Test Environments. Chapter 1 Overview. Chapter 2 Hardware Setup. Chapter 3 Software Installation and Configuration. Chapter 4 Reference. Appendix A Specifications. Asterisk is a complete PBX in software. Asterisk does voice over IP in four protocols, and can interoperate with almost all standard-based telephony equipment using relatively cost-effective hardware.
They support T1, E1, and J1 environments and is selectable on a per-card or per-port basis. Both line-side and trunk-side interfaces are supported. There are two pieces of rules you must obey:.
DEP is compatible with bit 5. It is not a definitive guide to resolving your issues, just a collection of regular issues that may arise.
These issues are not necessarily an issue with Elastix per se, but with the Linux distribution Centos 5 that they have selected and how it handles your particular hardware. This will occur with any distribution. If you have a problem with the installation, use the forums and mailing lists.
Most can tell you what your issue may be and possibly give you an answer. Note, this is not like normal burning data to a CD. I recommend this with no commercial interest in the software, just that it does its job and does it well. Reboot your machine and make sure you have the machine set to boot off CD.
This might be automatic, or you may have to watch your start up screens and press a function key to select a boot device, or you may have to change it in the BIOS, and also there are some that automatically boot off the CD, but ask you on the screen to press any key to boot from the CD, otherwise it boots off the Hard disk as normal.
Either way this is something you need to work out yourself, it is a function that varies from machine to machine. If you successfully boot off the disk you will see the following screen on the next page.
At this point you machine has correctly booted off the CD, and you can either wait and it will start the installation by itself, or you can press enter and it will commence immediately. The next screen may or may not come up on your installation, depending on whether you have a clean Hard Drive with no data or you have a Hard Drive with a partition already on it. In this case we are working with a new hard drive.
The black mark out in the diagram below may vary from system to system, so I have blanked it out to avoid confusion. In this screen it is telling us that it wants to initialise the drive and erase all data. Now the next screen needs a little bit of tender care. If you have multiple drives in your system, you need to make sure that it has chosen the correct drive.
The next screen allows us to configure the network card on your machine. If you know what you are doing then go ahead and enter your IP address and subnet for the Elastix system primary network card. Again you should know these. Here you just select Manually which is the default and type in a name for your server. It is not critical what the name is, just something unique to identify your server on the network.
In this screen we set the timezone. The next screen and what you place in here is critical This is ROOT password screen and what you enter here needs to be written down. The reason for this is that some more password screens come up as part of the install, and they forget which password is which. The result of losing this password results in a complete reinstall of the Elastix product, or a lot of technical reading and understanding of Linux to understand how to reset this password.
You will now witness a variety of screens pop up, which include the formatting screen, working out dependencies, transferring image, and finally you should see the Package Installation screen.
All these screens will occur without your input. As a guide, the Package Installation screen should be started within a few minutes of your last press of the OK button. However, this can vary especially on the formatting screen if you have a large hard drive. Enter a different password than what you used for the previous ROOT password. Enter it again It will then run off and perform some password scripts which complete and then come up with the next screen.
This next screen will now ask you to set the password for the rest of the products included with Elastix. It is important that they have a decent password from the start. Click the Upload link under the window title, browse to the ubf file, and click OK. That section includes the steps for verifying the installation. After the installation, the primary server automatically restarts and the web GUI will not be accessible for some time. Click Yes in the confirmation message pop-up window to proceed with the installation.
On successful installation, the status will change to Installed and the primary server will restart automatically. Step 5 After the secondary server has restarted, verify the installation on the secondary server. Run the ncs status command to ensure that all services are up and running. Enter the following URL in your browser:. Enable high availability. Use the Geo Maps feature to position your network devices on a world map and monitor them within their geographical context.
There are two ways to import map images:. These topics explain how to download and install Geo Maps for offline use. Note Geo Map compressed files are very large. We recommend you save the files to a remote repository. This procedure shows you how to download and copy the GeoMaps resources to the default local repository on the Cisco EPN Manager server.
Step 1 Download the Geo Maps compressed files to a client machine. Go to the Software Download site on Cisco. Identify the Geo Map you want to download and click Download. Follow the instructions to save the file to the client machine. From the Cisco EPN Manager server, retrieve each file from the client machine and copy it to the server.
The scp command uses the following syntax:. For example:. Please ensure you have a backup of the system before proceeding. Proceed with the application install? The installation takes a few minutes to complete depending on the size of the map resources. Step 5 Instruct your users to clear their browser caches.
Step 6 High availability deployments Repeat this procedure on the other server. Step 2 Check Enable Geo Maps. Note We sometimes update the documentation after original publication.
Therefore, you should also review the documentation on Cisco. The RSS feeds are a free service. All rights reserved. Skip to content Skip to search Skip to footer. Towards the bottom of the page, you can also specify a location to route the call if the call goes unanswered.
Change these settings to meet your needs and be sure to save the settings. An example is shown in figure 9 below.
Your devices should now all be able to communicate with each other on the LAN. In the next step, I will connect our trunking provider in this case VoIP Innovations for origination and termination though feel free to select any provider you like. Keep in mind, the settings will likely be vastly different for another provider.
Sometimes it is necessary to contact support for the trunk provider, in order to gather the credentials you need in order to connect to the outside world. Under the PBX tab, go to the Trunks page on the left. You can set a number for the Outbound Caller ID or leave it blank depending on how your extensions and outbound routes are configured. Do not worry about adding dial patterns here as this will be configured in the final step.
Finally, go to Outbound Routes, found on the left side of the PBX area and proceed to setup a new route. Give this route a name and define your caller ID, if required. Make sure to configure dial patterns as seen in figure Pick the SIP account you configured earlier under the trunk sequence area and hit save. In this setup, I only used one IP phone.
Each phone will be slightly different but the premise is the same. Essentially, most phones just need to know the IP of the PBX server and a few other network settings. Authentication is made by providing credentials for a configured extension, that includes the number extension and a password. This is one way to effectively utilize the Follow Me feature found in Elastix. By configuring additional devices such as mobile devices or tablets, you can easily reach others when they are out of the office and not tethered to a desk.
ZoiPer is incredibly simple to setup with most systems. You add an account under the Config menu, give it a name, plugin an extension and password and the device should register with your PBX as long as you are on the LAN. To connect when on another network or using mobile data, input the public address of your network into the Outbound proxy setting to always stay connected.
If you have issues, it is most likely a port forwarding issue inside your router. Casually, this means it provides the capability to process text-based data for instant messaging services and presence detection plus some other valuable features alongside the VoIP services accommodated by an Asterisk based PBX. The system is developed under the GNU license and has been adapted to fit a handful of systems built under the same model, for example Elastix.
The software is produced as an open source platform and is free to use as is all well, most supporting software. The community is quite large meaning that bugs are quickly rectified and documentation is readily available for most applications. The only problem lies in the fact that many tutorials that are written assume the implementer has experience with these systems; as such, we will go through the entire process by filling in the blanks that most others miss.
Sure, guides are available for installing the application but a presumption of technical experience with these systems is implied.
We are going to assume this is a complex casserole and your experience is limited to the microwave. You can do this one of two ways. One such way is to log into Elastix with the credentials you created during the installation, as documented in our Elastix guide.
Another way to accomplish this task is to use a terminal client like PuTTy Figure 13 to access the software directly. Elastix is accessible using Secure Shell SSH , a secure protocol for accessing a shell session meaning you can access the command line for the Elastix software. Type the IP address of the Elastix machine, as seen in Figure 13 above, when connected to the network where the machine resides and click the Open button. The command seen above following the ' ' allows you to login to MySQL with the username root.
0コメント