You are on page 1of 806

The privilege of HCNA/HCNP/HCIE:

With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy:
n
 1、e-Learning Courses: Logon http://learning.huawei.com/en and enter Huawei Training/e-Learning
/e

o m
If you have the HCNA/HCNP certificate:You can access Huawei Career Certification and Basic Technology e-Learning
courses.
e i .c
If you have the HCIE certificate: You can access all the e-Learning courses which marked for HCIE Certification Users.

aw

Methods to get the HCIE e-Learning privilege : Please associate HCIE certificate information with your Huawei account, and

hu

email the account to Learning@huawei.com to apply for HCIE e-Learning privilege.


g .
 2、 Training Material Download
i n

arn
Content: Huawei product training material and Huawei career certification training material.

//le
Method:Logon http://learning.huawei.com/en and enter Huawei Training/Classroom Training ,then you can download
training material in the specific training introduction page.
p :
 3、 Priority to participate in Huawei Online Open Class (LVC)
t t

s :h
The Huawei career certification training and product training covering all ICT technical domains like R&S, UC&C, Security,

4、Learning Tools: rc e
Storage and so on, which are conducted by Huawei professional instructors.

u

s o
eNSP :Simulate single Router&Switch device and large network.

R e
WLAN Planner :Network planning tools for WLAN AP products.

n g
In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with Huawei experts ,

ni
share exam experiences with others or be acquainted with Huawei Products.

a r
 Statement:
L e
r e
This material is for personal use only, and can not be used by any individual or organization for any commercial purposes.
o
M
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential 1
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 PBX: Private Branch Exchange
t t
:h
 Subscriber Card: Provides interfaces for connecting the internal phones.

e s
Trunk Card: Provides the interface to connect the telephone company or other PBX.

r c
Switched Network: It’s to connect an incoming call to an outgoing one.

ou
Signaling Processor: Used to receive and send signaling information.

es
Control System: It’s the heart of the PBX, all control actions needed to set up/tear down a
R
connection are executed by the system.

n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
When you speak into an analog phone, the sound signals are converted into electrical

:h
signal. The volume and pitch that you use when speaking result in different variations of

s
electrical current. Electrical voltage, frequency, current, and charge are all used in some
e
r c
combination to represent the properties of your voice.

ou
Analog phone lines use the properties of electricity to convey changes in voice over
s

Re
cabling. Of course, the process of sending the audio over phone lines is more complexity
than simply sending audio signals. Additionally, The analog phones you use at home must

n g
carry many different types of signaling, too. Signaling may include messages such as dial

ni
tone, dialed digits, busy signals, and so on. These signaling types are discussed later in this
r
a
chapter.
e

e L
For now, analog cabling connectivity operation is summarized as following:

or  Each analog circuit is composed of a pair of wires. One wire is the ground, or

M positive side of the connection (often called the tip). The other wire is the battery, or
negative side of the connection (often called the ring). You’ll commonly hear phone
technicians talk about these wires as the “tip and ring.” These two wires are what
power the analog phone and allow it to function.

 When the phone is lifted off hook, the phone connects the two wires, causing an
electrical signal (48V DC voltage) to flow from the phone company central office
(CO) into the phone. This is known as loop start signaling.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Analog signaling was a massive improvement compared to tin cans and string, but they

:h
have their problems. First, an analog electrical signal experience degradation (signal

s
fading) over long distances. To increase the distance that the analog signal could travel,
e
r c
the phone company had to install repeaters to regenerate the signal as it becomes weak.

ou
Unfortunately, as the analog signal was regenerated, the repeater device was unable to
s

Re
differentiate between the voice traveling over the wire and line noise. Each time the
repeater regenerates the voice, it also amplifies the line noise. Thus, the more times a

n g
phone company regenerated a signal, the more distorted and difficult to understand the

ni
signal became.
r

e a
The second difficulty encountered with analog connections was the sheer number of wires

e L
the phone company had to run to support a large geographical area or a business with a

or
large number of phones. Because each phone required two wires, the bundles of wire

M
became massive and difficult to maintain (imagine the hassle of a single pair of wires in the
bundle breaking). A solution to send multiple calls over a single wire was needed. A digital
connection is that solution.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Line signaling is responsible for off-hook, ringing signal, answer, ground start, on-hook

:h
unidirectional supervision messaging in each direction from calling party to called party
and vice versa.
e s
r c
Ground start signaling originated from its implementation in so called: pay phone systems.
u

o
Many years ago, when a person lifted the handset of a pay phone, he did not receive a
s
Re
dial tone until he dropped in a coin. The coin would brush past the tip and ring wires and
temporarily ground them. The grounding of the wires signaled the phone company to

n g
send a dial tone on the line.

r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Loop start signaling is the typical signaling type used in home environments. Loop start

:h
signaling is susceptible to a problem known as glare. Glare occurs when the subscriber

s
picks up the phone to make an outgoing call at the same time as another call comes in on
e
r c
the phone line before the phone has a chance dial.

ou
Many other types of signaling exist in the analog world. These include supervisory
s

Re
signaling (on hook, off hook, ringing), informational signaling (dial tone, busy, ring back,
and so on), and address signaling (dual-tone multi-frequency (DTMF) and Pulse).

n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Channel-associated signaling, also known as PTS(Per-Trunk Signaling ), is a form of digital

:h
communication signaling.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
R2 signaling is a CAS system developed in the 1960s that is still in use today in Europe,

:h
Latin America, Australia, and Asia.


e s
Line signaling is used for supervisory signals for call setup and teardown.

r c

ou
Line signaling have 3 types:

 R2-Digital
es
R2-Analog R
g

ni n
R2-Pulse


a r
Inter-register signaling is used for address, priority levels, congestion notification, or

L e
charges messaging.

e
or
 Inter-register signaling uses multifrequency tones in the timeslot used for the call so that it
is in-band signaling.
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
CCS(Common Channel Signaling),in the US also common-channel interoffice signaling

:h
(CCIS)

 PRA: Primary Rate Adapter


e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
A signaling point code (SPC) identifies the address information of a signaling point (SP) or

:h
a signaling transfer point (STP) in a Signaling System Number 7 (SS7) network.


e s
An SPC specifies the source and destination of an SS7 signaling message so that node in

r c
the signaling network can send, forward, or receive signaling messages correctly.

ou

es
There are three types signal nodes as followings:


R
Signaling Point (SP). A node that sends or receives signaling messages in a signaling
network.
n g

r ni
Service Switching Point (SSP). The telephone exchange that initially responds, when

e a a telephone caller dials a number, by sending a query to a central database called a

e L service control point (SCP) so that the call can be handled. SSP uses the SS7

or
protocols which are responsible for the call setup, management, and termination
with other service switching points.
M  Service Control Point (SCP): The standard component of the Intelligent Network (IN)
telephone system which is used to control the service. SCPs are connected with
either SSPs or STPs.

 Signaling Transfer Point (STP): A node that transfers messages received from a
signaling link to another. Element of an SS7-based Intelligent Network that performs
routing of the SS7 signaling.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
PRA(Primary Rate Access)Signaling: also called PRI(Primary Rate Interface) signaling or

:h
DSS1(Digital Subscriber Signaling System No.1) signaling, is an interface of ISDN(Integrated
Services Digital Network).
e s
r c
PRI corresponds to two primary rates: 1.544 Mbps (T1) and 2.048 Mbps (E1);
u


s o
PRI operate in a master-slave mode (or network-user mode). You must decide which
e
device will be the network side and the other device will be user side.
R

n g
B-channel: Bearer-channel

r ni
D-channel: Data-channel

e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The Primary Rate Access (PRA) protocol is one of the interface protocols defined by the

:h
Digital Subscriber Signaling No.1 (DSS1) signaling system. The DSS1 signaling system is a

s
group of interface protocols between ISDN users and networks. It consists of the physical
e
r c
layer, data link layer, and network layer, corresponding to the three bottom layers of the
OSI system.
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Message List
t t

s :h
SETUP: The message is sent by the calling party to the network and by the network

r c e
to the called party to establish the call.

ou
ALERTING: The message is sent by the called party to the network and by the

s
network to the caller to indicate that called alerting has been initiated.
e

R
CALL PROCEEDING: The message is sent by the called party to the network or by the

g
network to the calling party to indicate that requested call establishment has been
n
ni
initiated and no more call establishment information will be accepted.

a r
CONNECT: The message is sent by the called party) to the network and by the
e

e L network to the calling party to indicate call acceptance by the called party.

or  CONNECT ACKNOWLEDGE: The message is sent by the network to the called party

M to indicate the user has been awarded the call. It may also be sent by the calling
party to the network to allow symmetrical call control procedures.

 DISCONNECT: The message is sent by the user to request the network to clear an
end-to-end connection or is sent by the network to indicate that the end-to-end
connection is cleared.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Document fax machine can be divided into the following categories according to the

:h
different transmission speed and modulation mode:

e s
Double-sideband modulation technology, transmission speed for each page (16) is
c

r
about 6 minutes, known as the first machine;
u

s o
The bandwidth compression technology, transmission speed for per page is about 3
e
minutes, known as the second machine;
R

n g
Less source redundancy digital processing technology, transmission speed for per

ni
page is about 1 minute, referred to as the third machine;

a r
The fax machine that can combine with the computer, store information and near
e

e L real-time transmission speed, classified as fourth machine.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The most common example is a voice band modem that turns the digital data of a

:h
personal computer into modulated electrical signals in the voice frequency range of a

s
telephone channel. These signals can be transmitted over telephone lines and
e
r c
demodulated by another modem at the receiver side to recover the digital data.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. AB;
t t
2. ACD.
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
VoIP: Voice over Internet Protocol, A value-added service technology for IP calls. The VoIP

:h
service is a new IP telecom service. It can run on fixed and mobile networks and support

s
flexible access points. Fees for VoIP subscribers are relatively low. Calls between VoIP
e
r c
subscribers who belong to the same carrier are free of charge.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Toll-bypass: Long distance voice calls across the WAN instead of the PSTN enables you to

:h
reduce the overall telephony expenditure.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
An analog or analogue signal is any continuous signal for which the time varying feature

:h
(variable) of the signal is a representation of some other time varying quantity.


e s
A digital signal is a physical signal that is a representation of a sequence of discrete values

r c
(a quantified discrete-time signal).

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Sampling is the conversion of a continuous analogue signal to a discrete signal. A common

:h
example is the conversion of a sound wave (a continuous signal) into a sequence of

s
samples (a discrete-time signal).
e
r c
Quantization is the process of converting each analog sample value into a discrete value
u

o
that can be assigned a unique digital code word.
s

Re
Coding is the process by which information from a source is converted into symbols to be
communicated.

n g
ni
 Decoding is the reverse process, converting these code symbols back into information

a r
understandable by a receiver.

L e
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
The requirement of voice compression:
t

t
:h
 Code rate fits with the common voice channel transmission, generally the coding
rate is within 16-2 KB/s.

e s
Under a certain code rate, voice quality should be as high as possible.
c

ur
Decoding time delay is small, the total delay is generally not more than 65 ms.

s o
Decoding algorithm complexity cannot be too big to suitable for large scale


Re
integrated circuit implementation.
Better toughness and better anti-error rate performance.

n g
The advantages of speech coding

r ni
Improve the quality of calls (digital + channel coding error correction)

e

a Improve the spectrum utilization efficiency (low bit rate coding)

e L  Improve the system capacity (low bit rate, voice activation technology)

or
 Speech coding classification:
 Waveform coding
M  Transform the time domain analog voice waveform signal into digital voice
signals after sampling, quantization and coding.
 Parametric coding (source code)
 Based on the mechanism of human language pronunciation, find and code the
speech characteristic parameters
 Hybrid coding
 Hybrid coding combines the advantages of waveform coding and parametric
coding.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Common voice codec technology contain:
t t

s :h
PCM(Pulse Code Modulation):Pulse Code Modulation; the PSTN classic voice

r c e
encoding; is the standard measure of voice quality; 8K sampling bandwidth of 64K;

ou
ADPCM(Adaptive Differential Pulse Code Modulation):adaptive differential coding

s
methods; usually applied to the limited bandwidth; voice quality is very close to the
e
R
PCM, FAX can be supported under certain restrictions, a bandwidth of 32Kbps;

n g
CELP(Code Excited Linear Predictor)

ni

a r
LD-CELP(Low-Delay Code Excited Linear Predictor):low-delay Code Excited Linear

L e Predictive Coding approach; is often said that G728; voice quality and ADPCM is

e similar or even better; bandwidth of 16Kbps; does not support FAX and the modem;

or 625us one, you need 10-bit information (codebook index value);

M  CS-ACELP(Conjugate Structure Algebraic Code Excited Linear Predictor):Conjugate


structure generation digital linear predictive coding; is our most popular G729; close
of ADPCM voice quality; bandwidth of 8 Kbps, a 10ms per frame is 10 bytes;
 G.729
 Commonly used include the following criteria: G729, G729A, G729B;
 G729 is 8kbps a low-rate codec
 G729A is an appendix of G729, G729 complexity of the algorithm can be
simplified.

G729B is a supplement for the G729 silence detection technology.


n

 G729 the number of frames, each frame length is 10ms, TMG is the default
/e
support 20ms, 30ms, 160ms; TMG VSU modify the code, can support 10ms,
o m
i.c
each package contains a.
 G729 payload length, each frame is 10 bytes = 8kbps * 10ms / 8
w e

u a
Long when the recommended package, 20ms, bandwidth 34.4kbps (not using silence
detection technology).
g.h
 Commonly G729A 8kbps at 20ms package.
ni n
 The RTP payload type value is 18.
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Packet voice needs intensive operations (to complete a large amount of computational

:h
processing operations in a short period of time) and special treatment. The general

s
microprocessor is not competent for these operations.
e
r c
DSP is used in voice compression, voice activation detection, echo cancellation, delay
u

o
treatment and clock synchronization.
s

Re
Usually a DSP can support multiple voice channel. Number of voice channel depends on

g
many factors, one of the main factor is the DSP chip can handle how many MIPS (MIPS,

n
ni
millions of instructions per second). Another key factor is the memory in DSP. The more

r
memory, the higher operation efficiency, but the increasing of the on-chip memory can
a
L e
reduce MIPS values. Therefore, the balance between memory and the MIPS must be
considered. In general, the manufacturer will configure large memory to achieve support
e
or
from 1 to 8 port (interface).

M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
IP phones use the digitalized transmission technology in packets based on the IP

:h
technology. The basic principles are as follows:

e s
Compress and encode voice data according to the voice compression algorithm.
c

ur
Package the voice data based on a certain protocol such as the IP protocol.

s o
Send data packets to the recipient through the IP network.
e

R
Decode and decompress voice packets after collecting the voice packets to restore
g

ni n
the voice packets to the original voice signals.

a r
The feature of IP phone:

L e
 Rapid deployment, unified management.

e
or
 High-quality voice.

M 


Provides various business functions.

Simple and Intuitive Operation.

 A Full Range of Mobile office

 Meet the individual needs of staffs.


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
IP PBX integrates voice communication into enterprise data network through the VoIP

:h
technology, thereby be able to set up a unified voice and data network for connecting
offices all over the world.
e s
r c
IP PBX integrates the call control, media gateway, access control, resource allocation,
u

o
protocol processing, routing, authentication, billing function etc.
s

Re
It can be deployed on a hybrid network with IP phones, remote analog phones, and soft

g
phones, providing high-quality voice and value-added services for enterprises customers,

n
ni
such as government departments, electric power companies, and financial companies.

a r
L e
e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Traditional PBX (TDM PBX)
t t

s :h
TDM PBX was commonly used for cost saving internal calls before pure IP PBX and

r c e
hybrid IP PBX. Capacity is ranging from dozens of lines to thousands of lines to
access analog users by subscriber board. When more users, user accessing can take

ou
up a very large equipment room space.

es
TDM PBX only provides basic voice business functions, and can not provide video
R

g
and all kinds of business services based on IP, which is used in some enterprise that

n
ni
business requirements are not very high. Traditional PBX uses the special technique,

a r
lacks of openness and standard, expand business difficulty.

L e
IP PBX

e
or
 The call server, media gateway, signaling gateway, relay gateway, terminals and
others are independent, communication between them through TCP/IP, to provide
M users with VoIP business, pure IP PBX call server based on PC server platform (such
as IBM, DELL server), using the Windows or Linux operating system.

 Business functions mainly through IP phone, IAD and other access devices to provide
users with voice in LAN, the network is flexible, expandable, but the stability of the
pure IP PBX based on server architecture may not meet specified requirements, tend
to produce puzzling collapse problem, the solution to this problem is commonly to
use two pure IP PBX to work, and improve reliability.
 The advantages of IP PBX compared to TDM PBX

 IP PBX supports remote/centralized configuration management based on IP


network, convenient maintenance, timely grasp the system status and fault

 Doesn't need another phone lines, can remote access to the user without regional
restrictions

 Users can use the configured IP telephone or IAD through Ethernet interface in the
office
n
Can keep their existed phone numbers /e
m

o
i.c
 Convenient roaming - due to its characteristics of SIP protocol can transfer the
calling to anywhere in the world

w e
Reduces the cost of internal communication because of using the enterprise Intranet
a

or private network
u
 The SIP standard dispense with expensive dedicated telephone
g .h
ni n
Can enlarge shrinks scale - based on the expansion of software license
r

le a
: //
t t p
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 The impact factors from IP Network:
t t

s :h
Packet Loss: If you want to get high-quality voice, let packet loss less than 1 percent;

c e
Latency: ITU-T G.114 recommendation specifies that for good voice quality, no more
r
u
than 150 ms of one-way, end-to-end delay should occur.

o

es
Define:The time takes for speech to exit the speaker's mouth and reach the

R
listener's ear.

n g
ni
 Type

ar
 Propagation Delay: The delay used for electrons travel through

L e copper or fiber from calling party to called party.


 Handling Delay: Devices that forward the frame through the
e
or
network cause handling delay.
Jitter: Jitter is defined as a variation in the delay of received packets.
M

 The impact factors from codec:

 Analog to digital conversion

 Digital to analog conversion

 The voice compression algorithm voice quality reduction


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Mean opinion score (MOS) is a method of determining voice quality. Listeners hear a

:h
phrase read over a voice network which uses a special codec and rate the quality of the

s
audio on a scale of 1 to 5, where 1 is the worst and 5 is the best.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Silence Suppression
t t
s:h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In traditional telephony networks, a dedicated bandwidth for each voice stream provides

:h
voice with a guaranteed bandwidth across the network. Because bandwidth is guaranteed

s
in the time division multiplexing (TDM) environment, there is no variable delay (jitter).
e
r c
Configuring voice in a data network requires network services with low delay, minimal

u
jitter, and minimal packet loss. Bandwidth requirements must be properly calculated based
o
s
on the codec that is used and the number of concurrent connections. QoS must be
e
R
configured to minimize jitter and loss of voice packets. The PSTN provides 99.999 percent

g
availability, and to match this high availability of the PSTN, the IP network must be
n
ni
designed with redundancy and failover mechanisms.

a r
L e
Issue Solution

e Packet loss  Design the network to minimize congestion

or
 Prioritize voice packets
 Use codecs to minimize small amounts of packet loss
M Latency 

Increase bandwidth
Choose a different codec type
 Fragment data packets
 Prioritize voice packets
Jitter  Use jitter buffers

Bandwidth  Calculate bandwidth requirements, including voice


 payload, overhead, and data
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Flow classification is to classify the packets that enters the DiffServ domain, so that can be

:h
appropriately treated in the network. The main purpose of traffic flow classification is to

s
let other applications system that handles this message or device know the category of the
e
r c
message, and to implement some agreed processing based on this category .

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Traffic policing is the process of monitoring the network traffic for compliance with a

:h
traffic contract and taking steps to enforce that contract. Traffic sources which are aware

s
of a traffic contract may apply traffic shaping to ensure their output stays within the
e
r c
contract and is thus not discarded. Traffic exceeding a traffic contract may be discarded

u
immediately, marked as non-compliant, or left as-is, depending on administrative policy
o
s
and the characteristics of the excess traffic.
e

R
The token bucket is an algorithm used in packet switched computer networks and

n g
telecommunications networks to check that data transmissions conform to defined limits

ni
on bandwidth and burstiness (a measure of the unevenness or variations in the traffic
r
a
flow).
e

e L
The token bucket algorithm is based on an analogy of a fixed capacity bucket into which

or
tokens, normally representing a unit of bytes or a single packet of predetermined size, are

M
added at a fixed rate. When a packet is to be checked for conformance to the defined
limits, the bucket is inspected to see if it contains sufficient tokens at that time. If so, the
appropriate number of tokens, e.g. equivalent to the length of the packet in bytes, are
removed ("cashed in"), and the packet is passed, e.g., for transmission. If there are
insufficient tokens in the bucket the packet does not conform and the contents of the
bucket are not changed.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Traffic shaping (also known as "packet shaping") is a computer network traffic

:h
management technique which delays some or all datagram to bring them into compliance

s
with a desired traffic profile. Traffic shaping is a form of rate limiting.
e
r c
Traffic shaping is used to optimize or guarantee performance, improve latency, and/or
u

o
increase usable bandwidth for some kinds of packets by delaying other kinds.
s

Re
A conforming flow can thus contain traffic with an average rate up to the rate at which

g
tokens are added to the bucket, and have a burstiness determined by the depth of the

n
ni
bucket. This burstiness may be expressed in terms of either a jitter tolerance, i.e. how

r
much sooner a packet might conform (e.g. arrive or be transmitted) than would be
a
L e
expected from the limit on the average rate, or a burst tolerance or maximum burst size,
i.e. how much more than the average level of traffic might conform in some finite period.
e
or  The token bucket can be used in either traffic shaping or traffic policing. In traffic policing,

M nonconforming packets may be discarded (dropped) or may be reduced in priority (for


downstream traffic management functions to drop if there is congestion). In traffic
shaping, packets are delayed until they conform. Traffic policing and traffic shaping are
commonly used to protect the network against excess or excessively bursty traffic.

 Traffic shaping is commonly used in the network interfaces in hosts to prevent


transmissions being discarded by traffic management functions in the network.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
If a new packet comes when packets with a lower priority are being sent, the new packet

:h
will be sent immediately while packets with the lower priority stop to be sent. This enables

s
the packets related to the core services (such as VoIP) to be handled earlier. The packets
e
r c
related to ordinary services (such as email) are handled when the core services are all

u
handled and the network is idle. By doing so, key services are handled earlier and network
o
s
resources are also fully used.
e
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. A;
t t
2. D.
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
3. BD.
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 MGCP: Media Gateway Control Protocol
t t
 MEGACO: Media Gateway Control
s :h

c e
H.248 protocol was the result of collaboration of the MEGACO working group of the
r
u
Internet Engineering Task Force (IETF) and International Telecommunication Union

o
IETF. es
Telecommunication Study Group 16. We called it H.248 in ITU-T, and called it MEGACO in

R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
H.323 is a suite of protocols defined by the ITU for multimedia conferences over LANs.

:h
TheH.323 protocol was designed by the ITU-T and initially approved in February 1996. It

s
was developed as a protocol that provides IP networks with traditional telephony
e
r c
functionality. Today, H.323 is the most widely deployed standards-based voice and

u
videoconferencing standard for packet-switched networks.
o

es
H.323 is a standard for communication protocols from the International
R
Telecommunications Union Telecommunication Standardization Sector(ITU-T); Version 4 is

n g
the current version. H.323 was created to provide multimedia communication across a

ni
packet network. The protocol can handle video and data, in addition to audio. H.323
r
a
interoperates well with the public switched telephone network (PSTN) in translating
e
e L
between call setup and control signals used in an IP network and those used in a

or
switched-circuit network. H.323 is widely used in video conferencing deployments.

M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Notice: Gateway, Gatekeeper and MCU can be in a single device.

s :h
The terminals provide the real-time and bi-direction communication in the packet-switched

r c e
networks, and all the terminals compulsory support voice communication and optionally
support video and data applications.

ou

es
The terminals in H.323 System contains: Telephones, Video phones, Voicemail Systems,
“Soft phones”, (e.g., NetMeeting® ).
R

n g
The gateway is an option component in H.323 system, and it provides the translation

ni
function between different types of voice networks.

a r
Provide interoperability between different telecommunications systems
e

e L  Gateways are logically two endpoints, one in each telecom domain

or  Encoding, protocol, and call control mappings occur in the gateways between the

M two endpoints

 H.323 Proxy: a special “null” gateway, with two H.323 endpoints


 The gatekeeper is an optional component, and it provides pre-call and call-level control
services to H.323 endpoints. Gatekeepers are logically separated from the other network
elements in H.323 environments.

 The Gatekeeper, which is optional in an H.323 system, provides call control services to the
H.323 endpoints.

 Address translation

 Admission and access control of endpoints


n
Bandwidth management /e
m

MCU Typically consists of multi-point controller (MC) and multi-point processor (MP)
o
i.c

MC - handles control and signaling for conference support


e

endpoints in the conference


aw
MP - receives streams from endpoints, processes them, and returns them to the

u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The protocols specified by H.323 include the following:

s :h
H.225 call signaling: H.225 call signaling is used to establish a connection

r c e
between two H.323 endpoints. This connection is achieved by exchanging H.225
protocol messages on the call-signaling channel. The call-signaling channel is

ou
opened between two H.323 endpoints or between an endpoint and the gatekeeper.

es

R
H.225 Registration, Admission, and Status: Registration, Admission, and Status

g
(RAS) is the protocol between endpoints (terminals and gateways) and gatekeepers.
n
ni
The RAS is used to perform registration, admission control, bandwidth changes, and

a r
status and disengage procedures between endpoints and gatekeepers. A RAS

L e channel is used to exchange RAS messages. This signaling channel is opened

e
or
between an endpoint and a gatekeeper prior to the establishment of any other
channels.

M
 H.245 control signaling: H.245 control signaling is used to exchange end-to-end
control messages governing the operation of the H.323 endpoint. These control
messages carry information related to the following:
 Capabilities exchange

 Opening and closing of logical channels used to carry media streams

 Flow-control messages

General commands and indications


n
/e

 Audio codec: An audio codec encodes the audio signal from the microphone for

o m
i.c
transmission on the transmitting H.323 terminal and decodes the received audio
code that is sent to the speaker on the receiving H.323 terminal. Because audio is

w e
the minimum service provided by the H.323 standard, all H.323 terminals must have

u a
at least one audio codec support, as specified in the ITU-T G.711 recommendation

.h
(audio coding at 64 kb/s). Additional audio codec recommendations such as G.722
g
kb/s) may also be supported.
ni n
(64, 56, and 48 kb/s), G.723.1 (5.3 and 6.3 kb/s), G.728 (16 kb/s), and G.729 (8

ar

// le
Video codec: A video codec encodes video from the camera for transmission on the

:
transmitting H.323 terminal and decodes the received video code that is sent to the
p
t
video display on the receiving H.323 terminal. Because H.323 specifies support of
t
:h
video as optional, the support of video codec is optional as well. However, any

s
H.323 terminal providing video communications must support video encoding and
e
r c
decoding as specified in the ITU-T H.261 recommendation.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The flow shows that the call signaling between the two endpoints communicate directly.

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Many IP applications require an exchange of data between associated participants.

:h
Implementation of these applications is complicated by the practices of participants,

s
because end users may move between endpoint, may be addressable in multiple ways,
e
r c
sometimes concurrently, and may communicate over several different media. Many

u
protocols have been authored to carry various forms of real-time multimedia session data
o
s
such as voice, video, or text messages.
e

R
SIP is an application layer control protocol used to establish, modify and terminate

n g
multimedia sessions via pre-defined signaling message exchanges. It is independent of

ni
underlying transport protocols and the type of session that is being established. It enables
r
a
IP endpoints to discover one another and to agree on a characterization of a session that
e
e L
they would like to share.

or
 RFC 3261(that obsoletes RFC 2543) defines SIP version 2 as an application layer signaling

M
protocol that defines initiation, modification and termination of interactive, multimedia
communication sessions between users.

 The basic functions of SIP include location of an end point, signal of a desire to
communicate, negotiation of session parameters to establish the session, and teardown of
the session once established.
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The SIP is an application-layer control protocol

s :h
Used to create, modify and terminate sessions with one or more participants.

c e
SIP can also be used to invite participants to already existing sessions, such as
r
u
multicast conferences.

o

es
Media can be added to (and removed from ) an existing sessions.

R
Session Description Protocol (SDP) is an application layer control protocol for describing
g

ni n
multimedia sessions. SDP is a text-based protocol. During a SIP call, SDP is used to

r
negotiate the media type, coding scheme, and address for establishing a session.

e a
Real-Time Transport Protocol (RTP),RTP provides E2E services for real-time data such as
L

e
audio and video, and provides a means for checking transmission quality for two

or communicating parities.

M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 SIP message classification
t t
 Request message
s :h
 Response message
r c e

ou
Response messages are responses to request messages and indicate the success or failure

s
status of calls. Different response states are distinguished using status codes. A status code
e
R
consists of three digits. The first digit indicates the response type, and the other two digits

g
provide detailed description about the response.
n
ni
ar
Status Response
Description
Codes Message

L e Information Indicates that a request message has been received and is


e
1xx

or
response being processed.
Success Indicates that a request is received, processed, and
M 2xx
response
Redirection
successfully accepted.
Indicates that a further operation is required to complete a
3xx
response request.

Customer Indicates a request message contains a syntax error or the


4xx
error SIP server cannot process the request message.

Indicates the SIP server is faulty and cannot process


5xx Server error
messages correctly.

6xx Global fault Indicates the a request cannot be fulfilled on any SIP servers.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
MGCP is a master/slave protocol that allows a call control device such as MGC(Media

:h
Gateway Controller, also known as Call Agent) to take control of a specific port on a
MG(Media Gateway).
e s
r c
MGCP messages are carried over UDP(User Datagram Protocol). Because UDP does not
u

o
guarantee message delivery, messages are retransmitted, if needed.
s
Re
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
MGCP is short of description capability, and is limited to big MGW. For big MGW, H.248

:h
protocol is suggested.

e s
MGCP message transaction is born on UDP package over broadband IP network, while
c

r
H.248 could be born on UDP/TCP/SCTP.
u

s o
Compared with the MGCP and H.248 has the following advantages:


Re
Support more types of access technology and mobility of the terminal

n g
ni
 Support a large-scale network applications and protocols expand, stronger flexibility

a r
L e
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In a VoIP network, the actual voice data (conversations) are transported across the

:h
transmission media using Real-Time Transport Protocol (RTP).RTP defines a standardized

s
packet format for delivering audio and video over the Internet.
e
r c
RTP defines a standardized packet format for delivering audio and video over the Internet.
u

o
It was developed by the Audio/Video Transport Working Group of the IETF and first
s
e
published in 1996 as RFC 1889, which was made obsolete in 2003 by RFC 3550.
R

n g
Applications that use RTP are less sensitive to packet loss but are typically very sensitive to

ni
delays, so UDP is a better choice than TCP for such applications.


a r
RTP typically runs on top of UDP so that it can use the multiplexing and checksum services

L e
of that protocol. RTP does not have a standard TCP or UDP port on which it

ecommunicates. The only standard that it obeys is that UDP communications are done via

or an even port, and the next higher odd port is used for RTCP communications. Although

M there are no standards assigned, RTP is generally configured to use ports 16384 to 32767.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
RTP provides end-to-end network transport functions that are intended for applications

:h
transmitting real-time requirements, such as audio and video. Those functions include

s
payload type identification, sequence numbering, time stamping, and delivery monitoring.
e
r c
RTP is a critical component of VoIP because it enables the destination device to reorder
u

o
and retime the voice packets before they are played out to the user. An RTP header
s
Re
contains a time stamp and sequence number, which allows the receiving device to buffer
and to remove jitter and latency by synchronizing the packets to play back a continuous

n g
stream of sound. RTP uses sequence numbers to order the packets only. RTP does not

ni
request retransmission if a packet is lost.
r
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Datagram protocols, such as UDP, send the media stream as a series of small packets. This

:h
is simple and efficient; however, packets can be lost or corrupted in transit. Depending on

s
the protocol and the extent of the loss, the client may be able to recover the data with
e
r c
error correction techniques, may interpolate over the missing data, or may suffer a data

u
dropout. RTP and the RTCP were specifically designed to stream media over networks.
o
s
They are both built on top of UDP.
e

R
RTCP is a sister protocol of the RTP. It was first defined in RFC 1889, which was replaced

n g
by RFC 3550. RTP provides out-of-band control information for an RTP flow. It works

ni
along side RTP in the delivery and packaging of multimedia data, but it does not transport
r
a
any data itself. Although it is used periodically to transmit control packets to participants in
e
e L
a streaming multimedia session, the primary function of RTCP is to provide feedback on

or
the quality of service being provided by RTP.

M
 RTCP is used for QoS reporting. It gathers statistics on a media connection and information
such as bytes sent, packets sent, lost packets, jitter, feedback, and round-trip delay.
Applications use this information to increase the quality of service by perhaps limiting flow
or using a low-compression codec instead of a high-compression codec.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
DTMF signal in telephones has two purposes: one is used for DTMF to dial, to control the

:h
switch to connect the called user phone; Second is used to remote control the various

s
actions of telephones through DTMF signal, such as broadcasting messages, voice mail,
e
r c
etc., and can be done to remote control home appliances equipment by additional circuit

u
such as open or close functions. The former solves the DTMF signals sending and coding,
o
s
the latter solves the DTMF signals receiving and decoding.
e

R
The DTMF keypad is laid out in a 4×4 matrix, with each row representing a low

n g
frequency, and each column representing a high frequency.

r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The essential difference between in-band and out-of-band is whether the DTMF is

:h
transmitted in the media stream.


e s
Carrying DTMF signal in INFO of SIP signaling.

r c

ou
This method is to use the INFO of the SIP signaling to clearly define DTMF signal.

es
Main defects is the SIP control signaling and media transport (RTP) is separate, it is
easy to cause DTMF signal and the media package are not synchronized. Simple, for
R
g
example, in the Voice Mail applications, the users input a DTMF signal according to

n
ni
the prompt, then leave messages. Servers began to save the user's message after

a r
receiving the DTMF signal. The DTMF signal is transmitted by SIP signaling, and the

L e media stream is transmitted by RTP , the users may receive the RTP packets firstly,
however, the INFO messages of the DTMF signal delay, lead to Server without
e
or
saving the user's voice mail until you receive the INFO message.

M
 Transparent transmission

 Transparency is to transmit directly RTP packets of DTMF audio digital signal without
any processing in the IP network. It should transmit possibly together with the user
voice media stream. Program wants to know which package has DTMF signal and
which kind of the DTMF signal, must check media streaming data in each RTP
packet real-time, analyzing the frequency domain. Because of the influence of the
network packet loss, sometimes resulting in DTMF signal loss, and the mixed DTMF
tones in the voice packets prone to bias, making signal distortion.
n
/e
m
 RFC 2833

o
i.c
 RFC 2833 DTMF is to combine the DTMF signal into a packet according to the rules

w e
and format, are identified with special RTP packets, can be known that the package
is DTMF package in the RTP packet head domain, and know the content of DTMF

u a
signal that RFC2833 has defined. This approach has the advantage of tolerant of

.h
packet loss is high and recognition error rate is low. So the RFC2833 way widely is
g
used at present.

ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Transparent fax: Fax signals are transmitted transparently as G.711 packets. G.711 faxes

:h
feature low delay and simple implementation, but they occupy a high bandwidth (fixed at

s
64 kbit/s) and are easily affected by network conditions. Therefore, G.711 faxes are
e
r c
recommended on a good network condition and not recommended when network jitter

u
or packet loss frequently occur. G.711 faxes are applicable to high-speed and low-speed
o
faxes.
es

R
T.38 fax: T.30 fax signals are converted to T.38 packets for transmission on a packet

n g
switching network. T.38 faxes occupy a low bandwidth, provide high reliability with

ni
redundant frames and forward error checking (FEC), and are slightly affected by the
r
a
network condition. However, the implementation is complicated. T.38 faxes are applicable
e
e L
only to low-speed fax services due to delay generated by the packet switching network.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Transparent fax: Fax signals are transmitted transparently as G.711 packets. G.711 faxes

:h
feature low delay and simple implementation, but they occupy a high bandwidth (fixed at

s
64 kbit/s) and are easily affected by network conditions. Therefore, G.711 faxes are
e
r c
recommended on a good network condition and not recommended when network jitter

u
or packet loss frequently occur. G.711 faxes are applicable to high-speed and low-speed
o
faxes.
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
T.38 fax: T.30 fax signals are converted to T.38 packets for transmission on a packet

:h
switching network. T.38 faxes occupy a low bandwidth, provide high reliability with

s
redundant frames and forward error checking (FEC), and are slightly affected by the
e
r c
network condition. However, the implementation is complicated. T.38 faxes are applicable

u
only to low-speed fax services due to delay generated by the packet switching network.
o
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. D;
t t
2. AC.
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 IPT: IP Telephon;
t t
:h
 The IP Telephony (IPT) system provides efficient, reliable voice communications services and also a

s
variety of advanced, quality, and convenient supplementary voice services for private network users.
e
c
The IPT system employs multiple new technologies to continuously reduce enterprises' operation
r
u
costs and increase their operation profits.

s o
The IPT system has the following highlights:

Re
Employs state-of-the-art communications technologies to maintain its leading position in the

g
private network communications field.

n
ni
 Aligned with actual services to ensure a highly available communications system.

a r
Ensures high reliability (carrier-class) and stability.
e

e

L Adapts to rapid service changes, as it features high scalability, flexible setting modifications,

or
convenient operation and maintenance, and rapid system deployment.
Fully uses existing system resources and the telephone network, saving long-term operation
M

costs.
 Standard and open. It can directly or indirectly connect to carrier networks, third-party PBXs,
billing systems, recording systems, and directory systems.
 Provides a unified GUI-based management tool for convenient, comprehensive system
management.
 With more than two decades of accumulated experience in the IP communications field and deep
understanding of customer requirements, Huawei transplants its telecom products and advanced
design concepts to the voice communication architecture and launches a brand new IP-based voice
communications solution, which provides a reliable, efficient, and future-proof communications
platform.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
eSpace IPT solution uses a hierarchical system architecture that features high convergence,

:h
security, and openness.

 Terminal
e s
r c

ou
Delivers consistent user experience from anywhere, at any time, on multiple devices

es
including IP phones, analog phones, fax machines, smart phones, and tablets. IP
phones provide diverse easy-to-use functions and high-quality voice call services,
R
g
including speed dial, call transfer, automatic callback, multi-party call, corporate

n
ni
directory, and voicemail.


a r
An analog phone is a traditional desktop phone that converts vibrations into

L e electrical frequency signals for transmission. It can connect to the system through a

e subscriber board on eSpace U1911/U1960/U1981 or through an eSpace IAD.

or  An eSpace IAD is a voice over IP (VoIP) and fax over IP (FoIP) media access gateway.
M It connects analog phones or fax machines to an IP network for providing efficient
and quality voice or fax services.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 IP PBX
t t

s :h
A unified gateway is deployed at the call management layer to achieve these

r c e
functions. The call management layer provides user registration, call routing, call
control, and media control functions.

ou

es
eSpace U1911/U1960/U1980/U1981 uses a highly-integrated SIP softswitch as its
core and supports both narrowband and broadband services.
R
 Application
n g

r ni
The service application layer provides a variety of services, including the Console,

e aUnified Message Service, Voice Mailbox, Voice Conference, Call Detail Record (CDR),

e L Network management and Recording services.

or  The eSight system is a new-generation comprehensive operation and maintenance

M solution developed by Huawei for the network infrastructure, unified


communications, telepresence conferencing, video surveillance, and data center in
enterprises. eSight supports unified monitoring and configuration management over
devices of various types and from various vendors, monitors and analyzes network
and service quality, and delivers unified management over and association analysis
among enterprise resources, services, and users. Meanwhile, eSight offers a flexible
and open platform for enterprises to customize software development and build an
intelligent management system tailored to individual needs.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The eSpace U1900 series unified gateways are switches used in Huawei unified

:h
communications solutions. The eSpace U1900 series unified gateways provide professional

s
voice over IP (VoIP) servies that meet communication requirements of various enterprises.
e
r c
The unified gateway uses a highly-integrated SIP softswitch as the core and supports both
u

o
narrowband and broadband services, helping effectively improve communication efficiency
s
e
and reducing operating expense (OPEX).
R

n g
The unified gateway can connect to analog phones and IP phones at the same time:

ni
Connect to local analog phones directly. (U1980 cannot directly connect to local

a r
analog phones.)

L e
 Use IP bearer networks to connect to analog phones through eSpace IADs.

e
or
 Use IP bearer networks to connect to IP phones.

M  The unified gateway can connect to PSTN networks or dedicated network voice switches
through digital, analog, and broadband SIP trunks.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Huawei eSpace Integrated Access Device (IAD) is used in Huawei IP telephony and Unified

:h
Communications (UC) solution to connect traditional analog users to IP telephony
networks.
e s
r c
By reusing legacy analog endpoints, eSpace IAD helps reduce initial investments in building
u

o
IP telephony networks. eSpace IAD also reduces analog lines' routing and maintenance
s
Re
costs and enterprises' Total Cost of Ownership (TCO) by fully leveraging the transmission
resources of IP networks.

n g
ni
 The full series of eSpace IAD products support 2 to 224 analog user channels to fit the

r
access scenarios of different user capacities.
a
L e
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Video IP Phone:
t t

s :h
eSpace 8950 is a smart, sleek video phone that integrates voice, video, and Unified

r c e
Communications (UC) applications. It delivers more engaging communication and
collaboration, with unmatched security, High Definition (HD) audio and video,

ou
simplicity, and smooth operation.

Audio IP Phone: es
R

n g
eSpace 7900 series IP phones are new-generation IP phones with superb

ni
performance. The innovative design delivers an intuitive, easy-to-use experience,

a r
enabling users to benefit from highly efficient communications

Le eSpace 6805 is a cost-effective starter-edition IP phone that provides rich functions
e
or
and is easy to use.

M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
le
/ /
:
The One Number Link You (ONLY) serviceprefers to a service in which a user's

t tand supplementary services.


multiple terminals share the same number
h
The shared number is the number: of an intra-office terminal, and is called the

e s is the primary terminal and can be specified


cdial the ONLY number of the user, the terminals of
ONLY number. The intra-office terminal
r
uthe preset rules, and the user can select one terminal to
by the user. When other users
o
answer the phone. es
the user ring according to

R

i
that are bound
g
A maximum of eight terminals can be configured (including the primary terminal)
n to the ONLY number.
r n

e aIt is easy to remember one number and use this number to contact a
Advantages:

L

e person.
or
M
 You can answer important calls anytime and anywhere, which improves
the working efficiency.
 You can give only the office number but keep your mobile phone
number and home telephone number private.
 Enterprises can protect customer resources from being lost due to
employee transfer.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Flexible modes can be used to convene a conference, such as system convening (the

:h
system automatically convenes participants at a specified time), chairman convening, and
active access.
e s
r c
Web-based conference management is supported. Operations such as conference
u

o
reservation, announcement, participant attribute modification, and conference delay
s
e
setting can be performed on Web pages.
R

n g
It is recommended to use the conference call service according to the following

ni
specification:

a r
A maximum of 960 conferences with a maximum of 60 parties in each conference

L e for the U1980. The total number of all parties in all conferences does not exceed

e 960.

or A maximum of 360 conferences with a maximum of 60 parties in each conference


M

for the U1960. The total number of all parties in all conferences does not exceed
360.

 A maximum of 12 conferences with a maximum of 12 parties in each conference for


the U1930. The total number of all parties in all conferences does not exceed 12.

 A maximum of 20 conferences with a maximum of 60 parties in each conference for


the U1911. The total number of all parties in all conferences does not exceed 60.

 A maximum of 6 conferences with a maximum of 6 parties in each conference for


the U1910. The total number of all parties in all conferences does not exceed 6.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Manager A has two secretaries: secretary B and secretary C who share two lines. The value

:h
of Shared line mode is set to Single. The two shared lines allow two calls at a time.

s
When there is an incoming to manager A's number, secretaries B and C's phones ring at
e
r c
the same time. The indicator of the shared line on manager A's phone blinks. One of the

u
secretaries answers the call and forwards the call to manager A. While manager A is
o
s
answering the call, another call is routed to manager A's number. Secretaries B and C's
e
R
phones ring at the same time. One secretary answers the new incoming call.

n g
r ni
e a
e L
or
M
 Shared line

 When a user makes an incoming call, the shared line indicators on both the manager
and secretary's phones blink. The manager can answer the call directly. Alternatively,
the secretary can answer the call first, and call the manager through the private line
to ask the manager whether to answer the call. The incoming call to the shared line
is held, and the user hears the waiting tone.

The manager and secretary's phones display the same incoming call information and
n

/e
shared line status such as ringing, talking, and idle. If the manager is using the

m
shared line for making a call, the shared line is displayed as occupied on the
secretary's phone. On the contrary, if the secretary is using the shared line for
o
making a call, the shared line is displayed as occupied on the manager's phone.
e i.c
 Private line
aw
u
.h
 The incoming call can be switched between the manager and secretary for any

g
times. During the call with the user, the manager can press the private line key to
n
ni
call the secretary and transfer the call to the secretary. The incoming call to the

r
shared line is held, and the user hears the waiting tone. When the secretary presses
a
le
the shared line key, the call is connected to the secretary, the manager hangs up,

//
and the user talks with the secretary.
p :

t t
The manager private line and secretary private line can be configured as a speed dial

:h
number of each other. In this way, the manager and secretary can call each other

e s
without dialing any numbers.

r c
u
 Each shared line supports only one call. A manager can have a maximum of six

s o
shared lines, while a secretary can also have a maximum of six shared lines.

Re
Each shared line requires two device IDs. One is the manager device ID, which is

g
configured for a line key on the manager's phone. The other is the secretary device
n
ni
ID, which is configured for a line key on the secretary's phone. Six shared lines

a r
require twelve device IDs in total. All shared line device IDs of the manager

L e correspond to the same SIP number.

e
or
 Multiple shared lines can be implemented on multiple terminals. The number of
terminals subjects to the phone model (for example, the eSpace 7910 IP phone
M supports a maximum of three registered accounts, and the eSpace 7950 IP phone
supports a maximum of six registered accounts). When the multiple shared lines of
the manager are configured on multiple IP phones, the simultaneous ringing service
can be used to implement private line calls. When a secretary calls the private line of
the manager, multiple IP phones of the manager ring simultaneously. The manager
can pick up any IP phone to answer the call, and other IP phones stop ringing.
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
The U1911, U1960, and U1981 unified gateways provide built-in Voice Mailbox Services

:h
(VMS) to implement recording, storage, and retrieval of voice messages for voice users.

s
When users have unread messages, the system notifies the users of the unread message
e
r c
for them to read the messages in time.

ou
Voice messages are stored in the SD card of the MTU board. They can be backed up to the
s

Re
NFS server (prepared by the customers themselves), and the backup voice messages can be
restored from the NFS server.

n g
ni
 By default, voice messages are not encrypted, and they can be obtained by message

r
backup or directly reading the SD card. The voice messages can be encrypted as required.
a
e
Others cannot play the encrypted voice messages even if they have obtained them.
L
eThe voice mailbox feature requires the corresponding license, and the number of

or

concurrent messages is limited by the license.

M  The specifications of the built-in voice mailbox for each eSpace U1900 model:
Model Maximum Number of Voice Mailbox Users Maximum Number of Concurrent Messages
U1911 100 12
U1960 1000 30
U1981 1200 30
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
A contact center agent can log in to the SoftConsole using an account assigned by the

:h
ConsoleServer. After the account is authenticated by the ConsoleServer, the agent can use
agent functions.
e s
r c
When a user dials the access code of a SoftConsole group, the unified gateway routes the
u

o
call to an idle agent in the group, who will then answer the call. Incoming calls are queued
s
Re
if all agents in the group are busy. When one or more agents become available, the system
routes queued calls to agents following the "first-come, first-served" policy.

n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The recording system uses the latest digital electronics technologies and enables users to

:h
record and query multiple channels of telephony conversation. The recording system is

s
widely used in governments, financial organizations, energy companies, hospitals,
e
c
educational institutions, and other sectors, which helps supervise service quality and
resolve disputes.
ur
s o
The recording system can monitor the recording status and record conversational
e

R
information, including the phone number, call time, and conversational content, in real
time.

n g
ni
 The recording system consists of a recording module, a recording query and playback

a r
module, a status monitoring module, a storage management module, and a user rights

e
management template.
L
eTwo modes of site recording are supported: automatic recording and on-demand

or

recording.

M  automatic recording:The start and end of automatic recording are signaling-


controlled. That is, the recording system automatically starts recording when a
conversation is started between the specified users, and stops recording when the
conversation ends.
 On-demand recording is controlled by users using a special recording button on
phones or a softkey. Recording can be manually stopped by pressing the recording
button or automatically stops when the conversation ends. On-demand recording
takes effect on a per call basis. Users need to press the recording button each time
they want to record a call.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
In an enterprise, employees in the same field can be added to a hunt group, with the

:h
group access code configured. When a user dials the group access code, the phones of

s
the sign-in group members ring simultaneously, cyclically, or sequentially according to the
e
r c
configured routing policy. The hunt group service enables employees in the same field to

u
work together for more efficient request processing.
o

es
A user can be added to multiple hunt groups to handle different service requirements.
R

n g
When a call is connected to a hunt group through the hunt group access code, personal

ni
services (such as call forwarding and DND) for the hunt group members, if enabled, will be

r
unavailable.
a
L e
e
or
M
 Application Scenario

 In an enterprise, employees in a department (for example, IT support department)


have been added to a hunt group with a unified access code, and simultaneous
ringing has been configured for the hunt group. During the office hours, all group
members sign in to the hunt group. When a user dials the access code of this hunt
group, the phones of all employees in this hunt group ring at the same time. After
an employee answers the call, the phones of the other employees stop ringing.

n
/e
 If sequential ringing is configured, the phone of the desired employee (whose phone

m
is expected to ring first according to the configured routing policy) rings first. If the
desired employee cannot answer the call, the call is diverted to the next expected
o
number.
e i.c

aw
When no employee in the hunt group answers the call, the call is forwarded to the

u
forward-to number configured for the hunt group access code. For example, the

.h
hunt group has configured call transfer to the voice mailbox upon ringing timeout.
g
n
During the break, if a user dials the hunt group access code, no one answers the

ni
r
call. When ringing times out, the system asks the user to leave a message. After the

a
user leaves a message, the MWIs on the phones of all members in the hunt group
le
//
are lit up. When the group members go back to work and find that the MWI is on, a
:
t t p
member presses the corresponding button on the phone, enters the password, and
listens to the message. Then, the MWIs on the other phones are turned off.


s :h
Sign-in, sign-out, and presence.When a user dials the access code of a hunt group, the

c e
system allocates the call to group members who have signed in to the hunt group.
r

ou
Dynamic sign-in and sign-out.Hunt group members need to dial Dynamic sign-

es
in/sign-out prefix + Hunt group access code + # to sign in to or sign out of a hunt
group.
R
n g
ni
 Static sign-in. Members of a hunt group sign in automatically and cannot sign out.

a r
One-button sign-in, sign-out, and presence. Hunt group members can configure the

L e sign-in and sign-out programmable button on IP phones. Users can press the button

e to quickly sign in and out. The indicator of the programmable button is on after

or sign-in and off after sign-out.

M  Requiring a verification password for sign-in and sign-out. Users can configure a
verification password for sign-in and sign-out. A verification password contains 6
digits.
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
A paging group supports only one channel broadcast at the same time. If an initiator is

:h
broadcasting, the other initiator cannot initiate broadcast.


e s
The audio paging service has a higher priority than all services excluding DND. Users can

r c
also configure the priority between audio paging and DND.

ou

es
If the emergency call service is configured, users can associate an emergency call prefix
with a paging group. When an intra-office user (the user may not be in the paging
R
g
group) dials the emergency call prefix, the communication between the calling party and

n
ni
the called party will be broadcast on the phones of members in the associated paging
group.
a r

L e
Audio paging service is one to many unidirectional voice broadcast service.

e
or
 By default, all members in a paging group can be the initiator of voice broadcast; External
users cannot initiate a voice broadcast.
M  The service process is as follows:

 An initiator dials the access code of a paging group, and speaks after hearing a
beep.
 The voice broadcast players of all external paging parties in the paging group play
the voice broadcast, and the IP phones of all unicast and multicast parties respond
as follows:

 If a recipient is idle or has not started a call after picking up the phone, the
speaker is automatically started and plays the voice broadcast after a beep.

 If a recipient is in a call, the voice broadcast is played as a whisper in audio


n
mixing mode.
/e

o
If a recipient has enabled the DND service, the system determines whether to m
play the voice broadcast to the recipient based on the service priority
configured for the paging group. e i.c
aw
u
 The initiator stops speaking and hangs up. The voice broadcast is stopped for all
recipients.

g .h
ni n
ar
Model Maximum Maximum Number of Members in a Paging Group

// le Maximum

:
Number Number of
of Paging
Groups
t t p External Paging
Parties Globally

:h
eSpace 2 •Unicast party + External paging party + Associated 1
U1910/
s
emergency call prefix: 2 (where the maximum number of
e
U1930
c
external paging parties is 1)
r
u
•Multicast party: all SIP users
eSpace 16
s o
•Unicast party + External paging party + Associated 8
U1911
e
emergency call prefix: 30 (where the maximum number of
R
external paging parties is 8)
g
•Multicast party: all SIP users
n
ni
eSpace 32 •Unicast party + External paging party + Associated 8
U1960
a r emergency call prefix: 30 (where the maximum number of

L e external paging parties is 8)


•Multicast party: all SIP users

e
or
eSpace 64 Unicast party + Associated emergency call prefix: 30 0
U1980 NOTE: The eSpace U1980 does not support multicast parties

M eSpace 64
or external paging parties.
•Unicast party + External paging party + Associated 8
U1981 emergency call prefix: 30 (where the maximum number of
external paging parties is 8)
•Multicast party: all SIP users
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
A single-node network is suitable for an enterprise with no more than 20,000 users that

:h
does not have branches or has branches that do not require local regeneration. In such a

s
network, the unified gateway and a variety of service servers are all deployed at the
e
r c
enterprise's equipment room, and all terminal users register with the unified gateway. If

u
the enterprise has small-sized branches, eSpace IADs can be deployed at branches and
o
s
function as proxies for user registration to the unified gateway, or IP phones can be
e
R
deployed at branches and register with the unified gateway.

n g
Networking Description

ni

a r
Analog phones and fax machines connect to the unified gateway through analog

L e phone cables. IP phones and SoftPhone connect to the unified gateway through IP
network.
e
or  The unified gateway connects to the PSTN through the trunk.

M  The unified gateway provides voice mailbox and voice conference services for
enterprise users.

 By default, the unified gateway functions as an IP PBX and can provide basic and
supplementary voice services for enterprise users. The unified gateway can also
function as an access gateway and register with the IMS network through a SIP
trunk, allowing enterprise users to use services provided by the IMS network.

 Only the U1911/U1960/U1981 supports the built-in voice mailbox function.


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
A centralized call management network can be used for an enterprise with no more than

:h
20,000 users that has branches that require local regeneration. In such a network, the

s
unified gateway functioning as the central node and a variety of service servers are all
e
r c
deployed at an enterprise's equipment room, and all terminal users register with the

u
central node in normal conditions. Unified gateways functioning as branch nodes are
o
s
deployed at the branches for local outgoing calls and local regeneration.
e

R
Networking Description

n g
ni
 The unified gateway in the HQ is called the central node, which can be

a r
U1911/U1960/U1980/U1981. The central node can be deployed in active/standby

L e mode, one being the active node and the other being the standby node.

e The unified gateway gateway in a branch is called a local node, which can be

or

U1911/U1960/U1980/U1981.

M  The central node and local nodes connect to the PSTN through digital or analog
trunks.

 The central and local nodes are connected through SIP trunks and use the heartbeat
mechanism to monitor the running status of the peer devices.

 When the central node and local nodes are connected properly:

 Users and services are configured and controlled in a unified manner on the
central node.

 IP phones on local nodes are directly registered with the central node.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Analog phones on local nodes are registered with the central node through

:h
local node proxies.

e s
Local nodes synchronize SIP user data from the central node in real time.
c

ur
When the central node is faulty or disconnected from local nodes:

s o
The basic call function remains available for analog users on local nodes.
e

R
When detecting that the central node is faulty or disconnected, IP phones on
g

ni n
a local node automatically set the local node as the SIP server. The basic call

r
function remains available for SIP users on the local node.

e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
When reconstructing or expanding the traditional PBX-based network, you can use the

:h
U1900 to interconnect with the existing PBX to implement the smooth expansion and

s
provide new services. This scheme is the interconnection networking of the U1900 and
e
traditional PBX.
r c
ou
The scheme keeps the traditional PBX device and existing PBX subscribers. The networking
s

e
mode is that the traditional PBX device connects to the U1900.
R

n g
Functioning as the IP phone gateway, the U1900 converts and bridges data for voice

ni
services on the traditional PBX, and controls call connections through signaling.


a r
The trunk resources of the PSTN are reserved for the traditional PBX. These resources

L e
function as an alternative option of original PBX subscribers.

e
or
 For the phone subscribers and terminals on the IP network, the U1900 functions as the
softswitch center, trunk gateway, and signaling gateway. It controls connections, supports
M new services, manages user data, and manages charging for VoIP subscribers.

 Through interconnections between multiple U1900s, a wide area VoIP network can be
created among business subscribers. In addition, multiple services and functions can be
created, such as, the group service, multi-party conference, call center, and instant
communication in wide area.

 The subscribers of the traditional PBX can be transferred to the U1900 network in future.
The engineers can implement the transfer only by adding subscriber boxes or IADs and
transferring the traditional PBX trunk resources to the U1900.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
U1900 uses a highly-integrated SIP softswitch as its core and supports both narrowband

:h
and broadband services. Terminals are connected to U1900 in different ways:

e s
Local analog phones: directly connected
c

ur
Analog phones: connected through the IAD over the IP network

s o
IP phones and console client: connected over the IP network
e

R
As a core component of the solution, the unified gateway provides the following
g

functions:

ni n

a r
P2P audio and video calling, conference calling, and diverse supplementary

L e telephony services.

e
or
 Active/standby redundancy, remote disaster recovery, and local regeneration
(active/standby redundancy and remote disaster recovery are alternative).

M  Connection to the PSTN or PBXs in a private network through digital, analog, or SIP
trunks.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
U1900 uses a highly-integrated SIP softswitch as the core and supports both narrowband

:h
and broadband services, helping effectively improve communication efficiency and

s
reducing operating expense (OPEX).
e
r c
U1900 can connect to analog phones and IP phones at the same time: Connect to
u

o
local analog phones directly. (U1980 cannot directly connect to local analog phones)
s

Re
Use IP bearer networks to connect to analog phones through IAD.

n g
Use IP bearer networks to connect to IP phones.

r ni
U1900 can connect to PSTN networks or dedicated network voice switches through

a
digital, analog, and broadband SIP trunks.
e
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Slots are located on the front panel of the shelf. The U1911 provides one main control

:h
board slot, three interface board slots, one power supply sockets, and one fan tray
assembly slot.
e s
r c
Slots 0 to 2 are service board slots, which are used to install the MTU, ASI, OSU or
u

BTU boards.
s o

Re
Slot 3 is the main control board slot, which is used to install the SCU board.

n g
The number of U1911 interface boards is determined by the system capacity. Filler panels

ni
must be inserted into blank slots.

a r
To ensure that basic services are functioning properly, at least one SCU board and one
e

e L
MTU board must be configured for the U1911.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Slots are located on the front panel of the shelf. The U1960 provides one main control

:h
board slot, seven interface board slots, two power supply sockets, and one fan tray
assembly slot.
e s
r c
Slots 0 to 6 are service board slots, which are used to install the MTU, ASI, OSU or
u

BTU boards.
s o

Re
Slot 7 is the main control board slot, which is used to install the SCU board.

n g
The number of U1960 interface boards is determined by the system capacity. Filler panels

ni
must be inserted into blank slots.

a r
To ensure that basic services are functioning properly, at least one SCU board and one
e

e L
MTU board must be configured for the U1960.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Slots are located on the front panel of the shelf. The U1981 provides two main control

:h
board slot, six interface board slots, two power supply sockets, and one fan tray assembly
slot.
e s
r c
Slots 0 to 2 and 4 to 6 are service board slots, which are used to install the MTU,
u

o
ASI, OSU or BTU boards.
s

Re
Slot 3 and 7 are the main control board slot, which is used to install the SCU board.

n g
When only one SCU board is installed, the system runs in single-node control mode. When

ni
two SCU boards are installed, the system runs in active/standby control mode and has a

a r
higher reliability.


L e
The number of U1981 interface boards is determined by the system capacity. Filler panels
e
or
must be inserted into blank slots.

M  To ensure that basic services are functioning properly, at least one SCU board and one
MTU board must be configured for the U1981.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 SCU: Service Control Unit.
t t

s :h
SCU is the control board (a mandatory board) of the U1911/U1960/U1981. The SD card

r c e
delivered with an SCUB board contains the default announcements in 11 languages. On
the U1911/U1960/U1981 with an SCUB board, you can directly switch the announcement

ou
language. The system extracts the voice package for the target language from the SD

es
card, overwrites the original voice package in the version software, and synchronizes the
R
voice package to all MTU boards.

n g
ni
 The SCU board provides the following functions:

a r
Provides the softswitch functions.

L e
 Processes media control protocols.
e
or  Supports L2 switching and TDM switching.

M
 Panel Components
Panel Identifier Description
Component
Ports 100/100 Service network port that connects the device to a LAN and
0BASE- functions as an IP service port.
TX
CONSOL Debugging serial port for configuring and commissioning the
E device.
USB Reserved for the service to extend interfaces when required
n
(not used currently).
/e
AUDIO 3.5 mm audio input port for connecting external audio sources.
o m
i.c
It is used for playing music on hold (MoH).
Indicators PWR Power indicator (green), which indicates the power status.
RUN
w e
Running indicator (green), which indicates the running status of
the board.
u a
ALM
.h
Alarm indicator (red), which indicates the alarm status of the
board.
g
Button RST Press to restart the board.
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
To make data and transmission more secure and reliable, you are advised to use the dual-

:h
network-port or triple-network-port mode.


e s
In dual-network-port mode triple-network port mode:

r c

ou
Network port 0 must be used for accessing the web management system, LMT

s
command tree, and CLI.
e

R
Network port 0, 1 or 2 can be used for accessing the web self-service system.

n g
ni
 Only one network port can be used to connect to the Bill Server.

a r
L e
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The MTU board provides four E1/T1 ports, each of which supports two trunks.

s :h
The MTU board is in common used on the U1911/1960/U1981.

c e
Each U1911/U1960/U1981 must be equipped with at least one MTU board.
r
Panel
Identifier
ou Description
s
Component
Ports E1/T1
Re Digital trunk port for connecting to the upper-level office (for
example, LE) through digital trunks. An E1/T1 port supports a

n g DB9 connector.

ni
The MTU board provides two E1/T1 ports, each of which

a r supports two trunks.

L e
Indicators
CONSOLE This serial port is disabled.
PWR Power indicator (green), which indicates the power status.
e
or
RUN Running indicator (green), which indicates the running status
of the board.

M ALM Alarm indicator (red), which indicates the alarm status of the
board.
LOS Signal loss indicator (yellow), which indicates whether signals
are lost.
RFA Remote alarm indicator (yellow), which indicates whether
peer devices are faulty.
Button RST Press to restart the board.
SD card slot None SD card slot for housing an 16 GB SD card. The SD card is
used to store recording files of the built-in voice mailbox.
Jumper None A jumper fitting used during E1/T1 switching. When the T1
trunk is used, remove the jumper.
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
The BTU board is in common used on the U1911/1960/U1981.

s :h
One BRI trunk can provide 2 voice channel.

 Panel Components
r c e
Panel
Identifier
ou Description
Component

es BRI trunk port, which supports an RJ-45 jack. It supports


R
BRI S/T one BRI trunk for two channels of voice services.
Ports
n g Each BTU board provides four BRI ports.

r ni CONSOLE This serial port is disabled.

e a PWR Power indicator (green), which indicates the power status.

e L RUN
Running indicator (green), which indicates the running
status of the board.

or ALM
Alarm indicator (red), which indicates the alarm status of
M Indicators
-
the board.
BRI trunk port activity indicator (yellow), which is always off.
BRI trunk port connection indicator (green).
- •Blinking (4 Hz): The line is properly connected.
•Off: The line is not properly connected.
Button RST Press to restart the board.
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
The ASI board is used with U1981/U1960/U1911.

 Panel Components
s :h
Panel
Component c e
Identifier Description
r
ou
FXS ports for connecting the device to a maximum of 32
Ports
FXS 1-32
es analog phones. The port supports a DB68B connector.

R
CONSOLE This serial port is disabled.

i n g
PWR Power indicator (green), which indicates the power status.

rn
Running indicator (green), which indicates the running
RUN

e a
Indicators status of the board.

e L ALM
Alarm indicator (red), which indicates the alarm status of the
board.

o r Button RST Press to restart the board.

M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
The OSU board is used with U1981/U1960/U1911.

 Panel Components
s :h
Panel
Component
Identifier
r c e
Description

ou
FXS ports for connecting the device to a maximum of 12
FXS 1-12
es analog phones. The port supports a DB68B connector.
Ports R FXO ports for connecting the device to a maximum of 12

n g
FXO 1-12
analog trunks. The port supports a DB68B connector.

r ni CONSOLE This serial port is disabled.

e a PWR Power indicator (green), which indicates the power status.

e L RUN
Running indicator (green), which indicates the running

or
Indicators status of the board.
Alarm indicator (red), which indicates the alarm status of the
ALM
M Buttons RST
board.
Press to restart the board.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 U1981/U1960/U1911 share the same module.
t t

s :h
The U1911 supports only one power module.

c e
The U1960 and U1981 can be equipped with two power modules. By default, only one
r
u
power module is configured and is in slot 2 for the power supply. When two power

o
s
modules are configured, the following functions are supported:
e

R
Equalizing currents and backing up power supplies When working normally, each

g
power supply module shares the load with output current. When a power supply
n
ni
module stops working, the other power supply module continues to work.

a r
Supporting hot swapping You can insert a power supply module directly into a
e

e L vacant slot of the power distribution frame without powering off the

or
U1911/U1960/U1981. When a backup power supply module is installed, you can
remove a power supply module without affecting the running of the
M U1911/U1960/U1981.

 When two power supply modules are configured, you cannot configure both the AC and
DC power supply modules on an U1960/U1981.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Height:6U(1U=44.5mm)
t t
 Indicators in the U1980 shelf
s :h
Indicator Identifier
r c e Description
Power
ouIndicates the power status.
indicator
(green)
POWER

es •On: The power supply is normal.


•Off: There is no power supply.
R
g
Indicates the running status of the device.
Running
n i n •On: The board is faulty.
•Blinking (at 4 Hz): The board is writing data to the Flash
status
a r RUN Memory when the system is running.
e
indicator
•Blinking (at 0.5 Hz): The system runs normally.

e L (green)
•Off: There is no power input, the board is faulty, or the

or
system is starting.
Indicates the alarm status of the device.
M Alarm
indicator ALARM
•Blinking (at 4 Hz): A critical alarm is generated.
•Blinking (at 0.5 Hz): A major alarm is generated.
(red) •Blinking (at 0.25 Hz): A minor alarm is generated.
•Off: No alarm is generated.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Slots 0-1 are SMCU slots used to install the SMCU boards.

s :h
Slots 2-9 are interface board slots used to install interface boards, SC1-MRS boards, these
boards can be used together.

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 SMCU
t t

s :h
Provides the SoftSwitch functions.

c e
Processes media control protocols.
r

ou
Supports L3 switching and Time Division Multiplex (TDM) switching.

es
Supports hot swap.
R

n g
Supports 1+1 hot backup. When the active board is faulty, the standby board

ni
automatically replaces the active board.

 MRS
a r
Le The MRS provides the following functions: number allocation, digit collection, voice
e

or
playing, recording, voice conference, conversion from the TDM signaling to the VoIP
signaling, T.30 fax, supporting G.711, G.729 and iLBC. The SC1-MRS provides 256
M channels for processing the media resources.

 The MRS supports load sharing. When all the boards run normally, they share loads
evenly. When a board is faulty, other normal boards share the load to ensure the
normal running of the system.

 DTU

 The DTU board is a digital trunk interface board. It provides 4/8 E1/T1 ports and a
debugging port.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 PDF: Power Distribution Frame.
t t

s :h
The power switch is used to power on and power off the U1980.

c e
The power module slots are used to install power modules. The numbers of the
r
u
three slots from left to right are 0, 1, and 2. If there is a vacant slot, insert a blank

o
es
filter panel into it. If there is no vacant slot, inserting a blank filter panel will
generate a power alarm.
R

n g
The alarm tone mute button is used to mute the alarm tone when the equipment

ni
gives out alarms.

a r
The power supply module provides the following functions:
e

e L Equalizing currents and backing up power supplies By default, an U1980 has one

or power supply module installed in slot 0. If an U1980 has two power supply modules

M installed, it can equalize currents and back up power supplies. When working
normally, each power supply module shares the load by providing separate output
current. When a power supply module stops working, the other power supply
module continues to work.

 Supporting hot swapping You can insert a power supply module directly into a
vacant slot of the power distribution frame without powering off the U1980. When
a backup power supply module is installed, you can remove a power supply module
without affecting the running of the U1980.

 When two power supply modules are configured, you cannot configure both the AC
and DC power supply modules on an U1980.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The U1911/U1960/U1981 uses digital trunk cables, high-density user cables, and DC

:h
power cables.


e s
The U1911/U1960/U1981 uses digital trunk cables to connect various inter-office
trunk devices.
r c
ou

es
75-120-ohm transfer box converts 75-ohm unbalanced E1 signals to 120-ohm
balanced E1 signals for connection using E1 trunks.
R

n g
Analog phones use high-density user cables to connect to FXS ports of the

ni
U1911/U1960/U1981.

a r
L e
e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
The SCU board (main control module) integrates functional modules such as the main

:h
control module, narrowband switching module, security logic module and two broadband
switching modules.
e s
r c
The MTU board (media resource module + digital trunk module) contains the media
u

o
processing module (DSP + CPU), E1/T1 trunk module, and SD card storage module.
s

Re
The ASI board (analog user module) provides analog user access.

n g
The OSU board (analog user module + analog trunk module) provides analog user access

ni
and analog trunk access.
r

e a
The BTU board (digital trunk module) provides BRI trunk access.

e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The system is divided into the following planes based on the function:

s :h
System plane: includes the operating system, database, timer, memory management,

r c e
task management, and interface commissioning functions.

ou
Driver plane: includes the RS232 serial port communication, network chip, hardware

s
chip, and FPGA logical drivers.
e

R
Protocol plane: processes data for SIP, AT0, POTS, PRI, R2, QSIG, and Q.921.

n g
ni
 Transfer plane: includes the board and card management, inter-board communication,

r
and message forwarding functions.
a

L e
Service control plane: includes the call control, connection management, resource

e management, user management, SoftConsole management, registration management,

or and CDR generation functions.

M  Maintenance and management (M&M) plane: includes the CLI, web management,
LMT, log/alarm processing, tracing, and license management functions.
 Messages transmitted among planes are scheduled and encapsulated in a unified manner,
effectively reducing system complexity and further improving reliability.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
Signaling
:
Function
p
/Protocol
t t
:h
SS7 Enables the communication between the unified gateway and switches

e s
supporting the SS7 signaling and enables the unified gateway to access E1
trunks provided by the switches.
PRA r c
Enables the communication between the unified gateway and the switches

ou
on the ISDN and enables the unified gateway to access E1/T1 trunks

es
provided by the switches on the ISDN.
BRI
R
Enables the communication between the unified gateway and the switches

g
on the ISDN and enables the unified gateway to access BRI trunks provided
n
ni
by the switches on the ISDN.
R2
a r Enables the communication between the unified gateway and traditional

L e switching devices and enables the unified gateway to access E1 trunks


provided by the traditional switching devices.

e
or
QSIG Enables the communication between the unified gateway and switches
supporting the QSIG signaling and enables the unified gateway to access

M SIP
E1/T1 trunks provided by the switches.
Enables the interconnections between unified gateways and connects the
unified gateway to IADs and SIP multimedia packet terminals.
AT0 Connects the PSTN and switches. It is a DC loop analog trunk (also called
narrowband trunk) and enables intra-office users to have voice
communications with outer-office users through the obtained traditional
phone lines, achieving easy narrowband access.
Telnet Connects LMTs or remote operation and maintenance terminals to unified
gateways.
SSH2 Secures remote logins to an LMT or an operation and maintenance terminal
through an unreliable network to the unified gateway for configuration and
debugging.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The unified gateway in the HQ is called the central node, which can be

:h
U1911/U1960/U1980/U1981. The unified gateway gateway in a branch is called a local

s
node, which can be U1911/U1960/U1980/U1981.
e
r c
The central node and local nodes connect to the PSTN through digital or analog
u

trunks.
s o

Re
The central and local nodes are connected through SIP trunks and use the heartbeat

g
mechanism to monitor the running status of the peer devices.

n
ni
 When the central node and local nodes are connected properly:

a r
Users and services are configured and controlled in a unified manner on the central
e

e L node.

or  IP phones on local nodes are directly registered with the central node.

M  Analog phones on local nodes are registered with the central node through local
node proxies.

 Local nodes synchronize SIP user data from the central node in real time.

 When the central node is faulty or disconnected from local nodes:

 The basic call function remains available for analog users on local nodes.

 When detecting that the central node is faulty or disconnected, IP phones on a local
node automatically set the local node as the SIP server. The basic call function
remains available for SIP users on the local node.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The disaster recovery mechanism is described as follows:

s :h
Two central nodes are deployed in two places, and each central node has one

r c e
unified gateway deployed. The two unified gateways work in active/standby mode,
known as an active node and a standby node. The active and standby nodes are

ou
connected using the TCP protocol. They also use a heartbeat mechanism to

es
constantly check each other's status. The service servers are deployed at the central
R
node where the active unified gateway resides.

n g
ni
 When the active and standby nodes are running correctly, all users register with the

a r
active node. The active node processes all user requests and synchronizes data to

L e the standby node in real time. At least 1 Mbit/s bandwidth must be reserved for
data synchronization, and the round trip time (RTT) must be shorter than 80 ms.
e
or  When the active node fails, the standby node takes over all services from the active

M 
node and processes all user requests.

A trunk gateway can be deployed for connecting to the PSTN. If the trunk gateway
is not deployed, the active and standby nodes both connect to the PSTN. When the
active and standby nodes are running correctly, the active node routes calls to the
PSTN through trunks. When the active node is faulty, the standby node routes calls
to the PSTN through trunks.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. A;
t t
2. D.
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 This chapter are based on the
t t
:h
eSpace_U1910&U1911&U1930&U1960&U1981_V200R003C00_Quick_Installation

s
_Guide_01 and eSpace U1900 Series Unified Gateway Produc Documentation.
e
r c
For more information, please go to http://e.huawei.com to find more related documents.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The sudden and momentary electric current that flows between two objects at different

:h
electrical potentials caused by direct contact or induced by an electrostatic field.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 :
t t
 Antistatic wrist strap:
s :h

c e
An antistatic wrist strap, ESD wrist strap, or ground bracelet is an antistatic
r
u
device used to safely ground a person working on very sensitive electronic

o
es
equipment, to prevent the buildup of static electricity on their body, which
can result in electrostatic discharge (ESD). It consists of an elastic band
R
n g
of fabric with fine conductive fibers woven into it, attached to a wire with a

ni
clip on the end to connect it to a ground conductor.

a r
ESD(ElectroStatic Discharge)

L e  Electrostatic discharge (ESD) is the sudden flow of electricity between two


e
or
electrically charged objects caused by contact, an electrical short, or dielectric
breakdown.
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Major installation environment check items:
t t
N Check Requirement
s :h
o
.
Item

r c e
ou
s
1 Auxiliary The equipment room is equipped with specialized air conditioners, fire control facilities,
equipme
nt
Re
and good lighting facilities. Double aluminum alloy windows and doors are installed in
the equipment room. In addition, the auxiliary devices such as cabinets, distribution

g
frames, and cabling trays have been installed in the equipment room.

n
ni
2 Moisture- The dehumidity devices such as air conditioners with the dehumidifying function and
proof

a r special dehumidifiers must be installed in the equipment room where the relative
humidity is higher than 90%. Water seepage, dripping, and dew producing are forbidden

L e in the equipment room.

e
or
3 Lightning Lightning-proof equipment such as lightning rods and lightning strips must be installed in
protectio the equipment room. In addition, the lightning-proof grounding (that is, the grounding of

M
n lightning-proof equipment such as lightning rods) must share a grounding body with the
protection grounding of the equipment room.
4 Dust- If the equipment room is close to a dust source, such as a coal mine, a country road or a
proof farmland, aluminum alloy windows and fireproofing doors must be installed in the
equipment room.
N Check Requirement
o Item
.
5 Grounding Joint grounding is used in the equipment room. That is, the working ground, protection
ground, and lightning-proof ground share a grounding body. Various communication
equipment and power supplies should share a protection ground bar. The grounding

n
resistance is less than 1 ohm.
6 AC power Stable AC power supply must be available in the equipment room to meet the power
/e
supply requirements of the equipment. The AC power distribution switch and AC power cables

o m
are installed properly. The AC voltage is 220 V, the power is 300 W, and the conducting

i.c
wire can accept a current of 3.5 A.
7 DC power
e
The AC voltage is –48 V, the power is 350 W, and the conducting wire can accept a

w
a
supply current of 9 A.
8 UPS power
u
If the UPS power supply is required for the equipment, the UPS power supply must be
supply
.h
installed before deployment, and the output power meets the requirements.

g
9 Shipment

ni n
The software and hardware purchased by Huawei have been delivered to the customer
information site, with complete packages.

ar
// le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
ESD Measures
t t
:h

e s
To guarantee board safety, employ dedicated ESD bags and boxes when transporting
or storing boards.
r c

ou
Wear a well-grounded ESD wrist strap when holding, removing or inserting boards,

es
and insert the ground end to the ESD jack of the shelf

Unpacking Boards R
g

ni n
Electronic circuit is vulnerable to the ESD. When handling a board, wear the ESD wrist

r
strap that is properly grounded and touch only the edge of the board.
a
L
 eBoards are put into ESD bags in transportation. Before unpacking boards, take ESD

e
or
measures. Moreover, note the effect caused by the ambient temperature and humidity.
Generally, an ESD bag contains desiccant to absorb the moisture inside the bag. When

M a board is moved from a cold and dry place to a hot and damp place, wait at least 30
minutes before unpacking the board. Otherwise, the moisture condensed on the board
surface may damage the board.

 To unpack boards, do as follows:

1. Check the bag of each board for any damages.

2. Wear an ESD wrist strap and ground it properly.

3. Open each bag and check the board inside it for any damages.
 T1 trunk notes:

 If you want to use the T1 trunk, you must remove the jumper caps on the CVP
board (U1910&U1930) or MTU board (U1911&U1960&U1981).

 Switch the trunk mode on U1900.

 Built-in VMS service notes:

n
/e
 If you want to use the built-in VMS service (U1911&U1960&U1981) or
customize the system announcements, ensure that you have installed an SD
card in slot 0 of the MTU board.
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Connect the main control board of U1900 to the switch according to the networking data

:h
plan. The adaptive network ports support both straight-through and crossover cables.

 Notes:
e s
r c
By default, the network port mode of the control board is single-network-port mode. So
u

o
connect the first network port to the switch, and add more network ports to the switch
s
e
if settings are changed.
R

n g
Connect and fasten one end of the E1/T1 trunk cable to the E1/T1 port on the

ni
CVP or MTU board, and connect the other end to the E1/T trunk cable of the

r
peer device directly or through the distribution frame. Connection rules:
a
L e
 E1 cable: For the same link number X, connect local TX to peer RX and local

e RX to peer TX.

or  T1 cable: For the same link number X, connect local RX/TX to peer RX/TX。

M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
CVP and MTU boards provide LOS and RFA to indicate the E1/T1 connection status. If the

:h
light is off, the connection status is normal. Otherwise, please check the connection is Ok

s
or not. The two E1 channels in the CVP board share one pair of indicators, only the two
e
r c
channels both work normally the indicators are off.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
For more indicators information in different boards, please refer to the U1900 product

:h
document.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
default IP address of the U1910/U1911/U1930/U1960/U1981 is 192.168.1.17, while the

:h
default IP address of the U1980 is 192.168.1.85. Their default gateway addresses are the
same, which is 192.168.1.1.
e s
r c
The default user name and config password are admin and Change_Me.
u


s o
1. An operation and maintenance terminal (a PC) is available. The PC must:


Re
Have an Ethernet adapter installed and support TCP/IP.

n g
ni
 The web browser can only be Internet Explorer 7.0/8.0/9.0 that supports ActiveX and

r
Javascript.

e a
Support the resolution of 1024 x 768 or higher (1280 x 1024 recommended).
L

e
or
M
2. Connect the network cables

Select either of the following two modes for networking based on actual network
requirements:

 Use a straight-through cable to connect the network port of the unified gateway to
the network adapter port of the PC.

 Use a straight-through cable to connect the network port of the unified gateway to
a switch or a hub, which is then connected to the PC.
n
Notes: /e
o m
i.c
 In single-network-port mode, you can log in to the web management system

e
through network port 0 or 1 on the SCU board (U1911/U1960/U1981) or SMCU
board (U1980).
aw
u
In dual-network-port or triple-network-port mode, you can log in to the web

.h

management system only through network port 0 on the SCU board

n g
ni
(U1911/U1960/U1981) or SMCU board (U1980).

3. Set the IP address of the PC


ar
//le
The IP address of the PC must be on the same network segment as that of the unified

p :
gateway and cannot conflict with IP addresses of other devices.

t t
:h
4. Set the web browser.

s
To ensure system security, the unified gateway does not support SSL 2.0/3.0. To avoid a
e
r c
login failure, in the web browser, choose Tools > Internet Options > Advanced, select TLS

u
1.0/1.1/1.2, and deselect SSL 2.0/3.0.
o
es
R

n g
LMT tools description:

r ni
go to http://e.huawei.com,download the LMT tool based on the version of the

e aU1900.

e L
CLI command description:

or  Download putty ( support SSH, Telnet and console port )

M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
Here we use the Web management system to view the license information, you can alos

:h
use LMT or CLI to view Tehran license, the detailed command is “ show license “.

 License Key parameters


e s
r c
u
Parameter Description
Total users
s o
Number of users to be allocated.
CTI users
Re
Number of SoftConsole clients.
Voice Mail nums

i n g Number of concurrent voice mailboxes.

n
Conference users Number of concurrent users in an audio conference.

a r NOTE:This parameter is available only for

e
the U1911/U1960/U1980/U1981.

e L
Local Survival Right Local survival switch.

or
Redundancy Backup Two-node active/standby switch.
Right

M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Besides supports loading the license by Web management system, it also supports loading

:h
license by LMT or Putty + FTP Server.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The default IP address of the U1910/U1911/U1930/U1960/U1981 is 192.168.1.17, while

:h
the default IP address of the U1980 is 192.168.1.85. Their default gateway addresses are
the same, which is 192.168.1.1.
e s
r c
The default “user name “ and “password “ are “admin” and “Change_Me”。
u


s o
Network port 0 must be used for accessing the web management system, LMT command
tree, and CLI.
Re
n g
r ni
e a
e L
or
M
 Network Port Mode of the Control Board

 The SCU board (U1911/U1960/1981) and the SMCU board (U1980) support the
following network port modes: single-network-port mode, dual-network-port mode,
and triple-network port mode.

 In different network port modes, each network port processes different data streams. The
following table lists the data streams that can be processed by each network port in
different modes. To make data transmission more secure and reliable, you are advised to
n
/e
use the dual-network-port or triple-network-port mode.

 Network port modes


o m
Network Network Port 0 Network Port 1
e i.c
Network Port 2

w
Port Mode
Single- Processes all data streams and connects This network port
u a
Not used.

.h
network- to the BillServer. and network port 0
port mode work in

n g
ni
active/standby
mode.
Dual- •Processes the following streams and
ar
Processes all data Not used.
network- connects to the BillServer:Network
//le
streams and
port mode management packets: Telnet, Secure

p :
connects to the

t
Shell (SSH), Simple Network BillServer.

t
Management Protocol (SNMP), Trivial

:h
File Transfer Protocol (TFTP), FTP server

e s
(FTPS), web management server, or
proprietary protocols for

r c
communicating with the business

u
management unit (BMU), Business
o
s
Management Platform (BMP), and LMT

Re
•Protocol packets: RADIUS/SNTP
•Processes the following streams and
g
Triple- Processes all data Connects to the

n
network- connects to the BillServer:Network streams and BillServer.

ni
port mode management packets: Telnet, SSH, connects to the

a r SNMP, TFTP, FTPS, or proprietary BillServer.

e
protocols for communicating with the

e L BMU, BMP, and LMT


•Protocol packets: RADIUS/SNTP

or
M
 In dual-network-port mode and triple-network port mode,

 Network port 0 must be used for accessing the web management system, LMT
command tree, and CLI.

 Network port 0, 1 or 2 can be used for accessing the web self-service system.

 Only one network port can be used to connect to the BillServer.


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
You can use the Web management system to configure the IP address, and you can also

:h
use the CLI to configure the IP address.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Different countries and regions are in different time zones. Therefore, you must set the

:h
time zone of the unified gateway to that of the country or region where the unified

s
gateway is deployed. The system default time zone is GMT +8:00.
e
r c
Some countries or regions use the DST, and you must configure DST rules on the unified
u

o
gateway. When DST rules are configured, the unified gateway can display the DST time
s
correctly.
Re

n g
The unified gateway supports two time setting methods: manual setting and time

ni
synchronization with the NTP server. For more information about the NTP server settings,

r
please refer to U1900 product document.
a
L e
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The unified gateway supports two working modes: IMS and PBX (default).

 PBX mode
s :h

c e
PBX is short for private branch exchange, allowing an enterprise to manage
r
u
external incoming calls and internal calls in a group manner. When set to PBX

o
es
mode, the unified gateway can function as an IP PBX and support basic voice
communication (communication between intra-office users, and
R
g
communication based on narrowband and broadband trunks), point-to-point

n
ni
video communication, fax, and supplementary services (such as voice

a r conferencing, automatic switchboard, and call transfer).

L
e IMS mode

e
or
 IMS stands for IP multimedia subsystem. It is a brand-new multimedia service
system that can meet the new and diverse multimedia service requirements of
M terminal users. When set to IMS mode, the unified gateway can function as an
access gateway and register with the IMS network through a SIP trunk,
allowing enterprise users to use services provided by the IMS network. Based
on settings, the unified gateway can use its own services in IMS mode

 Set the working mode of a device to IMS when the device is connected to the IMS
network. Otherwise, set the working mode of the device to PBX.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Board information
t t
Board Device Model
s
Description :h
CVP U1910/U1930
r c e
•Provides the softswitch functions.

ou•Processes media control protocols.


•Provides Layer 2 switching and TDM switching functions.
ASI
es
U1910/U1911/U1930/U19 An ASI board connects the unified gateway to plain old telephone
60/U1981
R service (POTS) phones. Each ASI board supports a maximum of 32 POTS

n g phones.

ni
OSU U1910/U1911/U1930/U19 An OSU board connects the unified gatewayto POTS phones or analog

a r
60/U1981 trunks. Each OSU board supports a maximum of 12 POTS phones or

e
analog trunks.
SCU
e L U1911/U1960/U1981 A Service Control Unit (SCU) board functions as a softswitch. It

or
processes media control protocols and provides Layer 2 (L2) and time
division multiplexing (TDM) switch functions. An SCU board supports

M single-network-port, dual-network-port, and triple-network-port


working modes.
MTU U1911/U1960/U1981 An MTU board provides digital trunk access for connection to the
upper-level office through digital trunks. It also provides digit
collection, announcement playing, recording, conferencing, TDM-to-
VoIP conversion, and T.30-to-T.38 fax functions.
Board Device Model Description
BTU U1911/U1960/U1981 A BTU board provides digital trunk access. Each BTU board provides
four BRI S/T ports and supports eight voice channels.
SMCU U1980 Supports the following functions:
•Provides the softswitch functions.
•Processes media control protocols.
•Supports three working modes: single-network-port mode, dual-
network-port mode, and triple-network-port mode.
•Provides Layer 3 switching and TDM switching functions.
MRS U1980 Is a mandatory board and provides the following functions:

n
•Allocates numbers, collects digits, and plays announcements.

/e
•Supports recording, conference, TDM-to-VoIP conversion, and T.30-to-
T.38 fax.
•Supports G.711, G.729, and iLBC voice codecs.
o m
i.c
•Provides 256 channels for processing media resources.
DTU4 U1980
/DTU upper-layer office.
w e
Provides digital trunk access for connecting to the digital trunk of the

u a
.h
BTU U1911/U1960/U1981 A BTU board provides digital trunk access. Each BTU board provides

g
four BRI S/T ports and supports eight voice channels.

ni n
For the U1911/U1960/U1981, to add an MTU board, enter the value for Number of VMS
r

a
Channels, select Yes for Conference board, and click OK on the displayed MTU Parameter
le
//
Configuration page. The number of VMS channels refers to the license capacity, that is, the

p :
number of calls being concurrently forwarded to mailboxes

t t
:h
 In the Parameter configuration area, set Transmission mode and Transcoding codec and
click OK.
e s
 Key parameter description:
r c
Parameter
ou
Description
DTU Module
es
Indicates the switch of the digital trunk module. If you need to configure E1/T1 trunks on

R
the U1910/U1930, select On; otherwise, select Off.
Transmission
n g
The unified gateway supports the E1 and T1 modes, but does not support mixed use of the

ni
mode two modes. The PRA and QSIG trunks support the E1 and T1 modes. Other narrowband

a r trunks support only the E1 mode.

e
NOTE:If T1 is used as the transmission mode of PRA or QSIG trunks, on the E1/T1 port

e L controller of the CVP board (U1910/U1930), MTU board (U1911/U1960/U1981), or DTU4


board (U1980), remove or insert the jumper caps (total eight behind the panel) to adjust to

or
the Balance mode. Otherwise, T1 trunks will be unavailable.

M
Transcoding When selecting ALAW or ULAW as the codec, ensure that the configuration is the same as
codec the configuration of the peer device; otherwise, the call quality between users of the local
and peer devices will be affected.

 Transmission mode and Transcoding codec are two independent parameters. Specifically, the
transcoding codec ALAW orULAW can be selected regardless of whether the transmission
mode is E1 or T1. Generally, the transcoding codec is set to ALAWwhen the transmission mode
is E1 and set to ULAW when the transmission mode is T1. The actual configurations are based
on site requirements.

 Click Data Save in the upper right corner of the web management system.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Backing up a data file
t t

s :h
Log in to the U1900 Web management system, Choose System > File

r c e
Management., Click Download.

 Loading a data file

ou

es
Log in to the U1900 Web management system, Choose System > File

R
Management., Click Browse, select the data file (data.bin) to load, and click
Upload.
n g

r ni
As long as the main control board versions and the board type ( including the board

e a slot) are the same, the sip user and password can be recovered from one U1900 to

e L another U1900.

or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
// le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M

4
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Notes:
t t
 End of Life Announcement
s :h

c e
IAD208E(M) is End of Marketing, more information please go to enterprise.Huawei.com.
r
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The IAD132E(T) is 1 U high (1U = 44.45mm), which can be installed in the standard 19-

:h
inch cabinet meeting the International Electrotechnical Commission (IEC) standard.


e s
The front panel of the IAD132E(T) has four Ethernet ports, one maintenance serial port,

r c
one Reset button and five indicators.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The IAD132E(T) can be inserted with boards of two types, that is, FXO & FXS Unit (OSU)

:h
and Analog Subscriber Interface (ASID) board.

 OSU board
e s
r c

ou
Each OSU provides 8 Foreign Exchange Subscriber (FXS) ports and 8 Foreign

es
Exchange Office (FXO) ports, supporting eight POTS users and 8-port analog trunk.
FXS: foreign exchange subscriber port, used for connecting a POTS telephone.
R

n g
FXO: foreign exchange office, that is, the interface between a POTS telephone

ni
and a digital telephony switching system, used for connecting to the PSTN and

a r obtaining a PSTN number. The FXO port can be used for binding an intra-

L e office number, so that when a PSTN-side user calls the PSTN number of an

e FXO port, the called number is switched to an intra-office number.

or  ASID board
M  Each ASID board provides 16 FXS ports, supporting 16 POTS users.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Generally, an IAD196 can work with only one main control board and one service board.

:h
You can insert more service boards based on the system capacity. In addition, you must

s
insert filler panels into vacant slots.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The shelf of the IAD1224 is a standard 2U shelf, which can be installed in the standard 19-

:h
inch cabinet meeting the International Electrotechnical Commission (IEC) standard. The

s
dimensions (H x W x D) are 86.1 mm x 442 mm x 310 mm.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Generally, an IAD1224 can work with only one main control board and one service board.

:h
You can insert more service boards based on the system capacity. In addition, you must

s
insert filler panels into vacant slots.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The CVP boards functions as the main control board. It mainly manages devices, controls calls,

:h
processes media, performs narrow-band switching, and performs switching between the internal
and external Ethernets.

e s

r c
Service network interface FE1/FE2

ou
Used to connect to superior devices.
s

Re
Used to cascade connection between IAD1224s.

n g
Maintenance network interface LAN

r ni
Used to configure and debug the IAD.

e
Indicator a Name Color Status Description

e
Power L PWR Green •When the indicator is steady on, the power supply is normal.

or indicator •When the indicator is off, no power supply is received.

M Running
indicator
RUN Green •When the indicator blinks at 1 Hz, the board is being started.
•When the indicator blinks at 2 Hz, the board is writing data into
the Flash memory when the IAD1224 is started or running.
•When the indicator blinks slowly (at 0.5 Hz), the board is
normal.
•When the indicator is off, no power supply is received or the
board fails to run.
Alarm ALM Red •When the indicator blinks at 2 Hz, an alarm is generated.
indicator •When the indicator blinks at 4 Hz, a critical alarm is generated.
•When the indicator is off, no alarm is generated.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
An ASI board (POTS interface board) provides 32 POTS user ports. Connect the DB-68

:h
male connector of the user cable to a port on the ASI port, and connect the FXS line to the
user phone port.
e s
ASI indicators
r c
u

Indicator Name
s oColor Status Description

Re
Power indicator PWR

i n g Green •When the indicator is steady on, the power supply is normal.
•When the indicator is off, no power supply is received.

a rn
Running indicator RUN Green •When the indicator blinks at 4 Hz, the board is loading
software.

L e •When the indicator blinks at 2 Hz, the user is in off-hook

e
state.

o r •When the indicator blinks at 0.5 Hz, the board is running


properly and in idle state.

M •When the indicator is off, no power supply is received or the


board fails to run.
Alarm indicator ALM Red •When the indicator blinks at 2 Hz, an alarm is generated.
•When the indicator blinks at 4 Hz, a critical alarm is
generated.
•When the indicator is off, no alarm is generated.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
An OSU board (FXO and FXS interface board) provides 12 POTS user ports and 12 FXO

:h
user ports. Connect the DB-68 male connector of the user cable to a port on the ASI port,

s
and connect the FXS line to the user phone port, and the FXO line to the PSTN port.
e
OSU indicators
r c
u

s o
e
Indicator Name Color Status Description

R
Power indicator

i n g
PWR Green •When the indicator is steady on, the power supply is
normal.

r n •When the indicator is off, no power supply is received.

e a
Running indicator RUN Green •When the indicator blinks at 4 Hz, the board is loading

e L software.
•When the indicator blinks at 2 Hz, the user is in off-hook

or
state.
•When the indicator blinks at 0.5 Hz, the board is running

M properly and in idle state.


•When the indicator is off, no power supply is received or
the board fails to run.
Alarm indicator ALM Red •When the indicator blinks at 2 Hz, an alarm is generated.
•When the indicator blinks at 4 Hz, a critical alarm is
generated.
•When the indicator is off, no alarm is generated.
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The IAD1224 uses two power supply modules that can be swapped and work in

:h
active/standby mode. The AC and DC power supplies are supported.

e s
r c
1 Power switch

ou
2 AC power socket 3 Invalid, not

s
enabled (no

Re operations
available

g
through RJ45

ni n ports)

a r
L e
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Procedure
t t

s :h
The IAD power-off survival function is available only after the cables are connected. The

r c e
cables are connected as follows:

ou
Connect the PSTN cable to the FXO port on the IAD. For example, port 8 in slot 1

s
connects to the yellow and blue FXO line pair.
e

R
Connect the phone cable to the FXS port on the IAD. For example, port 0 in slot 1

g
connects to the red and green FXS line pair.
n

r ni
When powered off, the IAD automatically connects the phone on the FXS port to the

a
corresponding PSTN cable.
e

e L
When the IAD power-off survival is enabled, the number of the phone on the FXS port

or becomes the number that the PSTN network carrier assigns to the FXO port. The PSTN

M 
network carrier also specifies the dialing rule for the IAD.

Verification

 To verify the power-off survival function of the IAD, proceed as follows:

 Power off the IAD.

 Make a call to an external phone number using a phone that connects to FXS port 0
on slot 1.

 If the call can be connected, the power-off survival function is enabled. If the function is
not connected, verify that the FXS port is normally connected to the phone, the FXO port,
and the PSTN cable, and that the FXS port and the FXO port matches.
 Mapping between user cable colors, FXO ports, and FXS ports on the OSU board

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 Prerequisites
t t

s :h
If the protocol mode is set to SIP.

c e
When IADs are assigned with static IP addresses, the local-switch function is
r
u
available among local IAD or multiple IADs. If the DHCP or PPPoE mode is selected,

o
s
the local-switch function is only available for the local IAD.
e
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1.A
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The account root for the Web Management System and that for the command line

:h
interface (CLI) are the same. If you change the password of the root, use the new

s
password to log in to the Web Management System or the CLI.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
If you changed the IP address of the IAD, you can do as follows to obtain the IP address.

s :h
Dial *127 on the phone connected to the IAD, and then the voice announcement
plays the IP address.

r c e

ou
Log in to the IAD through the serial port and run the display ip address command in

s
the common user mode to view the IP address of the device.
e

R
IAD 104 don’t provide users with the web management system.

n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
After you log in to the system, you can click Change Password at the upper right corner of

:h
the page to set a new password. After the password is set, record related data.


e
By default, the protocol is SIP. s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
There are three methods for obtaining the IP address. Select a method according to the

:h
actual network.

e s
Click Static and enter the IP address, subnet mask, and default gateway.
c

ur
Click DHCP. The IAD automatically obtains the IP address from the DHCP server.

s o
Click PPPoE and enter the user name and password.
e

R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
This chapter just introduce the configuration mode, for the detailed configuration step,

:h
please refer to 《 OUC1202 U1900 Intra-Office Call 》.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1.AC
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
An Analog Subscriber Interface (ASI) board provides 32 Foreign Exchange Subscriber (FXS)

:h
ports.


e s
An FXO/FXS Interface Unit (OSU) board provides 12 Foreign Exchange Subscriber (FXS)

r c
ports and 12 Foreign Exchange Office (FXO) ports.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 UTP: Unshielded Twisted Paired.
t t

s :h
IAD:As the media access gateway of Voice over IP (VoIP) and Fax over IP (FoIP). The IAD

r c e
converts analog voice data into IP packets and transmits data through the IP network.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
eSpace 7903X is a multi-functional IP phone expansion module. It is used with eSpace

:h
7950 to provide various functions, including speed dial, phone lock, phone sleep, and

s
contact group. With a single eSpace 7903X, eSpace 7950 increases the number of
e
r c
programmable buttons to 40 and provides optimized viewing through the 5-inch color

u
LCD screen. eSpace 7903X helps users use eSpace 7950 more efficiently with better user
o
experience.
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
IP phone has built-in downward double Ethernet switch port.

s :h
Support the bridge mode, sharing network, a network cable can solve all problems.

c e
An internal double port Ethernet switches support the RJ-45 interface directly connected
r
u
to the 10/100/1000 base-t Ethernet, and provides a local area network (LAN) connection

o
s
that used to connect the phone and PC in the same position.
e

R
System administrators can specify different WLAN for PC and phone (802.1 Q), which

g
provides voice and data traffic with higher safety and reliability.
n

r ni
eSpace 7870, 7850, 7830, 7820 and 7810 support the bridging function. The device

a
connected to the PC port of an IP phone can access the network connected to the LAN
e
e L
interface of the IP phone and can communicate with other devices in the network. In this

or
case, the IP phone acts as a switch with two interfaces but the working mode is different
from the working mode of a normal switch. Special configurations are performed at the
M lower layers of an IP phone to separate the broadcast packets between the two interfaces.
Therefore, the IP phone is not affected by a large number of broadcast packets.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Dynamic Host Configuration Protocol (DHCP) is a protocol for dynamically managing and

:h
configuring users in a centralized manner. It uses the Client/Server structure. A DHCP client

s
sends the DHCP server a request to apply for parameter settings, including the IP address,
e
r c
subnet mask, and default gateway. Then the DHCP server sends the parameter settings to
the DHCP client.
ou
 DHCP features
es
R

n g
Plug and play property

ni
 The client can obtain the IP addresses and associated parameters without

a r configuration, simplify client network configuration, reduce maintenance

L e costs.

e
or
 Unified management

M  All the IP address and related information are unified managed and allocated
by the DHCP server.

 Use of high efficiency

 Enhance the use efficiency of IP address through IP address lease


management.

 Achieved across a network segment

 Can implement agreement message interaction between the client and DHCP
server among different subnets through the DHCP relay.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
DHCP (dynamic host configuration protocol) evolved from the BOOTP protocol is used to

:h
automatically allocate a client computer the IP address of a standard protocol that is
defined in RFC 2131.
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 PoE:Power over Ethernet
t t
:h
 support the PoE function. When not being connected to a power adapter, a client

s
can obtain power from a PSE device (a PoE switch such as the S3900) to work
e
c
normally.

ur
support the mode of free-line power supply and mode of signal-line power supply.

s o
When the PoE function is used, the reliable power supply distance is up to 100
meters.
Re
POE system advantages:
g

ni n
PoE reduces investment spending and the total electrical equipment deployment

a r
costs in the unified IP infrastructure.

L

e PoE is free for the terminal equipment installation wall power supply, thus reduces
the cost associated with supporting terminal equipment.
e
or
 Install the network connection device in the place that difficultly deploying local AC
power source, which provides greater flexibility.
M  POE system:
 PSE(Power Sourcing Equipment): Power supply equipment for the Ethernet client
device, and also is the power supply manager of the whole process of POE Ethernet,
such as switches.
 PD(Power Device): Accept the PSE load, namely the client devices for POE system,
such as IP phone.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
In general, retain the default configuration of voice codec priority for deployment. If the

:h
network environment is complex, you can adjust the codec priority according to the actual
network bandwidth.
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Access the phone web page as an administrator. Choose Advanced > Media.

s :h
Noise Suppression: When noise occurs in the audio collected by the IP phone, the IP phone

capability increases.
r c e
automatically suppresses the noise. The voice quality decreases as the noise suppression

ou

es
Echo Cancellation: The IP phone conceals the acoustic echoes that occur in the
microphone to minimize the effects of the local audio card shift.
R

n g
Voice Activity Detection: The IP phone conceals the acoustic echoes that occur in the

ni
microphone to minimize the effects of the local audio card shift.

a r
Automatic Gain Control: The IP phone automatically adjusts the volume and level to deliver
e

e L
optimal audio experience. In the database engine, users can enable and disable the AGC

or
function and query the running status of the AGC function. AGC classifies into the analog
AGC and digital AGC. In the analog AGC, the IP phone adjusts the microphone input to
M provide optimal audio experience. While, in the digital AGC, the IP phone adjusts the PCM
waveform.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
eSpace IP phones support the Virtual Local Area Network (VLAN) function. The packets

:h
sent by an IP phone are labeled with tags. This makes packets transmitted in a separate

s
voice VLAN, and the stability of VoIP packets is ensured.
e
r c
Each VLAN is a broadcast domain. Hosts in a VLAN communicate with each other as if
u

o
they were in a LAN. Hosts in different VLANs cannot directly communicate with each
s
other.
Re
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
DiffServ:Differentiated Services. Due to development of the market and change of

:h
competition environment, carriers must provide different levels of services for subscriber

s
groups with different requirements. The solution of differentiated services is promoted to
e
r c
meet this demand. The services of high qualities are offered to subscribers with high

u
priorities, while the services of low qualities are offered to subscribers with low priorities.
o

es
VLAN auto-configuration mechanisms:
R
a, the automatic configuration based on the configuration file

n g
b, the automatic configuration based on the LLDP-MED

r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Phone support SRTP media layer encryption, using AES128 algorithm encrypted

:h
transmission to ensure the transmission safety.


e s
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are

r c
cryptographic protocols that provide communications security over the Internet.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
A device provides ports for clients to access a LAN. The ports support the following access

:h
control modes:

e s
Authorized-force: A port in this mode allows clients to access network resources
c

r
without authenticating the clients.
u

s o
Unauthorized-force: The device does not authenticate clients accessed through a
e
port in this mode.
R

n g
Auto: A port in this mode allows clients to send and receive packets but does not

ni
allow clients to access network resources before authentication succeeds. If

a r
authentication succeeds, the port allows clients to access network resources. This

L e mode is mostly used.

e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 The authentication process is as follows:
t t
:h
1. A client sends an EAPOL-Start packet to a device.
s
c e
2. The device receives the packet and sends an EAP-Request/Identity packet,
r
u
requesting the client to send the user name. The device encapsulates frames from

o
s
the client into a packet and sends the packet to the authentication server.
e
R
3. The client sends the user name that is contained in the EAP-Response/Identity

g
packet to the device.
n
r ni
4. The authentication server searches the database for the user name in the packet

e a and obtains the corresponding password. The authentication server uses a

e L randomly generated encryption key to encrypt the password and sends the

or
encryption key to the device through the Access-Challenge packet.

M 5. The device sends the encryption key to the client.

6. The client receives the EAP-Request/MD5 Challenge packet containing the


encryption key. The client uses the encryption key to encrypt the password,
generates an EAP-Response/MD5 Challenge packet, and sends the packet to the
device. The device sends the packet to the authentication server.

7. The encryption algorithm is irreversible normally.


n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :
 802.1x authentication:
t t

s :h
MD5 authentication: authenticated by user name and password

c e
EAP-TLS authentication: authenticated by the certificated built in an IP phone,
r
u
featuring higher security

o

es
VLAN configuration mode:

R
LLDP mode: The data switch delivers audio VLAN information to an IP phone
g

ni n
through the LLDP protocol. To use this mode, the data switch must support the

r
LLDP function. This mode is enabled for the IP phone by default.

e aDHCP Option mode: Users can set the Option 132 and 133 fields to the ID and port
L

e
number of the audio VLAN respectively. Then, an IP phone can obtain audio LAN

or information through the option fields.

M  Manual configuration: Users can manually configure audio VLAN information on the
network configuration screen on an IP phone.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Answer:1.A。
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
If a static IP address is required for eSpace 7910/eSpace 7950, set IPv4 Settings to Static.

:h
Obtain an IP address, subnet mask, gateway address, and DNS address from your network
administrator.
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If Point-to-Point Protocol over Ethernet (PPPoE) is required for eSpace 7910/eSpace 7950,

:h
set IPv4 Settings to PPPoEObtain the user name and password for your PPPoE dialup

s
connection from your network administrator.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Obtain the IP address of the IP phone.
t t

s :h
On the phone login screen, choose More > Network > Status > Network and view
thephone's IP address.

r c e

ou
On the phone home screen, choose Apps > Status > Network and view the phone's
IPaddress.
es

R
Open a web browser and enter the phone's IP address in the address box.

n g
ni
 Enter the administrator account and password, and click Log In.

a r
The default administrator account is admin, and the default administrator password is

e
admin123. To ensuresecurity, change the administrator password at your first login.
L
e
or
 If you enter the password incorrectly for three consecutive times, the IP address of
the PC or terminal you are using will be denied to access the IP phone. To continue

M to access the IP phone, you can change the IP address of the PC or terminal (a
maximum of ten IP addresses are supported). However, if the IP address has been
changed for ten times and is still denied to access the IP phone, the IP phone will be
locked, denying any IP address to access it. In this case, to access the IP phone, you
need to wait five minutes until the IP phone is unlocked.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Access the phone web page as an administrator. Choose Advanced > Network.

s :h
If the authentication is successful, the device can access resources on the LAN.

c e
If the authentication is failed, the device cannot access resources on the LAN.
r
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Access the phone web page as an administrator. Choose Advanced > Network.

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
LAN Port: VLAN setting parameters for the LAN port on an IP phone. The value Enabled

:h
indicates that the VLAN function is enabled for the LAN port.

e s
ID: ID of the VLAN where the IP phone belongs to.After LAN Port is enabled, the
c

r
data packets sent by the IP phone carry VLAN tags.The network administrator
u
o
divides the network connected to the switch into N VLAN. Each VLAN has a VLAN
s
ID.
Re

n g
Priority: Priority of the VLAN where the IP phone belongs to. The value ranges from

ni
0 to 7. A larger value indicates a higher priority.


a r
PC Port: VLAN setting parameters for the PC port on an IP phone. The value Enable

L e
indicates that the VLAN function is enabled for the PC port.

e
or
 ID: This VLAN ID is carried by data packets transmitted upstream through the PC
port. For data packets transmitted downstream through the PC port, if the VLAN ID
M in the data packets is the same as the VLAN ID of the PC port, the PC port removes
the VLAN tag from the data packets before transmitting them. If the VLAN ID in the
data packets is different from the VLAN ID of the PC port, the PC port discards these
data packets.

 Priority: Priority of the VLAN where the IP phone belongs to.The value ranges from 0
to 7. A larger value indicates a higher priority.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
PC Port VLAN Filtering: If you select Enable, the phone's PC port allows the following data

:h
packets to pass: data packets that do not carry any VLAN ID, data packets carrying the

s
VLAN ID of the LAN port, data packets carrying the VLAN ID of the PC port, and data
e
r c
packets carrying the VLAN ID that is set below PC Port VLAN Filtering.

ou
ID: Indicates the VLAN ID, with which packets are allowed to pass through the
s

e
phone's PC port when VLAN Filtering on PC Port is enabled.
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Fixed IP mode: Users must fill in the IP, subnet mask, network gateway, active and standby

:h
DNSs.


e s
DHCP mode: An IP phone obtains the IP address from the DHCP server automatically.You

r c
can choose to manually enter the DNS server address or enable the IP phone to

ou
automatically obtain an DNS server address.

es
PPPoE mode: User name and password must be known.
R

n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
User needs to be registered to the server when the phone is switched on every time.

s :h
User needs to be registered again When the addresses of the SIP Client changes.

c e
Registration information must be refreshed periodically, usually the register saves the
r
u
registration information to the Location Server.

o

es
Holding the AOR address bound to a Contact, and the Proxy look for the called address

R
easily when in call.

n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g .h
ni n
ar
//le
p :
 Choose User > SIP User.
t t
 Click Create on the SIP User page.
s :h

c e
Enter user information on the Add SIP User page that is displayed.
r
ou
es
R
n g
r ni
e a
e L
or
M
 Key parameter description
Parameter Description
Start device ID ID of the device from which the configuration starts. The device ID is
the SIP device registration account, for example, SIP user ID
configured during IP phone registration.
Device type The Device type parameter is used for the connection between the
unified gateway and a SIP device. The parameter value must be the
same as that specified on the SIP device. If the parameter is set to
n
/e
eSpace, the corresponding number can access the unified gateway
only through an eSpace soft terminal.
Authentication This parameter specifies the mode for authenticating a SIP device
o m
i.c
mode when it registers with the unified gateway.

w e
To improve account security, you are advised to select the IP address
or password as the authentication mode for SIP number allocation.
a
•NOTE: In password-based authentication, the password by default
u
.h
must be a string of 8–31 characters that consists of at least two
types of the following characters: digits, letters, and special

n g
characters. You can run the config system authentication mode

ni
simple command to set the weak password mode. In this mode, the
r
le a
password is a string of 1–31 characters and has no complexity
requirements. The password must not be the same as the device ID
or device ID in reverse order.
: //
t t p
•Except authentication by IP address and password, unified gateway
supports authentication by IP address segment. You can run the

:h
config add addresspool index [0-n] startip x.x.x.x endip x.x.x.x

s
command to configure trusted IP address segment, and select
e
c
authentication by IP address segment when configuring users (These
r
two configurations can be achieved only using commands).
u
s o
NOTICE: A weak password may pose security risks. Use a weak
password with caution.
User right level
Re
User right levels are listed in the following ascending order: Default

n g right < Normal right < Advanced right < Super right. The default

ni
value is Default right. Users with a preset level of rights can use

a r specified call rights only in specified time segments. Higher-level


users can reserve trunks for themselves. If there is no available trunk,

L e they can preempt the trunks assigned for lower-level users to make

e outgoing calls.

or
M
n
/e
o m
ei.c
aw
u
g .h
ni n
ar
//le
p :
 Choose User > SIP User.
t t
 Click Create on the SIP User page.
s :h

c e
Enter user information on the Add SIP User page that is displayed.
r
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Configure intra-office prefixes for unified gateway users so that unified gateway users

:h
(intra-office users) can make calls with each other.

e s
Log in to the web management system.
c

ur
Choose Trunk > Prefix Configuration and click Create.

s o
Configure a prefix in the Create Prefix dialog box
e

R
Key parameter description
g

ni
Parameter
n Description

a r
Service type •Basic service The service type is a basic audio service such as intra-office call
and local call.

L e •Supplementary service The service type is a supplementary service.

e •Intelligent service The service type is a common intelligent service, and is

or currently unavailable.
•SoftConsole service The service type is a softconsole service such as the call
M waiting and attendant group in the console.
•Virtual user The service type is a virtual user service such as the phone
meeting, automatic switchboard, and customized VU.
•Card number service The service type is a card number service such as the
call, recharge, password change, balance query, terminal binding, prepaid,
or postpaid service.
•Call by Dialing Card Number Users can dial a card number to make intra-
office calls, national toll calls, international toll calls, and emergency calls.
Parameter Description
Call •Intra-office call This option is selected for calls between users under the
property same unified gateway.
•Local call This option is selected for local calls.
•National toll call This option is selected for national toll calls.
•International toll call This option is selected for international toll calls.
•Emergency call This option is selected for emergency calls, for example, to
911.
•Intra-office or local call This option is selected when first digits in a local
number compose a short number. The call with this attribute is routed to
n
the intra-office user. If the routing fails, the call is then routed to the local
/e
user in another office.
•Route by number length This option is selected for outgoing calls with the
o m
same prefix but with different number lengths.
e i.c
•Local regeneration call This option is selected for calls between intra-office
w
users and local PSTN users when both active and standby devices in the
a
u
centralized call management network mode fail and the local generation

.h
function is enabled.
Calling
g
Index of a calling number change rule. The calling number change rule is
n
ni
number used to change calling numbers, for example, to a switchboard.
change
r
The priorities of the three number change modes are long number and short
a
number, number mapping, and number change in descending order.
Calling
// le
Indicates whether to display the mapping number of a calling number. If a
number
p :
user is not configured with the long number, the mapping number is
mapping
t t
displayed on the called parties' phones.

:h
The priorities of the three number change modes are long number and short

s
number, number mapping, and number change in descending order.
e
Called
number
r c
Index of a called number change rule. For example, a called number change
rule can be as follows: If the calling party dials 912345678, unified gateway
change
ou
deletes the outgoing prefix 9 and sends the called number 12345678.

es
The priorities of the three number change modes are long number and short

R
number, number mapping, and number change in descending order.
Called
g
Indicates whether the mapping number of a called number can be used in
n
ni
number dialing. If a user is not configured with the long number, the mapping
mapping
a r number can be used.
The priorities of the three number change modes are long number and short

L e number, number mapping, and number change in descending order.

e Display long The long number is a number used for short-number users to make

or calling outgoing calls or for outer-office users to call short-number users.

M
number The default value is No. When the parameter is set to Yes and the user is
configured with a long number, the calling number is changed to the long
number for outgoing calls.
The priorities of the three number change modes are long number and short
number, number mapping, and number change in descending order.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Network Environment: An IP phone selects an appropriate network environment according

:h
to the onsite conditions:

UC2.X: UC2.X network


e s
c

ur
UC2.0: UC2.0 network

s o
Asterisk: Asterisk network
e

R
Broadsoft: Broadsoft network
g

ni n
CC: CC network

a r
IMS+UC: IMS+UC network
e

e L  Others: other third-party networks

or  Note: The IP phone needs to be restarted after its network environment is modified.After

M the network environment is changed, the IP phone changes the default configuration file
and the default service rights in service rights management accordingly. This facilitates the
setting and use of the IP phone.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Sequential: The IP phone sends registration messages to a SIP server at intervals of half of

:h
the registration interval. If the active SIP server is fails, the IP phone registers with the

s
standby SIP server. If the standby SIP server fails, the IP phone registers with the local SIP
e
r c
server. Services are interrupted during the SIP server switch. After the IP phone registers

u
with a SIP server successfully, its services become available again.
o

es
Simultaneous: The IP phone registers with the active, standby, and local SIP servers at the
R
same time. If the active SIP server fails, the standby SIP server takes over the services. If the

n g
standby SIP server also fails, the local SIP server takes over the services. The switching

ni
takes about 3s, which cannot be perceived by users. After the switching, services are
r
a
running properly.
e
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Log in to U1900 administrator web page.
t t
 Choose User > SIP User.
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Tick the encoding to be used according the needs, and you can adjust the priority

:h
according moving them up and down. The smaller the priority value, the higher the
priority.
e s
r c
Log in to IP phone Web page.
u


s o
Choose “Advanced > Media” to enter the configuration page.

Re
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Access the phone web page as an administrator.

 Choose Advanced > SIP Signaling.


s :h

c e
SIP Registration Cycle: The IP phone sends registration messages to the server at an
r
u
interval of half of the registration cycle.

o

es
Re-registration Interval: Interval for the IP phone to re-register with the server upon its

R
registration failure.

n g
ni
 Local SIP Port: SIP port used for listening the IP phone and transmitting SIP signaling.

a r
L e
e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Time Update Mode: The displayed time on the phone can be automatically and manually

:h
updated.

e s
If a user set the displayed time to be automatically updated, he or she must fill in the
c

r
server IP address and the update interval.
u

s o
If a user chooses to manually update the displayed time on the phone, he or she
e
must enter the system time by himself or herself.
R

n g
Time Zone: Time zone of the area where a user locates.

r ni
Time Format: 12-hour or 24-hour format.

e a
Date Format: Users can customize the date format based on their favorites.
L

e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
On the web page, choose Button > Expansion Module.

s :h
Click the gray button next to the programmable button on the expansion module. The

r c e
Select Programmable Button Functions page is displayed.

ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If the number a user dialed matches a preset dialing rule, the phone automatically converts

:h
the number according to that rule and calls the converted number after the preset delay
time expires.
e s
Parameter description
r c
u

s o
x or X: Represents a digit of 0-9.For example, 135xxxxxxxx indicates an 11-digit
e
number starting with 135.
R

n g
[ ]: Matches any digit in [ ].For example, [2-8] indicates any digit of 2-8; [279]

ni
indicates any digit of 2, 7, and 9.

a r
.: Indicates that the digit before dot (.) can appear for any times (for example, not
e

e L appear or appear once).The last digit of a dialing rule cannot be dot (.). For example,

or
92.3 can indicate 93, 923, 9223, and so on.

M  <:>: If the dialing rule is A<B:C>D, When the number a user dials matches ABD, the
phone automatically replaces B with C and calls ACD. A, B, C, and D in the dialing
rule indicate character strings consist of digits and common signs like asterisks (*),
number signs (#), and plus signs (+). A, B, and D can also contain dialing rule
parameters.For example, When the dialing rule is 1[278]<111:000>XX, the phone
automatically replaces 111 with 000 if the number a user dials matches
1[278]111XX.For example, if the number a user dials is 1211123, the phone
automatically calls 1200023.
 Scenario Configuration。Configure dialing rules based on the actual usage scenarios. The
functions a dialing rule can implement and the associated scenarios are described as
follows:

 Immediate call.

 For example, a user wants the phone to automatically call a 5–digit number after the
user dials such a number. In this scenario, set Dialing Rules to XXXXX and Delay to
0.
n
 Delay call For example,.
/e
 a user wants the phone to automatically call a mobile phone number starting with
o m
135, 136, 137, 138, or, 139 in 5s after the user dials such a number. In this
scenario, set Dialing Rules to 13[5-9]XXXXXXXX and Delay to 5. e i.c
aw
u
 Number replacement

g .h
For example, a user wants the phone to automatically replace 0 with 0086 and call

ni n
the number after the user dials a mobile phone number starting with 0. In this

r
scenario, set Dialing Rules to <0:0086> XXXXXXXXXXX.
a
 Number insertion

// le

p :
For example, a user wants the phone to automatically suffix # to a 3–digit number

t t
starting with * and call the number after the user dials such a number. In this

:h
scenario, set Dialing Rules to *XX<:#>.
s
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Corporate Directory Server: Server that provides multiple information services including the

:h
corporate directory and corporate presence. You can select Corporate or LDAP from the

s
Corporate Directory Server drop-down list box.In the UC2.X or UC2.0 network, you can
e
r c
also choose Corporate(UC2.X) and Corporate(UC1.1).

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Software download path:
t t

s :h
Log in to http://support.huawei.com/enterpris, choose ”Downloads > Unified

r c e
Communications and Collaboration > Unified Communications > Unified Communications
Endpoints” to download the specific version.

ou

es
Software package describe:

R
g
File Description

i n
rn
Upgrade files used for online upgrade or
eSpace7910V200R003C00.bin
a
upgrade through eSpace EMS.

L e
UPF-eSpace7910.xml
Policy templates used for configuration file

e
upgrade.

o r Config-eSpace7910.xml Configuration file used for phone deployment.


M eSightUI.xml
Configuration templates used for auto
deployment. through eSight UC&C

tools.zip Tools to make Language Package


n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. A。
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
During a call, the party who dials the phone number and initial a call is caller (calling party)

:h
and the other party who answers the call is callee (called party).

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
PSTN: Public Switched Telephone Network. A telecommunications network established to

:h
perform telephone services for the public subscribers. Sometimes it is called POTS.


e s
POTS: Plain Old Telephone Service. The basic telephone service provided through the

r c
traditional cabling such as twisted pair cables.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
E.164 Number Mapping (ENUM) is a set of protocols for unifying telephony systems using

:h
Internet. Dynamic Delegation Discovery System (DDDS), DNS, and E.164 are used for
addressing.
e s

r c
ENUM is a standard of IETF. It uses special DNS record types to translate a telephone number

u
into a Uniform Resource Identifier (URI) or IP address that can be used in Internet
o
s
communications. The objective of ENUM is using a single number to replace multiple numbers
e
R
and translating the home phone, office phone, fax, cell phone, and email of each individual to

g
URIs or IP addresses.
n

r ni
MSISDN: Mobile Subscriber International ISDN/PSTN number


e a
ENUM: E.164 NUmber Mapping

e L E.164 Number Mapping (ENUM) is a set of protocols for unifying telephony systems

or

using Internet. DDDS, DNS, and E.164 are used for addressing. ENUM is a standard of

M IETF. It uses special DNS record types to translate a telephone number into a URI or IP
address that can be used in Internet communications. The objective of ENUM is using a
single number to replace multiple numbers and translating the home phone, office
phone, fax, cell phone, and email of each individual to URIs or IP addresses.

 E.164 is an ITU-T recommendation that defines a numbering plan for the world-wide
PSTN and some other data networks and also defines a general format for international
telephone numbers. Plan-conforming numbers are limited to a maximum of 15 digits,
and a complete number contains an international call prefix. An E.164 number is an
MSISDN number, which is the number that a calling party needs to dial for reaching a
user in the mobile communications network.

 The format is CC+NDC+SN or CC+N1N2N3+H0H1H2H3+ABCD.


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
A call prefix is the string consisting of first few digits or all digits in called numbers. If the

:h
called number is 1234, the call prefix can be:

First digit: 1
e s
c

 First two digits: 12


ur
s o
First three digits: 123
e

R
Entire called number: 1234
g

ni n
The prefix groups configured on the U1900 constitute a called number analysis table of

r
the system. If the called number analysis table contains multiple prefixes for a called
a
e
number, the system uses the maximum matching rule to match the called number with a
L
e
prefix during number analysis.

or  Assume that the called number is 1234 and the prefixes 1, 12, and 1234 are configured in

M the called number analysis table. According to the maximum matching rule, the system
will select the prefix 1234, which is the closest to the called number. The prefixes 1 and 12
do not comply with the rule.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The basic service prefixes are classified into two types:

s :h
Intra-office prefix: used for intra-office and outer-office users to call intra-office

r c e
users. For example, if the intra-office number ranges from 8000 to 8099, you can
set the intra-office prefix to 8. When calling an intra-office user, you can simply dial

ou
the user number such as 8008.

es
Outgoing prefix: used for intra-office users to make outgoing calls, such as national
R

g
and international toll calls. For example, an outer-office user number is 12345678. If

n
ni
an intra-office user wants to dial 912345678 to call the outer-office user, the

a r
outgoing prefix 9 needs to be set. The number conversion rule is that the first digit

L e of the called number is deleted.

e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Why do we convert the calling number?
t t

s :h
Generally, the numbers assigned by PBX are short number or extension number

r c e
which are only valid inside the office but can not be recognized by PSTN. In this
case, when initializing an PSTN outgoing call, system need to convert the private

ou
extension number to public PSTN number. Otherwise, the call will be rejected.

es
Why do we convert the called number?
R

n g
Employees are usually required to dial a “0” or “9” followed by the actual called

ni
number.Thus the called number with “0”and “9” can not be recognized by the

a r
PSTN. So the system need to delete the “0” and “9” before sending it out.

L e
e
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
In this scenario, two number conversion modes are adopted, the number change and the

:h
long number and short number.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Number Change : This topic describes how to define the number change rules for

:h
modifying, inserting, and deleting calling or called numbers.


e s
Long Number and Short Number : A user has two numbers: a short number and a long

r c
number allocated by the PSTN. The short number is used for the calls between intra-office

ou
users. The long number is displayed when you make an outgoing call or is used for outer-

es
office users' direct dialing in.
R

n g
Number Mapping :The number mapping is used to implement irregular number changes.

ni
 The priorities of the three number change modes are long number and short number,

a r
number mapping, and number change in descending order. If a user meets the conditions

L e
of the three number change modes, only the mode with the highest priority is used. If the

euser has a long number, the long number is displayed on the phone of the called party.

or The user who does not set the long number can use the mapping number if it is set. The

M user who does not set the long number and number mapping uses the changed number.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Number Change
t t
 modify
s :h
 Insert
r c e
 Delete
ou
 Number mapping
es
R

n g
Long number and short number

r ni
The priorities of the three number change modes are long number and short number,

a
number mapping, and number change in descending order. If a user meets the conditions
e
e L
of the three number change modes, only the mode with the highest priority is used. If the

or
user has a long number, the long number is displayed on the phone of the called party.
The user who does not set the long number can use the mapping number if it is set. The

M user who does not set the long number and number mapping uses the changed number.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Office route
t t

s :h
There are direct channels between office A and office B and between office A and

r c e
office C; therefore, both office B and office C are office routes of office A. There is
no direct channel between office A and office D; therefore, office D is not an office
route of office A.
ou
es
The U1900 uses the office route number to uniquely identify an office route. For
R

g
example, the office route number from office A to office B is 1 and from office A to

n
ni
office C is 2.


a r
Sub-route

L e
 If a direct channel or an alternative channel is available between two exchange
e
or
offices, there is a sub-route between the two exchange offices. For example, there
are two sub-routes between office A and office B. Sub-route 1 is a direct sub-route
M and can connect office A and office B directly without any convergence connections.

 Route

 A route is the group of sub-routes between two offices. A route contains one or
more sub-routes and different routes may contain the same sub-route. For example,
the route between office A and office B contains sub-routes 1 and 2 while there is
only sub-route 2 between office A and office D.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Route policy: time-based routing, routing based on charging rate, default route.

s :h
You can configure the time segment and charge rate for each office direction (route).

c e
The system can dynamically and intelligently sort and prioritize office directions (routes)
r
u
based on specified routing policies. The system also attempts to call peer ends one by one.

o

es
Pay attention to the following points:

R
You are advised to bind each office route ID to a unique office route selection code.
g

ni n
If multiple office route IDs are bound to the same office route selection code, all

r
office route records under the office route selection code are added to the routing

e a table on the U1981 unified gateway when you configure the route analysis function,

e L which may cause that the routing table becomes full.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
SS7 is a common channel signaling system that complies with international standards. It

:h
has the following advantages: High speed transmission, Large signaling capacity, Powerful

s
functionality and High flexibility and reliability.SS7 meets the requirements of the Public
e
r c
Switched Telephone Network (PSTN) and intelligent network (IN).

ou
PRA refers to the control signal between terminal devices and networks. The signaling
s

Japan). Re
structure is 30B+D (used in Europe and China) or 23B+D (used in North America and

n g
ni
 R2 is a type of channel-associated signaling. R2 was previously applicable to the

r
international telecommunication network and telecommunication networks in many
a
L e
countries. The China No.1 (CNo.1) signaling is a type of R2. R2 consists of line signaling
and register signaling. The definitions of the line signaling and register signaling, however,
e
or
vary according to the country.

M  The U1900 supports Session Initiation Protocol (SIP). Defined by the Internet Engineering
Task Force (IETF), SIP is a protocol at the application layer, which is used to set up, modify,
and end multimedia sessions on the IP network.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The following transmission protocols can be used:

s :h
User Datagram Protocol (UDP) is a connectionless protocol. It provides transaction-

r c e
oriented simple and unreliable information transmission. In UDP-based data
transmission, each datagram is independent and contains the source address and

ou
destination address. This protocol, however, is unreliable, as there is no guarantee of

es
data delivery (including the delivery time) or integrity.
R

n g
Transmission Control Protocol (TCP) is a connection-oriented protocol. In TCP-based

ni
data transmission, a virtual channel is required between the sender and receiver.

a r
Transport Layer Security (TLS) is a cryptographic protocol that provides

L e communication security between two communication application programs,

e ensuring data confidentiality and integrity. When TLS is used for interconnection

or between two devices, ensure that the two devices have the same user certificates,

M user private keys, and root certificates.


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The difference between QSIG and PRA is the control signaling.

s :h
Clock source: The clock source is configured on one device so that the peer device can

r c e
synchronize its clock with this device. The configuration of a clock source prevents the
frame slip (voice packet loss).

ou

es
If the U1900 unified gateway connects to multiple devices through E1 or T1 trunks,
configure the clock source on any of these devices. The U1981 unified gateway will
R
g
synchronize time with this device.

n
ni
 If the U1900 unified gateway provides the clock source, you do not need to

a r
configure a clock source.

L e
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 First layer: The physical layer
t t

s :h
Physical layer provides means for establishing, maintaining and releasing the physical

r c e
connection, guarantees the information transmitted on a physical circuit. Physical
layer specification refers to electrical characteristics, physical characteristics of the

ou
interface, including the connector specification for mechanical properties.

es
Second layer: The data link layer
R

n g
Link layer is on top of the physical layer provides means of establishing, maintaining

ni
and releasing of the data link. Data link layer provides features like multiplexing flow

a r
control, error detection and recovery, and information delivery. PRI Protocol's link

L e layer standard protocol is Q921.

e
or
 Third layer: the network layer

M  Network layer provides services to complete the call control features, including
circuit-switched calls and packet-switched call control, PRI protocol standard
protocols for the network layer is Q931.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Voice Data and Signaling Data Sent Through Different Channels: Signaling data sent by the

:h
U1980 unified gateway must pass through a signaling transfer point (STP). The STP

s
transfers signaling data to the PSTN switch. Voice data sent by the U1980 unified gateway
e
r c
is directly transferred to the PSTN switch through the E1 trunk. That is, voice data and

u
signaling data are sent through different channels.
o

es
Voice Data and Signaling Data Sent Through the Same Channel: The U1980 unified
R
gateway needs to negotiate with the peer device to determine whether to use the ISUP or

n g
TUP trunk to connect to the peer device.

r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
An AT0 trunk is an analog circuit trunk. It uses a analog subscriber line to connect an FXO

:h
port in the local office to an FXS port in the upper-level office to implement the dedicated
line function.
e s
r c
To support concurrent incoming and outgoing calls, you can apply to the local carrier for
u

o
multiple lines, and allocate a number to each line. Based on the policy for using line
s
Re
resources, intra-office users are divided into DID users (that can occupy dedicated lines
exclusively) and non-DID users.

n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. AC;
t t
2. BC.
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Company A headquartering in Beijing, would like to deploy a small sized IPT network so as

:h
to realize the interconnection between inner users.


e s
There are three types of telephone users:

r c

ou
IP Phone users:6000-6009;

es
Analog Phone users under IAD: 6100-6109;

R
Analog Phone users under U1900: 6200-6209.
g

ni n
a r
L e
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The first number in Status Code can define the type of response. In SIP/2.0, the first

:h
number has six values, that is, it can define six types of responses in the following.

e s
1xx: Information: The request has been received and it will be processed
c

continuously.
ur

s o
2xx: Success: The action has been received, understood and accepted successfully.


Re
3xx: Redirection: Further operations are required to fulfill the call request.

n g
ni
 4xx: Client-Error: The request has syntax errors or cannot be executed by the server.

r
The client should modify the request and then resend it.

e a5xx: Server-Error: The server cannot execute the valid request due to errors.
L

e
or
 6xx: Global-Failure: Any server cannot execute the request.

Among them, 1xx response is Provision response, while other responses are Final
M

responses.
n
/e
o m
ei.c
aw
u
g .h
ni n
ar
//le
p :

t t
Analog phones are connected to specific port with analog telephone lines.

s :h
The analog phone users under IAD register to U1900 by the proxy of IAD.

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
Analog phones can not be connected to U1980 directly.

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g .h
ni n
ar
//le
p :

t t
Now we are configuring the SIP(or IP Phone)Users under U1900.

s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
Now we are configuring the SIP(or IP Phone)Users under U1900.

 IP Phone users: 6000-6009


s :h

c e
Service rights for different user right levels:
r
ou
es
R
n g
r ni
e a
e L
or
M
 Key parameter description :

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Now we are configuring analog phone (or POTS) users under IAD. The analog phone users

:h
under IAD register to U1900 by the proxy of IAD, so for U1900, all these users are
considered as SIP users.
e s
r c
Analog Phone users under IAD: 6100-6109
u

s o
Re
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Now we are configuring analog phone (or POTS) users under U1900. The analog phones

:h
are directly connected to the OSU or ASI board on U1900 using analog lines.


e s
Analog Phone users under U1900: 6200-6209

r c

ou
Key Parameter Description

es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
A call prefix is the string consisting of first few digits or all digits in called numbers. If the

:h
called number is 1234, the call prefix can be:

First digit: 1
e s
c

 First two digits: 12


ur
s o
First three digits: 123
e

R
Entire called number: 1234
g

ni n
The prefix groups configured on the U196xx unified gateway constitute a called number

r
analysis table of the system. If the called number analysis table contains multiple prefixes
a
e
for a called number, the system uses the maximum matching rule to match the called
L
e
number with a prefix during number analysis.

or  Assume that the called number is 1234 and the prefixes 1, 12, and 1234 are configured in

M the called number analysis table. According to the maximum matching rule, the system
will select the prefix 1234, which is the closest to the called number. The prefixes 1 and 12
do not comply with the rule.

 The basic service prefixes are classified into two types:

 Intra-office prefix: used for intra-office and outer-office users to call intra-office
users. For example, if the intra-office number ranges from 7000 to 7099, you can
set the intra-office prefix to 7. When calling an intra-office user, you can simply dial
the user number such as 7001.

 Outgoing prefix: used when intra-office users make outgoing calls, such as local
calls, national toll calls, or international toll calls.
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Prefix 6 is configured as short number prefix:

s :h
Config add prefix dn 6 callcategory Basic callattribute Inter cldpredeal No minlen 0
maxlen 4

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Prefix 6890 is configured as long number prefix. Parameter PSTN access should be enabled

:h
so that the internal users are accessible for outside users in PSTN.

Config add prefix


e s
dn 6890 callcategory Basic callattribute Inter cldpredeal No
c

minlen 0 maxlen 8
ur
s o
Re
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Sequential: The IP phone sends registration messages to a SIP server at intervals of half of

:h
the registration interval. If the active SIP server is fails, the IP phone registers with the

s
standby SIP server. If the standby SIP server fails, the IP phone registers with the local SIP
e
r c
server. Services are interrupted during the SIP server switch. After the IP phone registers

u
with a SIP server successfully, its services become available again.
o

es
Simultaneous: The IP phone registers with the active, standby, and local SIP servers at the
R
same time. If the active SIP server fails, the standby SIP server takes over the services. If the

n g
standby SIP server also fails, the local SIP server takes over the services. The switching

ni
takes about 3s, which cannot be perceived by users. After the switching, services are
r
a
running properly.
e
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If the SIP users on the U1900 unified gateway use POTS phones connected to an IAD, you

:h
must configure the connection data and allocate user numbers to ports on the IAD after

s
adding SIP users on the U1900 unified gateway.
e
r c
If SIP users are registered with the U19xx unified gateway through the IAD, you need to
u

o
configure the IAD data to ensure the normal connection between the IAD and the U19xx
s
Re
unified gateway after configuring SIP users on the U19xx unified gateway. Then allocate
the user numbers for the ports on the IAD.

n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Port numbers of the IAD boards map lines with different colors. For example, the blue and

:h
white twisted pair cable from the OSU in slot 1 of the IAD maps port 7. To view the

s
mapping between ports and line colors, see "Pins of the User Cable" in the IAD Product
e
Documentation.
r c
Verification
ou
s

Re
After the configuration is completed, if configured user numbers can be found, users

g
are successfully configured; otherwise, users fail to be configured.

n
ni
 Troubleshooting

a r
When a message indicating that a number exists is displayed, do not configure this
e

e L number.

or  When a message indicating license limitation is displayed, the number of configured

M users reaches the maximum number of users supported by the license.


n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. C;
t t
2. AB.
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
As business expands, company A sets a branch in Shenzhen and the extension numbers

:h
range from 8000 to 8009, which are also used to interconnect with users in HQ.


e s
Meanwhile, HQ is connected with two carriers via PRA and AT0 to realize the PSTN
outgoing calls.
r c
ou
 Requirement:
es

R
For outgoing calls, a prefix 9 should be added before each called number.

n g
ni
 9 is local prefix;

ar
 90 is DDD prefix;

L e  900 is IDD prefix.

e
or
 The long number of calling party is displayed.

M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Assume that the called number is 28970139 and the prefixes 2, 289, and 28970 are

:h
configured in the called number analysis table. According to the maximum matching rule,

s
the system will select the prefix 28970, which is the closest to the called number. The
e
r c
prefixes 2 and 289 do not comply with the rule.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 config add prefix
t t
 config delete prefix
s:h
 config modify prefix
r c e
 show prefix
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 Configure Office Route Selection Code:
t t

s :h
[%eSpace U1900(config)]#config add office selectcode no 1 repeatroute no

c e
If a direct channel is available between two exchange offices, either of the exchange
r
u
offices is the office route of the other exchange office.

o
 Sub-route:
es
R
If a direct channel or an alternative channel is available between two exchange
g

ni n
offices, there is a sub-route between the two exchange offices. The direct channel is

r
the direct sub-route while the alternative channel is the alternative sub-route.

e a
Route:
L

e
or
 A route is the group of sub-routes between two exchange offices. A route contains
one or more sub-routes and different routes may contain the same sub-route.

M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Configure Office Route
t t

s :h
[%eSpace U1900(config)]#config add office no 1 officeselectcode 1

 NOTE:
r c e

ou
You are advised to bind each office route ID to a unique office route selection code.

s
If multiple office route IDs are bound to the same office route selection code, all
e
R
office route records under the office route selection code are added to the routing

g
table on the U1980 unified gateway when you configure the route analysis function,
n
ni
which may cause that the routing table becomes full.

a r
The Media stream encryption parameter indicates whether to encrypt RTP media
e

e L streams to ensure data security.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Configure intra-office prefixes and outgoing prefixes for U19xx unified gateway users so

:h
that U1900 unified gateway users (intra-office users) can make calls with each other or to
external users.
e s
r c
A call prefix is the string consisting of first few digits or all digits in called numbers. If the
u

o
called number is 1234, the call prefix can be:
s
 First digit: 1
Re

n g
First two digits: 12

r ni
First three digits: 123

e a Entire called number: 1234


L

e
or
 The prefix groups configured on the U1980 unified gateway constitute a called number
analysis table of the system. If the called number analysis table contains multiple prefixes

M for a called number, the system uses the maximum matching rule to match the called
number with a prefix during number analysis.

 Assume that the called number is 1234 and the prefixes 1, 12, and 1234 are configured in
the called number analysis table. According to the maximum matching rule, the system
will select the prefix 1234, which is the closest to the called number. The prefixes 1 and 12
do not comply with the rule.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The basic service prefixes are classified into two types:

s :h
Intra-office prefix: used for intra-office and outer-office users to call intra-office

r c e
users. For example, if the intra-office number ranges from 7000 to 7099, you can
set the intra-office prefix to 7. When calling an intra-office user, you can simply dial

ou
the user number such as 7001.

es
Outgoing prefix: used when intra-office users make outgoing calls, such as local
R

g
calls, national toll calls, or international toll calls.

n
ni
 Configure inter-office short number prefix:

a r
config add prefix dn 8 callcategory basic callattribute local cldpredeal no
e

e L officeselectcode 1 minlen 4 maxlen 4 if4pstnprefix no

or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
HQ is connected to two carriers via PRA and AT0 to realize the PSTN outgoing calls.

 Requirement:
s :h

c e
For outgoing calls, a prefix 9 should be added before each called number.
r

ou
9 is local prefix;

es
90 is DDD prefix;
R

n g
900 is IDD prefix.

r ni
The long number of calling party is displayed.

e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Key Parameter Description:
t t

s :h
config add office selectcode no 2 repeatroute No
Parameter

r c e Description
Office route selection
policy
ou Policy indicating which trunk is used when multiple trunks
are available between two offices.

es
Failure Processing Index Index that allows the standby office route selection code
R policy to be used when the active office route selection

n g code policy fails.

r ni
Whether to send the Indicates whether to play the two-stage dialing tone to a

e a
two-stage dialing tone user when the user dials an outgoing prefix. To play the

e L two-stage dialing tone, set this parameter to Yes.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Configure office route :
t t

s :h
config add office no 2 officeselectcode 2

 NOTE:
r c e

ou
You are advised to bind each office route ID to a unique office route selection code.

s
If multiple office route IDs are bound to the same office route selection code, all
e
R
office route records under the office route selection code are added to the routing

g
table on the U1980 unified gateway when you configure the route analysis function,
n
ni
which may cause that the routing table becomes full.

a r
The Media stream encryption parameter indicates whether to encrypt RTP media
e

e L streams to ensure data security.

or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Configure the number change index 0, deleting the first digit 9 of called number.

s :h
config add predeal index 0 changetype delete changepos 0 changelen 1

c e
The priorities of the three number change modes are long number and short number,
r
u
number mapping, and number change in descending order. If a user meets the conditions

o
es
of the three number change modes, only the mode with the highest priority is used. If the
user has a long number, the long number is displayed on the phone of the called party.
R
g
The user who does not set the long number can use the mapping number if it is set. The

n
ni
user who does not set the long number and number mapping uses the changed number.

a r
L e
e
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 Configure local outgoing call:
t t

s :h
[%eSpace U1900(config)]#config add prefix dn 9 callcategory basic callattribute

r c e
local cldpredeal yes cldindex 0 officeselectcode 2

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 Configure DDD prefix:
t t

s :h
[%eSpace U1900(config)]#config add prefix dn 90 callcategory basic callattribute

r c e
ddd cldpredeal yes cldindex 0 officeselectcode 2

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Configure IDD prefix:
t t

s :h
[%eSpace U1900(config)]#config add prefix dn 900 callcategory basic callattribute

r c e
idd cldpredeal yes cldindex 0 officeselectcode 2

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
SS7 is a common channel signaling system that complies with international standards. It

:h
has the following advantages: High speed transmission, Large signaling capacity, Powerful

s
functionality and High flexibility and reliability.
e
r c
SS7 meets the requirements of the Public Switched Telephone Network (PSTN) and
u

o
intelligent network (IN).
s

Re
PRA refers to the control signal between terminal devices and networks. The signaling

g
structure is 30B+D (used in Europe and China) or 23B+D (used in North America and

n
ni
Japan).


a r
R2 is a type of channel-associated signaling. R2 was previously applicable to the

L e
international telecommunication network and telecommunication networks in many

ecountries. The China No.1 (CNo.1) signaling is a type of R2. R2 consists of line signaling

or and register signaling. The definitions of the line signaling and register signaling, however,

M 
vary according to the country.

The U1900 supports Session Initiation Protocol (SIP).

 Defined by the Internet Engineering Task Force (IETF), SIP is a protocol at the
application layer, which is used to set up, modify, and end multimedia sessions on
the IP network.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The following transmission protocols can be used for U1900 unified gateway.
Protocol
s :h
Description Local Port

r c e
A connectionless transport layer protocol
that provides a simple but unreliable
5060 (mandatory)

u
transaction-oriented information
o
UDP
es
transmission service. UDP features less
resource consumption and higher
R
processing speed, but does not guarantee

n g that data packets can be sent to the

ni
destination safely and completely.

a r A connection-oriented, reliable IP-based 5061 (recommended)

L e transport layer protocol. The processing


speed of TCP is lower than that of UDP, but
e
or
TCP TCP supports retransmission of lost packets
and data verification to ensure that data
M packets can be sent to the destination safely
and completely.
A cryptographic protocol that provides 5062 or 5063
communication security between two (recommended)
TLS
communication application programs,
ensuring data confidentiality and integrity.
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Set peer device domain name to U1911, IP address to 10.77.194.45, and number of calls

:h
that a trunk can bear to 20.

e s
config add peercomponent domainname U1911 ip 10.77.194.45 tkcnum 20
c


ur
Set the office route number to 1, peer device domain name to U1911,the peer port of sip

s o
protocol to 5060, and number of calls that a trunk can bear to 20.


Re
config protocol sip officeno 1 domainname U1911 peerport 5060 maxcallnum 20

n g
ni
 Key parameters

ar
Parameter Description

Le
Domain Domain name that uniquely identifies a peer device. This parameter is
name of the mandatory, and the domain name must be unique.

r e peer device
o Transmission There are four types: UDP, TCP. TLSServer and TLSClient.
M protocol type NOTE: If you want to encrypt signaling using TLS, configure the
communication parties as TLSServer and TLSClient respectively.
Select office ID of the office route that a SIP trunk belongs to.
route number
Maximum Maximum number of calls on a SIP trunk. If the number of incoming
number of and outgoing calls routed through a SIP trunk exceeds the maximum
restricted number, the system automatically rejects new calls.
calls
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
ISDN User / network interface in a large number of interface solutions. Uses two types of

:h
interfaces.

e s
BRI: Basic Rate Interface, ie 2B + D and B are the 64kbps rate of the digital channel,
c

r
D is 16kbps digital channel.
u

s o
PRI: Primary Rate Interface, 30B + D or 23B + D, B and D are 64kbps digital channel.

Re
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Insert an MTU to slot 2, set the office route number to 2, and set the signaling type to

:h
PRA:

e s
config add board slot 2 type mtu officeno 2
c


ur
Add a PRA link. Set the link number to 0, slot number to 2, E1 port number to 1. Set the

s o
link position to user. This parameter must be set through negotiations with the peer
device.
Re

n g
config add pralink linkno 0 slot 2 trunkport 1 position user

r ni
Configure the clock source:

e a config system clocksource primaryslot 2 primarye1 1


L

e
or
Parameter Description
Position Position in a PRA link. The options are User Side and Network Side.
M Link
Timeslot
Circuit ID of a link, which specifies the timeslot in the E1 or T1 link of a
PRA trunk.
When E1 is used, this parameter can be set only to 16.
When T1 is used, the value of this parameter is an integer ranging from 1
to 24.
CRC CRC is a data verification mechanism. The values of the local office and
peer office must be the same. If the peer office enables the CRC, set this
parameter to Yes.
Whether to Indicates whether to play an announcement based on the returned cause
send the code when you hang up.
abnormal If this parameter is set to No, the system plays a tone when you hang up.
tone The default value is Yes.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The clock source is configured on one device so that the peer device can synchronize its

:h
clock with this device. The configuration of a clock source prevents the frame slip (voice
packet loss).
e s
r c
If the U1900 unified gateway connects to multiple devices through E1 or T1 trunks,
u

o
configure the clock source on any of these devices. The U1900 unified gateway will
s
e
synchronize time with this device.
R

n g
If the U1900 unified gateway provides the clock source, you do not need to

ni
configure a clock source.

ar
Parameter Description

L e
Select clock Select Local device if the local device is used as the clock source. Select

esource Peer device and configure the clock source if the clock of the peer device

or
is used as the clock source.

M Active clock
slot No
Slot of the board that uses the QSIG trunk for interconnection.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
An AT0 trunk is an analog circuit trunk. It uses a analog subscriber line to connect an FXO

:h
port in the local office to an FXS port in the upper-level office to implement the dedicated
line function.
e s
r c
To support concurrent incoming and outgoing calls, you can apply to the local carrier for
u

o
multiple lines, and allocate a number to each line. Based on the policy for using line
s
Re
resources, intra-office users are divided into DID users (that can occupy dedicated lines
exclusively) and non-DID users.

n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 The requirement:
t t

s :h
Configure DDI(Direct Dial-In), to bind the DDI user with a specific AT0 line.

c e
Configure the incoming call to transfer to Switch Board by default. Non-DDI calls will
r
u
be transferred to a preset number which is usually Switch Board number.

o

es
The calling party can dial the PSTN number corresponding to a dedicated line to directly

R
call a DID user, or dial PSTN numbers corresponding to other lines to call any intra-office

g
users through the automatic switchboard.
n

r ni
When a DID user makes an outgoing call, the call must be routed through the dedicated

a
line of the user. When a non-DID user makes an outgoing call, the system selects a line
e
e L
from other lines to route the call based on the line selection rule.

or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. A;
t t
2. B.
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Outgoing call;
t t
 Display the long number of caller;
s :h

c e
The caller without long number shows switchboard number 68908888;
r

ou
Delete the first digit “9” of the called number.

es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If a user meets the conditions of the three number change modes, only the mode with the

:h
highest priority is used.

e s
If the user has a long number, the long number is displayed on the phone of the
c

called party.
ur

s o
The user who does not set the long number can use the mapping number if it is set.


Re
The user who does not set the long number and number mapping uses the changed
number.
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Configure long number & short number:
t t

s :h
Config add subscriber eid 6000 dn 6000 longdn 68906000 Dnstep 1 number 10

c e
A user has two numbers: a short number and a long number allocated by the PSTN. The
r
u
short number is used for the calls between intra-office users. The long number is displayed

o
s
when you make an outgoing call or is used for outer-office users' direct dialing in.
e
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Configure prefix 6890 for long number so that outer-office users can directly dial in.

s :h
Config add prefix dn 6890 callcategory Basic callattribute Inter cldpredeal No

r c e
uselongcli Yes If4pstnprefix Yes

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Configure prefix 9. If the user who dials prefix 9 has a long number, the long number is

:h
displayed on the phone of the called user.


e s
Similarly, when configuring DDD prefix 90 and IDD prefix 900, “display long calling

r c
number”need to be set as yes.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
// le
p :
 Configure number mapping:
t t

s :h
Config add numbermap innernum 6010 externnum 68906543

c e
The number mapping is used to implement irregular number conversion.
r
 Procedure
ou
es
Login on to the U1960 web configuration page.
R

n g
Choose Trunk > Office Route Configuration.

r ni
Click Number mapping.

e aClick Create.

e L Configure the number mapping for user 6010.

or

 Key parameters:

M Parameter Description
Internal number Short number used in an intra-office call.
External number Long number allocated by the carrier.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Index 0: The first digit of the number is deleted.

s :h
Index 1: The entire number is changed to 68908888.

c e
Index 2: The prefix 5 is added to the number.
r

ou
Number change method that specifies the way that the system uses to change the

s
calling or called numbers. The options are as follows: Change Number Change a
e
R
specified string in the original number.

n g
ni
 Delete Number Delete a specified string from the original number.

a r
Insert Number Add a string to a specified position in the original number.

L e
 Insert by Length Add a string to a specified position in the original number based on

e
or
the number length.

Change by Length Change a specified string in the original number based on the
M

number length.

 Delete by Length Delete a specified string from the original number based on the
number length.

 Insert by Call Source If a number is within a specified call source, prefix the area
code of the call source to the number.
 Key parameter description:
Parameter Description
Number change Unique index of a number change rule.
index
Change type •Number change method that specifies the way that the system uses to
change the calling or called numbers. The options are as follows: Change
Number Change a specified string in the original number.
•Delete Number Delete a specified string from the original number.
•Insert Number Add a string to a specified position in the original number.
n
/e
•Insert by Length Add a string to a specified position in the original number
based on the number length.
•Change by Length Change a specified string in the original number based
o m
on the number length.
e i.c
•Delete by Length Delete a specified string from the original number based
on the number length.
aw
Number length
u
Original number length. For example, if the original number is 9999, the
number length is 4.
g .h
Starting position

ni n
Position from which the number change begins. This parameter specifies the
position to change some digits in, add digits to, or delete digits from an

ar
original called or calling number. Digits are changed from the left in the

le
original number, and the first position code is 0.

//
New number
:
New number after the number change or inserted number.
p
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. BC。
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The intelligent routing service automatically selects office routes when an IP trunk or a

:h
TDM trunk is faulty, and provides routing polices to increase communication reliability and
minimize communication costs.
e s
r c
The intelligent routing service includes:
u

s o
Routing by time segment: Different time indexes are set for different office routes.
e
Each time index corresponds to a specified time segment (accurate to hour). Based
R
g
on the current time, the IP PBX searches for the time index for an outgoing call and

n
ni
selects the related office route.

a r
The IP PBX allows multiple office route selection codes to share one office route.

L e When an office route is added to multiple office route selection codes, multiple

e routing policies apply to the office route. The IP PBX automatically selects the

or routing policy based on the outgoing prefix that a user dials.

M  Routing by charge rate Different charge rate reference values are set for different
office routes. The IP PBX preferentially selects the office route with the lowest
charge rate reference value for outgoing calls. If all trunk circuits are busy for this
office route, the IP PBX selects the office route with the second lowest charge rate
reference value.
 Rerouting upon a routing failure :When a call fails to be routed based on the office
route selection code, the IP PBX selects a new route based on the standby office
route selection code corresponding to the failure processing index.

 Route load balancing :The IP PBX balances traffic among multiple preset routes.
The IP PBX elects office routes based on office route IDs in ascending order till an
office route that contains idle circuits is found. The later calls will elect from the next
office route after an office route is selected by the preceding call.

n
/e
 Routing by percentage :Different percentages are set for different office routes.

m
The IP PBX selects office routes in turn based on the preset percentages. Except the
office routes whose percentages are set to 100%, office routes are polled based on
o
preset percentages in descending order.
e i.c

aw
Routing by user right level :Different office routes are set for different user right

u
levels. When a higher-right-level user makes an outgoing call, the IP PBX

.h
preferentially selects the office route that is set for the user right level. If selecting
g
n
the office route fails, the IP PBX selects the office route that is set for a lower user

ni
r
right level.

le a
When routing by user right level is used, the IP PBX preferentially uses an office

//

:
route at the user right level to route calls. If no circuit is idle, the office route that is
p
t
set for a lower user right level is used. Office routes that are set for the same level
t
:h
are elected based on office route IDs in ascending order. To ensure good voice

s
quality of calls for higher-right-level users, these users are allocated with high-
e
c
performance office routes. Lower-right-level users, however, are not allowed to use
r
u
these office routes.
o

es
Trunk link balancing The IP PBX preferentially selects a trunk with more idle circuits

R
to balance loads among available trunk links.

n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
When the call fails to be routed based on the office route selection code, select a new

:h
route based on the standby office route selection code corresponding to the failure
processing index.
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Parameter description:
t t
Parameter Description
s :h
Failure Processing Index
e
Unique index of a failure processing policy.

r c
Rerouting policy upon failure

ou
Failure selection policy used by a failure processing index.
Selection node of Standby
office route
es Office route selection policy used for rerouting.

R
Called number change

i n
Calling number change
g Indicates whether to change the called number after rerouting.
Indicates whether to change the calling number after rerouting.

r n
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Policy for selecting among office routes with the same office route selection code. The

:h
options are as follows:

e s
None : Office routes are polled based on office route IDs in ascending order until an
c

r
office route that contains idle circuits is found.
u

s o
By Time : Office routes are polled based on office route IDs in ascending order until
e
an office route that is valid at the current system time and contains idle circuits is
R
found.

n g
ni
 By Charging Rate: Office routes are polled based on charging rates in ascending

a r
order until an office route that contains idle circuits is found. Office routes with the

L e same charging rate are polled based on office route IDs in ascending order. If no idle

e circuit is found, office routes configured with no charge rate are polled based on

or office route IDs in ascending order until an office route that contains idle circuits is

M 
found.

By Load Sharing : Office routes are polled based on office route IDs in ascending
order until an office route that contains idle circuits is found. The later calls will poll
office routes from the next office route after an office route is selected by the
preceding call.
 By Load Sharing Percentage: Except the office routes whose load percentages are
set to 100%, office routes are polled based on the load percentages in descending
order.

 User Level : Office routes are polled based on user priorities in ascending order until
an office route that contains idle circuits and has an equal or lower user priority is
found. Office routes with the same charging rate are polled based on office route
IDs in ascending order.

n
/e
 Load Balancing: Office routes are polled based on office route IDs in ascending

m
order until an office route that contains the maximum number of idle circuits is
found.
o
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The U1900 polls office routes based on the office route ID in ascending order until an

:h
office route that contains idle circuits is found. Subsequent calls will poll from the next

s
office route after the office route that is selected by the preceding call.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Configure office route selection policy
t t

s :h
config add office selectcode no 1 repeatroute no selecttype loadshare

c e
Configure the office route selection code.
r

ou
Set the office route selection code to 1. Office route selection code 1 selects office

s
routes based on load balancing.
e
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 Configure the office route
t t

s :h
Office route 0 is used for the PRA trunk, with office route selection code being 1

c e
Office route 1 is used for the ISUP trunk, with office route selection code being 1
r
 Configure office route
ou
es
config add office no 0 officeselectcode 1
R

n g
config add office no 1 officeselectcode 1

r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. C.
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
This feature applies to UC terminals of all types.

s :h
IVR processes and announcements can be customized. A maximum of 10 levels of IVR

r c e
menus are supported. The keys for repeatedly listening to an IVR menu and for forwarding
a call to a voice mailbox are configurable. Different announcements can be played within
different time segments.
ou
es
The U1900 series unified gateway supports a maximum of 256 automatic switchboards
R

g
and 245 customized scripts. A maximum of 246 notifications can be recorded. Among

n
ni
these notifications, one is for the default automatic switchboard, and the other 245 are for

r
the customized automatic switchboard. Each customized switchboard can have one
a
e
notification. The maximum duration for a single IVR file is:
L
e U1981/U1960/U1911: 300 seconds

or

U1980/U1930/U1910: 32 seconds
M

 NOTE:

 For a U1980/U1930/U1910 unified gateway, you can load custom announcements


only by uploading the voice.zip file, instead of using the web system to record
custom announcements or using an IP phone to record custom announcements or
notifications.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Typical Scenario of the VU Service
t t

s :h
After the automatic switchboard is configured, outer-office users hear "Thanks for

r c e
calling XX. Please dial the extension number. For the agent service, dial 0."when
dialing the automatic switchboard number.The customer dials 0 for the agent

ou
service. The customer dials an extension number to reach the desired enterprise
user.
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Generally, the unified gateway at the central node plays the welcome announcement and

:h
IVR menus for the calling party who makes calls to the automatic switchboard. In the

s
centralized network scenario, if a branch deploys a local node, the administrator can
e
r c
configure the local node to play announcements and collect digits for the switchboard.

u
This helps save the bandwidth from the central node to the local node. When a PSTN user
o
s
connects to the automatic switchboard from the local node, the local node plays the
e
R
switchboard announcements and collects digits for the switchboard

n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Prerequisites
t t

s :h
Numbers have been allocated to intra-office users on the unified gateway.

c e
The trunk that connects to other devices has been configured.
r

ou
When an external user dials the automatic switchboard number, the user hears the

s
announcement "Please dial the extension number." The user enters the extension number.
e
R
Then, the call is routed to the user inside the enterprise.

n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
VU scripts of the automatic switchboard have been pre-configured into the system by

:h
default. Users can configure the automatic switchboard access code to enable automatic
switchboard functions.
e s
r c
Use an administrator account to log in to the web management system of a U1900 series
u

unified gateway.
s o

Re
Configure an automatic switchboard access code.

n g
Choose Trunk Management > Prefix Configuration.

r ni
Click Create.

e aConfigure prefix 28887888.


L

e
or
 NOTE:

The automatic switchboard access code (28887888 in this example) must be


M

different from user numbers. If the automatic switchboard access code is the same
as a user number, the call to the number is routed to the user, not the switchboard.

 Key parameters:

 VU loop Whether the switchboard prompt tone is


returned again when the switchboard cannot be called

 VU outgoing right Whether the switchboard can forward calls to


external extensions. To prevent intra-office users from dialing the switchboard to
make toll calls, it is recommended that you do not set it to DDD or IDD.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Recording and loading a single voice file: using an IP phone to record

s :h
For U1911/U1960/U1981, if you do not have a high requirement on the audio

r c e
quality and need to modify custom announcements frequently, you can use a phone
to record custom announcements in real time. Recorded custom announcements

ou
will be automatically loaded to the unified gateway.

es
A user can dial the automatic switchboard number and the recording prefix to
R

g
record a notification. After a notification is recorded, it is played prior to the

n
ni
automatic switchboard announcement when a user dials the automatic switchboard

a r
number.

L e
Recording and loading a single voice file: using dedicated recording software to record

e
or
 When U1911/U1960/U1981 is used, it is recommended that dedicated recording
software be used to record voice files if you have a high requirement on the audio
M quality and the voice files seldom change.

 Customizing and loading multiple voice files

 U1911/U1960/U1981/U1980/U1930/U1910 allows you to upload a package to


replace customized voice files. For U1980/U1930/U1910, you must this method to
load voice files.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The audio files must meet the following requirements. If the format is incorrect, audio files

:h
cannot be played.

The codec is G.711a.


e s
c

ur
The announcement recorded is in mono.pcm or .wav format.

s o
The sampling rate is 8 kHz, and the sample precision is 8 bits.
e

R
The duration does not exceed 5 minutes, and the size does not exceed 2.5 MB.
g

ni n
Audio files must be named after voice channel ID, for example, 252.pcm.

a r
The length of the audio file name plus suffix name cannot exceed 128 bytes.
e

e L Otherwise, an error will occur when loading audio files through the web

or
management system.

After being loaded, custom announcements are stored in the SD card of the SCUB. Every
M

time the MTUB restarts or a new MTUB is added, the MTUB reads all custom
announcements from the SD card of the SCUB, The synchronization process takes about 1
minute and the announcements take effect immediately.

 Custom announcements can be loaded only if SCUB boards exist on the unified gateway
and SD cards can be inserted into the SCUB boards.
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 NOTE:
t t

s :h
Custom announcements can also be packaged into voice.zip, but the format and

r c e
size of audio files for custom announcements must meet the format and size
requirements on default announcements.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :
 Loading Audio Files
t t

s :h
Use an administrator account to log in to the web management system of a U1900
series unified gateway.

r c e

ou
Choose System > Voice File Management.

es
Click Create to add a voice file and click OK.

Verification R
g

ni n
Dial #79*N# as a user who has the agent rights to verify that the announcement for

a r
voice channel N is the recorded custom announcement. An agent can hear the

L e announcements for all voice channels.

e
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
(Optional) Configuring the Time Segment Index

s :h
The system supports period-specific automatic switchboard for playing different

r c e
announcements at different time segments. Skip this section if period-specific
automatic switchboard is not required.

ou

es
Use an administrator account to log in to the web management system of a U1900
series unified gateway.
R

n g
Choose System > VU Management > Time index.

 NOTE:
r ni
e aDo not create two time segment policies that have the same time segment. If such
L

e
policies exist, announcement may encounter exceptions if users dial the

or corresponding automatic switchboard number within that time segment.

M  If two time segments overlap, the automatic switchboard corresponding to holidays


is preferentially used among all the overlapping time segments. If the overlapping
time segments all belong to holidays or all do not belong to holidays, the automatic
switchboard corresponding to the time segment that has a smallest index is
preferentially used.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Use an administrator account to log in to the web management system of a U1900 series

:h
unified gateway.


e s
Choose System > VU Management > Customized automatic switchboard Configuration.

r c
 Click Create.

ou
es
R
If the automatic switchboard is not required to play announcements by time segment, you
g

ni n
only need to set the first time segment. Set the values of the other Time segment fields

r
to none.

e a
If multi-level voice menus are not required, you do not need to click Create menu to set
L

e
related parameters.

or  By default, the system allows users to press * to return to the previous menu and press #

M to return to the root menu. No additional configuration is required.

 Several automatic switchboard can share one console.


Parameter Description

Script name Name of the script that is generated after the automatic switchboard is configured. The
script name is user-defined. The script can be downloaded so that it can be load to
another automatic switchboard to implement the same functions as this automatic
switchboard.
Extension number Maximum length of an extension number when a call is forwarded from the automatic
length switchboard to an extension.
Inter-digit timeout Interval between two dialing attempts. If the interval between a user's two conseutive
time dialing attempts reaches this duration or if the user performs no operation within this
n
duration after the system plays an announcement, the system determines that the
/e
m
dialing ends or the operation times out.

o
i.c
Play voice interval Duration after which the system determines a dialing timeout and plays an
announcement again because no operation is performed within this duration. If no digit

value of Play count, the system releases the call.


w e
is dialed when the number of times the system plays the announcement reaches the

Prefixed number
u a
Number that the system automatically prefixes to an extension number when a user
dials the automatic switchboard number and an extension number.

g .h
Generally, you do not need to specify this number. If required in some scenarios, set
this parameter based on the data plan.

ni n
Time segment
r
Time segment used to specify the announcements and IVR menus to be played. The
a
le
time segments are set on the Time index tab page.

//
The default value is none, indicating all time segments.
Welcome voice
p :
Number of the voice channel for the welcome announcement that is played when a call

t t
is made to the automatic switchboard in the specified time segment.

:h
Menu voice Voice menus to be played after the welcome announcement is played. For example, to

s
query numbers, please dial 0. To query services, please dial 1. To switch to the manual
e
c
service, please dial 9.

r
Voice menus can be recorded separately from or together with the welcome
u
o
announcement. If you have recorded voice menus together with the welcome

s
announcement, set this parameter to none.

e
Extension not
R
•Extension support. A user can directly dial the extension number of an intra-office user

g
support to reach this user after hearing the corresponding announcement.

ni n
Extension support •Extension not support. A user can only dial a menu code to access a lower-level menu
after hearing the corresponding announcement.
Play count
a r Times an announcement is replayed upon an incorrect user input.

L e
e
Create menu Click to create a lower-level menu.

or
M
Parameter Description

Description of menu items •0–9, *, #, T/O, Failure transferred. When configuring submenu processes for
an automatic switchboard, define the system response process when a user
presses a single key (digits from 0 to 9, *, or #) and define the system response
process upon situations such as a user operation timeout or a call transfer
failure.
•NOTE:By default, the system allows users to press * to return to the previous
menu and press # to return to the root menu. If you have redefined the
functions for the two keys in the submenus, the new definitions take effect.
•Switch to assigned number. After a user presses this key, the system forwards
n
a call to a preset number, for example, a SoftConsole access number or a
/e
manual service number.

o
•Play voice. When a user presses this key, the system plays the announcementm
i.c
corresponding to a specified channel number, for example, the introduction to
an enterprise.

w e
•Switch to voice mailbox. When a user presses this key, the system forwards a
call to a voice mailbox.

u a
.h
If this parameter is empty, the system plays an announcement
notifying that the user is being redirected to a process for
g
leaving a voice message and prompts the user to enter the user
n
ni
number to which a voice message is left. Then the user enters


ar
the process for leaving a voice message.
If a user number for a public voice mailbox is entered, the

// le
system plays an announcement notifying that the user is being

p :
redirected to a process for leaving a voice message and then
directly enters the process.

t t
•Before setting this parameter, configure the voice mailbox service and ensure

:h
that the voice mailbox permission has been granted to related users.

s
•Get voice message. When a user presses this key, a call is forwarded to a

r c e
preset voice mailbox access prefix. Then the user enters the process for
retrieving voice messages. The user can retrieve voice messages as prompted.

u
•Before setting this parameter, configure the voice mailbox service and ensure

o
s
that the voice mailbox permission has been granted to related users.

Re
•Switch to sub menu. Select this option if you need to create sub menus. You
can also specify the channel numbers for playing sub menu announcements to

n g notify users of the sub menus.

ni
•Before setting this parameter, configure the voice mailbox.
•Go back to previous menu. When a user presses this key, the system plays the

a r announcement for returning to the previous menu.

L e •Replay the menu voice. When a user presses this key, the system repeatedly
plays the announcement for a menu.

e
or
•Transfer calls to the extension. When a user presses this key, the system
allows the user to dial an extension number.

M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
click an icon in the Operation column next to a script name to modify or download a script

:h
file. The downloaded script file can be uploaded to this device or another device.

 NOTE:
e s
r c

ou
The following takes a .cfg script file that is customized on the web management

es
system for an automatic switchboard as an example. The script files that you upload
or download on the Script Management page are all service VU and IVR script files
R
g
supported by the system, for example, the script file for the VMS. The script files are

n
ni
in .txt format.

a r
L e
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Use an administrator account to log in to the web management system of a U1900 series

:h
unified gateway.


e s
Choose Trunk Management > Prefix Configuration.

r c
 Click Create.

ou
 NOTE:
es
R
The access code (28887888 in this example) must be different from user numbers. If
g

ni n
the access code is the same as a user number, the call to the number is routed to

r
the user, not the switchboard

e a
Verification
L

e
or
 Verify the period-specific automatic switchboard service configuration by dialing the
automatic switchboard number.

M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The system will play the automatic switchboard prompt tone when a user fails to call

:h
someone by dialing an extension number through the switchboard.

e s
Use an administrator account to log in to the web management system of a U1900
c

r
series unified gateway.
u

s o
Choose Trunk > Prefix Configuration.


Re
Create the automatic switchboard prefix and set VU cyclic parameters.

n g
ni
 Verification

ar
 Make a call to the automatic switchboard. Pick up the phone and dial automatic

Le
switchboard number 28887888. The call is connected and the announcement

e
"Please dial the extension number" is played.

o r  Make a call to an extension number. Dial an extension number 81000 as

M prompted. The call fails and the announcement "Please dial the extension
number" is played.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 Verification
t t

s :h
Make a call to an extension number. Pick up the phone and dial 2888788881000.
The call is connected.

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. B.
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
// le
p :

t t
Upon completion of this course, you will be able to:

s :h
Understand the voice mailbox function.

r c e
Understand the Huawei voice mailbox features.

ou
Master the basic service configuration of VMS.
s

Re
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g .h
ni n
ar
//le
p :

t t
U1980 can not support the Built-in Voice Mailbox Services function.

s :h
The voice mailbox feature requires the corresponding license, and the number of

r c e
concurrent messages is limited by the license.

ou
Built-in voice mailbox specifications

Model
es Maximum Number of Maximum Number of

R Voice Mailbox Users Concurrent Messages

n g
ni
U1911 100 12

a r U1960 1000 30

L e
e U1981 1200 30

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Users can leave, retrieve, delete, and play voice messages and customize greetings. If a

:h
phone has a message indicator, the indicator turns on when a voice message is received.


e s
Voice mailbox services include call transfer to voice mailbox unconditional (CTVMU), call

r c
transfer to voice mailbox on no reply (CTVMNR), call transfer to voice mailbox on busy

ou
(CTVMB), call transfer to voice mailbox offline (CTVMO).

es
Call transfer to voice mailbox unconditional (CTVMU) service: A service that allows all the
R

g
calls to a registered user to be forwarded to the UMS unconditionally. Then, the caller can

n
ni
leave messages according to prompts.


a r
Call transfer to voice mailbox on no reply (CTVMNR) service: A service that allows a call to

L e
a registered user to be forwarded automatically to the UMS if this user does not answer

ethe call within 20 seconds. Then, the caller can leave messages according to prompts.

or  Call transfer to voice message on busy (CTVMB) service: A service that allows a call to a
M registered user to be forwarded automatically to the UMS if this user is busy. Then, the
caller can leave messages according to prompts.

 Call transfer to voice mailbox offline (CTVMO: If a user activates the call transfer to voice
mailbox on offline (CTVMO) service, incoming calls are transferred to the user's voice
mailbox if the user is offline. Calling parties can leave voice messages as prompted.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :
 NOTE:
t t

s :h
The value of Number of VMS Channels refers to the maximum number of calls that

r c e
can be processed at a time for the voice mailbox services, and must be set based on
the license information obtained in last step.

ou

es
On each MTU board, the value of Number of VMS Channels must be the same as
the value of Voice Mail nums in the license.
R

n g
The concurrent VMS channel is limited by the U1900 license, the SD card in MTU

ni
board is just used to store the voice data.

a r
Le
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Verify the number of SD cards.
t t

s :h
Messages in the voice mailbox service are stored in the SD card of the MTU. Only

r c e
one SD card can be installed on each MTU board, and the SD card must be installed
in slot SD0. The storage space required for voice messages can be calculated with

ou
the following formula: Storage space required for voice messages = [Size of PCM-

es
encoded voice data per second (8 KB) x Maximum duration of a voice message
R
(120s) + File header and index (0.1 KB)] x Maximum number of voice messages for a

n g
user (20) x Number of users. According to this formula, an 8 GB space can support

ni
the voice mailbox service for about 430 users.
r
e a Note:
L

e Information, such as the total space of the SD card, available space of the SD

or

card, and number of voice messages for intra-office users, can be viewed on

M the User > VMS Statistics page of the web management system.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 NOTE:
t t

s :h
If the scripts do not exist, load the corresponding script. Generally, it is unnecessary

r c e
to modify the preloaded VMS script. In case of any special situations, for example,
when the script is deleted, reload the script. When reloading the script, select the
VU type.
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 The scripts are already loaded by default.
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Voice message: Used to record voice messages.

s :h
VMS access code: Used to retrieve voice messages and customize personal greetings.

c e
Access the web management system, and choose Trunk > Prefix Configuration.
r

ou
Click Create, and set the prefix for leaving voice messages and VMS access code.

 NOTE:
es
R

n g
You can also run the config add prefix dn dn callcategory vu callattribute

ni
<vuvmsleavemsg | vuvmsaccesscode> cldpredeal no command to create a voice

a r
message prefix and a VMS unified access prefix, but do not

L e set ifshareprefix to yes (default value: no).

e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Voice message: Used to record voice messages.

s :h
VMS access code: Used to retrieve voice messages and customize personal greetings.

c e
Access the web management system, and choose Trunk > Prefix Configuration.
r

ou
Click Create, and set the prefix for leaving voice messages and VMS access code.

 NOTE:
es
R

n g
You can also run the config add prefix dn dn callcategory vu callattribute

ni
<vuvmsleavemsg | vuvmsaccesscode> cldpredeal no command to create a voice

a r
message prefix and a VMS unified access prefix, but do not

L e set ifshareprefix to yes (default value: no).

e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Access the web management system, and choose User > SIP User.(For a POTS user, choose

:h
User > POTS User.)


e s
Find and select the user number for which you want to enable voice mailbox services and

r
click Service Configuration.c
ou

es
Under Complex service, click Configure next to Forwarding service.


R
In the window that is displayed, find the call transfer type to be enabled, and set the
parameters
n g
 NOTE:
r ni
e a After a type of call transfer to voice mailbox service is enabled for a user, the user
L

e
must activate the service for it to take effect.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
:h
Parameter Description

e s
Order of priorities for call forwarding to phone number and

r c
call forwarding to voice mailbox. If these two services are both
Priority
ou
enabled for a user, the selected call forwarding mode prevails.

s
NOTE:

Re Users can log in to the self-service portal to adjust the


priorities of their call forwarding services.

n g Indicates whether to enable the call forwarding to voice mailbox

ni
Right
service permission of the corresponding type.

a r Voice Number of the voice mailbox created for storing voice

L e mailbox messages.

e number

or Voice Indicates whether to register the voice mailbox service of the

M mailbox
Service
corresponding type for the user. You may not register the
service for the user here. Users can register the services
themselves.
Waiting time threshold, crossing which the call forwarding on
Wait time no reply service is triggered. This parameter is available only for
call forwarding to phone number on no reply.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
CTVMU : Call transfer to voice mailbox unconditional

s :h
CTVMNR : Call transfer to voice mailbox on no reply

c e
CTVMB : Call transfer to voice mailbox on busy
r

ou
CTVMO : Call transfer to voice mailbox offline

es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The preset prefix for directly leaving voice messages is *23*. If you need to customize the

:h
prefix base on the user habit, you can create a prefix for directly leaving voice messages as
follows:
e s
r c
Access the web management system, and choose Trunk > Prefix Configuration.
u

s o
Click Create, and create prefix 91003 for directly leaving voice messages.

 NOTE:
Re
n g
ni
 You can also run the config add prefix dn dn callcategory new callattribute

r
leavemsgdirect cldpredeal no command to create a direct message prefix, but do

e a not set ifshareprefix to yes (default value: no).

e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Activating or Deactivating the Service
t t

s :h
If the service is not activated when the voice mailbox service permission is assigned to a

r c e
user, the user must activate the service for the service permission to take effect. The
service can be activated or deactivated in either of the following ways:

ou

es
Method 1: Activate or deactivate the service in the web self-service system.


R
Log in to the web self-service system.

n g
ni
 Choose Self-serviceServiceForwarding service.

ar
 Set the service priority, activate or deactivate the service, and click OK.

L e
 Method 2: Dial a prefix for activating or deactivating the service on an IP phone.

e
or
Service Type Prefix for Activating the Prefix for Deactivating the
Service Service

M CTVMU *91# #91#


CTVMNR *93# #93#
CTVMB *92# #92#
CTVMO *98# #98#
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
When entering identity verification information,

s :h
Intra-office users need to enter only the password. The intra-office users can also

r c e
press the star key (*) to retrieve voice messages for others.

ou
Outer-office users need to enter the voice mailbox user number and password.

es
When the system is playing a voice message, users can press any button to stop playing
the voice message.
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Inter: intra-office call.
t t
 Local: local call.
s:h
 DDD: national toll call.
r c e

ou
IDD: international toll call.

es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Deploy an U1900 series gateway and connect to an PSTN network.

s :h
An internal user 6000, can call an internal number 6001, also can call a local operator’s

r c e
number 28562933. This user cannot make a toll call.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
A call prefix is the string consisting of first few digits or all digits in called numbers.

s :h
Intra-office prefix: used for intra-office and outer-office users to call intra-office users. For

r c e
example, if the intra-office number ranges from 7000 to 7099, you can set the intra-office
prefix to 7. When calling an intra-office user, you can simply dial the user number such as
7001.
ou
es
Outgoing prefix: used when intra-office users make outgoing calls, such as local calls,
R

g
national toll calls, or international toll calls.

n
ni
 Configure the prefix:

a r
Log in to the web management system.
e

e L  Choose Trunk > Prefix Configuration and click Create.

or  Configure a prefix in the Create Prefix dialog box

M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Users at different right levels have different rights to make calls. Call rights can be control

:h
by time segment so that users at a level can make calls only in a specified time segment.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Different levels have different new service rights. The service rights of lower-level users are

:h
the sub rights of the service rights of higher-level users.


e s
If trunks are insufficient, reserved trunks can be used based on the preset user level.

r c

ou
If there is no available reserved trunk, higher-right-level users who make outgoing calls can

es
preempt the trunks assigned for lower-right-level users. For example, a user at the super
level can preempt trunks occupied by users at the advanced, normal, and default levels.
R
g
When the trunk of a lower-right-level user is preempted, the user hears the busy tone

n
ni
(configurable), and the call is released.

a r
L e
e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
Log in to the LMT and access the command tree.

s :h
Choose System Management > System Information from the command tree. Double-click
Config Set Workingtime.

r c e

ou
Enable and set the specific period.

es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
Log in to the LMT and access the command tree

 Set the PriorLevel.


s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The 32-level right is a customized right. When used with call prefixes, the 32-level right

:h
can prevent specified users from making calls.


e s
The blacklist and whitelist call restriction allows you to accept or reject specified calls.

r c

ou
VoIP domain call restriction is a call restriction policy for SIP users and SIP trunks. Using

s
this policy, the number of calls for each VoIP domain is restricted for bandwidth control.
e
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 9 is the local prefix.
t t

s :h
User 6000 and 6001 are the default level, but they have different call rights.

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Configure an outgoing prefix.
t t

s :h
config modify prefix dn 9 callcategory basic callattribute local cusattribute cus1

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
Login the web interface for the configuration.

s :h
Choose SIP User > User, choose a number you want to set, then click Service
Configuration.

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
Choose Outgoing call right, click Configure.

 Chosse Custom 1.
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 System blacklist and whitelist
t t

s :h
The U1900 series unified gateway adds users to different call barring groups to

r c e
control call rights.Call restriction groups include: blacklist, whitelist, and common
call barring groups. Users are added to the common call barring group by default.

ou
The administrator can add users to other groups based on actual needs

Personal blacklist es
R

n g
Users can configure their own blacklists to filter out unwanted calls. A blacklisted

ni
user will hear a call barring prompt tone.

a r
The priority of personal blacklists is lower than that of system blacklists and
e

e L whitelists.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The blacklist and whitelist call restriction allows you to accept or reject specified calls.

s :h
If the blacklist and whitelist are not configured, the default value is Ordinary.

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Add number 9168 to the called party blacklist.

s :h
config add blackandwhite dn 9168 calltype callee grouptype blackgroup

c e
Add number 6002 to the calling party whitelist.
r

ou
config add blackandwhite dn 6002 calltype caller grouptype whitegroup

es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 U1900 Blacklist and whitelist specifications
t t
s :h
Item
r c e U1910/U1911 U1930/U1960 U1980/U1981

ou
s
Maximum number of users in Maximum number of users/2

Maximum number of a e
a system blacklist or whitelist

R 1000 2500 10000

g
personal blacklist
n
r ni
Maximum of blacklists 10

a
configured by a user

L e
e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
A PIN code is a call restriction service password assigned to some users. Common users are

:h
allowed to dial the numbers with certain prefixes depending on the call rights assigned to

s
the phone numbers they use, while users with PIN codes can dial more numbers within the
e
r c
PIN-Code service rights. CDRs generated for calls with PIN code authentication record the

u
user accounts, calling numbers and called numbers corresponding to a PIN code.
o

es
After a user picks up an IP phone with the PIN-Code service right enabled and dials a
number: R
n g
ni
 If the called number prefix is required to have call right authentication, the user

a r
needs to enter the PIN code according to the announcements and make a call based

L e on the PIN-Code service right.

e If the called number prefix is not required to have call right authentication, the user

or

can directly make a call based on the call rights assigned to the phone number.

M  NOTE:

 The PIN-Code service cannot coexist with the password-based call barring service or
the simple card number service. You can run the show pwdcalllimit command to
query whether the password-based call barring service and the simple card number
service are enabled.

 Keep PIN codes secure to avoid unnecessary charge caused by unauthorized use of
the PIN codes.

 A PIN code cannot be changed by users. If you want to modify the PIN code, run
the command config modify pwdcalllimit.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The administrator in an enterprise enables the PIN-Code-based call barring service for an

:h
international toll call prefix (for example, 900) on all phones.


e s
To enable the boss to make international toll calls, the administrator configures call barring

r c
accounts and PIN codes for the boss.

ou

es
Other users can make intra-office, local, and domestic calls, but cannot make international
toll calls starting with 900.
R

n g
The boss can enter the PIN codes on any phone to make international toll calls through the

ni
IVR dialing mode. User numbers and call barring accounts used to dial phone numbers are

a r
written into call records, which can be checked by the administrator.

L e
e
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Prerequisite:Log in to the device using the LMT. Choose Command Delivery > Script

:h
Load to run the PIN-code-based call barring service script.


e s
PIN-Code Call Restriction Configuration Process:

r c
u
1. Enable the PIN-Code service;

o
s
2. Create a PIN code;
e
R
3. Enable the service for IP phone user;

n g
ni
4. Configure prefix;

a r
5. Save.

Le
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Configuration:
t t
:h
1. Choose User > Global Service > Call Restriction.
s
c e
2. On the Call restriction type, select Pin-Code and click OK to enable the Pin-Code call
r
barring service.

ou
s
3. Click Create and create a PIN-code account and password.
e
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
A user can use this account and password to make calls based on the call permission. For

:h
example, you can configure a PIN-code account for making international toll calls.

 Configuration:
e s
r c
u
1. Configure an account and password.

o
s
2. Set the Outgoing call rights as “International toll call”.
e
3. Click “OK”. R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
You can add the service permission for users in a batch. Users with PIN-code accounts and

:h
passwords can use the PIN-code-based call barring service on any phones with the service
permission enabled.
e s
Configuration:
r c
u

s o
1. Choose User > SIP User or User > POTS User.

Re
2. Choose the number for which you want to configure call barring, click Modify.

n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t
3. set Password call limit to Yes, and click OK.
t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Add the password-based call barring attribute to a prefix.

 Configuration:
s :h
c e
1. Choose Trunk > Prefix Configuration.
r
u
2. Choose the prefix for which you want to configure call barring, click Modify.
o
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t
3. set Password call limit to Yes, and click OK. For example, to restrict the
t
:h
international toll call permission, set Password call limit to Yes for prefix 900.

e s
r c
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t
In the upper right corner of the web page, click “Save Data” to save the configuration.
t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. F;
t t
2. F;
s:h
3. F;
r c e
4. BD
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Note:
t t

s :h
CDRServer doesn’t need the license to support.

c e
CDRServer doesn’t support Linux system.
r

ou
CDRServer doesn’t need to install database, it just store the CDR file on the local
disk.
es
R
Functions of devices in a CDR system:
g

ni n
Unified gateway: Generates CDRs for all users connected to it and saves the CDRs to its

a rCDR pool. The unified gateway periodically pushes CDRs to the CDRServer in an

L e unsolicited manner or upon receiving the CDRServer's request.

e CDRServer: Parses the obtained CDRs and stores them as binary files ( .bill) to a specific

or

location on the CDRServer. The CDRServer can proactively send a request to the unified

M gateway for obtaining CDRs after CDR transfer is enabled under CDR Console > Call
record transfer switch of the CDRServer.

 BMU: Obtains call records from the CDRServer through an FTPS interface, and writes the
CDRs into the database.

 The administrator can manage CDRs on the BMU, such as querying and deleting CDRs.
Enterprise users can query their own CDRs on the BMU self-service platform.

 Third-party billing system: Obtains CDR files from the CDRServer through an FTP or FTPS
interface.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 CDRServer functions
t t
s :h
Function
r
Description
c e
ou
s
Querying CDRs Users can use query CDR files from the CDRServer using any combinations of the

Re
following search criteria: calling number, called number, IP address of the device
where CDRs are generated, and CDR generation time.
Deleting
i n g
Users can delete CDR files from the CDRServer to free up disk space.

n
historical CDRs

a r
Viewing CDR pool Users can view the CDR pool status of eSpace U1911/U1960/U1980/U1981 on the

L e
information CDRServer according to the eSpace U1911/U1960/U1980/U1981 IP address.

e
Controlling CDR tran Users can set the CDR transfer status. When new CDRs are generated in

or
sfer the CDR pool of eSpace U1911/U1960/U1980/U1981, the CDRServer determines
whether to move CDRsfrom the CDR pool to the original CDR folder according to

M the CDR transfer status.


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Functions of devices in a CDR system:
t t

s :h
Unified gateway: Generates CDRs for all users connected to it and saves the CDRs to

r c e
its CDR pool. The unified gateway periodically pushes CDRs to the CDRServer in an
unsolicited manner or upon receiving the CDRServer's request.

ou

es
CDRServer: Parses the obtained CDRs and stores them as binary files ( .bill) to a
specific location on the CDRServer. The CDRServer can proactively send a request to
R
g
the unified gateway for obtaining CDRs after CDR transfer is enabled under CDR

n
ni
Console > Call record transfer switch of the CDRServer.

a r
BMU: Obtains call records from the CDRServer through an FTPS interface, and writes

L e the CDRs into the database.The administrator can manage CDRs on the BMU, such

e as querying and deleting CDRs. Enterprise users can query their own CDRs on the

or BMU self-service platform.

M  Third-party billing system(product from Yaxun Hongda is recommended) : Obtains


CDR files from the CDRServer through an FTP or FTPS interface.
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Three services are contained in the CDR Server - Running window.

s :h
MML: provides interaction between man and machines and parses interactive

searching command.
r c e
commands between the CDRServer and the Unified Gateway, such as the call record

ou

es
CDR: saves CDRs from the Unified Gateway and provides the call record searching
and call record file processing services.
R

n g
You can start or stop all services at any time.

r ni
Start all services:

e aChoose System > Start All.


L

e
or
 Stop all services:

Choose System > Stop All.


M

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The capacity of the CDR pool varies depending on the unified gateway model. For

:h
the U1980 and U1981, a maximum of 480,000 CDRs can be stored; for the U1911 and

s
U1960, the value is 50,000; for the U1910 and U1930, the value is 30,000.
e
r c
Network Type

ou
Configuration on the Unified Gateway Configuration on the
CDRServer

es
Single-node network Enable the function of generating CDR files and configure the Configure IP address of

R
CDRServer IP address on the unified gateway at a single node. all unified gateways.

n g
ni
Multi-node Enable the function of generating CDR files and configure the Configure IP address of

a r
centralized network CDRServer IP address on the unified gateway at each node.
•In normal network conditions, numbers of all branches are
all unified gateways.

L e registered with the central node, the central node routes all

e
calls, and the central node generates CDRs and send them to

or
the CDRServer. Unified gateways at branch nodes do not
generate CDRs.

M •In case of local regeneration, a branch node disconnects from


the central node. The unified gateway at the branch node
generates CDRs and buffers them in their own CDR pool. After
the network recovers, the unified gateway at the branch node
sends the buffered CDRs to the CDRServer.

Multi-node Enable the function of generating CDR files and configure the Configure IP address of
distributed network CDRServer IP address on the unified gateway at each node. all unified gateways.
(peer-to-peer)
Multi-node Enable the function of generating CDR files and configure the Configure IP address of
distributed network CDRServer IP address on the unified gateway at each node all unified gateways
(convergent) (excluding the convergent gateway). (excluding the
convergent gateway).
 After the CDR switch is turned on in a version earlier than U1900 V200R003C20, all CDR
files will be exported.

 config createbill switch on

 The CDR switch in U1900 V200R003C20 or a later version will be used to control whether
to export CDR files for internal calls. An internal call refers to a call between two numbers
registerd with the same unified gateway.

 config createbill switch on exportinterofficebill yes

n
/e
 Here, the default value of exportinterofficebill is yes, indicating that CDR files of
internal calls will be exported; and value no indicates that CDR files of internal calls
will not be exported.
o m
e i.c
w
arameter Descripti Value Default Value How to Set
on Range

u a
.h
protocol Transmis Two tls TLS is recommended.

g
sion options are The CDRServer supports TLS and TCP connections.

n
protocol available: t When the CDRServer starts, ports 2021 and 2020

ni
type. cp andtls. are enabled automatically without independent

r
configuration.
a
port Port The value •protocol = TCP:
le
It is an optional parameter.

//
:
number range is 2020

p
of the 1024- •protocol = TLS:
CDRServe 65535. 2021
t t
:h
r.

es
authtype Authenti Two AuthByPwd The parameter must be set to AuthByPwd if

c
cation options are authentication is enabled on the CDRServer. The
type.
r
available:
u
parameter can be set toNoAuth or AuthByPwd if

o
NoAuthan authentication is disabled on the CDRServer.

wd.
es
d AuthByP However, AuthByPwd is recommended to ensure
data communication security.
R
g
username User The value The same as the The value is the same as the configuration on the
name for

n i
authentic n is a string configuration on
of 1-32 the CDRServer.
CDRServer.
The default user name on the CDRServer is admin.

a r
ation. characters.

Le
password Password The value The same as the The value is the same as the configuration on the
for is a string configuration on CDRServer.

r e authentic of 1-32 the CDRServer. The default password on the CDRServer

o ation. characters. is Change_Me.

M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 1:config createbill switch off
t t

s :h
2:U1960 can support 50,000 CDRs, 50000/500/5=20 days;U1981 can support

r c e
480,000 CDRs , 480000/500/5=192 days ;

ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Follow-up operation steps:
t t
 Click “OK”.
s :h

c e
A message is displayed, prompting you to restart the CDR service for the
r
u
configuration to take effect.

o
 Click “OK”.
es
R
Close the CDR Server CDR-Running window.
g

ni n
In the CDR Server window, click “Exit” to exit the CDRServer.

a r
Start the CDRServer to make configuration take effect.
e

e L
or  Notice:

M  You need to add IP addresses of all unified gateways in a single-node, multi-node


centralized, or multi-node distributed (peer-to-peer) network.

 You need to add IP addresses of all unified gateways (excluding the convergent
gateway) in a multi-node distributed (convergent) network.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
When the unified gateway has any call services, the system automatically generates

:h
D:\BillL\CurFile and D:\Bak\CurFile directories on the CDRServer.

e s
The BMU periodically obtains CDR files from the D:\BillL\CurFile directory. The
c

r
parameter of how often the BMU obtains CDR files from that directory is configured
u
on the BMU.
s o

Re
The D:\Bak\CurFile directory stores backup CDR files.

n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If No CDR File in the Directory for Storing CDR Files, the possible causes are as follows:

s :h
The unified gateway is incorrectly configured.

c e
The CDRServer is incorrectly configured.
r

ou
Parameters for importing CDRs are incorrectly configured.

es
The BMU takes the CDR files.
R

n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Parameters for querying call record
t t
Parameter Description
s :h
Caller number
r c e
Number of a calling party in a call event.
Callee number
ou
Number of a called party in a call event.

es
Unified Gateway IP address of a Unified Gateway host. The CDRServer can accept call record files
IP address
R
generated by multiple Unified Gateway hosts at the same time. To query the call record

n gfiles that are uploaded to the CDRServer by a Unified Gateway host, specify the IP

ni
address of the Unified Gateway host.

ar
Received time Date on which call record are transferred to the CDRServer from the Unified Gateway call
record pool.

L e
Created time Time when call record are generated in the Unified Gateway call record pool.

e
or
Affixal condition Start Position: indicates that the query starts from the call record with the specified serial
number. Max Records Num: indicates the maximum number of call record that meet

M query criteria to be displayed in the query result.


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The call record details are the same as those displayed in the query result window. You

:h
can perform this step to view call record details clearly, without the need to view them by

s
dragging the horizontal scroll bar in the query result window.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
1. No. If the CDRServer are connected to third-party billing system or BMU, we can search

:h
the CDRs on the BMU web page or third-party system web page.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
UPF, upgrade policy file. A UPF file defines the scope of the IP phones to upgrade and the

:h
upgrade policies. Before an upgrade, an IP phone obtains the UPF file from the

s
preconfigured upgrade file server(HTTP server).
e
r c
The global UPF file on the HTTP server is used to configure and upgrade IP phones in
u

batches.
s o

Re
During DHCP server configuration, a 246 parameter is defined for setting the URL of the

g
global UPF file. After this parameter is set, the DHCP server sends the URL to the IP phone

n
ni
that applies for an IP address. The IP phone then downloads the UPF file from this URL.


a r
The UPF file contains the IP addresses of the servers where the firmware version file,

L e
configuration file, ring tone files, and local address book files are stored.

e
or
 The batch configuration and upgrade of IP phones have the following features:

M  IP phones of the same model use the same UPF file.

 For example, you only need to prepare one UPF file for all eSpace 7850
phones.

 IP phones obtain the required firmware version file URL from the UPF file.

 After obtaining the global UPF file, IP phones download the firmware version
file based on the URL in the UPF file for batch upgrade.

 IP phones obtain URLs from the UPF file to download configuration file, ring tone
files, local address book files, and other files.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
How to configure the DHCP and HTTP server, please refer to

:h
eSpace_7910&7950_IP_Phone_V200R003_Administrator_Guide(pdf) document.

e s
r c
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
After being connected to the DHCP server and powered on, eSpace 7910/eSpace 7950

:h
sends a request to the DHCP server for an IP address. In response, the DHCP server returns

s
an IP address, together with the URL of the UPF file (containing the addresses of the
e
r c
configuration file and the file server) carried in the Option 246 parameter. eSpace

u
7910/eSpace 7950 then obtains the configuration file from the file server to update its
o
s
configuration. If the UPF file also specifies other files (for example, firmware version file) to
e
R
update, eSpace eSpace 7910/eSpace 7950 also obtains these files for configuration
update.
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. A。
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
 The default TR-069 parameter in IP Phone is set to ucems.huawei.com. If a DNS server

e s
has been deployed, add domain name ucems.huawei.com to the DNS server and map it to
the eSight’s IP address.
r c
ou
IP Phone is able to resolve the value of acs.address carried in the DHCP Option 246 field
s

e
to obtain the eSight IP address.
R

n g
If the DHCP server installed on the Windows Server 2008 is used, set String

ni
value for the Option 246 field to acs.address=http://eSight’s IP:Port

a r
number/tr069/services/acs, for example,

L e acs.address=http://192.169.1.37:8089/tr069/services/acs. For details about the

e setting, see "Setting the Option246 Parameter" in the IP phone administrator guide.

or  If the DHCP server installed on the Windows Server 2008 is used, and set String
M value for the Option 246 field to acs.address=http://Customized domain name:Port
number/tr069/services/acs, for example,
acs.address=http://ucems.xxx.com:8089/tr069/services/acs. Then we need
DNS server to resolve the domain name to eSight server’s ip address.

 We can also setting TR-069 Parameters on the Web Page of an IP Phone.


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Setting IP Phone Protocol Parameters
t t
:h

e s
Set TR-069 parameters on IP phones so that the IP phones can properly connect to

c
the eSight. If the eSpace 7900 series IP phones (eSpace 7910, eSpace 7950) with
r
u
the version V100R001C02 or later or eSpace 8950 IP phones are used onsite, you

o
es
can use the access scan function to connect them to the eSight without settings
TR-069 parameters.
R

n g
Added by Creating groups:

r ni
Before connecting IP phones to the eSight and using the configuration and

e amanagement functions provided by the eSight, create groups for IP phones. If TR-

e L 069 parameters are correctly set on an IP phone, the eSight can automatically add

or
the IP phone to the corresponding IP phone group.

M  Added in batches:

 The eSight allows you to import IP phone devices in batches. Enter device
information in the Excel template provided by the eSight and import information in
the Excel template to the eSight. Then the eSight will automatically add the devices
specified in the Excel template to the corresponding subnets.

 Added by access Scan:

 The access scan function applies to eSpace 7910 IP phones and eSpace 7950 IP
phones with the version V100R001C02 or later, and eSpace 8950 IP phones with all
versions.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :
t t
:h
 Prerequisites:

e s
TR-069 parameters have been set on IP Phone devices.
c

ur
The eSight allows you to import IP phone devices in batches. Enter device information in
o

s
the Excel template provided by the eSight and import information in the Excel template to
e
R
the eSight. Then the eSight will automatically add the devices specified in the Excel

g
template to the corresponding subnets.
n
 Procedure:
r ni
e a
1. Choose Business > Collaboration > IPPhone Management from the main

e L menu.

or 2. In the navigation tree, choose Device Resource Management > IPPhone

M Resource Management.

3. Click Import. In the Import area, download the template to your local computer.

4. Enter the IP Phone information in the template and save the template. For details
about how to fill in the template, see the Instructions sheet in the template.

5. Click next to Upload file and select the Excel template.

6. Click to upload the template


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
 You can create lower-level groups in an IP phone group. To ensure management

e s
performance, do not create groups of more than 10 levels and control the number of

r c
devices in a group within 500.

ou
he following describes the three types of IP phone groups:
s

Re
Default group: An IP phone that is added to the eSight is added to the default group

g
by default if the eSight does not have any IP address group or the IP address of the
n
ni
IP phone is not included in the management scope of the created IP address group.

a r
After an IP address group is created, the IP phone is automatically grouped to the

L e corresponding IP address group.

e
or
 Custom group: Users can create custom groups to manage IP phones that they want
to pay special attention to.
M  IP address group: Users can create IP address groups to manage IP phones by their
IP addresses.

 If the IP address of an IP phone belongs to the IP address segments of multiple groups,


the eSight adds the IP phone to the group with the smallest IP address segment that
covers the IP phone's IP address.
 Once the IP address of an IP phone changes, the eSight automatically moves the IP phone
to the matching group.

 Procedure:

1. Choose Business > Collaboration > IPPhone Management from the main menu.

2. In the navigation tree, choose Device Resource Management > Group


Management.

n
/e
3. Click Create.

4. Configure the basic information about the group and its manageable IP address
o m
i.c
segments.

5. Click OK.

w e
u a
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
:h
 When a great number of eSpace 7910 IP phones and eSpace 7950 IP phones with the

e s
version V100R001C02 or later, and eSpace 8950 IP phones with all versions connect to

r c
the eSight, the eSight uses the access scan function to send auto-configuration server

ou
(ACS) addresses and certificate paths to the IP phones. After IP phones automatically

es
update their configurations based on the information received from the eSight, the IP

R
phones automatically connect to corresponding IP phone groups.

n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
 When a great number of eSpace 7910 IP phones and eSpace 7950 IP phones with the

e s
version V100R001C02 or later, and eSpace 8950 IP phones with all versions connect to the

r c
eSight, the eSight uses the access scan function to send auto-configuration server (ACS)

ou
addresses and certificate paths to the IP phones. After IP phones automatically update their

es
configurations based on the information received from the eSight, the IP phones

R
automatically connect to corresponding IP phone subnets.

n g
ni
 Choose Business > Collaboration > IPPhone Management from the main menu.

a r
In the navigation tree on the left, choose Device Resource Management > IPPhone

L e
Resource Management and click Access Scan.

e
or
 Configure CPE user name and password.

Click next to the Operation.The Edit information of scan config page is displayed.
M

 Modify CPE User Name and CPE Password based on IP Phone device,
click Confirm.

 The default value of CPE User Name and CPE Password are huawei and huawei123.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
:h
 To view scan result details about a record, click in the record. The scan result details

e s
include the start time, end time, time spent, total number of devices scanned, total

r c
number of IP phones detected, and number of devices failed to be scanned.

ou
To search for required scan records, select a search type from the Search Type drop-
s

e
down list box and enter appropriate search criteria.
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Prerequisites:The configuration file template for the IP phones whose configurations you

:h
want to modify is available. An IP phone model corresponds to a configuration file
template.
e s
r c
The configuration file template for eSpace 7800 series IP phones is in .cfg format.
u

s o
The configuration file template for 8850 IP phones is in .xml format.

Re
For eSpace 6800 series IP phones, eSpace 7900 series IP phones and eSpace 8950 IP

g
Phone, compress the configuration file (Config-eSpace68XX.xml, Config-
n
ni
eSpace79XX.xml, or Config-eSpace8950.xml) and the eSightUI.xml file

a r
provided by the eSight together to a .zip package. This .zip package is the

L e configuration file template for eSpace 6800 series IP phones, eSpace 7900 series IP

e phones and eSpace 8950 IP Phone.

or  If you need to add a configuration file template for the IP phones to upgrade, perform the

M following steps:
 Choose Business > Collaboration > IPPhone Management from the main menu.
 In the navigation tree on the left, choose Deployment
Management > Configuration File Management and click Configuration File
Template Manager.
 Click Upload.
 On the Upload Configuration File Template page that is displayed, set the
configuration file template parameters.
 Click OK. The newly added configuration file template is displayed on the interface.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
 In the navigation tree on the left, choose Deployment Management > Configuration
File Management.
e s
r c
u
 Click Create and set related parameters in the Basic Information area. For 7900 series

o
and 8900 series IP phones:
s

Re
Enter the configuration file name in Configuration file name.

n g
Select the models of IP phones to be configured from Device model. Set

ni

parameters of selected IP phone models in the corresponding panes.For the

a r
description about IP phone parameters, see the corresponding Configuration File

L e Parameter Description.

e
or
 For 7900 series and 8900 series IP phones:

M  When Configuring Policy is set to Full, all parameters are valid in the
configuration file that is generated, and all the parameter values are delivered
to the IP phones of the matching models.

 When Configuring Policy is set to Specified item, only selected parameters


are valid in the configuration file that is generated, and the selected parameter
values are delivered to the IP phones of the matching models. The parameters
that are not selected remain unchanged.
 NOTICE:

 For 7900 series and 8900 series IP phones, set Configuring Policy to Full if the
automatic number allocation function needs to be enabled. Otherwise, automatic
number allocation is unavailable during automatic deployment.

 After confirming the configurations, click OK.If you can find the new configuration file on
the Configuration File Management page, the operation is successful.

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
 Set the value of ACS address to the eSight IP address or the DNS domain according to the
site requirements.
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
 Version file management allows you to upgrade IP phone version files in batches.

e s
Choose Business > Collaboration > IPPhone Management from the main menu.In the
c

ur
navigation tree on the left, choose Deployment Management > Version File
Management.
s o

Re
Click Upload and set version file parameters in the Version Attribute dialog box.

n g
Select the required version file.

ni

a r
eSpace 6800 series: Select a version file in .zip format. The version file is the main

L e program.

e eSpace 7800 series: Select a version file in .rom format. The version file is the main

or

program.

M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
 Version file management allows you to upgrade IP phone version files in batches.

e s
Choose Business > Collaboration > IPPhone Management from the main menu.In the
c

ur
navigation tree on the left, choose Deployment Management > Version File
Management.
s o

Re
Click Upload and set version file parameters in the Version Attribute dialog box.

n g
Select the required version file.

ni

a r
eSpace 6800 series: Select a version file in .zip format. The version file is the main

L e program.

e eSpace 7800 series: Select a version file in .rom format. The version file is the main

or

program.

M
 eSpace 7900 series: Select a version file in .zip format. The version file contains the
main program, language package, signal tone, certificate file, configuration file,
wallpaper, and ringtone.

 Extract files from the software package. The .binfile that is obtained is the
main program.

 Make a language package file, compress it into a.tar file, and rename
it language.tar.
n
 Obtain a signal tone file in .wav format, compress it into a .tar file, and
/e
rename itsignal.tar.
o m
 Obtain certificate files in .pem format.
e i.c
 Obtain wallpaper files in .jpg, .bmp, or .pngformat.
aw
Obtain ringtone files in .wav format.
u
.h

n g
You can select the required packages to compress them into a .zip package

ni
and upload the .zip package to the eSight.

ar
eSpace 8850: Select a version file in .bin format. The version file is the main

le

//
program.

p :
t
 eSpace 8900 series: Select a version file in .zip format. The version file is the main
t
:h
program.

e s
Click OK.The eSight uploads the version file to the file server. You can view the new

r c
version file on the Version File Management page.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
:h
 The automatic number allocation function is available only for eSpace 7900 and 8900

e s
series IP phones of V200R003C00 or later.

r c
u
 You can bind a number to the SN or MAC address of an IP phone. Then eSight can

o
allocate the number to the IP phone based on the bound SN or MAC address during
s
mappings. Re
automatic number allocation. The numbers and identifiers are in one-to-one

n g
ni
 If the numbers and identifiers are not bound, eSight allocates a random number

a r
within the number segment to an IP phone.


L e
Choose Business > Collaboration > IPPhone Management from the main menu.

e
or
 In the navigation tree on the left, click IPPhone Management Configuration.

M  Under Support Number Allocation, set IP phone number allocation parameters.

 If Allocate numbers by eSight is set to ON, eSight actively allocates numbers to IP


phones based on the defined IP phone number allocation policy.If Allocate
numbers by eSight is set to OFF, the IP phone number allocation function is
disabled.

 Set the IP phone identifier to Serial Number or MAC Address based on the site
requirements.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
 You do not need to manually configure an SIP password for each phone number.

e s
Choose Resource > Resource Management > Collaboration Resource from the main
c

ur
menu. In the navigation tree, choose Unified Communications.

s o
In the management object list, choose the device type, and click the device name.
e


R
In the navigation tree on the left, choose Manage Service > BIN configuration.

n g
ni
 Set BIN channel parameters.

a r
Set BIN channel connection switch to ON.

L e
 The default value of Port is 8000, and the value must be the same as the BIN
e
or
channel of an IP PBX.

M 


Set Password to the password of the IP PBX in Config mode.

Set SSL secure connection switch to the same value on the IP PBX.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
:h
 Choose Business > Collaboration > IPPhone Management from the main menu.

e s
In the navigation tree on the left, choose Business Resource Management > Number
c

Resource Management.
ur
Click
s o
. Open the downloaded template file, enter parameters following the
e

R
template instructions, and save the settings.

n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
:h
 Click Import, select the configured template, and click OK.

e s
We can use the eSight to manage the number resource.
c

ur
You can bind a number to the SN or MAC address of an IP phone. Then eSight can
o

s
allocate the number to the IP phone based on the bound SN or MAC address during
e
R
automatic number allocation. The numbers and identifiers are in one-to-one

g
mappings.
n

r ni
If the numbers and identifiers are not bound, eSight allocates a random number

e a within the number segment to an IP phone.

e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
:h
 Choose Business > Collaboration > IPPhone Management > from the main menu.In

e s
the navigation tree on the left, choose Deployment Management > Automatic
Deployment.
r c
ou
Click in the Associate Configuration File column of the subnet where the IP phones to
s

e
deploy are located, and select the configuration files for the IP phone models to deploy.
R

n g
For 7900 series and 8900 series IP phones, select the configuration files

ni
whose Configuring Policy is set to Full if the automatic number allocation function

a rneeds to be enabled. Otherwise, automatic number allocation is unavailable during

L e automatic deployment.

e
or
 Optional: Click in the Associate Version File column and select the version files of the
IP phone models to deploy.
M  Click in the Allocated Number Segment column and specify the number segment.

 The eSight does not automatically allocate numbers if no number segment is


specified.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
:h
 Choose Business > Collaboration > IPPhone Management from the main menu. . In

e s
the navigation tree on the left, choose Deployment Management > Manual

r c
Deployment and view the execution result of the automatic deployment task.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
:h
 The eSight supports the upgrade of the main programs of eSpace 6805, eSpace 6810,

e s
eSpace 7800 series, eSpace 8850, and eSpace 8900 series IP phones, and the upgrade of

r c
the main programs, language packages, certificates, signal tones, wallpapers, and

ou
ringtones of eSpace 7900 series IP phones. eSpace 7800 series IP phones consist of eSpace

es
7810, eSpace 7820, eSpace 7830, eSpace 7850, and eSpace 7870. eSpace 7900 series IP

R
phones consist of eSpace 7910 and eSpace 7950. eSpace 8900 series IP phones consist of
eSpace 8950.
n g

r ni
The upgrade will result in about a 5-minute service interruption. The communication

e a
between the eSight and the IP phone will also be interrupted for about 5 minutes.

e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
:h
 Choose Business > Collaboration > IPPhone Management from the main menu.

e s
In the naClick Next, click Add on the Select Device page, and select the IP phone to
c

ur
be upgraded.vigation tree on the left, choose Deployment Management > Manual
Deployment.
s o

Re
Click Add Task and set related parameters on the Create Task page.

n g
Enter a task name in Task Name.

ni

a r
Set Select Upgrade Type to IPPhone.

L
e Determine whether to select Scheduled Task based on the site requirements.

e
or
 Click Next, click Add on the Select Device page, and select the IP phone to be upgraded.

M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
 Notice:

e s
If the IP phone that you want to upgrade is unavailable, check whether the version
c

ur
file for this model of IP phone is uploaded to the file server.

s o
If the IP phone does not belong to any subnet, the IP phone cannot be upgraded.
e

R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
:h
 In Select Upgrade Type, select the program type (for example, Main Firmware) that
you want to upgrade.
e s
r c
u
 In Select Target Version, select the required version file for the model of IP phones to be

o
upgraded. Only version files that have been uploaded to the file server are available here.
s

Re
In the Update Configuration File area, select a configuration file that you have uploaded

g
to the file server.
n
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
 Failed to upgrade the software:

e s
Choose Business > Collaboration > IPPhone Management from the main
c

ur
menu. In the navigation tree, choose Device Resource Management > IPPhone

o
Resource Management. Check the connection status in the management object
s
Re
list.If an IP phone is not online, select the IP phone, click Refresh, and check
whether the Connection value of the IP phone can be changed to Online. If the IP

n g
ni
phone is still offline, modify the configurations and ensure that the IP phone is

a r
online. Then re-upgrade the IP phone.

L e
 If the device is still offline, maybe the network is abnormal. Run the ping command

e on the eSight server which associates with the media gateway when the device

or connects to the eSight to check the connection between the device and the eSight.

M 
If the connection is abnormal, connect the device to the eSight correctly.

Check whether the CPE user name and password configured on the IP phone are
the same as the user name and password that are configured on the eSight when
adding the IP phone to the eSight. If they are different, seeSetting IP Phone Protocol
Parameters to correct the settings on the IP phone.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
:h
 1. ABC

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Routine Maintenance: maintenance operations carried out by the maintenance staff on a

:h
daily or regular basis.


e s
Version Maintenance: version upgrade and rollback

r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Routine maintenance serves the following purposes:

s :h
Discovering alarms generated by the equipment or existing defects of the equipment

r c e
in time, and accordingly taking proper measures. This ensures the stability of the
equipment and lowers the rate of failure.

ou

es
Recognizing abnormal cases that occur during the running of the charging system
and handling it in time. This reduces economic loss due to loss of bills.
R

n g
Grasping the running statuses of both equipment and network in real time and

ni
identifying the running tendency of both equipment and network. This improves the

a r
efficiency of maintenance staff in handling emergencies.

Le Carrying out periodic checks, backup, tests and cleaning for identifying the defects
e
or
in the equipment such as, natural aging, function failure, and deterioration of
performance; and taking proper measures to eliminate these defects.
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Checking the Electromagnetic Interference in the Equipment Room. The electromagnetic

:h
criteria is: l Electric field intensity ≤ 130 dB (μV/m) l Magnetic field intensity ≤ 800 A/m.


e s
We need special instrument to check the electromagnetic interference. This is an optional
item.
r c
ou
es
Item R
Action Expected Result

n g
ni
Fire Check the power cable and No hidden danger of fire exists.

r
prevention connector of the power Firefighting devices are in good

e a
condition module. condition.

e L Dust-proof Check the external surfaces of Each position is dust-free.

or
condition the device, the computer, the
floor and the desktop.

M Theft proof
condition
Check the doors, windows,
and theft-proof iron net.
All the facilities are in good
condition.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
For Running Status of the Boards, choose Show Board.

:h
 For the status of Fast Ethernet Port, the FE port is marked with 100BASE-T,

e s
For CPU usage, choose Trace > Resource Trace > Resource Trace Start Board in the main

r c
window of the OMU client. Then select Resource Trace > Slot No. > Board to view the CPU

u
usage of the SC-MCU board in the slot.
o
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Alarms on LMT can be categorized into:
t t
 Critical
s :h
 Major
r c e
 Minor
ou
Warning
es
R

 Uncertain
n g

r ni
Cleared

e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Different indicators: power indicator, running indicator, alarm indicator, signal loss

:h
indicator, remote alarm indicator.


e s
Indicators in different status represent the running status of the device.

r c

ou
Power indicator, On: The power supply is normal, Off: There is no power supply.

es
Running indicator, Steady on: The board is faulty. Blinking (4 Hz): The board is writing data

R
into the Flash memory while the system is running. Blinking (2 Hz): The board is writing

g
data into the Flash memory while the system is started. Blinking (0.5 Hz): The board is
n
ni
running normally. Off: No power is supplied or the board is faulty.

a r
Alarm indicator, Steady on: An alarm exists. Blinking (0.5 Hz): A major alarm exists.
e

e L
Blinking (0.25 Hz): A minor alarm exists. Off: No alarm exists.

or  Signal loss indicator, Steady on: Signals are lost. Off: Signals are normal.

M  Remote alarm indicator, Steady on: The peer device fails to receive data. Off: The peer
device is running properly.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
If trunk circuit is in ISOLATE state, Check the following items:

s :h
Run the config cancel isolate board/card command to cancel the isolation of the board.

r c e
Verify that the board where the trunk circuit is located is normal.

ou
Verify that the connection of the E1 trunk line is correct. That is, verify that the local-end TX

s
is connected to the peer-end RX, and the local-end RX is connected to the peer-end TX.

e

R
If PRA links is in fault state, Check the following items:

n g
The board where the PRA links resides is normal.

ni

a r
The E1 trunk line is connected correctly (the local-end TX is connected to the peer-end RX,

L e the local-end RX to the peer-end TX).

e
The PRA links is configured correctly (if the local-end link is user, the peer-end link is network;

or

if the local-end link is network, the peer-end link is user).

M  If subscriber is in fault state, Check the following items:


 If a subscriber is in BLOCKED state, run the unblock subscriber command to unblock the
subscriber.

 If a subscriber is in LOCKED state, check whether the subscriber does not dial any number
after hook-off or the subscriber does not hang up when a call ends. If the subscriber does
not dial any number after hook-off or the subscriber does not hang up when a call ends,
hang up, and then check whether the fault is rectified. If the fault is caused because of other
reasons, check the circuit to determine whether a short circuit occurs.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Monthly maintenance refers to the tasks carried out by the maintenance staff every month.

:h
It covers the tasks on shelf, terminal system, and spare parts.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The temperature in the warehouse is 0°C–45°C.

s :h
The relative humidity in the warehouse is 5%–95%, without condensation.

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Yearly maintenance refers to the tasks carried out by the maintenance staff every year.

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t
[%U1900(config)]$debug print cli history info place backup
CLI count = 9。
t
:h
Time Tick Session Result Command
2009-12-26 11:46:12 3364 0 Success Back board data syn have
finished!

e s
c
2009-12-26 11:46:52 7302 6 Success enable
2009-12-26 11:46:57 7841

ur
2009-12-26 11:47:37 11831
6
6
Success show s i
Success config s gateway ip 10.77.220.1

s o
2009-12-26 11:48:10 15178
2009-12-26 11:48:17 15801
6
6
Success config sys hostip 10.77.221.17
Fail save

first time!
Re
2009-12-26 11:48:30 17170 0 Success TotalBackup is completed for the

g
2009-12-26 11:49:31 23111 6 Success save

n
2009-12-26 11:49:44 24411 6 Success reboot

====
r ni
Command executed success ! ====

e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 To back up the data,
t t
:h
Step 1: Use the save command to save the current configuration and service data to the
s
FLASH memory.

r c e
u
Step 2: When the system prompts "Saving flash in the background finished!" (it means

o
es
the saving is finished), use the config upload file data command to back up the data
in the FLASH memory to the load directory on the TFTP server.
R
g
Step 3: After successful backup, check that the data.bin file is contained in the load
n
ni
directory on the TFTP server. The data.bin file is the backup file of the database.

a r
Step 4: Rename the data.bin file, back it up for restoring the data when necessary.

L e
e
 To restore the data of the specified time, load the backed-up data file to the host. To

or restore the data,

M Step 1: Store the data file to be imported in the load directory on the TFTP server. The
data file need to be named data.bin. If not, you need to rename it. Otherwise, you
will fail to import the data.

Step 2: Use the config download file data command to load the data to the FLASH
memory.

Step 3: After running the config download file data command successfully, run the
reboot command to reboot the system so that the restored data takes effect.
 You can also execute the Back up&Restore operations on U1900 webpage.

 Choose System > File Management.

 Backing up a data file

 Click Download.

 Loading a data file

 Click Browse, select the data file (data.bin) to load, and click Upload.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Ensure that the hostip has been configured as the IP address of TFTP server and the

:h
directory is rightly set.

e s
r c
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The Local Maintenance Terminal (LMT) is a management system for the U1911 unified

:h
gateway. It provides various functions such as alarm management, configuration

s
management, signaling tracing, upgrade, log collection, and offline operations.
e
r c
The LMT connects to the U1911 unified gateway using SSH/Telnet. A maximum of four
u

o
U1911 unified gateways can be connected to the LMT
s
 Alarm management
Re

n g
Displays and queries real-time alarms.

r ni
Displays and queries historical alarms.

e aQueries alarms by parameters such as the alarm severity, alarm type, alarm ID, time,
L

e
and device IP address.

or  Collects statistics on alarm by level.

M  Acknowledges and clears alarms.

 Synchronizes and filters alarms.

 Exports alarms.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Preparation before upgrade
t t

s :h
Obtain software packages and reference documents.

c e
Check the required items.
r
 Back up data.
ou
es
Obtain the license file for the target version. This file must be obtained before site
R

deployment.

n g
ni
 Stop services before the upgrade. This operation is required only when a conference

a r
is being held using the gateway.

L e
e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 The basic steps:
t t
 Log in to the U1900 using LMT.
s :h

c e
Run the save command to save the current data.
r

ou
Choose Version > Upgrade .

es
Click Browse... to select the target version.
R

n g
Select the device to upgrade, and click Upgrade, click OK.

r ni
Verify the services on the U1900 gateway.

e

a If the service verification succeeds, the upgrade continues.

e L Load voice.zip file.

or

M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 The basic steps:
t t

s :h
Log in to the device using the LMT.

c e
Choose Version > Rollback .
r

ou
Select the device for the rollback, select a source version from the Select the version

s
(rollback) drop-down list box, and click Rollback.
e
R
The rollback takes about 15 minutes. After the rollback is completed, Rollback
g

ni n
success is displayed in the ExecutionStatus column.

a r
L e
e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The operator user can execute all commands except for those for modifying password of

:h
the superior account, modifying MAC address and modifying the registered domain name
of the MG device.
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
If you click Save as carrier setting, you can restore data to the carrier settings as required.

:h
If you click Save as ordinary setting, you cannot restore data to the carrier settings.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Version information collection is the basis of fault location. If the IAD software being used

:h
is not the latest version and the faults in this version are already solved in the upgraded

s
versions, you can upgrade the software version to solve the fault.
e
r c
You can collect following information on the same page.
u

s o
Main Board Version;


Re
Other Board Version;

n g
ni
 Network Port;

a r
User Register Status;

L e
 Group Register Status;

e
or
 Vlan Information;

M 


Current Config;

Alarm History.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
// le
p :

t t
You can collect following information on the same page.

 Main Board Version;


s :h
 Other Board Version;
r c e
 Network Port;
ou
es
User Register Status;
R

n g
Group Register Status;

r ni
Vlan Information;

e aCurrent Config;

e L Alarm History.

or

M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The network connection issue may be caused by incorrect device IP address configuration.

:h
For example, the IP address of the IAD is not set in the same network segment as the

s
upper-level switch, or the MAC address of the IAD conflicts with other devices.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 NOTE:
t t

s :h
When the CPU usage is higher than 85%, the CPU is overloaded and a CPU

r c e
overload alarm is reported. You can end several calls to decrease the CPU usage,
and then continue conversation after the CPU usage becomes normal.

ou

es
When the CPU usage is lower than 75%, the alarm is cleared.

R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 A single IAD upgrade:
t t
 Web manually (HTTP/FTP)
s :h

c e
Users can log in the Web management system with the IP address of the IAD,
r
u
and select the FTP or HTTP upgrade mode on the Web page. Choose System

o
es
Tool > Upgrade Version in the navigation bar to enter the version upgrade
page. Upgrade the software as prompted. After the upgrade is complete,
R
g
choose System Tool > Restart Device to restart the IAD.

n
ni
 CLI manually (TFTP/FTP)

a r Users can log in to the IAD for upgrade in Telnet mode or through a serial port
e

e L on the maintenance terminal. After the upgrade is complete, restart the IAD.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Batches of IADs upgrade
t t
:h
 Web automatically (FTP) or CLI automatically (FTP)

e s
Users can log in to the IAD for upgrade in Telnet mode or through a serial port
c

r
on the maintenance terminal to enable the automatic upgrade function. After
u
o
the automatic upgrade function is started, IADs can periodically detect the
s
Re
latest IAD software update and then automatically install it. After the upgrade
is complete, the IAD automatically restarts.

n g
ni
 Through the eSight

a r Users can upgrade IADs managed by eSight in batches. For details on how to
e

e L upgrade IADs in eSight, see Upgrade the IAD Manually and Automatically

or
Upgrading the IAD in IAD Management in the eSight Help.

M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Automatic upgrade: Set the upgrade interval for an IP phone. When the upgrade interval

:h
expires, the IP phone automatically checks for new version files on the server and if there is

s
any new version file, automatically starts its version upgrade.
e
r c
A UPF file defines the scope of the IP phones to upgrade and the upgrade policies. Before
u

o
an upgrade, an IP phone obtains the UPF file from the preconfigured upgrade file server.
s
your needs. Re
Obtain the UPF template, and modify the parameters in the UPF template depending on

n g
ni
 Prerequisites:

a r
Hardware version number of the IP phone to upgrade.

L e
 Address of the HTTP server where the files for the IP phone to upgrade are stored.
e
or  Target version number.

M  UPF template (which is delivered with the version release).


n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
It is recommended that you use the Apache server (a type of HTTP server) as the upgrade

:h
server.


e s
Choose Start > All Programs > Apache HTTP Server 2.2 > Monitor Apache Servers.

r c

ou
In the following ways you can start Apache server: Choose Start and click it; Or choose

Start. es
Open Apache Monitor, In the Apache Service Monitor window that is displayed, click

R

n g
Copy files that IP phones will access to the root folder of the Apache server.

r ni
Change the Option246 parameter value of the DHCP server to the configuration file

a
URL.8.5 Setting the Option246 Parameter document describes how to set the Option246
e
e L
parameter.

or  − The configuration file URL specified by the Option246 parameter has the highest

M 
priority than other specified URLs.

− It is optional to specify the configuration file name. The IP phone will automatically
search for and download the configuration file mapping its model.

 The Option246 parameter value of the DHCP server should be in the form of
“upfprofile.address=http://172.168.30.10/UPF-eSpace7950.xml”.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Basic steps:
t t
:h
 Enter the UPF file URL and enable automatic upgrade on the IP phone. Specifically,
s
access the phone web page as an administrator, choose Advanced > Server >
e
r c
Version Download Server > Upgrade Server, and enter the UPF file URL on the

u
page that is displayed.
o

es
Enable automatic upgrade. Specifically, on the phone web page, choose Advanced

R
> Upgrade > Automatic Upgrade. On the page that is displayed, select

g
Enable for Automatic Upgrade.
n

r ni
Save the upgrade files to the root directory of the upgrade server.

e a When the message "Upgrade?" is displayed on the phone screen, select Yes.
L

e After the upgrade is complete, the message "Upgrade Success" is displayed on the

or

phone screen.

M  Working Principle
 After being powered on, a phone obtains the IP address from the DHCP server.
 Then the DHCP server delivers the configuration file URL to the phone using the
Option246 parameter.
 After receiving the URL, the phone obtains the global configuration file from the
file server to update the phone configurations, and downloads files such as the
firmware version file from the URLs specified in the configuration file.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If some phones failed to be configured or upgraded, the possible cause is that too many

:h
phones send configure and upgrade requests to the server at the same time, and the

s
server cannot handle all those requests. You are advised to restart these phones. The
e
r c
phone downloads the configuration file and firmware version from the file server during
the restart.
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Basic steps:
t t

s :h
Access the phone web page as an administrator and choose Advanced > Upgrade.

c e
In the Manual Upgrade area, click Browse next to Import Upgrade Package.
r

ou
Locate the version file to be upgraded on the local PC. Click Upgrade.

es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. A;
t t
2. AC;
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Step 1: Collect fault information.
t t
:h
When technical problems occur in the system or device, you need to collect as much
s
r c e
information as possible in the following ways: fault complaint, cyclic check of the
device, alarm from the OMU, alarm from the device, and dialing test.

ou
s
Step 2: Check whether the device is running normally.
e
R
The fault of a hardware device causes service congestion, for example, breakdown of

g
the SMCU board causes global service congestion. Thus, you need to make sure that
n
ni
the hardware device runs normally before handling any problem. The methods used

a r
for checking hardware devices are as follows:

L e Make sure that the power supply of the U1900 device runs normally. That is,
e
or
check the shelf and boards inside the shelf are powered on.

M Through viewing the indicator light or the alarm information on the OMU client,
check whether all the boards are in normal state.

Step 3: Take action to solve the device fault.

If the system fails to work, and you have confirmed that U1900 device is down, you
need to take action to solve the fault immediately according to the predefined
scheme.

Step 4: Take action to solve service fault.

If the system fails to work, and you have confirmed the service fault, you need to take
action to solve the fault immediately according to the pre-prepared scheme.
Step 5: Make sure that the fault is removed.

After handling the emergent fault, you need to check that the fault has been removed
in the ways such as NMS, dial test and service verification. That is, you need to
check that the device works properly and the service recovers.

Step 6: Collect fault information.

It is necessary to collect the fault information in time. This helps the technical engineers
to analyze and locate the fault, and prevents the fault from recurring. If the fault is a
n
device fault, the collected information helps the vendor improve on its devices.
/e
o
For this reason, it is necessary to collect the fault information regardless of whether them
fault has been successfully resolved or not. You can work out a summary report on
e
the fault. The report contains the following items: the time, nature, symptom and i.c
solution of the fault.
aw
u
Step 7: Report for help.

g .h
ni n
If you fail to clear the fault according to the related emergent fault handling process,

r
ask for technical support from the Customer service center or local office of Huawei
a
le
by telephone or fax.

: //
To minimize the time of handling the fault, you must: record your emergency handling

t p
in detail, notify Huawei of the type of the boards to be replaced, and apply for the
t
:h
necessary spare boards based on the warranty clauses.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Checking Power Supply of the Shelf:
t t

s :h
Power failure of the shelf causes the failure of the host device.

c e
Any of the following cases indicates that the shelf is powered off:
r

ou
The POWER or RUN indicator light on the front panel of the shelf is off.

es
The RUN indicator light on the panel of all the boards is off.
R

n g
The fans in the fan box stop running.

r ni
To remove the fault, do as follows:

e a Step 1: Make sure that the connector of the power module is connected properly

e L and the power switch at the back of the shelf is turned on.

or Step 2: If the connector of the power module is connected properly and the

M power switch at the back of the shelf is turned on, turn off the power switch
and remove the connector of the power module.

Step 3: Replace the power module and the power cable.

Step 4: Connect the connector of the power module properly, and then turn on
the power switch to power on the shelf.
 Checking Whether the Main Control Board(s) Is Normal:

 For U1980, if all the installed SMCUs (one or two in total) are faulty, the host device
breaks down. If the ALM indicator light on the panel of the SMCU flashes, it
indicates that the SMCU is faulty.

 To remove the fault of the SMCU, do as follows:

Step 1: Reboot the system.

Step 2: After the SMCU starts up, observe the ALM indicator light on the front
n
panel. If the ALM indicator light is off, it means that the board is in the normal/e
state. The ALM indicator light flashes, it means that the board is in the
o m
abnormal state. In this case, proceed to Step 3.
e i.c
Step 3: Wear the ESD-preventive wrist strap properly.
aw
u
Step 4: Check whether the fault is resulted by incomplete insertion of the SMCU.

.h
Open the ejector lever to power off the SMCU. Remove the SMCU, and re-
g
ni n
insert it. Observe whether the fault is cleared. If the fault is cleared, proceed to

r
Step 6.If the fault is not cleared, in the case of two SMCUs, re-insert the other
a
le
SMCU by following the same procedure. If the fault is not cleared, proceed to
Step 5.
: //
t p
Step 5: Remove the faulty SMCU, and insert a backup SMCU.
t
 Taking Bill Immediately:
s :h

c e
When handling the fault, you can perform critical operations, for example, resetting
r
u
boards. To ensure the bill security, transfer the bills from the host to the directory

o
es
specified on the bill server before performing the operations. The method is to
choose BillConsole> Control bill transfer on the bill server, and then check the bill
R
g
transfer status is Started.

n
ni
 Check Whether Host Device Breakdown Is Caused by Modifying the Configuration Data:

a r
L e
e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Any of the following cases indicates that the board faults:

s :h
The alarm center on the OMU client shows some alarm information on the fault of
the board.

r c e

ou
The RUN indicator light on the board panel is always on or off.

es
To remove the fault of the board, do as follows:

R
Step 1: Reset the faulty board.

n g
ni
 Use the reset board slot command or press the Reset button.

a r
Step 2: After the board starts up, observe the RUN indicator light on the front panel.

L e If the RUN indicator light flashes, it indicates that the board is normal. Proceed
e

or
to

M Step 3: Wear the ESD-preventive wrist strap properly.

Step 4: Open the ejector lever of the board to power off the board.

Step 5: Remove the faulty board, and re-insert it. Check whether the fault is cleared.

 If the fault is not cleared, proceed to Step 6.

Step 6: Remove the faulty board, and then insert a backup board.

Step 7. Otherwise, proceed to Step 3.


n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Log in to the U1900 using the LMT.
t t

s :h
On the LMT page, choose Host Log > Call Analyse.

 Select Online Analyse.


r c e

ou
Set up a call. The cal log information is displayed.


es
Click Analyze Call Log.
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Click Analyze Call Log.
t t

s :h
On the Call Analyse page, click a call record. The call flow chart of the selected call is
displayed.

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g .h
ni n
ar
// le
p :

t t
The priority for rectifying faults depends on the alarm severity.

:h
 Critical: global alarms that severely affect device operations. For example, a power
s
supply fault, critical alarms must be handled immediately; otherwise, the system may
e
crash.
r c
ou
Major: board or physical circuit alarms that occur in a certain scope. For example,
s

Re
the fault of physical circuit, major alarms must be handled immediately; otherwise,
the services cannot run normally.

n g
ni
 Minor: general faults or event alarms that describe the working status of each board
or physical circuit. You must locate the cause to remove potential problems.

a r
L e
 Warning: prompt message. For example, a message indicating that a device has
been restored, warning alarms do not affect system performance and services. No
e
or
action is required.

M  The procedure for handling an alarm is as follows:


 Find the critical and major alarms among all alarms.
 View the cause of each alarm and handle the alarm.
 Verify that the alarm is cleared.
 If the alarm is cleared, the fault is rectified.
 If the fault is not rectified, find out other possible causes.
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Use the LMT to view alarm information.
t t

s :h
Log in to the LMT and choose Alarm Management > Alarm. All alarms of the

r c e
current device are displayed.

ou
Double-click a required alarm. The detailed alarm information is displayed.

es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
Click Alarm Suggestions tab. Clear the alarm as suggested.

s :h
When the alarm is cleared, it turns grey.

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Logs record key events and information that are generated while programs are running. By

:h
viewing and analyzing logs, you can locate and rectify faults.

 Online Analysis
e s
r c

ou
Log in to the U1900 using the LMT.

es
On the LMT, choose Log Management > Run Log. The run log information is
displayed.
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Signaling records the process of establishing a call. By analyzing the signaling, you can

:h
find out possible causes of call failure and rectify the fault.

 Online Analysis
e s
r c

ou
Log in to the U1900 using the LMT.

es
On the LMT page, click Trace.

R
Double-click the signaling to monitor (for example, SIP).
g

ni n
Enter the IP address of the U1900 and click Ok. The signaling information page is

a r
displayed.

L e
 Perform signaling tracing.

e
or
 Click a signaling in the tracing result. The signaling analysis result is displayed.

M  Use the signaling analysis result to determine the fault cause.


n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
Using the ping command to view the status of network connection, delay time and loss

:h
package.

 IP bearer network quality


e s
r c
Network Quality

ou
One-Way Delay (ms) Packet Loss Rate Jitter (ms)
Good (recommended)
es
≤40 ≤0.1% ≤10

R
g
Poor ≤100 ≤1% ≤20
Terrible
ni n ≤400 ≤5% ≤60

a r
Data service usage

L e
Service Type Good Poor Terrible

e
or
Fax Transparent Available Unavailable Unavailable
transmission

M (G.711a/u)
T.38 Available Available Unavailable
Modem Transparent Available Unavailable Unavailable
transmission
(G.711a/u)
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
// le
p :

t t
Run the following commands to check the MTU status:

 show board slot <2-9>


s :h
 show device status
r c e

ou
If the MTU board is faulty, restart it.


es
If the fault persists after the board restarts, replace the board.
R

n g
The fault is rectified.

r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Run the ping command to verify connectivity between an IP phone and the eSpace

:h
U1900.

 Decoding
e s
r c

ou
The fault may be caused by conflict between the codec type of different IP terminals

es
and that of the eSpace U1900. To rectify the fault, set the highest codec type for all
IP terminals and the eSpace U1900. If all terminals support G.711A, you are advised
R
g
to set the highest codec type on all terminals to support G.711A.

n
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
No corresponding prefix is configured on the eSpace U1900. Therefore, you must run a

:h
command to add a prefix for the called number.

e s
c
[%U1900(config)]#config add prefix

ur
s o
Verify that the called number is correct.
e

R
g
[%U1900(config)]#show subscriber

ni n
a r
L e
e
or
M
n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :
 Possible cause
t t
 The IP phone is faulty.
s :h

c e
The network is disconnected.
r

ou
A service restriction is configured on the IP PBX.

es
Dial *125# on the IP phone. If no announcement is played, the IP phone is not registered
R
with the IP PBX. Verify the network connection, account settings, and that the IP phone

g
runs properly. If an announcement is played, the IP phone is registered with the IP PBX.
n
ni
Check whether outgoing call rights are configured for the user.

a r
L e
e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Possible cause
t t

s :h
The echo cancellation function is disabled on the IAD.

r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Possible cause
t t
:h
 The bill pool is full and no bill is deleted.

e s
Suggestion: If no Huawei or third-party bill server is deployed to retrieve bills onsite,

r c
disable the bill generating function when deploying the unified gateway to avoid service

ou
interruption due to the full bill pool.

es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Possible cause
t t
:h
 The long number and short number of the called party are the same. As a result, the

e s
system processes the number dialed by the calling party as the long number.

r c
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Check PRA link status.
t t
[%U1980(config)]# show pralink

s :h
r c e

ou
Check status of PRA trunk circuits.

es
R
[%U1980(config)]#show tkc office no 1

g
[%U1980(config)]#config cancel isolate card

n

r ni
Confirm with engineers and find that an engineer deleted the DTU by running

a
a command.
e

e L
The fault is rectified.

or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Check whether the eSpace U1900 is effectively grounded.

s :h
Run the command for displaying the system clock source to check whether the clock

r c e
source is obtained from the peer office.

ou
Check whether the E1 cable is longer than 100 m.

es
If the resistance of the peer office is 120 ohms, check whether the connector is

R
correct and perform the test again after replacing the connector.

n g
ni
 Connect the two E1 ports on the eSpace U1900 to form a self-loop and check

r
whether the board is faulty.

e a Check whether frame slip occurs on the two E1 ports connected in a self-loop.
L

e
or
 Run the following command to configure the local crystal oscillator as the clock source and
then check whether frame slip occurs:

M [%U1980(config)]#config system clocksource oscillator


n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
 Possible cause
t t
:h
 Physical trunk links are faulty.

e s
Trunk connection configurations are incorrect or links are disconnected.

r c
Configurations of routing upon failures are incorrect.
u

s o
Step 4: (Replace xxx with the domain name of the SIP trunk). Check whether the

Re
HeartBeat parameter is set to YES. If no, run the config modify peercomponent
domainname xxx heartbeat yes heartbeatperiod 5 command to enable the heartbeat
function.
n g

r ni
If the fault persists, contact Huawei technical support.

e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Possible cause
t t

s :h
The international toll call right is not enabled for the account.

c e
The called number does not exist.
r

ou
By default, the international toll call right is disabled for users on the IP PBX to prevent

s
users from making international toll calls.
e
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Possible cause
t t
 The DND service is enabled.
s :h

c e
The CFU service is enabled.
r
 DND: do not disturb
ou

es
CFU: call forwarding unconditional
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Possible cause
t t

s :h
The conference is scheduled as an encrypted conference, but the SRTP flag is set to

r c e
OFF on the IP phone so that it does not support encryption. As a result, the user
fails to join the conference.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Possible cause
t t

s :h
By default, an instant conference supports a maximum of three participants. When

r c e
the moderator adds four or more participants, an announcement is played,
indicating that the number of participants reaches the maximum.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Possible cause
t t
 The network is disconnected.
s :h

c e
Registration information is incorrect.
r
 The IP PBX is faulty.
ou

es
Most registration failures are caused by network disconnection.
R

n g
For details about how to rectify network disconnection faults, see Other Fault

ni
Analysis (2).


a r
Some users fail to register with the IP PBX because the user name, password, or SIP server

L e
IP address is incorrectly set.

e
or
 You can log in the SIP server to query registration information such as the user name
and password.
M  In addition, the SIP server IP address may be incorrectly entered during the batch
configuration of IP phones.

 Log in to an IP phone as the administrator and enter the correct SIP server IP
address on the Advanced > Server page.
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Possible cause
t t

s :h
The network connection is abnormal.

c e
The network cable is connected to the PC port instead of the LAN port.
r

ou
Network configurations are incorrect.

es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
 Possible cause
t t

s :h
By default, the interval for refreshing the registered SIP server is set to 3600s on an

r c e
IP phone, which is too long.

ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
1. AB;
t t
2. D.
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
Appendix I. Glossary

 Number

 3WC: Three-Way Calling

 A

 AC: Alternative Current

 AAC-LD: Advanced Audio Coding with Low Delay

ACD: Automatic Call Distributor


n

 AG: Access Gateway


/e
AN: Access Network
o m
i.c

 Apps: Applications

w e
a
 AR: Access Router

u
.h
 ARP: Address Resolution Protocol

A-SBC: Access Session Border Controller


n g
ni

 B
ar
 B2BUA: Back-to-Back User Agent
//le
p :
BEST: Branch Exchange for Survivable Telephony
t

t
:h
 BHCA: Busy Hour Call Attempts

e s
BHCC: Busy Hour Completed Call

r c
u
 BLF: Busy Lamp Field

s o
BMU: Business Management Unit
e

R
BRA: Basic Rate Access
g

ni n
BS: Billing System

a r
BTU: BRI Trunk Unit BRI

L e
 BRI:Basic Rate Interface
e
or
 BYOD: Bring Your Own Device

M  C

 CAC:Call Admission Control

 CAS: Channel Associated Signaling

 CC: Conference Call

 CDMA: Code Division Multiple Access

 CDR: Call Details Records


Appendix I. Glossary

 CFB: Call Forwarding Busy

 CFNR: Call Forwarding No Reply

 CFO: Call Forwarding Offline

 CFU: Call Forwarding Unconditional

 CTVMNR: Call Transfer to Voice Mailbox on No Reply

CTVMU: Call Transfer to Voice Mailbox Unconditional


n

 CTVMB: Call Transfer to Voice Message on Busy


/e
CH: Call Hold
o m
i.c

 CLI: Command Line Interface

w e
a
 CLIP: Calling Line Identification Presentation

u
.h
 CLIR: Calling Line Identification Restriction

CLIRO: Calling Line Identification Restriction Override


n g
ni

 CNIP: Calling Name Identification Presentation


ar

//le
CNIR: Calling/Connected Name Identification Restriction

CODEC: Code And Decode


p :
t

t
:h
 COLP: Connected Line Identification Presentation

e s
CONP: Connected Name Identification Presentation

r c
u
 CRC: Cyclic Redundancy Check

CT: Call Transfer


s o
e

 D R
n g
ni
 DC: Direct Current

a r
DID: Direct-Inward-Dialing

L e
 DDI: Direct-Dialing-In
e
or
 DMZ: Demilitarized Zone

M  DND: Do-Not-Disturb

 DSP: Digital Signal Processor

 DSS1: Digital Subscriber Signaling No.1

 DTMF: Dual Tone Multiple Frequency

 E

 ECS: Enterprise Communication Suite


Appendix I. Glossary

 EMC: Electromagnetic Compatibility

 EMS: Element Management System

 ESD: ElectroStatic Discharge

 F

 FXS: Foreign eXchange Station

FXO: Foreign eXchange Office


n

 G
/e
GUI: Graphical User Interface
o m
i.c

 H

w e
a
 HME: Huawei Media Engine

u
.h
 I

IAD: Integrated Access Device


n g
ni

 IPCC: IP Contact Center


ar
 IPT: IP Telephony
//le
ISDN: Integrated Services Digital Network
p :
t

t
:h
 IVR: Interactive Voice Response

 L
e s
r c
u
 LAN: Local Area Network

s o
LDAP: Lightweight Directory Access Protocol
e

R
LE: Local Exchange
g

ni n
LMT: Local Maintenance Terminal

 M
a r
L e
 MAA: Mobile Access Agent
e
or
 MAS: Mobile Agent Server

M  Meeting MS: Meeting Media Server

 MGC: Media Gateway Controller

 MGW/MG: Media Gateway

 MoH: Music on Hold

 MRS: Media Resource Serve


Appendix I. Glossary

 N

 NGN: Next Generation Network

 O

 OMU: Operation Maintenance Unit

 ONLY: One Number Link You P

PBX: Private Branch Exchange


n

 PCM: Pulse Code Modulation


/e
PGND: Protection Ground
o m
i.c

 POTS: Plain Old Telephone Service

w e
a
 PRA: Primary Rate Adaptation

u
.h
 PRI: Primary Rate Interface

PSTN: Public Switched Telephone Network


n g
ni

 Q
ar
 QoS: Quality of Service
//le
R
p :
t

t
:h
 RBT: Ring Back Tone

e s
RTCP: Real-time Transport Control Protocol

r c
u
 RTP: Real-time Transport Protocol

RX: Receive
s o
e

 S R
n g
ni
 SCE: Service Creation Environment

a r
SDP: Session Description Protocol

L e
 SG: Signaling Gateway
e
or
 SNMP: Simple Network Management Protocol

M  SNTP: Simple Network Time Protocol

 SIP: Session Initiation Protocol

 SMTP: Simple Mail Transfer Protocol

 SRU: Service Router Unit

 SS: Supplementary Service


Appendix I. Glossary

 T

 TCO:Total Cost Of Ownership

 TDM: Time Division Multiplex

 TFTP: Trivial File Transfer Protocol

 TMG: Trunk Media Gateway

TX: Transmit
n

 U
/e
UA: User Agent
o m
i.c

 UAC:User Agent Client

w e
a
 UAS:User Agent Server

u
.h
 UC: Unified Communications UCE: eSpace UC Express

UM: Unified Media


n g
ni

 UMS: Unified Message System


ar
 USM: Unified Session Manager
//le
USB: Universal Serial Bus
p :
t

t
:h
 V

e s
VLAN: Virtual Local Area Network

r c
u
 VMS: Voice Mail Service

s
VoIP: Voice over IPo
e

R
VRP: Versatile Routing Platform
g

ni n
VU: Virtual User

 W
a r
L e
 WAN: Wide Area Network
e
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
 Key parameter :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
 Run Date:
t t

s :h
Deadline of the license. After this date, license will return to default status.

c e
Default license setup supports X number of users. If you need a support for more
r
u
users number (let’s say N), then you should apply for a proper new license to

o
es
support such number. At the time the new license expires, only default license users
are supported after new license expiration. For example, assuming that you have
R
g
created X+N users before running U1900 system and you have a valid license to

n
ni
support X+N users, after the license expires, the system only support X users. Note

a r
that all the services are blocked until you delete the excess users or renew the

Le license

e
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
License Current Config Information: show the capability that the license supports .

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Local Survival Right: This control item is for a local node. The value 0 indicates that this

:h
item is controlled by a license, and the value 1 indicates that this item is not controlled by

s
a license. When this item is not controlled by a license, the following controls are
e
implemented:
r c
ou
"User port license" item is set to the maximum numbers supported in the system,
s

e
the others items keep the number supported by the license.
R

n g
User data can be synchronized only through the central node. User data cannot be

ni
configured using the CLI or network management system. Other data, such as trunk

a r
configuration, can be configured using the CLI or network management system.

L e
 Information about the central node must be configured on the local node, and the

e local node also needs to have heartbeat communication with the central node. If the

or accumulative days of losing heartbeat communication with the central node exceed

M 30 days, the license becomes invalid. The license takes effect again after the local
node reconnects to the central node.
 Redundancy Backup Right : This control item is for a standby node. The value 0 indicates
that this item is controlled by a license, and the value 1 indicates that this item is not
controlled by a license. When this item is not controlled by a license, the following controls
are implemented:

 "Local regeneration license" item keeps the number supported by the license, the
others items(except "Open interface platform license" item) are set to the maximum
numbers supported in the system.

n
/e
 User data can be synchronized only through the active node. User data cannot be

m
configured using the CLI or network management system. Other data, such as trunk
configuration, can be configured using the CLI or network management system.
o

e
Information about the active node must be configured on the standby node, and i.c
w
the standby node also needs to have heartbeat communication with the active
a
u
node. If the accumulative days of losing heartbeat communication with the active

.h
node exceed 30 days, the license becomes invalid. The license takes effect again
g
after the standby node reconnects to the active node.

ni n
ar
// le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
License Use Information: show the license that has been used.

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M
n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
User ports are classified into two types: analog user ports and SIP user ports.

s :h
Default number of user ports supported by U1900 without a license:


r c e
eSpace U1981/U1980/U1960/U1911: 4

ou

es
eSpace U1910: 50

R
eSpace U1930: 100
g

ni n
Number of users supported after a license is loaded:

a r
L e
 eSpace U1981/U1980/U1960/U1911: Number supported by the license

e eSpace U1910: 50 + number supported by the license

or

eSpace U1930: 100 + number supported by the license


M

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The number of voice conference concurrence user in eSpace U1910 and eSpace U1930 is

:h
open by default , and the maximum number is 12.
s

c e
eSpace U1980 provides voice conference resources for 60 parties by default. After a
r
u
license is loaded, the total number equals 60 plus the number supported by the license.
o
es
eSpace U1960 provides voice conference resources for 30 parties by default. After a
R

g
license is loaded, the total number equals 30 plus the number supported by the license.
n

r ni
eSpace U1911 provides voice conference resources for 16 parties by default. After a

e a
license is loaded, the total number equals 16 plus the number supported by the license.

e L
or
 eSpace U1981 provides voice conference resources for 60 parties by default. After a
license is loaded, the total number equals 60 plus the number supported by the license.
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s:h
r c e
ou
es
R
n g
rni
e a
e L
or
M
e n
/
m
e.i co
aw
hu
g.
ni n
ar
//le
p :
t t
s:h
r ce
sou
Re
i n g
rn
e a
e L
or
M
The privilege of HCNA/HCNP/HCIE:
With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy:
n
 1、e-Learning Courses: Logon http://learning.huawei.com/en and enter Huawei Training/e-Learning
/e

o m
If you have the HCNA/HCNP certificate:You can access Huawei Career Certification and Basic Technology e-Learning
courses.
e i .c
If you have the HCIE certificate: You can access all the e-Learning courses which marked for HCIE Certification Users.

aw

Methods to get the HCIE e-Learning privilege : Please associate HCIE certificate information with your Huawei account, and

hu

email the account to Learning@huawei.com to apply for HCIE e-Learning privilege.


g .
 2、 Training Material Download
i n

arn
Content: Huawei product training material and Huawei career certification training material.

//le
Method:Logon http://learning.huawei.com/en and enter Huawei Training/Classroom Training ,then you can download
training material in the specific training introduction page.
p :
 3、 Priority to participate in Huawei Online Open Class (LVC)
t t

s :h
The Huawei career certification training and product training covering all ICT technical domains like R&S, UC&C, Security,

4、Learning Tools: rc e
Storage and so on, which are conducted by Huawei professional instructors.

u

s o
eNSP :Simulate single Router&Switch device and large network.

R e
WLAN Planner :Network planning tools for WLAN AP products.

n g
In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with Huawei experts ,

ni
share exam experiences with others or be acquainted with Huawei Products.

a r
 Statement:
L e
r e
This material is for personal use only, and can not be used by any individual or organization for any commercial purposes.
o
M
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential 1

You might also like