4.5 G.726 16, 24, 32, 40 kbps Low 4.1 (32 kbps) G.729a 8 kbps Low - Medium 4 G.729 8 kbps Medium 4 G.723.1 6.3, 5.3 kbps High 3.8 Please note: The PHONE ADAPTER supports all the above voice coding algorithms.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
16
Several factors that contribute to Voice Quality are described below. Audio compression algorithm – Speech signals are sampled, quantized and compressed before they
are packetized and transmitted to the other end. For IP Telephony, speech signals are usually sampled at 8000 samples per second with 12-16 bits per sample. The compression algorithm plays a large role in determining the Voice Quality of the reconstructed speech signal at the other end. The PHONE ADAPTER supports the most popular audio compression algorithms for IP Telephony: G.711 a-law and µ-law, G.726, G.729a and G.723.1.
The encoder and decoder pair in a compression algorithm is known as a codec. The compression ratio of a codec is expressed in terms of the bit rate of the compressed speech. The lower the bit rate, the smaller the bandwidth required to transmit the audio packets. Voice Quality is usually lower with lower bit rate, however. But Voice Quality is usually higher as the complexity of the codec gets higher at the same bit rate.
Silence Suppression – The PHONE ADAPTER applies silence suppression so that silence packets are not sent to the other end in order to conserve more transmission bandwidth; instead a noise level measurement can be sent periodically during silence suppressed intervals so that the other end can generate artificial comfort noise that mimics the noise at the other end (using a CNG or comfort noise generator).
Packet Loss – Audio packets are transported by UDP which does not guarantee the delivery of the packets. Packets may be lost or contain errors which can lead to audio sample drop-outs and distortions and lowers the perceived Voice Quality. The PHONE ADAPTER applies an error concealment algorithm to alleviate the effect of packet loss.
Network Jitter – The IP network can induce varying delay of the received packets. The RTP receiver in the PHONE ADAPTER keeps a reserve of samples in order to absorb the network jitter, instead of playing out all the samples as soon as they arrive. This reserve is known as a jitter buffer. The bigger the jitter buffer, the more jitter it can absorb, but this also introduces bigger delay. Therefore the jitter buffer size should be kept to a relatively small size whenever possible. If jitter buffer size is too small, then many late packets may be considered as lost and thus lowers the Voice Quality. The PHONE ADAPTER can dynamically adjust the size of the jitter buffer according to the network conditions that exist during a call.
Echo – Impedance mismatch between the telephone and the IP Telephony gateway phone port can lead to near-end echo. The PHONE ADAPTER has a near end echo canceller with at least 8 ms tail length to compensate for impedance match. The PHONE ADAPTER also implements an echo suppressor with comfort noise generator (CNG) so that any residual echo will not be noticeable.
Hardware Noise – Certain levels of noise can be coupled into the conversational audio signals due to the hardware design. The source can be ambient noise or 60Hz noise from the power adaptor. The PHONE ADAPTER hardware design minimizes noise coupling.
End-to-End Delay – End-to-end delay does not affect Voice Quality directly but is an important factor in determining whether subscribers can interact normally in a conversation taking place over an IP network. Reasonable delay figure should be about 50-100ms. End-to-end delay larger than 300ms is unacceptable to most callers. The PHONE ADAPTER supports end-to-end delays well within acceptable thresholds.
2. Hardware Overview
The PHONE ADAPTER has one of the smallest form factors on the market. It can be installed in minutes as a table-top or wall mount CPE device. Figures Figure 2 and Figure 3 show the front and rear, of the PHONE ADAPTER, respectively. Figures 4 and 5 show the front and rear, of the RT31P2 Broadband Router, respectively.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
17
Figure 2 – PAP2 Front
Figure 3 – PAP2 Back
Figure 3 – RT31P2 Front Figure 4 – RT31P2 Back
The PAP2 PHONE ADAPTER has the following interfaces for networking, power and visual status indication:
1. Two (2) RJ-11 Type Analog Telephone Jack Interfaces (Figure 3 , above): These interfaces accept standard RJ-11 telephone connectors. An Analog touchtone telephone or
fax machine may be connected to either interface. If the service s analog telephone or fax machine should be connected to port one (1) of the PHONE ADAPTER. Port one (1) is the outermost telephone port on the PHONE ADAPTER and is labeled “Phone 1.”
2. One Ethernet 10baseT RJ-45 Jack Inte his interface accepts a standard or crossover Ethernet cable with standard RJ-45 connector. For
T optimum performance, Linksys recommends that a Category 5 cable or greater be used in conjunction with the PHONE ADAPTER.
The Broadband Router RT31P2 has the following interfaces for networking, power and visual status indication:
1. Two (2) RJ-11 Type Analog Telephone Jack Interfaces (Figure 4, above):
These interfaces accept standard RJ-11 telephone connectors. An A fax machine may be connected to either interface. If the service supports only one incoming line, the analog telephone or fax machine should be co the outermost telephone port on the RT31P2 and is labeled “Phone 1.”
rface (Figure 3, above):
nnected to port one (1) of the RT31P2. Port one (1) is
upports only one incoming line, the
nalog touchtone telephone or
2. Four (4) Ethernet 10/100 baseT, three (3) for Local Network and one (1) for Internet, all the 4 ports
uses RJ-45 Jack Interface, (Figure 5, abo This interface
optimum performance, Linksys recommends that a Category 5 cable or greater be used in conjunction with the PHONE ADAPTER.
3. LEDs
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
accepts a standard or crossover Ethernet cable with standard RJ-45 connector. For
ve):
18
b
2.1. Phone Adapter LED Status
LED Color(s) Activity Description
Off Power OFF Blue On Power On / Device Ready
Power Blue
Ethernet Blue
Phone 1 / Phone 2
Blue
Blue Blinking Booting / System Self-Test / Firmware upgrade Red On Off No Connection on Ethernet
Blue On Ethernet Connection established Blue Blinking Data Sending / Receiving Off Phone is not in use/not provisioned or registered Blue On Registered/provisioned Blue Blinking Phone is in use/Incoming Call detected
POST (Power On Self Test) failure (not boota or Device malfunction
le)
2.2. Broadband Router (RT31P2) LED Status
LED Color(s) Activity Description
Off Power OFF Solid Green Power On
Power Green
Ethernet Blue
Phone 1 / Phone 2
Blue
Green Blinking
Red On Off No Connection on Ethernet
Solid Green Ethernet Connection established Green
Blinking Off Phone is not in use/not provisioned or registered Green On Registered/provisioned Green
Blinking
Booting / System Self-Test / Firmware upgrade POST (Power On Self Test) failure (not bootable)
or Device malfunction
Data Sending / Receiving
Phone is in use/Incoming Call detected
4. One 5 Volt Power Adapter Interface (Figure 3, above) for PAP2 Phone Adapter and 12 Volt Power
Adapter for the Broadband Router (RT31P2) This interface accepts the PHONE ADAPTER power adapter that came with the unit. Linksys does
not support the use of any other power adapters other then the power adapter that was shipped with the PHONE ADAPTER unit or the Broadband Router (RT31P2)
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
19
Please check to make sure that you have the following package contents:
1. Linksys Phone Adapter Unit or Linksys Broadband Router (RT31P2)
2. Ethernet Cable
3. 5 Volt (PAP2) or 12 Volt (RT31P2) Power Adapter
4. CD with User Guide
You will also need:
1. One or Two Analog Touch Tone Telephones (or Fax Machine)
2. Access to an IP Network via an Ethernet Connection
3. One or Two RJ-11 Phone Cable(s).
Please observe the following steps to install the PHONE ADAPTER. From the rear Side of the PHONE ADAPTER:
1. Insert a standard RJ-45 Ethernet cable (included) into the LAN port.2. Insert the power adapter cable into the 5V power adapter cable receptacle. Ensure that the power adapter jack is snugly attached to the PHONE ADAPTER.
2. Insert a standard RJ-11 telephone cable into the Phone 1 port.2. Connect the other end of the cable to an analog telephone or fax machine.
3. Insert a standard RJ-11 telephone cable into the Phone 2 port (Optional)
4. Connect the other end of the cable to an analog telephone or fax machine.
Note: Do not connect RJ-11 telephone cable from the PHONE ADAPTER to the wall jack to prevent any chance of connection to the circuit switched Telco network. You may now insert the plug end of the power adapter into a live power outlet which will power up the PHONE ADAPTER.
3. Software Configuration Mechanisms
The PHONE ADAPTER provides for secure remote provisioning and remote upgrade. Linksys recommends that providers use a secure first-time provisioning mechanism using HTTPS (described in more detail in section 3.2). Subsequent, provisioning is achieved through configuration profiles transferred to the device via TFTP, HTTP or HTTPS. These configuration profiles can be encrypted using AES 256-bit symmetric key encryption using a key configured into the device during the initial HTTPS provisioning stage. As an alternative method for initial configuration, an unprovisioned PHONE ADAPTER can receive an encrypted profile specifically targeted for that device without requiring an explicit key, although this is not as secure as using HTTPS.
The PHONE ADAPTER can be configured to resync its internal configuration state to a remote profile periodically and on power up. An administrator can also remotely trigger a profile resync by sending an authenticated SIP NOTIFY request to the PHONE ADAPTER.
Likewise, remote upgrades are achieved via TFTP, HTTP or HTTPS. The PHONE ADAPTER upgrade logic is capable of automating multi-stage upgrades, in case intermediate upgrades are ever required to reach a future upgrade state from an older release.
General purpose parameters are provided as an additional aid to service providers in managing the provisioning process. The administrator can configure simple comparisons, translations, concatenations, and parameter substitution with the aid of these parameters.
All profile resyncs are attempted only when the PHONE ADAPTER is idle, since they may trigger a software reboot. User intervention is not required to initiate or complete a profile update or firmware upgrade. In general, most configuration changes take effect without requiring a reboot.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
20
The PHONE ADAPTER also provides a Web Interface with two-level access (user-level and admin­level) to configuration parameters. For standalone PHONE ADAPTERS (which contain no router or NAT functionality), an IVR (Interactive Voice Response) interface is also available for configuring basic networking.
3.1. Configuration Profile Formats
The PHONE ADAPTER configuration profile is an XML or binary file with encoded PHONE ADAPTER parameter values and optionally user access permissions for those parameters. By convention, the profile is named with the extension “.cfg” (e.g. pap2.cfg). An administrator can easily generate the XML format and compress and/or encrypt this file with off-the-shelf tools (e.g. gzip, openssl).
The XML configuration file always begins with the top-level element <flat-profile>. Within this element are any number of the configuration elements which are visible in the GUI. The XML tag names are case-sensitive and are identical to the names in the GUI, except that characters other than hyphen, period, underscore, and alphanumeric characters from the GUI are replaced with an underscore in the XML names. For example, User ID(1) becomes <User_ID_1_> .
Empty elements (ex: <element/> ) or missing elements do not change the value already stored in memory. An opening and closing tag (ex: <element></element>) with no included value, deletes the value stored in memory. Standard XML comments and arbitrary whitespace can be included in the file for readability purposes. Note that in XML, less-than ("<") and ampersand ("&") characters within an element must be escaped (using "<" and "&" respectively). Element names in XML are case­sensitive.
<flat-profile> <Profile_Rule>https://config.provider.net/linksys/$MA-cfg.xml </Profile_Rule> <Resync_Periodic>86400</Resync_Periodic> <Admin_Passwd>9b4cef5677a129</Admin_Passwd>
<Proxy_1_>sip.provider.net</Proxy_1_> <User_ID_1_>1234567890</User_ID_1_> <Password_1_>YhJ89_Luk4E</Password_1_> <Display_Name_1_>1234567890</Display_Name_1_> <Line_Enable_2_>0</Line_Enable_2_> </flat-profile>
The Linksys Supplementary Profile Compiler tool (SPC) is provided for compiling a plain-text file containing parameter-value pairs into a binary cfg file which is optionally encrypted. The spc tool is available from Linksys for the Win32 environment (spc.exe), Linux-i386-elf environment (spc-linux­i386-static) and for the OpenBSD environment.
The syntax of the plain-text file accepted by the profile compiler is a series of parameter-value pairs, with the value in double quotes. Each parameter-value pair is followed by a semicolon, e.g. parameter_name “parameter_value”;. If no quoted value is specified for a parameter (or if a parameter specification is missing entirely from the plain-text file) the value of the parameter will remain unchanged in the PHONE ADAPTER.
The SPC syntax also controls the parameter’s user-level access when using the built-in web interface to the PHONE ADAPTER (PAP2-only). An optional exclamation point or question mark, immediately following the parameter name, indicates the parameter should be user read-write or read-only,
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
21
respectively. If neither mark is present, the parameter is made inaccessible to the user from the web interface. Note that this syntax has no effect on the admin-level access to the parameters.
When using the SPC, a service provider is given full control over which parameters become inaccessible, read-only, or read-write following provisioning of the PHONE ADAPTER.
If the parameter specification is missing entirely from the plain-text file, the user-level access to the parameter will remain unchanged in the PHONE ADAPTER. If the plain-text file contains multiple occurrences of the same parameter-value specification, the last such occurrence overrides any earlier ones.
Parameter names in the plain-text file must match the corresponding names appearing in the PHONE ADAPTER web interface, with the following modifications:
Inter-word spaces are replaced by underscores ‘_’ (e.g. Multi_Word_Parameter).
For the PHONE ADAPTER, line and user specific parameters use bracketed index syntax to
identify which line or user they refer to (e.g. Line_Enable[1] and Line_Enable[2]).
Comments are delimited by a ‘#’ character up to the end-of-line. Blank lines can be used for readability.
Parameter_name [ ‘?’ | ‘!’ ] [“quoted_parameter_value_string”] ‘;’
Example of plain-text file entries:
# These parameters are for illustration only
Feature_Enable ! “Enable” ; # user read-write Another_Parameter ? “3600” ; # user read-only Hidden_Parameter “abc123” ; # user not-accessible
Some_Entry ! ; # user read-write, leave value unchanged
Multiple plain text files can be spliced together to generate the source for each CFG file. This is accomplished by the “import” directive: the literal string “import” (placed at the start of a new line) followed by one or more spaces and the file name to splice into the stream of parameter-value pairs. The following example illustrates. File splicing can be nested several files deep.
# base.txt contains . . . Param1 “base value 1” ; Param2 “base value 2” ; . . .
# Phone Adapter1234.txt contains . . . import base.txt Param1 “new value overrides base” ; Param7 “particular value 7” ; . . .
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
22
# The Phone Adapter1234.txt file above is equivalent to . . . Param1 “base value 1” ; Param2 “base value 2” ; . . . Param1 “new value overrides base” ; Param7 “particular value 7” ; . . .
A sample plain-text file, containing default parameter-value and access settings for the PHONE ADAPTER can be obtained from the profile compiler tool, using the following command-line arguments.
spc –-sample-profile defaults.txt
In both the XML and SPC configuration formats,] Boolean parameter values that evaluate to true are any one of the values {Yes | yes | Enable | enable | 1}. Boolean values that evaluate to false are any one of the values {No | no | Disable | disable | 0}.
3.1.1. Using the Supplemental Profile Compiler
Once a plain-text file has been generated with the desired parameter settings, it needs to be compiled into a binary CFG file. The profile compiler can generate a generic unencrypted CFG file, a targeted CFG file (encrypted for a unique PHONE ADAPTER), a generic key encrypted CFG file, or a targeted and key encrypted CFG file.
A generic CFG file (non-targeted) is accepted as valid by any PHONE ADAPTER device. A targeted CFG file is only accepted as valid by the PHONE ADAPTER device bearing the target MAC address. Targeted CFG files are encrypted with a 128-bit algorithmically generated key, and therefore do not require a key to be issued explicitly. Targeted CFG files provide a basic level of security for remotely locking an otherwise unprovisioned PHONE ADAPTER.
The binary configuration format supports RC4 and AES symmetric key algorithms, with keys of up to 256 bits. The key can be specified explicitly as a hex-string, or it can be generated from a password or a quoted pass-phrase. In the case of passwords and pass-phrases, the internally generated key is 128 bits in length.
The following command-line syntax generates a generic and unencrypted CFG file:
spc pap2.txt pap2.cfg
A targeted CFG file (with basic encryption) is specified by supplying the MAC address of the target device:
spc –-target 000e08aaa010 pap2.txt pap2.cfg
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
23
An encrypted CFG file requires either a password (or quoted pass-phrase) or a hex-string. The following lines illustrate command-line invocations for various combinations of keys and algorithms.
spc –-rc4 –-ascii-key apple4sale pap2.txt pap2.cfg spc –-aes –-ascii-key lucky777 pap2.txt pap2.cfg spc –-aes –-ascii-key “my secret phrase” pap2.txt pap2.cfg spc –-aes –-hex-key 8d23fe7...a5c29 pap2.txt pap2.cfg
A CFG file can be both targeted and key encrypted, as suggested by the following example:
spc –-target 000e08aaa010 –-aes –-hex-key 9a20...eb47 a.txt a.cfg
The status messages printed by spc can be suppressed with the “--quiet” com mand line option. Or they can be redirected to a file, with the “--log file_name” command line option. In the latter case, the spc command line invocation itself is also printed in the log file, preceded by a timestamp.
spc –-quiet . . . spc –-log prov.log . . .
3.1.2. Encrypting and Compressing XML configuration files
The Linksys PHONE ADAPTER supports encrypted XML configuration profiles. This ca n be used for subsequent configuration files stored on or generated by either TFTP or HTTP servers. When used in concert with HTTPS for initial config, this provides complete security, but only uses the HTTPS server for initial enrollment. For example, an example configuration file in XML setup to download an encrypted XML file via HTTP looks like this:
<flat-profile> <Profile_Rule>[--key $B] http://config.provider.net/linksys/established/$MA.xml </Profile_Rule> <Resync_Periodic>86400</Resync_Periodic> <GPP_B >9b4cef5677a129</GPP_B> <Admin_Passwd>9b4cef5677a129</Admin_Passwd>
<Proxy_1_>sip.provider.net</Proxy_1_> <User_ID_1_>1234567890</User_ID_1_> <Password_1_>YhJ89_Luk4E</Password_1_> <Display_Name_1_>1234567890</Display_Name_1_> <Line_Enable_2_>0</Line_Enable_2_> </flat-profile>
An XML configuration file can be encrypted using the openssl command line utility as shown below. (Note that aes encryption is available beginning with OpenSSL versions 0.9.7. OpenSSL is freely available from http://www.openssl.org )
openssl aes-256-cbc -e -in cleartextconfig -out encryptedconfig -k 9b4cef5677a129
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
24
This utility generates 8-bytes of salt (which is prepended to the encrypted configuration file), and then calculates an Initialization Vector (IV) and an 256-bit encryption key using the key phrase provided on the command line. The TA recognizes the leading characters "Salted__" as a hint to find the salt and decrypt the configuration file.
Linksys XML configuration files can be compressed using the gzip compression algorithm. Gzip is available from http://www.gzip.org .
gzip cleartextconfig.xml If both compression and encryption are used, the clear text version must be compressed before it is
encrypted. The PHONE ADAPTER does not recognize files which are encrypted and then compressed since encrypted files are uncompressible. The Linksys PHONE ADAPTER automatically detects if a file is compressed or encrypted.
3.2. Secure Initial Configuration
Linksys recommends a secure configuration system to providers to protect them from theft of service, account forgery, and denial of service. To that end, Linksys Terminal Adapters are provisioned at the factory with a public key certificate signed by the Linksys certificate authority.
The first step in this process is for the Linksys terminal adapters to use HTTPS to initially contact the configuration server specified in the Profile_Rule. The initial URL can be configured into the TA at manufacturing time for order over a certain size, it can be added during a staging process, or it can be provided via the web interface as described in the next section. The PHONE ADAPTER opens a TCP connection to the initial configuration server, and sends an SSLv2 ClientHello message. The configuration server then presents a server certificate signed by Linksys in a ServerHello message, and requests the certificate of the client. The Terminal Adapter validates the server certificate and provides its client certificate. From the client certificate, the provider is assured of the authenticity of the MAC address, serial number, and model number of the Linksys device which has connected. The terminal adapter will then use an HTTP GET over this TLS secure channel to fetch its initial configuration.
An Apache web server can be setup to perform all the certificate verification automatically as configuration directives. An example configuration is listed below:
<Directory /linksys/secu re-setup/> SSLVerifyClient require SSLVerifyDepth 1 SSLRequireSSL SSLCertificateFile provider-cert-signed-by-linksys.pem SSLCertificateKeyFile provider-private-key.pem SSLCertificateChainFile linksys-cert.pem SSLCACertificateFile linksys-cert.pem SSLRequire ( %{SSL_CLIENT_VERIFY} eq "SUCCESS" \ and %{SSL_CLIENT_I_DN_O} eq "Linksys" \ and %{SSL_CLIENT_S_DN_O} eq "Linksys" \ and %{SSL_CLIENT_S_DN_CN} eq %{REQUEST_FILENAME} </Directory>
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
25
Within this directory, the Apache module mod_ssl verifies the client certificate, and verifies that the MAC address in the certificate corresponds the configuration file it is requesting. Either this directory must contain a configuration file, or a CGI application needs to generate the appropriate config file if that MAC address is configured in your system. (The Apache web server is freely available at http://www.apache.org ).
Once an initial XML configuration file is downloaded from the provider web server, subsequent configuration can be downloaded from the same server. Alternatively, the individual configuration files can be encrypted using AES 256-bit encryption as described previously, using a key that was conveyed in the initial configuration file. These encrypted configuration files then can be downloaded safely using HTTP or TFTP.
Linksys recommends using an encrypted configuration file. In the unlikely event that the private key of a terminal adapter or the Linksys certificate authority is compromised, terminal adapters which have already enrolled with a provider and use an encrypted configuration file would be unaffected by such a compromise.
3.3. Web Interface
The PHONE ADAPTER provides a built-in web server. Configuration and administration can be performed through this convenient web interface.
3.3.1. Web Interface Conventions
The PHONE ADAPTER line uses the following conventions with the web administration capabilities:
o The PHONE ADAPTER web administration supports two privilege levels: Administrator and
User. To use the User privilege, simply point a web browser at the IP address of the PHONE ADAPTER; to use the administrator privilege, use this URL for the PAP2 http://IP_Address_Of_PHONE ADAPTER/admin/, and this URL for the RT31P2: http://IP_Address_Of_PHONE ADAPTER/Voice_adminPage.htm . The default IP address for the LAN interface of the RT31P2 is 192.168.15.1. See the next section for more information about administration privileges.
o The PHONE ADAPTER supports Internet Explorer 5.5 and above and Netscape 7.0 and
above.
o The web configuration pages can be password protected. See 3.3.2 for more information
about password protect.
o The user name of web Administrator is : admin o The user name of web User is : user o Note: The user names for both administrator and User are fixed and cannot be changed. o After making changes to PHONE ADAPTER configuration parameters, pressing “Submit All
Changes” button will apply all the changes and if necessary, automatically reboot the device. Multiple changes may be made on multiple page tabs of the web interface at the same time. Pressing “Submit All Changes” will apply all the modifications.
Important Note: switching between page tabs won’t apply the changes to PHONE ADAPTER, The only way to apply the changes is to press the “Submit All Changes” button.
o If the “Undo All Changes” button is clicked, any modifications to profile parameters on any and
all pages will be reset back to their original values before modification.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
26
NOTE: Pressing the “Undo All Changes” has no effect on the PHONE ADAPTER; it will only reset the values on the web page.
3.3.2. Administration Privileges
The PHONE ADAPTER supports two levels of administration privileges: Administrator and User, both privileges can be password protected. Important note: by factory default, there are no passwords assigned for both Administrator and User.
The Administrator has the privilege to modify all the web profile parameters and can also modify the passwords of both Administrator and User. A User only has the privilege to access part of the web profile parameters; the parameter group that User can access is specified by the Administrator, which can only be done through provisioning.
To access the Administrator level privilege, use the URL for your model number as described in the previous section. If the password has been set for Administrator, the browser will prompt for authentication. The username for Administrator is “admin” and cannot be changed.
To access the User level privilege, use URL: http://IP_Address_Of_PHONE ADAPTER/. If the password has been set for User, the browser will prompt for User authentication. The username for User is “user” and cannot be changed.
When browsing Administrator pages, one can switch to User privileges by click the link “User Login”. (Note: if User password was set, the browser will prompt for User authentication when you click “User Login” link). On the other side, from the User pages you can switch to Administrator privilege by clicking the link “Admin Login.” Authentication is needed if Administrator password has been set.
Warning: Switching between the User and Administrator will discard the uncommitted changes that have already been made on the web pages.
3.3.3. Basic and Advanced Views
The PAP2 web configuration interface provides a Basic and an advanced view from which the various configuration parameters can be accessed. The PHONE ADAPTER Provisioning tab is only visible from the Advanced Administrator view of the web interface.
Warning: Switching between the basic and advanced view will discard the uncommitted changes that have already been made on the web pages.
3.4. The web interface of the PHONE ADAPTER supports several functions through special URLs:
Upgrade, Reboot, Profile Resync, and Factory Reset. Administrator privilege is needed for these functions.
Note that on the RT31P2, these URLs are only accessible from the LAN interface, unless the Admin_Passwd has been set and the Enable_Web_Admin_Access parameter is set.
Functional Configuration URLs
3.4.1. Upgrade URL
Through upgrade URL you can upgrade the PHONE ADAPTER to a firmware specified by the URL. Note: If the value of “upgrade enable” parameter in Provisioning tab is no, you cannot upgrade the PHONE ADAPTER even if the web page tells you that the upgrade will be done when it is not in use. See 4.2.1 to get more information on firmware upgrade.
The syntax of Upgrade URL is:
http://<PAP2-ip-addr>/upgrade?[protocol://][server-name[:port]][/firmware-pathname] or
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
27
http://<PAP2-ip-addr>/admin/upgrade?[protocol://][server-name[:port]][/firmware-pathname]
If no protocol is specified, TFTP is assumed. Note: Only TFTP is supported in the current release. If no server-name is specified, the host that requests the URL is used as server-name. If no port specified, default port of the protocol is used. (69 for TFTP, 80 for http, 443 for HTTPS) The “firmware-pathname” is typically the file name of the PHONE ADAPTER binary located in the root
directory of the TFTP server. If no firmware-pathname is specified, “/Phone Adapter.bin” is assumed. For example:
http://192.168.2.217/upgrade?tftp://192.168.2.251/PAP2.bin
3.4.2. Resync URL
Through Resync URL you can force the PHONE ADAPTER to do a resync to a profile specified in the URL.
Note: The PHONE ADAPTER will resync only when it is idle. The syntax of Resync URL is: http://<Phone Adapter-ip-addr>/resync?[[protocol://][server-name[:port]]/profile-pathname] If no parameter follows “/resync?”, the profile rule setting in provisioning is used. See 4.2 for detailed
information about profile rule in provisioning If no protocol is specified, TFTP protocol is assumed. Note: Only TFTP is supported in the current
release. If no server-name is specified, the host that requests the URL is used as server-name. If no port specified, default port of the protocol is used – 69 for TFTP, 80 for http, 443 for HTTPS. The profile-path is the path to the new profile to resync with. For example:
http://192.168.2.217/upgrade?tftp://192.168.2.251/PAP2.scf
3.4.3. Reboot URL
Through the Reboot URL, you can reboot the PHONE ADAPTER. Note: Upon request, the PHONE ADAPTER will reboot only when it is idle. The Reboot URL is
: http://<Phone Adapter-ip-addr>/admin/reboot
3.4.4. Factory Reset URL
Through the Reset URL, you can perform a factory reset of the PHONE ADAPTER. Note: Upon request, the PHONE ADAPTER will reset and then reboot only when it is idle. The Reset URL is
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
: http://<Phone Adapter-ip-addr>/admin/reset
28
3.5. Configuration via the IVR (PAP2 only)
Administrators and/or users can check (read) and set (write) basic network configuration settings via a touchtone telephone connected to one of the RJ-11 phone ports of the PAP2 model PHONE ADAPTER.
Please Note: Service Providers offering service using the PHONE ADAPTER may restrict, protect or turn off certain
aspects of the unit’s IVR and web configuration capabilities. The Interactive Voice Response (IVR) capabilities of the PHONE ADAPTER are designed to give the
administrator and/or user basic read/write capabilities such that the unit can attain basic IP network connectivity and the more advanced browser-based configuration menu may be accessed.
1. The PHONE ADAPTER IVR uses the following conventions: By factory default there is no password and no password authentication is prompted for all the IVR settings. If administrator password is set, password authentication will be prompted for certain IVR settings. See 3.4.2 for detailed information about administrator password.
To input the password using the phone keypad, the following translation convention applies:
o To input: A, B, C, a, b, c -- press ‘2 o To input: D, E, F, d, e, f -- press ‘3 o To input: G, H, I, g, h, i -- press ‘4 o To input: J, K, L, j, k, l -- press ‘5 o To input: M, N, O, m, n, o -- press ‘6 o To input: P, Q, R, S, p, q, r, s -- press ‘7 o To input: T, U, V, t, u, v -- press ‘8 o To input: W, X, Y, Z, w, x, y, z -- press ‘9 o To input all other characters in the administrator password, press ‘0
Note: This translation convention only applies to the password input. For example: to input password “test#@1234” by phone keypad, you need to press the following
sequence of digits: 8378001234.
2. After entering a value, press the # (pound) key to indicate end of input.
o To Save value, press ‘1 o To Review the value, press ‘2 o To Re-enter the value, press ‘3
o To Cancel the value entry and return to the main configuration menu, press ‘
*’ (star)
Notes:
o The final ‘#’ key won’t be counted into value. o Saved settings will take effect when the telephone is hung-up and if necessary, the PHONE
ADAPTER will automatically reboot.
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
29
3. After one minute of inactivity, the unit times out. The user will need to re-enter the configuration menu from the beginning by pressing * * * *.
4. If, while entering a value (like an IP address) and you decide to exit without entering any changes, you may do so by pressing the * (star) key twice within a half second window of time. Otherwise, the entry of the * (star) key will be treated as a dot (decimal point).
Example: To enter IP address, use numbers 0 – 9 on the telephone key pad and use the * (star) key to enter a decimal point.
To enter the following IP address value: 192.168.2.215 A. Use the touchtone key pad to enter: 192*168*2*215# B. When prompted, enter 1 to save setting to configuration. C. Hang-up the phone to cause setting to take effect.
- or ­D. Enter the value of the next setting category to modify . . .
5. Hang-up the phone to cause all settings to take effect.
PHONE ADAPTER Interactive Voice Response (IVR) Menu:
IVR Action IVR Menu Choice Parameter(s) Notes:
Enter IVR Menu
* * * *
None Ignore SIT or other tones
until you hear, “Linksys configuration menu. Please enter option followed by the pound key
or hang-up to exit.” Exit IVR Menu Check DHCP
3948 100
None None IVR will announce if DHCP
in enabled or disabled. Enable/Disable DHCP
Check IP Address
101
110
Enter 1 to enable Enter 0 to disable
Requires Password
None IVR will announce the
current IP address of
PHONE ADAPTER. Set Static IP Address
111
Enter IP address using numbers on the telephone key pad. Use the * (star) key when entering a decimal
DHCP must be “Disabled”
otherwise you will hear,
“Invalid Option,” if you try
to set this value.
Requires Password
point.
Check Network Mask
120
None IVR will announce the
current network mask of
© 2004 Linksys Proprietary (See Copyright Notice on Page 2)
30
Loading...
+ 87 hidden pages