Escolar Documentos
Profissional Documentos
Cultura Documentos
Server
Installation & Configuration
Manual
Release 4.2
April 2010
Legal notice:
Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of
Alcatel-Lucent. All other trademarks are the property of their respective
owners.
The information presented is subject to change without notice.
Alcatel-Lucent assumes no responsibility for inaccuracies contained herein.
Copyright 2010 Alcatel-Lucent. All rights reserved.
The CE mark indicates that this product conforms to the following Council
Directives:
- 2004/108/EC (concerning electro-magnetic compatibility)
- 2006/95/EC (concerning electrical safety)
- 1999/5/EC (R&TTE)
Chapter 1
Overview
Chapter 2
Installing and Starting Up
!
0-1
"# ## !
Chapter 3
Unlocking the Software Pack
Chapter 4
Network Configuration
Chapter 5
Registration, Activation and Updates
0-2
!
"# ## !
Chapter 6
User Management
Chapter 7
Security Management
!
0-3
"# ## !
Chapter 8
Voice and Data Convergence
Chapter 9
Messaging Management
0-4
!
"# ## !
Chapter 10
Instant Messaging
Chapter 11
Fax Server Management
!
0-5
"# ## !
Chapter 12
Web Hosting
Chapter 13
SIP Telephony over the Internet
0-6
!
"# ## !
Chapter 14
Push Mobile
Chapter 15
Backup and Restore
!
0-7
"# ## !
Chapter 16
Appendixes
Chapter 17
Migration from Release 4.1 to Release 4.2
0-8
!
1
1.1
1.2
Product Overview
Extended Communication Server is a powerful collaboration and mobility solution for small and
medium-sized enterprises (SMEs) including:
-
a set of collaboration tools to share information efficiently within a team, a group, a project,
or the company
!
1-1
Chapter
$%#%
#&
1.3
Hardware Description
The Extended Communication Server hardware platform is available in two editions:
-
The Compact edition is a desktop server, also rack-mountable, designed for small
companies with up to 25 users.
The Premium edition is a rack shelf platform designed for medium enterprises with from
25 to 200 users.
Both Extended Communication Server editions are managed in the same way. Unless
explicitly specified, all information and procedures included in this document apply to both
Compact edition and Premium edition.
1-2
!
$%#%
#&
Compact Edition
-
1.4
One administrator, who manages the user accounts and controls and monitors all
resources and features, such as network architecture, security measures, e-mail facilities,
Web access, etc. Administration is done using a graphical administration interface.
A number of users, who manage their own accounts and benefit from available services
through a graphical user interface called the Virtual Desktop. Users can also access these
services from the Mobile Virtual Desktop using mobile terminals such as PDA (Personal
Digital Assistant).
!
1-3
Chapter
$%#%
#&
Some delegated administrators, who are users that have a limited set of administration
rights. A delegated administrator can access both the Virtual Desktop and the graphical
administration interface limited to some menus.
The administrator and the users access the graphical administration interface or the Virtual
desktop in the same way, using a Web browser. When the user logs on, the Extended
Communication Server serves whether the graphical administration interface or the Virtual
Desktop according to the user identity and password that have been typed in. A delegated
administrator can swap from the Virtual Desktop to the graphical administration interface, or
vice versa, by the means of graphical buttons only available to delegated-administrator profile
users.
Note:
The administrator is not exactly a user as he is not registered in the user database. The administrator
must create a user account for himself if he needs to access the Virtual Desktop.
1.4.1
1-4
!
$%#%
#&
whatever menu or submenu is displayed. This opens a pop-up window, which provides a
useful contextual online help. Each help page is printable.
1.4.2
Virtual Desktop
A user Connects to the Virtual Desktop in the same way the administrator connects to the
administration interface except that the name and password are those of a standard user.
!
1-5
Chapter
$%#%
#&
When the Virtual Desktop session is open, the user can manage his services: Web mails,
calendar, contacts, favorite sites, and so on.
1.5
1-6
Step 1
Step 2
Step 3
Network configuration
!
$%#%
#&
Recommended Steps
order
Objectives
Step 4
Step 5
User management
Step 6
Security management
Step 8
Step 9
Messaging management
1.6
Before Installation
First of all, we recommend you to read this document and examine the customer needs
thoroughly.
You should then prepare the Extended Communication Server installation considering the
following topics:
-
Network architecture:
LAN
DMZ (Demilitarized Zone)
Internet Access
Information from the ISP (Internet Service Provider), such as IP addresses of the DNS
servers.
!
1-7
Chapter
1-8
$%#%
#&
!
After reading this chapter, you will be able to start up the Extended Communication Server and
access the graphical administration interface.
2.1
Introduction
Two modes are provided for accessing the administration interface for the first time:
-
A direct access, the server being equipped with a screen, a keyboard and a mouse
2.2
!
2-1
Chapter
2.3
2-2
!
!
2-3
Chapter
2.4
2-4
!
3.1
Principles
The full license activation consists of two steps:
1. Software pack unlocking. This is the aim of this chapter. When this task is completed,
the software pack is unlocked for 31 days. During this limited period of time, also called the
trial period, all features and services are available.
2. License activation. You can perform this task immediately after software pack unlocking
or later, within the 31-day trial period.
. It is easier to perform this task after the Internet access has been installed. The license
can be then activated online, by a simple click. Otherwise, the license activation key must
be entered manually. After license has been activated, all features and services remain
available for an unlimited duration.
3.2
2. Once you have obtained the software key, open the administration interface and select the
Appliance management > Licences & Releases > Packs & licences menu.
3. Select the New pack tab.
4. In the Activation Key or Licence number field, enter the software key.
5. Click OK.
!
3-1
Chapter
'(
)# &# *'(
After the software pack has been unlocked, the panel foot displays information about the
licence including the number of days that are remaining before the trial period will end.
Remember that you will have to activate the product license within this trial period.
3-2
!
After reading this chapter, you will be able to insert the Extended Communication Server in the
customer network and access the Internet from the administration interface.
4.1
Principles
The three network interfaces and the comprehensive set of available configuration parameters
the Extended Communication Server provides allow you to insert it in any network
architecture.
However, this document does not intend to consider all possible architectures. It aims at
explaining you the basics, while giving you some useful examples corresponding to most usual
situations.
Below is an example of the way a Extended Communication Server can be inserted in a
standard network topology:
-
The DMZ (Demilitarized Zone) is connected to interface eth2. A DMZ is a LAN subnetwork
that contains the external services accessible from the Internet, such as a Web server or
an FTP server. Using a DMZ for external services, facilitates the security management.
!
4-1
Chapter
+#&(
4.2
4. If the WAN access address is dynamically assigned or if it is a PPPoE connection, the first
and second name resolution servers are assigned automatically.
Else assign them manually:
In the First name resolution server field, enter the DNS (Domain Name System)
server address provided by the ISP (Internet Service Provider).
In the Second name resolution server field, enter the second DNS server address
provided by the ISP. The second DNS server address is optional.
5. Click OK.
4-2
!
+#&(
4.3
Network Connections
4.3.1
4.3.1.1
Network Interfaces
Both Compact and Premium edition servers have three network interfaces. Depending on the
server edition and version, network interfaces may be labelled or not on the back panel.
Anyway, we call in this document LAN1 the Ethernet interface eth0, which corresponds to the
left-most back-panel RJ-45 port. LAN1 is the eth0 default name.
All three interfaces can equally be used for any network connection.
At the first start, only interface LAN1 exists by default, as an Ethernet LAN connection. You
cannot delete this connection or modify its type, but you can modify all other settings.
4.3.1.2
Ethernet LAN
Ethernet Bridge
4.3.1.3
!
4-3
Chapter
+#&(
4.3.2
4-4
!
+#&(
4.3.3
!
4-5
Chapter
+#&(
1. Select the Service management > Network service management > Network
connections menu. This opens the connection list.
2. If you are creating a new connection:
a. Click Add.
b. Select the Ethernet LAN option
c. Click OK.
Otherwise, if you are modifying an existing Ethernet LAN connection:
a. Select the Ethernet LAN connection in the list.
b. Click the modification button .
3. In the displayed form, enter the connection name. You can give any name that clearly
identifies the connection.
4. Select whether the network connection IP address is static or assigned by a DHCP server.
If the network connection IP address is assigned by an external DHCP server, skip next
step.
5. Enter the network connection settings:
Network connection IP address.
Network mask or equivalent prefix.
If there is an external gateway (case of a default gateway to the Internet only), enter
the gateway address.
Note:
This field does not concern a router used to access an internal subnetwork. If there is no external gateway, let the gateway field empty.
6. If several network interfaces are available, select the Ethernet interface (ethx). This field is
read-only in all other cases.
7. Activate the interface by selecting Yes.
8. Validate the settings by clicking OK.
4.3.4
4-6
!
+#&(
4.3.5
!
4-7
Chapter
+#&(
4.3.6
4-8
!
+#&(
4.4
DHCP Service
If the DHCP service is activated on a given network interface, the Extended Communication
Server is the DHCP server for all the peripherals that belongs to the corresponding
subnetwork. In that case, the server assigns a dynamic IP address each time it detects a new
client peripheral, which avoids maintaining static addresses manually.
In example below, the DHCP service is activated on LAN1.
4.4.1
Global Configuration
To configure the DHCP service:
1. Select the Global configuration tab.
2. Select the appropriate network connection.
!
4-9
Chapter
+#&(
3. Specify the duration of a DHCP lease, i.e. the length of time for which the IP address
allocation is valid.
4. Specify the IP address range reserved for DHCP (start of range, end of range).
5. Enter the gateway IP address (generally, the address of the concerned network interface).
6. Enter the DNS server IP addresses:
If the DNS service is activated, enter here the address of the concerned network
interface.
If the DNS service is not activated, enter here the DNS server addresses provided by
the ISP.
7. Enter the WINS server IP addresses (optional). WINS stands for Windows Internet Name
Service, which is used for Windows network sharing.
If the DNS service is activated, enter here the address of the concerned network
interface.
If the DNS service is not activated, enter here the DNS server addresses provided by
the ISP.
8. Click OK.
4.4.2
Machines Declared
Use the Machines declared tab to specify particular behaviors considering the DHCP service,
such as:
-
You want to limit the DHCP service to a particular list of machines (for example to avoid
that visitors equipped with laptop computers can connect to the local network).
To declare a machine:
1. Select the Machines declared tab.
2. Select the appropriate network connection.
3. Give any name that clearly identifies the machine in the network.
4. Enter its MAC address. A Media Access Control address (MAC address) is a unique
identifier attached to the machine network adapter.
5. Select whether this machine IP address is static or dynamic (assigned by the DHCP
server).
6. If the machine IP address is static, enter its IP address. This address must be in the
concerned network and outside the IP address range reserved for DHCP.
7. Click OK.
4.4.3
DHCP Leases
The DHCP leases tab is for consultation only. It lists the DHCP leases that have been
assigned to machines.
4.5
4-10
Remote Proxy
!
+#&(
Some large organizations use their own proxies (not hosted on the Extended Communication
Server) to control access to the Internet. If this is the case, you must configure the remote
proxy access in order to allow the server to reach the Internet, which is mandatory for the
automatic update feature.
To access the Internet through a remote proxy:
1. Select the Service management > Network service management > Remote proxy
menu.
This displays the remote-proxy access configuration-form.
2. Select the following option: The Internet connection goes through the following remote
proxy.
3. Enter the access parameters that fit the remote proxy configuration:
Remote-proxy IP address
Listening port
Authentication by login and password, if any
4. Click OK.
!
4-11
Chapter
4-12
+#&(
!
After reading this chapter, you will be able to access the Extended Communication Server
online technical-support, to activate the full license and to update the software packs.
5.1
General Points
As you can now access the Internet from the administration interface, it is the right moment to
activate the license for an unlimited duration and update the software packs. Updating the
software packs offers you the guarantee that you benefit from the last software developments.
They may also correct any software malfunction.
You must first register your Extended Communication Server product before you can perform
the license activation and any software update.
5.2
!
5-1
Chapter
"#
, '
%
#
5. Click on the
button.
5.3
5-2
!
"#
, '
%
#
!
5-3
Chapter
5.4
"#
, '
%
#
Software Updates
The Extended Communication Server system is pre-configured for updating automatically from
the Web on a per week basis.
Note 1:
Some software packs cannot be updated automatically. They must be updated manually.
Perform a manual update after installation or after the server has been reset.
5-4
!
"#
After reading this chapter, you will have an overview of user group and user account
management. Please refer to online help for details.
6.1
General Points
The way the users are distributed in user groups should reflect the enterprise structure, meet
the enterprise needs, and prepare for future evolutions. We recommend you to plan the way
you will distribute the users in user groups before creating groups and accounts.
The Extended Communication Server administrator manages two types of user groups:
-
Standard groups
Each user belongs to one standard group or subgroup. You must create first a standard
group or subgroup before you can create related user accounts.
Virtual groups. A user can belong to none or several virtual groups. You can create virtual
groups at any time and affect any existing user account to anyone of them.
Here below is an example of the way standard and virtual groups can be used to describe an
enterprise.
Via the synchronization tool: users are imported from a remote database. This must be a
!
6-1
Chapter
# #-#
6.2
6.2.1
The right-hand side part is the user zone. It is composed of the user account list and
associated management buttons.
___change-end___
___change-begin___
6.2.1.1
6-2
!
# #-#
6.2.1.2
If it is a standard group
If it is a virtual group
, you can add already existing user accounts in it. In a virtual
group, users are considered as guests that are invited into the group.
6.2.2
User Privileges
You can assign special roles to some users:
-
One Delegated administrator per user group can manage the user accounts of this group
or of another group. This person can add / modify / delete user accounts, and assign some
access rights to services. Web sites, such as an Intranet site, can be on the responsibility
of a delegated administrator.
One Virtual Desk graphic designer is responsible for the Virtual Desktop graphical
charter (logo, colors, etc.)
One News administrator is responsible for the news distribution to all users
!
6-3
Chapter
# #-#
One News administrator for the group is responsible for the news distribution to the
users of the group
6.3
6.3.1
Synchronization Overview
Synchronization is used to import users from a Microsoft Active Directorys to the Extended
Communication Server LDAP directory. All remote users are imported from this directory.
___change-end___
___change-begin___
6-4
Possibility to work in mixed mode with users created in the Extended Communication
Server directory only
!
# #-#
User features:
-
All Extended Communication Server services are available for imported users (Virtual
desktop, Email, FTP, mobility, FAX )
6.3.2
Configuration
6.3.2.1
___change-end___
___change-begin___
2. Select the Configuration tab. The External directory connection configuration page is
displayed:
!
6-5
Chapter
# #-#
Link account password: enter the user password as defined in DN of the link
account
Directory domain: this field is automatically completed from the domain defined in
DN of the link account. It can be modified.
This field represents the domain to which the external directory belongs.
Base from which the synchronization will be done: enter the field specifying the
sub-tree of the directory from where the synchronization is performed.
For example: dc=domain,dc=loc
Base group in which the users will be retrieved: enter the target group name where
the users are to be placed
Time when the automatic synchronization will start: select the time of the daily
synchronization
Encrypt the connection with the Active Directory server: validate the check box to
encrypt information between the remote directory and Extended Communication
Server.
To do this, you can import the public part of the authority certificate used on the Active
Directory in ASCII(Base64) format. This option can be used without importing the
authority certificate.
4. Click OK
This operation generates an LDAP (port 389) or LDAPS (port 636) connection to the Active
Directory server according to the security option.
Note:
In the case of LDAPS synchronization with the Active Directory server, the Extended Communication
Server server asks the superadmin to authenticate again.
If parameters sent by the Extended Communication Server are correct, the Active Directory
server returns the user list.
The administrator can exclude some users from the synchronization (See the Exclusion tab).
6.3.2.2
___change-begin___
The link account is an Active Directory user with admin rights. It must be created in the
windows server with the Active Directory users and computers administrative tool. See below
an example of link account link link is created in the group Domain Admin.
6-6
!
___change-end___
# #-#
___change-end___
___change-begin___
!
6-7
Chapter
# #-#
___change-end___
___change-begin___
2. LDAP Connection: enter the information for the LDAP to the connect to the server and
click OK
The Bind window is displayed:
___change-begin___
6-8
!
___change-end___
# #-#
___change-end___
___change-begin___
4. Search the users in the database: fill the appropriate fields and click Run
Example of result of a search:
6.3.2.3
Synchronization
Once the user list is retrieved from the Active Directory server, the administrator can change
the service status to On in order to activate the service.
Click the Synchronize button at the bottom of the frame in order to launch the first
!
6-9
Chapter
# #-#
synchronization.
This operation will retrieve the user information from Active Directory and create the users in
the Extended Communication Server base group. The retrieved information are:
-
User login
Phone number
Email addresses
Once the first synchronization is done, you can activate the daily synchronization process
which will repeat the operation described above.
6.3.2.4
Deactivated Account
This list presents user accounts deleted or deactivated in the external directory. They have
been deactivated on the Extended Communication Server server. They will be activated again
if the account is reactivated or recreated in the external directory. They are available in this
interface so that they can be deleted by the administrator.
6.3.3
User Connection
6.3.3.1
User Authentication
Users authenticate to the Extended Communication Server services by using their usual Active
Directory login/password.
The first time, the Extended Communication Server forwards the authentication request to the
Active Directory server and saves locally the encrypted password.
If the user is successfully authenticated, any following requests are handle directly by the
Extended Communication Server until the user password is changed.
6.3.3.2
Login Policy
On Extended Communication Server a user login must be made up of the following characters:
[a..z],[A..Z],[0..9],[-],[_].
The Extended Communication Server login policy is more restrictive than the Active Directory
login policy where special characters are allowed.
-
Replacement
Characters
Special
Characters
6-10
!
# #-#
Replacement
Characters
Special
Characters
Replacement
Characters
Special
Characters
Replacement
Characters
Special
Characters
Replacement
Characters
Replacement Characters
Exceptions
00-1F
[nothing]
20-2F
_ (underscore)
3A-40
_ (underscore)
5B-60
_ (underscore)
7B-FF
[nothing]
6.3.3.3
Passwords Policy
On Extended Communication Server, a user password can only use the following characters: [
a-z A-Z 0-9 _ / \ & ~ " # ' { } ( ) [ ] < > ` @ = ? ; : ! + . , % $ * - ].
Important:
As long as passwords are imported from Active Directory (without possible modification on Extended Communication Server), passwords on Active Directory must be made up of characters
belonging to the above list.
6.3.3.4
Restrictions
The number of users which can be imported cannot exceed the maximum number of licensed
users.
For imported users, the following information cannot be modified:
6.3.4
Password
Phone information
LOGS
!
6-11
Chapter
# #-#
6-12
!
This chapter introduces you to the different possibilities the Extended Communication Server
offers for managing information security and for monitoring traffic. After reading it, you will be
able to plan the organization information security and implement it.
7.1
Overview
For managing security, the Extended Communication Server is equipped with:
-
An internal firewall
By default, the firewall is active but the proxy server is not active.
Note:
We recommend you to configure and activate proxy and firewall services.
Moreover, for a better network security, we recommend you to use the Extended Communication Server
options: Kaspersky, for an efficient antivirus protection.
7.2
Firewall Management
7.2.1
General Points
When it is activated, a firewall filters the flows of traffic circulating between the different
network interfaces. Its main role is to separate the organization internal information and
resources from the Internet traffic.
Firewall management consists in specifying rules that authorize or forbid a given service or
group of services for a given flow.
7.2.1.1
Traffic Flows
A traffic flow is defined by:
-
Two endpoints. For example LAN1 (connected to the organization LAN) and the network
interface connected to the Internet.
The traffic sense. For example, from LAN1 to the network interface connected to the
Internet.
The administration interface automatically displays existing traffic flows according to the
network interfaces you have created.
7.2.1.2
A name. It can be any name, usually the service protocol name (for example HTTP).
A port number. Port numbers identify sending and receiving applications. For example,
port 80 identifies the http service.
!
7-1
Chapter
#'
. #-#
The system handles a preexisting list of services that you can consult thanks to the Service
management > Security > Firewall > Services and service groups menu, selecting the
Services tab. You can also add new services to this list for specific needs.
7.2.1.3
Firewall Rules
The administration interface provides two different views on existing rules:
-
7-2
The Basic settings menu displays the main rules that protect the network, grouped by
!
#'
. #-#
main flows. Use this menu to have an overview on firewall rules or for basic needs.
-
The Advanced settings menu displays all available flows and associated rules. Use this
menu if you have specific needs.
___change-end___
___change-begin___
7.2.2
!
7-3
Chapter
#'
. #-#
7-4
!
#'
. #-#
___change-begin___
a. In this form, select a service or a service group (in our example, the MAIL service
group). It is also possible to create new services from this form if necessary.
b. Click Add.
c. Click OK.
The rule is now displayed in the rule list.
!
7-5
Chapter
#'
. #-#
___change-end___
7.3
7.3.1
Proxy Services
The proxy server is an internal application which processes the client workstation requests to
the Internet and provides the following services:
7-6
Caching service. If the caching service is active, the proxy server keeps local copies of
the different client requests. In this way, it can serve a request by retrieving content from
previous requests instead of contacting remote servers. This significantly saves bandwidth
while increasing performance.
The caching service also provides statistics on Web traffic.
Web access control. The proxy server can permit or block Web access for each user
!
#'
. #-#
individually.
-
Web filtering. Web filtering is done through black and white lists of URLs or keywords that
forbid or authorize access to certain Web sites. Filters apply to all users or to specific user
groups.
Note:
These services need that the client Web browser is configured so that the Web traffic is sent to the proxy
server.
Important:
If the proxy server is used for Web traffic control and filtering, the firewall should block http and
https traffic. Blocking direct Web access forces Web traffic to pass through the proxy server,
which is essential to an efficient control and filtering service.
7.3.2
7.3.3
!
7-7
Chapter
#'
. #-#
7.3.4
Web Filtering
The Web filtering service relies on lists of URLs and keywords that prohibit/authorize access:
-
Black lists. A black list contains all URLs or keywords for which users cannot access
related contents. All other contents are accessible.
Examples 1:
forbiddensite.com, sex, .mp3
White lists. A white list contains all URLs or keywords for which users can access related
contents. All other contents are not accessible.
Examples 2:
www.alcatel-lucent.com, .edu
Note:
The proxy cache service must be active for the Web filtering to be effective.
7.3.4.1
button that corresponds to the list you want to modify (black or white list).
7-8
!
#'
. #-#
7.3.4.2
!
7-9
Chapter
#'
. #-#
c. Click OK.
8. Come back to the Lists by group menu.
9. Enable the Black and White lists by group filtering by clicking On.
7.3.5
Client Configuration
Client workstations must be configured so that they can access the proxy server.
To configure a client workstation Web browser:
1. Go to the browser connection settings.
For example, for Microsoft Internet Explorer:
a. Select the Tools > Internet Options menu.
b. Select the Connections tab.
c. Click the LAN Settings button
7-10
!
#'
. #-#
7.3.6
7.4
Certificates Management
7.4.1
Overview
A certificate is an electronic document which incorporates a digital signature to bind together a
key with an identity. The signature is delivered by a CA (Certification Authority).
Among other information, a certificate includes:
-
a validity period
The Extended Communication Server hosts its own certification authority. This CA signs the
certificates delivered by the server for all secured services.
!
7-11
Chapter
7.4.2
#'
. #-#
7-12
!
#'
. #-#
7.4.3
Using a Certificate
Once the user certificate is created, it must be assigned to services. The example below
shows how to affect the certificate to the Web access service.
To assign a certificate to the Web access service:
1. Select the Appliance management > Configuring the access from an Internet
connection menu.
2. Select the SSL certificate tab
3. Select the desired certificate.
The name validity, which may not match the site name.
!
7-13
Chapter
#'
. #-#
7.4.4
7-14
!
#'
. #-#
2. Select whether you wish the certificates to be automatically regenerated when the host
name is changed. Click yes or no.
3. Select the services on which the new certificates are to apply.
!
7-15
Chapter
7-16
#'
. #-#
!
8.1
General Points
The voice/data convergence service allows users to access the telephone functions from the
Virtual Desktop and benefit from additional services on telephone terminals: call forwarding,
unified messaging, click to call, and so on.
!
8-1
Chapter
/
'# 0
%##'#
8.2
___change-begin___
8. Change the Status of the Voice / Data convergence service option button to On.
8-2
!
___change-end___
/
'# 0
%##'#
8.3
Retrieving information
After the service is activated, you can retrieve information from the OmniPCX Office:
-
Use the Synchronization of terminals menu to retrieve the list of telephone terminals or
devices connected to the OmniPCX Office. This functionality allows you to manage user
accounts and telephone terminal tables in a synchronized way.
Use the User import menu to help you creating user accounts from the OmniPCX Office
user table. This retrieves information (name, first name, internal numbers) from the
OmniPCX Office and create user accounts automatically. You can modify these accounts
later to add information the Extended Communication Server requires.
Each synchronized terminal must be now associated with an existing user account or a
new user account.
!
8-3
Chapter
8-4
/
'# 0
%##'#
!
After reading this chapter, you will be able to manage internal and external email messaging.
9.1
General Points
The Extended Communication Server includes a mail server which can be used as a
standalone mail server or relayed by an external mail server.
The Extended Communication Server mail service handles the following protocols:
-
SMTP (Simple Mail transfer Protocol), to "push" email messages into email boxes.
POP (Post Office Protocol) or IMAP (Internet Message Access Protocol) to "pull" email
messages from email boxes.
SMTP service must be activated so that the messaging service can work properly, and one of
POP or IMAP services if a fat mail client is used.
As different configurations can be used to make the messaging service available, following
sections will introduce you to the messaging service settings in four steps:
1. Internal messaging, so that users can exchange emails inside the organization.
2. External messaging, so that users can send and receive messages via the Internet.
3. Configuring for a fat mail client.
4. Additional settings that may be useful according to the organization characteristics. You
can also refer to the online help for more information.
Note:
We recommend you to test the messaging service from Virtual Desktop sessions.
9.2
Internal Messaging
To activate the internal messaging service:
1. Select the Service management > Email > SMTP menu.
2. Change the SMTP status option button to On.
All users that have email addresses and authorizations can now exchange internal emails.
9.3
!
9-1
Chapter
#
#-#
Note 1:
You must verify that the MX (Mail eXchange) DNS record point the server public IP address. Contact
the registrar that manages the domain name to verify this particular point.
9-2
!
#
#-#
9.4
Protocol
9.5
Additional settings
9.5.1
Domain names
Use the Domain Names menu if several domain names are to be used.
By default, the system manages only one domain name. This name is the main domain name
!
9-3
Chapter
#
#-#
you declared in the General network parameters form. If the organization has several
domain names, declare them to the system to optimize email processing. Email addresses that
belong to domains declared to the system do not need external DNS queries.
To declare a domain name to the system:
1. Select the Service management > Email > SMTP > Domain names menu.
2. Click Add.
This opens a Declaration of the domain names managed by the appliance form.
9-4
!
#
#-#
9.5.2
!
9-5
Chapter
#
#-#
Note:
Remote users email-client must be configured to authenticate when accessing the service.
9.5.3
9.5.4
Mail Filtering
The mail filtering function consists of several filtering services that you can activate and
configure separately. These services filter on email addresses, on email contents or on
attachments.
9-6
!
#
#-#
The Filter by grey list service use the greylisting method to filter received emails. The
mail transfer agent temporarily rejects any email from a sender it does not recognize. If the
email is legitimate, the originating server will try again to send it later, at which time the
agent will accept it. If the email is from a spammer, it will probably not retry to send it.
To avoid important emails to be delayed or rejected, the administrator maintains a White
list that contains authorized addresses. The administrator can also allow users to handle
their own White lists.
The Filtering by type of attachment service filters according to the extension type or the
MIME (Multipurpose Internet Mail Extensions) type of files attached to emails.
!
9-7
Chapter
9-8
#
#-#
!
10
10.1
"
Overview
The Instant Messaging application allows a user to:
-
10.2
Server Configuration
10.2.1
Configuration Overview
To configure the Instant Messaging server:
Navigate to Service management > Instant messaging
Click OK
A popup window informs you that modifications are taken into account.
Generic Parameters
___change-end___
___change-begin___
10.2.2
Server public IP: enter your server address used by external users. This address is used
for automatic creation of xmpp DNS entries.
Options
___change-begin___
10.2.3
!
10-1
Chapter
#
___change-end___
10
Authorize creation and use of chat rooms: users can create and/or use chat rooms
(chat room is for heavy clients only)
Number of simultaneous sessions by user: enter the number of simultaneous chats per
user
Web Gateway
___change-begin___
10.2.4
10-2
!
___change-end___
#
Website name: select the domain name used by Extended Communication Server users
to access the web features
Listening interface for the web gateways: select the network interface used for FTP
transfer. Only heavy client use FTP to transfer.
Authorize the web presence: this feature allows your users to display their availability on
a website.
Activate web presence by default for all users: by activating this option, all the users
can use the feature, otherwise they have to activate it through their instant messaging
client.
!
10-3
Chapter
10
#
Note 2:
The use of a proxy is not available on all instant messaging clients.
Gateways
___change-end___
___change-begin___
10.2.5
Off:
___change-end___
___change-begin___
10.2.6
10.3
User Configuration
To enable instant messaging, each individual user must be configured:
10-4
!
#
Click Modify
___change-end___
___change-begin___
10.4
DNS Configuration
When all users do not belong to the same domain or to the same network, the DNS server
must be configured.
When an external DNS is used, it must include the following lines:
_jabber._tcp.mydomain.com
_xmpp-client._tcp.mydomain.com
_xmpp-server.mydomain.com
10.5.1
10.5
!
10-5
Chapter
#
___change-end___
10
Figure 10.7: Configuration Example with Users in the Same Domain and Same LAN
Instant Messaging configuration:
-
Firewall configuration:
-
10.5.2
Traffic LAN -> ECS on port 5222 (or 5223) must be allowed
10-6
!
___change-end___
#
Figure 10.8: Configuration Example with Users in the Same Domain and Different LAN
Instant Messaging configuration:
-
Firewall configuration:
Traffic from LAN to ECS on port 5222 (or 5223) must be allowed
Traffic from WAN to ECS on port 5222 (or 5223) must be allowed
10.5.3
!
10-7
Chapter
#
___change-end___
10
Figure 10.9: Configuration Example with Users in the Different Domain and Different LAN
Instant Messaging configuration:
-
Firewall configuration:
Traffic LAN -> ECS on port 5222 (or 5223) must be allowed
10.5.4
10-8
!
___change-end___
#
Figure 10.10: Configuration Example with Users in the Different Domain and Same LAN
Instant Messaging configuration:
-
Firewall configuration:
-
Traffic LAN -> ECS on port 5222 (or 5223) must be allowed
!
10-9
Chapter
10-10
10
#
!
11
This document explains how to configure the fax server on the Extended Communication
Server and OmniPCX Office.
11.1
Overview
The Extended Communication Server can host a fax server.
The main technical characteristics of the fax server are:
-
Communications from Extended Communication Server to the OmniPCX Office use the
port number 5060
Communications from OmniPCX Office to the Extended Communication Server use the
port number 5059
Connections from OmniPCX Office to the public network must be performed via ISDN or
analogic lines. Public SIP providers are not supported.
11.2
Configuration
11.2.1
___change-end___
___change-begin___
This paragraph describes the basic configuration for the following topology:
11.2.1.1
!
11-1
Chapter
___change-end___
11
___change-begin___
11-2
!
___change-end___
11.2.1.2
H323 End of Dialing Timeout: select 5.0. By default, the OmniPCX Office uses a timer for
outgoing calls on VoIP trunk (SIP / H.323)
End of Dialing table used: validate the check box and configure the associated table
(Numbering - EoD Table)
11.2.1.3
___change-begin___
!
11-3
Chapter
___change-end___
11
___change-end___
___change-begin___
In the public numbering plan, the Fax DDI number is sent to the ARS table:
11-4
!
___change-end___
___change-begin___
ARS Configuration
___change-end___
___change-begin___
11.2.1.4
!
11-5
Chapter
11
(91330 4000). If the Installation number is empty, then the prefix in the ARS table must be the
DDI part only (prefix = 4000). In this case, the CLI send to the public exchange for outgoing
calls will be the DDI part only and not the public number.
11.2.2
___change-end___
___change-begin___
This paragraph describes the basic configuration for the following topology (based on the
previous example, with the Fax 300):
11.2.2.1
11-6
!
___change-end___
___change-begin___
11.2.2.2
___change-begin___
It is mandatory to configure the virtual terminals with ISDN Service 1 = Fax 2/3:
!
11-7
Chapter
___change-end___
11
11-8
!
___change-end___
___change-begin___
!
11-9
Chapter
___change-end___
___change-begin___
11
___change-end___
___change-begin___
Configure immediate call forwarding to the Extended Communication Server Fax extension
(for example: 301 for USER A):
11.2.2.3
11-10
!
___change-end___
___change-begin___
___change-end___
___change-begin___
In the internal numbering plan, the Extended Communication Server fax numbers (301-302)
are routed to the ARS table:
!
11-11
Chapter
11
___change-end___
___change-begin___
ARS table configuration: configure the Extended Communication Server as the destination
11.2.2.4
Miscellaneous
If USER A wants to send a fax to USER B, the public number is used by the Extended
Communication Server and the call is routed through the public network. It is possible to
re-route the call directly to the Extended Communication Server using the ARS table.
___change-end___
___change-begin___
Private numbering plan: route the outgoing calls from the Extended Communication Server
through the ARS table (in the Extended Communication Server, the prefix for public calls is
configured with the value 0).
___change-end___
___change-begin___
11-12
!
11.2.3
11.2.3.1
Default Configuration
The fax server is set by default in demo mode. This means you can try the solution which is
totally functional with 2 channels.
The main restriction of the demo mode is the word Evaluation written on all transmitted and
received faxes.
___change-end___
___change-begin___
11.2.3.2
Fill:
Default recipient address mail (this must be a valid address)
SIP gateway IP address: IP address of the OmniPCX Office VoIP card
Listening port of the SIP gateway must be set to 5060
Some options allow the administrator to manage dedicated channels for sending or
reception as well as the transmission attempts.
!
11-13
Chapter
11
Note:
The channels not dedicated to sending or reception are mixed by default.
11.2.3.3
___change-end___
___change-begin___
Select the user group associated with this new profile in the field Associate the profile to
the group (optional)
Click OK
Note:
The number of profiles is not limited.
11-14
!
___change-end___
___change-begin___
Note:
The number of coversheets is not limited.
!
11-15
Chapter
___change-end___
___change-begin___
11
11.2.3.4
11.2.3.5
Fax server status: click On to enable the fax server (or Off to disable)
Click Modify
The user definition page is displayed:
___change-begin___
11-16
!
___change-end___
11.3
FaxServer Profile: select the fax user profile. This parameter defines the coversheet and
the language of faxes sent by the user.
The default profile is set to the profile associated to the user group if it exists. Otherwise
the default profile is set to the profile associated to the user language.
For this parameter, the choice includes all language profiles and new profiles created in
the Define a new porfile tab.
If you want to associate a specific coversheet to a user:
In the Define a new profile tab, create a new profile with no associated group
In the Add coversheets tab, upload the new coversheet created with the coversheet
editor
In the Coversheets and profiles tab, associate the new coversheet to the new profile
In the user settings, associate the new profile to the user
Internal Fax Number: enter the internal phone number associate to the fax of the user.
External Fax Number: enter the number on which the user will receive his faxes
Configuration 1
___change-begin___
11.3.1
!
11-17
Chapter
___change-end___
11
Figure 11.24: VoIP SIP Service on the Extended Communication Server WAN
This is the recommended configuration because it allows the home worker configuration.
Configuration 2
___change-end___
___change-begin___
11.3.2
Figure 11.25: VoIP SIP service on the Extended Communication Server LAN2
Configuration 3
___change-end___
___change-begin___
11.3.3
11.4
11-18
!
Extended Communication Server and Exchange main email domain names are the same
Users using the FAX server feature are created on both Windows and Extended
Communication Server directories. The users exchange@ email addresses should be
created on Extended Communication Server, (The sender address must be known by the
Extended Communication Server to send faxes)
___change-end___
___change-begin___
The following image shows a schematic view of the network architecture treated in this
chapter.
11.4.1
!
11-19
Chapter
11
11.4.2
Exchange Configuration
The configuration described below is only an example validated with a Microsoft SBS 2003
server. We assume this configuration can be reproduced with other Exchange versions
11.4.2.1
Sending Faxes
This section describes how-to declare the fax domain as an SMTP domain in Exchange and
how to forward the fax domain to the Extended Communication Server.
___change-end___
___change-begin___
___change-begin___
11-20
!
___change-end___
___change-begin___
!
11-21
Chapter
___change-end___
11
___change-begin___
11-22
!
___change-end___
___change-begin___
!
11-23
Chapter
___change-end___
11
___change-begin___
11-24
!
___change-end___
___change-begin___
!
11-25
Chapter
___change-end___
11
___change-begin___
11-26
!
___change-end___
___change-begin___
!
11-27
Chapter
___change-end___
11
___change-end___
___change-begin___
___change-begin___
11-28
!
___change-end___
___change-begin___
!
11-29
Chapter
___change-end___
11
___change-begin___
11-30
!
___change-end___
___change-begin___
!
11-31
Chapter
___change-end___
11
___change-begin___
11-32
!
___change-end___
___change-begin___
!
11-33
Chapter
___change-end___
11
11.4.2.2
___change-begin___
11-34
!
___change-end___
___change-end___
___change-begin___
!
11-35
Chapter
11
11.4.2.3
___change-end___
___change-begin___
11-36
!
___change-end___
___change-begin___
!
11-37
Chapter
11-38
11
!
12
)* +
After reading this chapter, you will have an overview of the Web hosting service the Extended
Communication Server offers and you will be able to create an Extended Communication
Server hosted website.
12.1
An Intranet site, for sharing and distributing internal information. An Intranet site is
associated with a private network interface (LAN).
An Extranet site, for providing external users (authorized customers, suppliers or partners)
with access to a part of internal information. An Extranet site is associated with a public
network interface (WAN). The visitor must authenticate to access the site content.
An Internet site, for a large distribution of information and to extend the enterprise visibility.
An Internet site is associated with a public network interface (WAN). No authentication is
required.
With such a solution the enterprise holds its own data rather than with a third party, which
significantly reduces both costs and risks of piracy.
Note:
Hosting an Internet or an Extranet sites requires that the Internet access bandwidth supports the number
of connections expected on the website.
!
12-1
Chapter
12
3#4 5
12.2
12.2.1
The server administrator identified by the superadmin login. By default, the administrator
is the webmaster.
A delegated administrator. This kind of user has some privileges that include
webmastering.
The server administrator can grant the delegated administrator rights to a user when creating
or modifying user accounts (menu: Directory > User accounts).
12-2
!
3#4 5
12.2.2
!
12-3
Chapter
12
3#4 5
If you are webmaster and server administrator, the administration interface is already
running.
If you are webmaster and delegated administrator, click the Administration button
located at the right-hand side of the Virtual Desktop.
This opens the administration interface limited to the menus you are authorized to use
and the resources you are authorized to administrate.
2. Select the Service management > Web > Configuring web sites menu.
A tabbed-panel is displayed.
3. Select the tab corresponding to the concerned site type:
Web sites: by name (http)
Web sites: by IP (http)
Secure web sites: by IP (https)
4. Click Add.
5. Depending on the type you selected, enter the full name (e.g. www.business.com) or the
IP address.
6. Select the network interface used to access the website:
A WAN interface for an Internet or Extranet website.
A LAN interface for an Intranet site.
7. Click OK.
The new website is now displayed in the list of web servers.
8. Click the Status button to activate the site. The button turns then from orange to green.
12.2.3
12-4
!
3#4 5
PostgreSQL
MySQL
Important:
The server administrator creates the database and associates it with the site that has been
previously created by the webmaster.
12.2.4
Name Resolution
For an Internet or an Extranet site, the name resolution relies on the public domain name.
For an Intranet site the name resolution must be configured locally.
To configure the name resolution:
!
12-5
Chapter
12
3#4 5
1. Select the Service management > Naming service > DNS naming > DNS zone
management menu.
12-6
!
3#4 5
12.3
12.3.1
Loading by FTP
The Webmaster can use any FTP utility.
The following parameters are required:
12.3.2
The IP address. This address does not depend on the network interface used to access
the site. It depends on the FTP configuration you can find selecting the Service
management > Management of FTP service > FTP: standard server menu.
12.4
!
12-7
Chapter
12
3#4 5
Click Add
12.5
12-8
!
13
13.1
,$
Introduction
Extended Communication Server enables to access telephony free of charge over the internet
network:
-
Between two users connected to the Virtual Desktop (in or out of company premises). The
user connected on the Virtual Desktop uses a downloaded softphone installed on his
machine. This solution requires Internet Explorer 6 (or higher) and ActiveX must be
enabled.
To implement this solution, see Basic Configuration for SIP Telephony over the Internet .
Between a user connected to the Virtual Desktop and a user on the Alcatel-Lucent
OmniPCX Office Communication Server. This solution requires Internet Explorer 6 (or
higher) and ActiveX must be enabled.
To implement this solution, see Configuration For Interoperability With OmniPCX Office .
Between an internet user visiting the company web site and a user on the Alcatel-Lucent
OmniPCX Office Communication Server. The internet user clicks a call button on the web
site to start a call. The first time this user clicks the button, a plug-in is installed. This
!
13-1
Chapter
13
plug-in requires Internet Explorer 6 (or higher) and ActiveX must be enabled.
To implement this solution, see Adding a Click to Call Button on a Web Site .
13.2
13.2.1
13.2.2
Prerequisites
-
A certificate must be created for the domain name used for SIP telephony over the
internet. For more information on certificate creation, see module Installing the system Security Management Creating a user certificate .
The following ports must be authorized for user stations behind a firewall:
Port 5061 TCP from the computer to internet
Range 8000:9000 TCP/UDP from the computer to internet
13-2
!
3. In the VOIP - SIP Domain Name field, enter the name of the domain used for SIP
addresses. This domain is managed by the Extended Communication Server DNS. This
domain name can be the same as the Appliance Domain Name.
4. Validate the Automatic creation of the associated DNS zone checkbox so that specific
fields are automatically created in the Extended Communication Server DNS.
5. Select the Server Public IP address in the drop-down list.
6. In the VoIP stations numbering range field, enter a range containing at least 100
numbers.
7. Click OK.
8. Select the SSL certificate tab.
9. Select the certificate to be used for the VOIP - SIP domain name.
10. Activate the Telephony on Internet server.
13.2.3
!
13-3
Chapter
13
Note:
By default, VoIP telephony is activated for all users.
3. Click OK.
13.3
13.3.1
13.3.2
Prerequisites
-
Basic Configuration for SIP Telephony over the internet must be performed.
Alcatel-Lucent OmniPCX Office Communication Server must be R7.0 or higher and SIP
trunking must be configured.
13-4
!
6. Under OmniPCX Office - VoIP SIP configuration, check the Use this server to do
VoIP-SIP checkbox.
7. In the IP address field, enter the IP address of the VoIP board of the Alcatel-Lucent
OmniPCX Office Communication Server.
8. In the Login and Password fields, enter the login and password of the SIP gateway of the
Alcatel-Lucent OmniPCX Office Communication Server.
9. Click OK.
10. Click the Check the Connection button to check the configuration.
13.4
13.4.1
13.4.2
Prerequisites
-
Basic configuration for SIP telephony over the internet and configuration for interoperability
with OmniPCX Office must be performed.
The web site must have been created with an Extended Communication Server version
supporting SIP telephony over the internet: see module Installing the system - Web
Hosting .
!
13-5
Chapter
13
To obtain the identification key corresponding to the user to be called by the click to call
button:
1. Select the Service management > Web > Configuring web sites menu.
13.4.3
where Click to Call must be replaced by the text to be displayed on the click to call
button of the web site and 89ee2fd28baa89b003f7068eef6eaf3d must be replaced by
13-6
!
the Identification key copied at the previous step in the administration interface
</form>
</body>
</html>
2. Transfer the html file to the server: see module Installing the system - Web Hosting
Loading the Site into the server
3. Go to the web site and test the button
!
13-7
Chapter
13-8
13
!
14
"*
After reading this section, you will be able to implement the push mobile service.
14.1
Overview
The push mobile service allows:
-
To synchronize groupware elements (contacts, calendar events and tasks) between the
Extended Communication Server to a device running under Windows Mobile 5 or 6: the
push mobile service checks periodically (by default every five minutes) if there are new
groupware elements in the Extended Communication Server user account. If this is the
case, the groupware elements created since the last synchronization in the Extended
Communication Server user account are "pushed" to the mobile device and the groupware
elements created on the mobile device are "pushed" to the Extended Communication
Server user account.
Note:
If there are no new groupware elements in the Extended Communication Server user account, there
is no automatic synchronization from the device to the user account: in this case, synchronization
must be triggered manually be the user.
14.2
Prerequisite
Before activating and configuring the push mobile service, you must:
14.3
!
14-1
Chapter
14
*) 4
#
14.4
14.5
Technical Architecture
___change-begin___
14.6
14-2
!
___change-end___
*) 4
#
14.7
14.7.1
General Description
!
14-3
Chapter
14
*) 4
#
The push mobile service hosts a syncml server compliant with mobile devices under Symbian
OS and running syncml 1.1. The behavior is based on a standard on demand
synchronization process from the client device.
The synchronized elements are the users personal contacts and calendar. Contrary to the
service for windows mobile, there is no client to be installed and no push feature. The service
is totally based on the standard syncml 1.1 client installed on the device.
Because the synchronization is made through a SSL tunnel, the end user must install his own
user certificate on the Symbian device.
The most serviceable is to install first the Extended Communication Server certification
authority, and then the user certificate signed by the Extended Communication Server
certification authority. Both are available in the Extended Communication Server mobile virtual
desktop (See user guide for more information).
14.7.2
Technical Architecture
The Extended Communication Server syncml synchronization service needs the following
pre-requisites to work correctly:
14.7.3
The Extended Communication Server must be reachable from the device on the port 443
for calendar and contacts synchronization
The Extended Communication Server must be reachable on the port 143 for IMAP
synchronization
Syncml Parameters
-
14.7.4
14-4
Calendar
Last name
Brief Description
Name
Full Description
Company
Date
Title
Time
!
*) 4
#
Web site
End date
Note
End time
Emails (3 max)
Access
Address
Reminder
Participants
Repeat parameters
14.8
LOGS
In case of problems, you can:
-
Consult logs in the events log of Push Mobile service or in the control panel
!
14-5
Chapter
14-6
14
*) 4
#
!
15
-
After reading this chapter you will be able to backup the Extended Communication Server
configuration and data so that you can restore all or a part of them if necessary.
15.1
Functional Description
15.1.1
Overview
The configuration backup/restore feature is useful for the following purposes:
15.1.2
Hardware Compatibility
The configuration backup restore is compatible between the PREMIUM and COMPACT.
There are some exceptions linked to network devices.
15.1.3
Software Compatibility
A backup archive can be restored only on an Extended Communication Server with a software
level equal or higher.
Example:
A configuration backup archive made on an Extended Communication Server 4.0 can be restored on an
Extended Communication Server 4.1.
A configuration backup archive from an Extended Communication Server 4.2 cannot be restored on an
Extended Communication Server 4.1 because the software level of the destination Extended Communication Server is lower.
15.1.4
Network
Telnet/SSH
Directory [OPTIONAL]
!
15-1
Chapter
15
Email filters
Ftp
DNS
Web
File sharing
Print Server
DynDNS
DHCP
PPTP
Squid
Backup scheduling
VPN
OXO
SNMP
Certificates management
The restore process REPLACES (not MERGES) the current configuration and associated
data. The previous configuration is deleted.
Following services data will be lost:
-
Web sites
Samba shares
Moreover, the configuration restore including the directory (users and groups) will first delete
existing users and groups including their data in their home directories, mails and in their
virtual desk content.
15.2
Backup
To perform a configuration backup:
-
15-2
!
___change-end___
___change-begin___
15.3
Restore
Important:
The authentication will be requested during the restore procedure. The superadmin password is
set to rv during the restore process.
___change-end___
___change-begin___
It is possible to display the LDAP database and the patch-list of the backup by clicking the
!
15-3
Chapter
15
lup icon.
Select the option to restore or not restore the directory (users and groups) and click
Restore
The restore resume is displayed:
___change-end___
___change-begin___
15.4
Restrictions
15.4.1
Software
15.4.2
15-4
The software (and patch) level must be higher on the destination Extended Communication
Server than on the source one
The restore process cannot restore more users than allowed by the license installed on the
Extended Communication Server. If the backup file contains more users, then the restore
process will stop
Hardware
-
There are some exceptions linked to network devices. The restore process includes a
network devices checking. The hardware network devices configuration must be the same
between both source and destination Extended Communication Server.
!
!
15-5
Chapter
15-6
15
!
16
16.1
(
How to Quote
Use the Actis quotation tool to quote a solution that includes an Extended Communication
Server. This does not require any specific option. You just need to quote for a basic Extended
Communication Server solution while indicating the number of end users who will use the
Extended Communication Server services, as showed in figure below.
16.2
How to Order
To order an Extended Communication Server, use the Alcatel-Lucent Business Partner
Website (http://www.businesspartner.alcatel-lucent.com/). Select the ONLINE SERVICES >
eBuy > Ordering rules > Alcatel Eye-box menu. Then refer to the Extended Communication
Server Order Entry Guide.
!
16-1
Chapter
16-2
16
#
2#
!
17
17.1
Migration to R4.2
Before migration, a full backup is strongly recommended. This backup is used only in case of
rollback (see: Rollback ).
Migration procedure:
1. Connect a USB 2.0 DVD drive to the Extended Communication Server
2. Introduce the Extended Communication Server R4.2 DVD in the driver
3. Reboot the Extended Communication Server
By default, the Extended Communication Server boot sequence is:
a. DVD
b. Hard disk
The Extended Communication Server reboots from the DVD, the migration welcome page
is displayed.
4. Validate the migration option. If you do not validate within 60 seconds, the Extended
Communication Server boots on hard disk (release 4.1) and the migration process is
canceled.
When the migration option is validated, the Extended Communication Server performs:
A copy of the database to the /home directory
The Extended Communication Server R4.2 software installation
This installation spends several minutes.
A reboot is required.
5. Remove the DVD
6. Reboot the Extended Communication Server
The Extended Communication Server migrates the user database to R4.2
A reboot is required.
7. Reboot the Extended Communication Server
8. Validate new feature licences if required.
For license validation, see: module Installing the system - Unlocking the Software Pack .
17.2
Rollback
The rollback procedure is used to return to R4.1 when an unfixable error happens during
migration.
Rollback procedure:
-
Recover the user database from the full backup previously performed
!
17-1
Chapter
17-2
17
- "# ## "# ## !
!