Communication Manager Ip Dect
Communication Manager Ip Dect
Communication Manager Ip Dect
16-601625
Issue 1
August 2006
Notice
While reasonable efforts were made to ensure that the information in this
document was complete and accurate at the time of printing, Avaya Inc. can
assume no liability for any errors. Changes and corrections to the information
in this document may be incorporated in future releases.
Documentation disclaimer
Avaya Inc. is not responsible for any modifications, additions, or deletions to
the original published version of this documentation unless such modifications,
additions, or deletions were performed by Avaya. Customer and/or End User
agree to indemnify and hold harmless Avaya, Avaya's agents, servants and
employees against all claims, lawsuits, demands and judgments arising out of,
or in connection with, subsequent modifications, additions or deletions to this
documentation to the extent made by the Customer or End User.
Link disclaimer
Avaya Inc. is not responsible for the contents or reliability of any linked Web
sites referenced elsewhere within this documentation, and Avaya does not
necessarily endorse the products, services, or information described or offered
within them. We cannot guarantee that these links will work all of the time and
we have no control over the availability of the linked pages.
Warranty
Avaya Inc. provides a limited warranty on this product. Refer to your sales
agreement to establish the terms of the limited warranty. In addition, Avaya’s
standard warranty language, as well as information regarding support for this
product, while under warranty, is available through the following Web site:
http://www.avaya.com/support.
Copyright
Except where expressly stated otherwise, the Product is protected by copyright
and other laws respecting proprietary rights. Unauthorized reproduction,
transfer, and or use can be a criminal, as well as a civil, offense under the
applicable law.
Avaya support
Avaya provides a telephone number for you to use to report problems or to ask
questions about your product. The support telephone number
is 1-800-242-2121 in the United States. For additional support telephone
numbers, see the Avaya Web site: http://www.avaya.com/support.
Chapter 1: Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Purpose. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Abbreviations and Definitions . . . . . . . . . . . . . . . . . . . . . . . . 7
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Chapter 2: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
About the Avaya IP DECT Solution . . . . . . . . . . . . . . . . . . . . . . . . . . 11
About the IP DECT base stations . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Avaya DECT Mobility Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
IP signalling and media stream . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
IP DECT base station Synchronisation. . . . . . . . . . . . . . . . . . . . . . . . 17
IP DECT base station channel capacity . . . . . . . . . . . . . . . . . . . . . . . 20
About the Handsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
About Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
System Capacities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Chapter 6: Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Booter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Checking the IP DECT base station Booter Version . . . . . . . . . . . . . . 79
Manual Update of the IP DECT base station Booter . . . . . . . . . . . . . . . 80
Static local configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Checking the local configuration . . . . . . . . . . . . . . . . . . . . . . . . . 80
Removing the local configuration . . . . . . . . . . . . . . . . . . . . . . . . 81
Avaya 3701 Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Checking the Avaya 3701 Firmware Version. . . . . . . . . . . . . . . . . . . 81
Upgrading the Avaya 3701 Firmware . . . . . . . . . . . . . . . . . . . . . . . 82
Avaya 3711 maintenance and diagnostic . . . . . . . . . . . . . . . . . . . . . . 85
Avaya 3711 Auto Call Test Mode . . . . . . . . . . . . . . . . . . . . . . . . . 85
Avaya 3711 Auto Answer Test Mode . . . . . . . . . . . . . . . . . . . . . . . 86
Avaya 3711 Site Survey Mode . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Avaya 3711 Master Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Change the Avaya 3711 Security PIN. . . . . . . . . . . . . . . . . . . . . . . 88
Avaya 3711 Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Checking the Avaya 3711 Firmware Version. . . . . . . . . . . . . . . . . . . 88
Upgrading the Avaya 3711 Firmware . . . . . . . . . . . . . . . . . . . . . . . 89
Site Survey Measurement Equipment . . . . . . . . . . . . . . . . . . . . . . . . 92
Diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Telnet user shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Command overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Purpose
This document describes the installation and administration of the Avaya IP DECT solution
using Avaya DECT Mobility Manager version 1.x.x.
Abbreviations
AC Authentication Code
ACM Avaya Communication Manager
ADMM Avaya IP DECT Mobility Manager
ADPCM Adaptive Differential Pulse Code Modulation
CM Communication Manager
DECT Digital Enhanced Cordless
Telecommunication
DHCP Dynamic Host Configuration Protocol
DSP Digital Signal Processor
GAP Generic Access Profile
IPEI International Portable Equipment Identity
IP Base Station IP DECT Base Station
HTTP Hyper Text Transfer Protocol
MSSF Media Server System Features
OMM Open Mobility Manager (same as ADMM)
PARK Portable Access Rights Key
PP Portable Part (same as IP DECT handset)
RFP Radio Fixed Part (same as IP Base Station)
RTCP Real Time Control Protocol
Definitions
References
1. The TFTP Protocol (Revision 2), RFC 1350, July 1992
2. Avaya – Open Mobility configuration settings; KI CTB006259
3. Product Requirements and System Architecture; Integrating DeTeWe IP DECT wireless into
Avaya Multi Vantage Solution utilising an IP infrastructure
4. Product Requirements and System Architecture; Integrating DeTeWe IP DECT wireless into
Avaya IP Office utilising an IP infrastructure
5. RFC 1156, Management Information Base for Network Management of TCP/IP-based
internets, May 1990
6. RFC 1213, Management Information Base for Network Management of TCP/IP-based
internets: MIB-II, March 1991
7. RFC 1450, Management Information Base for version 2 of the Simple Network
Management Protocol (SNMPv2), April 1993
8. http://www.simpleweb.org/ietf/mibs/index.html?sel=IETF
9. Avaya 3711 User Guide
10. Avaya 3701 User Guide
11. Avaya IP Telephone LAN Administrators Guide
Media Server
Media Gateway
Web Browser for
administration purposes
IP DECT Base
Stations
256 max.
The Media Server, Media Gateway, ADMM and the IP DECT base stations communicate
through the IP infrastructure. The IP DECT base stations and the IP DECT handsets
communicate over air, where the DECT GAP protocol is used or DECT GAP with proprietary
enhancements.
Note:
Note: It is possible to deactivate the DECT part of a IP DECT base station. If the DECT
Interface is deactivated then the resources (CPU and memory) are available for
the ADMM.
Ethernet jack
Power supply in line with Power over LAN™ standard IEEE 802.3af
IP-Phone
Media Server
Media Gateway
Primary Base
Station
ADMM
(IP DECT Base Station Signalling
in ADMM mode) Base Station Control
I f
RTP/RTCP
To establish a call between two DECT handsets the same IP streams must be established like
in the scenario before, except the IP phone is not involved. The following figure illustrates this
scenario.
Media Server
Media Gateway
ADMM
(IP DECT Base Station
in ADMM mode)
Signalling
Base Station Control
I f
RTP/RTCP
A call from one DECT handset to another that resides on the same IP DECT base station will
loop back within the IP DECT base station, if no Media gateway is involved. So the call will not
pass through to the local area network (LAN). Although the voice packets will not impact LAN
traffic, signal packets will.
It is also be possible to direct the media stream to connect directly the IP phone and the IP
DECT base station, as shown in the following figures.
If the DECT handset user is moving, the handset detects that another IP DECT base station has
a better signal strength and, therefore, it starts the hand over process. The media stream from
the IP Phone cannot move to the secondary IP DECT base station, so the primary IP DECT
base station uses the LAN to direct the voice to the secondary IP DECT base station, as shown
in the following figure.
IP-Phone
Media Server
Media Gateway
ADMM
(IP DECT Base Station
in ADMM mode)
Signalling
Base Station Control
I f
RTP/RTCP
As the DECT set user moves into the next IP DECT base station zone of coverage, the DECT
set detects that the IP DECT base station has a better signal strength. Again, the media stream
from the IP phone cannot move to the secondary IP DECT base station, so the primary IP
DECT base station uses the LAN to direct the voice to the new secondary IP DECT base
station.
IP-Phone
Media Server
Media Gateway
ADMM
(IP DECT Base Station
in ADMM mode) Signalling
Base Station Control
I t f
RTP/RTCP
The first active IP DECT base station will be chosen by the ADMM as the Master for the
synchronisation. If a specific IP DECT base station shall be used, for example to speed-up the
synchronisation phase, then a IP DECT base station can be marked with ‘Act as Master during
startup’ on the IP DECT base station Web page.
Unsynchronised RFP,
whichR does
101 not receive a R 102 R 103 R 104 R 105
signal from another RFP
Unsynchronised RFP,
which receives a signal
from another RFP and
tries to get synchronised
R 107 R 106
SynchronisedR 111RFP,
R 110 R 109 R 108
which receives and
transmits a signal on the
air interface
As long as a IP DECT base station is not in synch, no calls can be established using this IP
DECT base station.
If a IP DECT base station loses the synchronisation the IP DECT base station does not accept
new calls ("Busy-Bit"). There is a delay of max. 3 minutes until the active calls on this IP DECT
base station are finished. Then it tries to get synchronised again.
An IP DECT installation is more reliable if a IP DECT base station can receive the signal from
more than only one IP DECT base station, because the other signals are also used for
synchronisation.
Unreliable Installation
R 101 R 102 R 103 R 104 R 105
Don‘t
R 107 R 106
R 111 R 110 R 109 R 108
Reliable Installation
R 101 R 102 R 103 R 104 R 105
R 107 R 106
R 111 R 110 R 109 R 108
The synch-over-air solution is very reliable, because all existing redundant paths are used for
synchronisation. Thus, hardware tolerances have only very little influence. No IP DECT base
station has a key position. Example: If the Initial Master does not start up, another IP DECT
base station will be chosen by the ADMM.
Only unfavourable setups without redundant synchronisation paths can cause problems.
Sometimes IP DECT base stations do not need to be synchronized, e.g. if they are in different
buildings. These IP DECT base stations can be put into different clusters. IP DECT base
stations in different clusters will not be synchronised with each other. Different cluster start up
independent at the same time.
About Licensing
The ADMM needs to be enabled with a license key, which depends on the MAC address of
some IP DECT base stations in the DECT system. The license key needs to be entered /
administered via the ADMM web administration interface.
There are a sets of licenses with additional upgrade licenses .
● License for 1 IP DECT base station
● License for 2 IP DECT base stations
● License for 3 to 5 IP DECT base stations
● License for more than 5 IP DECT base stations
As mentioned above the license key depends on the MAC addresses of some IP DECT base
stations of the DECT system (License-IP DECT base stations). Each IP DECT base station can
be an License-IP DECT base station independently where the IP DECT base station is located.
The number of IP DECT base station MAC addresses encoded in the license depends on the
size of the DECT installation.
Additionally to the MAC addresses the PARK (Portable Access Rights Key), which identifies the
DECT installation, is also by part of the license. Because a DECT system can only be operated
with a valid PARK, a DECT installation without a license will be inactive on the DECT site.
An IP DECT system is operational, if it set up with a license and the IP DECT base stations,
which are encoded in the license are part of the system so that the ADMM can communicate
with these License-IP DECT base stations.
Depending on the size of the IP DECT system, it will still work if some License-IP DECT base
stations are out of service.
If the minimum number of License-IP DECT base stations can not be reached by the ADMM or
more IP DECT base stations are administered than licensed the DECT system will block the
voice streams.
System Capacities
There is only one Avaya DECT Mobility Manager (ADMM) in the system. The capacities are
depending on the platform, the ADMM is running on.
Booting Overview
Booting can be in two steps:
● Starting the boot process
● Starting the application
Booter:
The IP DECT base station has only a little standalone application built into the flash. This
software realises the so called NETBOOT process.
On start up each IP DECT base station try to determine its own IP address and other settings of
the IP interface from the configuration settings in the internal flash memory. When no settings
are available or these settings are disabled, the IP DECT base station try to determine this
settings via DHCP.
The IP DECT base station gets the application image file from the TFTP server.
Application:
After starting the application image the IP DECT base station checks the local network settings
in his internal flash memory once again. When no settings are available or they are disabled it
starts a DHCP client to determine the IP address of the ADMM and other start up settings.
ADMM in Host-Mode
In this case the ADMM Software has to be installed on PC running with Linux Red Hat. The
essential network settings the ADMM is working with are depending on the configuration of the
PC Kernel.
Once started, the ADMM is running permanently while not stopped and when ever the PC is
running. In case of fatal errors or PC reboot, the OM recovers automatically.
! CAUTION:
CAUTION: Be sure that the versions of the ADMM and the IP DECT base station software
within your IP DECT installation are the same.
Parameter Description
Troubleshooting:
● To verify if the ADMM is running look at process table (ps –e) for the process omm_avaya.
● If the ADMM does not start, delete the lock file: "/var/lock/subsys/omm_avaya”.
● To delete ADMM configuration remove the OMM_CONFIG_FILE (default: /etc/
omm_conf.txt).
Booter
Booter versions
This documentation referring to IP DECT for Avaya is written for the Booter SW 3.2.x.
But note, in test installations there may be some different versions of the booter SW in use:
● Booter version 2.1.y
This software is using BOOTP instead of DHCP.
● Booter version 3.0.x
Replacement of the BOOTP client by a DHCP client.
● Booter version 3.1.x
Added support for VLAN.
● Booter version 3.2.x
added support for OpenMobility Configuration tool.
See Booter update on page 29 for details on the booter update mechanism.
DHCP client
Within the initial boot process the DHCP client supports the following parameters:
● IP Address mandatory
● Netmask mandatory
● Gateway mandatory
● Boot file name mandatory
DHCP REQUEST
DHCP OFFER
Mandatory options
The DHCP client selects the DHCP server according to the following rules:
● One of the public options (code 224 up to code 254) has a value equal to the string
"OpenMobility”. It is recommended to use public option 224 for this, because the DHCP
client in the application checks for this option.
OR
● the file field in the DHCP message has a sub string equal to "ip_rfp.cnt”
If none of the two rules above match the DHCP offer is ignored.
Information retrieved from the DHCP OFFER:
● the IP address to use is taken from the yiaddr field in the DHCP message
● the IP netmask is taken from the subnet mask option (code 1)
● the default gateway is taken from the router option (code 3)
● the TFTP server IP address is taken from the siaddr field in the DHCP message
● the boot image filename is taken from the file field in the DHCP message, if this field is
empty the default filename "iprfp.bin” is used.
Optional options
● Public option 225 (code 225) with a length of 2 byte is interpreted as VLAN ID.
If this option is present the booter will start over with releasing the current lease and
issuing a new DHCP REQUEST, now using VLAN.
Retries
If the DHCP client does not get an appropriate DHCP OFFER a new DHCP REQUEST is send
after 1 second. After 3 DHCP REQUESTS are send the DHCP client will sleep for 60 seconds.
During this time the booter will accept local configuration from the OpenMobility Configurator
tool.
TFTP client
The TFTP client will download the application image from the TFTP server. Both TFTP server
and the name of the application image are supplied via the DHCP client. The application image
is checksum protected.
Application
After successfully downloading and starting the application the IP DECT base station will
determine the IP-address of the ADMM from DHCP.
The DHCP client is capable to receive broadcast and unicast DHCP replies. The flags field is
therefore 0x0000.
The DHCP request contains the well-known magic cookie (0x63825363) and the End Option
(0xFF).
The following parameters will be supported within this step:
● Public Option 226: ADMM IP Address mandatory
● Public Option 227: Syslog server IP Address optional
● Public Option 228: Syslog server port optional
● DHCP Option 6: Domain Name Server optional
● DHCP Option 15: Domain Name optional
● DHCP Option 42: Network Time Protocol Server optional
Note:
Note: If local configuration via OM Configurator is set, these information will be read
from internal flash memory instead.
Booter update
Mandatory options
Magic string
● Public option 224
The value of this option must be "OpenMobility”
ADMM IP address
● Public option 226
The value is interpreted as ADMM IP address, the length must be 4 byte.
Optional options
LED RED ON
Start-up
wait for link up
yes Local
configuration
no LED red
flashing 0,25 Hz
LED red
flashing 0,5 Hz
DHCP no answer / offer not o.k. retry
DHCP
Wait for 60 seconds; listen
wait for reply for local configuration
LED red
flashing 0,5 Hz
yes DHCP
VLAN
wait for reply DHCP no answer /
offer not o.k.
no
LED red
flashing 2,5 Hz
TFTP
TFTP failed
File download
Kernel
Local
configuration Listen for local configuration in every state
no
yes
LED green
flashing (0,5 Hz)
Application
Init failed
Init
LED green
flashing 1 Hz
Application
Connection attempt to OMM failed
Connect to OMM
LED green
flashing 2 seconds
on / 50ms off
Application
Failure, i.e. connection to OMM lost
Synchronize DECT
LED green
Application
Failure, i.e. connection to OMM lost
Up & running
*
Change of the local configuration
To configure a IP DECT base station, set at least the MAC adress and all mandatory options
(see table below). If the IP DECT base station has a IP adress use this adress in the IP DECT
base station Address field. In this case you can reach a IP DECT base station outside the local
LAN segment.
To set additional parameter, press add button and choose the parameter name.
The configuration can be verified at the IP DECT base station using the telnet interface, please
see section Static local configuration on page 80. It is also be possible to reset all data at the IP
DECT base station, please see section Removing the local configuration on page 81.
802.1Q Support
The IP DECT base stations support VLANs according to IEEE 802.1Q.
VLAN can be administered:
1. on a per port basis of the LAN switch assuming that the IP DECT base stations are
connected to a single port of a switched Ethernet environment
2. or by advising a VLAN ID to the IP DECT base station respective to the VLAN they should
operating in.
VLAN tagging has only to set to IP DECT base station in case (b). The whole chapter refers to
that case.
The benefit of VLAN tagging by IP DECT base station is to set 802.1p priority within Ethernet
frames (how to set Quality of Service, see IP Regions on page 49).
The scope of the following description is only the VLAN tagging and obtaining the VLAN ID.
Quality of Service mechanisms like 802.1p priority and DiffServe are not in the scope of this
section.
DHCP
Because the base station does not know any VLAN during the beginning of the start up two
DHCP scopes are required (This procedure applies regardless of the Ethernet switch being
used):
The following scenario with arbitrary VLAN IDs details the steps a IP DECT base station would
go through in a typical dual-VLAN implementation.
If no user action takes place the ADMM logs out the user after 5 minutes.
To logout from the system click at ‘Logout’.
Note:
Note: If the browser is closed without logging out first the service access will be blocked
for 5 minutes for other clients.
Licensing
Within the initial configuration of the IP DECT system, the license is missing and a warning
occurs.
If that has been done please wait for the green mark as shown by the next picture.
System
System settings
The system settings cover global settings of the Avaya DECT Mobility Manager like the system
name.
For monitoring the DECT system behaviour of the Avaya DECT Mobility Manager a separate
application will be delivered. This tool needs an access to the Avaya DECT Mobility Manager
which is disabled by default and can be enabled on the system page.
The Avaya DECT Mobility Manager and the IP DECT base stations are capable of propagating
syslog messages conforming to RFC 3164. This feature together with the IP address of a host
collecting these messages can be configured.
If the ADMM is running on an IP DECT base station and SNTP is not used, date and time can
be configured at the ADMM. This has to be done to provide date and time to the Avaya 3711.
The time zone, which is shown on this Web page, has been configured at the IP region section
of the Web service.
Please note, that date and time has to be configured after every restart of the IP DECT base
station, where the ADMM is running.
The date and time will be provided by the ADMM to the Avaya 3711 if the Avaya 3711 initiates a
DECT location registration. This will be done in the following cases:
● Subscribing at the ADMM
● Entering the network again after the DECT signal was lost
● Power on
● Silent Charging feature is active at the phone and the phone is taken out of the charger
● After a specific time to update date and time
The DECT location registration can be forced with the ‘Update’ button at the ‘IP DECT handset’
section of the Web service.
User Account
Initially the Avaya IP DECT Mobility Manager service is accessible via a build-in user account
only. After initial installation or after removing the configuration file the user account is set to the
user ‘craft’ with the password ‘crftpw’.
This check is case sensitive.
Time zones
The local time and date displayed on Avaya 3711 DECT handset devices depend on the IP
region the handsets are located in. Each IP region is configured to a certain time zone (see also
Backup on page 48). Based on this the local time can be calculated individually depending on
the current date and the daylight savings time rule. A time and date resynchronisation of the
Avaya 3711 devices is described in Licensing on page 40.
In the time zone section the Avaya DECT Mobility Manager provides all available time zones.
They are set per default with their known daylight savings time rules adjusted to the Universal
Coordinated Time (UTC). The difference to the UTC time is shown in the "UTC Difference”
column. In case of a daylight savings time rule this is also marked for each time zone.
There is a possibility to change the time zone rules for maximal five time zones. Changed rules
are marked with a bold time zone name in the table. The changes are saved in the configuration
file and are restored after each Avaya DECT Mobility Manager boot up. The default button sets
all time zones back to the default values and deletes the changed time zone rules in the
configuration file.
With the configure time zone mask the standard time and the daylight savings time (DST) of a
time zone can be changed. If the time zone has no DST only the UTC difference can be
configured. For the DST both points of time (begin of standard time and begin of daylight
savings time) have to be specified exactly. A certain day in the month or a certain week day in a
month can be used (see the following screen shots as an example).
SNMP
In order to manage a large network of IP DECT base stations offer a SNMP agent in each IP
DECT base station. This will give alarm information and allow a SNMP management system
(such as HP Open View) to manage this network.
All agents are configured in a central place. IP DECT base station dependent parameters like
sysLocation and sysName are generated. sysLocation corresponds to the location configured
via web service. If this location is not configured sysLocation is set to "Location”. sysName is
composed of MAC address and "IP DECT base station” or "ADMM IP DECT base station” if the
ADMM is running on this IP DECT base station.
How long an IP DECT base station is in operational state can be requested by reading
sysUpTime. This value indicates the running time of the IP DECT base station application
software. It does not indicate the running time of the operating system which does not
correspond to the operational IP DECT base station state. This value does not make a
statement about the DECT network.
The SNMP agent responds to SNMPv1 and SNMPv2c read requests for the standard MIB-II
objects. The MIB-II contains 11 object groups, which are described in MIB-II on page 104.
The agent supports both SNMPv1 and SNMPv2c traps. It sends a 'coldStart' trap when it first
starts up, and an enterprise-specific trap 'nsNotifyShutdown' when it stops. When it receives a
SNMP request using an unknown community name it sends an 'authenticationFailure' trap. The
agent generates an enterprise-specific trap 'nsNotifyRestart' (rather than the standard 'coldStart'
or 'warmStart' traps) after being re-configured.
Decoding SNMP messages with your network management system or MIB browser always
requires the publicly available IETF MIB definitions which can be downloaded from http://
www.simpleweb.org/ietf/mibs/index.html?sel=IETF. These are the MIB-II definitions published in
RFC 1156, Management Information Base for Network Management of TCP/IP-based internets,
May 1990 and RFC 1213, Management Information Base for Network Management of TCP/
IP-based internets: MIB-II, March 1991
● RFC1213-MIB
● RFC1212-MIB
● RFC1155-SMI
and the following SNMPv2 definitions published in RFC 1450, Management Information Base
for version 2 of the Simple Network Management Protocol (SNMPv2), April 1993.
● SNMPv2-MIB
● SNMPv2-CONF
● SNMPv2-TC
● SNMPv2-SMI.
Enterprise-specific traps can be decoded using the definitions in
● NET-SNMP-MIB
● NET-SNMP-AGENT-MIB.
The following parameters can be configured using the ADMM web service:
● Read-only Community
● System Contact
● Activate Trap Handling
● Trap Community
● Trap Host IP Address
The community names are used for both SNMPv1 and SNMPv2c.
The IP DECT base station needs an initial ADMM connection to receive its SNMP configuration.
After that this data is persistent against resets. Changing the SNMP configuration forces all
agents to be reconfigured.
The agent does not support MIB-II write access, SNMPv2-MIB read/write access,
NET-SNMP-MIB read/write access, NET-SNMP-AGENT-MIB read/write access and SNMPv3.
Backup
The web service interface allows to save a copy of the current configuration on the local host
(host where the browser application is executed) as well as to restore an older configuration.
The configuration file is a checksum protected, compressed and readable file.
Restoring a previously saved configuration will lead to a reset of the ADMM to take effect.
IP Regions
An IP Region is used to define a relation between a IP DECT base station and the IP Trunks
which have to be used to communicate with the Avaya communication server. At least one
region has to be administered before an IP DECT base station or IP trunk can be added.
IP Regions can be added to the system by pressing the ‘New’ button. A popup window appears
providing the configuration of a new Region:
The same popup window could be opened for an existing IP Region by pressing the tool icon
of the appropriate Region.
The checkbox ‘ADMM Region’ is only available if the ADMM is running on a PC. Otherwise the
system will detect the ADMM Region by itself.
An IP Region could be deleted by pressing the trash can icon . A similar popup window asks
for confirmation showing the current configuration of this IP Region.
Note:
Note: Deleting an IP Region from the system requires all related IP Trunks and IP
DECT base stations to be deleted first. This is indicated with a crossed out trash
can icon .
One IP DECT base station per cluster can be configured as master. The master is displayed in
bold font.
Each IP DECT base station is identified by its ethernet address (6 byte hex format, colon
separated). The ethernet address is unique and can be found on the back of the chassis.
For easier administration each IP DECT base station can be associated with a location string.
The location string can hold up to 20 characters.
New IP DECT base stations can be added to the system by pressing the ‘New’ button. A popup
window appears providing the configuration of a new IP DECT base station. Before a IP DECT
base station can be added the associated IP region has to be already configured.
Note:
Note: Adding a new IP Trunk to the system requires an IP Region to be configured first.
The same popup window could be opened for an existing IP DECT base station by pressing the
tool icon of the appropriate IP DECT base station.
An IP DECT base station could be deleted by pressing the trash can icon . A similar popup
window asks for confirmation showing the current configuration of this IP DECT base station.
DECT configuration
The DECT functionality for each IP DECT base station can be switched on / off. If DECT is
active the IP DECT base station can be added to a cluster and the master option can be set.
Since there is only one master per cluster allowed setting the master checkbox may remove this
option on another IP DECT base station in this cluster.
The IP DECT base station is up and running. The IP DECT base station recognizes and is
recognized by other IP DECT base stations in its cluster through its air interface and
delivers a synchronous clock signal to the telephones.
● Asynchronous but active
The IP DECT base station has not been able to synchronize to its neighbours yet. No DECT
communication is possible. But nevertheless the IP DECT base station has already been
able to connect to the ADMM. This phase should usually last only for a few seconds after
starting up the IP DECT base station or the ADMM. If this state lasts longer this is an
indication for a hardware or network failure.
● Searching
The IP DECT base station has lost synchronisation to its neighbours. No DECT
communication is possible. This phase should usually last only for a few seconds after
starting up the IP DECT base station or the ADMM. If this state lasts longer or is re-entered
after being in a synchronous state this is an indication for a bad location of the IP DECT
base station.
● Inactive
The IP DECT base station has connected to the ADMM but the air interface has not been
switched on yet. For any IP DECT base station with activated DECT functionality this phase
should last only for a few seconds after starting up the IP DECT base station. If this state
lasts longer this may indicate an hardware failure.
● Not connected
The IP DECT base station was configured but has not connected to the ADMM yet.
The IP address column displays the current IP address of an IP DECT base station.
IP Trunks
An IP Trunk defines a communication relation between an ADMM and an Avaya communication
server for H.323 signaling.
IP Trunks can be added to the system by pressing the ‘New’ button. A popup window appears
providing the configuration of a new Trunk. Before a trunk can be added the associated IP
region has to be already configured.
A new telephone can be added to the system by pressing the ‘New’ button. The following popup
window appears allowing the configuration of a new telephone.
The type of the phone will be automatically detected in case of the Avaya 3701 and Avaya 3711.
If the type of a phone can not be detected the type will be set to WT9620 automatically.
If the type (WT9620, 20DT, GAP) of the phone is configured before subscription and the type
can not be detected then the configured type will be used.
The Name and Authentication Code fields are optional settings. The Number is displayed in the
DECT Monitor program and the Name allows to identify its user. The Authentication Code is
used during initial subscription as a security option.
A similar popup window appears when configuring an existing telephone by pressing the tool
icon . The only difference is the delete subscription checkbox. If this option is selected, the
telephone will be unsubscribed.
Note:
Note: The Authentication Code can only be changed if the telephone is not subscribed.
The telephone Name can be changed, but this will not take effect until the
telephone is subscribed again.
Deleting of a telephone can be done by pressing the trash can icon . A popup window
appears and asks for confirmation.
After adding a telephone to the ADMM the telephone must be subscribed. This is done by
pressing the ‘Subscribe’ button. The ADMM will allow a subscription of configured but not
subscribed telephones during the next hour (how to subscribe the see Registration of Avaya
3701 and Avaya 3711 on page 73).
During the subscription process the system wide PARK and the Authentication Code either
configured for the telephone or system wide must be entered in the telephone form fields. The
PARK is displayed at the telephone configuration page in the top right corner.
If the user wants to find a certain handset then the search function can be used. A click on the
‘Search’ button provides the following pop-up window.
The user can enter the handsets’s number or IPEI. At least one parameter has to be set.
The entered number or IPEI has to match exactly with a handset’s number or IPEI. If number
and IPEI are given then a handset has to exist in the ADMM’s database whose number and
IPEI match both otherwise the search fails.
If a handset with the specified number and/or IPEI was found then a list is displayed which has
the found handset as the first entry.
The search function can also be used to get to the right sub-list in one step.
To force an update of date/time, voice mail number or the (de)activation of MSSF items
immediately at the Avaya 3711 press the ‘Update’ button.
System Features
Voice Mail
The Voice Mail number can be administered on ADMM which will be common for all subscribed
DECT users. In case the Voice Mail number should be different for the DECT users it should be
left blank on ADMM and have it set on the DECT sets.
By pressing the "Menu” soft key in idle state or "Option” soft key in active state, the telephone
will show a collection of menu items on its display. This collection of menu items can be
configured by the ADMM.
For each menu item to be presented to the user set the active flag
For each menu item NOT to be presented to the user clear the active flag
The active flag can only be set if the Feature Access Code field is assigned with appropriate
digits and characters (0-9, *, #).
To mute the telephone during the execution of some system feature set the corresponding mute
flag.
The menu items appear on the telephone display in the user selected language. By changing
the language the menu items will be updated.
Digit Treatment
The Digit Treatment replaces, deletes or inserts digits for numbers received by the LDAP based
Corporate Directory or WML. This functions is region dependent.
The digits are treated in two steps:
● At first all invalid characters like space or hyphens are removed from the number (e.g.
"+49 (30) 6104 4492” will be substituted by +493061044492).
● In second step the best match is searched within the configured prefix list which is valid for
the region the IP DECT handset is located. The prefix will be substituted (e.g. the best
match for the number "+493061044492” is the prefix "+49306104” with the substitute "”;
the result is "4492”).
The digit treatment takes place before the number will be transmitted to the handset menu.
Value ranges and limits:
● Up to 128 entries if ADMM is running on a IP DECT base station and 750 entries if ADMM
is running on a linux server are possible.
● Each prefix may be composed of the digits (0-9) and the characters ‘*’ and ‘’#’. In
conformance to LDAP standards the first character may be ‘+’. Up to 15 digits per
sequence are possible. Spaces are not allowed.
● Each substitute may be composed of the digit (0-9) and the characters ‘*’ and ‘’#’.
Entries may be valid for several regions. The region numbers have to be separated by ‘,’ (e.g.
1,2,3) or may be defined as range by ‘-‘ (e.g. 1-3).
Corporate Directory
The administrator can choose between a LDAP based corporate directory and a TFTP based
corporate directory.
● Corporate Directory Type (values: LDAP based, TFTP based, None; default: None)
In case of "none” the feature is inactive and no item for the corporate directory is displayed in
the telephone menu.
Field description :
● Server Name and Server Port (mandatory)
- Server Name or Server IP Address
- Server Port (default: 389)
Please note: SSL (default port 689) is not supported
● Root Directory
The search base has to be edited (e.g. "ou=people,o=avaya.com” or "o=detewe group”).
● User Name and User Password
User name or password may be filled, if requested by the LDAP Server. Otherwise an
anonymous bind takes place.
Please note: the ADMM supports LDAP simple bind
● Search Attribute
Searches will be done for one of the following attributes
- Name1 (sn)-> (default2)
- Full name (cn)
● Display Attributes
Selection between the following two alternatives is possible:
- Surname (sn), first name (givenname) ->default
- Full name (cn)
● Server Search Timeout
(value range: 1 - 99 sec)
The search results will be accepted within search time.
1 surname
2 The default search string support the functionality in such a way that the corporate phone book looks like the
local phone book.
Field description :
● Server Name (mandatory)
- Server Name or Server IP Address
- Server Port (default: 69)
● Internal List
Path and file; sequence of up to 127 characters, default: "nasystem/user_list2"
The entries in the file look like: "Percy,201,Percy Sudden". This is the User Name,
Extension Number and User Full Name.
● External List
Path and file; sequence of up to 127 characters, default: "nasystem/dir_list"
The entries in the file look like: "John Smith,01983 562335", without ", and entries are
separated by '\n'. The first element is the name and the second is the telephone number.
WML
The ADMM supports a menu with up to 9 pre-configured URLs and one menu item which allows
the user to enter an URL.
WML is enabled by:
● WML Active flag (to activate / deactivate the feature and the item in the telephone menu;
default: inactive)
Each pre-configured URLs is administered by filling the following fields (press the New button)
● Name (Alias for the menu item be shown in telephone menu)
● URL (e.g. http//172.17.4.64/waptest)
● Active Flag (to activate / deactivate the item in the telephone menu; default: inactive)
● The Incoming Digit Handling for the IP trunk should support overlap:
display trunk-group 100 Page 1 of 21
TRUNK GROUP
TRUNK PARAMETERS
SBS? n
1: T00188 100
2: T00189 100
3: T00190 100
4: T00191 100
5:
6:
● The DECT station administration should be XMOBILE Type and the Configuration set
should be blank. The Avaya 37x1 DECT sets support ICON Message Waiting Type and
16x2 Length of Display:
display station 4006001 Page 1 of 3
STATION
STATION
Headset? n
Speaker? n
Mounting: d
Floor: Cord Length: 0
Building: Set Color:
ABBREVIATED DIALING
List1: List2: List3:
WML
WML is only available for the Avaya 3711. You can access a WML site with few key strokes:
1. Long press of the "Menu” soft key
2. Select WML Portal.
3. Press OK.
Now you can navigate within the pre-configured URLs (see Digit Treatment on page 61) or
select the user input to type your URL.
Please note:
● You can leave all levels within your navigation by pressing short the ESC soft key, which
brings you up to the prior menu level. With a long press of the ESC soft key you can leave
the corporate with one step.
● Edit fields are marked by "()”
● Links are enclosed by "[...]”.
Pre-configured URL
1. Select WML Portal.
2. Press OK.
Now you can navigate within the WML pages if the URL is a valid link to a WML server.
Corporate Directory
The corporate directory is only available for the Avaya 3711. You can access the Corporate
Directory with few key strokes:
1. Long press of the "Menu” soft key
2. Select Directory.
3. Press OK.
Or, you can use the key, if the phone is in the idle state. Just press the T (down) part of the
key. (With the S (up) part you have access to the local phone book.)
Now you can navigate within the phonebook. It may be LDAP or TFTP based depending on the
settings done by the administrator of the ADMM (see Corporate Directory on page 61).
Please note: you can leave all levels within your navigation by pressing short the ESC soft key,
which brings you up to the prior menu level. With a long press of the ESC soft key you can leave
the corporate with one step.
Avaya system
Updating the 20DT handsets message waiting indication state e. g. when switching off and on
the handset or leaving and entering DECT areas, will be covered by the Avaya DECT Mobility
Manager. Therefore the Avaya system does not repeat or refresh the MWI-on/off messages.
The Avaya system always notifies the change of the message waiting indication state for each
handset.
MWI ON
MWI OFF
Configuration
The following administration must be done in the Avaya DECT Mobility Manager for the
Message Waiting Indication feature (please refer also to IP Trunks on page 53):
● Terminal type of 20DT telephone handset
● Call number of the voice mail equipment to fill up the SETUP message
● Administration state for any 20DT telephone handset to switch on and off the Message
Waiting Indication feature
● Optional value for the refreshing cycle (0 – 60 minutes, default 0) for each 20DT telephone
handset to refresh the message waiting indication state on the handset.
Booter
Booter update may be handled via DHCP Option 254 "UPDATE” (see Booter update on
page 29) automatically. In any case you may have direct control to booter SW, if you use a
telnet user session.
> flash
version of initial booter : 2.0.12
Version of booter 1 : 3.2.8
Version of booter 2 : 3.2.8
Hardware Revision : 51
MAC address : 00:30:42:08:31:A4
>
> local_db
use_local_cfg=1
ip=172.30.111.234
subnet=255.255.0.0
siaddr=172.30.206.20
boot_file=/omm_avaya.tftp
ommip=172.30.111.234
>
> local_db -c
> local_db
>
Select the COM port to which you have connected the download adapter.
After the update was finished you can remove the handset and continue to update another
handset just by putting the prepared handset on the download adapter.
The telephone is actually connected to IP DECT base station with the number 02. Also visible
IP DECT base stations are the 01 and 00. The number 10FFF221 02 on the upper right side
refers to the PARK
1F-10-F2-FF-21 of the IP DECT system and the number 02 refers to the IP DECT base station
where the telephone is locked to.
If the connected Avaya 3711 is identified by the Installer, the Avaya 3711 is switched off
If the update has been finished you can leave the program or start the upgrade of the next IP
DECT handset.
The spectrum analyzer is not always required. It is needed as verification if it is suspected that
interference sources exist, that could affect the DECT frequency range (approx. 1.9 GHz)
Diagnostic
Syslog
The Avaya DECT Mobility Manager and the IP DECT base stations are capable of propagating
syslog messages conforming to RFC 3164. This feature together with the IP address of a host
collecting these messages can be configured.
Syslog has to be enabled by:
● DHCP using public option 227 and 228 (see Syslog server IP address and port on
page 30)
● local configuration via OM Configurator (see Static local configuration of the IP DECT base
station on page 33)
● setting syslog daemon server and port via WEB interface (see System settings on
page 42)
To set Syslog via DHCP ore OM Configurator has the advantage, that syslogs are available in
earlier states of IP DECT base station start up.
The level of syslog messages in the default state allows the user, to have control about the
general state of the system and major failures. If it is wished to increase the level for diagnostic
reasons, it can be done via telnet user shell by increasing the SPY level of subsystems (see
Telnet user shell on page 94). This should be only used by the support organization because it
can harm the system operation.
You can also read syslogs if you type the command "logread” within telnet user shell.
Login
The procedure is:
● Open telnet session to the IP DECT base station
● Username is ‘iprfp’
● Password is ‘crftpw’
(BUILD 0)
172.30.111.232 login: iprfp
Password:
Command overview
Type help to get a command overview:
Please note the "spy” command, which enables you to increase the level of syslog messages.
This should be only used by the support organization because it can harm the system
operation.
Please note the "spy” command, which enables you to increase the level of syslog messages
especially for subsystems of the ADMM. This should be only used by the support organization
because it can harm the system operation.
SNMP
● In order to manage a large network of IP DECT base stations offers a SNMP agent in each
IP DECT base station.
● The SNMP agent responds to SNMPv1 and SNMPv2c read requests for the standard
MIB-II objects.
● The agent supports both SNMPv1 and SNMPv2c traps ('coldStart' , 'nsNotifyShutdown' ,
'authenticationFailure’ and 'nsNotifyRestart' )
● Decoding SNMP messages with your network management system or MIB browser
always requires the publicly available IETF MIB definitions which can be downloaded.
Please see SNMP on page 46 for configuration of SNMP and MIB-II on page 104 to get an
overview about the MIB II objects.
When all links have been established, the DECT data of the system are automatically read out
and entered in the tables "RFP-Table" and "PP-Table". This procedure is called "Config
Request".
Next, the defined trace options (Event Mask) are sent to the ADMM. The options which are sent
to the ADMM are always those which were active the last time the program was exited.
If the trace option "Transaction establish/release" is activated, the ADMM will deliver all existing
transactions.
Following this, the ADMM system delivers the desired trace data. The user can either
communicate with the program interactively (see below) or he can simply activate a log file in
which to record the data.
Following this initialisation, the user can carry out the following modifications:
● The trace settings can be modified using the menu item Options-Event Mask.
Transmission to the ADMM takes place after confirmation of the settings with <OK>.
● A Config Request can be sent again to the ADMM.
There are several optional child windows selectable. They are all listed below and give some
more information about the Avaya IP DECT systems. Mostly they are statistics and for internal
use only.
Appendix A: Appendix
Supported codecs in combination with silence suppression and Voice Activity Detection
respectively:
G.711A X X X X
G.711A SS X X X
G.711MU X X X X
G.711MU SS X X X
G.729 SS (X)=>G.729A
SS
G.729A X X X X
G.729A SS X X
G.729B SS
G.729AB SS
G.723.1 5.3 X
G.723.1 5.3 SS X
G.723.1 6.3 X X X X
MIB-II
The following chapters describe the 11 object groups published in 5 and 6. The OID part is
added in brackets.
system (1)
The vendor's authoritative identification of the network management subsystem contained in the
entity. Implementation of the system group is mandatory for all systems.
sysDescr (1)
A textual description of the entity. This value should include the full name and version
identification of the system's hardware type, software operating-system, and networking
software. It is mandatory that this only contain printable ASCII characters.
sysObjectID (2)
The vendor's authoritative identification of the network management subsystem contained in the
entity.
sysUpTime (3)
The time (in hundredths of a second) since the network management portion of the system was
last re-initialized.
sysContact (4)
The textual identification of the contact person for this managed node, together with information
on how to contact this person.
sysName (5)
An administratively-assigned name for this managed node. By convention, this is the node's
fully-qualified domain name.
sysLocation (6)
The physical location of this node (e.g., "telephone closet, 3rd floor").
sysServices (7)
A value which indicates the set of services that this entity potentially offers. The value is a sum.
This sum initially takes the value zero, Then, for each layer, L, in the range 1 through 7, that this
node performs transactions for, 2 raised to (L - 1) is added to the sum. For example, a node
which performs only routing functions would have a value of 4 (2^(3-1)). In contrast, a node
which is a host offering application services would have a value of 72 (2^(4-1) + 2^(7-1)). Note
that in the context of the Internet suite of protocols, values should be calculated accordingly:
layer functionality
1 physical (e.g., repeaters)
2 data link/sub network (e.g., bridges)
3 internet (e.g., supports the IP)
4 end-to-end (e.g., supports the TCP)
7 applications (e.g., supports the SMTP)
For systems including OSI protocols, layers 5 and 6 may also be counted.
interfaces (2)
Implementation of the interfaces group is mandatory for all systems.
ifNumber (1)
The number of network interfaces (regardless of their current state) present on this system.
ifTable (2)
The Interfaces table contains information on the entity's interfaces. Each interface is thought of
as being attached to a "subnetwork". Note that this term should not be confused with "subnet"
which refers to an addressing partitioning scheme used in the Internet suite of protocols.
A list of interface entries:
ifEntry (1)
An interface entry containing objects at the sub network layer and below for a particular
interface.
ifIndex (1)
A unique value for each interface. Its value ranges between 1 and the value of ifNumber. The
value for each interface must remain constant at least from one re- initialisation of the entity's
network management system to the next re-initialisation.
ifDescr (2)
A text string containing information about the interface. This string should include the name of
the manufacturer, the product name and the version of the hardware interface. The string is
intended for presentation to a human; it must not contain anything but printable ASCII
characters
ifType (3)
The type of interface, distinguished according to the physical/link/network protocol(s)
immediately "below" IP in the protocol stack.
other(1), -- none of the following
regular1822(2)
hdh1822(3)
ddn-x25(4)
rfc877-x25(5)
ethernet-csmacd(6)
iso88023-csmacd(7)
iso88024-tokenBus(8)
iso88025-tokenRing(9)
iso88026-man(10)
starLan(11)
proteon-10MBit(12)
proteon-80MBit(13)
hyperchannel(14)
fddi(15)
lapb(16)
sdlc(17)
t1-carrier(18)
cept(19) -- european equivalent of T-1
basicIsdn(20)
primaryIsdn(21) -- proprietary serial
propPointToPointSerial(22)
ppp(23)
softwareLoopback(24)
eon(25) -- CLNP over IP [12]
ethernet-3Mbit(26)
nsip(27) -- XNS over IP
slip(28) -- generic SLIP
ultra(29) -- ULTRA technologies
ds3(30) -- T-3
sip(31) -- SMDS
frame-relay(32)
ifMtu (4)
The size of the largest IP datagram which can be sent/received on the interface, specified in
octets.
ifSpeed (5)
An estimate of the interface's current bandwidth in bits per second. For interfaces which do not
vary in bandwidth or for those where no accurate estimation can be made, this object should
contain the nominal bandwidth.
ifPhysAddress (6)
The interface's address at the protocol layer immediately "below" IP in the protocol stack. For
interfaces which do not have such an address (e.g., a serial line), this object should contain an
octet string of zero length.
ifAdminStatus (7)
The desired state of the interface. The testing(3) state indicates that no operational packets can
be passed.
ifOperStatus (8)
The current operational state of the interface.
up(1)-- ready to pass packets
down(2)
testing(3)-- in some test mode
The testing(3) state indicates that no operational packets can be passed.
ifLastChange (9)
The value of sysUpTime at the time the interface entered its current operational state. If the
current state was entered prior to the last re-initialisation of the local network management
subsystem, then this object contains a zero value.
ifInOctets (10)
The total number of octets received on the interface, including framing characters.
ifInUcastPkts (11)
The number of (subnet) unicast packets delivered to a higher-layer protocol.
ifInNUcastPkts(12)
The number of non-unicast (i.e., subnet broadcast or subnet multicast) packets delivered to a
higher-layer protocol.
ifInDiscards (13)
The number of inbound packets which were chosen to be discarded even though no errors had
been detected to prevent their being deliverable to a higher-layer protocol. One possible reason
for discarding such a packet could be to free up buffer space.
ifInErrors (14)
The number of inbound packets that contained errors preventing them from being deliverable to
a higher-layer protocol.
ifInUnknownProtos (15)
The number of packets received via the interface which were discarded because of an unknown
or unsupported protocol.
ifOutOctets (16)
The total number of octets transmitted out of the interface, including framing characters.
ifOutUcastPkts (17)
The total number of packets that higher-level protocols requested be transmitted to a
subnet-unicast address, including those that were discarded or not sent.
ifOutNUcastPkts (18)
The total number of packets that higher-level protocols requested be transmitted to a
non-unicast (i.e., a subnet broadcast or subnet multicast) address, including those that were
discarded or not sent.
ifOutDiscards (19)
The number of outbound packets which were chosen to be discarded even though no errors
had been detected to prevent their being transmitted. One possible reason for discarding such a
packet could be to free up buffer space.
ifOutErrors (20)
The number of outbound packets that could not be transmitted because of errors.
ifOutQLen (21)
The length of the output packet queue (in packets).
ifSpecific (22)
A reference to MIB definitions specific to the particular media being used to realise the interface.
For example, if the interface is realized by an ethernet, then the value of this object refers to a
document defining objects specific to ethernet. If an agent is not configured to have a value for
any of these variables, the object identifier
nullSpecific OBJECT IDENTIFIER ::= { 0 0 }
is returned. Note that "nullSpecific" is a syntactically valid object identifier, and any conformant
implementation of ASN.1 and BER must be able to generate and recognise this value.
at (3)
Address Translation, deprecated.
ip (4)
Implementation of the ip group is mandatory for all systems.
ipForwarding (1)
The indication of whether this entity is acting as an IP gateway in respect to the forwarding of
datagrams received by, but not addressed to, this entity. IP gateways forward datagrams; Hosts
do not (except those Source-Routed via the host).
gateway(1) -- entity forwards datagrams
host(2) -- entity does NOT forward datagrams
ipDefaultTTL (2)
The default value inserted into the Time-To-Live field of the IP header of datagrams originated
at this entity, whenever a TTL value is not supplied by the transport layer protocol.
ipInReceives (3)
The total number of input datagrams received from interfaces, including those received in error.
ipInHdrErrors (4)
The number of input datagrams discarded due to errors in their IP headers, including bad
checksums, version number mismatch, other format errors, time-to-live exceeded, errors
discovered in processing their IP options, etc.
ipInAddrErrors (5)
The number of input datagrams discarded because the IP address in their IP header's
destination field was not a valid address to be received at this entity. This count includes invalid
addresses (e.g., 0.0.0.0) and addresses of unsupported Classes (e.g., Class E). For entities
which are not IP Gateways and therefore do not forward datagrams, this counter includes
datagrams discarded because the destination address was not a local address.
ipForwDatagrams (6)
The number of input datagrams for which this entity was not their final IP destination, as a result
of which an attempt was made to find a route to forward them to that final destination. In entities
which do not act as IP Gateways, this counter will include only those packets which were
Source-Routed via this entity, and the Source-Route option processing was successful.
ipInUnknownProtos (7)
The number of locally-addressed datagrams received successfully but discarded because of an
unknown or unsupported protocol.
ipInDiscards (8)
The number of input IP datagrams for which no problems were encountered to prevent their
continued processing, but which were discarded (e.g. for lack of buffer space). Note that this
counter does not include any datagrams discarded while awaiting re-assembly.
ipInDelivers (9)
The total number of input datagrams successfully delivered to IP user-protocols (including
ICMP).
ipOutRequests (10)
The total number of IP datagrams which local IP user- protocols (including ICMP) supplied to IP
in requests for transmission. Note that this counter does not include any datagrams counted in
ipForwDatagrams.
ipOutDiscards (11)
The number of output IP datagrams for which no problem was encountered to prevent their
transmission to their destination, but which were discarded (e.g., for lack of buffer space). Note
that this counter would include datagrams counted in ipForwDatagrams if any such packets met
this (discretionary) discard criterion.
ipOutNoRoutes (12)
The number of IP datagrams discarded because no route could be found to transmit them to
their destination. Note that this counter includes any packets counted in ipForwDatagrams
which meet this "no-route" criterion.
ipReasmTimeout (13)
The maximum number of seconds which received fragments are held while they are awaiting
reassembly at this entity.
ipReasmReqds (14)
The number of IP fragments received which needed to be reassembled at this entity.
ipReasmOKs (15)
The number of IP datagrams successfully re-assembled.
ipReasmFails (16)
The number of failures detected by the IP re-assembly algorithm (for whatever reason: timed
out, errors, etc). Note that this is not necessarily a count of discarded IP fragments since some
algorithms (notably RFC 815's) can lose track of the number of fragments by combining them as
they are received.
ipFragOKs (17)
The number of IP datagrams that have been successfully fragmented at this entity.
ipFragFails (18)
The number of IP datagrams that have been discarded because they needed to be fragmented
at this entity but could not be, e.g., because their "Don't Fragment" flag was set.
ipFragCreates (19)
The number of IP datagram fragments that have been generated as a result of fragmentation at
this entity.
ipAddrTable (20)
The table of addressing information relevant to this entity's IP addresses.
ipAddrEntry (1)
The addressing information for one of this entity's IP addresses.
ipAdEntAddr (1)
The IP address to which this entry's addressing information pertains.
ipAdEntIfIndex (2)
The index value which uniquely identifies the interface to which this entry is applicable. The
interface identified by a particular value of this index is the same interface as identified by the
same value of ifIndex.
ipAdEntNetMask (3)
The sub net mask associated with the IP address of this entry. The value of the mask is an IP
address with all the network bits set to 1 and all the hosts bits set to 0.
ipAdEntBcastAddr (4)
The value of the least-significant bit in the IP broadcast address used for sending datagrams on
the (logical) interface associated with the IP address of this entry. For example, when the
Internet standard all-ones broadcast address is used, the value will be 1.
ipAdEntReasmMaxSize (5)
The size of the largest IP datagram which this entity can re-assemble from incoming IP
fragmented datagrams received on this interface.
ipRouteTable (21)
The IP Route Table contains an entry for each route presently known to this entity. Note that the
action to be taken in response to a request to read a non-existent entry, is specific to the
network management protocol being used.
ipRouteEntry (1)
A route to a particular destination.
ipRouteDest (1)
The destination IP address of this route. An entry with a value of 0.0.0.0 is considered a default
route. Multiple such default routes can appear in the table, but access to such multiple entries is
dependent on the table-access mechanisms defined by the network management protocol in
use.
ipRouteIfIndex (2)
The index value which uniquely identifies the local interface through which the next hop of this
route should be reached. The interface identified by a particular value of this index is the same
interface as identified by the same value of ifIndex.
ipRouteMetric1 (3)
The primary routing metric for this route. The semantics of this metric are determined by the
routing-protocol specified in the route's ipRouteProto value. If this metric is not used, its value
should be set to -1.
ipRouteMetric2 (4)
An alternate routing metric for this route. The semantics of this metric are determined by the
routing- protocol specified in the route's ipRouteProto value. If this metric is not used, its value
should be set to -1.
ipRouteMetric3 (5)
An alternate routing metric for this route. The semantics of this metric are determined by the
routing- protocol specified in the route's ipRouteProto value. If this metric is not used, its value
should be set to -1.
ipRouteMetric4 (6)
An alternate routing metric for this route. The semantics of this metric are determined by the
routing- protocol specified in the route's ipRouteProto value. If this metric is not used, its value
should be set to -1.
ipRouteNextHop (7)
The IP address of the next hop of this route.
ipRouteType (8)
The type of route:
other(1) -- none of the following
invalid(2) -- an invalidated route
-- route to directly
direct(3) -- connected (sub-)network
-- route to a non-local
remote(4) -- host/network/sub-network
ipRouteProto (9)
The routing mechanism via which this route was learned. Inclusion of values for gateway
routing protocols is not intended to imply that hosts should support those protocols.
other(1) -- none of the following
-- non-protocol information
local(2) -- e.g., manually configured entries
netmgmt(3) -- set via a network management protocol
icmp(4) -- obtained via ICMP e.g., Redirect
egp(5) -- the remaining values are
ggp(6) -- all gateway routing protocols
hello(7)
rip(8)
is-is(9)
es-is(10)
ciscoIgrp(11)
bbnSpfIgp(12)
oigp(13)
ipRouteAge (10)
The number of seconds since this route was last updated or otherwise determined to be correct.
Note that no semantics of "too old" can be implied except through knowledge of the routing
protocol by which the route was learned.
ipRouteMask (11)
Indicate the mask to be logical-ANDed with the destination address before being compared to
the value in the ipRouteDest field. For those systems that do not support arbitrary sub net
masks, an agent constructs the value of the ipRouteMask by determining whether the value of
the correspondent ipRouteDest field belong to a class-A, B, or C network, and then using one
of: mask network 255.0.0.0 class-A 255.255.0.0 class-B 255.255.255.0 class-C If the value of
the ipRouteDest is 0.0.0.0 (a default route), then the mask value is also 0.0.0.0. It should be
noted that all IP routing subsystems implicitly use this mechanism.
ipRouteMetric5 (12)
An alternate routing metric for this route. The semantics of this metric are determined by the
routing-protocol specified in the route's ipRouteProto value. If this metric is not used, its value
should be set to -1.
ipRouteInfo (13)
A reference to MIB definitions specific to the particular routing protocol which is responsible for
this route, as determined by the value specified in the route's ipRouteProto value. If this
information is not present, its value should be set to the OBJECT IDENTIFIER { 0 0 }, which is a
syntactically valid object identifier, and any conformant implementation of ASN.1 and BER must
be able to generate and recognise this value.
ipNetToMediaTable (22)
The IP Address Translation table used for mapping from IP addresses to physical addresses.
IpNetToMediaEntry (1)
Each entry contains one IP address to "physical" address equivalence.
ipNetToMediaIfIndex (1)
The interface on which this entry's equivalence is effective. The interface identified by a
particular value of this index is the same interface as identified by the same value of ifIndex.
ipNetToMediaPhysAddress (2)
The media-dependent "physical" address.
ipNetToMediaNetAddress (3)
The IpAddress corresponding to the media-dependent "physical" address.
ipNetToMediaType (4)
The type of mapping.
other(1) -- none of the following
invalid(2) -- an invalidated mapping
dynamic(3)
static(4)
Setting this object to the value invalid(2) has the effect of invalidating the corresponding entry in
the ipNetToMediaTable. That is, it effectively disassociates the interface identified with said
entry from the mapping identified with said entry. It is an implementation-specific matter as to
whether the agent removes an invalidated entry from the table. Accordingly, management
stations must be prepared to receive tabular information from agents that corresponds to entries
not currently in use. Proper interpretation of such entries requires examination of the relevant
ipNetToMediaType object.
ipRoutingDiscards (23)
The number of routing entries which were chosen to be discarded even though they are valid.
One possible reason for discarding such an entry could be to free-up buffer space for other
entries.
icmp (5)
Implementation of the icmp group is mandatory for all systems.
The icmp group contains the ICMP input and output statistics.
Note that individual counters for ICMP message (sub-)codes have been omitted from this
(version of the) MIB for simplicity.
icmpInMsgs (1)
The total number of ICMP messages which the entity received. Note that this counter includes
all those counted by icmpInErrors.
icmpInErrors (2)
The number of ICMP messages which the entity received but determined as having errors (bad
ICMP checksums, bad length, etc.).
icmpInDestUnreachs (3)
The number of ICMP Destination Unreachable messages received.
icmpInTimeExcds (4)
The number of ICMP Time Exceeded messages received.
icmpInParmProbs (5)
The number of ICMP Parameter Problem messages received.
icmpInSrcQuenchs (6)
The number of ICMP Source Quench messages received.
icmpInRedirects (7)
The number of ICMP Redirect messages received.
icmpInEchos (8)
The number of ICMP Echo (request) messages received.
icmpInEchoReps (9)
The number of ICMP Echo Reply messages received.
icmpInTimestamps (10)
The number of ICMP Timestamp (request) messages received.
icmpInTimestampReps (11)
The number of ICMP Timestamp Reply messages received.
icmpInAddrMasks (12)
The number of ICMP Address Mask Request messages received.
icmpInAddrMaskReps (13)
The number of ICMP Address Mask Reply messages received.
icmpOutMsgs (14)
The total number of ICMP messages which this entity attempted to send. Note that this counter
includes all those counted by icmpOutErrors.
icmpOutErrors (15)
The number of ICMP messages which this entity did not send due to problems discovered
within ICMP such as a lack of buffers. This value should not include errors discovered outside
the ICMP layer such as the inability of IP to route the resultant datagram. In some
implementations there may be no types of error which contribute to this counter's value.
icmpOutDestUnreachs (16)
The number of ICMP Destination Unreachable messages sent.
icmpOutTimeExcds (17)
The number of ICMP Time Exceeded messages sent.
icmpOutParmProbs (18)
The number of ICMP Parameter Problem messages sent.
icmpOutSrcQuenchs (19)
The number of ICMP Source Quench messages sent.
icmpOutRedirects (20)
The number of ICMP Redirect messages sent.
icmpOutEchos (21)
The number of ICMP Echo (request) messages sent.
icmpOutEchoReps (22)
The number of ICMP Echo Reply messages sent.
icmpOutTimestamps (23)
The number of ICMP Timestamp (request) messages sent.
icmpOutTimestampReps (24)
The number of ICMP Timestamp Reply messages sent.
icmpOutAddrMasks (25)
The number of ICMP Address Mask Request messages sent.
icmpOutAddrMaskReps (26)
The number of ICMP Address Mask Reply messages sent.
tcp (6)
Implementation of the TCP group is mandatory for all systems that implement the TCP protocol.
Note that instances of object types that represent information about a particular TCP connection
are transient; they persist only as long as the connection in question.
tcpRtoAlgorithm (1)
The algorithm used to determine the timeout value used for retransmitting unacknowledged
octets.
other(1) -- none of the following
constant(2) -- a constant Rto
rsre(3) -- MIL-STD-1778, Appendix B
vanj(4) -- Van Jacobson's algorithm [15]
tcpRtoMin (2)
The minimum value permitted by a TCP implementation for the retransmission timeout,
measured in milliseconds. More refined semantics for objects of this type depend upon the
algorithm used to determine the retransmission timeout. In particular, when the timeout
algorithm is rsre(3), an object of this type has the semantics of the LBOUND quantity described
in RFC 793.
tcpRtoMax (3)
The maximum value permitted by a TCP implementation for the retransmission timeout,
measured in milliseconds. More refined semantics for objects of this type depend upon the
algorithm used to determine the retransmission timeout. In particular, when the timeout
algorithm is rsre(3), an object of this type has the semantics of the UBOUND quantity described
in RFC 793.
tcpMaxConn (4)
The limit on the total number of TCP connections the entity can support. In entities where the
maximum number of connections is dynamic, this object should contain the value "-1".
tcpActiveOpens (5)
The number of times TCP connections have made a direct transition to the SYN-SENT state
from the CLOSED state.
tcpPassiveOpens (6)
The number of times TCP connections have made a direct transition to the SYN-RCVD state
from the LISTEN state.
tcpAttemptFails (7)
The number of times TCP connections have made a direct transition to the CLOSED state from
either the SYN-SENT state or the SYN-RCVD state, plus the number of times TCP connections
have made a direct transition to the LISTEN state from the SYN-RCVD state.
tcpEstabResets (8)
The number of times TCP connections have made a direct transition to the CLOSED state from
either the ESTABLISHED state or the CLOSE-WAIT state.
tcpCurrEstab (9)
The number of TCP connections for which the current state is either ESTABLISHED or
CLOSE-WAIT.
tcpInSegs (10)
The total number of segments received, including those received in error. This count includes
segments received on currently established connections.
tcpOutSegs (11)
The total number of segments sent, including those on current connections but excluding those
containing only retransmitted octets.
tcpRetransSegs (12)
The total number of segments retransmitted - that is, the number of TCP segments transmitted
containing one or more previously transmitted octets.
tcpConnTable (13)
A table containing TCP connection-specific information.
tcpConnEntry (1)
Information about a particular current TCP connection. An object of this type is transient, in that
it ceases to exist when (or soon after) the connection makes the transition to the CLOSED state.
tcpConnState (1)
The state of this TCP connection.
closed(1)
listen(2)
synSent(3)
synReceived(4)
established(5)
finWait1(6)
finWait2(7)
closeWait(8)
lastAck(9)
closing(10)
timeWait(11)
tcpConnLocalAddress (2)
The local IP address for this TCP connection.
tcpConnLocalPort (3)
The local port number for this TCP connection.
tcpConnRemAddress (4)
The remote IP address for this TCP connection.
tcpConnRemPort (5)
The remote port number for this TCP connection.
tcpInErrs (14)
The total number of segments received in error (e.g., bad TCP checksums).
tcpOutRsts (15)
The number of TCP segments sent containing the RST flag.
udp (7)
Implementation of the UDP group is mandatory for all systems which implement the UDP
protocol.
udpInDatagrams (1)
The total number of UDP datagrams delivered to UDP users.
udpNoPorts (2)
The total number of received UDP datagrams for which there was no application at the
destination port.
udpInErrors (3)
The number of received UDP datagrams that could not be delivered for reasons other than the
lack of an application at the destination port.
udpOutDatagrams (4)
The total number of UDP datagrams sent from this entity.
udpTable (5)
A table containing UDP listener information.
udpEntry (1)
Information about a particular current UDP listener.
udpLocalAddress (1)
The local IP address for this UDP listener. In the case of a UDP listener which is willing to
accept datagrams for any IP interface associated with the node, the value 0.0.0.0 is used.
udpLocalPort (2)
The local port number for this UDP listener.
egp (8)
Exterior Gateway Protocol, historical.
cmot (9)
Common Management Information Services and Protocol over TCP/IP, deprecated.
transmission (10)
Based on the transmission media underlying each interface on a system, the corresponding
portion of the Transmission group is mandatory for that system. When Internet-standard
definitions for managing transmission media are defined, the transmission group is used to
provide a prefix for the names of those objects. Typically, such definitions reside in the
experimental portion of the MIB until they are "proven", then as a part of the Internet
standardisation process, the definitions are accordingly elevated and a new object identifier,
under the transmission group is defined. By convention, the name assigned is:
type OBJECT IDENTIFIER ::= { transmission number }
where "type" is the symbolic value used for the media in the ifType column of the ifTable
object, and "number" is the actual integer value corresponding to the symbol.
No object defined in this group today.
snmp (11)
Implementation of the snmp group is mandatory for all systems which support an SNMP
protocol entity. Some of the objects defined below will be zero-valued in those SNMP
implementations that are optimised to support only those functions specific to either a
management agent or a management client.
snmpInPkts (1)
The total number of PDUs delivered to the SNMP entity from the transport service.
snmpOutPkts (2)
The total number of SNMP PDUs which were passed from the SNMP protocol entity to the
transport service.
snmpInBadVersions (3)
The total number of syntactically correct SNMP PDUs which were delivered to the SNMP
protocol entity and were for an unsupported SNMP version.
snmpInBadCommunityNames (4)
The total number of SNMP PDUs delivered to the SNMP protocol entity which used a SNMP
community name not known to said entity.
snmpInBadCommunityUses (5)
The total number of SNMP PDUs delivered to the SNMP protocol entity which represented an
SNMP operation which was not allowed by the SNMP community named in the PDU.
snmpInASNParseErrs (6)
The total number of ASN.1 parsing errors (either in encoding or syntax) encountered by the
SNMP protocol entity when decoding received SNMP PDUs.
snmpInBadTypes (7)
The total number of SNMP PDUs delivered to the SNMP protocol entity which had an unknown
PDU type.
snmpInTooBigs (8)
The total number valid SNMP PDUs which were delivered to the SNMP protocol entity and for
which the value of the "ErrorStatus" component is "tooBig."
snmpInNoSuchNames (9)
The total number valid SNMP PDUs which were delivered to the SNMP protocol entity and for
which the value of the "ErrorStatus" component is "noSuchName."
snmpInBadValues (10)
The total number valid SNMP PDUs which were delivered to the SNMP protocol entity and for
which the value of the "ErrorStatus" component is "badValue."
snmpInReadOnlys (11)
The total number valid SNMP PDUs which were delivered to the SNMP protocol entity and for
which the value of the "ErrorStatus" component is "readOnly."
snmpInGenErrs (12)
The total number valid SNMP PDUs which were delivered to the SNMP protocol entity and for
which the value of the "ErrorStatus" component is "genErr."
snmpInTotalReqVars (13)
The total number of MIB objects which have been retrieved successfully by the SNMP protocol
entity as the result of receiving valid SNMP Get-Request and Get-Next PDUs.
snmpInTotalSetVars (14)
The total number of MIB objects which have been altered successfully by the SNMP protocol
entity as the result of receiving valid SNMP Set-Request PDUs.
snmpInGetRequests (15)
The total number of SNMP Get-Request PDUs which have been accepted and processed by
the SNMP protocol entity.
snmpInGetNexts (16)
The total number of SNMP Get-Next PDUs which have been accepted and processed by the
SNMP protocol entity.
snmpInSetRequests (17)
The total number of SNMP Set-Request PDUs which have been accepted and processed by
the SNMP protocol entity.
snmpInGetResponses (18)
The total number of SNMP Get-Response PDUs which have been accepted and processed by
the SNMP protocol entity.
snmpInTraps (19)
The total number of SNMP Trap PDUs which have been accepted and processed by the SNMP
protocol entity.
snmpOutTooBigs (20)
The total number valid SNMP PDUs which were generated by the SNMP protocol entity and for
which the value of the "ErrorStatus" component is "tooBig."
snmpOutNoSuchNames (21)
The total number valid SNMP PDUs which were generated by the SNMP protocol entity and for
which the value of the "ErrorStatus" component is "noSuchName."
snmpOutBadValues (22)
The total number valid SNMP PDUs which were generated by the SNMP protocol entity and for
which the value of the "ErrorStatus" component is "badValue."
snmpOutReadOnlys (23)
The total number valid SNMP PDUs which were generated by the SNMP protocol entity and for
which the value of the "ErrorStatus" component is "readOnly."
snmpOutGenErrs (24)
The total number valid SNMP PDUs which were generated by the SNMP protocol entity and for
which the value of the "ErrorStatus" component is "genErr."
snmpOutGetRequests (25)
The total number of SNMP Get-Request PDUs which have been generated by the SNMP
protocol entity.
snmpOutGetNexts (26)
The total number of SNMP Get-Next PDUs which have been generated by the SNMP protocol
entity.
snmpOutSetRequests (27)
The total number of SNMP Set-Request PDUs which have been generated by the SNMP
protocol entity.
snmpOutGetResponses (28)
The total number of SNMP Get-Response PDUs which have been generated by the SNMP
protocol entity.
snmpOutTraps (29)
The total number of SNMP Trap PDUs which have been generated by the SNMP protocol entity.
snmpEnableAuthTraps (30)
Indicates whether the SNMP agent process is configured to generate authentication-failure
traps.
Detailed overview:
Avaya IP Phones and the ADMM/Avaya 3711
Full details concerning the use of WML can be found in the "4600 Avaya IP Phone LAN
Administrators Guide” (Reference 11)
Protocol IP DECT base station send IP DECT base station receive ADMM send ADMM receive Comments
SRC port DST port SRC port DST port SRC port DST port SRC port DST port
DHCP 68 67 67 68 - - - - booter
ADMM-RFP- > 64000 16321 16321 >64000 16321 >64000 >64000 16321 application
protocol
1 of 2
Protocol IP DECT base station send IP DECT base station receive ADMM send ADMM receive Comments
SRC port DST port SRC port DST port SRC port DST port SRC port DST port
telnet 23 client port client port 23 localhost 8107 localhost localhost localhost application
(Linux server random random 8107
based ADMM (Linux server
only) based ADMM
only)
Additional
protocols
ARP
ICMP
2 of 2
Performance figures and data quoted in this document are typical, and must be specifically
confirmed in writing by Avaya before they become applicable to any particular order or contract.
The company reserves the right to make alterations or amendments to the detailed
specifications at its discretion. The publication of information in this document does not imply
freedom from patent or other protective rights of Avaya or others.
Intellectual property related to this product (including trademarks) and registered to Lucent
Technologies have been transferred or licensed to Avaya.
All trademarks identified by the ® or ™ are registered trademarks or trademarks, respectively,
of Avaya Inc. All other trademarks are the property of their respective owners.
This document contains proprietary information of Avaya and is not to be disclosed or used
except in accordance with applicable agreements.
Any comments or suggestions regarding this document should be sent to [email protected].
© 2006 Avaya Inc. All rights reserved.
Avaya Inc.
1300 W. 120th Ave.
Westminster, CO 80234
Web: http://www.avaya.com