Mitel Connect System Admin Guide PDF
Mitel Connect System Admin Guide PDF
Mitel Connect System Admin Guide PDF
Trademarks
© Copyright 2017, Mitel Networks Corporation. All Rights Reserved. The Mitel word and logo are trademarks of Mitel Networks Corporation.
Any reference to third-party trademarks is for reference only and Mitel makes no representation of ownership of these marks.
Patents
Mitel products are covered by patents as listed at http://www.shoretel.com/about/patents.html.
Version Information
System Administration Guide
Version: SAG_1_1/25/18
Date: January 25, 2018
Company Information
Mitel Networks Corporation
350 Legget Dr.
Kanata, Ontario K2K 2W7
Canada
+1.844.937.6483
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Objectives and Audience for this Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Organization of this Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Documentation Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
System Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Hardware Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
User Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Online Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Restoration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
T.38 Support on Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Important Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Enabling T.38 on a Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Third-Party T.38 Configuration Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
This preface provides information about the objectives, organization, and conventions of the Mitel
Connect System Administration Guide.
This guide is written for the person who uses Connect Director to configure, administer, and maintain
the Mitel Connect system.
The “Getting Started” section in the next chapter provides an ordered checklist to use the first time you
configure the system.
Documentation Overview
The Mitel Connect system is documented as described in the following sections.
System Documentation
You can access the following system documents at support.shoretel.com, and Connect Director
provides links to these documents:
If the system includes the Connect Contact Center, refer to the Mitel Connect Contact Center
Administration Guide and the Mitel Connect Contact Center Installation Guide.
Hardware Documentation
The following hardware installation documents are packaged with their associated voice switch, IP
phone, or appliance:
User Documentation
User guides for the Connect client and for IP phones and button boxes are available from the Mitel
documentation website: support.shoretel.com
Release Notes
The Mitel Connect Release Notes provide information about new releases and new features as well as
issues that relate to new installations and upgrades. You can access this document on the Mitel
documentation website: support.shoretel.com. Connect Director includes a link to this document.
Document Conventions
The following conventions are used in this guide:
Data-entry fields, hypertext links, control buttons, keywords, and other items within the system
management interface are in a bold font.
This chapter describes how to use Connect Director. The following topics are included:
The main server (Headquarters) hosts the Connect Director web application. When you launch a web
browser and navigate to the Connect Director website, the server provides HTML web pages from
which you can add to, delete from, and edit the configuration of the system. When you click Save, your
change is sent to the server and saved in the Mitel database. All other system components are
automatically and immediately notified and updated.
Connect Director allows simultaneous access to Connect Director by multiple users. To ensure data
integrity, the database is locked during save transactions in Connect Director. If another user tries to
save changes while the database is locked, Connect Director advises the user that the changes were
not saved; the user simply needs to save the changes again. Most changes to the database are
completed within one second, so the probability of attempting to save while the database is locked is
low.
Through administrative permissions, the Mitel Connect system allows various levels of access to
Connect Director. By default, the initial system administrator has access to everything on the system.
You can assign other users one of several built-in roles, or you can define roles for more limited
purposes such as allowing site administrators, directory list managers, and read-only users to perform
specific tasks. You can define roles to provide only as much system access as each user requires by
assigning a role with an appropriate permission level.
To use Connect Director, your system must meet the following requirements:
The fully qualified domain name (FQDN) or IP address of your Headquarters server
Your user ID
Your password
1. Launch a browser.
3. Press Enter.
Note
For information about configuring access through Active Directory, see Using Active Directory with
a Mitel Connect System on page 407.
4. In the Username field, type your user name or the default user name (“admin”).
5. In the Password field, type your password or the default password (“changeme”).
Note
Mitel recommends that you create a new user with administrator privilege. After you assign the full
System Administrator role to a user, the default user “admin” is disabled. For additional
information about granting administrative permissions to users, see Administrative Permissions
on page 70.
6. Click Login.
When you log in to a new system for the first time, the System Key Request page is displayed.
For information about requesting the system key, see Installing a License Key on page 45.
Upon subsequent logins, if the system is not registered the License Requirements page is
displayed. For information about registering the system, see Registering the Mitel Connect
Software on page 40.
If the system is registered, the Dashboard page in the Maintenance menu is displayed.
Parameter
Help
Navigation Pane
The navigation pane (see Figure 2 on page 27) is located on the left side of the Connect Director page
and provides access to the menus described in Table 1.
System Click this icon to open a menu that lets you configure
licenses and administrative permissions.
Reports Click this icon to open a menu that lets you run reports on
call details and web conferences.
Documentation Click this icon to open a menu that lets you link to Mitel
product documentation.
Maintenance Click this icon to open a menu that lets you view status
information about the components installed in your system.
This menu also lets you access a system dashboard,
system topology, alerts, call quality information, events, and
event filters.
Diagnostics Click this icon to open a menu that lets you perform
diagnostic tasks, such as running remote packet capture
operations.
Text-entry box
for field-label
and menu label
Menu icons search
Expand or collapse
menu
Expand submenu
Hide navigation
Collapse submenu pane
Alarm Bar
The alarm bar displayed at the top of the Connect Director interface shows alert status for the following
major components and functions in the Mitel Connect system:
Connections alerts reflect issues with physical connections between devices such as servers and
devices within the Mitel Connect system or logical connections between Mitel Connect software
components, such as TMS, DRS, and voice mail services.
Trunk Groups alerts involve issues with the trunks on a switch, which are used to route inbound
and outbound calls.
Voice Quality alerts reflect issues involving poor voice quality in calls monitored by the Mitel
Connect system.
Appliances alerts involve general switch and appliance issues that could affect the functionality or
quality of Mitel Connect services.
Servers alerts involve general server issues that could affect the functionality or quality of Mitel
Connect services.
Hybrid alerts involve issues related to hybrid applications such as Connect HYBRID Fax and
Connect HYBRID Scribe. This category is displayed only if Mitel Connect HYBRID services are
enabled.
Alerts are issued to flag critical, warning, or informational situations. The color of a button indicates the
highest alert severity for components or functions, as follows:
(red) indicates at least one critical (error) alert. You can hover over the button to see how
many warning and error alerts are in effect for that component type.
(yellow) indicates at least one warning alert and no critical (error) alerts. You can hover over
the button to see how many warning and error alerts are in effect for that component type.
(green) indicates no critical (error) or warning alerts, but any number of informational alerts
might have been issued.
The information displayed in the alarm bar is automatically refreshed every 30 seconds.
The number of active error and warning alerts for that category are displayed in a pop-up window.
The Alerts page opens, and it displays a list of all active alerts filtered by category, severity, and
time interval. For detailed information about Alerts, see Monitoring Alerts on page 633.
Most pages in Connect Director are divided into a top pane and a bottom pane:
The top pane (the “list pane”) displays objects in the category that you have selected from the
navigation menu. (For an example of a list pane, see Figure 3 on page 30.) List panes generally
provide categorical information about the objects.
The bottom pane (the “details pane”) displays detailed information about the object selected in the
list pane. (For an example of a details pane, see Figure 4 on page 31.) Where appropriate, the
details pane also includes additional tabs and subtabs for more parameters. On Maintenance
status pages, the details panes often provide additional tabs that display information such as
detailed status, performance, and related calls.
When you click a particular category in the navigation menu, by default the first item in the list pane is
selected and that item’s detailed information is displayed in the details pane. To display the details for
a different object, click that object in the list pane. Specific data-entry fields, drop-down lists, and option
buttons are described in the appropriate sections throughout the subsequent chapters of this book.
The details pane is where you specify parameters for new objects or edit parameters for existing
objects. Fields marked with an asterisk (*) are mandatory fields and require that you enter a value or
make a selection. When creating a new object, you must supply information in these fields. The pencil
icon ( ) indicates that you have changed a value. After you add or change a parameter value, you
must click Save to save the changes. The pencil icon is no longer displayed after your changes are
saved.
In a list pane, you can adjust column widths, but you cannot rearrange columns or pick which columns
to display.
In many of the Connect Director pages, you can control which page displays and the number of rows
displayed by using controls on the bottom of the list pane, as shown in Figure 3 on page 30.
To expand the list pane (top pane) to a full page, click .
To expand the details pane (bottom pane) to a full page, click .
To show both the list pane and the details pane, click .
The control buttons that you can use to add, copy, delete, or export objects are described in Table 2.
Specific data-entry fields, drop-down lists, and option buttons are described in the appropriate sections
throughout each chapter.
Filtering Information
To find information quickly, you can filter the data displayed in many of the Connect Director pages.
When you enter text for a filter, the system filters for items that begin with those letters. The filter is not
case sensitive. You can include a wild card in the text string. For example, if you type “*48” in the filter
for the Model column on the IP Phones status page, you see all phone models that contain “48”.
Figure 5 illustrates this example.
Text boxes and drop-down lists are displayed under the column headings for the fields you can
use as filters.
1. Click in the first text box for the column, and select a day from the calendar and use the
slider bars to specify the hour and minute.
2. Click in the second text box for the column, and then do one of the following:
Select a day from the calendar and use the slider bars to specify the hour and minute.
Click Now.
3. Click Done.
Note
At least one date and time field must be entered to filter on a date and time range. If the start
time is left blank, the earliest possible date and time are used. If the end time is left blank, the
latest possible date and time are used.
The rows are filtered to display information that matches the filter you entered.
4. If you want to close the filter box but retain the filtered results, click .
Tip
You can apply a filter to sorted data, or you can sort filtered data.
3. In the list pane, click the column heading you want to sort by.
Getting Help
To get help for the parameters on the Connect Director page that you are viewing, click Help.
You can access documentation for Mitel Connect through the Documentation menu in Connect
Director. In the navigation menu, click Documentation and then the particular document or category of
documents you want to view.
You can also access the full set of product documentation for Mitel Connect from the Mitel Support
website: https://support.shoretel.com/.
Register the Mitel software and request a license key or keys. For more information, see Installing
a License Key on page 45.
Prompt registration in Connect Director is encouraged to ensure that Mitel staff has current
information about your Mitel products and installation.
Install your license key or license keys if you have them. Until you have updated all required
licenses, Connect Director will continue to open to the License Requirements page after login. You
have up to 45 days to install the licenses. If the licenses are not installed during that time,
you cannot continue to use the Mitel Connect software. For information about installing license
keys, see Installing a License Key on page 45.
a. Specify the dialing conventions to use throughout the system. The dialing conventions include
extension length as well as the dialing plan reservations for extensions and trunk access
codes. For more information about dialing plans, see Setting Dial Plan Parameters on page
52.
b. Configure the system’s extensions from the System Extensions page. Review the default
system extensions and, if necessary, change them if the system must use these defaults for
other purposes. For more information about system extensions, see Configuring System
Extensions on page 57.
c. Specify the languages you want to make available for the system. (Be sure you have
appropriate licenses for the languages.)
d. Review the password and log file settings on the Additional Parameters page. See Configuring
Other System Parameters on page 60 for more information about other configurable
parameters. Mitel created the defaults to apply widely, so they can probably remain at their
current values.
If you want to ensure secure client access, install a certificate from a Certification Authority on your
Headquarters server. For more information, see Certificates on page 80. Otherwise, you can use
the default certificates pre-installed on your Mitel Connect system.
Create and configure the sites that you want your Mitel Connect system to include. For more
information, see Chapter 5, Configuring Sites on page 95.
Note
The Night bell switch and Paging extension parameters are included on the Sites page, but
you cannot configure these parameters until the proper switch is configured.
In addition, before you can configure Operator extension or Fax redirect extension, you
must configure the proper users. For more information, see Chapter 12, Configuring Users on
page 369.
Set the IP address range for the IP phones at any remote sites. On the IP Phone Address map
page, you define IP address ranges so that IP phones are assigned to the correct site. IP phones
not assigned to a remote site are associated with Headquarters.
Configure additional sites if desired. For more information, see Chapter 5, Configuring Sites on
page 95.
Configure Mitel Connect servers, voice switches, and other appliances using the Platform
Equipment page.
For information about how to configure additional Mitel application servers, see Chapter 6,
Configuring Application Servers on page 105. For each additional server, do the following:
1. Select the role (primary or spare) that you want the switch to perform for the site.
2. Identify the site where you want to use the switch or appliance.
5. Provide a name and description for the appliance, and use the Find switches button to
discover each voice switch or appliance on the network.
6. For each switch, specify the server that you want to manage the switch.
7. Each voice switch must have a valid IP address from a DHCP server or an address
statically configured from the serial port.
Configure IP phones. For more information, see Chapter 10, Configuring IP Phones on page 233.
a. Add IP phone ports to your voice switches as necessary to support your IP phones. Each
switch port that is assigned to IP phones supports five IP phones.
b. Set the boot parameters for the IP phones. IP phones are set to find boot information from a
DHCP server. If your installation has other requirements, use the set-up menu on the IP phone
to set server and boot configuration parameters. For more information, see the Mitel Connect
Planning and Installation Guide.
You can speed up the installation by using the Extension Assignment feature. For more
information, see Configuring Extension Assignment on page 429.
Configure the following users in the following order before you add general users to the system:
a. During installation, a system administrator is set up. Assign a person at your site to this role.
When you assign a system administrator, the default user ID and password must be changed.
Make a note of the new user ID and password, because the default user ID (“admin”) and the
default password (“changeme”) will no longer be available.
b. Configure an operator for each site. See Administrative Permissions on page 70 for more
information. This is the extension reached when 0 is dialed from the telephone. Note that
operators can span sites.
d. Configure a user as the default Personal Assistant for all other users. This is the user that
callers are routed to when they dial “0” in a user’s mailbox. It is important that you configure
the default Personal Assistant before adding the bulk of the users so that appropriate defaults
can be assigned. If you omit this step, you may have to spend time reconfiguring the users
later.
a. Return to the Sites page and complete the configuration for Night Bell, Paging, Operator, and
Fax Redirect.
b. If you have added additional servers, review the details for each site and reconfigure as
appropriate.
a. Configure trunk groups from the Trunk Groups page. You can modify the default trunk groups
and add new trunk groups.
b. Depending on the trunk type, configure individual trunks from either the Trunks page or the
Platform Equipment page. For example, SIP trunks are best configured on the Trunks page,
but trunks on a voice switch-T1 can quickly be configured using the Fill Down button on the
Platform Equipment page.
Configure user groups (including Class of Service permissions) and users. For details, see
Chapter 12, Configuring Users on page 369.
Configure call control parameters, and set up hunt groups and paging groups as needed. For
details, see Chapter 11, Setting Call Control Options on page 283.
Configure voice mail parameters and system distribution lists as described in Chapter 14,
Configuring Voice Mail on page 457.
Configure the auto-attendant parameters and menus as described in Chapter 15, Configuring the
Auto Attendant on page 479.
Set schedules to be used by the auto-attendant or paging groups. For more information about
schedules, see Chapter 16, Configuring Schedules on page 489.
Configure workgroups, including schedules and the queue, as described in Chapter 17,
Configuring Workgroups on page 495.
Configure the system directory as described in Chapter 18, Managing the System Directory on
page 525. If you use Microsoft Exchange and Microsoft Outlook, you can leverage Contacts on the
Exchange Server for common contact information.
If using Connect Contact Center, you must configure it. Refer to the Mitel Connect Contact Center
Administration Guide and the Mitel Contact Center Installation Guide for information.
This chapter describes how to register your Mitel Connect software and manage licensing. The
following topics are included:
For upgrades, if you have previously submitted your contact information to Mitel and your system is
connected to the Internet, your contact information is automatically submitted during subsequent
upgrades.
Contact information
License key list:
current license keys
features activated
features available for activation for each licensed feature
Server MAC address
Sales Order Number (for initial installations only)
Switch inventory:
switch types
MAC addresses
serial numbers
All this information is included in the End User License Agreement (EULA) provided for an installation
or upgrade.
Registration Process
To receive unlimited access to Connect Director, you must complete the product registration process.
The Mitel Connect system software can be registered automatically, over the Internet, or through
email. These methods are described in the following sections. When registering automatically or over
the Internet, registration data is transmitted to Mitel over a secure connection to ensure integrity and
privacy.
For upgrades that meet the following prerequisites, the software is registered automatically:
Contact Information is saved in Connect Director before starting the upgrade process.
A valid system license key is installed before starting the upgrade process.
Your system can connect through the Internet to the Mitel Support web site
(http://support.shoretel.com).
For new installations or upgrades that do not meet these prerequisites, you are prompted to register
the software the first time you launch Connect Director after installing or upgrading. You can choose to
register the software over the Internet or through email, but registration over the Internet is completed
more quickly than through email.
If your installation does not have adequate or current licenses, Connect Director displays the License
Preview page when you have completed or skipped registration. For more information about licenses,
see Managing License Keys on page 44.
Registering Automatically
1. Install or upgrade the Mitel software.
Registration information is sent over the Internet to Mitel. Upon receipt, Mitel sends a response.
When the response is received, a compliance token is created on the Headquarters server, and
Connect Director is unlocked.
Note
Until registration is completed, a Reminder Notification (“out-of-date” message) in red letters is
displayed on the Contact Information page.
2. Start the Connect Headquarters server, and then log in to Connect Director.
4. On the Contact Information page, enter information in the fields, as described in Table 3 on page
42.
5. Click Save.
6. Click Now.
The License Preview page is displayed. For more information about licensing, see Managing
License Keys on page 44.
Registration information is sent over the Internet to Mitel. Upon receipt, Mitel sends a response.
When the response is received, a compliance token is created on the Headquarters server, and
Connect Director is unlocked.
Note
Until registration is completed, a Reminder Notification (“out-of-date” message) is displayed on
the Contact Information page.
Registering by Email
1. Upgrade or install the Mitel software, and then launch Connect Director.
3. On the Contact Information page, enter information in the fields, as described in Table 3 on page
42.
4. Click Save.
5. Click Now.
The License Preview page is displayed. (For more information about licenses, see Managing
License Keys on page 44.)
7. Save the LicenseRequest.slr file to your desktop or another location so that you can easily locate
it.
Upon receipt, Mitel sends a response containing a compliance token that grants access to
Connect Director. This token (license key) is associated with the Server MAC address and a
system build number.
If the process is unsuccessful, you must submit the Contact Information again (over the Internet or
through email) as often as necessary until registration is completed.
After you register and apply for licenses, Mitel acknowledges your submission in an email message
and mails your system key within 3-5 days. Until the license key arrives, when you want to use
Connect Director you can click Later in the Connect Director Welcome screen to enter Connect
Director. You have up to 45 days to install the license key.
Compliance
If your system does not comply with Mitel’s license requirements, Connect Director offers 45 days to
comply with the license requirements. To comply, you can remove unneeded configurations, order
additional licenses, or do both. The 45-day grace period allows you to make ad hoc, unplanned
changes that could temporarily exceed your license limits, but it gives you time to get back into
compliance.
You can easily print or send the license status page via e-mail for purposes of license compliance
verification. License status is never transmitted without explicit action by a Mitel administrator.
WARNING!
Do not upgrade unless your installation complies with your current license requirements. If you
upgrade your system while it is out of compliance, you have only 45 days before you are locked out of
Connect Director. If you have license issues, contact your Mitel Partner or Mitel Installed Base
Business Services Team at Shorecare_admin@shoretel.com.
2. In the navigation pane, click System > Licenses > License Requirements.
3. In the navigation pane, click System > Licenses > License Keys.
The General tab is displayed in the details pane at the bottom of the page.
In the Key field, copy and paste all license keys that you received from Mitel. (You can paste in
multiple license keys at once.)
In the Comment field, enter a description of the licenses.
6. Click Save.
License Types
Mitel licenses are categorized as either self-audited or keyed licenses.
Self-Audited Licenses
Self-audited licenses do not have a key associated with them. They are tracked on the License
Requirements page to assist system administrators in tracking the number of required licenses based
on the current configuration versus the number that have been purchased, which they enter manually.
For the following types of self-audited licenses, if the usage exceeds the current number of licenses,
you are notified until licensed capacities meet or exceed usage:
Phone Only Access License: This count includes the number of desk phones.
Remote Server Software: This count includes licenses that correspond to the number of
distributed voice servers. Up to 20 remote servers can be configured in addition to the
Headquarters server.
TAPI Application Server: This count includes licenses for remote TAPI Application Servers that
have the “Allow Voice Mailboxes” check box deselected. The number purchased should match the
number of deprioritized servers that exist at a particular site.
Phone API License: This count includes licenses for the Phone API. (For more information,
contact Mitel Professional Services for the appropriate SDK document.)
Keyed Licenses
You add keyed licenses by entering a license key string obtained from Mitel or a partner. Embedded in
the license key are the type and number of licenses associated with that key. When a valid key is
entered, the system decodes it and details the type and number of licenses added. Keyed licenses are
additive, and more than one can be entered into Connect Director over time.
These licenses are tracked in the Keyed Licenses section on the License Requirements page in
Connect Director. The types of keyed licenses are as follows:
Additional Site License: This count includes licenses required for each site beyond the main
headquarter location. For installed base customers, when you upgrade and request your new
system key, you will automatically receive additional site licenses for all configured sites.
Extension License: This count includes all extensions licensed by both Extension Only and
Extension and Mailbox licenses. For more information about this license type, see Extension and
Mailbox Licenses on page 48.
Mailbox License: This count includes all mailboxes licensed by both Mailbox Only and Extension
and Mailbox licenses. For more information about this license type, see Extension and Mailbox
Licenses on page 48.
SoftPhone License: This count includes SoftPhone licenses, which are issued on a per-user
basis. Obtain and install one license for each SoftPhone user.
Additional Language License: This count includes licenses if more than one language is
enabled.
Mobile Access License is required for each client that is enabled for Mobility.
SIP Phone License is a keyed license that enables the system to support one SIP device through
a SIP proxy. (IP400-Series phones do not require this type of license.)
SIP Trunk License is a keyed license required to enable one physical SIP trunk.
Standard Resolution Video License is a keyed license that enables the Connect client to
support one point-to-point video session at VGA resolution (640x480).
High Resolution Video License is a keyed license that enables the Connect client to support one
point-to-point video session at XGA resolution (1024x768).
Connect Client Access License is a keyed license that provides access to the following
capabilities:
All functions available through the Phone Only Access License
Instant Messaging Presence
Contact Viewer
Call recording
Workgroup Agent Access License is a keyed license that provides access to the following:
All functions available through Connect Client Access License
Ability to transfer calls by dragging and dropping call cells into the buddy list
Workgroup access utilities, including log in and log out
Workgroup Queue Monitor
Workgroup Supervisor Access License is a keyed license that provides access to the following:
All functions available through Workgroup Agent Access License
Workgroup access utilities, including log in, log out, and wrap up
Workgroup Agent Monitor
Operator Access License is a keyed license that provides access to the following:
All functions available through Workgroup Supervisor Access License
Access to XGA video
Extension Monitor
External Unified Messaging SIP Link is a keyed license that is required for each Unified
Messaging (SIP) server.
Audio Conference License is a keyed license that is necessary for each audio port that you want
to use in conferences managed by a Service Appliance.
Web Conference License is a keyed license that enables web ports for use in conferences
managed by a Service Appliance.
Virtual Switch IP Phone License is a keyed license that supports devices connected to virtual
phone switches. The system requires one license for each device connected to a virtual phone
switch. In addition, Extension or Extension and Mailbox licenses are required to enable users on a
virtual IP Phone switch.
Virtual Switch SIP Trunk License is a keyed license that is required to enable one SIP trunk on a
virtual SIP trunk switch. No additional SIP trunk license is required.
Remote Phone License is a keyed license that allows access for VPN phones. This applies to
softphones or desk phones that you want to deploy remotely.
Virtual Edge Gateway License is a keyed license that provides access to the virtual Edge
Gateway appliance.
Systems require one Mailbox license for each configured Mailbox-only user. If more than one key is
installed, the number of licenses purchased is the sum of licenses for all valid keys. Mailbox-only users
are only those users with Mitel mailboxes that may use SMDI.
Systems require one Combo license for each user configured for Extensions and Mailboxes. If more
than one key is installed, the number of licenses purchased is the sum of licenses for all valid keys.
Table 4 lists the features available through Extension, Mailbox, and Combo licenses.
Table 4: Features Available with Extension, Mailbox, and Combo Licenses (Continued)
Combo Extension Only Mailbox Only
Includes Mitel
Feature Includes 3rd-party
SMDI-based voice
SMDI-based voice
mail to 3rd-party
mail to Mitel PBX
PBX
Transfer to / Go to extension Yes Yes Yes2
Message by number, name Yes Yes Yes
Advanced features
Extension assignment Yes Yes No
Member of a hunt group Yes Yes No
Member of a workgroup Yes Yes No
Connect client features
Connect client: Phone Only, Connect Yes No mailbox features No extension
Client, Workgroup Agent, Workgroup features
Supervisor, Operator
Extension monitor Yes Operator-only No
features
Agent monitor Yes No mailbox features No
Queue monitor Yes No mailbox features No
Voice mail viewer Yes No Yes
Call history Yes Yes No
System directory Yes No mailbox features No extension
features
Outlook features
Forward voice mail as .wav attachment Yes No Yes
Voice mail form integration Yes No Yes
Outlook Contact/Quick Dialer Yes Yes No
Outlook Contact/Screen Pop Yes Yes No
Outlook Calendar integration Yes Yes Yes
Note: 1 Although call forwarding is handled by the third-party PBX, calls arriving at the Connect voice mail system
are routed as specified by Connect voice mail forwarding conditions.
This chapter describes how to specify system-wide parameters in Connect Director. The following
topics are covered:
This section describes how to set the parameters for creating number strings in a dial plan. These
parameters are set using the Dial Plan page in Connect Director. On the Dial Plan page, you can:
Note
You cannot reduce the number of digits included in an extension after the parameter is set.
WARNING!
Mitel strongly recommends that administrators configure dial plans using Connect Director.
Because dial plan entries can consume a large amount of switch resources, Mitel also
recommends that administrators closely monitor switch CPU and memory usage. Monitoring
the switch usage helps administrators determine when it is necessary to reduce the number of
stored entries after adding a large number of DNIS or Prefix entries.
Manipulation of Mitel databases can cause undesired results. In the event that manual or 3rd
party database changes cause undesired results, Mitel Support may require that those
database changes be reversed to resolve the issue.
Before beginning, for each Mitel site review the Mitel Connect system deployment and topology and
the local telephone company dial plan and dial rules.
WARNING!
Because the Mitel Connect system allows users to dial emergency numbers with or without a
trunk access code, extensions must not conflict with the leading digits of emergency telephone
numbers. If you deploy a global voice network, you must consider the leading digits of emergency
numbers for all the international locations in your system.
2. In the navigation pane, click Administration > System > Dialing Plan > Dial Plan.
3. In the drop-down list for a digit, select the parameter that you want to assign to that leading digit.
(See Table 5 for descriptions of available parameters.)
WARNING!
After you set and save a leading digit parameter, you cannot change it in the following situations:
The leading digit is an extension prefix. In addition, be aware that setting extension prefixes is a
one-time activity. If you leave any extension prefixes unused, you cannot assign them later.
The leading digit is an extension digit that already has extensions configured starting with that
digit.
The leading digit is configured as the leading digit of a trunk access code for a trunk group.
Table 5: Dial Plan Page: Digit Reservation Parameters on the General Tab
Option Description
Extensions Reserves this digit as the leading digit in an extension.
Trunk Access Codes (1 Digit) Reserves this digit for use as a one-digit trunk access
code.
Table 5: Dial Plan Page: Digit Reservation Parameters on the General Tab (Continued)
Option Description
Operator Reserves this digit for use as the extension used to
access the Mitel operator. The default value is zero (0).
In international applications, zero is often used as the
access code for trunks. This sets a potential for conflict.
Mitel recommends that international customers
standardize globally on a single trunk access code for
the purposes of network call routing (for example, use
“9” for all trunk groups).
Extension Prefix (n Digit) Lets you specify the number of digits used in extension
prefixes that have this leading digit. Extension prefixes
can be up to seven digits.
Note
You cannot reduce the number of digits included in an extension after setting this parameter.
2. In the navigation pane, click Administration > System > Dialing Plan > Dial Plan, and then click
the Extension Length tab.
3. In the drop-down list for the New extension length field, select a value for the new extension
length.
5. If you want to add one or more numbers at the beginning of all extensions in the Mitel Connect
system, enter this number or these numbers in the Pre-pend current extensions with number(s)
field.
WARNING!
Be sure the numbers that you pre-pend to the extension do not conflict with other numeric strings
in the dial plan. For example, the pre-pended numbers should not conflict with trunk access
codes, the operator extension, emergency numbers, and so on.
A digit translation table is a remedial solution for an environment with overlapping or conflicting dial
plans on different (but connected) phone systems. A digit translation table resolves differences in the
numbers of digits in the dial plans.
The dial plan of a non-Mitel system and the dial plan of a Mitel Connect system
Different dial plans on separate Mitel networks
Through the digit translation table, you can adjust the extension format of a Mitel Connect dial plan to
the format of the dial plan in another phone system. You can specify:
Note
The use of a digit translation table requires careful planning. For guidance on how to plan for digit
translation tables, refer to the Mitel Connect Planning and Installation Guide.
After a digit translation table exists, it is applied (as needed) to application servers, trunks, and SIP
trunks. Details are provided in the following chapters:
Chapter 6, Configuring Application Servers on page 105 explains how to apply translation tables to
servers.
Chapter 9, Configuring Trunks on page 187 explains how to apply translation tables to ISDN trunk
groups.
Chapter 19, Session Initiation Protocol on page 529 explains how to apply translation tables to SIP
trunk groups.
When the Mitel Connect system applies a digit translation table, the direction of the routed call
determines whether digits are added or deleted.
When resolving possible differences between dial plans, the system administrator should specify
number translation so that its operation is invisible to users. Methods for achieving smooth operation
for dial plans are described in the Mitel Connect Planning and Installation Guide.
In general, a system translates the numbers of digits when it passes calls to another phone system.
However, the particular system that performs the translation is the choice of the system administrator.
One of multiple Mitel Connect systems or the system from another manufacturer can perform the
translation. The decision can be based on which system provides the most convenient or efficient point
of translation.
The Simplified Message Desk Interface (SMDI) module in an application server so that users can
access legacy voice mailboxes
When SMDI is selected as the voice mail interface, translation table lists appear in profiles for trunk
groups and application servers.
2. In the navigation pane, click Administration > System > Digit Translation Tables.
3. Click New.
The General tab is displayed. (For details about the parameters on the General tab, see Table 7 on
page 57.)
4. In the Name field, type a name for this digit translation profile.
8. To remove a row, click Remove next to the row you want to remove.
3. Select the check box next to the digit translation table you want to delete.
4. Click Delete.
You can view and modify extensions assigned to these system-wide services using the System
Extensions page. Table 8 on page 58 describes the parameters on the System Extensions page.
2. In the navigation pane, click Administrator > System > Dialing Plan > System Extensions.
The System Extensions page displays the system extensions currently configured.
2. In the navigation pane, click Administrator > System > Dialing Plan > System Extensions.
3. Enter or edit extensions for your system. (For details about the parameters on the System
Extensions page, see Table 8 on page 58.)
4. Click Save.
5. Perform a TMS restart on all servers during off hours. A system restart is not required.
Callers who access the Mitel Connect system over a SIP trunk can
access the BAA in the same manner as users who access the system
via all other trunk types. Mitel supports RFC2833 (DTMF), so if the
voice-mail server is down, external callers can enter an extension by
using DTMF to ring the extension of the user they are trying to reach.
Make Me conference
Extension This extension lets users create conferences with up to eight participants
on a voice switch if the conference capability is so configured. The
default is three.
ShoreTel conference
Extension The system-wide extension internal users dial to initiate a conference
enabled by a Service Appliance.
External number The main external telephone number users dial to access a conference
enabled by a Service Appliance.
Additional calling information Allows you to specify other external telephone numbers users can use to
access conferences enabled by a Service Appliance. These numbers
can be local to remote sites.
Enabling SNMP
Mitel voice switches support Simple Network Management Protocol (SNMP) agents for the Ethernet
interface. These agents provide Management Information Base II (MIB-II) statistics and allow voice
switches to be integrated into standard network management applications. Details about the SNMP
parameters you can configure in Connect Director are described in Table 9.
Mitel has tested and supports the HP OpenCall network management console.
Mitel recommends that you configure your SNMP management station to launch Connect Director
automatically when you click a Mitel device.
3. Enter or edit values for the fields on the SNMP page, as described in Table 9 on page 60.
4. Click Save.
2. In the navigation pane, click Administration > System > Additional Parameters.
3. Enter or edit values for the fields on the Additional Parameters page, as described in Table 10.
4. Click Save.
The Client Compatibility feature lets you specify the earliest version of the Connect client that the
system supports and suggests an earliest version that clients can use without upgrading.
When a user’s version of the Connect client falls below the minimum suggested version but is later
than the minimum allowed version, the system sends an upgrade notification that lets the user
upgrade immediately. A user who chooses to upgrade later must use the Upgrade function in the
Connect client menu.
2. In the navigation pane, click Administration > System > Additional Parameters.
3. Scroll to the Client compatibility and upgrade section and do the following:
Select the Require secure client access (https) option if you want the Connect client to be
accessed securely. Certificates are required if you select this option. For information about
importing certificates, see Certificates on page 80.
Select the Prevent users from initiating client upgrades option to hide the client upgrade
option in the Connect client. With this setting, users can upgrade only after they receive a
notification.
In the Minimum allowed client version field, type the number of the earliest version of the
Connect client that users can use. The default value is the earliest client version the system
software supports.
In the Minimum suggested client version field, type the earliest version of the Connect client
that clients can use. Clients receive an upgrade message if the Connect client version goes
out of compliance. However, with this parameter, the system does not require a software
upgrade. (If the Prevent users from initiating client upgrades option is selected, this
parameter is disabled because users don’t have permission to initiate upgrades.)
Note
The earliest and latest versions of the Connect client that the Mitel Connect system software
supports are displayed to the right of the field.
4. Click Save.
Configuring Languages
A Mitel Connect system can support more than one language at a time. To add one or more languages
beyond the default (free) language of the customer’s choice, the customer must buy a license for each
additional language. (For example, if two languages are enabled, then the customer buys one license.)
Furthermore, when a customer buys a keyed license for each additional language, up to 10 additional
licenses can be associated with one key. For more than 10 additional language licenses, an additional
key is needed.
The Languages page is displayed, and enabled languages are indicated with a check mark.
3. For each language that the Mitel Connect system must support, select the check box in the Enable
column.
4. Click Save.
Supported Languages
The supported languages in the current release are as follows:
Chinese (Simplified)
Chinese (Traditional)
Danish
Dutch
English (Australia)
English (UK)
English (US)
French
French (Canada)
German
Hebrew
Italian
Japanese
Korean
Norwegian
Portuguese (Brazil)
Portuguese (Portugal)
Spanish (CALA)
Spanish (Spain)
Swedish
The functional areas for which a specific language can be configured are as follows:
Sites
Auto-Attendant Menus
Users
Workgroups
Route Points
Trunk Groups
System Information
The System Information page displays various details about your system, such as directory paths and
when the server was installed.
4. Setting Up Security
Parameters
This chapter describes system-wide parameters for security in Connect Director. The following topics
are covered:
Security Overview
Mitel Connect provides the following methods for ensuring the security of the system and hardware:
Administrative permissions
Certificates
Trusted server applications
Password policy
Other security-related parameters
The following sections provide more information about these security topics.
Administrative Permissions
Administrative permissions in Connect Director involve assigning roles that carry various permissions
to individual users.
Roles are sets of permissions that enable users to perform various tasks in Connect Director. System
administrators who have the Administrative permission management permission may grant one or
more roles to users for various purposes. Users who have been granted permissions are called
administrators. To log in to Connect Director, a user must have been assigned an administrative role
with at least one permission.
The administrative permissions are described in Table 12 on page 71, Table 13 on page 72, Table 14
on page 73, Table 15 on page 73, Table 16 on page 74, Table 17 on page 74, and Table 18 on page
75.
The default roles and their permissions are shown in Table 19 on page 76.
System administrators with the proper permission level can define new roles and assign these new
roles or the default roles to users at one or more sites.
The initial administrator set up during installation has full permissions. Users assigned the Technical
Support role have no permission to change parameters, but they are allowed to read all pages.
Permissions are additive; that is, the more selections, the greater the permissions. When defining a
new role, you can select as many or as few permissions as are needed for that particular role. For
example:
In a company with one Mitel system administrator, that administrator would have all permissions.
An administrative assistant may have permission to change Distribution Lists at one site.
Account Code
System Directory
Report Generation
Other System
User
User Group
Distribution List
Workgroup
Site
Maintenance
Name
Table 19: Default Roles and Their Default Administrative Permissions (Continued)
Permission
Administrative
Account Code
System Directory
Report Generation
Other System
User
User Group
Distribution List
Workgroup
Site
Maintenance
Name
Configuring Roles
The Roles page shows the default and added roles available in the system. You can add, edit, copy, or
delete roles on this page.
Adding a Role
1. Launch Connect Director.
2. In the navigation pane, click System > Administrative Permissions > Roles.
3. Click New.
5. Select the check boxes or radio buttons for the permissions you want to include.
6. Click Save.
Editing a Role
1. Launch Connect Director.
2. In the navigation pane, click System > Administrative Permissions > Roles.
The details for that role are displayed on the General tab.
4. If you want to change the role’s name, in the Name field type a new name for the role.
5. Modify other parameters on the General tab as needed to indicate the permissions you want to
include for the role.
6. Click Save.
Deleting a Role
1. Launch Connect Director.
2. In the navigation pane, click System > Administrative Permissions > Roles.
The details for that role are displayed on the General tab.
4. Click Delete.
Note
If the last role with the Administrative Permission Management permission enabled is removed,
the default admin account (as created during initial installation) is reactivated and includes the full
set of administrative permissions.
Configuring Administrators
The Administrator List page shows users who have been assigned a role with administrative
permissions of some kind. A user may have only one administrative role. New users are created with
no administrative role assigned to them.
At least one user must remain on the list to prevent the problem of no one being left to administer the
system.
Adding an Administrator
1. Launch Connect Director.
2. In the navigation pane, click System > Administrative Permissions > Administrators.
3. Click New.
4. In the User extension field, type the extension for the user to whom you want to assign as an
administrator.
5. In the Role drop-down list, select the role you want to assign to the user.
6. Click Save.
Deleting an Administrator
1. Launch Connect Director.
2. In the navigation pane, click System > Administrative Permissions > Administrators.
The details for that role are displayed on the General tab.
4. Click Delete.
2. In the navigation pane, click System > Administrative Permissions > User Logins.
3. Click the name of the user that you want to log off.
The details for that role are displayed on the General tab. (For details, see Table 21.)
4. Click Delete.
Certificates
This section covers the following topics:
Certificate Authority (CA) – An entity that issues X.509 certificates. Public certificate authorities
that are well known and trusted are included in the trust store of most operating systems and
browsers. To ensure secure transactions, these public CAs must be used to issue certificates for
Transport Layer Security (TLS) services that will be accessed by browsers or other third-party
software and devices.
Certificate – A digital certificate issued by a certificate authority for a particular FQDN. If you
specify a wild card in the certificate signing request, the certificate can apply to more than one
server (for example, *.shoretel.com). Another type of certificate, the Subject Alternative Name
certificate, can support multiple domain names.
Root CA Certificate – A CA certificate that is self-signed. Well known Certificate Authorities (for
example, VeriSign, GoDaddy, and GeoTrust) have their Root CA certificates in the trust store for
operating systems and browsers, or they can be downloaded from the Web.
Public key – a cryptographic key available to all parties in a group (for example, Mitel customers).
A public key is typically embedded in a certificate.
Private key – a cryptographic key available only to the owner. The private key is not to be shared
and is only to be used by the owner.
Certificate Authorities are the foundation for PKI, because the digital certificates they create provide
authentication for transactions. The CA is the party that both the owner of the certificate and the party
using the certificate trusts. You can purchase a certificate from a widely known Certificate Authority
vendor, which provides certificates for multiple organizations and the general public.
To ensure the integrity of transactions, digital certificates can be used to prove the identities of both
machines involved in the transaction. If the certificate was issued by a source that the server knows
and trusts, then the server will accept the machine's certificate as proof of its identity. In this way, a
secure session can be established because the two machines are able to present each other with
certificates.
For more information, see RFC 2459 (Internet X.509 Public Key Infrastructure Certificate and CRL
Profile). You can also find numerous explanations of PKI certificates by doing an Internet search.
You might find the XCA tool for managing certificates helpful when working with certificates. You can
access it here: http://sourceforge.net/projects/xca/
HW Root CA: Mitel maintains a CA for the purposes of manufacturing hardware with built-in
certificates. The IP400-series phones contain a unique certificate signed by this CA and an
encrypted private key. The Headquarters server contains this certificate in the file system and in
the database.
UC Certificate Authority (also known as the HQ CA): The Headquarters server functions as a
X.509 Certificate Authority for the system’s PKI. Each Mitel Connect ONSITE Headquarters server
creates its own root CA certificate for internal use. The Mitel Connect server software installation
process generates its own signed Certificate Authority certificate when it first boots up. This root
certificate uses a 2048-bit RSA key-pair and is valid for 20 years.The Certificate Authority on the
Connect Headquarters server issues certificates for Secure Session Initiation Protocol (SIPS) and
HTTPS that are used in Transport Layer Security. Every server has a certificate for HTTPS, and
every switch has a certificate for SIPS.
The “UC Certificate Authority” root CA is uniquely generated for every installation. The ability to
replace this CA with an alternate is not supported.
Service Appliances: To provide HTTPS security to conference users, you must upload
certificates to each service appliance for which you want to provide secure access. The service
appliances include an administrative interface, accessible from Connect Director, that allows you
to create and export a certificate signing request and import a certificate, along with any
intermediate CA. Optionally, you can also import a private key if the certificate was not generated
from the CSR. When the CSR is created, a self-signed certificate is created. If a wild-card
certificate is installed, you can propagate the certificate and keys to all service appliances in the
system. For more information on certificates for service appliances, see the Mitel Connect
Conferencing and Instant Messaging Planning and Installation Guide.
Mobility Router (SMR) CA: The SMR creates its own CA for issuing client certificates to devices
after they have authenticated with username and password. The SMR also uses this CA to create
initial HTTPS server certificates, but these can be replaced by certificates from a Public Certificate
Authority. For details about certificates for the Mobility Router, see the Mitel Connect Mobility
Router Administration Guide.
Edge Gateway CA: The Edge Gateway creates its own self-signed certificates, which are used if
no other certificates are installed. Because the Edge Gateway supports VPN access for IP400-
Series phones (through RAST), it trusts the HW Root CA as a means to authenticate phones. For
details about certificates for the Edge Gateway virtual appliance, see the Mitel Connect Edge
Gateway Administration Guide.
For Mitel Connect, encryption is provided for all end-user communication, including all protocols to and
from the IP400-series phones (with the exception of a few downloaded configuration files), and all
protocols to and from the Connect client.
To ensure secure (HTTPS) access for Connect Director and the Connect client, you must enable the
Require secure client access (https) option on the Additional Parameters page and install a custom
certificate purchased from a public certificate vendor. This is the only method for ensuring that the
Connect client and Connect Director are secure. The Connect client falls back to HTTP if certificates
are not installed to enable HTTPS. Connecting securely requires trusted certificates to be deployed on
all platforms where the client connects. Furthermore, if you install a certificate from a public Certificate
Authority and you enable the Exchange connector (on the Additional Parameters page in Connect
Director), be sure that the FQDN that you specify in the Exchange server matches the FQDN included
in the certificate. Otherwise, connecting to the client generates warning messages.
If ensuring secure client access is not a requirement, you can opt to use the default certificates signed
by the UC Certificate Authority that are created during installation.
In the most typical Transport Layer Security (TLS) handshake, the server presents a certificate,
possibly including one or more Intermediate CA certificates, and the client validates that certificate
based on its trust store, which contains the appropriate Root CA. This is how the client authenticates
the server. In this case, the server has not authenticated the client. In Mitel Connect, client
authentication through certificates applies to IP400-Series phones and Trusted Server Applications.
Connect Director includes a page that lets you generate a certificate signing request, which you can
use to purchase a PKI certificate from a widely known and trusted certificate vendor. For instructions,
see Generating a Certificate Signing Request on page 83.
For servers, including Windows and Linux distributed voice servers, you can upload and manage
certificates for your Mitel Connect system in Connect Director through the Certificates tab on the
Platform Equipment page. For details, see Importing a Certificate for Headquarters and DVSs on page
86.
<drive>:/Shoreline Data/keystore
Mitel recommends that you keep a backup copy of the /keystore folder in a secure offline location
so that your certificates can be recovered in case of hardware failure.
Mitel recommends that you not delete the /keystore folder. If you delete this folder, you will need to
reboot all voice switches and clear each phone’s configuration by using MUTE CLEAR# on each
phone.
2. On the navigation pane, click System > Security > Certificate Signing Request.
3. Complete all fields on the page, as described in Table 22. (Some fields are automatically
populated with information from the Contact Information page. You can edit this information as
necessary.)
4. Click Generate.
The CSR is generated, and the Private key is also generated if the Create a new private key
option was selected.
5. Create a staging folder (for example, <drive>:\CertStaging), and save the following text files
there:
Copy and paste the generated CSR into a text file (for example, server01.csr), and save
the file in the staging folder.
If generated, copy and paste the generated private key into a text file (for example,
server01.key), and save the file in the staging folder. (Retain the private key for local use.
Do not share it with the vendor. Later, when you import the certificate files that you receive
from the CA vendor, you will include this private key file that you have retained locally.)
6. Send the Certificate Signing Request file that you created to a Certificate Authority vendor to
purchase a certificate.
7. When you receive the certificate files from the CA vendor, save them to the staging folder that you
created in Step 5.
8. Proceed with the steps outlined in Importing a Certificate for Headquarters and DVSs on page 86.
Tip
Because importing a certificate involves uploading multiple files, use a browser that supports selecting
multiple files.
1. After purchasing a signed certificate from a CA vendor, store all the files received from the vendor,
which should include the SSL certificate and the intermediate CA certificates, into a staging folder
that you can access later for the upload. If a private key was created during the generation of the
CSR, the private key must also be placed into the staging folder and imported later.
Notes
Vendors could return certificate files in various formats and file types and might return a
password along with the files. Not all file types returned from vendors can be imported as is. For
example, a PKCS12 file can be imported as is, but a PKCS7 file cannot be imported without first
running an OpenSSL command to extract individual certificates. These certificates then must
be staged for import.
If you are running Connect Contact Center, in addition to the Intermediate CA certificates, the
Root CA certificate is required. If the Root CA certificate is not among the files returned from the
vendor, you must download it, place it into the staging folder, and import it later.
3. On the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
4. On the list pane, click the name of the device on which you want to install the certificate.
The details for that device are displayed in the details pane.
The Certificates tab is displayed, and it shows the details for the currently installed Mitel self-
signed certificate or any previously imported certificate. The name (FQDN name) of the currently
installed certificate should be identical to the Common name of the certificate that you are ready to
import.
6. On the Certificates tab for the selected server, click Delete Current Certificate, and then click OK
in the confirmation dialog.
Note
Mitel does not recommend importing new certificates and changing a fully qualified domain name
at the same time. If you would like to import a certificate that has a new FQDN, follow these steps
on the Platform Equipment page in Connect Director after deleting the existing certificate:
1. On the General tab, change the value in the Fully qualified domain name field, and click
Save. (This generates a self-signed certificate with the new FQDN.)
7. If provided by the vendor, in the Certificate password field enter the password for the certificate.
Note
If your certificate has a password, you must enter the password before clicking the button to
browse for the certificate files, which is described in the next step.
8. Upload the certificate and other relevant files from your system by clicking Choose Files or
Browse in the Certificate files field and then selecting all the files provided by the Certificate
Authority vendor. (These files include the SSL certificate and any intermediate CA certificates.
There is typically one CA intermediate file, but there might be more than one.) In addition, include
the private key if one was created when the certificate signing request was generated.
Connect Director validates the uploaded files and confirms the validity with a check mark. After the
import is complete, refresh your browser to see the new “Issuer” information.
Note
If you do not include the proper intermediate CA certificates, the Directory, History, and Options
features on the phones will not work.
The certificate you uploaded is installed for the selected device. The deployment of the imported
certificates restarts some Windows services.
Note
If Connect Director cannot access the Root CA certificate, a warning message is displayed, but
the import is still triggered by clicking Save.
2. On the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. On the list pane, click the name of the appliance or server for which you want to delete or revoke
the existing certificate and replace it with a self-signed certificate.
The details for that appliance or server are displayed in the details pane.
The Certificates tab is displayed, and it shows the Name and Domain for the currently installed
Mitel self-signed certificate or any previously imported certificate.
7. (Optional) If you need to change the FQDN, click the General tab and provide the new FQDN in
the Fully qualified domain name field.
8. Click Save.
2. In the navigation pane, click System > Security > Trusted Server Application.
The Trusted Server Application page is displayed. (Details about the columns in the list pane are
provided in Table 23.)
3. Click the name of a trusted account to see its details in the details pane.
2. In the navigation pane, click System > Security > Trusted Server Application.
3. Click New.
4. On the General tab, specify the details for the trusted server account you want to create. (For
details, see Table 24.)
After you select a certificate, the Subject, Valid from, and Valid to fields are populated.
5. Click Save.
2. In the navigation pane, click System > Security > Password Policy.
3. Specify the values for the parameters. (For details, see Table 25 on page 91.)
4. Click Save.
password length
number of letters in the password
number of numbers in the password
number of special characters in the password
combined items from the items listed above
Possible values range from 1-100, with 25 indicating a weak
password and 90 a very secure password. The default is 66.
Password Length:
5 Points: Less than 4 characters
10 Points: 5 to 7 characters
25 Points: 8 or more
Letters:
0 Points: No letters
10 Points: Letters are all lower case
20 Points: Letters are upper case and lower case
Numbers:
0 Points: No numbers
10 Points: 1 number
20 Points: 3 or more numbers
Special Characters:
0 Points: No special characters
10 Points: 1 special character
25 Points: More than 1 special character
Combined Items:
2 Points: Letters and numbers
3 Points: Letters, numbers, and special characters
5 Points: Mixed case letters, numbers, and special characters
Reuse limit The number of previous passwords that cannot be used. The range
of possible values is 0-30. The default is 1.
Expiry days The number of days before the password expires. The range of
possible values is 10-365. The default is 90.
A port range that can be used for audio and video traffic throughout the network.
Using trusted IP address ranges for service appliances (such as the SA-100 and SA-400) in the
DMZ.
This section provides no guidance for choosing the IP address ranges to specify. This choice should
have been made in advance, as a part of planning the network and formulating the network’s security
policy.
Note
Unless Mitel’s default port range conflicts with ports in the network, you can keep the defaults. Only
the low-end port number is configurable, as this section describes.
When you specify the first port number, the system automatically adjusts the value of the last port to
provide the maximum number of supported ports.
2. In the navigation pane, click Administration > System > Port Configuration.
3. In the First UDP port field, enter a port number in the range of 1024–61034.
The value for the Last UDP port is automatically adjusted based on the value you entered.
4. Click Save.
Note
The default state of the private IP addresses includes the entirety of each range. Therefore, the IP
ranges are completely open and insecure. After you specify a trusted IP address range, we strongly
recommend that you delete the other ranges, as the configuration steps describe. If necessary, you
can re-create these ranges.
2. In the navigation pane, click Administration > System > Trusted IP Ranges.
3. Click New.
5. In the Low IP address field, type an IP address for the low end.
6. In the High IP address field, type an IP address for the high end.
7. Click Save.
2. In the navigation pane, click Administration > System > Trusted IP Ranges.
3. Select the check box next to the name of the IP range you want to delete.
4. Click Delete.
2. In the navigation pane, click Administration > System > Trusted IP Ranges.
3. Select the check box next to the name of the IP range you want to copy.
4. Click Copy.
The General tab displays the details for the copied IP range.
6. Click Save.
5. Configuring Sites
This chapter explains how to configure Mitel Connect sites. The following topics are covered:
Overview ................................................................................................................... 96
Viewing Configured Sites .......................................................................................... 96
Creating a Site .......................................................................................................... 97
Viewing the Servers Assigned to a Site .................................................................. 101
Using Service Appliances as a Back-up Resource ................................................. 102
Registering a Remote Service Appliance for Access to the Headquarters Site 102
Creating a System Failover Mechanism for Conferencing ............................... 102
Overview
The Mitel site is a logical concept designed to help system administrators organize the telephony
environment. Sites can accommodate geographical requirements, such as where the external
environment affects outbound calls, or logical requirements, such as a need to separate users who
have advanced functions from standard users. After you create a site, you can assign servers,
switches, appliances, users, other sites, and so on, to it.
You assign features to a site. For example, a site definition includes the following aspects: country,
local area code, site operator, and admission control setting.
The Sites page is displayed, and details about the columns on the Sites list pane are provided in
Table 26.
Creating a Site
1. Launch Connect Director.
3. Click New.
The General tab in the details pane displays empty fields and default values.
4. Provide values for the parameters on the General tab, as described in Table 27.
5. Click Save.
This also defines the area code that is considered local from a call
permissions perspective.
Additional local area codes In the United States, this defines area codes that can be dialed
using 10-digit dialing instead of 1+10-digit dialing. For example, if
the site is in an overlay area with multiple local area codes that
require 10-digit dialing, you can be consistent with the dialing plan
in your region by entering the additional area codes in this
parameter.
This also defines additional area codes that are considered local
from a call-permissions perspective.
For each additional local area code that you want to add, click
Add to create a data entry field for entering the additional area
code.
If the user answers the fax call, the system uses the fax
redirection extension at the user’s site.
Table 28: Sites Page: Parameters on the Night Bell Call Handling Tab
Parameter Description
Night bell extension This is the extension that is used to ring the site’s night bell. This
extension must be associated with a Mitel switch audio output
port that you specify as the next parameter. This extension is
unique.
You must assign switches to the site and select the switch that will
support the paging extension before you can save a paging
extension.
Show References Click to display a list of everywhere this extension is used.
Paging switch This is the Mitel switch associated with the paging extension. The
paging extension can share the same switch port as the night bell
extension.
Table 28: Sites Page: Parameters on the Night Bell Call Handling Tab (Continued)
Parameter Description
Call forward condition Select one of the following options for call forwarding of the night
bell:
3. In the list pane, click the site for which you want to view the servers.
The Servers tab displays the name and description for each voicemail switch, distributed voice
server, and service appliance configured for that site.
5. If you want to see configuration details for that server, click its link in the Name column.
Note
A Headquarters site does not have any installed service appliances.
Note
The main server fails at a site that also has a service appliance.
The details pane displays the General tab, which shows the configuration information for the
Headquarters site.
4. In the Service Appliance Conference backup site drop-down list, select the site to use as a
back-up site.
Note
The backup site can be a logical site.
5. Click Save.
Details for the headquarters site appear in the General tab of the details pane.
4. In the Service Appliance Conference backup site drop-down list, select the site that you want to
use for back up.
Note
The back up site can be a logical site, and it must be physically separate from the
headquarters site.
5. Click Save.
6. Configuring Application
Servers
This chapter describes how to set up servers. The topics discussed include:
Overview
The Mitel Connect system supports Distributed Voice application Servers (DVS). Distributed servers
reduce WAN bandwidth by providing local voice mail and auto-attendant services, and increase the
scale of the system.
Even though there are multiple servers, the Mitel Connect system provides a single image of your
entire network. The system is currently certified to support up to 21 servers; one main server, and up to
20 distributed servers. Consider adding a server at a site when the site exceeds 100 users. Add a new
server for every 1,000 users.
Voice Mail – Each server supports 254 simultaneous voice mail, auto-attendant, account code
prompts, workgroups, and paging connections. The voice mail system uses SMTP to transport
composed messages between the distributed servers. The Mitel Connect system also supports
linking to legacy voice mail systems using AMIS protocols.
File-Based Music on Hold – The system uses SMTP to distribute MOH files to the distributed
servers.
Auto-Attendant – The system supports up to 1000 menus that are hosted on every server.
Configuration – The system enables users to log in and make configuration changes, such as call
availability states, from their Connect client or from the Connect Client for Mobile device, if
supported.
Maintenance – The system provides a web site accessible through Connect Director for the
maintenance of all the remote servers.
The distributed voice applications use a Remote TAPI Service Provider that relies on the call control
information from the main server. Using redundant network paths to the main server can improve
reliability of the remote server.
Additionally, incoming calls can still reach the automated attendant, access the dial-by-name directory,
and reach the intended local party during a WAN outage. If a party cannot be directly reached due to a
WAN outage and his or her availability state is configured to send unanswered calls to voice mail, the
call is processed by the local voice mail server. Callers hear a generic greeting, including the called
party’s recorded name, and can leave a message that is later forwarded to the home voice mail server
for the addressee.
Similarly, the DVS provides greater Connect client availability during WAN outages. If the WAN loses
connectivity, users will retain full Connect client functionality as long as there is a DVS at the same site
as the users, the users’ voice mailboxes are on that server, and the DVS is managing the switch that
manages the users’ phones.
Although each voice mail server is autonomous in delivering voice services, it still must have
connectivity to the configuration data stored on the headquarters server in order to make configuration
changes. Specifically, users on an isolated remote server would not be able to change availability state
modes or make other changes that require modification to the configuration data on the headquarters
server. If you enable Distributed Database (DDB) on DVS, you can change the availability state modes
locally without headquarters server connectivity.
IP Phone Limitations/Requirements
Basic connectivity, which is connectivity between the phone and the switch that is controlling the
phone, is required. All aspects of the phone's operation are functional when this basic connectivity
exists, with the following exceptions:
For the IP100-series, IP200-series, and IP500-series phones, the Directory feature requires
connectivity between the switch and a headquarters server or distributed voice server (DVS) that
controls that switch.
For the IP400-series phones, the Directory, History, visual voicemail, user options, and phone user
interface assignment features rely on connectivity to the headquarters server or distributed voice
server. The IP655 phone also relies on connectivity to the server for Directory, History, and visual
voicemail features.
Options features, Changes to Availability State, Wrap-Up: In addition to basic connectivity, these
features require either connectivity between the switch and a headquarters server or DVS that
controls the switch. In addition, if the aforementioned server is a DVS, connectivity is required
between that server and the headquarters server or Distributed Database (DDB) services must be
enabled for the DVS. Further, connectivity between the DVS and the headquarters server is
required for successful synchronization between the Replication Master and Slave databases.
Refer to Mitel Distributed Database on page 121 for more information about this feature and how
to enable it.
Switch-to-switch extension monitoring: This condition exists when a programmed button requires
monitoring activity on an extension that is serviced by a different switch than the one that controls
the phone. For example, if switch A, which is the phone’s switch, is controlled by server X, and
switch B, which is the monitored extension’s switch, is controlled by server Y, then servers X and Y
may be a DVS or the headquarters server. For proper functionality of the switch-to-switch
extension monitoring, the following conditions must exist:
Switch A must be able to talk to server X.
Server X must be able to talk to server Y.
Server Y must be able to talk to switch B.
If X and Y servers are the same, connectivity is, of course, assumed to exist.
Auxiliary information about incoming calls, such as trunk information and called workgroup
information, requires connectivity between the switch and a headquarters server or DVS that
controls that switch.
Connect client: As long as the client can reach Headquarters and DVS servers, Connect client is
fully functional.
First-time Connect client users: When a user logs into Connect client for the first time, the Client
Application Server (CAS) communicates with the headquarters server to find out which server they
need to use. Thus, for first-time users, a connection is required between the client and the
headquarters server regardless of where voice mail and extensions are serviced.
Work group functionality: If users are configured to have work group functionality, they can access
the mailboxes of all work groups to which they belong. This requires connectivity to the server(s)
on which those mailboxes reside.
To configure the Appliance 100 Collaboration Server, refer to the Mitel Connect Conferencing and
Instant Messaging Planning and Installation Guide.
To configure the Appliance 400 Collaboration Server, refer to the Mitel Connect Conferencing and
Instant Messaging Planning and Installation Guide.
To configure the Virtual Service Appliance, refer to the Mitel Connect Conferencing and Instant
Messaging Planning and Installation Guide.
To configure the Linux DVS server, refer to Adding a Linux DVS Server on page 116.
To configure voice switches, refer to Chapter 7, Configuring Voice Switches on page 131.
By default, a Mitel Connect system is configured with one server at the headquarters site. For more
information on adding remote sites, see Chapter 5, Configuring Sites on page 95.
Note
With DDB enabled, if you upgrade the Headquarters server with unsupported client ID, country, or
language, you must manually resync the Headquarters server.
4. Select ShoreGear SoftSwitch from the Hardware type drop-down list to display the list of
parameters. Enter the basic parameters based on the information in Table 34, voice mail and auto-
attendant parameters based on Table 37.
2. Change parameters as needed for the new server, and then click Save.
General Parameters
Table 30 includes a list of basic parameters that are accessed when editing an existing Windows DVS.
To add extension list mapping to an application server configured for external voice mail, click Add
found near the bottom of the edit page. The External Voice Mail dialog box appears.
Enter the Extension to be used to access the legacy voice mail system, the physical Port to be
assigned to the extension, and the Logical Terminal Number for the extension. Trunks in the trunk
group that send calls to external voice mail use this terminal number.
Note that analog trunks support the use of flash for this purpose,
but other types of trunks, such as T1, do not.
To address these needs, Mitel uses the Simplified Message Desk Interface (SMDI) protocol. SMDI
allows dissimilar voice mail and PBX systems to work together. The protocol evolved at a time when
voice mail services and PBX services were provided by separate physical devices, and enabled the
disparate devices to share information over an out-of-band serial cable connection.
There are two modes of operation with respect to integrating a Mitel Connect system and a legacy
system using SMDI:
External voice mail – In this configuration, the legacy system provides voice mail services while
the Mitel Connect system acts as the PBX for users.
ShoreTel voice mail – In this configuration, the Mitel Connect system provides voice mail services
while the legacy system acts as a the PBX for users.
Voice mail extension lengths for the legacy voice mail system may be different from the Mitel voice
mail extension lengths. In this case, digit translation information is required. For more information
about digit translation tables, refer to Configuring Digit Translation Tables on page 55.
For more information about integration to legacy voice mail systems using SMDI, refer to the Mitel
Connect Planning and Installation Guide.
3. In the Hardware type field, select Linux DVS Appliance to display the list of parameters. Enter the
basic parameters based on the information in Table 34, voice mail and auto-attendant parameters
based on Table 37.
The details pane displays information about the selected Linux DVS.
2. Change parameters as needed for the new server. Use table Table 36 for Music on Hold
parameters and Table 37 to modify previously configured voice mail parameters.
3. Click Save.
General Parameters
Table 35 includes a list of basic parameters that are accessed when editing an existing Linux DVS.
Table 37 includes a list of parameters used for configuring additional general voice mail parameters
that were configured in Adding a Linux DVS Server on page 116.These parameters are also accessed
when editing an existing server. The default Voice mail interface mode is None and displays the
following parameters:
Generating a Certificate
Click the Certificate tab to generate a certificate. Table 38 includes a list of parameters used for
generating the certificate. These parameters are accessed when editing an existing server.
1. Click Save to save the certificate to the Mitel database and the key to Shoreline Data > keystore >
private folder.
The Fully qualified domain name field in the General tab displays the fully qualified domain
name server IP address.
Customers can also deploy a read-only copy of the Mitel database on Mitel’s DVS. Using a distributed
database speeds up local queries and can reduce network traffic. Scalability is improved because the
headquarters server is not a bottleneck for database accesses.
Applications on the DVS typically connect to a copy of the database that runs on the local server.
All other write operations are performed on the database at the headquarters server.
Note
Initial registration for SIP phones still requires a write to the headquarters server. Also, initial login of
users and agents requires write operations to a headquarters server.
Availability – A server at a remote site with a Distributed Database can run without disruption if the
headquarters server becomes unavailable. If necessary, the system administrator can reboot the
remote server without connectivity to the headquarters server.
Scalability – Implementing a Distributed Database on remote servers can reduce the workload on
the Headquarters. The remote server can respond to queries locally.
In the current release, the Distributed Database feature and the Distributed Workgroups feature
cannot be active on the same Mitel Connect system at the same time. The choice for which feature
is more important depends on the needs of the customer.
When the Distributed Database is active, changing the name of the remote application server
(DVS) breaks the database replication. To re-establish DDB replication between the headquarters
and the DVS servers, delete the log file and then manually re-synchronize the databases.
When the DVS is down for an extended period of time and then comes back up, the DDB is not
automatically re-synchronized with the headquarters database. In this case, you must manually re-
synchronize the databases.
All applications on the remote server normally point back to the headquarters database by default. For
an application to use the local copy of the MySQL database, additional configuration steps are
necessary.
For example, a Distributed Voice Server can use the headquarters database when initially installed. As
the demands on the headquarters server increase, the administrator may decide to add a local
database instance on the DVS and configure the applications on the DVS to use the local database.
Mitel provides a drop down list that will allow the DVS to switch to other databases, thus allowing for
local or default database operation. For DVS’s not configured with a local database, including VMBs,
the administrator needs to select a proper database, usually a database server on the same site.
Otherwise, the default action is to use the headquarters database.
When Create Local Database is unchecked, the local database instance will be removed. If the local
database is referenced by other DVS’s, the operation will fail. If the DVS that hosts the database is the
only one that references the database, deletion of the local database will be allowed. The DVS will
then be switched to use the headquarters database.
3. Click Save.
Note
Enabling the local database does not show Distributed Voice Servers in the Workgroups Server drop-
down list. Only the Headquarters server is available. If the local database is disabled, all DVS
components and Headquarters are displayed. If distributed Workgroups are created, Enable local
database check box is greyed out.
The Diagnostics and Monitoring > System page in Connect Director shows the database replication
status in the Servers area. If a distributed database (DDB) is present, a small disk icon under the DB
heading on the server line indicates the server has a database instance. Green and red color coding
shows replication status.
Click the name of the server to see status for more services in addition to the database on the server
and to start or stop individual services.
Tip
The database section in the Diagnostics and Monitoring > Servers page shows the master status,
which includes the master log file name and master log position. Use this page to compare this
information with the slave database information on the DVS maintenance page to determine how far
out of sync the remote database instance and headquarters system might be. If connectivity to the
headquarters server is long-term, you can manually synchronize the systems. The synchronization
point is the last snapshot performed on the master database. Clicking the Snapshot button at the
bottom of the Database area triggers an instant snapshot of the database that is used for
synchronization or installation purposes.
Moving components from Windows DVS to Linux DVS is accomplished by updating existing
Shoreware Director fields and completing a process which automatically moves these components to
the new Linux server. Use the following procedures to complete this operation:
After completing the steps in each of these areas, you may delete the Windows DVS from the system.
Note
Moving users from a Windows DVS to a Linux DVS residing at different sites may require planning,
upgrading and/or installation procedures prior to performing the following steps. Refer to the Mitel
Connect Planning and Installation Guide “Upgrades” and “Server Requirements” chapters for planning
information.
Note
Attempting to delete the Windows DVS from the system prior to completing the previous tasks
displays an error and warning to complete these tasks first.
Complete the following procedure to move a Switch managed by a Windows DVS to a Linux DVS:
3. In Server to manage switch, select the name of the Linux DVS created in Adding a Linux DVS
Server on page 116.
5. Click the search field (magnifying glass) to display the fields under each parameter. In the Mailbox
Server field, enter the name of the remote server. Click the -> icon, or press Enter.
6. Select the appropriate user(s) or use the select-all checkbox in the upper left to select all users.
8. In the Mailbox server field, click the Linux DVS and click Save. Check the Results tab to verify if
the system operation is complete.
9. After moving the mailbox, phones must be moved to the same site as the Linux DVS, if the Linux
DVS is added in a different site other than Windows DVS.
3. Click the Voice Application tab > Default Auto Attendant menu.
5. Click Save.
2. In the upper window, click the Workgroup to move the workgroup server from Windows DVS to
Linux DVS.
Note
If Distributed Database (DDB) is enabled, the “Server” change is not required.
3. Change Mailbox Server to the name of the Linux DVS created in Adding a Linux DVS Server on
page 116.
5. Click Save.
1. Click Administration > Features > Call Control > Paging Groups.
2. In the upper window, click the Paging Groups to move the Paging Group server from Windows
DVS to Linux DVS.
3. Change Group Paging Server to the name of the Linux DVS created in Adding a Linux DVS
Server on page 116.
5. Click Save.
1. Click Administration > Features > Call Control > Route Points.
2. In the upper window, click Route Point to move the route point server from Windows DVS to Linux
DVS.
Note
If Distributed Database (DDB) is enabled, the “Server” change is not required.
3. Change Mailbox Server to the name of the Linux DVS created in Adding a Linux DVS Server on
page 116.
5. Click Save.
Note
After completing the procedures in Moving Components from Windows DVS to Linux DVS on page
123, all the users will be deleted from the Windows DVS and moved to the Linux DVS. Attempting to
delete the Windows DVS from the system prior to completing the procedures displays an error and
warning to complete these tasks first.
1. Click Administration > Appliances/Servers > Platform Equipment, then select the Windows
DVS and click Delete.
2. Click Ok to complete the operation. Any remaining tasks to complete popup as a warning. Return
to the location noted in the popup and complete the operation before re-attempting to delete the
Windows DVS.
QSIG is a Common Channel Signaling (CCS) protocol that runs over the ISDN D-channel for signaling
between nodes in a Private Integrated Services Network (PISN). QSIG supports call setup, call tear
down, and transparency of features such as message waiting, camp-on, and callback.
The current release of Mitel supports both ECMA and ISO versions of QSIG.
Configuring a QSIG Tie Trunk to integrate with the external system. Refer to Chapter 9,
Configuring Trunks on page 187 for details about configuring tie trunks.
2. Click Administration > Features > Voice Mail > menu. The External Voice Mail Servers (QSIG)
page appears.
3. Select a site and click its name to open External Voice Mail.
4. Type the Name of the integration and the Pilot Number for the voice mail. The pilot number is the
OSE number for voice mail login or redirection included in the PRI or BRI Off System Extension
range.
5. Configure a User Group that uses external QSIG voice mail by selecting External Voice Mail,
QSIG in the drop-down list for Voice Mail Interface Mode.
See the Mitel Connect Planning and Installation Guide for sample Use Cases for implementing Mitel
users with External Voice Mail QSIG.
5. Configure a Mailbox-Only account for the external user. The external user is now configured for
Mitel voice mail on the Mitel Connect system.
See the Mitel Connect Planning and Installation Guide for sample use cases for implementing legacy
users with Voice Mail QSIG.
Important Considerations
The following list includes important considerations to make when configuring application servers:
The diversion implementation on both sides is not limited to voice mail service. Diversion due to
call-forwarding, for example, is signaled by the same methods.
Some Mitel features, such as Find Me, can result in multiple trunks being used to host a call.
No QSIG channel usage is available for secondary calls. Refer to Mitel’s Norton Option 11C QSIG
application note for more details on configuring this feature.
The fax redirection extension is the first port allocated to the fax server. When multiple switch ports are
dedicated to the fax server, a fax call to the user phone is redirected to the first port connected to the
fax server. If the first port is busy with a call, the fax goes to the next port.
1. When the fax call is answered by the user’s primary phone, the switch immediately sends the
original user’s extension as DTMF.
2. The fax server detects the completion call when the loop current switches off.
3. When the fax call is complete, the fax server looks up the user extension in its configuration and
then routes the fax to the called user.
The fax can go to the user as an email attachment if the fax server is configured to support this
function.
For more information on fax server integration, refer to the Mitel Connect Planning and Installation
Guide.
This chapter provides a general overview of the Voice Switches and information on how to configure
them through Connect Director. A Voice Switch connects to the IP network over a 10/100/1000M
Ethernet port.
For more information about the features supported outside the U.S. and Canada, see Appendix A,
“International Planning and Installation” in the Mitel Connect Planning and Installation Guide.
Switch Types
The following types of voice switches are available:
The sections that follow briefly introduce each switch family. See the “Voice Switches” appendix in the
Mitel Connect Planning and Installation Guide for details about voice switches. This appendix includes
LED behavior, interface details, capacity, and front panel illustrations.
The switches can be stacked or mounted in a standard 19-inch rack. Rack mounting 1U Half-Width
Switches requires one of the rack mounting kits listed below. One or two switches are inserted side-by-
side into the Dual Tray, which is then mounted into the 19-inch rack.
Use the Rack Mount Dual Switch Tray to mount SG Voice Switches. Refer to the ShoreGear Dual
Tray: Wall Mount Kit Quick Install Guide for information about this kit.
Use the ST Voice Switch Wall Mount Bracket Kit to mount ST Voice Switches. Refer to the ST
Voice Switch Wall Mount Bracket Kit Quick Install Guide for information about this kit.
WARNING!
To prevent overheating and fire hazard, do not use the Rack Mount Dual Switch Tray to wall mount the
following devices: ST1D/ST2D, ST50A/ST100A, ST200/ST500, or ST100DA. Use the
ST Voice Switch Wall Mount Bracket to wall mount these devices.
1U Half-Width Voice Switch models include the following. Voice switch names followed by V denote
voice switches that support both voice mail and auto-attendant applications:
ST1D
ST2D
ST50A
ST100A
ST100DA
ST200
ST500
Voice Switch SG90V
Voice Switch SG90
Voice Switch SG50V
Voice Switch SG50
Voice Switch SG30
Voice Switch SG90BRIV
Voice Switch SG90BRI
Voice Switch SG30BRI
Voice Switch SG220T1
Voice Switch SG220T1A
Voice Switch SG220E1
Voice Switch SGT1k
Voice Switch SGE1k
Virtual Switches
With the proper license and VMware® software configuration, Mitel offers the capability to configure
the following types of virtual switches:
A Virtual Phone Switch (vPhone Switch) can support up to 5,000 IP phone SIP proxy ports,
depending on the configuration. In addition, virtual phone switches support the following features:
Up to 5000 IP Phone SIP Proxy Ports
Backup auto attendant
Make Me conferences — 6 per 100 users with a max of 60
Hunt groups capacity as follows:
Hunt groups — 4 per 100 users with a maximum capacity of 40
Total hunt group users — 16 per 100 users with a maximum capacity of 160
Total number of users per hunt group — 16 per 100 users with a maximum capacity of 16
Pick up groups
Bridged call appearance
Extension monitoring
SIP Proxies for third-party devices
A Virtual Trunk Switch (vTrunk Switch) can support the following features:
Up to 2000 SIP trunks with media proxy, depending on the configuration
Backup auto attendant
Transcoding between mismatched codecs
Trunk recording
Three party mesh conferencing
Refer to the Mitel Connect Planning and Installation Guide for details about virtual switch capacities.
Tip
SIP media proxies are always on and are not dynamic.
Switch Resources
Voice switches provide telephony, IP phone, and SIP phone resources to Mitel users. Each voice
switch offers a combination of resources that can be customized to support specific, individual
configurations.
This section describes the resources available on voice switches, including details about the features
available on the switch.
Analog Circuits
Voice switches support three analog circuits: Extensions, DID trunks, and Loop Start trunks.
Extensions: Extensions are telephony foreign exchange station (FXS) circuits that:
Transmit and receive voice signals
Supply power to phones
Provides loop current to analog phones for dial tone and ring signals
Indicate on-hook or off-hook state
Connect Director shows extensions as analog ports. They are assigned to user extensions.
DID Trunks: DID trunks support inbound Loop Reversal trunks that provide DID service from the
central office. DID trunks are assigned to trunk groups. Analog DID trunks are inbound only.
Loop Start Trunks: Loop start trunks are foreign exchange office (FXO) circuits that support
inbound and outbound calls. These trunks accept ring signals, go on-hook and off-hook, and
transmit and receive voice signals.
Digital Circuits
Mitel offers T1, E1, and BRI digital circuits that support Channel Associated Signaling (CAS) and
Integrated Service Digital Network (ISDN) signaling through various 1U Half-Width and 1U Full-Width
switches. Circuit channels are configured in Connect Director in the Administration > Appliances/
Servers > Platform Equipment > Switch page for the switch that is being configured.
IP Phone Ports
Voice switches and virtual switches support varying numbers of IP phones, as specified by the Switch
Edit page in Connect Director.
Switch processing resources that support Digital and Analog ports on most Voice Switches can be
reallocated to support five IP phone ports. For example, resources on a switch that supports 12 analog
ports can be reallocated to support 60 IP phone ports.
SIP Trunks
Voice Switches, virtual phones, and virtual switches support varying numbers of SIP trunks, as
specified in Connect Director in the Administration > Appliances/Servers > Platform Equipment >
Switch page.
Switch processing resources that support Digital and Analog ports on most Voice Switches can be
reallocated to SIP trunks. For example, the ST2D has 60 digital trunks, which can be replaced with 60
SIP Trunks.
SIP Proxies
Voice Switches, virtual phones, and virtual switches support varying numbers of SIP proxies, as
specified by the Connect Director Administration > Appliances/Servers > Platform Equipment >
Switch page.
Switch processing resources that support Digital and Analog ports on most switches can be
reallocated to support 100 SIP proxies. For example, resources on a switch that supports 14 analog
ports can be reallocated to support 1400 SIP proxies.
When SIP proxies are configured on SG switches, the switches do not use the Make Me conference
ports for three-party conferences.
Built-In Capacities for IP Phone Ports, SIP Trunks, and SIP Proxies
Many switches provide processor resources that support IP phones without disabling telephony ports.
Built-in capacity can be configured to allocate resources for IP phones, SIP Trunks, or SIP Proxy ports.
Resources allocated to support IP phones cannot support SIP trunks or SIP proxies.
For SIP proxies, you can use built-in capacity to configure SIP Proxy ports in increments of 20.
Configuration Parameters
Before configuring your switches in Connect Director, you must determine the IP and MAC address
assignments for each voice switch. Refer to the Mitel Connect Planning and Installation Guide for more
information about getting an IP address for each voice switch.
The items that you need before you begin configuring your switches are:
For 1U Full-Width and Half-Width voice switch models, the model of the switch and the Ethernet
address (MAC address) of the switch are printed on the rear panel of each voice switch.
Make Me conference is used when a third-party SIP endpoint or Mobility is involved in a conference
call with three or more participants (the maximum is eight participants). All the Make Me conference
settings are valid in this situation. Although only three parties are involved in a conference call
involving a SIP endpoint or Mobility, four Make Me conference ports are reserved as this is an enforced
rule for all Make Me calls. For information about the conference involving a SIP trunk, refer to
Conferencing and SIP Trunks on page 533.
Make Me conference is also used when four or more IP400-Series phones are involved in a
conference call.
If you do not reserve sufficient ports for IP phones on the voice switches, the Mitel Connect system
does not recognize some or possibly all IP phones. For more information about Mitel Connect system
requirements, see the Mitel Connect Planning and Installation Guide.
Backup Operator
Voice Switches feature a backup operator in case the site operator is unreachable due to a network
outage. For most switches, the backup operator is on the same port as the Power Fail Transfer port. To
use this feature, select the port to match the switch model:
For descriptions of the columns on the Platform Equipment page list pane, refer to Table 41.
The country in which the site is located impacts the selections available in Hardware type. For
example, if your site is located in the UK, BRI switches will be available in the Hardware type drop
down, but if your site is located in the US, BRI switches are not available in the Hardware type
drop down.
4. Complete step 3 in Configuring Primary Voice Switches and Service Appliances on page 143.
3. In the Platform Equipment section, select the switch you want to configure.
The Platform Equipment section provides voice switch information as described in Table 42. Some
of the voice switch information is configurable on the General tab, as described in Table 43.
Table 42: Platform Equipment Page: Voice Switch/Service Appliance Parameters (Switches Page)
Parameter Definition
Name Name of the switch or Service Appliance.
Description Describes the appliance. This field is an optional entry that
typically tells where the appliance is located or describes
how it is used. For example, the appliance description might
indicate the wiring closet where the appliance is located.
Sites Name of the site where the appliance is located.
Server Name of server configured to manage the appliance.
Database Server Name of the database server the device uses for backup.
This field applies only to virtual switches.
IP Address IP address of the appliance.
Secondary IP Address Secondary IP address for the appliance. This field is
typically used only by the Headquarters server.
MAC Address MAC address of the appliance.
Device Page
To view the device page, navigate to Administration > Appliances/Servers > Platform Equipment
and select a switch. The device page allows you to configure the identification and operating
parameters of switches installed in the Mitel network. Connect Director provides a specific page for
each available switch that lists only the relevant parameters for that switch.
The device page typically consists of the General, Switch, and Voice Application (applicable to voice
mail switches only), which allow you to configure the information described in the following tables:
Table 43: Platform Equipment Page: General Tab Parameters (Switches Page)
Parameter Definition
Name Name of the voice switch.
Description A short description of the switch. This optional entry typically
describes where the switch is located or how it is used. For
example, the switch description might indicate the wiring closet
where the switch is located.
Table 43: Platform Equipment Page: General Tab Parameters (Switches Page)(Continued)
Parameter Definition
Site Site where the switch resides. This is a read-only parameter. If you
want to move the switch to another site, you must move all the
associated users and trunks, delete the switch from the current site,
and add the switch to the new site.
IP Address IP address of the switch.
Table 43: Platform Equipment Page: General Tab Parameters (Switches Page)(Continued)
Parameter Definition
Use database on server Allows you to select the server that hosts the database you want to
use for the switch.
Enable daily backup When selected, allows you to specify a server to use for backup.
Directory — path to the file on the FTP server to which you want
to back the switch files up.
Table 44: Platform Equipment Page: Switch Tab Parameters (Switches Page)
Parameter Definition
Enable Jack Based Music on Enables the jack-based music-on-hold port. Select or clear this check box to
Hold enable or disable this feature. This parameter enables and disables jack-based
music on hold for all trunks, including SIP trunks, and cannot be applied to a
specific trunk type.
Jack Based Music On Hold Gain (-49 to 13): Specifies the gain (in dB).
Enable File Based Music on Enables the file-based music-on-hold port.
Hold
Note: This parameter is applicable only to voice mail switches.
Select or clear this check box to enable or disable this feature. This parameter
enables or disables file-based music on hold for all trunks, including SIP trunks,
and cannot be applied to a specific trunk type.
Each server can be a source of music on hold. If the Headquarters server has
music on hold enabled, by default its associated sites and servers inherit this
setting. To save bandwidth, music on hold can also be enabled on other
servers.
When a switch has file-based music on hold enabled, all sites associated with
that switch have music on hold enabled. For example, if a switch at the
Headquarters site has file-based music on hold enabled, this MOH source also
applies to all child sites and servers. If a switch at a remote site has music on
hold enabled, then any child sites associated with that switch can use that MOH
source.
Because the Headquarters server is the parent server, it cannot obtain its
music-on-hold source from a switch at a remote site. For example, if MOH is
enabled for a switch at a remote site but the Headquarters switch has MOH
disabled, then people calling into the remote site hear music when placed on
hold, but callers dialing into a switch at the Headquarters site do not hear music
when placed on hold.
Local Extension: This is the extension used by the music-on-hold server. This
extension is set manually when file-based MOH is enabled.
Maximum Concurrent Calls (1-9): This is the maximum number of calls that
can simultaneously access music on hold on this switch. This is a maximum
limit, not a guaranteed number. (The concurrent call limit for the 90V switch is
1-9; for the 50V switch, the limit is 1-5.)
Table 44: Platform Equipment Page: Switch Tab Parameters (Switches Page) (Continued)
Parameter Definition
Built-in IP Phone Capacity For a virtual phone (vPhone) switch, this is the number of IP phones that the
virtual switch supports. This information is for reference only in the
Administration > Appliances/Servers > Platform Equipment > Switch
page.
Built-in Make Me Conference For a virtual phone (vPhone) switch, this is the number of Make Me
Capacity conferences that the virtual switch supports. This information is for reference
only in the Administration > Appliances/Servers > Platform Equipment >
Switch page.
Built-in SIP Trunk Capacity For a virtual trunk (vTrunk) switch, the number of SIP trunks that the virtual
switch supports. This number is calculated based on the number of CPU cores
configured in the virtual machine, as follows:
For a small virtual trunk switch with a capacity of 100 SIP trunks, the virtual
machine has 4-7 CPU cores configured.
For a medium virtual trunk switch with a capacity of 200 SIP trunks, the virtual
machine has 8-15 CPU cores configured.
For a large virtual trunk switch with a capacity of 2000 SIP trunks, the virtual
machine has 16 or more CPU cores configured.
Configured max IP phone Indicates how many IP phones can be assigned to the switch.
capacity
Use Analog Extension Ports Configures all analog extensions as analog DID trunks. SG 1U Half-Width
as DID Trunks analog extension ports cannot be individually configured as DID trunks, but by
selecting this parameter, you can configure all analog extensions as analog
DID trunks. When this parameter is selected, analog ports on the switch cannot
be assigned to a user extension port.
Max SIP trunk capacity Allocates switch resources to support IP phones, SIP trunks, and SIP proxies
(G.711): 500/1000 with/without on the Mitel network. Resource availability varies for each model.
advanced features
To allocate IP phone and SIP trunk resources, enter the desired number of
resources in the data entry boxes.
For example, the SG-90 provides 30 resources. If 5 resources are allocated for
IP phones and 5 resources are allocated for SIP trunks, then 400 SIP proxy
resources are available: (30 - (5+5))*20.
T1 Signaling Parameters
The Voice Switches page for T1 switches configures T1 circuit Layer 3 and Layer 1 parameters. These
parameters are displayed for the SG T1, SG 220 T1, SG 220T1A, ST1D, and ST2D switches. For
descriptions of the T1 signaling parameters, see Table 45 on page 149.
CAS
ECMA QSIG Master
ECMA QSIG Slave
ISDN Network
ISDN User
ISO QSIG Master
ISO QSIG Slave
Central Office Type Specifies the central office type. From the drop-down list,
select one of the following central office types:
4ESS
5ESS
DMS-100
NI-2 (National ISDN-2)
Call by Call Service Specifies whether a user can access different services,
(4ESS only) such as an 800 line or WATS line, on a per-call basis. This
parameter is available only when Central Office Type is set
to 4ESS.
Enable Outbound Calling Name Sends the caller name with the caller ID for outbound calls.
The default is disabled.
Layer 1 – Physical Layer Parameters
Clock Source Configures the clock source for the switch. From the drop-
down list, select either Master or Slave. Typically the switch
is slave to the central office. The default is Slave.
Framing Format Configures the framing format for the T1 switch. From the
drop-down list, select either ESF or D4, depending on the
type of T1 service you receive. The default is ESF.
E1 Signaling Parameters
The E1 Signaling parameters are displayed for the SG E1 and SG 220E1 switches. Table 46 describes
the E1 signaling parameters.
ISDN User
ISDN Network
ISO QSIG Master
ISO QSIG Slave
ECMA QSIG Master
ECMA QSIG Slave
Central Office Type Specifies the central office type. The E1 supports a single
signaling type per country, which is typically Euro-
ISDN(TBR4). This parameter is active only if Protocol Type
is set to ISDN User or ISDN Network.
Enable Outbound Calling Name Sends the caller name with the caller ID for outbound calls.
The default is disabled.
Layer 1 – Physical Layer Parameters
Clock Source Configures the clock source for the switch. From the drop-
down list, select either Master or Slave. Typically the switch
is slave to the central office. The default is Slave.
Framing Format Specifies whether the framing format is enabled or
disabled. E1 switches support the CRC-4 framing format.
Table 47: Platform Equipment Page: BRI Signaling Parameters (Switches Page)
Parameter Definition
Analog Ports
Port Type Configures the port resources. From the drop-down, select one of the
following options:
Table 47: Platform Equipment Page: BRI Signaling Parameters (Switches Page) (Continued)
Parameter Definition
Protocol Type Specifies the signaling protocol.
Table 47: Platform Equipment Page: BRI Signaling Parameters (Switches Page) (Continued)
Parameter Definition
Jack Number Optional comment field that can contain the patch-panel jack number to
which the port connects.
Tx Gain (db) Specifies the gain added to received digital signals. The default is 0 dB.
Rx Gain (db) Specifies the gain added to transmitted digital signals. The default is 0
dB.
Fill Down Duplicates the contents of the first row of the data entry field in all other
rows. The channel number, in parenthesis, is appended to the contents
of the Description field.
One mechanism is the redistribution of IP phone service by the Headquarters server after a switch
fails. This mechanism involves resource planning and configuration. Though it does not involve
extra equipment, it does require enough available capacity on the remaining active voice switches.
The other mechanism involves an extra voice switch that is reserved as a spare switch.
IP phones can have immediate reassignment when the voice switch to which they are assigned does
not respond. For details about how legacy and 400-Series phones behave during failover, see Call
Continuation During Failover on page 239.
If resources are insufficient and a spare switch is available, the Headquarters server activates the
spare switch as a site resource and reassigns the remaining IP phones to it. The Headquarters server
records these failover transactions so an administrator can manually restore regular service after the
problem is corrected. If resources are still insufficient even after the Headquarters server activates a
spare switch, the affected IP phones remain unavailable to users until the problem is solved.
Failover for IP phones is transparent to the end user. A keep-alive function ensures that failover can
occur without users taking remedial actions on their phones and even during a phone call. If the user
tries to use the phone before failover takes place, the phone automatically queries the Headquarters
server for reassignment when the assigned switch does not respond. When implemented, the failover
transaction occurs within seconds. However, if resources are not available, failover cannot occur and
the user is unable to use the phone.
Upon a switch failure, the phones are reassigned in the order that they notify the Headquarters server
of the switch’s unavailability. If the resources are available, the network’s failover operation takes up to
about four minutes after initial detection of a voice switch failure.
The Mitel Connect system provides for two levels of switch failover to assure high availability of IP
phones. The first level involves setting aside capacity on site switches to handle failover situations.
This method is referred to as N+1. In N+1 applications, you deploy more switches (hence ports) than
your absolute need. The Mitel Connect system automatically implements load balancing when it
assigns IP phones to switches so that the load is always evenly distributed. An example of an N+1
application is the following:
A site has 99 users on 3 Voice Switch 50s. The configuration on each switch assigns 33 IP phones
and keeps 17 ports in reserve (33 + 17 = 50). If one of the switches fails, the Headquarters server
reassigns the 33 IP phones to the 2 functioning switches.
The second level of failover involves a spare switch that provides failover protection. Certain switch
models can serve as a spare, and the Mitel Connect system does not assign IP phones to these spare
switches during normal operation.
If a voice switch fails and the Headquarters server cannot reassign all of the IP phones to the
remaining switches at the site, the Headquarters server activates the spare switch at the affected site
and reassigns the remaining IP phones from the failed switch to the spare. Reassignment should be a
temporary state—until the problem that triggered that failover is solved.
The spare switch provides basic telephony functionality and cannot support such functions as hunt
groups, trunk access, Backup Auto-attendant, analog extensions, trunks, media proxy, Make Me
conference ports, and so on. However, Extension Assignment is supported.
Spare switch failover support is hierarchical. Spare switches provide failover support for IP phones
installed on the same site only. Moreover, spare switches provide failover support for IP phones at or
below the level where the switch is installed. This means that a switch installed on a child site cannot
be used to provide failover for IP phones installed on the parent site or any site connecting through the
parent site. It can be used to provide failover for child sites below it in the hierarchy. Indeed, when
necessary, the system searches the entire, relevant hierarchy until it finds an available spare switch it
can use for failover. You can also install spare switches on the Headquarters server sites to provide
universally accessible failover for all sites on the system.
Voice Switches that Can Serve as Spare Switches on page 155 describes how to configure spare
switches.
Note
Voicemail switches (such as the 90V and the 50V) cannot serve as spare switches.
Spare switches cannot change languages while they are carrying traffic. Language incompatibilities
are indicated by a Firmware upgrade available message when the switch is configured for a site
with a different language.
3. Click New.
5. Select the switch type to add as a spare by selecting a switch model in the Hardware type drop-
down list.
6. In the Name field, enter the name to identify this switch in the system.
8. In the IP Address field, enter the IP address assigned to the switch. If the switch is located on the
same network segment as the Headquarters server, you can use the Find Switches function to
locate the IP address.
9. In the MAC address field, enter the Ethernet address for the switch.
10. In the Server to manage switch field, select the server that you want to manage the switch.
Note
We recommend that you do not select a server that has Music On Hold enabled to manage the
spare switch. Doing so could mean sending MOH across the WAN, which Mitel does not
support.
We recommend that you do not select a switch with CESID configured. The spare switch can
be temporarily deployed in a remote location.
Note
Current Site is the site where the switch is currently being used to provide failover. If the switch is
not currently being used, this field is empty.
General Tab
Table 49 describes the parameters on the General tab of the Spare Switches page.
4. Click Save.
5. For ShoreTel 100-Series, 200-Series, 500-Series, and 600-Series IP phones, reboot the phones to
apply the new setting for the parameter.
3. Select the Temporarily Disable IP Phone Failover Across Sites check box. When this feature is
enabled, spare switches do not fail over throughout the system.
Note
Be sure to reverse this process to enable IP phone failover when the maintenance task is finished.
Manual failbacks are performed on the Maintenance – Switches Summary page by accessing the
drop-down list for the desired switch and selecting Fail Back.
Restoration
The spare switch is designed as a temporary measure to ensure that IP phone users have basic
phone connectivity if their primary switch fails. To ensure that users have their full connectivity, you
must repair or replace the failed primary switch as soon as possible. This section describes the
following aspects of restoring normal operation after a failover occurs:
Requirements
Obtain a replacement switch that has the same capabilities as the failed switch.
Physically install the replacement switch on the same network as the old switch.
Assign the new switch an IP address. Refer to the Mitel Connect Planning and Installation Guide
for more information about IP address assignment.
Unplug the port connections (telephones, trunks) from the existing voice switch and plug them into
the new voice switch.
In the IP address field, enter the IP address (or Ethernet address) of the new switch that is
replacing the inoperative switch.
Click Find Switches, and then select the new voice switch.
5. Click Save.
Note
You can use Diagnostics & Monitoring to confirm that the new voice switch is on-line.
3. In the Move to Site field, select the site where the failover has occurred and you want to perform
restoration.
4. In the and switch field, select the switch you want to move the phone to.
Note
You can select multiple phones to move at one time. The phones do not have to be registered to
the same switch.
5. Click Move.
Note
Calls that are currently in progress are dropped during the move to the target switch.
3. Select the site where the failover occurred and to which the spare switch is currently assigned.
Note
Make sure that there are zero (0) IP phones connected to the switch. (The listing in the IP Phones
column should be 0/N, where 0 is the number of phones currently registered with the switch and N
is the switch capacity.)
The process takes a few minutes to complete and includes rebooting the spare switch. When the
process is complete and successful, the spare switch returns to the spare state.
To verify that the switch has returned to the spare state, do the following:
Note
If a switch does not support T.38, the Mitel Connect system can translate T.38 for that switch. If a
switch does not support T.38 or is configured not to use T.38, it can use pass-through (voice band
data) to transport faxes.
Figure 6 shows how T.38 supports fax transmission between two sites.
Usage
The fax capability is enabled by default on the half-width switches. Only the UDPTL format (UDP
packet for transporting faxes) is supported. Fixed redundancy is available on all calls.
Mitel implements T.38 through a gateway on the switches. Parameters for the T.38 UDPTL packets
(those UDP packets used to transport fax) are negotiated through the session description protocol
(SDP). The negotiation follows the offer/answer exchange model for SIP between Voice Switches SIP
trunks and a SIP-based, third party device, such as an IP fax extension.
Between voice switches, the system uses ShoreSIP. The system uses SIP only if SIP-based, third-
party, end points or SIP trunks are encountered about the fax codec list—the built-in fax codec list
(high bandwidth and low bandwidth) are enough. Mitel considers the fax codec list to be adequate and,
therefore, customers should not need to add to it.
Note
To connect a T.38 fax server to a Mitel Connect system, one of the following two requirements must be
met:
The T.38 fax server must be able to fall back to G.711 clear channel.
If the fax server is T.38 only, all the switches within the system must be upgraded to one of the
supported voice switches, otherwise, fax calls from those switches always fail. For a list of voice
switches, see the “Voice Switches” appendix in the Mitel Connect Planning and Installation Guide.
Note
Make sure that fax machines or modems are connected only to extensions with one of the following
labels:
Fax machine
Fax server
Non-T.38 fax server
Non-T.38 data terminal
An extension that is labeled as a fax server can also be used as a site-specific fax redirect destination.
Be sure that extensions designated as fax extensions are not fowarded to other phones or trunks that
use the Anyphone feature, otherwise fax operation is impacted.
Important Considerations
T.38 support is subject to the following considerations:
The following Voice Switches do not support T.38. For these and older switches, G711/L16 clear
channel is used for fax purposes.
SG40 or SG40/8
SG60 or SG60/12
SG120
SG220T1
SG220E1
SG24A
ST200
ST500
The fax machine/fax server behind the Mitel PBX should disable the V.34 feature to keep the fax
from using G711/Linear clear channel for better performance.
Mitel supports only T.38 in UDPTL form. T.38 calls in RTP or TCP form are not supported.
Mitel does not support either IP media or RFC2833-based fax tone detection (in RFC2833, Mitel
only supports DTMF but no named telephony events), therefore Mitel cannot detect a fax tone
coming from an SIP end-point. The exception is a SIP connection that is established with a
physical port on a switch. In this case, the switch can detect a fax tone from the SIP endpoint and
either switch to fax mode or redirect the call.
Mitel depends on fax CNG tone detection or T.38 invite to redirect an incoming fax call. If the fax
connection is established with one SIP based endpoint (such as SIP extension or SIP trunk), Mitel
depends on SIP invite to either establish a fax connection or redirect the call to a pre-configured
fax device.
Mitel supports modem speeds up to 9600 at V.29. Mitel does not support V.17 or V.34.
T.38 is the first codec in the list of codec members for “Fax Codecs - Low Bandwidth” and “Fax Codecs
- High Bandwidth” in Connect Director.
“Fax Codecs - High Bandwidth” is the default codec list selected when a site is created.
For more information on the default codec lists available from Mitel, see Enabling Intersite Video on
page 358.
2. Click Administration > Features > Call Control > Codec Lists.
3. In the Description column, select the fax codec profile for which you want to enable T.38 support or
click New to create a new codec profile.
4. Make sure that T.38 appears in the Selected field in the position that reflects your preference for
the order the switch should use for fax calls.
5. Click Save.
7. Select the site on which you want to enable the T.38 codec.
8. In the Fax and modem Calls field, select a fax profile in which the T.38 codec is enabled.
9. Click Save.
ST10238: How to configure GFI Software/Brooktrout SR140 with the Mitel System
For more information about configuring additional Mitel-supported, third-party solutions, contact the
Mitel Innovation Network Partner Program at the following URL:
http://www.shoretel.com/partners/technology/certified_partners.html
This chapter describes the voicemail switches that support voicemail services. In addition to the
regular voice switching functionality, these voice switches have a subset of the server functionality that
Mitel provides. The chapter contents are as follows:
Overview
The voicemail-enabled switches are specially-equipped voice switches that provide voicemail services
and access to auto attendant menus for telephones that the switch is hosting. These voicemail-
enabled switches store voicemail on Compact Flash (CF) cards. They provide local access to
voicemail.
The Auto Attendant menus, greetings, and prompts reside in permanent flash memory. For routine
protection of voice mail, backup and restore tasks are configurable through Connect Director. If a
switch becomes disabled, the information on the CF card can migrate to another switch of the type.
V Model Switches differ from other Voice Switches in the following ways:
V Model switches have a slot on the side of the chassis for accessing the CF card.
V Model switches provide Voicemail and auto attendant services normally provided by the Main
Server or a Distributed Server.
Functional Description
This section outlines the capacities and capabilities of the voicemail-enabled switches. These voice
switches are similar to other 1-U Half Width Voice Switches, but they also have permanent flash and
Compact Flash memory to provide a subset of the sever functions of voicemail, automated scripts, and
other services.
A voicemail-enabled switch utilizes only the codecs that reside on that switch. As with other 1-U, half-
width switches, the switch’s codecs cannot serve as a G.729 proxy.
A voicemail-enabled switch utilizes only the codecs that reside on the switch. As with other 1-U half
width switches, the on-board codecs cannot serve as a G.729 proxy.
Note
A voicemail-enabled switch has two analog ports on the faceplate. The upper port accepts line input
from a radio or CD player; the lower port can drive an amplifier of a paging system.
Server Functions
A voicemail-enabled switch supports a subset of the server functions that a Headquarters or
Distributed Voice Server provides. The sub-sections that follow describe the server features of the
voicemail-enabled switches.
Voicemail Capacity
A voicemail-enabled switch provides voicemail services to local users under normal conditions. If
resource utilization reaches its limit, a DVS can provide services to the users.
Switch functions and Server routines run under Linux. The voicemail-enabled switches use Qmail
instead of SMTP.
The total time for voicemail recordings depends on the capacity of the CF card. A 1-GB CF card can
hold up to 1500 minutes of audio. Therefore, each user on a Voice Switch 90V can have about 15
minutes of voicemail.
When a user requests voicemail through an IP phone, a voicemail-enabled switch provides the
messages directly to the IP Phone. In contrast, when a user requests voicemail through the computer,
the voicemail-enabled switch first sends the message to a Headquarters or DVS. The server sends the
message to Connect client on the user’s computer.
When the CF card is full, callers cannot leave a voice message and instead hear a recorded message
that the mailbox is full.
Auto-Attendant Menus
Each voicemail-enabled switch receives a copy of the system’s auto-attendant menus.
Voicemail Prompts
All non-English voicemail prompts reside on the Headquarters Server and simultaneously on all
Distributed Servers. A voicemail-enabled switch can keep a subset of the prompts. It can hold prompts
in the local, default language and three other languages.
Connectivity Requirements
Voicemail and Auto-attendant availability requires connectivity to the boot-time server so the switch
can read the configuration database on the Headquarters server. Voicemail and the Auto-attendant on
a voicemail-enabled switch are not active until it connects to the Headquarters server. The voicemail-
enabled switches do not require a restart to enable voicemail support and Auto-attendant if the initial
connectivity was established after the initial boot.
Voicemail and auto attendant services require that the switch has connectivity with a Network Time
Protocol (NTP) server.
System backup requires FTP server connectivity. When backing up data, it goes to the Main Server or
to any computer with FTP server capabilities that supports RFC 959, the MDTM command, and the
SIZE command.
Although a DVS can manage a voicemail-enabled switch, the switch applications still need access to
the database on the Headquarters server. Examples of the applications that run on a voicemail-
enabled switch are voicemail and the Telephone Management System (TMS).
Personal Connect client connects only to the Main Server or a Distributed Server, even for users
whose host port is on a voicemail-enabled switch.
Adding a new voicemail model switch to a Mitel server, described in Adding and Configuring a
Voicemail-Enabled Switch on page 170
Specifying Linux root and administrator passwords, described in Specifying Root and
Administrator Passwords for CLIs on page 177
Specifying maximum size and age of log files stored on the CF card, described in Modifying the
Log File Size and Age on page 185
Configuring automatic backup of voice mail , described in Configuring Automatic Backup for a
Switch on page 178
Monitoring memory usage on the CF card, described in Monitoring Memory Usage for a Voicemail
Model Switch on page 185
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. Click New.
The General tab in the details pane displays parameters for the new switch.
4. In the Site list, select the site where you want to add the switch.
5. In the Hardware type list, select the model of the switch to add to the site.
6. Review the parameters on all of the tabs in the details pane, and specify values as appropriate.
For more information about all of the voicemail-enabled switch parameters on the various tabs of
the details pane, see Voicemail Model Switch Parameters.
Refer to Configuring Voice Switches on page 131 for instructions on configuring a Voice Switch.
The switch configuration window for Voice Model Switches contains voice mail and back-up options in
addition to voice switch options available for other switches. Refer to Configuring Voice Mail on page
175 for instructions on configuring voice in mail. Refer to Configuring Automatic Backup for a Switch
on page 178 for instructions on configuring system back-up.
General Tab
General information about a voicemail model switch is provided on the General tab on the Platform
Equipment page.
Table 51: Platform Equipment Page: General Tab (Voicemail Model Switch)
Parameter Definition
Name Specifies the name of the voicemail model switch.
Description Specifies a short description of the switch. This optional entry
typically describes where the switch is located or how it is used. For
example, the switch description might indicate the wiring closet
where the switch is located.
Site Specifies the site where the switch is located. This is a read-only
parameter. If you want to move the switch to another site, you must
move all the associated users and trunks, delete the switch from the
current site, and add the switch to the new site.
IP address Specifies the IP address of the switch.
If the DHCP server is running, click Find switches and use the
resulting dialog box to select an IP address. This also adds the
switch’s MAC address in the MAC Address field. If the DHCP
server is not running, you must manually enter the switch’s IP
address and MAC address.
MAC address Specifies the MAC address of the switch. The MAC address is
printed on the back panel of the switch.
Table 51: Platform Equipment Page: General Tab (Voicemail Model Switch)(Continued)
Parameter Definition
Use database on server Specifies the server that hosts the database you want to use for the
switch.
Enable daily backup Select this check box to enable daily backup of voice mail and auto-
attendant data. See Configuring Automatic Backup for a Switch on
page 178 for more information about this feature.
Start time Specifies the start time of the daily backup. The default start time is
2:00 AM.
IP address Specifies the IP address of the FTP server to save the switch
backup to.
FTP port Specifies the port number that the switch uses to communicate with
the recipient FTP server. The default port number is 21.
Directory Specifies the path to the file on the FTP server to which you want to
back the switch up to.
Username Specifies the user name that the switch uses to access the FTP
server for backup.
Password Specifies the password that the switch uses to access the FTP
server for backup.
Voice mail and auto-attendant information for a voicemail model switch is provided on the Voice
Application tab on the Platform Equipment page.
Table 52: Platform Equipment Page: Voice Application Tab (Voicemail Model Switch)
Parameter Definition
Account code local extension Specifies the extension on the headquarters SoftSwitch
associated with the account codes application. When
account code collection is optional or forced, calls are
routed to this extension for an account code prompt.
Table 52: Platform Equipment Page: Voice Application Tab (Voicemail Model
Switch)(Continued)
Parameter Definition
Default auto-attendant menu Each server can have a different default auto-attendant
menu. This is the menu reached when none is specified -
for instance, when a caller dials 9 to escape from voice mail
and return to the auto-attendant.
User group Specifies the assigned user group for the server. Because
voice mail places outbound calls, the server must have
assigned permissions.
Maximum trunks for voice mail Specifies the maximum number of trunks that can be used
notification in the event of a voice mail notification. If many escalation
profiles have been configured, it may be desirable to set
this to a relatively low number to prevent notifications from
overwhelming the system and making it impossible for
users to make an outbound call.
Switch Tab
Switch information for a voicemail model switch is provided on the Switch tab on the Platform
Equipment page.
Table 53: Platform Equipment Page: Switch Tab (Voicemail Model Switch)
Parameter Definition
Enable jack-based music on Enables/disables jack-based music on hold.
hold
Jack-based music on hold Specifies the gain setting for jack-based music on hold.
gain
Music on Hold
Enable file based music on Select this check box to enable file-based music on hold for the
hold switch.
Local extension Specifies the local music on hold extension.
Maximum concurrent calls Specifies the maximum number of concurrent calls to allow for
MOH. This is a maximum limit, not a guaranteed number.
Use analog extension port as Select this check box to configure all analog extensions as analog
DID trunks DID trunks.
Table 53: Platform Equipment Page: Switch Tab (Voicemail Model Switch)(Continued)
Parameter Definition
Built-in capacity Allocates switch resources to support IP phones, SIP trunks, and
SIP proxies on the Mitel network. Resource availability varies for
each switch model.
Replacing a Switch
When replacing a voicemail-enabled switch, the CF card retains the voicemail contents. The card can
go into the replacement switch if the switch is the same model as the original.
To replace a voicemail-enabled switch and retain the voicemail on the original switch:
2. Remove the plate covering the memory slot on the left side of the original switch.
4. Remove the plate covering the memory slot on the left side of the replacement switch.
5. Insert the CF card into the memory slot and replace the memory slot cover.
8. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
The General tab in the details pane displays parameters for the selected switch.
10. In the MAC address field, type the MAC address of the new switch and click Save.
11. Boot the V-switch and configure the normal settings (IP/NTP/Server/etc).
12. Log into the Linux shell of the V-switch and execute the following commands.
cd /cf/shorelinedata
rm -f MACADDRESS.txt
Upgrading a Switch
Upgrading a voicemail-enabled switch uploads new switch firmware and server software to the device.
Switch upgrades are necessary to maintain compatibility with the remainder of the system when the
Mitel Connect system is upgraded. Refer to the Mitel Connect Maintenance Guide for complete
information about upgrading a switch.
Note
A regular voice switch cannot be converted to a voicemail-enabled switch.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. Click the name of the switch to configure voice mail for in the list pane.
The General tab in the details pane displays parameters for the selected switch.
5. In the Account code local extension field, type an available extension number.
6. In the Voice mail extension field, type the extension the system uses for forwarding calls to
voicemail.
7. In the Voice mail login extension field, type the extension used to log in to the voice mail server.
8. In the Auto-attendant menu list, select the extension used by the auto-attendant server.
9. In the User group list, select the assigned user group for the server.
10. In the Maximum trunks for voice mail notification field, type the maximum number of trunks
that can be used in the event of a voice mail notification.
Note
If an MOH file is defined for DNIS, it is played first. If an MOH file is not defined for DNIS, the MOH file
defined for the User Group is played. If an MOH file is not defined for the User Group, the MOH file
defined for the system-wide default is played. If an MOH file is not defined for DNIS, the User Group,
or the system-wide default, the audio input jack is used.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
The General tab in the details pane displays parameters for the selected server.
7. (Optional) In the Maximum concurrent calls field, type the maximum number of concurrent calls
to allow for MOH. This is a maximum limit, not a guaranteed number.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
The General tab in the details pane displays parameters for the selected switch.
5. Under Music on Hold, select the Enable file based music on hold check box.
7. (Optional) In the Maximum concurrent calls field, type the maximum number of concurrent calls
to allow for MOH. This is a maximum limit, not a guaranteed number.
Admin: This account is for configuring tasks that require CLI access.
Root: The user with a root account has access to all internal Linux commands.
WARNING!
Mitel recommends using the Root command only under direct supervision of Mitel personnel. The root
admin does not restrict command scenarios that can render the switch unusable.
You can use Connect Director to change the passwords for logging into these accounts.
Note
Passwords for accessing CLIs must have a minimum of 4 ASCII characters and a maximum of 26
ASCII characters.
!#$%&'()*+,-.0123456789:;=@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_/
`abcdefghijklmnopqrstuvwxyz{|}~
? “ <>
2. In the navigation pane, click Administration > System > Additional Parameters.
3. Under ShoreTel Appliance, in the first “admin” password field, type the new password for the
admin account.
4. In the second “admin” password field, retype the password that you entered into the first field.
5. In the first “root” password field, type the new password for the root account.
6. In the second “root” password field, retype the password that you entered into the first field.
7. Click Save.
Stores voice mail, auto-attendant custom and default prompts, workgroup name and greeting
prompts (if the workgroup voice mailbox is on the VMB), and switch log files to an FTP server.
After completion of the daily file-system cleanup tasks, the switch begins automatic backup. A time
stamp is appended to the name of files copied to the target server.
Provides a source for the most recent day’s voice mail and other data in the event of a system
failure. It is not intended to be an archive of voice messages or a source for retrieving deleted
voice mail.
Note
A voicemail-enabled switch relies on the ftpsync facility to synchronize its local (or source) directory
to the back-up server (or target) directory. Therefore, the server must support ftpsync as described in
RFC 959. The server must also support the MDTM and SIZE commands. FTP servers in Windows
Server 2008 and 2012 R2 meet these requirements.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. Click the name of the V model switch to configure in the list pane.
The General tab in the details pane displays parameters for the selected switch.
5. Under Enable daily backup, in the Start time field, type the time of day to start the daily backup.
6. In the IP address field, type the IP address of the FTP server to save the backup files to.
7. In the FTP port field, type the port number that the switch uses to communicate with the recipient
FTP server.
8. In the Directory field, type the name of the folder on the FTP server to which you want to back the
switch files up.
9. In the Username field, type the user name that the switch uses to access the backup files on the
FTP server.
10. In the first Password field, type the password that the switch uses to access the backup files on
the FTP server.
11. In the second Password field, retype the password that you entered into the first field.
This section describes an FTP server configuration, using a Windows server as the recipient. (Detailed
instructions on configuring Windows servers are available in the article How To Set Up Isolated FTP
Site at http://support.microsoft.com/kb/555018.) The section first lists the configuration
data entered into Connect Director. The subsequent list shows the information entered at the server,
including configuration data from the V model switch.
1. Using the Windows Computer Management dialog, add a new FTP site
2. For the new server, specify the IP address and port number.
4. In the FTP Site Creation Wizard, specify that the user is isolated. Figure 10 shows the correct
setting.
5. Type a name and description of the FTP server in the General page (Figure 11).
7. Verify the resultant path of the configured server, as shown in Figure 12.
Rebooting a voicemail-enabled switch also reboots the Linux kernel and everything that a kernel
reboot entails.
When a voice switch boots, it requires an IP address to connect to the network and an application
program. voice switches are set to use a DHCP server for an IP address and to retrieve the application
from the switch’s flash memory.
Mitel recommends using static IP parameters configured via the serial port, as this is much more
reliable. When using DHCP, Mitel recommends using DHCP reservations for each switch to ensure
that DHCP leases are not lost.
If a DHCP server is not available, you can set the IP address manually from the switch’s maintenance
port from STCLI.
If the switch fails to load the application from flash and does not have the IP address of the Mitel
server, you can set the IP address and boot parameters by connecting to the maintenance port and
using the configuration menu. The configuration menu allows you to set the IP address of the switch
and enter the Mitel server (boot host) IP address.
The voicemail-enabled switches begin server operations only after they receive an initial TOD input. If
the time is not available from a designated source at boot time, the V Model switch supports all switch
operations and will periodically poll for the time of day setting. After receiving the a time of day setting,
the V model switch begins server operations.
The NTP server can be specified through DHCP or as a static address. If no address is specified, the
V Model switch polls NTP servers at addresses specified by an internal configuration list. The internal
configuration list includes the Headquarters server and Internet based NTP servers.
If an IP address is listed that does not point at an NTP server, the V Model switch will not begin
server processes until the address is corrected.
If the IP address points at a server that is not available, the V Model switch periodically polls the IP
address for the NTP server. When the server becomes available, the V Model switch begins
performing server operations after it polls the server and receives the time of day setting.
After the server becomes available, rebooting the V model switch may be faster than waiting for it
to poll the NTP server.
Reboot Methods
Flash Boot
The standard method for booting a voice switch is to boot from the switch’s flash memory. When a
switch is first powered on, it reads the boot parameters stored on the non volatile memory, which
instructs the switch to load software from flash memory. When the software starts, it loads its
configuration, which is also stored in flash memory.
Default Button
The Default Button is the small “paperclip” button on the left side of the switch. Pressing this button
replaces the two configuration files with their default variants. The Compact Flash is not affected.
Pressing this button and holding for 10 seconds, in addition to replacing the configuration files,
removes all files from the Compact Flash.
FTP Boot
Booting from FTP is available when you cannot boot the switch from internal memory. When booting a
switch from FTP, the operating system and software are loaded from the FTP site identified in the boot
parameters. The loaded files define a default configuration.
Voicemail services on the switch are disabled after booting from FTP and are restarted only by booting
from Flash. After an FTP boot, the switch can perform telephony functions as those available through
other switches. V model switches started with an FTP boot can operate only as a voice switch
(controlling phones, trunks, and call routing).
FTP boot is typically used for troubleshooting and also supports maintenance tasks and the backup
and restore facilities.FTP boot supports certain maintenance functions, such as an emergency boot if
the flash becomes damaged.
Typical CF card capacities are 1 GB, 2 GB, and 4 GB. The proper planning of voice mail usage and
aging can help prevent excessive buildup of voice mail on the CF card. If the CF card becomes full, it
cannot accept new voice mail.
You can monitor disk space for voicemail model switches using either of the following methods, which
are both available from the Maintenance menu in Connect Director:
Display the status of voicemail model switches. For more information, see Monitoring Voice Mail
Status on page 628.
Display the status and other maintenance information for voice mail servers. For more information,
see Monitoring Voice Mail Servers on page 636.
In addition to monitoring memory usage through Diagnostics & Monitoring, you can create an event
filter to send you an email message if memory usage is high. For information about using event filters,
see Using Event Filters on page 638.
9. Configuring Trunks
This chapter describes how to configure trunks and trunk groups in Connect Director. The topics in this
chapter are:
Overview
Before beginning, you should understand the different trunk types and trunk features that the Mitel
Connect system supports.
A thorough description of the types of trunks and their associated features is included in the Mitel
Connect Planning and Installation Guide.
A detailed description of how the dialing plan, network call routing, and digit manipulation operate
is included in the Mitel Connect Planning and Installation Guide.
For more information about the features supported outside the U.S. and Canada, refer to the Mitel
Connect Planning and Installation Guide.
For an overview of the various trunk types and trunk features, refer to the Mitel Connect Planning and
Installation Guide.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > Trunk Groups.
The Trunk Groups page is displayed. For descriptions of the columns on the Trunk Groups page, see
Table 54.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > Trunk Groups.
To edit an existing trunk group, click the name of the trunk group in the list pane.
To create a copy of an existing trunk group, click Copy.
To create a new trunk group, click New.
The General tab in the details pane displays parameters for the new or existing trunk group.
4. Review the parameters on all of the tabs in the details pane, and specify values as appropriate.
For more information about all of the trunk group parameters on the various tabs of the details
pane, see Trunk Group Parameters.
5. Click Save.
General Tab
General information about new and existing trunk groups is provided on the General tab in the details
pane of the Trunk Groups page.
Table 56 describes the parameters on the General tab of the Trunk Groups page.
If the device does not support RFC 2833 and this check
box is not selected, DTMF negotiation will fail.
Note: This option applies to SIP, PRI, and BRI trunk groups
only. SIP profiles are available for SIP trunk groups; ISDN
profiles are available for PRI and BRI trunk groups.
Inbound Tab
All inbound calls are routed to a destination, such as an extension (user, workgroup, or route point) or
a specific menu.
Inbound calls first try to match set parameters in the following order:
1. DNIS
2. DID
3. Extension
4. Tandem Trunking
Notes
An individual trunk group cannot have overlapping DID and DNIS numbers (received digits).
Users, Menus, Workgroups, Route Points, Hunt Groups, and Bridged Call Appearances can have
only one DID number, but can have multiple DNIS entries.
Information about inbound settings for trunk groups is provided on the Inbound tab in the details pane
of the Trunk Groups page.
Table 56 describes the parameters on the Inbound tab of the Trunk Groups page.
Outbound Tab
Information about outbound settings for trunk groups is provided on the Outbound tab in the details
pane of the Trunk Groups page.
Table 57 describes the parameters on the Outbound tab of the Trunk Groups page.
Find Me
Some call handling modes
PSTN failover
Extension Assignment
Allow additional phones to ring simultaneously
Extension reassignment
For more informations about enabling original caller
information, see Enabling Original Caller Information on
page 218.
To support 911 in the U.S., at least one trunk group per site
must allow 911 calls. For a detailed description of 911
support, see Appendix A, Emergency Dialing Operations.
Note: This option is available only for PRI and SIP trunk
groups and is not available for all countries.
Enable Pulse Dialing Select this check box to enable pulse dialing.
Note: This option is available only for PRI and SIP trunk
groups.
Detect battery reversal Note: This option is not available in the United States,
Canada, or Hong Kong.
Trunk digit manipulation
Trunk Digit Manipulation controls how the trunk group manipulates the telephone number before
outputting the digits to the central office.
Note: All North American dial-plan numbers are converted into the1+10-digit format internally before
they are passed to the trunk group for digit manipulation.
Remove leading 1 from 1+10D Select this check box to drop the leading 1 from a dialed
number.
When you use a local prefix list, prefixes that are not in the
prefix list are considered long distance and require a long
distance trunk service.
The Enable Original Caller Information parameter is a starting point for other tasks that you must
perform to transmit the original caller ID. For descriptions of these tasks, see the following sections:
For details about forwarding the original caller ID, see the Forwarding Original Caller ID Outside a
Mitel Network on page 216.
For the class of service (COS) that a user must have to ensure that the forwarding of an outside
call is permitted, see the Specifying a Class of Service on page 371.
For information about enabling Send incoming caller ID for call forwarding features such as Find-
Me, External Assignment, and Allow Additional Phones, see Chapter 13, Configuring User
Features.
For information about responding to carriers who do not validate the caller ID in a SETUP
message for an original caller ID, see Configuring an ISDN Profile for RNIE on page 229. This
advanced (and rarely needed) task follows the tasks described in Forwarding Original Caller ID
Outside a Mitel Network on page 216.
WARNING!
In releases ST11, ST10.2, ST10.1, and ST10, the forwarding of the original caller ID to an outside
device relied on custom dial plan elements from Mitel TAC. If TAC implemented such a custom
dial plan, TAC must remove the elements related to this function before the current capability can
work. (This issue does not exist for customers whose new installation contains the present
implementation described in this book.) If a system with such a dial plan is upgraded, problem
behaviors related to call forwarding or original caller ID can occur. Some possible behaviors are:
Forwarded calls go to the user’s voice mail instead of out the trunk.
Forwarded calls are rejected by the carrier.
Upgraded customers who know or suspect that such a custom dial plan has been used should
contact TAC for help. However, some customers might not know that a custom dial plan has been
used for original caller ID. These customers should, therefore, monitor the call forwarding and
caller ID performance after an upgrade.
Configuring DID
Direct Inward Dialing (DID) is a feature offered by telephone companies for use with their customers'
PBX systems, where the telephone company allocates a range of numbers to a customer's PBX. As
calls are presented to the PBX, the number that the caller dialed is also given, allowing the PBX to
route the call to the intended party.
A DID range is a list of consecutive (non-overlapping) DID numbers assigned to a trunk group. Once a
DID range is assigned to a trunk group, any available number within that range can be assigned to a
user, workgroup, route point, auto-attendant, hunt group, or bridged call appearance from the
corresponding pages in Connect Director.
Available DID numbers are DID numbers within a range that are not assigned to a user or entity within
the context of that range. Note that DID number availability within a range does not consider
DNIS assignments. Although numbers assigned as a DNIS number are still enumerated as available
within a DID range, attempts to assign these DID numbers will be unsuccessful.
Note
DID is not applicable for Analog Loop Start or Digital Loop Start trunk groups.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > DID Ranges.
The DID Ranges page is displayed. For descriptions of the columns on the DID Ranges page, see
Table 58.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > Trunk Groups.
3. Click the name of the trunk group to enable DID for in the list pane.
The General tab in the details pane displays parameters for the selected trunk group.
6. Click Save.
Notes
Before you can configure a DID range for a trunk group, you must enable DID for the desired trunk
group. For information about enabling DID for a trunk group, see Enabling DID for a Trunk Group on
page 202.
DID is not applicable for Analog Loop Start or Digital Loop Start trunk groups.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > DID Ranges.
To edit an existing DID range, click the name of the corresponding trunk group in the list pane.
To create a copy of an existing DID range, click Copy.
To create a new DID range, click New.
The General tab in the details pane displays parameters for the new or existing DID range.
4. Review the parameters and specify values as appropriate. For descriptions of the DID range
parameters, see Table 59.
5. Click Save.
Notes
An individual trunk group cannot have overlapping DID and DNIS numbers (received digits).
Users, Menus, Workgroups, Route Points, Hunt Groups, and Bridged Call Appearances can have
only one DID number, but can have multiple DNIS entries.
To edit an existing item, click the name of the item in the list pane.
To create a copy of an existing trunk group, click Copy.
To create a new item, click New.
4. Next to DID Settings, click change settings to display the DID parameters.
6. In the DID Range list, select the trunk group to which the desired DID range is assigned.
7. In the DID number field, type the DID number (within the selected range) to assign to the user,
workgroup, route point, auto-attendant, hunt group, or bridged call appearance.
8. Click Save.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > DID Map.
The DID Map page is displayed. For descriptions of the columns on the DID Map page, see Table 60.
Configuring DNIS
Viewing DNIS Entries
1. Launch Connect Director.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > DNIS Map.
The DNIS Map page is displayed. For descriptions of the columns on the DNIS Map page, see
Table 58.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > Trunk Groups.
3. Click the name of the trunk group to enable DNIS for in the list pane.
The General tab in the details pane displays parameters for the selected trunk group.
6. Click Save.
Notes
DNIS is not applicable for Analog Loop Start or Digital Loop Start trunk groups.
An individual trunk group cannot have overlapping DID and DNIS numbers (received digits).
Users, Menus, Workgroups, Route Points, Hunt Groups, and Bridged Call Appearances can have
only one DID number, but can have multiple DNIS entries.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > DNIS Map.
The General tab in the details pane displays parameters for the new or existing DNIS.
4. Review the parameters and specify values as appropriate. For descriptions of the DNIS Map
parameters, see Table 62.
5. Click Save.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > Off-System
Extensions.
The Off-System Extensions page is displayed. For descriptions of the columns on the Off-System
Extensions page, see Table 63.
To edit an existing off-system extension, click the name of the trunk group in the list pane.
To create a new off-system extension, click New.
The General tab in the details pane displays parameters for the new or existing off-system
extension.
3. Review the parameters and specify values as appropriate. For descriptions of the Off-System
Extension parameters, see Table 64.
4. Click Save.
Any associated dial in prefix is prepended to each set of inbound digits. You can use DNIS, DID, or
Extension matching with a dial in prefix.
When using NI-2 signaling on PRI trunks—for example in a tie trunk scenario—the Caller ID name is
also captured, when available, on all inbound calls. For outbound calls, the Caller ID name is delivered
for calls that are made to off-system extensions, but not generally for all outbound calls.
Tandem calls are reported in the Trunk Activity Detail and Trunk Activity Summary reports, with
incoming and outgoing legs reported according to the report format. For more information about CDR
reports, see Appendix B, Call Detail Record Reports on page 757.
To edit an existing trunk group, click the name of the trunk group in the list pane.
To create a copy of an existing trunk group, click Copy.
To create a new trunk group, click New.
The General tab in the details pane displays parameters for the new or existing trunk group.
5. Under Network call routing, under Additional local area codes, click Add.
7. Click Save.
To edit an existing trunk group, click the name of the trunk group in the list pane.
To create a copy of an existing trunk group, click Copy.
To create a new trunk group, click New.
The General tab in the details pane displays parameters for the new or existing trunk group.
5. Under Network call routing, under Nearby area codes, click Add.
7. Click Save.
For information about importing and exporting local prefix lists, see Importing Local Prefixes on page
210 and Exporting Local Prefixes on page 211.
1. In the navigation pane, click Administration > System > Local Prefixes.
To edit an existing list of local prefixes, click the name of the list in the list pane.
To create a new list of local prefixes, click New.
The General tab in the details pane displays the local prefixes list.
1. Click Add.
4. Click Save.
2. In the navigation pane, click Administration > System > Local Prefixes.
3. Click New.
The General tab in the details pane displays parameters for the new local prefixes.
4. Click Import.
5. In the field, enter the path and name of the file to import or click Browse to search for the file.
6. Click Import.
7. Edit the list as needed. You can rename the list as well as add, edit, and remove prefixes.
8. Click Save.
The local prefix list is now available from the Local prefixes drop-down list on the Outbound tab in
the details pane of the Trunk Groups page.
2. In the navigation pane, click Administration > System > Local Prefixes.
3. Click the name of the local prefixes list you want to export in the list pane.
The General tab in the details pane displays the local prefixes list.
4. Click Export.
Note
Example: Assume the prepend dial-out prefix of an analog trunk group is “9,”. When a user dials
“914085551111”, the following pulse-digit sequence is transmitted on the trunk: “9<silence for two
seconds>14085551111”.
1. In the navigation pane, click Administration > Trunks > Trunk Groups > Trunk Groups.
To edit an existing trunk group, click the name of the trunk group in the list pane.
To create a copy of an existing trunk group, click Copy.
To create a new trunk group, click New.
The General tab in the details pane displays parameters for the new or existing trunk group.
5. In the Prepend dial out prefix field, type the dial out prefix, including a comma (,) for each pause.
6. Press Save.
Centrex transfer is supported only on analog loop-start trunks. If the call is not on an analog loop-start
trunk, the operation has no effect.
The trunk that transports the call must be configured on one of the following switches:
ST50A
ST100A
ST100DA
Voice Switch 40/8
Voice Switch 60/12
Voice Switch 120/24
Voice Switch 30
Voice Switch 50 and 50v
Voice Switch 90 and 90v
Voice Switch 220T1A (on analog loop-start trunk ports only)
This feature replaces a trunk-to-trunk transfer in which two trunks are tied up for the duration of the
call. The current call must be connected and be a two-party call.
Note
Centrex Flash configuration is required only on Analog Loop Start trunks.
You can program Centrex Flash on a custom button so that a Mitel user can transfer a call to another
number in the PSTN. The following sequence begins when the user presses that customized button:
4. Upon hearing the ring-back tone, the Mitel user completes the transfer by hanging up the handset.
For information about configuring a phone button for Centrex Flash, see Configuring Programmable IP
Phone Buttons on page 261.
Note
Because the user is directly connected to the central office, certain items disappear from
consideration, as follows:
Viewing Trunks
The Trunks page includes a list of existing individual trunks.
The Trunks page is displayed. For descriptions of the columns on the Trunks page, see Table 65.
To edit an existing trunk, click the name of the trunk in the list pane.
To create a copy of an existing trunk, click Copy.
To create a new trunk, click New.
The General tab in the details pane displays parameters for the new or existing trunk.
4. Review the parameters and specify values as appropriate. For descriptions of the trunk
parameters, see Trunk Parameters.
5. Click Save.
Trunk Parameters
The parameters available for a trunk depend on the type of trunk group the trunk belongs to.
PRI, BRI, Digital Loop Start, and Digital Wink Start Trunk Parameters on page 214
Analog Loop Start and Analog DID Trunk Parameters on page 215
SIP Trunk Parameters on page 215
PRI, BRI, Digital Loop Start, and Digital Wink Start Trunk Parameters
Table 66 describes the parameters for PRI, BRI, Digital Loop Start, and Digital Wink Start trunks on the
General tab of the Trunks page.
Table 66: Trunks Page: General Tab (PRI, BRI, Digital Loop Start, and Digital Wink Start)
Parameter Definition
Site In the drop-down list, select the trunk site.
Trunk group In the drop-down list, select the trunk group to assign the
trunk to.
Name Specifies the name of the individual trunk.
Switch channels In the drop-down list, select the channel to which the trunk
connects.
Jack # Specifies the patch-panel jack number that is associated
with the trunk’s switch port. This parameter is optional.
Table 67: Trunks Page: General Tab (Analog Loop Start and Analog DID)
Parameter Definition
Site In the drop-down list, select the trunk site.
Trunk group In the drop-down list, select the trunk group to assign the
trunk to.
Number Specifies the name of the individual trunk.
Switch port In the drop-down list, select the switch port to which the
trunk connects.
Jack # Specifies the patch-panel jack number that is associated
with the trunk’s switch port. This parameter is optional.
When a switch forwards a call out a trunk, the Q.931 SETUP message contains information about the
original caller. However, carriers are not all uniform in the way they validate caller IDs and the way
Caller ID is validated might not be clear to the Mitel customer. Mitel’s responses to these differences
are described in this section.
The following sections describe what happens when carriers do or do not validate the caller ID.
If a call enters a Mitel network and is then forwarded out an ISDN trunk to a remote device, the number
of the forwarded caller can be outside the DID range on record. If the caller ID is outside the DID
range, the carrier can check the content of the Redirecting Number Information Element (RNIE) to see
if the number that forwarded the call is within the DID range. The redirecting number belongs to the
Mitel user whose phone forwarded (redirected) the original call. Therefore, the contents of the RNIE
field will match the carrier’s records. The result is that the call is forwarded, and the far end device
displays the ID of the original caller.
Although most carriers that verify the RNIE send the original caller ID, some carriers automatically
forward the RNIE contents instead of the original caller ID. In this situation, the original caller ID does
not reach the outside terminating device.
Note
The Enable original caller information check box and the Billing telephone number (BTN) field are
available on the Trunk Groups page. When the Enable original caller information check box is
selected, the Billing telephone number (BTN) field becomes active and is automatically populated with
the CESID configured on the server.
A Q.931 SETUP message contains information elements for the caller ID and a redirecting number.
The carrier normally finds the caller ID to be within the DID range for the trunk. If the caller ID is outside
the range, the provider checks the RNIE field to determine whether the number that redirected the call
is within the DID range. If the Mitel user does not have a DID to serve as the caller ID, the Billing
telephone number field on the Trunk Groups page can provide the redirecting number. This field can
contain one of several types of phone numbers.
The preferred order of values to use in the Billing telephone number (BTN) field is as follows:
1. The first number in the trunk group’s DID range (this is the default).
2. The actual BTN of the Mitel customer (used by the carrier for billing purposes).
Note
In Release 11.1, the Billing telephone number field was added to the Trunk Groups editing window.
Some customers who upgrade might not know about this field. Regardless, the field is automatically
populated with the base number of the DID range when the original caller information function is
enabled.
In releases ST11, ST10.2, ST10.1, and ST10, the forwarding of the original caller ID to an outside
device relied on custom dial plan elements from Mitel TAC. If TAC implemented such a custom dial
plan, TAC must remove the elements related to this function before the current capability can work.
(This issue does not exist for customers whose new installation contains the present implementation
described in this book.)
If a system with such a dial plan is upgraded, problem behaviors related to call forwarding or original
caller ID can occur. Some possible behaviors are:
Forwarded calls go to the user’s voice mail instead of out the trunk.
Forwarded calls are rejected by the carrier.
Upgraded customers who know or suspect that such a custom dial plan has been used should contact
TAC for help. However, some customers might not know that a custom dial plan has been used for
original caller ID. These customers should, therefore, monitor the call forwarding and caller ID
performance after an upgrade.
To edit an existing trunk group, click the name of the trunk group in the list pane.
To create a copy of an existing trunk group, click Copy.
To create a new trunk group, click New.
The General tab in the details pane displays parameters for the new or existing trunk group.
5. Under the Trunk services, select the Enable original caller information check box.
The Billing telephone number (BTN) field is automatically populated with the base number of the
DID range (if a DID range has been configured).
7. Click Save.
Note
For a user to receive forwarded calls, the user must belong to a user group with a class of service
(COS) that supports the call forwarding features. Trunk-to-trunk transfer and external call
forwarding and find me destinations must be enabled for the COS enabled for the user. For more
information about configuring a COS, see Configuring a COS for Telephony Features Permissions
on page 372.
In the two-stage implementation process, a function-specific ISDN profile with one or more manually
typed parameters first is created and subsequently applied to a trunk group.
For WANs in which a carrier or service provider does not automatically add the caller ID (CID)
name, a CID name can be added to outbound calls. For a detailed description of this function, see
Configuring Caller ID Name on T1-PRI Trunks on page 220.
In Europe, up to 25 digits for a SETUP can be required for ISDN BRI and PRI. To provide these
digits, the switch normally passes 20 digits in the SETUP message but can add 5 digits when
necessary. For a description of this capability, see Configuring an ISDN Profile for SETUP
Message on page 224.
In Europe, an ISDN profile can direct the switch to support ISDN channel negotiation by the central
office (only for outbound calls from a switch in the current release). For a description of this
capability, see Configuring Euro-ISDN Channel Negotiation on page 225.
In Europe, an ISDN profile can be created that allows an outside caller to a Mitel user to see the
number of the Mitel user that answers the call. This feature is supported for carriers or service
providers configured with PRI or BRI. For a description of this capability, see BRI Signaling
Parameters on page 151.
To meet a requirement of compliance testing in Europe, an outbound call can carry the progress
indicator value 8. This ISDN profile for this function should be applied on a trunk only during a
period of compliance testing.
Prior to Release 11.2, Voice Switches did not send the user’s name to carriers or service providers.
Nevertheless, in the U.S., carriers and service providers could add the caller number and caller name
(if the call originated on a Voice Switch).
Note
Caller ID Name on T1-PRI is optional because most Mitel installations utilize the default state of Mitel’s
underlying CID mechanism. Therefore, only certain installations need the functionality of Caller ID
Name on T1-PRI. Mitel created this function specifically for non-U.S. customers whose carrier or
service provider needs the support of Caller ID Name on T1-PRI. Whether this function is really
needed can be determined through consultation with the carrier or service provider if the actual need
is unclear.
The following steps are required to configure CID name on T1-PRI trunks:
1. Understand CID name handling on the public network. See Understanding Caller ID Name on the
Public Network on page 221 for more information.
2. Enable outbound calling name on the T1 Voice Switch with the PRI trunk that is to send the CID
name. See Enabling Outbound Caller ID Name for T1-PRI on page 222 for more information.
3. Configure an ISDN profile for specifying the display method for CID name. See Configuring an
ISDN Profile for CID Name on page 223 for more information.
4. Associate the ISDN profile with the desired trunk group. See Associating an ISDN Profile with a
Trunk Group on page 231 for more information.
5. Enable CID name for the trunk group. See Enabling Caller ID Name for a Trunk Group on page
224 for more information.
Inbound
In North America, some carriers can provide a Caller ID (CID) name in addition to the CID number. In
the current release, voice switches support CID names on T1 PRI trunks. A carrier or service provider
can deliver the CID name using either a display message or facility message method. The method
depends on the protocol used, as follows:
For CID name for an inbound call, switches support both methods at the same time, so no special
configuration is required on a switch to accommodate the arrival of CID names.
Outbound
T1 voice switches can send a CID name for an outbound call using either a display message or a
facility message. In contrast to inbound calls with a CID name, all outbound calls are configured to use
either the display message or facility message method. The choice of method for outbound calls must
be specified in Connect Director. Even as T1 voice switches support only NI-2 protocol, it is possible to
create an ISDN profile for using NI-2 protocol and then specify either the display message or facility
message method for outbound CID name delivery. For more information about this ISDN profile, see
Configuring an ISDN Profile for CID Name on page 223.
The message method must match the method that the carrier or service provider expects. For
example, if a carrier uses NI-1, programming NI-2 with the display method might be possible, such that
the carrier accepts the outbound caller ID name from Mitel.
For the steps needed to select the message method and protocol, see Configuring an ISDN Profile for
CID Name on page 223. These steps apply only to outbound calls.
Outside the U.S.—as in Canada, for example—the carrier or service provider might insert the
geographic or metropolitan origin of the call as the CID name (“Coquitlam,” for example). However, to
send the actual user name of the caller, some carriers or service providers outside the U.S. require the
information provided by Caller ID Name on T1-PRI. Therefore, for customers in Canada and
elsewhere who want a CID name to accompany the call, this function enables a Voice Switch to
provide the CID name information.
Note
For privacy reasons, the actual name can be masked by inserting a generic label; see Enabling Caller
ID Name for a Trunk Group on page 224 for more information.
Note
Before enabling the Caller ID Name on T1-PRI function, the administrator should have prior
knowledge or else consult the customer’s carrier or service provider to determine how the carrier
delivers the CID name end-to-end and, therefore, whether the display method is required. (See also
Configuring an ISDN Profile for CID Name on page 223.) Furthermore, although the Voice Switch
sends the caller ID name when configured to do so, Mitel cannot guarantee the results at the far end.
Mitel cannot guarantee that carriers or service providers deliver caller ID names at the far end or that
they support overwriting of the user name with a user-specified word. Also, in some cases,
parameters on 3rd-party gateways might require modification before the caller ID name can be
delivered.
1. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
2. In the Name column, click the name of the T1 Voice Switch with the PRI trunk that is to send the
CID name.
The General tab in the details pane displays parameters for the switch.
6. Select the Enable outbound calling name check box. (This check box is just above the area
labeled Layer 1.)
In most deployments, the default ISDN system profile is already part of the configuration and the
default ISDN system profile has already been associated with the trunk group. The ISDN profile for
CID Name on T1-PRI specifies the method used for delivering a CID name to the carrier or service
provider.
CallerIDSendMethod – display
CallerIDSendMethod – displaypcc
CallerIDSendMethod – facility
CallerIDSendMethod – facilitypcc
As has been emphasized, the customer must know what the carrier or service provider expects for the
ISDN message method. However, even when the expected method is known, an administrator might
have to perform a simple experiment to determine which of the two possible categories of each
method is required. In all deployments, the facility method is enabled by default. However for some
WANs, a different method is required. To use one of these message methods, a new ISDN profile must
be created.
Note
The choice for using the “pcc” version of a method is not based on information that the carrier
provides. For example, if a customer has settled on the display method (CallerIDSendMethod =
display) in the ISDN profile and correctly applied the profile to the pertinent trunk group but the CID
name is not received at the far end, then an alternative ISDN profile (with CallerIDSendMethod =
displaypcc) must be applied to the trunk group.
Creating an ISDN Profile for Specifying the Display Method for CID Name
To meet the interoperability requirements for CID name as needed in some environments, the system
administrator creates an ISDN profile that specifies one of two display methods for sending CID
names. (If the need for the display method is uncertain, refer to Introduction to ISDN Profiles on page
219 and other conceptual descriptions of the CID name on T1-PRI function in this section.)
2. In the navigation pane, click Administration > Trunks > ISDN profiles.
The General tab in the details pane displays parameters for the ISDN profile.
4. In the Name field, type the name for the ISDN profile.
Note
The name of the default profile SystemISDNTrunk is reserved and cannot be used for new
profiles. The SystemISDNTrunk profile cannot be edited.
7. Click Save.
2. In the navigation pane, click Administration > Trunks > Trunk Groups.
3. In the Name column, click the name of the trunk group for which to enable CID name.
The General tab in the details pane displays parameters for the trunk group.
5. Optional: To overwrite all outbound CID names, type the label to use as the CID name in the When
Site Name is used for the Caller ID, overwrite it with field.
6. Click Save.
After the terminal equipment (TE) initially receives the SETUP ACK (Setup Acknowledge) message
from the network terminal (NT), the Mitel TE can send five digits to the network terminal in the
subsequent INFO message if the situation requires those digits.
For the implementation of this messaging, the switch indicates when the extra 5 digits are not needed
(thus, a 25-digit SETUP message is the default). As the configuration steps illustrate, a message
named Sending Complete indicates that the additional 5 digits are not needed. Note that, by itself, the
Sending Complete message does not directly pertain to the European requirement for 25-digits in a
SETUP message. It simply indicates that, for no specific reason, more digits are not required. This
message is delivered in 1 of 2 ways:
The Sending Complete message can go out after the SETUP ACK message arrives. This behavior
is the default and does not involve an ISDN profile.
The Sending Complete message can go out in the SETUP message. This requires an ISDN
profile.
2. In the navigation pane, click Administration > Trunks > ISDN Profiles.
The General tab in the details pane displays parameters for the ISDN profile.
4. In the Name field, type the name for the ISDN profile.
Note
The name of the default profile SystemISDNTrunk is reserved and cannot be used for new
profiles. The SystemISDNTrunk profile cannot be edited.
Type OVLSendCmpWithSetup – yes to carry the Sending Complete message in the SETUP
message.
7. Click Save.
Note
Once configured, the ISDN profile must be applied to the appropriate trunk group. See Associating an
ISDN Profile with a Trunk Group on page 231 for information about assigning an ISDN profile to a
trunk group.
This feature is supported for Euro ISDN for PRI and BRI.
Note
This feature does not apply to inbound calls. Also, this feature is not supported for North America
ISDN protocols (for example, NI2, DMS, and ESS).
In Europe (or in any ETSI-compliant network), an ISDN profile can be configured in Connect Director
to enable the Voice Switch to allow the CO to negotiate the channel.
The behavior that supports negotiation is called preferred mode. Although this function is available to
BRI, it is more relevant to PRI.
The following steps are required to configure Connected Number Display for outside callers:
1. Configure an ISDN profile for ISDN Channel Negotiation. See Creating an ISDN Profile to Enable
ISDN Channel Negotiation on page 226 for more information.
2. Associate the ISDN profile for Connected Number Display with the desired trunk group. See
Associating an ISDN Profile with a Trunk Group on page 231 for more information.
3. Configure the switch for ISDN channel negotiation. See Configuring a Switch for Euro-ISDN
Channel Negotiation on page 227 for more information.The following trunk and switch settings are
available in Connect Director after an ISDN profile is created:
1. In the navigation pane, click Administration > Trunks > ISDN Profiles.
The General tab in the details pane displays parameters for the ISDN profile.
3. In the Name field, type the name for the ISDN profile.
Note
The name of the default profile SystemISDNTrunk is reserved and cannot be used for new
profiles. The SystemISDNTrunk profile cannot be edited.
ChannelPreferredMode=yes
Note
Custom Parameters are case sensitive.
6. Click Save.
1. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
To edit an existing switch, click the name of the switch in the list pane.
To create a new switch, click New.
The General tab in the details pane displays parameters for the new or existing switch.
For information about configuring the remaining parameters for the switch, see Chapter 7,
Configuring Voice Switches on page 131.
6. After setting all desired parameters for the switch, click Save.
This feature is supported for carriers or service providers configured with Euro-ISDN PRI or BRI.
Note
This feature is not supported for Mitel deployments for North America Protocol (for example, NI-2,
DMS, and ESS). Also, this feature is not supported for ISO QSIG or ECMA QSIG.
When an outside caller calls a Mitel user and the Mitel user answers the call, the phone number of the
Mitel user is sent back to the outside caller through the CONNECT message. The phone number of
the Mitel user can be the user's DID or the BTN associated with the trunk group.
The following steps are required to configure Connected Number Display for outside callers:
1. Configure an ISDN profile for Connected Number Display. See Configuring an ISDN Profile for
Connected Number Display on page 228 for more information.
2. Configure the BTN for the trunk group that the ISDN profile will be associated with. See Purpose of
the Billing Telephone Number for Caller ID on page 217 for more information.
3. Associate the ISDN profile for Connected Number Display with the desired trunk group. See
Associating an ISDN Profile with a Trunk Group on page 231 for more information.
4. Configure the switch for ISDN channel negotiation. See Configuring a Switch for Euro-ISDN
Channel Negotiation on page 9 for more information.
useBTN - The Voice Switch sends only the BTN specified for the trunk group in the CONNECT
message to the service providers or carrier. The outside caller sees the Connected Number
Display (the BTN specified for the trunk group).
present - The Voice Switch sends the user’s DID or the BTN specified for the trunk group in the
CONNECT message to the service providers or carrier. The outside caller sees the Connected
Number Display (the user’s DID or the BTN specified for the trunk group).
restrict (default) - The Voice Switch sends neither the user’s DID nor the BTN specified for the
trunk group in the CONNECT message to the service providers or carrier. The outside caller does
not see the Connected Number Display.
1. In the navigation pane, click Administration > Trunks > ISDN Profiles.
The General tab in the details pane displays parameters for the ISDN profile.
3. In the Name field, type the name for the ISDN profile.
Note
The name of the default profile SystemISDNTrunk is reserved and cannot be used for new
profiles. The SystemISDNTrunk profile cannot be edited.
ConnectedLine – present
Note
The Custom Parameters are case sensitive.
6. Click Save.
Note
No consultation with the carrier is necessary for the use of an ISDN profile for RNIE even though, in
general, knowledge of how the carrier or service provider communicates at the trunk level is helpful.
If the original caller ID does not reach the far-end device after trying both sequences in the ISDN
profile, the customer should ensure that the other requirements of caller ID are configured correctly. As
described later in this section, even if the Voice Switch is correctly forwarding the original caller ID
outside the local network, conditions in the WAN might obstruct the successful arrival of caller ID at the
destination.
The outbound Q.931 SETUP message has two caller ID fields, as follows:
The redirecting number—the Mitel number that forwarded the original call, if call-forwarding was
performed. (If the call was not forwarded, there is no redirecting information.) This number is either
of the following:
The DID of the Mitel user who forwarded the call (if the user has a DID)
When necessary, the contents of the Billing telephone number (BTN) field
This redirecting number can be the base number in a trunk’s DID range, the Mitel customer’s
BTN, or the CESID. These alternatives to the DID are described in Purpose of the Billing
Telephone Number for Caller ID on page 217.
Note
Different carriers or carrier regions can use different call parameters. Therefore, we
recommend that a unique ISDN profile be created for each trunk group.
The calling party number is presented with the caller ID. The BTN is sent as the redirecting
number (if Enable original caller information is enabled).
SEND_BTN_AS_RNIE – no
The calling party number is presented with the BTN. The caller ID is sent as the redirecting
number (if Enable original caller information is enabled).
In the navigation pane, click Administration > Trunks > ISDN Profiles.
In the navigation pane, click Administration > Trunks > SIP Profiles.
To edit an existing profile, click the name of the profile in the list pane.
To create a new profile, click New.
3. In the Name field, type the name for the ISDN profile.
Note
The name of the default profile SystemISDNTrunk is reserved and cannot be used for new
profiles. The SystemISDNTrunk profile cannot be edited.
Type SEND_BTN_AS_RNIE – no to specify that the switch presents the BTN associated with
the trunk group.
Type SEND_BTN_AS_RNIE – yes (default) to specify that the switch presents the caller ID.
6. Click Save.
Note
Once configured, the ISDN profile must be applied to the appropriate trunk group. See Associating an
ISDN Profile with a Trunk Group on page 231 for information about assigning an ISDN profile to a
trunk group.
Note
ISDN profiles are only valid for PRI and BRI trunk groups.
Many companies might choose to hide the personal name of the caller and instead insert the company
name. As the following steps show, the system administrator can specify a label to overwrite all
outbound CID names (and thus mask the call initiator’s name).
2. In the navigation pane, click Administration > Trunks > Trunk Groups.
3. In the Name column, click the name of the trunk group to which to associate the ISDN profile.
The General tab in the details pane displays parameters for the trunk group.
5. Click Save.
This chapter discusses how to configure IP phones. It contains the following information:
Overview
Mitel Connect supports IP phones connected through voice switches. After installing the phones,
configuring IP phones is a straightforward process that involves defining settings in Connect Director.
Prerequisites
Before configuring IP phones through Connect Director, be sure that you’ve addressed the following
prerequisites which involve setting up your network and installing the phones:
Add and configure voice switches to support IP phones. For information on allocating switch ports
for IP phone support, see Chapter 7, Configuring Voice Switches.
Set IP address ranges. For more information, see the Mitel Connect Planning and Installation
Guide.
If you are using static IP addresses, set the boot parameters in the individual IP phones. For more
information, see the Mitel Connect Planning and Installation Guide.
When you have completed the installation process, connect the IP phones to the network. Phones
connected to the network register themselves with the Mitel Connect system.
3. Enter values or accept the defaults for the parameters, which are described in Table 70.
4. Click Save.
Note
The “Server to Manage Switch” option is disabled for IP Phone Configuration Switches.
For IP480, IP480g, and IP485g phones, the message is centered. The
message does not appear on the IP420 or IP420g phone.
IP phone password This field sets the administrative password for IP phones in the Mitel
Connect system. It is used only with IP phones that require a password.
The default is “1234”. It can be 1–8 digits long.
For IP400-Series phones, when this check box is selected the phones
failover to a new voice switch if their current switch fails. These phones
do not require a reboot when you change the state of this field.
For more information about failover behavior for the IP phones, see Call
Continuation During Failover on page 239.
Delay after collecting The timeout period, in milliseconds, for operations that involve
digits transferring calls. This setting applies to all users and can be set only
once for the entire system. You cannot configure different timeout
periods for different features or for different users, and users cannot
configure the timeout period through the Connect client or the IP phone
interface.
The Enable IP phone failover option is enabled on the Telephone Options page, as described in
Configuring System Settings for IP Phones on page 235.
When the Enable IP phone failover option is enabled and the voice switch handling a call becomes
unavailable during a call, the phone goes through two failover stages:
Pending Failover is the period between when the phone does not receive the expected
acknowledgement signal from its voice switch until the time that an alternate switch is assigned to
perform call management tasks for the phone. This period typically lasts 2 to 4 minutes after the
switch becomes unavailable.
Failover is the period after the alternate switch is assigned to perform call management tasks for
the phone.
The amount of time it takes for failover to occur depends on whether the phone is idle when the switch
failure occurs:
If the phone is idle, the failover happens approximately 4 minutes after the switch failure is
detected.
If the user tries to make a call during the switch failure, the failover is initiated 5 seconds from the
time the call is dialed so that the call can be completed.
Regardless of the setting for the Enable IP phone failover option, the phones detect the switch failure
and try to hunt for a new switch. The Headquarters server dynamically manages phone failover,
redirecting the phones to an available voice switch, but an actual failover to the new switch occurs only
if the Enable IP phone failover option is enabled.
When Enable IP phone failover is not enabled, all active calls remain active when the phone enters
the Failover stage, but the phone does not move to another voice switch. When a phone is in this state,
the user cannot make new outgoing calls or receive new incoming calls until the voice switch is again
operational or the administrator moves the phone to another voice switch.
When Enable IP phone failover is enabled, active calls are maintained through the beginning of the
failover stage until the normal completion of the call. All pending failover restrictions remain in place
after the phone enters the Failover stage until calls maintained through Failover initiation are
completed.
A local endpoint is the source (calling) IP phone that is controlled by the failed switch during a failover.
During the Pending Failover stage, the telephone user interface displays a “No Service” message until
the phone is assigned to a new switch. Call control operations are not available on surviving calls. All
inbound calls to the local endpoint are routed to the destination specified by the current availability
state.
During the Failover stage, the telephone user interface displays “Failover Mode” while surviving calls
remain active. Pressing phone keys generates a “No Service” message on the phone interface. Call
control operations on surviving calls remain unavailable. All inbound calls to the local endpoint are
routed to the destination specified by the current availability state. After the surviving call is concluded,
the IP phone returns to normal operation.
A remote endpoint is the target (called) endpoint that the functioning switch controls during failover.
During failover, remote endpoint IP phones can hang up the call, place the call on hold, or retrieve the
call from hold. All other soft key operations are unavailable for the duration of the call. The IP phone
continues displaying call information until the end of the call. Call control operations on other calls
remain available.
Use the Any IP Phone method to add users by allowing users to assign their own phone from their
desktop and voice mail. This method simplifies the setup of multiple new users.
Using the Any IP Phone Method to Add Phones for Multiple Users
This procedure describes how to configure a user to use any IP phone. For information about creating
users, see Chapter 12, Configuring Users.
The Extension pane for the new or existing user is displayed on the bottom of the page.
4. On the General tab, in the User Group field select a user group from the drop-down list.
Note
Select a user group with a Class of Service telephony profile that allows extension reassignment.
For more information about extension reassignment, see Configuring a COS for Telephony
Features Permissions on page 372.
6. Click Save.
7. To use this profile to create another user, click Copy and repeat steps 4 through 5.
8. Instruct users to assign their extension to their phone by logging in to the voice mail system or
using the phone interface.
The Extension pane for the new or existing user is displayed on the bottom of the page.
4. Scroll to the Primary phone port field, select IP phone, and select the specific IP phone’s MAC
address from the drop-down list.
5. Complete the user profile. (For information about user settings, see Configuring Users on page
369.)
6. Click Save.
2. In the navigation pane, click Administration > Telephones > Anonymous Phones.
To add a new anonymous phone, click New and fill in the fields on the General tab on the
bottom pane of the page. See Table 72 for details.
To delete an anonymous phone from the Mitel Connect system, select the phone, click Delete,
and then click OK in the confirmation dialog. (Deleting an anonymous phone disconnects any
calls that are in progress on the port.)
4. Click Save.
2. In the navigation pane, click Administration > Telephones > Vacated Phones.
The Vacated Phones page, which displays the fields described in Table 73, is displayed.
You can view and edit IP phones on the Telephones page. For more information, see Viewing IP
Phones.
You can view the status of IP phones through the Maintenance menu. For more information, see
Monitoring IP Phone Status on page 621.
IP phones are assigned to the Headquarters site if they are not assigned to another site through IP
address mapping, but you can move IP phones to a different site. When you assign a specific IP phone
to a user, the user belongs to the site where the IP phone is located.
For details about editing user information, see Chapter 12, Configuring Users.
Viewing IP Phones
1. Launch Connect Director.
The Telephones page, which shows all phones in the system, is displayed. For details about the
columns on this page, see Table 74 on page 245.
Note
Mitel Technical Support does not perform troubleshooting on any model of IP phone (such as
IP210) that has a designation of “Unsupported.” The designation appears in the “Phone Type”
column on the Telephones page.
Renaming an IP Phone
You can change the name of an IP phone from the Telephones page in Connect Director. By default, IP
phones are listed by MAC address in the Name column of the list pane on the Telephones page.
3. In the list pane at the top of the page, click the name of the phone you want to rename.
The General tab in the details pane at the bottom of the page displays the details for that phone.
5. Click Save.
3. If you want to filter the list of phones, click and enter text in one or more filter boxes.
4. Select the check box for the IP phone that you want to delete.
WARNING!
Make sure that you have the selected the correct phone and that no other phones are selected.
5. Click Delete.
Note
If you wish to add the IP phone back into the system, you must reboot the IP phone. The phone is
reconfigured during the boot process and becomes available again. (A IP400-Series phone
automatically re-registers with the system and displays the Available state, without rebooting.)
The IP address range restrictions apply only to switches at remote sites. You can move an IP phone
across switches at the Headquarters site without entering an IP address range for the Headquarters
site. However, if the phone’s IP address is within a range mapped to a remote site, you cannot move
that phone to a switch at the Headquarters site.
If you plan to move IP400-Series phones from one Mitel Connect system to another, you must clear
each phone’s configuration by using MUTE 25327# (CLEAR). The best approach for clearing a
phone’s configuration depends on how your system is configured:
If your installation uses DHCP Option 156, press the MUTE key followed by 25327#. Wait for the
phone to finish clearing and start rebooting (the phone screen goes blank and message-waiting
indicator light illuminates briefly), and then unplug the phone so that it does not reregister with the
system when it reboots.
If your installation does not use DHCP Option 156, press the MUTE key followed by 25327#.
Clearing a phone’s configuration while the phone is connected to the Mitel Connect system
automatically removes the phone from Connect Director. If you clear a phone’s configuration while the
phone is not connected to the system, you must manually remove the phone from Connect Director.
3. If you want to filter the list of phones, click and enter text in one or more filter boxes.
4. Select the check boxes for the IP phones you want to move.
If you want to move the phone to a different site, select the new site in the Move to site drop-
down list.
Select the switch you want to move the phone to in the and switch drop-down list.
6. Click Move.
Available: The phone has no user assigned to it. Calls can be placed from the phone, but it does
not receive calls. The Caller ID is “Unknown.”
Anonymous: The user can make a call but cannot receive calls. The Caller ID is “Caller ID
Unknown.” The phone can be in this state for either of the following reasons:
The assigned user has activated the Extension Assignment feature on another phone.
The Mitel administrator has explicitly configured anonymous phones that do not have
assigned users.
Unavailable: The phone was once in the Mitel Connect system but has been removed through
Connect Director. The phone has no dial tone and is not functional. (This state does not apply to
IP400-Series phones.)
The phone resumes normal operation after the last parameter or group of parameters has been
displayed.
On IP400-Series Phones
1. With the phone on hook, press the MUTE key followed by 4636# (INFO#).
2. Use the navigation keypad and the selector button to scroll through and open the submenus as
necessary to see the phone’s settings.
For descriptions of the parameters, see the Mitel Connect Maintenance Guide.
On the IP480, IP480g, and IP485g, press the Exit soft key.
On the IP420 and IP420g, with Exit highlighted press the selector button on the navigation
keypad.
Resetting an IP Phone
You can reset a phone by entering a key sequence from the phone’s keypad.
2. Press # to reboot.
On IP400-Series Phones
1. With the phone on hook, press the MUTE key followed by 73738# (RESET#).
On the IP480, IP480g, and IP485g, press the Reset soft key.
On the IP420 and IP420g, with Reset highlighted, press the selector button on the navigation
keypad.
Customizing Ringtones
IP phones offer multiple sets of different ringtones that users can select on their phones. Each set has
one tone for internal calls and one tone for external calls. IP phones also support the ability to load
custom ringtones on an IP phone so that users can distinguish the sound of their phone’s ringtone
from their neighbors’ ringtones.
To use custom ringtones, you must save them to the proper location on the server. The default
directory for ringtones is <drive>:\inetpub\ftproot\wav\ringtone. In addition, for 400-Series
IP phones, WAV files must be converted to PCM files, as described below.
After the custom ringtones are saved on the server, the way that you specify the ringtone file names
depends on the phone model:
For the IP655 and the IP400-Series phones, you specify custom ringtones for a particular user
group through the User Groups page in Connect Director. When custom ringtones are assigned in
this manner, the existing sets of Mitel ringtones are preserved.
For IP100-, IP200-, and IP500-Series phones, you specify custom ringtones through a
configuration file. When ringtones are customized through configuration files, the custom ringtone
set displaces one of the existing sets of Mitel ringtones.
Custom ringtones must be in Waveform audio file format (.wav). Mitel does not offer custom
ringtones, nor does it provide tools for creating or managing the custom WAV files, but numerous
web sites offer free WAV downloads.
Most Mitel phone models can have up to two custom tones. Their combined size must be less than
750 KB. IP400-series phones can have up to 10 pairs of custom ringtones, without this size
restriction.
Connect Director imposes ringtone size restrictions for IP655 and IP400-Series models. Custom
ringtones for ring pairs 5-8 can be up to 100 KB each. Custom ringtones for ring pairs 9-14
(available only for the 400-Series phones) can be up to 300 KB each.
WAV files can be any time length within the size restrictions. If a WAV file is less than six seconds,
the phone pads the ring out to a six-second length before it repeats the WAV file. WAV files longer
than six seconds are repeated.
Custom ringtones for IP400-Series phones use PCM audio format (.pcm) rather than WAV format
(.wav). Custom ringtone WAV files are converted to PCM format automatically or by running a batch
file, as follows:
During the Mitel installation or upgrade process, any existing custom ringtone WAV files in the
\wav\ringtone subdirectory are automatically converted to PCM, and they are available for use
by the 400-Series phones.
If you add WAV files for custom ringtones after the Mitel installation or upgrade process, WAV files
must be converted to PCM audio format before you can download them to the 400-Series phones.
To convert WAV files to PCM format, run wav2pcm.bat, which resides in
<drive>:\inetpub\ftproot\wav\ringtone. Running wav2pcm.bat converts all WAV files
in the \wav\ringtone subdirectory to PCM format and stores the new ringtone files in
<drive>:\inetpub\ftproot\pcm\ringtone.
When you select custom ringtones for 400-Series phones on the Edit User Groups page in Connect
Director, the system automatically uses the corresponding .pcm file for the .wav file you select.
2. In the navigation pane, click Administration > Users > User Groups.
To edit options for an existing user group, click the user group name.
To create a new user group, click New.
4. On the details pane, click the Profile tab, and then click the Ringtones subtab.
5. For one or more ringtones, in the Name field specify a name and then select audio files in both the
Internal and External drop-down lists.
Note
The IP655 phone can use ringtones through Ring Pair 8. IP400-Series phones can use ringtones
through Ring Pair 14.
6. Click Save.
1. Identify the WAV files you want to use as ringtones. You can either create the files yourself or
obtain them from another source, such as a website. Put the files on a server that is accessible to
the IP phone by anonymous FTP. (This server does not have to be the same as the host of the
configuration files.) The default directory for ringtones is
<drive>:\inetpub\ftproot\wav\ringtone.
2. Create or edit the custom configuration file for a specific phone or a phone model.
3. Reboot the phone so that it retrieves the information in the configuration file and downloads the
WAV files. At boot time, the phone indicates the success or failure of phone-specific configuration
download and the WAV download.
To specify that a phone or phones should use custom ringtones, you insert two configuration
parameters, WaveRinger1 and WaveRinger2, in a custom configuration file. These parameters identify
the name and location of the custom ringtones that the IP phone downloads (by FTP) to the phone's
RAM at boot time. Table 76 provides more details.
For example, to load one of the custom ringtones, you could replace L/r14 (Ring 4 External) and L/r15
(Ring 4 Internal) with the name and location of the file containing the new custom ringtone, using the
symbols shown in Table 77.
Replacing internal and external ringtones in separate sets (for example, Ring 2 external and Ring 4
internal) is also possible, but only one set of ringtones can be active at a time. Activating either set of
ringtones activates only one of the custom ringtones at a time.
Examples:
You can add the parameters listed in Table 76 to the custom configuration file for a specific phone or all
phones of a certain model:
For a specific phone, create a phone-specific custom configuration text file and store it in the same
directory as the standard IP phone configuration files. The name of the phone-specific file contains
the MAC address of the phone that you want to receive the custom ringtone. You can find the MAC
address on the sticker on the back of the phone. The name of the phone-specific configuration file
is as follows:
shore_AABBCCDDEEFF.txt
where “AABBCCDDEEFF” is the MAC address and all the letters in the MAC address should be in
upper case.
To load the same custom ringtone onto several IP phones at the same time, edit the custom
configuration file for a particular phone model. (For example, the custom configuration file name
for the IP560 is S6custom.txt.) Be aware that loading ringtones on all phones of a certain model
could cause ringtone confusion if the phones are concentrated in one area of a building.
The process and graphics specifications for using custom wallpaper images vary based on the IP
phone model.
In addition, this section explains how to modify the “Standard” wallpaper image that IP485g phones
include. To change the default wallpaper image for this “Standard” file, you specify the new image in a
custom configuration file for the phone.
You can create .png files using Microsoft Paint or any other graphics editing program. A simple
approach for creating a custom image that is the correct size is to use one of the wallpaper images
provided by Mitel as a template.
Note
Because wallpaper images for the IP485g and IP655 are different sizes, it is recommended that you
save images in both sizes with the same name in the appropriate directories. With images available in
both sizes, after you specify the image in Connect Director, the phone can access the image in the
correct size.
If an image of the proper size for the phone model is not available, the following happens:
If you select an image that was created for the IP485g to use on the IP655, the image does not
display.
If you select an image that was created for the IP655 to use on the IP485g, a cropped and resized
version of the image is displayed. Therefore, it might not look the way you expect it to look.
1. Locate the wallpaper images that were loaded on your system when you installed the Mitel
Connect server by looking in one of the following default directories:
<drive>:\inetpub\ftproot\Wallpaper\480x272c\
<drive>:\inetpub\ftproot\Wallpaper\640x480c\
Note
Depending on how your system was installed, the root path for these directories might be
different.
2. Open one of the .png files in this directory by using MS Paint or another graphics editing program.
For IP485g
Width – 480 pixels
Height – 272 pixels
For IP655
Width – 640 pixels
Height – 480 pixels
5. Verify that the old file and the new file exist in one of the following locations, as appropriate:
<drive>:\inetpub\ftproot\Wallpaper\480x272c\
<drive>:\inetpub\ftproot\Wallpaper\640x480c\
wherever your custom wallpaper images are stored
6. Change the image to create your custom image, while retaining the size of the original image.
7. Click Save.
2. In the navigation pane, click Administration > Users > User Groups.
To edit options for an existing user group, click the user group name.
To create a new user group, click New.
4. On the details pane, click the Profile tab, and then click the Wallpapers subtab.
5. For one or more wallpaper images, specify a name and select an image from the drop-down list.
6. Click Save.
The details pane is populated with the existing user’s parameters or shows default parameters for
a new user.
4. On the details pane, click the Telephony tab, and then click the Features subtab.
5. In the Wallpaper field, select a wallpaper image from the drop-down list.
6. Click Save.
The following procedure uses the default directories. Depending on how your system was installed,
your root path might be different.
1. Save the custom wallpaper image file on the Headquarters server in the following directory, as
appropriate for the phone model:
<drive>:\inetpub\ftproot\Wallpaper\480x272c
<drive>:\inetpub\ftproot\Wallpaper\640x480c
[user]
wallpaperStandardFilename=<image file name>.png
When you use this method, the image’s label on the phone is Standard. You cannot modify the
label.
Note
For example, if you want to replace the Standard wallpaper image (standard.png) on the
IP485g with your company logo (logo.png), add the following lines to the custom configuration
file:
[user]
wallpaperStandardFilename=logo.png
This file name will not be overridden by other configuration settings.
4. Verify that the phones display the new wallpaper file for the Standard wallpaper setting.
6. In the File Name field, enter the name to use for the file.
7. Click Save.
Mitel specifies one text file for each phone model that defines default characteristics for all phones of
that model type on the system. You specify the default wallpaper for phones of a specific model by
adding a line to its corresponding configuration file.
1. Save the wallpaper file on the Headquarters server in the following directory:
<drive>:/Inetpub/ftproot
4. Add the following line to the open file: Wallpaper2pixmap abc.bmp, entering the name of the
wallpaper file in place of abc.bmp, and then save and close the file.
Note
For example, if the wallpaper file is name logo.bmp, enter Wallpaper2pixmap logo.bmp in
the configuration file.
6. Verify that the file contains the one of the following lines, or add the line if it is not present:
1. Save the wallpaper file on the Headquarters server in the following directory:
<drive>:/Inetpub/ftproot
3. Create a text file named shore_xxxxxx.txt, where xxxxxx is the MAC address of the phone. Use
lower case text when naming the file.
The MAC address is a 12-digit number that uniquely identifies each device. This address is printed
on the white bar code located on the bottom of the phone.
Note
For example, if the MAC address of an IP565g is 00104907020C, then create a file named
shore_00104907020c.txt.
4. Add a line in the open file with the following format: Wallpaper2pixmap abc.bmp, where
abc.bmp is the name of the wallpaper file, then save and close the file. For example, if the
wallpaper filename is logo.bmp, enter Wallpaper2pixmap logo.bmp.
To configure applications for an existing user group, click the user group name.
To create a new user group, click New.
4. On the details pane, click the Profile tab, and then click the Phone Applications subtab.
6. To make other applications available to users in that user group, in the Available applications
field, use the drop-down lists to select applications that reference URLs.
7. Click Save.
For the IP480, IP480g, and IP485g phones, the automatic off-hook preference (speaker or
headset) and the headset type (wired or wireless) are separate options that a user can set in the
phone interface. As a result, the headset type preference remains in effect regardless of the
automatic off-hook setting. In other words, a user can select the speaker phone as the automatic
off-hook setting while still specifying a preference for headset type.
The IP420 and IP420g phone interface does not provide the capability to change the preferences
for automatic off-hook or headset type. If a user’s headset type is set to wireless headset and the
user assigns his or her extension to a phone that does not have a wireless headset attached, the
user cannot use the headset button or automatic off-hook on the phone. Alternatively, the speaker
phone or handset could provide audio path. In addition, on IP420 and IP420g phones, after a user
has unassigned his or her extension from a phone and the phone returns to an Available or
Anonymous state, the headset type always reverts to the wired headset preference.
For IP phone models other than the IP400-Series models, the automatic off-hook preference
includes the headset type, just as in Connect Director. As a result, if you or the user change a
user’s automatic off-hook preference from wireless headset to speaker on these models, the
phone reverts to a wired headset setting.
IP565g
IP560g
IP560
IP485g
IP480g
IP480
IP420g
IP420
IP265
IP230
IP212k
You can configure the automatic off-hook feature through the phone, or Connect Director. The
procedure for using Connect Director is as follows:
3. Click the name of the user whose automatic off-hook option you want to modify.
4. On the details pane, click the Telephony tab, and then click the Features subtab.
6. Click Save.
Table 78 lists the supported functions that can be programmed through Connect Director. Not all
programmable functions apply to all phone models.
All of the custom buttons are configurable except for the top right button, which is permanently set to
provide call appearance information (that is, the ringing indicator and call timer information). After a
function is assigned to a button, users can enter a label that appears on the display next to the custom
button. The length of the label depends on the phone model, and labels might be truncated on certain
phone models.
You can configure custom buttons through Connect Director on behalf of a user, or you can enable
permissions for an individual user so that the user can modify the custom buttons on the IP phone
through the telephone interface. The functions that a user can assign to a programmable button using
the telephone interface vary depending on the phone model. On IP230, IP480, IP480g, and IP485g
models, these functions are limited to Dial Number and Call Appearance.
The programmable button feature is supported on all Mitel multiple-line models except the IP420 and
IP420g.
Available
In a Meeting
Out of Office
Vacation
Custom
Do Not Disturb
For more information about availability
states, see Configuring Availability States on
page 438.
Change Default Audio Path Audio Call Path Change the default audio path on the phone.
Speaker
Headset
Wireless Headset
Bluetooth Headset
Conference Blind Extension or external Join a party into a conference call without
number first consulting the user on the extension or
external number to which you are joining the
other party.
Conference Consultative Extension or external Join a party into a conference call after first
number consulting the user on the extension or
external number to which you are joining the
other party.
2. In the navigation pane, click Administration > Users > Programmable Buttons.
3. Click the name of the user whose phone buttons you want to program.
The IP Phone Buttons tab for that user is displayed in the details pane.
4. Click the subtab for the phone or button box for which you want to program buttons.
a. In the first Function field, select the category for this button from the drop-down list.
b. In the drop-down list in the second field, select the function to associate with a particular
button. (For descriptions of the functions, see Table 78 on page 262.)
c. In the Long Label and Short Label fields, type a label to appear next to the button on the
phone LED display to remind the user of the button’s function, as follows:
The Short Label field applies to most Mitel multiple-line phones and can be up to 6
characters, but only the first 5 characters display on most phones; the BB24 and IP212k
can display 6 characters.
The Long Label field applies to the IP655, IP480, IP480g, IP485g, and BB424 models.
Note
If you leave either the Long Label or Short Label field blank, the text you enter for one of the
labels is automatically propagated to the blank field. Long Label text is truncated to fit the
space allotted for the Short Label.
d. When applicable, enter the appropriate information in the fields that appear in the Target
section.
e. Certain functions require a destination, but for other functions (such as speed-dial or blind
transfer) a destination is optional. Some functions take only extensions, and some functions
take any type of phone number.
6. Click Save.
3. In the list pane, select the command check box for the user whose programmable buttons you
want to use as the source from which to update other users’ configurations.
5. Use the command check boxes to select the user or users whose programmable buttons you want
to update with the source information.
6. Scroll to the bottom of the Bulk Edit tab and select the check boxes for the devices (IP Phones
and/or one or more button boxes) whose programmable buttons you want to copy.
7. Click Save.
8. Click the Results tab to check the status of the copy operation.
3. Click the name of the user whose profile you would like to modify to enable the user to customize
IP phone buttons.
4. On the General tab, scroll down to the User group field and click the Go to this user group link.
6. In the details pane, select the Allow customization of IP phone buttons and client monitor
windows check box.
7. Click Save.
Note
The BB424 IP485g phone supports the BB424.
2. In the navigation pane, click Administration > Users > Programmable Buttons.
3. Click the name of the user for whom you want to program a hotline button.
The IP Phone Buttons tab for that user is displayed in the details pane.
4. Click the subtab for the phone or button box where you want to configure a hotline button.
5. Identify the button # that you want to configure, and do the following:
c. In the Long Label and Short Label fields, type a label to appear next to the button on the
phone or button box LED display to remind the user of the button’s function. (For details about
labels, see Configuring Programmable Buttons through Connect Director on page 267.)
d. In the Extension field, enter the extension to which you want the call to connect.
e. In the Call Action field, select the method you want to use for making the connection.
6. Click Save.
MCT enables the Mitel phone user to identify the source of malicious calls. A user, who receives a
malicious call from the PSTN over an ISDN trunk supporting MCT, can initiate a MCT on the phone by
pressing a programmable button, entering a star code sequence, or using the Connect client toolbar
button.
After the user initiates the MCT process, the Mitel Windows Event Log is notified and the user receives
an urgent email confirming the action along with an audible tone. The system provider is notified
through the PSTN of the malicious nature of the call. This allows the system provider to take action,
such as notifying legal authorities.
Note
MCT is an ISDN feature. It is implemented on BRI and PRI trunks to ISDN service providers that
support the feature. The Mitel implementation of MCT supports the ETSI standard that is configurable
on switches that support Euro-ISDN. Trace information is not provided to or displayed on the Mitel
user phones.
2. In the navigation pane, click Administration > Users > Programmable Buttons.
3. Click the name of the user for whom you want to configure a programmable button for Malicious
Call Trace.
The IP Phone Buttons tab for that user is displayed in the details pane.
4. Click the subtab for the phone or button box where you want to configure the button for Malicious
Call Trace.
5. Identify the button # that you want to configure and do the following:
c. In the Long Label and Short Label fields, type a label to appear next to the button on the
phone or button box LED display to remind the user of the button’s function. (For details about
labels, see Configuring Programmable Buttons through Connect Director on page 267.)
d. In the Mailbox field, enter the user mailbox where the event logs should be sent.
e. In the Call Action field, select the method to use for making the connection.
6. Click Save.
Example: The user receives an incoming malicious call. Using an IP phone, third-party SIP phone,
Analog phone or Extension Assignment device the user presses the hold button and then enters *21 to
start the trace sequence. Once the trace sequence starts, a confirmation tone will be played prior to
returning to the call to indicate that an MCT request has been initiated, an event is logged in Connect
Director, record call is attempted to the local extension's mailbox, and an urgent email is sent to the
recipient of the call.
Example: The user receives an incoming malicious call. Using a IP phone with programmable keys,
the user presses the programmable key which will start the trace sequence. Once the trace sequence
starts, a confirmation tone will be played to indicate that an MCT request has been initiated, an event is
logged in Connect Director, record call is attempted to the configured extension's mailbox, and an
urgent email is sent to the recipient of the call.
Using Softphone, the user presses the IP Programmable Button to start the tracing process. The signal
requesting MCT initiation is sent to the switch via TMS.
Note
The Connect client does not support the initiation of MCT using the star code.
Example
The user receives an incoming malicious call via the Connect client or a softphone, the user can press
the programmable toolbar key which will start the trace sequence. Once the trace sequence starts, a
confirmation tone will be played to indicate that an MCT request has been initiated, an event is logged
in Connect Director, record call is attempted to the configured extension's mailbox, and an urgent
email is sent to the recipient of the call.
The Mitel MCT feature will only work with carriers supporting ETSI standard EN 300 130-1 V1.2.4.
Mitel switches support the malicious call identification originating function (MCID-O) only. They do
not support the malicious call identification terminating function (MCID-T). If the switch receives a
notification from the network of a malicious call identification, it ignores the notification.
The MCT feature is supported only for incoming calls from the ISDN network.
The service provider must have MCID functionality enabled for the feature to work.
Mitel ISDN interface on the E1/BRI switches must have the Protocol Type set to ISDN User with
the Central Office Type set to Euro ISDN. When MCID is initiated on a third-party SIP phone by
putting a call on hold and initiating the star code *21 sequence, after the successful initiation of the
signal the previous call continues to be held. User needs to manually unhold the call. For IP
phones and analog phones, the held call is connected back after MCT initiation.
Malicious Call Trace confirmation tone is not given to third-party SIP phones. Calls on third-party
SIP phones are not automatically taken off hold.
Connect client and Softphone do not support initiation through the star code sequence.
The Connect client for mobile platforms does not support the Malicious Call Trace feature.
Malicious Call Trace confirmation tone signals an invocation attempt. It does not signal that the
MCT request was successfully received at the connected network (CO). The MCT response is not
processed by the ISDN stack.
Malicious Call Trace phone programmable button may configure a target mailbox for recording the
call, but MCT initiated via star code will always be recorded to the initiating user’s mailbox (no way
to specify target).
Malicious Call Trace attempt can only be issued once per call.
Malicious Call Trace invocation is only valid while the call is established.
Malicious Call Trace is not supported on conference calls created on a Mitel Connect system.
A virtual private network (VPN) is a computer network in which some internode links are facilitated via
open connections or virtual circuits through a larger network instead of via physical wires. The link-
layer protocols of the virtual network are said to be tunneled through the larger network. One common
application is secure communications through the public Internet.
The feature includes an Open SSL VPN client in the IP phone and an Open SSL VPN Gateway. The
Open SSL structure allows the traversal of firewalls implemented by many enterprises for blocking
VPN tunnels.
The method used to provide VPN capability differs depending on the phone model:
For IP400-Series phones, VPN access is enabled through the Edge Gateway appliance. For
details about enabling VPN access for 400-Series phones, see Implementing VPN Access for 400-
Series Phones.
For IP phones IP655, IP565g, IP560g, and IP230g, VPN access is enabled through a VPN
concentrator. For details about enabling VPN access for these phone models, see Implementing
VPN Access for IP655, IP565g, IP560g, and IP230g Phones on page 274.
The Admin options menu and Admin password field are displayed.
4. With the Use VPN field highlighted, press the Toggle soft key to change the setting to On.
5. In the VPN gateway field, enter the IP address of the Edge Gateway appliance.
6. In the VPN gateway port field, accept the default port (443) or change the value to a different port
number.
The phone reboots and then prompts you for user credentials.
The VPN Concentrator is located at Mitel’s Headquarters site, connected to the same LAN as local
switches and the Headquarters server. For specific deployment options based on the router and
firewall configuration of the Mitel network, refer to the VPN Concentrator 4500/5300 Installation and
Configuration Guide.
The SSL-based VPN Concentrator enables remote IP phones to establish secure voice
communications with through the local Mitel PBX through SSL VPN tunnels. For every tunnel, a virtual
PPP interface is created on VPN Concentrator and a peer PPP interface is created on the remote IP
phone. Signaling and media streams go through the PPP interface and are secured by SSL
encryption.
For IP655, IP565g, IP560g, and IP230g phones, Mitel licenses VPN phone usage on a stunnel basis.
A stunnel provide SSL tunnels between a remote device and a VPN gateway. Establishing a stunnel
requires an available VPN phone license. If the number of active stunnels equals the number of
available licenses, the VPN Concentrator will not establish new stunnels until an existing stunnel is
disconnected.
Each remote device is assigned a user name and password that is recognized by the VPN
Concentrator. Phone logging into the Concentrator are authenticated through the verification of its user
name and password. When the phone is successfully authenticated, the Concentrator establishes a
stunnel to that phone, after which it can receive and make phone calls through the Mitel Connect
system. The stunnel remains in place until the phone sets the VPN parameter to off or the
Concentrator times out all stunnel connections.
After a stunnel is established from the IP phone to the Concentrator, VPN phone calls are performed
from the IP phone in the same manner as if the phone is located on the same LAN as the VPN
Concentrator. The VPN Concentrator manages the connection from the phone to the Mitel Connect
system.
Refer to the VPN Concentrator 4500/5300 Installation and Configuration Guide for instructions on
physically inserting the VPN Concentrator into the network. The guide also describes web browser
pages that configure the VPN concentrator. The following sections describe the pages and fields in this
interface that require configuration.
The VPN Concentrator is shipped with the pre-configured IP address 192.168.1.1 for the LAN port.
1. Assign static IP address 192.168.1.2 with subnet 255.255.255.0 to the Ethernet interface of the
computer that is connected to the LAN port.
http://192.168.1.1.
Username – root
Password – default
4. Select Network in the blue Configuration Menu on the left side of the page, and then enter the
appropriate values in the following fields:
LAN Interface Settings: Enter the IP address by which other LAN devices will access the
VPN Concentrator.
WAN Interface Settings: Enter the IP address by which remote devices can access the VPN
Concentrator.
5. Select Stunnel in the blue Configuration Menu on the left side of the page, and verify that the
following parameters are set properly:
Stunnel Server IP Address is set to the LAN address of the VPN Concentrator, as specified on
the Network page.
6. Select System > Route in the blue Configuration Menu on the left side of the page, and add any
desired static routes to networks or servers on the LAN as follows:
a. Enter the subnet address and mask in the IP Network and Netmask data fields, respectively.
b. Enter the IP address that accesses the Gateway server of the added network.
c. Click Submit.
7. To add a user account for Stunnel access to the VPN Concentrator, select Stunnel > Username
Database in the blue Configuration Menu on the left side of the page and do the following:
a. Enter the username and password for the user in the Username and Password data fields,
respectively.
Connect Director assigns codecs on the basis of the site assignment of the IP phone’s IP address.
Assigning the IP address block allocated to the VPN Concentrator to a specific site assures that the
switch uses the proper codec when handling VPN Calls.
2. In the navigation pane, click Administration > Telephones > IP Phone Address Map.
3. Click New.
The General tab, which includes blank fields for the new IP address range, is displayed.
5. In the Low IP address field, enter the lowest IP address of the block allocated to VPN calls. The
IP address must be valid for the network where the site is located.
6. In the High IP address field, enter the highest IP address of the block allocated to VPN calls.
7. Click Save.
Note
Refer to Table 232 on page 748 for configuration recommendations for Emergency 911 related
features on VPN phones.
You must manually configure IP phones to establish a stunnel with the VPN concentrator. After the
phone is configured and placed on a WAN port (such as the Internet), it attempts to communicate with
the Concentrator. Mitel does not provide DHCP options for automatically setting these parameter
values at startup.
1. Press the Mute button, and then enter the numbers for SETUP# (73887#).
3. Press # to step through the phone options and configure the following parameters:
VPN Gateway: This parameter specifies the WAN IP address of the VPN Concentrator to
which the IP phone connects. Default value is 0.0.0.0.
VPN Port: This parameter specifies the port number of the VPN Concentrator to which the IP
phone connects.
VPN: This parameter, when set to On, enables VPN Phone on the IP phone. Default setting is
Off.
VPN User Prompt: This parameter, when set to On, programs the IP phone to prompt the
user for a VPN user name after completing a power cycle.
VPN Password Prompt: This parameter, when set to On, programs the IP phone to prompt
the user for a VPN password after completing a power cycle.
FTP: This parameter specifies the IP address of the RTP server from which the phone
requests VPN Phone software upgrades. When set to the default value of 0.0.0.0, the phone
solicits upgrades from the IP address of the VPN Gateway.
The user name and password is stored in non-volatile RAM on the phone. Power cycling and normal
phone operations have no effect on the stored name and password. The VPN Concentrator
authenticates the IP phone when the phone attempts to establish a stunnel by verifying that the
phone’s username and password is included in the user accounts on the Users list page.
New IP phones are shipped with this memory location vacant. The first time a user power cycles the
phone with the VPN parameter set to On, the phone prompts the user for a username and password.
The phone prompts for these values if the VPN User Prompt and VPN Password Prompt parameters
are set to On; otherwise, the IP phone continues using the previous memory contents when attempting
to establish a stunnel.
When the feature is configured, calls to the Mitel extension of the user ring the primary phone and all
additional configured phones simultaneously. For convenience, the user can turn the feature on or off
to stop the simultaneous ringing at any time.
Incoming calls to simultaneous ringing devices are presented as standard calls with standard ringtone.
A ring delay can be configured for additional destinations that allows the preferred phone to ring first.
After a simultaneous ringing call is established, the user may move the call between the simultaneous
ringing devices. The Call Move mechanism can be initiated through a IP phone soft key, a
programmed button, the Connect client, or star code *23.
Before users can enable simultaneous ringing of their phones, you must first modify the default Class
of Service to provide the necessary permissions.
2. In the navigation pane, click Administration > Users > Users > Class of Service > Telephony
Features Permissions.
To modify an existing set of telephony features permissions, in the list pane click the name of
the set of permissions.
To add a new set of telephony features permissions, click New to create a new Class of
Service.
The details pane displays the General tab, which lists information for the new or existing feature
set.
4. Select the Allow external call forwarding and find me destinations check box.
5. Select the Allow additional phones to ring simultaneously and to move calls check box.
6. In the Scope section, click a radio button to specify the type of calls for which users of this class of
service can use these features.
7. Click Save.
3. Click the name of the user whose profile you want to modify.
4. Click the Routing tab, and then click the Phones subtab.
b. Enter the phone number of the additional phone in the appropriate row.
c. In the Activation field, select the method the user is to use to answer calls:
Accept call by answering: Requires the user to remove the phone from the hook and
speak.
Accept call by pressing ‘1’: Requires the user to press 1 on the phone keypad to signal
that they are answering.
d. In the Number of Rings field, enter the number of times you want the phone to ring before the
call is rerouted.
7. For each phone you want to configure to ring simultaneously, do the following:
b. In the Simultaneously ring drop-down list, select which phone should ring simultaneously.
c. If you want to specify another phone to ring simultaneously, select a phone from the Also ring
drop-down list.
Note
For details about device types allowed for additional extensions, see Other Considerations for
Call Move on page 281.
8. Click Save.
When the call is on the assigned phone and the user presses the Move soft key on the phone or
uses the Move Call action in the Connect client, the following events happen:
The call goes on hold. Simultaneous ringing on idle phone(s) lasts until the user picks up one
of the phones. (The preferred phone does not ring.) Until the user picks up the call, the caller
hears silence.
Additional phones start ringing with no ring delay.
Ringing on Additional phones stops after the user answers the call on the Additional phone.
When the user answers the Additional phone, the call is moved to that Additional phone.
When the call is on one of the Additional Phones and the user presses the Move soft key on the
assigned phone or uses the Move Call action in the Connect client, the conversation is
immediately switched to the assigned phone.
Simultaneously ringing idle phones ring until the user answers one of them. Until then, the caller hears
silence.
When the call is answered on the additional phone, the call is moved to the new device.
Call Move push functionality is supported on SIP trunks only if they support DTMF signaling using
SIP INFO.
The only supported star code sequences from additional destinations is *23.
Call Move or configuring simultaneous ringing is not supported from Mobility Client.
When OSE is configured as additional phone, care should be taken to make sure the call is directly
placed to OSE and not AA.
When a cell phone is configured as an additional phone, care should be taken to set the activation
mode to 'answer by pressing 1' so that when the call is redirected to cell phone voicemail, other
simultaneous ringing destinations do not stop ringing.
If the preferred user is a workgroup agent, the WrapUp soft key is displayed instead of the
AddOn/ AddOff soft key (or the Add’l phone soft key on the IP485g). However, if the user
receives a personal call (not a WorkGroup/Contact Center call), the Move soft key is displayed.
This chapter provides information about configuring the system-wide call control features of the Mitel
Connect system. The topics include:
Account codes can vary in length and be flexibly formatted. In addition, account codes can be
configured so that an account code is optional or required for users placing outbound calls. In this way,
the account code can also function to prevent unauthorized employees from dialing long-distance
numbers.
Mitel supports wildcard characters in account codes. This enhancement allows the system to surpass
the previous limit of 50,000 account codes so that an almost unlimited number of account codes can
be supported. The wildcard character – a question mark – can be entered in place of DTMF digits in
the account code. Each wildcard character matches any numbered DTMF digit.
The use of wildcards introduces less strict validation of the account code entered by the user. Rather
than checking each individual code, a length check is performed. The introduction of wildcards into the
account codes does not impact the ability of the system to assign an account code to an individual
client. Account codes with and without wildcards can be configured on the same system. However, a
single account code cannot contain a mix of digits and wildcard characters.
You can create account codes with non-numeric characters, but these characters are discarded during
code collection. The following table shows example account codes and describes how the Account
Codes Service interprets the code.
Account code collection is enabled based on selections made in the user groups settings; the
collection of account codes is set to one of the following states:
None
Optional
Required
For information about account codes and user groups, see Adding or Editing a User Group on page
387.
Call Detail Record (CDR) reports include account code details associated with outbound calling.
Account Codes are associated with a configurable extension and have a dedicated user group, named
“Account Code Services” that defines ultimate call permissions and trunk group access.
A new user group named “Account Code Service” is created, by default, for use by the Account Codes
Service. Because this user group is intended only for use by the Account Codes Service, it does not
appear in User group drop-down lists for assignment to users or other objects such as workgroups.
You can, however, change all the parameters of the Account Codes Service user group except for the
fields indicating whether account codes are disabled, optional, or required.
For user groups configured with account codes, call permissions define which dialed numbers are
directed to the Account Codes Service. Calls that are redirected to the account codes extension are
completed with the trunk access and call permissions of the Account Codes Service.
1. The call permissions applied to the user group to which the user who places the call is assigned
determine whether an account code must be collected or not.
2. The call permissions applied to the Account Code Service user group determine whether calls are
finally placed or if the intercept tone is played.
Account code restrictions do not affect calls that are forwarded to external numbers. Instead, the Class
of Service (COS) settings control the forwarding of calls to external numbers. For more information,
see Specifying a Class of Service on page 371.
The Account Codes Service applies to the system extensions on the SoftSwitch running on the
Headquarters server only. If the Headquarters SoftSwitch is not reachable by the originating voice
switch, the call is processed according to the settings for the user group associated with the user who
places the call.
Specifically, during loss of connectivity, the originator's assigned user group configuration determines
the following call routing:
For end users who have optional account code collection, the system places the calls.
For users who have forced account code collection, the system automatically rejects the call
attempts.
2. In the navigation pane, click Administration > Features > Call Control > Account Codes.
2. In the navigation pane, click Administration > Features > Call Control > Account Codes.
Note
The Filter Account Code section lets you search for an existing account code by name or account
code. To search, enter the beginning string of the name or account code in the Name or Account
Code field and click Find Now. To display the entire list, leave both fields blank and click Find
Now.
To edit an existing account code, click the name of the account code in the list pane.
To create a copy of an existing account code, click Copy.
To create a new account code, click New.
The General tab in the details pane displays parameters for the new or existing account code.
4. In the Name field, type the name for the account code.
Account codes can include up to 20 alpha-numeric characters and must include at least one digit.
Digits are significant characters and may not be replicated in multiple account codes. For example,
the system identifies 8888, p88q88, and abc8de8fg8hij8 as the same code: 8888.
6. Click Save.
Note
For information about enabling account codes for a user group, see Configuring User Groups on page
386.
Account code validation is performed by the Headquarters server by default. Outbound external calls
are redirected to the Headquarters server for account code validation. Once the account code is
validated, the call is redirected to the originally dialed external number.
The Multi-Site Account Codes feature adds the capability of allowing a Distributed Voicemail Server or
voicemail-enabled switch to validate account codes. In addition, if the Distributed Voice Server or
voicemail-enabled switch is unavailable, the Account Code validation migrates to another server or
voicemail-enabled switch (following the site’s hierarchy). This process helps account code validation to
be more reliable in a multi-site environment.
Review the system wide account code extension and change it if it conflicts with the existing dial
plan.
Change the account code local extension for the Headquarters server.
Add the account code local extension to the DVS.
Add the account code local extension to the voicemail-enabled switch.
Change users’ call permissions to restrict outbound external calls.
2. In the navigation pane, click Administration > System > Dialing Plan > Systems Extensions.
3. Under Account codes, in the Extension field, type the new system-wide account code extension.
4. Click Save.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
The General tab in the details pane displays parameters for the Headquarters server.
5. In the Account code local extension field, type the new account code local extension for the
Headquarters server.
6. Click Save.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. In the Name column, click the name of the desired distributed voicemail server.
The General tab in the details pane displays parameters for the server.
5. In the Account code local extension field, type the account code local extension for the server.
6. Click Save.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. In the Name column, click the name of the desired voicemail switch (50V or 90V).
The General tab in the details pane displays parameters for the voicemail switch.
5. In the Account code local extension field, type the account code local extension for the server.
6. Click Save.
Once the system has been configured to validate account codes, the Mitel Connect system
administrator must restrict the users’ call permissions so that outbound external calls are not
permitted. See Call Permissions on page 381 for details.
If the user repeatedly dials an incorrect account code, and the Mitel Connect system administrator has
configured the caller’s user group such that it is mandatory to enter an account code (Forced), the call
will be dropped.
If the user repeatedly dials an incorrect account code, and the Mitel Connect system administrator has
configured the caller’s user group such that it is optional to enter an account code (Optional), the call
will proceed to the external number, but it will not be recorded in the database and made available to
Account Code reports.
A user answers a BCA call by pressing a IP phone button that is assigned to a BCA call stack position.
Calls to a BCA occupy distinct call appearance buttons and are identified by their position in the call
stack. IP phone buttons that answer calls are configured to handle calls to a specific call stack position
of a BCA. A button can be programmed for each position in the call stack.
User One has one button that answers calls from Stack Position #1.
User Two has one button that answers calls from Stack Position #2.
User Three has three buttons configured to answer BCA calls. The first button answers calls to
Stack Position #1, the second button answers calls to Stack Position #2, and the third button
answers calls to Stack Position #3.
The first incoming call to the BCA arrives on Stack Position #1. User Two cannot answer this call. A
second call to the BCA will arrive on Stack Position #2 if the first call is still active. User One cannot
answer that call. User Three is the only user that can answer calls that arrive on Stack Position #3.
When a call stack position on a BCA receives a call, the button on each phone configured for that stack
position flashes green to indicate an incoming call. When the call is answered, the LED on the phone
of the person that answers it turns solid green while the other BCA stack buttons are red (without BCA
conferencing) or orange (when BCA Conferencing has been enabled for the BCA).
A user places a call from a BCA by pressing a programmed IP phone button. The LED on the
outbound caller's phone becomes solid green, and the buttons associated with the BCA stack position
on all other phones become solid red. If the call is placed on hold, the button LED for the applicable
call stack position on all phones indicates a call on hold.
Pressing the top-most BCA custom button for outbound calls does not necessarily access trunk 1. No
one-to-one correlation exists between the custom buttons programmed for BCA extensions and a
particular trunk. The system administrator can associate trunks with BCA extensions through a variety
of approaches.
A caller ID number can be associated with a BCA. The following rules determine which caller ID
number is displayed at the far end for an outbound BCA call:
Outbound to an internal extension – one of the following is sent, depending on the configuration of
the Call Control Options (see Call Control Options Parameters on page 345 for more information):
The name and number of the user that initiated the BCA call. If the user’s extension is private,
the caller ID is blank.
The name and extension of the BCA. If the BCA extension is private, the caller ID is blank.
Outbound to an external number – the system sends the first number in the following list that is
available:
Outbound caller ID number that is assigned to the BCA
DID number assigned to the BCA
External identification or caller ID number of the user who initiates the BCA call
Outbound to an external emergency number (such as 911) – the emergency identification or the
user’s CESID number is sent.
The system can be configured to display the caller ID on inbound calls. It can also be configured to
enable, disable, or delay inbound call ringing.
2. In the navigation pane, click Administration > Features > Call Control > Bridged Call
Appearances.
The Bridged Call Appearances page is displayed. For descriptions of the columns in the list pane
on the Bridged Call Appearances page, see Table 80.
2. In the navigation pane, click Administration > Features > Call Control > Bridged Call
Appearances.
To edit an existing BCA, click the name of the BCA in the list pane.
To create a copy of an existing BCA, click Copy.
To create a new BCA, click New.
The General tab in the details pane displays parameters for the new or existing BCA.
4. Review the parameters on all of the tabs in the details pane, and specify values as appropriate.
For more information about all of the BCA parameters on the various tabs of the details pane, see
BCA Parameters on page 294.
5. Click Save.
BCA Parameters
A bridged call appearance has many details. You configure BCA parameters on the following tabs,
which you can access on the details pane for a particular BCA:
General Tab
General information about new and existing BCAs is provided on the General tab in the details pane of
the Bridged Call Appearances page.
Table 81 describes the parameters on the General tab of the Bridged Call Appearances page.
Enable DID
DID Range
DID number
Enable DID Select this check box to authorize a BCA to use a DID
number.
The name and number of the user that initiated the BCA
call. If the user’s extension is private, the caller ID is
blank.
DNIS Tab
Table 82 describes the parameters on the DNIS tab of the Bridged Call Appearances page.
2. In the navigation pane, click Administration > Features > Call Control > Bridged Call
Appearances.
3. In the list pane, select the check box for each BCA you want to include in the bulk edit.
The Bulk Edit tab in the details pane displays the Switch parameter for editing.
6. In the Switch list, select the switch to assign all selected BCAs to.
7. Click Save.
8. Click the Results tab to check the status of the bulk edit operation.
Note
IP phone buttons can also be configured so that a BCA call is answered when the user lifts the
handset or presses either the speaker or headset button.
2. In the navigation pane, click Administration > Users > Programmable Buttons.
3. In the First Name column, click the name of the user you want to configure BCA answer options
for.
The IP Phone Buttons tab in the details pane displays parameters for the user’s IP phone buttons.
4. Select the subtab for the device the user will use to answer BCA calls; IP Phones or Button Box.
5. In the first column for the button to configure, select All or Telephony.
7. In the Long Label and Short Label fields, type a label to appear next to the button on the phone
LED display to remind the user of the button’s function.
For details about phone button labels, see Configuring Programmable Buttons through
Connect Director on page 267.
8. In the Extension field, type the BCA extension to assign to the button.
9. In the Call stack position list, select the individual calls to the BCA extension that the IP Phone
Button can access.
10. In the Ring delay before alert list, select one of the following:
None - to start ringing the phone audibly on the first ring.
1, 2, 3, or 4 - to ring the phone silently for the selected number of rings before ringing the
phone audibly.
Don’t Ring - to not ring the phone audibly.
11. Under Show caller ID on monitored extensions, select one of the following:
Select the Enable Auto-Answer When Ringing check box to enable the user to answer a
BCA call by picking up the handset, hook-flashes, or by pressing the programmed IP phone
button, speaker button, headset button, or an unused call appearance button.
Clear the Enable Auto-Answer When Ringing check box to enable the user to answer a
BCA call only by pressing the programmed IP phone button or the Answer button.
13. Under No connected call action, select one of the following ringdown behavior options for the
BCA button:
For more information about configuring ringdown, see Configuring Automatic Ringdown
Circuits on page 359.
Bridged Call Appearances are set up to be private by default, so a BCA or SCA user with a call in
progress cannot be joined by other BCA users on the same extension. However, the default setting
can be changed to allow others to join, and an override on the phone lets the owner of the call lock or
unlock the conference regardless of the default.
When a call is made to the BCA line, the flashing orange BCA button turns green when the user
answers the BCA call. Other BCA users see either of the following on this line:
A solid orange LED if conferencing is allowed: If the button is orange, the BCA user can press the
button to join the BCA call in progress.
A solid red LED if conferencing is disallowed: If the button is red, users cannot join the active BCA
call unless the owner of the call presses the Unlock button on his or her phone.
With permission, a BCA user can join the active BCA call by pressing the orange BCA button on the
phone. Figure 14 on page 301 shows that other BCA users have joined a BCA call. In Figure 14, note
that the caller directly connects to the original BCA users’ IP phone. The phone of each additional BCA
user is transferred to a voice switch with available Make Me Conference ports that directly connects
each additional BCA user.
When the BCA line is ringing, the BCA button programmed on each IP Phone blinks green.
The first user who picks up the line sees a solid green button labeled for the BCA.
Other users of the BCA see either an orange or red button, as follows:
If the button is orange, the user can press the button to attempt to join the call. If enough Make
Me Conference ports are available and the maximum number of allowed conferenced parties
has not been reached, the user is added to the active bridged call.
If the BCA button is red and the user presses the button, an error message displays on the
phone and the user is not able to join the conference call.
The SCA user always owns the conference call and can decide when other BCA users are admitted to
the conference. An SCA user can override the default privacy setting by toggling the Lock/Unlock soft
key on the phone. The text above the soft key describes the action to be applied to the active call; the
soft key text label toggles between Lock and Unlock. For example, to make the call private, the user
with the call presses the Lock soft key. To make the call available for conferencing, the user presses
the Unlock soft key.
Note
SCA users are differentiated in the Bridged Call Appearances list pane using the format <first
name>_<last name>_<extension>, where the following is true:
2. In the navigation pane, click Administration > Features > Call Control > Bridged Call
Appearances.
To edit an existing BCA or SCA user, click the name of the BCA or SCA user in the list pane.
To create a copy of an existing BCA or SCA user, click Copy.
To create a new BCA, click New.
The General tab in the details pane displays parameters for the new or existing BCA or SCA user.
Other parties can’t join (default) - to prevent other users of the BCA from joining active BCA
conference calls.
Other parties can join - to initially allow other users of the BCA to join active BCA conference
calls.
6. Select the Provide tone when parties join check box to play a tone whenever a party joins the
BCA conference.
7. Click Save.
8. Program an IP phone button for the BCA for each of the appropriate IP phones.
For more information about assigning the BCA to IP phone buttons, see Configuring an IP Phone
Button for a BCA Extension on page 297.
9. Configure the appropriate number of Make Me Conference ports on a voice switch that is available
to the site.
For telephone conferences, the SCA user and assistant have the following:
BCA conferencing
Blind conferencing
Regular conferencing abilities that all IP phone users have
BCA conferencing allows an assistant or executive to set up conference calls so that when the
executive is ready he or she can enter the conference by pressing the SCA button on the IP phone.
The assistant can stay in the conference, leave the conference, or be locked out of the conference by
the executive.
SCA relies on BCA as an underlying technology to support its functionality. All IP phone models except
IP420, IP420g, IP115 and IP110 support SCA. Analog phones do not support SCA.
In Connect Director, an aBCA is specified in the Edit User page instead of the Bridged Call
Appearance page.
Non-Conference Functionality
When a regular user is enabled for SCA, the system automatically creates an associated BCA (aBCA)
and gives it an aBCA extension number.
Nearly all the BCA parameters that could be selected for the regular BCA user are fixed. Only the label
for each SCA button can be specified.
The settings for SCA IP programmable buttons are fixed at the following values:
The SCA call stack positions are automatically set and not manually configurable in Connect Director.
However, call stack positions are automatically reordered if a button is specified to be other than an
SCA. The SCA buttons are reconfigured around the new button type.
Note
For a button box, the system does not auto-shift call stack positions.
When a regular user is enabled for SCA, each regular call appearance converts to an SCA. Standard
call appearances do not exist for the SCA user, and no SCA button can be converted back to a regular
call appearance unless the SCA configuration is removed by disabling SCA.
BCA Conferencing
The BCA conference parameters are configured on the Bridged Call Appearances page. For
information about setting up BCA conferencing, see Enabling BCA Conferencing for BCA and SCA
Users on page 301.
When SCA is enabled for a user, the system automatically creates and numbers an associated BCA
(aBCA) for the SCA. If SCA is disabled for the user or the user is deleted, the aBCA for the user is
automatically deleted.
The tasks required for enabling SCA for a user are as follows:
1. Create the new regular user account that is intended for the SCA user. For information about
adding users, see Adding or Editing a User on page 391.
2. Convert the new user to an SCA (executive) user by enabling SCA. For information about creating
a new SCA user, see Creating a New Executive User on page 305.
3. Configure the IP phone buttons that the SCA user’s account calls for. For information about
configuring IP phone buttons for BCA, see Configuring an IP Phone Button for a BCA Extension
on page 297.
4. Enable BCA conferencing. See Enabling BCA Conferencing for BCA and SCA Users on page 301
5. Program IP phone buttons on the assistant user’s device for the aBCA associated with the SCA
(executive) user. See Programming an Assistant’s IP Phone Button for aBCA on page 307.
Note
If the executive and assistant need to manage SCA calls in Connect client, the Access License for
each of these users must be Operator.
To edit an existing user, click the name of the user in the list pane.
To create a copy of an existing user, click Copy.
To create a new user, click New.
The General tab in the details pane displays parameters for the new or existing user.
4. In the First name and Last name fields, type the first and last name of the new user.
5. In the Access license list, select Professional or Operator. Connect client requires the Operator
license to display the BCA Window.
6. In the Primary phone port section, select IP phone, and then select the specific phone in the
drop-down list.
Note
If an IP phone model of sufficient capability is not recognizable in the list of MAC addresses, the
correct phone can be determined by matching the IP phone model number to a MAC address on
the Telephones page in Connect Director (Administration > Telephones > Telephones).
7. Click Save.
Note
Before enabling SCA for a new user, the system administrator must save the user parameters
after entering the basic user parameters. The Enable SCA check box becomes active only after
this intermediate save.
10. Optional: Type a different associated BCA extension in the Enable shared call appearances
field.
The next available extension number is automatically generated when shared call appearances is
enabled. If the system administrator has an organized scheme for extension numbers, manual
entry of the extension number may be desired. Manually entering the extension can also be
valuable in case an auto-generated number is outside the number management scheme.
Note
A number must be deemed acceptable before saving the SCA parameters. After the SCA
parameters have been saved, the associated BCA extension can only be changed by first
disabling and then again enabling SCA for the user.
11. In the Call stack depth field, type a value for the depth of the call stack.
This is the number of SCA buttons that the executive has. This number is subsequently reflected
on the IP Phones subtab of the IP Phone Buttons subtab for programming IP phone buttons. The
system default is 8, but some planning for resource usage is recommended. For example, some
executives might need only two or three SCA buttons while others might need eight or more, and
planning should have been completed for button boxes and how many executives one assistant
might have to support.
13. In the navigation pane, click Administration > Users > Programmable Buttons.
14. In the First Name column, click the name of the user you just created.
The IP Phone Buttons tab in the details pane displays parameters for the user’s IP phone buttons.
15. Select the subtab for the device the user will use to answer SCA calls; IP Phones or Button Box.
16. In the Long Label and Short Label fields for each SCA button, type a label to appear next to the
button on the phone LED display.
All other parameters are fixed for an SCA button. However, you can also program non-SCA
buttons for other functions, such as speed dial, hotline, and so on.
The executive account has been created, but conferencing and default privacy settings for the SCA
user still need to be configured. To configure the conference-related details for the SCA user, see
Enabling BCA Conferencing for BCA and SCA Users on page 301.
Note
Making all the executive’s call appearances visible to the assistant is not required. If an executive
wants one or more lines to be hidden from the assistant, the administrator omits the requested number
of hidden lines from the assistant’s configuration.
For complete information about programming an IP phone button for a BCA, see Configuring an IP
Phone Button for a BCA Extension on page 297.
Note
The No Answer Number of Rings and Call Forward Destination parameters reflect the initial
values of these parameters. However, the real-time state of these parameters can change, based
on the activity of the user. For a regular BCA user, these parameters are editable in the BCA
window in Connect Director. In contrast, for an SCA user (tied to an aBCA), these parameters are
grayed out in the window because the SCA user inherits the parameters when the system creates
the aBCA. Thereafter, if the SCA user is changing these parameters in real time, the changes are
actually inherited in the aBCA, but the BCA page in Connect Director is not updated to reflect the
changes. Put another way, Connect Director continues to reflect the initial value of these two SCA
parameters.
Note
When an executive extension is routed to a phone that does not have programmable buttons, the
executive extension behaves as a normal extension. Eventually, when the executive’s calls are routed
to a phone with programmable buttons, the behavior of the extension reverts back to an executive
extension.
The Bridged Call Appearance Monitor is available in Connect client only if the Access License for the
user is Operator.
In Connect client, because calls are tracked as BCA calls in the BCA monitor window, the active call
cell disappears when a call is put on hold, and the held call can be viewed only in the BCA monitor
window.
aBCA is hidden in the phone directory list so that users do not accidentally call an aBCA instead of the
executive. However, as with regular BCAs, the system administrator can configure an aBCA as the
destination of a trunk group or the targeted extension of a programmable button function. The system
administrator has the discretion to decide how to use aBCA.
Placing an executive extension call on hold parks the call on the aBCA. Held calls on an executive
extension are viewable in the Bridged Call Appearance Monitor in Connect client or in the IP phone
display.
Assistant Users
Assistant accounts need no special configuration for the monitoring of the executive’s call
appearances other than the assignment of programmable buttons for IP phones. However, for
monitoring of executive call appearances in Connect client, the assistant’s Access License must be
Operator.
Hotline
A typical SCA setup includes a hotline circuit between an executive and assistant. They use a hotline
circuit to communicate requests, responses, and status of calls.
To land a call on a hotline button for intercom or speed dial, both parties must have a hotline-
programmed button. In the absence of this programming, the offered call is processed as a regular
call.
Hotline calls and Extension Monitor calls to an executive extension that are picked up are not bridged.
For details on how to configure a hotline button, see Copying Programmable Button Configurations on
page 267.
Note
A hotline intercom call uses the intercom permissions of the user. Therefore, the rules that apply to
that user’s regular intercom also apply to a hotline-intercom call.
1. The inbound call triggers a flashing orange light on the IP phone of both the assistant and the
executive. If the Access License of the executive and assistant is Operator, Connect client also
signals the incoming call. (The executive can pick up the call and preempt the assistant’s
involvement with the call.)
2. The assistant answers the call on the flashing BCA button and can, for example, get the caller’s
name and purpose.
Note
The executive call timer is reset if the executive puts the call on hold.
4. The assistant presses the hotline button shared with the executive.
5. The assistant tells the executive of the call in progress (on hold) and gives pertinent information
about the call.
6. The executive picks up the call by pressing the flashing orange SCA button.
Note
Internal users who call an executive see the called party ID aBCA while the phone is ringing and
the actual executive number after the call is picked up.
1. The assistant accesses one of the executive’s call appearances by pressing an appropriate IP
phone or Connect client button.
5. The assistant tells the executive of the call in progress (on hold) and provides information about
the call as needed.
6. The executive picks up the call by pressing the flashing orange button that the assistant has
identified.
Note
An executive extension’s redial list shows only outbound calls.
3. The assistant determines that the executive is on a call and wants the second party to join the
executive's call.
4. The assistant hotlines the executive to say that the second party is on the line and ready to join the
call.
5. The hotline call ends, and the executive is connected back to party one, and the assistant is
connected back to party two.
6. The assistant initiates a conference and selects the executive's call into which party two must join.
After the conference connection is completed, parties one and two are in the same call.
4. The assistant hotlines the executive to say that party two is ready to join.
5. The assistant adds party two by initiating the blind conference and then pushing the button for the
executive’s active call appearance.
The right to use Silent Coach is set by the system administrator. The system administrator also
specifies the users (recipients) whose calls the initiator can monitor. A Telephony Class of Service
(COS) assigns Silent Coach rights. Silent Coach can be initiated through various IP Phone models or
through Connect client.
Silent Coach lets the initiator switch between Silent Monitor, Barge In, and Silent Coach functions
for the same call.
Silent Coach sessions can be initiated through IP Phone or Connect client programmable buttons,
Connect client menu options, and star code calls from other calling devices.
The initiator of a Silent Coach session can change the session to a Silent Monitor or Barge In
session. Silent Monitor sessions can be changed into a Silent Coach sessions.
The recipient can place the original call on hold to engage in a two-way conversation with the
Silent Coach initiator. At the end of this conversation, the user can resume or terminate the original
call.
Silent Coach cannot be initiated with users who are on conference calls.
A call with an active Silent Coach session cannot be transferred or converted to a conference call.
Note
The following devices do not support session transitions, coach consulting, or coach resumption.
Analog phones
IP110
2. In the navigation pane, click Administrator > Users > Class of Service > Telephony Features
Permissions.
To edit an existing set of telephony features, click the name of one of the preconfigured COS
profiles (Fully Featured, Minimally Featured, or Partially Featured).
In the details pane, the Telephony Features Permissions page for the new or existing class of
service is displayed.
5. Click Save.
2. In the navigation pane, click Administration > Features > Call Control > Options.
2. In the navigation pane, click Administration > Users > Programmable Buttons.
3. In the list pane, click the name of the user that you want to allow to initiate the silent coach feature.
The IP Phone Buttons tab in the details pane displays parameters for the selected user.
6. In the first column for the button to configure, select All or Telephony.
8. In the Long Label and Short Label fields, type a label to appear next to the button on the phone
LED display.
For details about phone button labels, see Configuring Programmable Buttons through
Connect Director on page 267.
9. Optional: To program the button to monitor the calls of a specific user, type the user’s extension in
the Extension field.
Note
If an extension is not supplied, the initiator is prompted to enter an extension number to monitor
each time the button is pressed.
2. In the Contact card, click Advanced Call Menu drop-down next to the green call icon.
2. Select Silent Coach option to add the silent coach option as a programmable button in the toolbar.
Note
If the button specifies a Silent Coach recipient, the system immediately initiates a Silent Coach
session with that user. Skip the remaining steps.
If the button does not specify a Silent Coach recipient, Connect client displays the Silent Coach
dialog box. In this case, continue to the next step.
Click Advanced Call Menu drop-down next to the green call icon and select Monitor or Barge In
option.
If the button specifies a Silent Coach recipient, the system immediately initiates a Silent Coach
session with that user.
If the button does not specify a Silent Coach recipient, enter the recipient’s name or number in the
Telephone User Interface.
IP phones display soft key options while a Silent Monitor option is active.
The soft key options available to the Silent Coach recipient are as follows:
Consul: Places the active call on hold and establishes a two-way voice path with the Silent Coach
initiator.
While the recipient consults with the initiator, soft key options include:
Resume: Restarts the recipient’s original call.
Show: Displays all of the call participants.
HangUp: Terminates the call.
Tip
Be aware that configuring a hunt group to simultaneously ring all members may introduce short, but
unexpected delay from the caller's perspective. Refer to the Delay in Audio Up To 2 Seconds for Hunt
Group Calls is Considered Normal article on the Mitel support site for additional hunt group
considerations that may ensure more efficient use of this feature.
You can have up to 8 hunt groups on a switch. Each individual hunt group can have up to 16
members, and each hunt group can have a call stack of 16. The maximum number of members
across all groups on the switch is 16.
Tip
Consider that the maximum group and member values listed here are subject to the overall capacity of
the switch and must take into consideration all other features that use switch resources. Refer to the
formulas in the Real Time Capacity section of the Mitel Connect Planning and Installation Guide for
more information about how switch resources are calculated.
Note
Other hunt groups can be added as hunt group members, but this is not recommended due to the
possibility of creating call flow loops, other errors, and potential system instability. However, you can
use another hunt group extension as the call stack full destination.
Rather than being reliant on the Headquarters server, a hunt group can be assigned to the switch
closest to the agents and/or trunks associated with it. The switch controls the hunting, with no
dependency on the server. Hunt groups have an extension number and, optionally, can also have a
DID and/or DNIS number. They can be call forward extensions for users, workgroups, route points,
personal assistants, site fax redirect extensions, site operator extensions, and the target for trunk
groups. They are also allowed as the backup destination for workgroups and route points. This can be
useful to allow some basic call routing when the workgroup server is not reachable.
The caller ID displayed for a hunt call is the external caller’s ID.
A user may belong to more than one hunt group. In addition, a user assigned to a workgroup may also
be assigned to hunt groups. Each call is hunted as a new call; that is, if the hunt mode is top down,
each new call begins hunting from the top of the list. In this case, the person at the top of the list will
get most of the calls.
2. In the navigation pane, click Administration > Features > Call Control > Hunt Groups.
The Hunt Groups page is displayed. For descriptions of the columns on the Hunt Groups page, see
Table 83.
2. In the navigation pane, click Administration > Features > Call Control > Hunt Groups.
To edit an existing hunt group, click the name of the hunt group in the list pane.
To create a copy of an existing hunt group, click Copy.
To create a new hunt group, click New.
The General tab in the details pane displays parameters for the new or existing hunt group.
4. Review the parameters on all of the tabs in the details pane, and specify values as appropriate.
For more information about all of the hunt group parameters on the various tabs of the details
pane, see Hunt Group Parameters.
5. Click Save.
General Tab
General information about new and existing hunt groups is provided on the General tab in the details
pane of the Hunt Groups page.
Table 84 describes the parameters on the General tab of the Hunt Groups page.
Enable DID
DID Range
DID number
Enable DID Select this check box to authorize a hunt group to use a
DID number.
DID Range If a hunt group is authorized for a DID, in the drop-down list
select a DID range for the hunt group.
Top Down starts with the first member in the member list
and sequentially searches through the list until an
available member is found.
Members Tab
On the Members tab of the Hunt Group page, you can add and remove members from a hunt group
and change the order of the member list.
Table 85 describes the parameters on the Members tab of the Hunt Group page.
2. In the navigation pane, click Administration > Features > Call Control > Hunt Groups.
To edit an existing hunt group, click the name of the hunt group in the list pane.
To create a copy of an hunt group, click Copy.
To create a new hunt group, click New.
The General tab in the details pane displays parameters for the new or existing hunt group.
To add a member to the hunt group, select the member in the Available list and click the right
arrow button to move the member to the Selected list.
To remove a member from the hunt group, select the agent in the Selected list and click the
left arrow button to move the member to the Available list.
6. Click Save.
If the call distribution pattern is Top Down, the position of the member in the hunt group list can affect
how likely that member is to receive an incoming call.
When Top Down is selected, it is more likely that members closer to the top of list will be selected to
receive a call. This is because for each new call, the hunt for a free member always begins at the top
of the list.
For information about changing the call distribution pattern, see General Tab on page 318.
2. In the navigation pane, click Administration > Features > Call Control > Hunt Groups.
To edit an existing hunt group, click the name of the hunt group in the list pane.
To create a copy of an existing hunt group, click Copy.
To create a new hunt group, click New.
The General tab in the details pane displays parameters for the new or existing hunt group.
5. Select the member to move in the Selected list, and then do one of the following:
6. Click Save.
DNIS Tab
Table 86 describes the parameters on the DNIS tab of the Hunt Groups page.
2. In the navigation pane, click Administration > Features > Call Control > Hunt Groups.
3. In the list pane, select the check box for each hunt group you want to include in the bulk edit.
The Bulk Edit tab in the details pane displays the Switch parameter for editing.
6. In the Switch list, select the switch to connect all selected hunt groups to.
7. Click Save.
8. Click the Results tab to check the status of the bulk edit operation.
The state of the hunt group can be changed to busy or normal from a telephone or from the Switches
Maintenance page in Connect Director.
Note
After a switch reboots, the hunt group returns to a normal state and is
3. In the list pane, click the switch that handles the hunt group.
The Status tab in the details pane displays current status information for the switch.
4. In the Hunt Groups section, select the check box for the hunt group you want to set as busy.
6. Click Apply.
Disk space usage of MOH files is shown on the Voice Mail Maintenance page in Connect Director.
The play time of the MOH is tracked for each call. When a caller is placed on hold, they will hear the
MOH resource from the beginning. If the caller is taken off hold and put back on hold, the MOH file is
paused and starts again where it left off.
For information about configuring file-based MOH for application servers and Voice Mail Model
Switches, see Specifying Root and Administrator Passwords for CLIs on page 177.
Note
The maximum size for a MOH file is 6835 KB. Files larger than 6835 KB cannot be distributed to the
DVS servers.
2. In the navigation pane, click Administration > Features > Music on Hold > Files.
To edit an existing MOH resource, click the name of the MOH resource in the list pane.
To add a new MOH resource, click New.
The General tab in the details pane displays parameters for the new or existing MOH resource.
6. Navigate to and select the file to add as a MOH resource, and then click Open.
7. Click Save.
2. In the navigation pane, click Administration > Features > Music on Hold > Files.
4. Click Delete.
2. In the navigation pane, click Administration > Features > Music on Hold > Files.
The General tab in the details pane displays parameters for MOH resource.
4. Click Play.
For environments that have an overhead paging system, paging groups can be used to target your
message to a select group of individuals within the organization while not exposing the message to
everyone in the building, as would happen with an overhead page.
Note
Group paging is an alternative to calling a paging number. Auto-Attendant can support group paging
for internal users (if group paging meets the customer’s paging needs). Group paging is not available
to external callers.
3. The paging group server attempts to play the message on each affected extension.
Note
To reduce the possibility of an audio delay when paging multiple phones in the same room, the
Mitel Connect system waits to verify that all affected extensions are ready to receive the page.
This delay period is specified in the group paging group parameters. See Hunt Group Parameters
on page 318 for more information.
When a paging message is delivered to an IP phone or analog phone that is on an active call, the
page is treated as a normal call.
Note
If priority paging is enabled, the page is handled differently. See Priority Paging on page 332 for
more information.
The maximum number of extensions that can be paged at one time is 100.
2. In the navigation pane, click Administration > Features > Call Control > Paging Groups.
The Paging Groups page is displayed. For descriptions of the columns on the Paging Groups page,
see Table 87.
Note
You can use the Bulk Edit feature to change the group paging server for multiple paging groups at the
same time. See Bulk Editing Paging Groups on page 330 for more information.
2. In the navigation pane, click Administration > Features > Call Control > Paging Groups.
To edit an existing paging group, click the name of the paging group in the list pane.
To create a copy of an existing paging group, click Copy.
To create a new paging group, click New.
The General tab in the details pane displays parameters for the new or existing paging group.
4. Review the parameters and specify values as appropriate. For descriptions of the paging group
parameters, see Paging Group Parameters.
5. Click Save.
2. In the navigation pane, click Administration > Features > Call Control > Paging Groups.
3. In the list pane, select the check box for each paging group you want to include in the bulk edit.
The Bulk Edit tab in the details pane displays the Group paging server parameter for editing.
6. In the Group paging server list, select the server to host all selected paging groups.
7. Click Save.
8. Click the Results tab to check the status of the bulk edit operation.
A paging extension is an extension that sends a page announcement to a site’s overhead paging
system when a user calls that extension. For information about configuring paging extensions, see
Adding or Editing a Paging Group on page 328.
By adding a paging extension to a paging group, a user can broadcast a message to both of the
following at the same time:
Adding multiple paging extensions to an extension list provides the ability to broadcast a message to
the overhead paging system of multiple sites simultaneously.
Multi-Site Paging
The distributed nature of business often requires that business tools available to employees in the
corporate headquarters also be available to remote office workers. One such business tool is a paging
system. Many businesses need to have a quick way to alert employees that a customer needs
assistance or that a call is waiting.
The Multi-site Paging Group feature allows employees to be paged in each remote office in an efficient
manner. Multi-site Paging Groups is a Mitel enhancement that improves paging efficiency by allowing
the audio for the page to be recorded and sent from a local Voicemail Server. This reduces any impact
on WAN bandwidth for pages made within the Headquarters and the remote offices including any
dependency on the Headquarter server.
The Multi-site Paging Group feature allows users to pick up a phone and dial a single system
extension to page a group of telephones. With Multi-site Paging Groups, the administrator can now
configure local paging extensions for each site.
The Multi-site Paging Group functionality can be implemented on the Headquarters Server and
Distributed Voice Mail Servers. This feature is configured in a similar manner to the Paging Group
feature implemented in previous releases.
Note
Group paging is not available on voicemail-enabled switches.
Figure 15 shows a two-site implementation where each site has a Paging Group. With Multi-site
Paging Groups, both pages are recorded and sent by their local server with no impact on WAN
bandwidth.
Note
There is no additional licensing requirement to implement Multi-site Paging Groups. This feature is not
implemented on voicemail-enabled switches.
Priority Paging
Many organizations rely on paging for critical communications with their employees. However, paging
messages that are sent to an IP phone from a paging server typically appear as normal or non-urgent
calls when the phone is in use. In these instances, the individual using the phone has no indication of
the priority of the page. Because of this, there is no guarantee that the individual will suspend the
current call to listen to the message being delivered.
Note
When priority paging is enabled, recipients of a paging message hear the audio of the page whether
or not they are on a call. If the intended recipient is on an active call, that call is automatically placed
on hold before the page is played. When the page completes, the call automatically resumes.
Normally, a user can press Hold/Transfer/Conference to end a page call. When priority paging is
enabled for a paging group, the system does not allow a user to end a page call in this way and the
operation is ignored.
Priority paging allows the server to act as a media relay from the source to the recipient. The call
controller or the switch plays a limited role.
Note
The priority paging feature provides new functionality to the page recipient. There are no changes in
the core paging implementation.
Important Considerations
When a previously held call is restored, the audio path of the original call is retained. However, in a
special case—when the page is over a speaker phone and the user decides to “cradle” the
handset, for example—the audio path is not restored to the previous audio path. The audio path
would be speaker phone. This exception is for Handset only—the headphone should work as
expected. The problem with Handset is that, today’s IP Phones are not notified when the user puts
the handset in the cradle (and is on speaker).
Page-over-page is not supported. For example, if you issue a priority page to an extension while
the extension is already being paged, the page is presented as an incoming call. This is because
priorities for page groups are not set. In other words, if priorities were assigned to page groups, a
page-over-page would result in a lower priority page being put on hold and the higher priority page
being answered automatically.
Other paging group limitations apply. SIP/Analog/OAE pages will still be delivered, but the calls
cannot be answered automatically.
Similarly, if she is out of the office and her phone rings, anyone can answer the call from another
phone in the pickup group and take a note for her.
Note
This feature is not supported on T1 or E1 switches for either the SG or the ST-generation switches.
Users are added to a pickup group using an extension list. Users are added to the extension list and
then the extension list is associated with a pickup group. For information about creating extension lists,
see Extension Lists on page 426.
The user whose extension will be picked up must belong to a user group with the COS telephony
feature Allow call pickup enabled.
Note
A single switch can host a combined total of up to 24 hunt groups, bridged call appearances, and
pickup groups.
The number of members assigned to all pickup groups on a single switch cannot exceed 80
IP phone – A button on the IP phone must be configured for pickup groups. To answer a call, the
user presses the pickup group button, or key, and then enters the pickup group extension.
Analog phone – To answer a call, the user presses *13 on the keypad, then enters the pickup
group extension.
Connect client – A button in Connect client must be configured for pickup groups or with a specific
pickup group extension. To answer a call, the user does one of the following (depending on the
configuration of the button.
Presses the pickup group button, and then enters the pickup group extension
Presses the button that is configured with the pickup group extension
2. In the navigation pane, click Administration > Features > Call Control > Pickup Groups.
The Pickup Groups page is displayed. For descriptions of the columns on the Pickup Groups page,
see Table 89.
Note
You can use the Bulk Edit feature to change the switch for multiple pickup groups at the same time.
See Bulk Editing Pickup Groups on page 336 for more information.
2. In the navigation pane, click Administration > Features > Call Control > Pickup Groups.
To edit an existing pickup group, click the name of the pickup group in the list pane.
To create a copy of an existing pickup group, click Copy.
To create a new pickup group, click New.
The General tab in the details pane displays parameters for the new or existing pickup group.
4. Review the parameters and specify values as appropriate. For descriptions of the pickup group
parameters, see Pickup Group Parameters.
5. Click Save.
2. In the navigation pane, click Administration > Features > Call Control > Pickup Groups.
3. In the list pane, select the check box for each pickup group you want to include in the bulk edit.
The Bulk Edit tab in the details pane displays the Switch parameter for editing.
6. In the Switch list, select the switch to host all selected pickup groups.
7. Click Save.
8. Click the Results tab to check the status of the bulk edit operation.
2. In the navigation pane, click Administration > Features > Call Control > Route Points.
The Route Points page is displayed. For descriptions of the columns on the Route Points page, see
Table 91.
2. In the navigation pane, click Administration > Features > Call Control > Route Points.
To edit an existing route point, click the name of the route point in the list pane.
To create a copy of an existing route point, click Copy.
To create a new route point, click New.
The General tab in the details pane displays parameters for the new or existing route point.
4. Review the parameters on all of the tabs in the details pane, and specify values as appropriate.
For more information about all of the route point parameters on the various tabs of the details
pane, see Route Point Parameters.
5. Click Save.
General Tab
Enable DID
DID Range
DID number
Enable DID Select this check box to authorize a route point to use a
DID number.
DID Range If a route point is authorized for a DID, in the drop-down list
select a DID range for the user.
View System Directory for DID usage Click this link to view the System Directory page, with
directory details for this route point.
DID number Specifies the DID number for the route point.
Routing Tab
Information about call routing features for routing points is provided on the Routing tab in the details
pane of the Routing Points page. Routing is configured separately for different schedules using the
schedule subtabs. The Routing tab includes the following subtabs:
On-Hours
Off-Hours
Holiday
Custom
For information about configuring schedules, see Chapter 16, Configuring Schedules on page 489.
Table 93 describes the parameters on the Routing tab of the Workgroups page.
Mailbox Subtab
Table 94 describes the parameters on the Voice Mail tab and Mailbox subtab of the Route Points
details pane.
Table 94: Route Points Page: Voice Mail Tab, Mailbox Subtab
Parameter Description
Accept broadcast messages Select this check box to allow the user to receive broadcast
messages. This is enabled by default.
Email address Indicates the user’s email address, which was configured
on the General tab of the Users page.
Delivery type Specifies whether and how voice mail messages are sent
through email. Select one of the following options:
Table 94: Route Points Page: Voice Mail Tab, Mailbox Subtab
Parameter Description
Destination Specifies the destination for forwarded voice mail
messages. Select one of the following options:
Table 95 describes the parameters on the Voice Mail tab and Escalation Profiles subtab of the Route
Points details pane.
Table 95: Route Points Page: Voice Mail Tab, Escalation Profiles Subtab
Parameter Description
Escalation notification options Select one of the following options:
Note: This parameter does not apply if you select one of the
Notification by email options.
Step subtabs There is a subtab for each step in a profile; there are a maximum
of 10 steps for each escalation profile.
Table 95: Route Points Page: Voice Mail Tab, Escalation Profiles Subtab (Continued)
Parameter Description
Timeout Specifies the amount of time, in minutes, that elapses before the
next step in the profile is executed. This is the amount of time a
message recipient has to respond to the original voice mail before
escalation occurs.
Urgent only Select this check box to send notification only when the escalation
is determined to be urgent.
Notification by email
Deliver message as email Select one of the following three email delivery options:
Pager
Phone
None
Notification number Specifies the phone or pager number to send notification to.
Pager ID Specifies the pager pin number required to access the recipient.
Pager data Specifies the code the recipient requires to indicate that a page is
waiting.
DNIS Tab
Table 96 describes the parameters on the DNIS tab on the Route Points page.
2. In the navigation pane, click Administration > Features > Call Control > Route Points.
3. In the list pane, select the check box for each route point you want to include in the bulk edit.
The Bulk Edit tab in the details pane displays the Server parameter for editing.
6. In the Server list, select the server to provide route point services for third-party applications for all
selected route points.
7. Click Save.
8. Click the Results tab to check the status of the bulk edit operation.
2. In the navigation pane, click Administration > Features > Call Control > Options.
3. Review the parameters in all areas of the page, and specify values as appropriate. For more
information about all of the call control options parameters Call Control Options Parameters.
4. Click Save.
General Area
Note: This feature only applies when all parties on the call
are on Analog Loop Start trunks.
Overhead paging timeout Select this check box to enable timeout for paging calls.
SIP Area
Table 99: Call Control Options Page: Voice Encoding and Quality of Service Area
Column Name Description
Maximum inter-site jitter buffer Specifies the maximum jitter buffer. A larger jitter buffer
might result in more delay between calling parties, which
might degrade the quality of service.
DiffServ/ToS byte Specifies the DiffServ/ToS for voicemail, workgroup,
account code collection (ACC), and contact center
calls.Value must be a decimal number.
Table 99: Call Control Options Page: Voice Encoding and Quality of Service Area
Column Name Description
Remote IP phone codec list Specifies the codec list to use for remote IP phones.
Notes
Table 100: Call Control Options Page: Call Control Quality of Service Area
Column Name Description
DiffServ/ToS byte Specifies the DiffServ/ToS for call control traffic from/to
switches, servers, and phones. Value must be a decimal
number and should not be greater than the Voice Encoding
and Quality of Service DiffServ/TOS Byte value.
Table 101: Call Control Options Page: Video Quality of Service Area
Column Name Description
DiffServ/ToS byte Specifies the DiffServ/ToS field in the IP Packet Header of
the Video Call payload packet. Value must be a decimal
number.
Users with trunk-to-trunk transfer permission might accidentally initiate a trunk-to-trunk transfer without
realizing it. This can lead to “hung” trunks, resulting in the inability to make outbound calls or receive
inbound calls.
You can use trunk-to-trunk transfer and tandem trunks parameters to eliminate unwanted trunk-to-
trunk transfers while ensuring that valid trunk-to-trunk transfers are not dropped.
Table 102: Call Control Options Page: Trunk-to-Trunk Transfer and Tandem Trunks Area
Column Name Description
Hang up after silence of Select this check box to enable timeout for a silent trunk-to-
trunk transfer.
When monitoring or recording is silent or hidden, Connect client offers no visual or audible
indication that the call is being monitored or recorded.
Note
Mitel does not warrant or represent that your use of call monitoring or recording features of the
Software will be in compliance with local, state, federal or international laws that you may be
subject to. Mitel is not responsible for ensuring your compliance with all applicable laws.
Before disabling the warning tone, you may wish to consult with legal counsel regarding your
intended use.
When DRS is disabled, switches in a system build an internal routing database from the peer-to-peer
communication with other switches. Each switch contains routing information for all endpoints in the
system, including information regarding trunk selection for outbound calls. When calls are placed from
any extension, each switch is able to route the call to the correct switch based on its internal routing
database.
When DRS is enabled, switches only exchange routing information with other switches at the same
site, rather than exchanging routing information with every other switch in a multi-site system. Although
each switch only maintains routing information within its site, each server also includes an instance of
the DRS which maintains system-wide routing information. When calls are initiated, switches contact
the DRS in order to find the switch or switches needed to complete the call.
In a system with more than one server, the switches may contact an alternate instance of the routing
service if the primary instance is not reachable. servers have a hierarchical relationship and switches
first try to contact the nearest instance of the DRS in the hierarchy. If that instance of DRS is not
reachable, the instance of DRS at the parent server in the hierarchy will be contacted. If neither
instance of DRS is reachable, the switch makes a best effort to route the call based on the internal
routing tables built from communicating with peer switches at the same site.
Bandwidth management and codec negotiation tools available through Connect Director include:
Codec Negotiation
Mitel supports simultaneous audio, video, and data codec negotiations to facilitate multimedia
sessions between SIP endpoints (as defined by RFC 3264). Codecs specified in the Supported
Codecs list are offered during session parameter negotiations.
1. The calling device sends the list of codecs it supports to the switch servicing the call.
2. The switch that controls the calling device compiles a codec list. The codec list contains all codecs
contained in the following:
Codecs on the combined list are sorted as specified by the selected site codec list.
3. (Intersite calls only) The switch that controls the destination device modifies the codec list by
removing all codecs that are not listed on the destination site’s codec list.
4. The switch controlling the destination device sends the codec list to the destination device.
5. The destination device replies by sending a list of one or more codecs to the originating device.
This list typically includes the highest priority codec from the received codec list that it can support.
6. The two devices begin sending RTP streams using the highest priority codec listed in the
destination device’s reply.
When Mitel is initially installed, the Supported Codecs list comprises the set of codecs provided by
Mitel and available on IP phones. Although most commonly used codecs are included, administrators
can add more codecs. For example, additional codecs can be added to support SIP devices that may
use codecs not initially provided by Mitel.
The Supported Codecs list also indicates the bandwidth required by each codec. The bandwidth
numbers are used by the Mitel Connect system to allocate bandwidth as voice calls are initiated and
terminated.
The contents of the Supported Codecs list, including the bandwidth settings, are passed to all switches
in the system, where they are used for selecting codecs for individual call sessions.
2. In the navigation pane, click Administration > Features > Call Control > Supported Codecs.
The Supported Codecs page is displayed. For descriptions of the columns on the Supported Codecs
page, see Table 89.
Table 103: Supported Codecs Page: List Pane and General Tab
Column Name Description
Name The fully qualified codec ID string of the codec. Mitel uses
this string to specify codecs while negotiating with other
calling devices.
Note
The default codecs supplied with the Mitel Connect system cannot be edited or deleted.
2. Select Administration > Features > Call Control > Supported Codecs.
To edit an existing codec, click the name of the codec in the list pane.
To create a copy of an existing codec, click Copy.
To create a new codec, click New.
The General tab in the details pane displays parameters for the new or existing codec.
4. In the Name field, enter the fully qualified codec ID string. (This parameter must be entered exactly
as expected by devices that negotiate call parameters.)
Note
Use care when entering the bandwidth for a codec. Entering an incorrect value in this field
compromises Mitel’s ability to manage bandwidth resources.
6. Click Save.
Note
The default codecs supplied with the Mitel Connect system cannot be edited or deleted.
2. Select Administration > Features > Call Control > Supported Codecs.
3. In the list pane, select the check box next to each codec you want to delete.
4. Click Delete.
5. Click OK to confirm.
Codec lists are referenced by sites within a Mitel Connect system to designate the codecs used for
intersite and intrasite voice calls. The Codec Lists page displays all Codec Lists configured in the
system. Mitel provides a group of default codec lists. You can also define additional codec lists through
Connect Director.
The default codec lists provided with the Mitel Connect system are listed in Table 104. The codecs
within each list are in priority order.
2. In the navigation pane, click Administration > Features > Call Control > Codec Lists.
The Codec Lists page is displayed. For descriptions of the columns on the Codec Lists page, see
Table 89.
Note
The default codec lists supplied with the Mitel Connect system cannot be edited or deleted.
2. In the navigation pane, click Administration > Features > Call Control > Codec Lists.
To edit an existing codec list, click the name of the codec list in the list pane.
To create a copy of an existing codec list, click Copy.
To create a new codec list, click New.
The General tab in the details pane displays parameters for the new or existing codec list.
4. To edit the codec list description, type a new description in the Description field.
5. To add a codec to the codec list, select the codec in the Available list and click the right arrow
button to move the codec to the Selected list.
6. To remove a codec from the codec list, select the codec in the Selected list and click the left arrow
button to move the codec to the Available list.
7. To change the location of a codec in the codec list, select the codec to move in the Selected list
and then do one of the following:
8. Click Save.
Note
The default codec lists supplied with the Mitel Connect system cannot be edited or deleted.
2. Select Administration > Features > Call Control > Codec Lists.
3. In the list pane, select the check box next to each codec list you want to delete.
4. Click Delete.
5. Click OK to confirm.
Mitel does not allocate bandwidth for video calls. Consequently, heavy traffic on the network can have
an impact on video conferences and even audio communication.
2. Click Administration > Users > Class of Service > Telephony Features Permissions.
To edit an existing set of telephony features, click the name of one of the preconfigured COS
profiles (Fully Featured, Minimally Featured, or Partially Featured).
To create a new class of service for telephony features, click New.
In the details pane, the Telephony Features Permissions page for the new or existing class of
service displays.
To allow users with the selected COS to participate in video calls, select the Allow intersite
video calls check box.
To prevent users with the selected COS from participating in video calls, clear the Allow
intersite video calls check box.
Note
To force a device to ring until it is answered, the call stack depth for Bridge Call Appearances
supporting ringdown should be set to 1 and availability state transfers should be disabled by selecting
No Answer.
Delayed Ringdown Circuit: Ringdown is initiated when the initiating phone is taken off-hook and
a specified amount of time passes with no action by the user. This option is only available for IP
phones that provide a dial tone.
A ringdown call is initiated by pressing the ringdown button on a calling device. The ringdown button
on the recipient device blinks; the recipient device can be configured to ring or remain silent on an
inbound ringdown call. The ringdown call is answered on the recipient phone either by lifting the
handset or pressing the blinking ringdown button. If the phone is configured to remain silent when a
ringdown call is incoming, the blinking button must be pressed to answer the call.
Extension A Extension B
When phones are configured for unidirectional ringdown, one phone is defined as the recipient
device; pressing the ringdown button on that device will not initiate a call to the phone on the other
end of the circuit.
When phones are configured for bidirectional ringdown, pressing the ringdown button on either
device initiates a call to the device on the other end of the circuit.
Unidirectional ringdown circuits require two Bridged Call Appearances – one for the calling device and
one for the recipient device.
For details on how to create a BCA, see Adding or Editing a Bridged Call Appearance on page
293.
2. For the user that will initiate ringdown calls, do the following:
a. Program an IP phone button on the calling device for one of the BCA extensions.
b. When configuring the IP phone button, select Dial extension under No connected call
action.
For complete details on how to program an IP phone button for a BCA extension, see
Configuring an IP Phone Button for a BCA Extension on page 297.
3. For the user that will receive ringdown calls, do the following:
a. Program an IP phone button on the receiving device for the remaining BCA extension.
b. When configuring the IP phone button, select Dial tone under No connected call action.
For complete details on how to program an IP phone button for a BCA extension, see
Configuring an IP Phone Button for a BCA Extension on page 297.
Bidirectional ringdown circuits require two Bridged Call Appearances – one for the calling device and
one for each recipient device.
For details on how to create a BCA, see Adding or Editing a Bridged Call Appearance on page
293.
2. For the first user that will initiate and receive ringdown calls, do the following:
a. Program an IP phone button on the calling device for the first BCA extension.
b. When configuring the IP phone button, select Dial tone under No connected call action and
then type the extension number of the second BCA in the Dial extension field.
For complete details on how to program an IP phone button for a BCA extension, see
Configuring an IP Phone Button for a BCA Extension on page 297.
3. For the second user that will initiate and receive ringdown calls, do the following:
a. Program an IP phone button on the calling device for the second BCA extension.
b. When configuring the IP phone button, select Dial tone under No connected call action and
then type the extension number of the first BCA in the Dial extension field.
For complete details on how to program an IP phone button for a BCA extension, see
Configuring an IP Phone Button for a BCA Extension on page 297.
Extension A On Extension B
ew
ay
or tw
ow
ays
On
e
wa
yo
rt
wo
wa
ys
Extension C
Extension D
Mitel supports biderectional ringdown for the one-to-many configuration. When a ringdown call is
placed from a recipient device (Extension B in Figure 17), the ringdown BCA buttons on the other
recipient devices (Extensions C and D) become solid red when Extension A answers the call,
indicating that the line is busy. Pressing these red buttons has no effect. If Extension A does not
answer the ringdown call, the phone rings until the caller on Extension B hangs up or the call routing
for Extension A handles the call.
The process for creating a one-to-many ringdown circuit is similar to creating a unidirectional one-to-
one ringdown circuit. However, an IP phone button must be configured for each recipient device.
For details on how to create a BCA, see Adding or Editing a Bridged Call Appearance on page
293.
2. For the user that will initiate ringdown calls, do the following:
a. Program an IP phone button on the calling device for one of the BCA extensions.
b. When configuring the IP phone button, select Dial extension under No connected call
action.
For complete details on how to program an IP phone button for a BCA extension, see
Configuring an IP Phone Button for a BCA Extension on page 297.
3. For each user that will receive ringdown calls, do the following:
a. Program an IP phone button on the receiving device for the remaining BCA extension.
b. When configuring the IP phone button, select Dial tone under No connected call action.
For complete details on how to program an IP phone button for a BCA extension, see
Configuring an IP Phone Button for a BCA Extension on page 297.
To place a call over a ringdown circuit to an external device, the user enters the trunk access code in
addition to the phone number of the device. For instance, when an analog trunk group is configured to
service the ringdown call, the default trunk access code of 9 must be dialed to place a ringdown call.
This trunk is not required to be reserved solely as the ringdown circuit. Any user can dial this trunk
access code to select this trunk. If the trunk is busy, pressing the ringdown button generates a busy
signal. “Enable availability state” only applies for an incoming call. It is not applicable for an outbound
call.To enable ringdown buttons on the Mitel devices (Extensions B, C and D in Figure 18), the BCA
extension must be configured on the Trunk Groups page.
Extension D
The process for creating a ringdown circuit to an external endpoint differs from the procedure for
circuits with internal endpoint as follows:
The external number must be accessed through a specific trunk that is configured as the only
trunk within a trunk group.
The number of the recipient device includes the Trunk Access Code of the specified trunk group.
For details on how to create a BCA, see Adding or Editing a Bridged Call Appearance on page
293.
2. For the user that will initiate ringdown calls, do the following:
a. Program an IP phone button on the calling device for the BCA extension.
b. When configuring the IP phone button, select Dial external under No connected call action
and then type the desired telephone number in the field.
For complete details on how to program an IP phone button for a BCA extension, see
Configuring an IP Phone Button for a BCA Extension on page 297.
This configuration requires four Bridge Call Appearance extensions: two BCA extensions for Extension
A; one BCA extension shared by Extensions B, C, and D; and one BCA extension for Extension E.
Extension A On Extension B
ew
Ringdown Button 1 ay
or tw
ow
ays
On
e
wa
yo
rt
wo
wa
ys
Extension C
Extension D
Extension A Extension E
Ringdown Button 2
Analog phones to which a user extension is assigned can receive incoming calls even when
configured for delayed ringdown calls. When an anonymous user is assigned to the port, the device
cannot receive incoming calls if it is configured to make delayed ringdown calls.
A unidirectional delayed ringdown circuit requires one Bridged Call Appearance that is assigned to the
recipient end of the circuit.
For details on how to create a BCA, see Adding or Editing a Bridged Call Appearance on page
293.
2. For the user that will initiate ringdown calls, do the following:
a. In the details pane for the selected user, select the Telephony tab and then select the
Features subtab.
c. In the Ringdown number field, type the BCA extension or the external number to use as the
ringdown endpoint.
d. In the Ringdown delay field, type the number of seconds that you want the system to wait for
the receiver to respond before dialing the ringdown number.
The delay period is the time between when the handset is lifted and when the ringdown call is
initiated.
3. For each user that will receive ringdown calls, do the following:
a. Program an IP phone button on the receiving device for the remaining BCA extension.
b. When configuring the IP phone button, select Dial tone under No connected call action.
For complete details on how to program an IP phone button for a BCA extension, see
Configuring an IP Phone Button for a BCA Extension on page 297.
Note
This step is not required if the endpoint of the ringdown circuit is an external number.
3. Under Voice encoding and quality of service, in the Media encryption drop-down list, select
SRTP - 128 bit AES.
4. Click Save.
System Support
Encryption is enabled or disabled through Connect Director on a system basis only and cannot be
enabled for individual devices or selected calls. End users have no control over which calls are
encrypted. Changing the system encryption setting does not alter calls that are in progress;
unencrypted calls in progress when encryption is enabled remain unencrypted until the calls are
terminated.
System administrators enable encryption and select an encryption algorithm through Connect Director.
The following encryption options are available:
None
SRTP - 128 bit AES
SRTP with AES and authentication has a significant impact on the system load when a large number
of media channels are encrypted.
SRTP-AES encryption is available on Mitel Connect and ST9 and later systems. A license is not
required.
Supported Platforms
Switches and Codecs
Encryption is supported by the following voice switches:
Switches do not support SRTP with linear (LRNB/8000) or wide-band (LRWB/16000) codecs. When
SRTP is enabled, codec negotiation excludes these codecs.
Switches support a maximum of 36 encrypted media streams. This limitation potentially impacts
switches that provide T1 or E1 channels with high three-way conference call traffic.
Each channel in a three-way conference requires two media stream encryption resources, limiting
switches to 18 encrypted channels for three-way conferences. In this scenario, all remaining trunks
provided by the switch are blocked while 18 channels are engaged in three-way conference calls.
Switches can service any combination of two-way (one encrypted media stream) and three-way (two
encrypted media streams) calls that do not exceed 36 media streams. Analog ports on the SG-220T1A
are included in this limitation.
When Media Encryption is enabled in Connect Director, whether or not media encryption is in effect for
a particular call depends on the type of phones involved in the call, as follows:
Connect client and IP phones (except for IP110 and IP115 phones) display a padlock icon for each call
with active SRTP encryption. The padlock icon is also displayed in the Call History list to indicate
encrypted calls. The padlock icon indicates the call is secure on the Mitel network; Mitel cannot
guarantee call security outside of the network, for example, for calls that terminate across an analog or
digital trunk.
Mitel service appliances support SRTP-AES encryption. For some other Mitel products, the following
distinctions might be important to keep in mind:
If the Headquarters server is hosting voicemail and Auto-Attendant, it does not encrypt the media
stream by using SRTP-AES encryption.
If the voicemail-capable switches (such as the Voice Switch 90V) are hosting voicemail and Auto-
Attendant, the switch encrypts the media stream.
Phones that do not support SRTP cannot perform barge in, whisper, or silent monitor functions on calls
that are using SRTP encryption. When added to a call using SRTP, new parties using devices that do
not support SRTP exchange unencrypted media streams. SRTP does not address user registration,
call setup, or signaling-related security.
This chapter describes how to create a user account and configure all parameters that relate to the
user. The following topics are included:
Overview
This chapter provides information about user configuration for new Mitel installations and established
Mitel Connect systems.
For a new system, have the following information available when you create new user accounts:
A list or outline of the COSs that are appropriate for the Mitel deployment and available for
assignment to user groups
Note
A new Mitel Connect system has sets of default COSs and user groups.
2. In the navigation pane, click Administration > Users > Class of Service > Telephony Features
Permissions.
To edit an existing COS for telephony features, click the name of one of the preconfigured
COS profiles (Fully Featured, Minimally Featured, or Partially Featured) in the list pane.
The details pane displays the telephony features permissions parameters for the selected the new
or existing COS.
Allow initiation For more information about configuring this feature, see
Configuring Call Intervention Methods on page 450.
Directed intercom: Specifies whether users can receive intercom calls or
pages. Select one of the following options:
Accept
None means that users cannot receive intercom calls or
pages.
Allow Initiation For more information about configuring this feature, see
Configuring Call Intervention Methods on page 450.
Whisper Paging: Specifies whether users can receive whisper page calls.
Select one of the following options:
Accept
None means the user with this COS cannot receive
whisper page calls.
All means the user with this COS can receive whisper
page calls from all users.
Only From means the user with this COS may receive
whisper page calls only from the specified user.
Allow initiation Note: Barge-in permits one party to join an existing call as a
fully conferenced participant. When barge-in is initiated, a
brief intrusion tone is played to the other participants and (if
present) the monitor/record warning tone is discontinued.
For more information, see Configuring Availability State
Delegation on page 443.
Barge-in: Specifies whether users’ calls can be barged-in upon.
Select one of the following options:
Accept
None means that users with this class of service may not
receive barge-ins from anyone.
None means that users within this COS may not have
their calls recorded by anyone.
All means that users within this COS may have their calls
recorded by anyone else in this COS.
Only From means that users within this COS may have
their calls recorded only by the person or extension
specified.
All means that users within this COS may have their calls
silently monitored or be silently coached during a call by
any other user in this class of service.
Only From means that users within this COS may have
their calls silently monitored or be silently coached during
a call only by the person or extension specified.
Allow current availability state changes Allows users to change their current availability state from
IP phones and Connect client.
Allow current availability state Allows users to change all availability state settings, such
detail changes as call-forwarding destinations, from Connect client.
Allow external call forwarding and find Allows users to forward incoming calls to an external
me destinations number.
Allow external assignment Select this check box to allow users to assign their
extension to a PSTN phone for use with the External
Assignment feature. If you select this check box, the user
can use a cell phone or home phone as an extension in the
Mitel network.
Notes:
Notes:
Notes:
Call Permissions
This section describes the types of call permissions the Mitel administrator can set. Call permissions
are classes of service that specify the type of call users are allowed to dial. Call permissions are
assigned to user groups. The parameters on the Call Permissions page are described in Table 107.
User extensions
Workgroup extensions
Route point extensions
External user extension
Days in advance of password Specifies the number of days before a password expires
expiration before warning (1 - 30) that users are notified about the upcoming password
expiration. The default is 7 days.
2. In the navigation pane, click Administration > Users > User Groups.
The User Groups page is displayed. For descriptions of the columns on the User Groups page,
see Table 109.
2. In the navigation pane, click Administration > Users > User Groups.
To edit an existing user group, click the name of the user group in the list pane.
To create a copy of an existing user group, click Copy.
To create a new user group, click New.
The General tab in the details pane displays parameters for the new or existing user group.
4. Review the parameters on all of the tabs in the details pane, and specify values as appropriate.
For more information about all of the user group parameters on the various tabs of the details
pane, see .
5. Click Save.
General Tab
General information about new and existing user groups is provided on the General tab in the details
pane of the User Groups page.
Table 110 describes the parameters on the General tab of the User Groups page.
Profile Tab
Profile information for new and existing user groups is provided on the subtabs of the Profile tab in the
details pane of the User Groups page.
Table 111 describes the parameters on the General tab of the User Groups page.
Viewing Users
1. Launch Connect Director.
The Users page is displayed. For descriptions of the columns on the Users page, see Table 112.
Table 112: Users Page: List Pane
Column Name Description
First Name The first name of the user, fax machine, conference
room, or virtual user.
Last Name The last name of the user.
Extension The user’s extension.
Mobile Extension The user’s mobile extension, if one is configured.
To edit an existing user, click the name of the user in the list pane.
To create a copy of an existing user, click Copy.
To create a new user, click New.
The General tab in the details pane displays parameters for the new or existing user.
4. Review the parameters on all of the tabs in the details pane, and specify values as appropriate.
For more information about all of the user parameters on the various tabs of the details pane, see
User Parameters.
User Parameters
A user account has many details. You configure user parameters on the following tabs, which you can
access on the details pane for a particular user:
General Tab
General information about new and existing users is provided on the General tab on the Users page.
Several of these parameters are automatically filled in from other fields in Connect Director.
Table 113 describes the parameters on the General tab of the Users page.
Allowed characters: a - z, A - Z, 0 - 9, _, -, ., @, $
(underscore, dash, period, “at” symbol, dollar symbol)
Note: When an administrator types values for the user’s
first name and last name (even before clicking Save), the
system generates a default client username (often called
the client user ID or just the user ID), which consists of the
first letter of the first name and the complete last name.
Include in System Dial by Name Select this check box if you want the user’s name to be
directory included in the auto-attendant’s dial-by-name directory.
Make extension private Select this check box to remove this number from the
system directory and call routing destination lists.
None
External Number
DID
The user must have a Class of Service with Allow PSTN
Failover enabled. For more information, see Specifying a
Class of Service on page 371.
The license type assigned to a user determines the user groups and mailbox servers available to
assign to that user. This is based on the voice mail interface mode assigned to each individual user
group and mailbox server.
Only user groups that use a voice mail interface mode of None are available in the drop-down
list.
Only servers that use a voice mail interface mode of None, SMDI External voice mail, or SMDI
Mitel voicemail are available in the Mailbox server drop-down list.
User groups that use SMDI Mitel voice mail are not available.
When a user group that uses a voice mail interface mode of None is selected, the Mailbox
server parameter is disabled.
When a user group that uses a different type of voice mail interface mode is selected, only
servers that use the same type of voice mail interface mode are available in the Mailbox server
drop-down list.
Extension Assignment is not available to Mailbox-Only users, regardless of the COS settings.
User groups that use SMDI External, SIP Mitel, or QSIG External voice mail are not available.
When a user group that uses a voice mail interface mode of None is selected, only severs that
use a voice mail interface mode of None, SMDI External voice mail, or SMDI Mitel voicemail
are available in the Mailbox server drop-down list.
When a user group that uses a voice mail interface mode of SMDI Mitel voicemail is selected,
only severs that use a voice mail interface mode of SMDI Mitel voicemail are available in the
Mailbox server drop-down list.
Telephony Tab
Information about telephony features for users is provided on the Telephony tab. Table 114 on page
398 describes the parameters on the Telephony tab of the Users page.
Speaker
Headset
Wireless headset
Bluetooth headset
For configuration instructions, see Specifying Automatic Off-
Hook for Wireless Headsets on page 260.
Enable handsfree mode Select this check box to enable handsfree mode; this
disables the dial tone so that the user can use a headset or
speakerphone to answer and make calls from the desktop
client. The default for this option is disabled.
Enable call waiting tone Select this check box to enable the call-waiting tone, the
user hears this tone for incoming calls while on a call. The
default for this option is enabled.
Note: The system plays different call waiting tones for calls
waiting on the primary extension and calls waiting on a
monitored BCA extension.
Trunk access code In the drop-down list, select a trunk group access code.
When you select this parameter, the user does not need to
configure the trunk access code on his or her phone.
Mailbox for recorded calls Specifies the mailbox to be used for recorded calls.
Note: This option freezes the jitter buffer and disables the
echo canceler at the beginning of the call and applies to
environments that use SIP PSTN gateways.
Enable video calls Select this check box to allow users to make video calls.
Video calls are a licensed feature. In the drop-down list,
select one of the following options:
Table 115 on page 402 describes the parameters on the Voice Mail tab and Mailbox subtab of the
Users details pane.
Mitel recommends you follow these guidelines for creating secure voice mail passwords:
When creating a new user, assign the user a complex initial password.
Educate end users to change the default PIN to one that is more complex. (Avoid passwords with
simple digit patterns such as 1111, 4321, and so on.)
Check CDRs regularly to detect any abnormal calling activities, such as calls coming and going to
a country with which you are not doing business.
If your business does not require international dialing, prevent international call-back from
voicemail by restricting the relevant user group to local and long-distance calls only. You can also
restrict voicemail call-back to any external number using the Class of Service Voice Mail
Permissions.
Increase the voicemail password length to at least 6 digits system-wide. A longer PIN is more
secure and creates more number combinations.
Enable email alerts for system event ID 1113 for repeated voicemail login access failures.
Routing Tab
Information about new and existing users’ call routing settings is provided on the Routing tab of the
Users page. This tab contains the following subtabs, and information about these parameters is
provided in the subsequent sections:
Phones
Ring Me
Availability States
Power Routing Rules
Phones Subtab
For details about the fields on the Phones subtab, see Implementing Simultaneous Ringing on page
278.
Ring Me Subtab
For details about the fields on the Ring Me subtab, see Routing Calls to Other Phones on page 435.
From this tab, you can set the current availability state for the user. For details about availability states,
see Configuring Availability States on page 438.
Any power routing rules that the user has created in Connect client are listed here. For details on
configuring power routing rules, see Configuring Power Routing Rules on page 444.
Membership Tab
New and existing users’ call routing settings are provided on the Routing tab of the Users page. This
tab contains the Distribution list and Workgroups subtabs.
A distribution list lets a user send a voice mail message to multiple users at one time. Each distribution
list has a descriptive name and an extension associated with it.
When a user is associated with a distribution list, the user receives messages sent to that list. Users
can be associated with more than one distribution list. Users can be associated with distribution lists
from either this Distribution list subtab or from the System Distribution List page.
For details about adding distribution lists and populating them with multiple users, see Configuring
System Distribution Lists on page 458.
3. Click the name of the user you want to add or remove from a distribution list.
4. In the details pane, click the Membership tab and the Distribution list subtab.
To include the user in a specific distribution list, select the distribution list in the Available list
and click the right arrow button to move it to the Selected list.
To remove the user from a distribution list select the distribution list in the Selected list and
click the left arrow button to move it to the Available list.
6. Click Save.
Workgroups Subtab
The Workgroups subtab on the Membership tab of Users page allows you to edit a user’s workgroup
membership. Users can belong to multiple workgroups; however, a user’s login status is the same for
all workgroups of which the user is a member.
The Workgroups page shows the workgroup lists that are currently available. You can change a user’s
membership in workgroups as follows:
3. In the details pane, click the Membership tab and the Workgroups subtab.
To include the user in a workgroup, select one or more workgroups in the Available list and
click the right arrow button to move the workgroups to the Selected list.
To remove the user from a workgroup, select one or more workgroups in the Selected list and
click the left arrow button to move the workgroups to the Available list.
5. To activate the user’s membership in the selected workgroups select the Logged in option in the
Agent state field.
6. Click Save.
For more information about the Workgroups feature, see Chapter 17, Configuring Workgroups on page
495.
Delegation Tab
You can delegate availability state management for an individual user to one or more other users, such
as an administrative assistant. For details about this capability, see Configuring Availability State
Delegation on page 443.
DNIS Tab
Table 116 describes the parameters on the DNIS tab of the Users details pane.
Applications Tab
The Applications tab displays whether various Connect Sync services are enabled for the user.
Table 115 on page 402 describes the parameters on the Applications tab of the Users details pane.
2. In the navigation pane, click Administration > Features > System Directory.
To edit an existing system directory record for a user, click the name of the user in the list
pane.
To add a new system directory record for a user, click New.
The General tab displays the details for the system directory record in the details pane.
The Mitel AD implementation supports the synchronization of user records between the Mitel database
and other applications that use AD on Windows-based networks.
When AD integration is enabled, only users who have administrative permissions can log into Connect
Director. This requirement means that at least one administrator role must be defined. It also means
that users who need access to Connect Director must receive an administrative role.
WARNING!
At least one user account must have administrative rights before Active Directory is enabled. AD does
not allow a user to log in through the default admin account.
1. Log in to the Active Directory account through which you access Connect Director.
2. Launch Connect Director, and log in with the following default credentials:
username – admin
password – changeme
4. If the AD user you want to give administrative permissions to does not already exist in the Mitel
Connect system, add a new user to the Mitel Connect system that uses the Client Username that
matches the Active Directory login name of the new administrator. For detailed instructions on
adding a user, see Adding or Editing a User on page 391.
5. In the navigation pane click System > Administrative Permissions > Administrators.
6. Click New.
The General tab in the details pane displays parameters for the new administrator.
7. In the User extension field, enter the extension for the Active Directory user you want to make an
administrator.
9. Click Save.
2. In the navigation pane, click Administration > System > Additional Parameters.
3. Under Active directory (AD) integration, select the Enable AD integration check box.
5. Click Save.
2. Click the name of the user you want to enable AD integration for in the list pane.
3. On the General tab, select the Active Directory user check box.
4. In the Account field, type the domain and client username as follows:
domain\username
5. Click Save.
Whenever Connect Director is subsequently launched using this username and domain, the user
is logged into Connect Director automatically.
AD User Authentication
Mitel supports AD authentication for users who log into Connect client and Connect Director. This
allows users access to these programs without providing the Mitel username or password.
AD users who log into Connect Director and Connect client are authenticated through single sign on
(SSO) with their current network credentials. Users are not required to re-enter credentials to access
these applications.
Only users with a domain account can log into Connect Director.
Only users with administrative permissions can log into Connect Director.
Users do not need to log into their domain account to access Connect Director.
Users do not need their Mitel account configured for Active Directory (AD Users) to access
Connect Director.
If a Mitel user with AD configured is logged in to the domain and tries to access Connect Director
without entering network credentials, the user is directed to the Diagnostics & Monitoring Dashboard
page.
When a user with AD access logs out, the browser displays a Connect Director login page.
If a user without AD configured is logged in to the domain and tries to access Connect Director, the
user is directed to a Connect Director login page. The user logs into Connect Director from this screen
by entering a Mitel username and password.
If a user attempts to access Connect Director without first logging into the domain network, the user is
initially routed to a domain login page. After entering network credentials, the user is routed to the
appropriate page. AD users are routed to the Diagnostics & Monitoring Dashboard, and non-AD users
are directed to a Connect Director login page.
Initial Configuration
When installing Connect client, users authenticated through AD are not queried for their credentials;
they are immediately prompted for the server name after which wizard panels guide them through the
setup process.
Users that are not authenticated through AD are required to enter their username, password, and
server name. After verifying the user’s credentials, Connect client guides the user through the setup
process.
Attempts to log into Connect client after the initial setup are handled on the basis of the user’s AD
configuration. Active Directory users are authenticated by SSO through the verification of their AD
credentials.
Users not configured for Active Directory are authenticated through the verification of their Mitel
username and password, if previously loaded through their Connect client account. Connect client
behavior after an authentication failure is not changed by this feature.
The username of the user is visible on the Preferences > Account > Login tab of the Connect
client.This field can be altered from the Preferences > Account > AD Credentials tab. For more
information, see the Mitel Connect Client User Guide.
1. In the navigation pane, click Administration > System > Additional Parameters.
Users Page
First name: Active Directory field capacity is 64 characters; Mitel capacity is 50.
Last name: Active Directory field capacity is 64 characters; Mitel capacity is 50.
Email address
Client username: Active Directory length is limited to 20 characters.
System Directory
Home phone
Work phone
Mobile phone
Fax
Pager
Mitel Database (This data field does not appear in Connect Director.)
AD GUID: Used internally by the Mitel Connect system when performing subsequent user
updates from the AD database.
2. Click the name of the AD user to view mapped fields for in the list pane.
The General tab in the details pane displays the parameters for the selected user.
The AD Data dialog box displays all mapped fields for the selected user.
4. Review the mapped fields, and then click OK to close the dialog box.
The Show From AD and Sync From AD buttons are inactive for users accessing this page that are not
configured as AD users
The General tab in the details pane displays the parameters for the selected user.
4. Click Save.
Removing AD Users
When an administrator attempts to delete a user with an AD account, Mitel displays a warning and
requires confirmation before it removes the record from the Mitel database.
2. Modify the CSV file to conform to the format needed by the database import utility (User Import
Tool). For detailed information about the database import utility, see Modifying the CSV File on
page 414.
3. Import records from the CSV file to the Mitel user database using the database import utility (User
Import Tool). For detailed information about the database import utility, see Importing the CSV File
on page 421.
Exporting AD Records
Mitel provides a sample VBScript file (ldaptocsv.vbs) that can be used as a template for exporting
records from an AD database to a CSV file. Before using the VBScript file to export AD records, the file
must be customized to work with your specific system requirements. Figure 20 shows the parameter
section of the VBScript file.
The top section pulls values for each user record from the AD database into the CSV file. As
indicated in the comments section, a single value can be assigned to an individual field for all
users by entering the value inside of the quotation marks.
The bottom section is a data template containing non-AD fields that are saved to the CSV file. The
values entered in these fields are assigned to all user records retrieved from the AD database.
The following command line entry executes the export from AD to the CSV file:
This delimiter allows you to import only the active directory entries that have been modified within
the past number of days specified. This can reduce the amount of information that the system has
to export.
The resulting CSV file can be modified using a spreadsheet program to customize user settings for
import into the Mitel database.
The following fields are required in the CSV file in order to support AD record imports:
LDAP-User flag: A flag that indicates the user settings came from an AD database.
LDAP-GUID: A data field that creates an association between an AD record and the
corresponding Mitel record.
The administrator prepares a CSV file containing user data, and then modifies the user data in a “free
form” approach (instead of modifying each user's information within Connect Director).
The administrator can prepare the CSV file using one of the following methods:
Use an application, such as Microsoft Excel, to prepare a spreadsheet containing user information
and then save the file as a CSV file.
Export Active Directory records from an AD database to a CSV file. For information about
exporting AD records, see Bulk Provisioning of AD User Accounts on page 412.
After the user information has been modified within the spreadsheet, the CSV file can be imported into
the Mitel Connect system.
The database import utility supports modify, delete, and add operations. This allows a system
administrator to add users, delete users, or modify the account of an existing user.
Using the database import utility does not require scheduled downtime. However, when importing
large files that contain many rows of information, performance may be affected as the database is
frequently queried. Depending on the size of the imported file and the type of information that is
being added or modified, it may be recommended to perform the import during off hours.
The primary phone port for a user is set using the HomePhoneMACAddress database import field.
The primary phone port is determined according to the following rules, in this exact order:
1. If the HomePhoneMACAddress field is specified, the primary phone port is assigned to the
defined IP phone.
3. If the HomePhoneMACAddress field is left blank and the Site is set to a remote site with a
SoftSwitch (DVS) available, the primary phone port is set to SoftSwitch on the remote site.
4. If none of the above apply, the primary phone port is set to SoftSwitch on the Headquarters
server.
3. Click Export.
Extension
FirstName
LastName
GuiLoginName
GUIPassword
TUIPassword
The field headers can appear in any order within the first row of the CSV file.
Note
CSV files created by exporting user information from Connect Director contain all headings compatible
with the database import utility.
For fields that require string input, the string must already exist in the Mitel Connect system. For
example, if a new user is to be created at a site named New York, “New York” must already exist
as a site name in the Mitel Connect system. Strings are case-sensitive.
For fields that require code input, the field must be entered exactly as it appears in Connect
Director. Data validation translates the displayable value to the appropriate code. Descriptions are
case-sensitive.
When updating an existing user, fields left blank will not change existing values.
Extension-Mailbox
Extension-Only
Mailbox-Only
CallerID CIDNumber Number; must be a full canonical
number (such as +1 (408) 331-3300)
UserGroup UserGroupID String; must exactly match the name
of an existing User Group configured
on the system.
Site Site String; must exactly match the name
of an existing Site configured on the
system
Language DN.LanguageID Code; must exactly match the name
of one of the enabled languages on
the system (e.g. “English(US)”).
VMServer VMServerID String; must exactly match the name
of an existing VM, SIP, or QSIG
server configured on the system
(depending on the Voicemail
interface mode configured for the
user group that the user is assigned
to).
CallStackSize CurrentCallStackDepth Number
AcceptBroadcasts Mailboxes.NoReceiveBroadcasts Boolean
MakeNumberPrivate DN.Hidden Boolean
DialByName DN.ExcludeFromDialByName Boolean
FaxSupport FaxSupport Code; must exactly match one of the
following:
User-No Redirect
User-Redirect
FAX Server
Fax Machine
Connect Client
Workgroup Agent
Workgroup Supervisor
Operator
Examples:
Standard
Ring 2
Ring 3
Ring 4
CallWaitingToneEnabled CallWaitingToneEnabled Boolean
HeadsetAudioPath UseHeadsetAudioPath Number
HeadsetMode HeadsetMode Boolean
PSTNFailOverType PSTNFailOverTypeID Code; must exactly match one of the
following:
None
External
DID
Non-LDAP user
Active Directory
LdapGuid LDAPGuid String
domain\username
AllowPapi AllowPAPI Boolean
AllowVideoCalls AllowVideoCalls Code; must be blank or exactly match
one of the following:
None
Standard
High Resolution
You can create or modify the spreadsheet to perform the following actions:
Add Users
Ensure that you have included values for each new user in the following required fields:
FirstName, LastName, GUIPassword, TUIPassword, and GUILoginName.
The Extension field is optional; if the extension field is left blank, an extension is assigned to
the user automatically.
With the exception of the Extension field, any fields left blank for a new user will be left blank in
Connect Director.
Modify Users
Enter data for any fields that you want to change. Fields left blank will remain unchanged in
Connect Director.
Note
When a user is updated, the user is assigned to “Any IP Phone” on the Headquarters server.
Delete Users
Enter the extension for the user you want to delete and leave all other fields blank.
Example: Figure 21 illustrates some of the spreadsheet values before importing them into Connect
Director.
Created a spread sheet and successfully exported it to a CSV file that conforms to the format
required by the database import utility For information about creating the CSV file, see Setting Up
the CSV File for Import on page 416.
Exported Active Directory records from an AD database to a CSV file and modified the CSV file to
conform to the format required by the database import utility. For information about exporting AD
records, see Bulk Provisioning of AD User Accounts on page 412.
1. Verify that the CSV file to be imported is located on the Headquarters server in the following
location:
C:\ProgramFiles\ShorelineCommunications\ShoreWareServer
2. Open the command prompt window in the directory shown above and run the following command:
username and password must be valid log in credentials used to log in to Connect Director
-err DBErr.er is the flag to create a file named DBErr.er in the current directory; error
messages are stored in this file
-log DBLog.log is the flag to create a log file named DBLog.log in the current directory
Bulk Edit
You can use the Bulk Edit feature to make changes to multiple users at the same time. This allows you
to identify a set of users and globally change certain parameters. You can also use the Bulk Edit
feature to copy the Programmable Buttons (IP Phones and Button Box) settings from one user to one
or more other users. Run the bulk edit feature during off hours as it may drop calls in the system.
3. In the list pane, select the check box for each user you want to include in the bulk edit.
The Bulk Edit tab in the details pane displays the parameters available for editing.
5. Review the parameters and specify values as appropriate. For more information about all of the
available parameters on the Bulk Edit tab, see Table 119.
6. Click Save.
3. In the list pane, click to highlight the name of the user you want to copy IP Phone Button or Button
Box settings from.
4. In the list pane, select the check box for each user you want to copy the settings to.
The Bulk Edit tab in the details pane displays the parameters available for editing.
6. Select one or more of the following check boxes to copy the corresponding Programmable Buttons
settings:
IP Phones
Button Box 1
Button Box 2
Button Box 3
Button Box 4
7. Click Save.
When you select this parameter, the user does not need to
configure the trunk access code on his or her phone.
IP Phones Select this check box to copy all IP Phone button settings
from the specified user to all other selected users.
Button Box 1 Select this check box to copy all Button Box 1 settings from
the specified user to all other selected users.
Button Box 2 Select this check box to copy all Button Box 2 settings from
the specified user to all other selected users.
Button Box 3 Select this check box to copy all Button Box 3 settings from
the specified user to all other selected users.
Button Box 4 Select this check box to copy all Button Box 4 settings from
the specified user to all other selected users.
Notify Users
You can notify users that their Connect client or Connect client for Mobile – has been installed or
upgraded. Once the user receives notification that their client application has been installed, the user
can begin configuring personal options and use the application.
2. In the navigation pane, click Administration > Features > Client > Notify Users.
To notify all users using the client who have not already been notified, select All new users
under Send welcome email to users not yet notified.
To notify all users using the client who have not already been notified and are on a particular
server, select All users on this server under Send welcome email to users not yet
notified.
To notify a specific user, enter the name of the user to notify in the User extension field under
Send welcome email to this one user.
Extension Lists
You can create extension lists for group paging and departmental auto-attendant.
2. In the navigation pane, click Administration > Features > Extension Lists.
To edit an existing extension list, click the name of the extension list in the list pane.
To create a copy of an existing extension list, click Copy.
To create a new extension list, click New.
The General tab in the details pane displays the parameters for the new or existing extension list.
To add an extension to the extension list, select the extension in the Available list and click the
right arrow button to move the extension to the Selected list.
To remove an extension from the extension list, select the extension in the Selected list and
click the left arrow button to move the extension to the Available list.
6. Click Save.
This chapter is about setting up users in the Mitel Connect system. The topics discussed include:
3. In the list pane, select the user whose extension you want to make private.
The General tab in the details pane displays parameters for the user.
5. Click Save.
Internal calls placed from a private extension show the caller's name but not their number to the
dialed party. This applies to analog phones, IP phones, and associated instances of Connect
client. The ring style is a double-ring, indicating an internal call.
External calls placed from a private extension do not deliver a Direct-Inward-Dial (DID) number as
Caller ID when PRI trunks are used for the outbound call. The proper CESID (Caller’s Emergency
Service ID) is only delivered for 911 calls.
Calls placed from a private extension to an off-system extension on PRI trunks with NI-2 signaling
deliver the caller’s name but not their number.
Routing slips and the client and History viewer show the name of the user with a private extension
but their extension number is not shown.
Users with a private extension are listed with name and number in the Extension Monitor
extension selection dialog box.
A private extension can be dialed directly from a telephone or the client if the extension is known.
Contacts imported from Microsoft Outlook or Exchange that reference a user's private extension
are not blocked and are fully visible in the client Quick Dialer.
CDR database records show both number and name for users with a private extension. However,
the Caller-ID Flags field indicates that only the name is valid.
CDR legacy log files show the number of calls that are inbound or outbound for private extensions.
Connect Director shows number information for users with private extensions as with other users;
for example, the user’s extension is displayed on the Users page.
Note
The Call History Privacy feature only impacts call tracking within the Mitel phone system. Calls to
external numbers may generate call records on the recipient’s phone system and trunk calls may
generate records with the carriers connecting the calls.
Call History Privacy provides users with an entirely private environment for their phones. When Call
History Privacy is enabled, calls are not tracked or recorded in the call detail records. In addition, the
calls are not available on the phone redial or shown in the Connect client call history.
Note
Call History Privacy is not supported on SIP or Analog phones.
To use Call History Privacy, the user must be a member of a user group that has the Class of Service
(COS) configured with the telephony feature Show call history disabled.
2. In the navigation pane, click Administration > Users > User Groups.
4. In the COS - Telephony field, click the View Class of Service link.
The Telephony Features Permissions page for the associated COS is displayed.
Multi-site users, such as executives or managers, who might use the system across multiple
locations. Extension Assignment allows these users to pick up a telephone at any location on the
enterprise network, log into voice mail, and assign their extension to that telephone.
Office hotel users, such as contractors or telecommuters, who may occasionally be out of the
office or who might share a cubicle, and thus a phone, with another employee. Extension
Assignment allows these users to have their own extension and mailbox, yet not have a dedicated
switch port. They can simply assign their extension to a telephone on the network when they are in
the office while allowing another user to usurp that phone when they are done with it.
Remote or mobile users, such as employees in sales or support, who might travel frequently and
would like to have all calls directed to their cell phone or home office PSTN phone. Extension
Assignment allows these users to have their own extension and mailbox, yet not have a dedicated
switch port, thus optimizing system resources.
Legacy PBX Users, such as users with Off-System Extensions working with Connect client.
Extension Assignment also allows the system administrator to configure all telephones as anonymous
telephones and all users as virtual users, eliminating administrative costs associated with frequent
moves. When a move occurs, users simply assign their extension to the telephone at the new location.
For information about configuring on-network extension assignment, see Configuring On-Network
Extension Assignment on page 434.
Using off-network extension assignment, a user can manage a call via the client. So while the
conversation occurs over a cell phone or home phone, the call appears via the client and can be
controlled using many of the features available via the client. Note that this requires the user to be
located near a PC that is running the client and has access to a broadband connection. For information
about configuring off-network extension assignment, see.Configuring Off-Network Extension
Assignments on page 433.
Use the existing PSTN line for voice while managing the call via the client over an ordinary
broadband Internet connection.
Emulate analog extension hook switch actions via star-star (**) for FLASH and pound-pound (##)
for on-hook/off-hook.
Retain call management features of the Mitel Connect system over a broadband connection while
maintaining audio quality over PSTN.
To use the Extension Assignment feature, the user must be a member of a user group that has the
Class of Service (COS) configured with the telephony feature Allow extension reassignment
enabled. For information on the Telephony COS settings, see Configuring a COS for Telephony
Features Permissions on page 372.
When a user’s extension has been assigned to an off-net location, incoming calls ring the off-
system extension. If the call is not answered, normal call routing allows the caller to leave a
message in the user's Mitel mailbox.
When assigned to an off-net location, Extension Assignment is fully controllable through Connect
client excluding answering a call, which must be done manually. In addition, Extension Assignment
has limited TUI functionality.
Extension Assignment calls that are terminated through Connect client are not followed by the
standard dial tone. Extension Assignment uses a unique set of internal and external dial tones.
This difference in tones can be important in installations where network devices have been
configured to listen for normal class progress tones before taking action on a call, such as hanging
up.
Calls placed or answered through Extension Assignment, when assigned to an off-net location,
continue to exist in the Connect client call stack. Normal call control functions, such as hold,
unhold, conference, transfer, and park, continue to work. In contrast, Park to the Extension
Assignment extension is not supported when it is assigned to an off-network location.
Extension Assignment, when assigned to an off-net location, behaves like an automated Find Me
feature except that the caller does not press 1 to find the called party. The PSTN phone number is
immediately called. The call recipient can answer the call by lifting the handset, or activating a cell
phone, and pressing the DTMF digit 1 in response to the repeating prompt.
For off-net Extension Assignment, prompts can be used to confirm answering. The answer style
can be configured to be one of the following:
Wait for DTMF (default) - The call is not forwarded until the user presses 1.
Wait for Answer - The Mitel Connect system forwards the call as soon it detects the far-end
answer.
Note
For some trunk types, a central office might not support answer-detection at the far end. In this
case, the user would have to press 1. The caller can hear the DTMF tone in this case.
Terminology
The terms used to describe Extension Assignment are as follows:
Anonymous telephone: A telephone not currently assigned a user. You can make a call from an
anonymous telephone, but you cannot call an anonymous telephone.
Any IP Phone: The feature that lets a user assign his or her extension to any IP phone on the
enterprise network.
Assigned: The status of a user who is currently assigned to a telephone that is not their home
phone.
Current telephone: The telephone to which the user is currently assigned, which is also known as
the current switch port.
Go Primary Phone: The command to assign a user’s extension back to his or her primary
telephone.
Home: The status of a user who is assigned to his or her primary telephone.
Home telephone: The telephone to which the user is normally assigned, which is also know as the
primary phone port. This is the telephone to which the user returns when using the Go Primary
Phone command.
Extension Assignment: The feature that lets a user assign his or her extension to any telephone,
on-system or off-system extension.
Vacated phone: A home telephone that currently does not have a user assigned. Vacated phones
are listed on the Vacated Phones page in Connect Director.
Virtual user: A user who does not have a physical telephone port and is currently assigned to the
SoftSwitch.
2. In the navigation pane, click Administration > Users > User Groups.
4. In the COS - Telephony field, click the View Class of Service link.
The Telephony Features Permissions page for the associated COS is displayed.
6. Select the Allow External Call Forwarding and Find Me Destinations check box, and then
select the appropriate Scope radio button.
Note
For an off-network phone to display the ID of a caller who is outside a Mitel site, the system
administrator must activate the Enable original caller information feature on applicable trunk groups.
Refer to Forwarding Original Caller ID Outside a Mitel Network on page 216 for additional information.
This section provides information about how to assign an external phone number.
3. Click the Select Number drop-down list below the external assignment number option.
Enter the associated phone number in the Number field. You cannot use a phone number that is
assigned to Connect for iOS or Android.
5. To connect to the external number, click the drop-down list and choose any of the following:
Automatically connect
Press 1 to connect
This number determines the number of rings to the external phone number before forwarding the
call to your voicemail.
You can assign or unassign an extension to any on-network telephone using the voice mail Telephone
User Interface or using the client. Refer to Managing Inbound Calls on page 435 for information about
assigning and unassigning extensions using the client.
Note
If the phone is already assigned, you will need to press # twice; once to log in to voice mail and
then again at the prompt.
This option is available only from telephone ports and is not available from trunk ports.
If no other user is assigned to the primary phone port, the extension automatically reverts back to the
primary phone. If another user is assigned to the primary phone port, the extension is assigned to the
SoftSwitch until the primary phone port becomes available. A user can remove the other user from the
primary phone port by assigning the extension from their primary phone using the procedure above.
The Ring Additional Phones feature routes incoming calls to a user’s primary phone and up to two
additional phones simultaneously. You can choose the availability states that initiate this action.
The Find Me feature routes incoming calls to additional phones, in a specified order, when callers
reach a user’s voice mail. You can choose the availability states that initiate this action.
The Find Me feature routes inbound calls to a specified extension or external number as an alternative
to sending calls to voice mail. Two separate Find Me destinations can be configured for each user.
Find Me can be enabled for one or all availability states.
Note
To use the Find Me feature, the user must be a member of a user group that has the Class of Service
(COS) configured with the telephony feature Allow external call forwarding and find me
destinations enabled. For information on the Telephony COS settings, see Configuring a COS for
Telephony Features Permissions on page 372
To initiate Find Me, a caller presses 1 while listening to the recipient’s voice mail greeting. The caller
hears a message that the Find Me destinations are being called and the call is then routed to the first
Find Me destination. If the call is not answered, it is then routed to the second Find Me destination.
Calls not answered at either Find Me destination are sent to voice mail.
Note
The standard voice mail greeting does not prompt the caller on the availability of Find Me; the user
should record a custom message to prompt callers when Find Me is available.
You can also choose to automatically route calls to Find Me destinations without requiring the user to
press 1. See Configuring Ring Additional Phones on page 436 for more information.
When a call is forwarded to a Find Me destination, the phone at the Find Me destination displays the
recipient’s voice mail caller ID to the caller. When answering a call, the recipient hears a prompt
announcing the call and, if available, the caller’s caller ID information. The recipient can then accept
the call or route the call to voice mail.
3. In the list pane, select the user to configure additional phones for.
The General tab in the details pane displays parameters for the new or existing user.
4. Select the Routing tab, and then select the Phones subtab.
5. Review the parameters and specify values as appropriate. For descriptions of the Phones
parameters, see Table 120.
The General tab in the details pane displays parameters for the selected user.
4. Select the Routing tab, and then select the Ring Me subtab.
5. Review the parameters and specify values as appropriate. For descriptions of the Ring Me
parameters, see Table 121.
Available
In a Meeting
Out of Office
Do Not Disturb
Vacation
Custom
One availability state is always active for each user. By default, Mitel automatically selects the active
availability state based on system schedules maintained by the system administrator and the state of
the user. Users can also manually select their active availability state. For information about system
schedules, see Chapter 16, Configuring Schedules on page 489.
Once a user is saved to the system, there is no relationship between the user’s availability states and
the default availability states. Changes to the default availability states do not affect the availability
states of existing users.
You configure parameters for each availability state on the following tabs on the Availability States
Defaults page:
Available
In a Meeting
Out of Office
Vacation
Custom
Do Not Disturb
Note
You can change the Personal Assistant for some or all users using the bulk edit feature. For more
information about bulk editing, see Bulk Edit on page 421.
2. In the navigation pane, click Administration > Users > Availability States Defaults.
3. Review the parameters on each of the availability state tabs, and specify values as appropriate.
For more information about the parameters on the availability state tabs, see Table 122.
You configure parameters for each availability state on the following Availability States subtabs,
located on the Routing tab on the Users page:
Available
In a Meeting
Out of Office
Do Not Disturb
Vacation
Custom
The General tab in the details pane displays parameters for the selected user.
4. Select the Routing tab, and then select the Availability States subtab.
5. Review the parameters on each of the availability states subtabs, and specify values as
appropriate. For more information about the parameters on the availability state subtabs, see
Table 123.
Green - Available
Yellow - Busy
Red - Not Available
Note: This parameter is only available for the Custom availability
state.
Call forward condition Select one of the following options for forwarding calls for the
selected availability state:
Table 123: Users Page: Routing Tab, Availability State Subtab (Continued)
Parameter Description
Forward after (1-20) rings Specifies the number of times to ring the line before forwarding
the call.
Table 123: Users Page: Routing Tab, Availability State Subtab (Continued)
Parameter Description
Schedule Mode change In the drop-down list, select the schedule to associated with the
selected availability state.
Selecting the users who are authorized to change another user’s active availability state:
3. Select the user for whom you are authorizing other users to change the active availability state.
The General tab in the details pane displays parameters for the selected user.
4. Click the Membership tab, and then click the Delegation subtab.
To add a user to the list of users authorized to change the availability state for the selected
user, select the user to authorize in the Available list and click the right arrow button to move
the user to the Selected list.
To remove a user from the list of users authorized to change the availability state for the
selected user, select the user in the Selected list and click the left arrow button to move the
user to the Available list.
6. Click Save.
Users can manage the list of individuals who can change their active availability state through the
client. The Mitel Connect Client User Guide contains more information.
Power Routing is available to users with one of the following Access Licenses:
Connect Client
Operator
Workgroup Agent
Workgroup Supervisor
Note
Administrator authorization is not required for users with one of these Access Licenses.
Each user can have a maximum of 10 Power Routing rules. These rules can be enabled or disabled
and organized according to priority.
Before a user actually receives the inbound call, the system evaluates the call conditions against the
highest priority Power Routing rule that is enabled. If all of the criteria in the rule match the call
conditions, the call is routed according to the rule’s action. If any of the criteria do not match the call
conditions, the system continues the plan execution by evaluating the call against the next highest
priority Power Routing rule that is enabled.
This process is repeated for all enabled Power Routing rules. If the call conditions do not match the
conditions of any of the enabled Power Routing rules, the call is routed according to the user’s active
availability state.
Note
An important behavior that relates to one of the actions should be understood. The action is Forward
Call to Voice Mail, and the circumstance when this behavior is relevant is when a Mitel customer
changes its voice mail server to a SIP Unified Messaging (SIPUM) server. Before the migration to
SIPUM, any rule that forwards calls to voice mail — or all rules if that is more convenient — should be
disabled. If a rule whose action forwards calls to voice mail remains enabled during the migration, the
rule fails to migrate.
Power routing rules define the evaluation conditions and the routing action. When the rule is active and
the condition is satisfied, the specified action is implemented.
Rule Name - the label by which Connect Director and the Connect client refer to a power routing
rule; users specify the rule name when they create the rule
Condition - the filtering criteria that determines if a corresponding call routing action is performed;
if multiple criteria are selected, each criterion must be satisfied before the action is performed
For details about the available Power Routing conditions, see Table 124.
Action - specifies the call routing action for calls that match the specified condition; the following
options are available:
My Voicemail - forwards all calls that meet the selected criteria to your voicemail box
Auto FindMe - forwards all calls that meet the selected criteria to your voicemail box and
automatically initiates Find Me; Find Me is not available if Mobility is enabled
Announced FindMe - forwards all calls that meet the selected criteria to your voicemail box
and allows the caller to initiate Find Me; Find Me is not available if Mobility is enabled
Play Ringtone - forwards all calls that meet the selected criteria to your extension
Select Number - allows you to enter the number to which you want to forward all calls that
meet the selected criteria
Number Matches
The number is Select this option, and then enter the number to automatically
forward.
The number is any internal Select this option to automatically forward calls from all internal
number numbers.
The number is any internal Select this option to automatically forward calls from internal
extension starting with numbers that start with a specific number or set of numbers, and
then enter the desired starting number or set of numbers in the
field that appears.
The number is any external Select this option to automatically forward calls from all external
number numbers.
The number is any external Select this option to automatically forward calls from external
number starting with numbers that start with a specific number or set of numbers, and
then enter the desired starting number or set of numbers in the
field that appears.
The number is private Select this option to automatically forward all calls from any
private number.
The number is out of area/ Select this option to automatically forward all calls from any
unknown number that is out of area or is an unknown number.
Dialed Number
Number caller dialed to reach Select this option to automatically forward any call you receive in
me is which the caller reached you by dialing a specific number, and
then enter the desired number in the field that appears.
My Availability
My availability is Select the check box next to each availability state for which you
want to forward calls. Whenever your availability state matches
one of the selected availability states, all of your calls will
automatically be forwarded.
On the Phone
I’m on the phone Select this option to always forward all incoming calls whenever
you are already on another active call.
Time Is
Time is Select this option to automatically forward all calls during a
specific time period. Enter the start and end time for forwarding
calls in the from and to fields.
Day is Select this option to automatically forward all calls on a specific
day.
3. In the list pane, select the user whose Power Routing Rules you want to view.
The General tab in the details pane displays parameters for the selected user.
4. Select the Routing tab, and then select the Power Routing Rules subtab.
2. In the navigation pane, click Administration > Users > Programmable Buttons.
3. In the list pane, click the name of the user to configure extension monitoring for.
The IP Phone Buttons tab in the details pane displays parameters for the selected user.
5. Select the subtab for the device or toolbar the user will use to monitor another extension.
6. In the Function column for the button to configure, select Monitor Extension.
7. In the Long Label and Short Label fields, type a label to appear next to the button on the phone
or button box LED display to remind the user of the button’s function. (For details about labels, see
Configuring Programmable Buttons through Connect Director on page 267.)
8. In the Extension field, type the extension you want the user to monitor.
9. In the Ring delay before alert list, select one of the following:
None - to start ringing the phone audibly on the first ring.
1, 2, 3, or 4 - to ring the phone silently for the selected number of rings before ringing the
phone audibly.
Don’t Ring - to not ring the phone audibly.
10. Under Show caller ID on monitored extensions, select one of the following:
Never - to not show caller ID for inbound calls on the monitored extension.
Only when ringing - to show caller ID for inbound calls on the monitored extension only when
the phone is ringing.
Always - to show caller ID for inbound calls on the monitored extension when the phone is
ringing and as long as the call is connected.
11. To assign a secondary function to the phone button, select the desired function under No
connected call action:
This secondary function applies when the button is pressed while the monitoring party’s phone is
not on an active call.
12. To assign a tertiary function to the phone button, select the desired function under With
connected call action:
This tertiary function applies when the button is pressed while the monitoring party’s phone is on
an active call.
IP480, IP480g, and IP485g phones support only one custom button per monitored extension. If
you designate more than one custom button on a particular phone to monitor the same extension,
the specifications are ignored and the additional monitor extension buttons are converted to
regular call appearance buttons. Connect Director does not reflect this change.
The Monitor Extension button can be configured for multiple functions, depending on the status of
the monitoring user's phone.
When there is an incoming call on the monitored extension, pressing the Monitor Extension
button answers the incoming call.
When there is no active call on the monitoring user's phone, pressing the Monitor Extension
button initiates the action configured for the No connected call action parameter (see table
below for more information).
When there is an active call on the monitoring user's phone, pressing the Monitor Extension
button initiates the action configured for the With connected call action parameter (see table
below for more information).
The Monitor Extension button shines red when the user whose extension is being monitored is on
a call. If that call is put on hold and a second call is accepted on the monitored extension, the LED
turns green and flashes twice. Similarly, the LED flashes three times if a third call is accepted. For
information about LED flash patterns, see Table 125.
When Show caller ID name and number for other extensions is not enabled for the COS
telephony permissions, Connect client Contact Viewer (and Agent Viewer) show the number of
calls on a user's stack but do not show who the user is talking to. Properties is also disabled.
Note
A user must also have an access license of Workgroup Supervisor or higher to record the calls of
other users.
A COS can be configured to allow initiation for call intervention and to accept call intervention of the
following types:
Directed intercom
Whisper paging
Barge-in
Record calls
Silent monitor/Silent coach
2. In the navigation pane, click Administration > Users > Class of Service > Telephony Features
Permissions.
3. Click the name of the COS profile to configure call intervention methods for.
In the details pane, the Telephony Features Permissions page for the selected COS is displayed.
Allow initiation
Directed intercom: Specifies whether users can receive intercom calls or
pages. Select one of the following options:
Accept
None means that users cannot receive intercom calls or
pages.
All means the user with this COS can receive whisper
page calls from all users.
Only From means the user with this COS may receive
whisper page calls only from the specified user.
Barge-in: Enables users to barge in on other users’ calls.
Allow initiation Note: Barge-in permits one party to join an existing call as a
fully conferenced participant. When barge-in is initiated, a
brief intrusion tone is played to the other participants and (if
present) the monitor/record warning tone is discontinued.
Barge-in: Specifies whether users’ calls can be barged-in upon.
Select one of the following options:
Accept
None means that users with this class of service may not
receive barge-ins from anyone.
None means that users within this COS may not have
their calls recorded by anyone.
All means that users within this COS may have their calls
recorded by anyone else in this COS.
Only From means that users within this COS may have
their calls recorded only by the person or extension
specified.
Silent monitor/Silent coach other’s Allows a supervisor to monitor a phone call of a user and to
calls: speak to the user without the other party hearing.
Allow initiation
Silent monitor/Silent coach other’s Specifies whether users within this class of service may
calls: have their calls recorded by other users. Select one of the
following options:
Accept
None means that users within this COS may not have
their calls silently monitored or be silently coached during
a call by any other system user.
All means that users within this COS may have their calls
silently monitored or be silently coached during a call by
any other user in this class of service.
Only From means that users within this COS may have
their calls silently monitored or be silently coached during
a call only by the person or extension specified.
Directed Intercom
A user can initiate an intercom call through a programmable button on an IP phone, via the Connect
client, or via the phone by entering “*15” + extension number. For more information about the Intercom
feature, see the Mitel Connect Planning and Installation Guide.
As an alternative to using an in-house paging system, you can broadcast a message to a group of
phones using the paging groups feature. For more information about paging groups, see Configuring
Paging Groups on page 327.
Whisper Paging
The Whisper Page feature allows a user to break into an active call in order to speak with an internal
user. This occurs without the remote caller hearing the interruption and without the operator hearing
the remote caller.
A real-world example illustrates the function: You are on a call with a client when another client arrives
in the lobby for an appointment with you. The administrative assistant knows that you are on a call and
uses the Whisper Page feature to interrupt the call to announce that someone is waiting for you in the
lobby. You hear the voice of the administrative assistant and the client at the same time, but neither of
them can hear the other.
Implementation details:
While on a Whisper Page call, the internal user can mute the audio channel to the original caller.
The user can respond to the operator without the original caller hearing. This can be accomplished
from:
One of the IP Phone soft keys, rather than the standard mute button
Connect client, if you do not have an IP phone
Both the operator and the internal user hear a tone when the Whisper Page call is connected. The
tone is the same as the tone for the Intercom feature.
To receive a Whisper Page call, the internal user must be on the handset of a multiline IP Phone. If
a Whisper Page call is sent to any other phone (SoftPhone), the call will be treated as an intercom
call.
If a Whisper Page call is sent to a phone that is not on an active call, the feature behaves the same
as an intercom call.
The Whisper Page feature does not work if the internal party is on a three-way conference call.
No call control operations can be performed on a Whisper Page call, except to hang up the call.
For example, the Whisper Page call cannot be put on hold, transferred, parked, and so on.
Barge-In
Barge-in allows a user to join an existing call as a fully conferenced participant. When Barge-in is
initiated, a brief intrusion tone is played to the other participants and, if present, the monitoring warning
tone is disabled.
A supervisor can barge in to a call he or she is currently monitoring. However, it is not possible to
revert a barge back to a monitored call. If desired, the supervisor can hang up the call and restart
monitoring.
The original controlling party of a call remains the controlling party even after a barge-in. A subsequent
agent hook flash disconnects the supervisor, who was the last party added.
Recording Calls
The Mitel Connect system provides the capability for users to record calls. For more information about
call recording, see the Mitel Connect Planning and Installation Guide.
Note
A user must have an access license of Workgroup Supervisor or higher to record the calls of other
users.
A warning tone is normally played to call participants when the call starts being monitored or recorded.
However, silent monitoring and recording allows operators and supervisors to hide the fact that they
are monitoring or recording calls by not playing a warning tone. For more information about silent
monitoring and recording, see Silent Monitoring and Recording on page 351.
Silent Monitor
Monitoring allows a supervisor to monitor a user’s calls. The supervisor hears the other call
participants, but they do not hear the supervisor. Monitoring is undetectable by the parties being
monitored, except for an optional warning tone. Monitoring is typically used in workgroups to evaluate
agent performance. For information about enabling the silent monitor warning tone, see Silent
Monitoring and Recording on page 351.
In a monitored call, a supervisor hook flash is ignored. However, a hook flash by the other parties
works the same as in a two-party call. In particular, an agent flash puts the call on hold and allows a
consultative transfer or conference.
Silent Coach
Silent Coach is a client feature that lets a user (the initiator) intervene in another user’s active call and
communicate with that user (the recipient). The initiator can speak to the recipient and listen to all
other participants on the call. The recipient is the only call participant that can hear the initiator. For
more information about silent coach, see Configuring Silent Coach on page 311.
This chapter provides information about configuring the voice mail system in the following sections:
2. In the navigation pane, click Administration > Features > Voice Mail > System Distribution
Lists.
The System Distribution Lists page is displayed. For descriptions of the columns on the System
Distribution Lists page, see Table 127.
2. In the navigation pane, click Administration > Features > Voice Mail > System Distribution
Lists.
To edit an existing distribution list, click the name of the distribution list in the list pane.
To create a copy of an existing distribution list, click Copy.
To create a new distribution list, click New.
The General tab in the details pane displays parameters for the new or existing distribution list.
4. Review the parameters and specify values as appropriate. For descriptions of the distribution list
parameters, see Table 128.
5. Click Save.
Tip: To filter the list of Available users, use the filter button. You
can use the page and row controls to navigate through the list.
AMIS system You can add AMIS system users to system distribution lists. In the
drop-down list, select the AMIS system where the users reside,
and then click Add.
A dialog box prompts you for the extension number of the user.
Enter the number and click OK. The AMIS System ID and
extension, or Mailbox ID, appears in the distribution list box.
2. In the navigation pane, click Administration > Features > Voice Mail > System Distribution
Lists.
3. Click the name of the distribution list you want to edit in the list pane.
The General tab in the details pane displays parameters for the distribution list.
To add users to the distribution list, select the users in the Available list and click the right
arrow button to move the users to the Selected list.
To remove users from the selected distribution list, select the users in the Selected list and
click the left arrow button to move the users to the Available list.
5. Click Save.
2. In the navigation pane, click Administration > Features > Voice Mail > Options.
3. Review the parameters and specify values as appropriate. For more information about all of the
user parameters on the Voice Mail Options page, see Table 129.
4. Click Save.
AMIS call support is enabled by default. Incoming AMIS voice mail is delivered in the same manner as
other voice mail; however, users cannot send replies to AMIS voice mail. To send outbound AMIS
voice mail, you must create AMIS systems in Connect Director.
Mitel negotiates the setup, handshaking, and teardown of AMIS system calls. Each voice mail requires
a call over the AMIS delivery and call-back numbers.
You can configure AMIS systems for two addressing methods. If the system does not use off-system
extensions, a System ID number is required to direct the voice mail to the correct site. When a user
wants to send a voice mail to a recipient on an AMIS system, he or she first must enter the System ID
and then the mailbox number or extension.
If the system uses off-system extensions, these extensions become off-system mailboxes. In this
case, users simply address the voice mail by mailbox number and without entering the System ID.
AMIS Restrictions
The following restrictions are placed on AMIS voice messages:
Mitel establishes a call to an AMIS system for each voice mail. If a voice mail is addressed to
multiple recipients, Mitel delivers as many as nine voice mails in a single call. If a voice mail has
more than nine recipients, Mitel makes additional calls until the voice mail is delivered to all
recipients. You can optimize AMIS voice mail delivery by using distribution lists at the remote AMIS
sites.
After ten failed attempts to complete a call to an AMIS system, Mitel disables the AMIS system and
generates an event log.
After Mitel establishes an AMIS system call, it tries three times to complete message delivery to
each recipient. If Mitel fails to deliver a voice message after three attempts, it stops trying and
returns the message to the sender. However, if the sender’s voice mailbox is full, the sender will
not receive the failed message.
Outbound voice mail messages for disabled AMIS systems are accepted and queued. To deliver
queued messages, enable the AMIS system in question on the AMIS edit page.
AMIS is enabled by default, but ensure that AMIS is enabled in your system. For more details, see
Enabling AMIS Systems on page 463.
Review the extension plans for all the systems to which you want to connect. Make sure they use
the same extension length and that extension numbers do not overlap.
After setting these global parameters, the next step is creating and configuring the individual AMIS
systems.
2. In the navigation pane, click Administration > Features > Voice Mail > Options.
4. Select the Allow incoming AMIS access to Broadcast distribution list check box to allow
delivery of incoming AMIS messages to the Broadcast Distribution List.
5. Select the Allow incoming AMIS access to system distribution list check box to allow delivery
of incoming AMIS messages access to the System Distribution Lists.
6. Click Save.
2. In the navigation pane, click Administration > Features > Voice Mail > AMIS.
The AMIS page is displayed. For descriptions of the columns on the AMIS page, see Table 131.
2. In the navigation pane, click Administration > Features > Voice Mail > AMIS.
To edit an existing AMIS system, click the AMIS system in the list pane.
To create a copy of an existing AMIS system, click Copy.
To create a new AMIS system, click New.
The General tab in the details pane displays the parameters for the new or existing AMIS system.
4. Review the parameters and specify values as appropriate. For descriptions of the AMIS system
parameters, see Table 128.
5. Click Save.
Outbound voice mail for this system is queued until the system is
reset by selecting this check box.
Language From the drop-down list, select the language of the AMIS system.
The System ID must begin with a digit reserved for trunk access
codes, though it can be different from other trunk access codes.
To make the System ID intuitive to voice mail users, choose a site
identifier related to the public numbers used at the site.
System IDs are required and can be single digits. Each AMIS
system you create must have a unique System ID.
Delivery number Specifies the number Mitel calls to send AMIS voice messages to
the remote system.
Call back number Specifies the number on which you receive AMIS messages.
Mailbox length Specifies the length of the remote site’s mailboxes or extensions.
If you use off-system extensions, the length must match the
length of your extensions.
Users can address outgoing voice messages while the system is disabled. Outbound messages are
queued until the individual AMIS system is re-enabled. Attempts to deliver to a disabled AMIS system
fail.
2. In the navigation pane, click Administration > Features > Voice Mail > Options.
4. Click Save.
2. In the navigation pane, click Administration > Features > Voice Mail > AMIS.
3. Click the name of the system you want to disable in the list pane.
The General tab in the details pane displays the parameters for the selected AMIS system.
5. Click Save.
2. In the navigation pane, click Administration > Features > Voice Mail > AMIS.
3. Click the name of the system you want to delete in the list pane.
The General tab in the details pane displays the parameters for the selected AMIS system.
4. Click Delete.
The AMIS system is deleted and not longer appears in the list pane.
You can also set voice mail to automatically forward. That is, a mailbox may be configured to send any
message it receives to another mailbox. The message sent to the original mailbox can be
automatically deleted, as an option. The target mailbox for forwarded messages may be any user, a
workgroup, a route point, an AMIS address, or a system distribution list other than a broadcast
distribution list. A message announcing that the message has been automatically forwarded, including
a time stamp, is pre-pended to the forwarded message. For example, the recipient of such a message
might hear, “Auto-forwarded message received at 9:10 AM from Customer Support Mailbox.”
An example of when this feature might be used is for handling off-hours calls when few support staff
are available. Off-hours calls may be routed to a back-up extension. If no one is available to answer
the back-up extension, calls could end up in a voice mailbox that is not checked for hours. The back-up
extension can be set to automatically forward any calls that are received in its mailbox. Calls can be
forwarded to a mailbox that is checked on a regular basis.
Automatic forwarding is available between distributed voice mail servers. The forwarded message is
handled as any other message would be, including any message waiting indicator, any calling
notification, return receipt requests, or urgent markings. Automatically forwarded messages can be
forwarded and replied to. If the target mailbox is full, the message is left in the sending mailbox. If a
message is automatically forwarded to a list of mailboxes and one of these mailboxes is full, that target
is skipped.
For information about configuring voice mail delivery options, see Voice Mail Tab on page 402.
You can configure escalation profiles to notify employees when a voice mail is received, which can be
helpful in providing superior service and support after hours. For example, if a customer calls into your
system but no one answers the call, the customer can leave a voice message. If escalation profiles are
configured, this message triggers the escalation notification process so that appropriate personnel are
notified by email, phone, or pager.
If the first person does not respond to the notification by listening to the customer’s voice mail
message within a certain time period, the next step in the escalation process is initiated and the
designated person is contacted, and so on, until as many as 10 people have been contacted. The
escalation notification process ends when someone dials into the Mitel Connect system and listens to
the customer's voice mail message or after the steps in the process have been repeated a specified
number of times. Refer to Figure 22 for an example of the flow for an escalation profile event.
A maximum of ten notification steps can be configured. Each step allows the system administrator
to specify who is contacted and the method used to contact that person; the person can be
contacted by phone call or pager notification. An email can be sent to that person in addition to or
instead of the phone call or pager notification.
If a message is left, and someone listens to it, the notifications stop. However, if someone marks a
message unheard, the notification process restarts in the same way that receiving a new voice
message triggers the process.
Escalation notification is supported on all mailboxes, including mailboxes of extension and mailbox
users, mailbox-only users, and SMDI mailbox-only users, as well as workgroup mailboxes.
Note
Any steps within a configured profile that are not configured are skipped during the escalation
process.
2. In the navigation pane, click Administration > Users > Escalation Profiles.
3. Click the name of the user for whom you want to configure escalation profiles.
4. Review the parameters and specify values as appropriate. For descriptions of the escalation
profile parameters, see Table 132.
5. Click Save.
The parameters on the Users Escalation Profiles page are described in Table 132.
Note: This parameter does not apply if you select one of the
Notification by email options.
Step subtabs There is a subtab for each step in a profile; there are a maximum
of 10 steps for each escalation profile.
Timeout Specifies the amount of time, in minutes, that elapses before the
next step in the profile is executed. This is the amount of time a
message recipient has to respond to the original voice mail before
escalation occurs.
Urgent only Select this check box to send notification only when the escalation
is determined to be urgent.
Table 133: Users Escalation Profiles Page: Escalation Profiles Tab (Continued)
Parameter Description
Notification by email
Deliver message as email Select one of the following three email delivery options:
Pager
Phone
None
Notification number Specifies the phone or pager number to send notification to.
Pager ID Specifies the pager pin number required to access the recipient.
Pager data Specifies the code the recipient requires to indicate that a page is
waiting.
3. Click the name of the user for whom you want to link an escalation notification profile to an
availability state.
The General tab displays the parameters for the selected user.
4. Click the Routing tab, and then the click the Availability States subtab.
The Available subtab displays the parameters for the Available availability state.
5. Click the subtab for the availability state that you want to edit.
6. In the Voice mail escalation profile list, select the escalation profile that you want to associate
with this availability state.
7. Click Save.
8. Repeat this process to associate different escalation profiles with each of the different availability
state as needed.
When a user's mailbox approaches its maximum capacity, the system sends the user a notice that
their mailbox is almost full. Each time a user whose mailbox is almost full logs into voice mail, the user
receives a notice telling them how much space remains. In this way, mailbox owners are given
adequate notice to clean up their mailboxes and can avoid an unexpected “mailbox full” notification.
Be aware of the following operational details for full voice mailbox notifications:
The maximum number of messages a user can receive ranges from 0 to 500, depending on the
value set in the Incoming max. messages field on the Voice Mail Permissions page. Because this
is a class of service setting, the limit can vary among users in the system.
As a user's mailbox approaches its limit, a warning message is played indicating that the user has
room for only “n” number of messages, where the value “n” counts down from 10 to 0. This
message is played when a user logs into the mailbox via the telephone user interface or Connect
client.
The threshold for triggering this mailbox-full notification is when there is enough space for only 10
additional messages. This non-configurable threshold is the same for all users, regardless of total
mailbox capacity.
The “almost full” notification is played until a user deletes messages, thereby reducing the number
of messages below the threshold.
When a mailbox reaches its limit, the mailbox owner is notified, if notification has been enabled for
this user, and a warning event is logged. For information about sending email notification of a full
mailbox, see Plug-in the VMB into the new system. on page 472.
When a message is deleted, it is no longer counted against the total capacity for a user's mailbox.
Deleted messages are temporarily held in a deleted messages folder. Up to 200 deleted
messages can be temporarily held. When this limit is reached, the mailbox is considered full and
the user is unable to receive new messages until the deleted messages have been purged. If this
happens, the mailbox owner receives the following notification: “Your mailbox is full. No more
messages will be accepted until you purge your deleted messages.”
Deleted messages can be manually purged by the user or automatically by the system. Automatic
purging occurs on a nightly basis.
Complete the following steps to move the voice mailbox to a new system:
1. Take a backup of the VMB and delete the existing VMB from the old system.
2. Perform a “Full” factory reset of a VMB by pressing the factory reset button for more than 10
seconds.
3. Click the name of the user for whom you want to enable notifications for.
5. Select the Send email warning when mailbox is full check box to enable notification.
6. Click Save.
7. Repeat this process for each user you want to configure mailbox-full notifications for.
A user account can be configured so that the user receives email notification of a new voice message.
This email notification can also arrive with an attached WAV file of the actual voice message. The user
can receive both the notification and the voice mail in the email client.
To monitor the status of email, Synchronization with Gmail for Business uses the IMAP4 and OAuth2
protocols to access and authenticate with Gmail server. The Secure Sockets Layer (SSL) protocol is
used to secure pertinent communications on the network.
Note
Google Gmail is the only email server that a Mitel Connect system can interoperate with for
synchronization of voice mail status. The feature currently works on Gmail Premier and Educational
email accounts only. These accounts have the APIs that are necessary for the integration to work.
Overview
Synchronization Service
The service runs on the Headquarters server and all DVS servers. The name of the service is Mitel-
VmEmSync.
Each service is responsible for synchronizing the mailboxes that are on the same server. For example,
the service running on the Headquarters server syncs the mailboxes located on the Headquarters
server.
In the case of mailboxes on a Voice Mailbox Server switch (VMB switch), the synchronizing is done by
the VmEmSync service that is running on the same server as the TMS that manages the VMB.
Synchronization Rules
The synchronization rules depend on whether an email notification has the attached WAV file and
whether the server is synchronizing during Mitel-VmEmSync service startup or during normal
operation.
Synchronization On Startup
Start-up synchronization refers to initialization of the Mitel-VmEmSync service. This service gathers
information on all voice mail and related email for each user and then synchronizes the states based
on the rules in either Table 134, which is for email text only, or Table 135, which is for email with WAV
file attachment.
Synchronization during normal operation is triggered when a user makes a change to a voice mail or
email. In Table 136 and Table 137, the voice mail change is listed in the “Event” column, and the
consequence for the voice mail or email is listed in the “Sync Action” column.
Table 137: Sync with WAV File Attachment during Normal Operation
Event Sync Action
Voicemail is deleted. Delete email.
Voicemail is heard. Mark email as read.
Voicemail is undeleted. Move email to Inbox. Mark email as
unread if voice mail is unheard.
Voicemail is marked unheard. Mark email as unread if voicemail is in
“NEW” folder.
Email is deleted. Delete voicemail.
Email is read. Mark voicemail as heard.
Email is undeleted. Move voicemail to “Saved” folder.
Email is marked unread. Mark voicemail as unheard if email is
not in “Trash” folder.
For example, consider a Mitel deployment that supports 1000 users and that each user has 5
messages. The state of 5000 messages total is monitored by the Mitel Connect system. For monitoring
the state of 5000 messages, the required bandwidth is 75 Kbytes per second. In this scenario, the time
to synchronize a message’s state change between voice mail and email is less than 20 seconds.
In the event of a server restart, the initial synchronization time for a system with up to 1000 users is
less than 3 minutes.
Synchronization Criteria
Synchronization is automatically enabled for a user if both of the following are true:
1. The user is configured to receive email notifications. The email address must be the same as the
user’s Premier/Education Gmail account.
2. The system administrator configured an email server with the domain for the user’s email address
by using OAuth2 client email and private key. For example, the system administrator configured
OAuth2 access with the domain for the user’s email address. Refer to Configuring the Google
OAuth2 Settings on page 476 and Configuring Gmail Synchronization in Connect Director on page
477 for more information.
For the Premier and Education versions of Gmail, OAuth2 is set up by the system administrator. The
administrator enables certain capabilities and acquires a system-generated private key at the Google
OAuth2 management web page. The system administrator must first perform these actions in the
applicable Google page before providing access to all accounts on a domain.
The private key from Google OAuth2 management and the client email allow the Headquarters server
or DVS to:
Authenticate with Google mail servers without needing the user passwords.
Establish a trusted host relationship between the two servers.
2. From the Google Developers Console bar, click to open the Products & services menu, and then
click Permissions.
3. Click the Service accounts tab, and then click Create service account.
b. Select the Furnish a new private key check box, and leave JSON selected.
c. Select the Enable Google Apps Domain-wide Delegation check box to grant Google Apps
domain-wide authority to the service account.
d. Click Create.
Your new private key pair is generated and downloaded to your machine. Make note of where
this file is located; you will need information in this file to configure Gmail synchronization in
Connect Director.
For the latest information about the registration process, refer to the Google OAuth2 service
accounts page.
6. Select Security from the list of controls. If you do not see Security listed, select More controls
from the gray bar at the bottom of the page and then select Security from the list of controls.
If you do not see the controls, make sure you are signed in as an administrator for the domain.
7. Click Show more, and then click Advanced settings from the list of options.
9. In the Client Name field, enter the Client ID for the service account.
You can find the client ID on the Service accounts tab, on the Permissions page of the Google
Developers Console.
1. Navigate to and open the JSON file that was downloaded when you created the service account.
3. In the navigation pane, click Administration > System > Additional Parameters.
4. Under Gmail configuration, in the Client Email field, enter the OAuth2 client email specified in
the JSON file.
5. In the Private Key field, enter the private key specified in the JSON file.
6. In the Domain Name field, enter the domain of your premier or educational Gmail account.
7. Click Save.
This chapter describes how to configure the auto attendant and includes the following sections:
Overview
An Auto-Attendant is a program that answers and handles inbound calls without human intervention.
Auto attendants typically provide menu-driven options through which callers can obtain information,
perform tasks, or connect to a requested extension.
The Auto-Attendant can answer incoming calls and transfer callers to an extension, a mailbox, another
menu, a workgroup, or a route point. It also includes a dial-by-name feature that transfers callers to the
system directory, where they can connect to an extension by dialing the user’s name.
On-Hours mode lets you configure the Auto-Attendant to handle incoming calls during regular
office hours.
Off-Hours mode covers all hours not scheduled in other modes. This is typically when the office is
closed for the evening and weekend.
Holiday mode lets you configure how the Auto-Attendant functions on holidays.
Custom mode is used for single days that are not covered by the other modes such as a company
special event.
You can configure these modes for different situations, and each mode has a configuration page.
Schedules are set using the Schedule parameter. (For information about establishing schedules, see
Chapter 16, Configuring Schedules on page 489.)
2. If the Custom schedule is not available, the Auto-Attendant checks for the Holiday schedule.
3. If the Custom or Holiday schedule is not available, the Auto-Attendant checks for the On-Hours
schedule.
4. If the Custom, Holiday, or On-Hours schedule is not available, the Auto-Attendant checks for the
Off-Hours schedule. Connect Director forms the Off-Hours schedule from all the hours not
scheduled in the other modes. If you do not create a schedule for at least one of the other modes,
the On-Hours schedule is in effect.
There are no hard limits to the number of Auto-Attendants that can be configured in a Mitel Connect
system. However, in most installations, the system can support up to 500 Auto-Attendant menus.
However, this number may be affected by the complexity of your dialing plan.
When a caller reaches the main Auto-Attendant, it provides options for forwarding calls to individual
user extensions. It can also provide options for forwarding calls to the sales department and customer
operations department Auto-Attendants. From the sales or customer operations Auto-Attendants,
callers can be given options that transfer calls to the appropriate extension.
The dial-by-name operation of the Auto-Attendant transfers callers to the system directory, where they
can connect to an extension by dialing the user’s name. The dial-by-name operation can be limited to
a department or other organizational sub-group by associating the operation with an extension list. To
create extension lists, refer to Extension Lists on page 426. Only users that have been configured to
be included in the dial-by-name list will be included. For more information, refer to Configuring a User
Account on page 390.
When callers are transferred back to the Auto-Attendant, either willingly or because of an error, they
are returned to the default Auto-Attendant menu on the associated server.
The Auto-Attendant page is displayed. The columns in the list pane are described in Table 138.
The General tab in the details pane displays parameters for the new or existing auto-attendant
menu.
4. Review the parameters on the General tab, and specify or edit values as appropriate. (For more
information about the parameters on the General tab, see Table 139 on page 482.)
5. For each auto-attendant menu that you want to create or modify, select the relevant tab and
specify or edit parameters as necessary. (For more information about the parameters on the On-
Hours, Off-Hours, Holiday, Custom, DNIS tabs, see Table 140 on page 483 and Table 141 on page
486.)
6. Click Save.
When this option is enabled, users can dial into the system
to record auto-attendant prompts in the same way that they
would change their personal mailbox greeting, modifying
the greeting without having to access the recording
interface through Connect Director. With this capability,
administrators can delegate the task of recording auto-
attendant menus to more appropriate team members.
Menu password A separate voice mailbox is created for each auto-attendant
menu, allowing users to dial into the system to change the
menu prompts. Each auto-attendant menu may have its
own password and a unique, dialable number.
Table 140: Auto Attendant Page: On-Hours, Off-Hours, Holiday, and Custom Tabs
Parameter Description
Schedule From the drop-down list, select a schedule to apply to the auto-
attendant menu. Any available schedules of the type matching the
tab name (On-Hours, Holiday, or Custom) are included in the list.
For information about setting up schedules, see Chapter 16,
Configuring Schedules on page 489.
View schedule Click this link to view the selected schedule.
Table 140: Auto Attendant Page: On-Hours, Off-Hours, Holiday, and Custom Tabs (Continued)
Parameter Description
Disable monitor/record This check box can be used to stop playing the warning tone for call
warning tone monitoring and recording if the tone is enabled on the Call Control
Options page. For details, see Configuring Call Control Options on
page 344.
Before disabling the warning tone, you may wish to consult with
legal counsel regarding your intended use.
WARNING: Mitel does not warrant or represent that your use of call
monitoring or recording features of the Software will be in
compliance with local, state, federal, or international laws that you
may be subject to. Mitel is not responsible for ensuring your
compliance with all applicable laws.
Timeout The amount of time the caller has to perform an action. Specify 0-
30000 milliseconds.
Prompt text Before recording a prompt for a new or existing auto-attendant
menu, enter the prompt text in this field. This text provides a
convenient record of your prompt if you should ever need to re-
record the prompt.
Prompts on the Mitel system can be imported into the system using
µ-law, WAV file format. If you would like your prompts to match the
voice of the Mitel system, please contact Worldly Voices at
www.worldlyvoices.com and request that “Connie” record your
prompts. Worldly Voices provides this service with a rapid
turnaround time for a nominal fee.
Recorded prompt Click any of the following buttons to perform tasks related to the
auto-attendant menu prompt:
Table 140: Auto Attendant Page: On-Hours, Off-Hours, Holiday, and Custom Tabs (Continued)
Parameter Description
Operation Each item in the Operation drop-down list lets you select the action
that is associated with its key pad number. This number is located to
the left of each Operation drop-down list. When prompted by the
auto attendant, the caller is asked to enter this number.
Dial by first name lets the caller spell the user’s first name from
the key pad. The auto attendant then transfers the caller to the
user’s extension. To limit the dial list to a department or other
organizational sub-group, select an extension list from the drop-
down list in the Destination field. Select <None> to remove the
limit and allow callers to connect to any user in the System
Directory.
Dial by last name lets the caller spell the user’s last name from
the key pad. The auto attendant then transfers the caller to the
user’s extension. To limit the dial list to a department or other
organizational sub-group, select an extension list from the drop-
down list in the Destination field. Select <None> to remove the
limit and allow callers to connect to any user in the System
Directory.
Table 140: Auto Attendant Page: On-Hours, Off-Hours, Holiday, and Custom Tabs (Continued)
Parameter Description
Time out From the drop-down list, select the action that the Auto-Attendant
takes when the caller does not press a key within a system-defined
period of time. Typically, the action is Repeat Prompt.
Too many errors From the drop-down list, select the action that the Auto-Attendant
takes when the caller presses an invalid key too many times in a
row. You might specify a user extension, such as the operator, for
this. Typically, the action is Hang Up. If no action is specified, Hang
Up is invoked by default.
Invalid entry From the drop-down list, select the action to take when a key is
pressed that the auto attendant does not recognize. Typically, the
action is Repeat Prompt.
Multiple digits In the drop-down list, select one of the following actions to take
when a caller enters multiple digits:
This chapter describes how to create schedules for the Mitel Connect system in the following sections:
Overview
Schedules let you define business hours and can facilitate proper routing of inbound calls. Schedules
can be used by hunt groups and by the auto attendant.
On-Hours
Holiday
Custom
Off-Hours
Hours for on-hours and custom schedules are configurable. Holiday schedules let you identify the days
when your organization is otherwise not open for business. Off-hours are considered all time that is not
entered in the other schedules.
2. If a Custom schedule has not been configured, the auto attendant or hunt group looks for the
Holiday schedule.
3. If the Custom or Holiday schedule have not been configured, the auto attendant or hunt group
looks for the On-Hours schedule.
4. If the Custom, Holiday, or On-Hours schedule have not been configured, the auto attendant or
hunt group looks for the Off-Hours schedule.
Connect Director forms the Off-Hours schedule from all the hours not scheduled in the other modes. If
you do not create a schedule for at least one of the other modes, the On-Hours schedule includes all
hours.
2. In the navigation pane, click Administration > Features > Schedules > On-Hours.
In the details pane, the General tab displays parameters for the new or existing schedule. (For
details about the parameters, see Table 142.)
Tip
You can schedule multiple start and stop times in one day by clicking Add to add more rows
and modifying the Start time and Stop time in each row accordingly. For example, on Monday,
you can set the schedule to start at 8:00 A.M. and stop at 11:30 A.M. and then add another
row for Monday that starts at 1:30 P.M. and stops at 5:30 P.M.
5. Click Save.
2. In the navigation pane, click Administration > Features > Schedules > Holiday.
In the details pane, the General tab displays parameters for the new or existing schedule.
5. Click Save.
2. In the navigation pane, click Administration > Features > Schedules > Custom.
In the details pane, the General tab displays parameters for the new or existing schedule.
5. Click Save.
This chapter describes how to create a workgroup and configure all parameters that relate to
workgroups. The following topics are included:
Overview
A workgroup is a group of agents that receives incoming calls. Workgroups use Automatic Call
Distribution (ACD) to distribute incoming calls to the workgroup members. In a large enterprise, a
workgroup can function as a small to medium-sized contact center.
Distributes calls to agents within a workgroup and places calls in a call waiting queue as needed
Supports workgroups with a maximum of 300 members, including agents and supervisors
Provides reports on workgroup activity
By calling a Direct Inward Dialing (DID) number or Dialed Number Information Services (DNIS)
number that is directed to the workgroup
Call Distribution
The Workgroups feature has flexible boundaries for distributing calls to a workgroup. The system can
be configured to send a warning to the workgroup if inbound calls reach excessive levels or stay in the
call-waiting queue too long. The system administrator defines the thresholds for sending warnings.
Mitel’s implementation of Automatic Call Distribution (ACD) supports four configurable patterns for
distributing inbound calls to agents in a workgroup. When no agent is available, calls can be directed
to a voice mailbox for the workgroup, which all agents can access, or to a queue where calls wait until
an agent is available.
Top Down always starts with the first agent in the active agent list and sequentially searches
through the list until an available agent is found.
Round Robin starts with the next available agent in the active agent list and sequentially searches
through the list until an available agent is found. The search starts with the agent that is next in the
list after the agent that last received a call. If an available agent is not found, the search starts
again at the beginning of the active agent list.
Longest Idle sends the call to the agent with the longest idle time.
Agents are available to receive calls when they have a status of logged in; agents with a status of
logged out or wrap-up do not receive calls.
When no agents are available to take a call, the following call overflow options are available:
Note
The following registry key must be created and set to 1 for transferring workgroup queue calls to
call forwarding logged out destination when all the agents are logged out.
Connect client provides real-time call information such as Caller ID, call duration, and call states to
agents and supervisors. A call’s detailed routing information also appears globally so that agents know
about every other employee in the enterprise with whom the current caller spoke before reaching the
contact center. Additionally, the contact center’s mailbox appears to every agent for accessing and
helping a caller who chooses to leave a message rather than wait for an agent.
Agents and supervisors have access to the real-time Queue Monitor function. This function provides
current information on the activities of the contact center queue. It displays the number of callers,
information about each caller, and the time callers have been waiting.
The Agent Monitor lets the supervisor manage the workgroup agents. It lets the supervisor see the
current login status of all agents and the state of the agents’ call involvement. Agent Monitor also lets
the supervisor change the status of any agent.
Workgroup Reports
The Mitel Connect system tracks all call activity and places Call Detail Records (CDRs) in a database
and a text file on the server. The system uses the records to generate CDR reports. This information
can help a supervisor manage call flows and workgroup resources. The log for each call shows the
following information:
See Appendix B, Call Detail Record Reports for more information about workgroup reports.
Configuring Workgroups
This section describes how to add or modify a workgroup. For information about configuring distributed
workgroups, see Distributed Workgroups on page 516.
Viewing Workgroups
1. Launch Connect Director.
The Workgroups page is displayed. For descriptions of the columns in the list pane on the Workgroups
page, see Table 145.
To edit an existing workgroup, click the name of the workgroup in the list pane.
To create a copy of an existing workgroup, click Copy.
To create a new workgroup, click New.
The General tab in the details pane displays parameters for the new or existing workgroup.
4. Review the parameters on all of the tabs in the details pane, and specify values as appropriate.
For more information about all of the workgroup parameters on the various tabs of the details
pane, see Workgroup Parameters.
5. Click Save.
Workgroup Parameters
A workgroup has many details. You configure workgroup parameters on the following tabs, which you
can access on the details pane for a particular workgroup:
General Tab
General information about new and existing workgroups is provided on the General tab on the
Workgroups page.
Table 146 describes the parameters on the General tab of the Workgroups page.
Enable DID
DID Range
DID number
Enable DID Select this check box to authorize a workgroup to use a DID
number.
DID Range If a workgroup is authorized for a DID, in the drop-down list
select a DID range for the user.
Routing Tab
Information about call routing features for workgroups is provided on the Routing tab in the details
pane of the Workgroups page. Routing is configured separately for different schedules using the
schedule subtabs. The Routing tab includes the following subtabs:
On-Hours
Off-Hours
Holiday
Custom
For information about configuring schedules, see Chapter 16, Configuring Schedules on page 489.
Table 147 describes the parameters on the Routing tab of the Workgroups page.
Top Down starts with the first agent in the active agent
list and sequentially searches through the list until an
available agent is found.
The search starts with the agent that is next in the list
after the agent that last received a call. If an available
agent is not found, the search starts again at the
beginning of the active agent list.
Longest Idle sends the call to the agent with the longest
idle time
Mailbox Subtab
Table 147 describes the parameters on the Voice Mail tab and Mailbox subtab of the Workgroups
details pane.
Table 149 describes the parameters on the Voice Mail tab and Escalation Profiles subtab of the
Workgroups details pane.
Table 149: Workgroups Page: Voice Mail Tab, Escalation Profiles Subtab
Parameter Description
Escalation notification options Select one of the following options:
Note: This parameter does not apply if you select one of the
Notification by email options.
Step subtabs There is a subtab for each step in a profile; there are a maximum
of 10 steps for each escalation profile.
Table 149: Workgroups Page: Voice Mail Tab, Escalation Profiles Subtab (Continued)
Parameter Description
Timeout Specifies the amount of time, in minutes, that elapses before the
next step in the profile is executed. This is the amount of time a
message recipient has to respond to the original voice mail before
escalation occurs.
Urgent only Select this check box to send notification only when the escalation
is determined to be urgent.
Notification by email
Deliver message as email Select one of the following three email delivery options:
Pager
Phone
None
Notification number Specifies the phone or pager number to send notification to.
Pager ID Specifies the pager pin number required to access the recipient.
Pager data Specifies the code the recipient requires to indicate that a page is
waiting.
Members Tab
On the Members tab of the Workgroups page, you can add and remove agents from a workgroup,
change the order of the active agent list, and change an agent’s status.
Note
A single workgroup can have a maximum of 300 members. However, if the workgroup has the Class
of Service (COS) configured with the telephony feature Allow additional phones to ring
simultaneously and to move calls enabled, the maximum number of agents for the workgroup is 16.
Table 150 describes the parameters on the Members tab of the Workgroups page.
To add an agent to the workgroup, select the agent in the Available list and click the right
arrow button to move the agent to the Selected list.
To remove an agent from the workgroup, select the agent in the Selected list and click the left
arrow button to move the agent to the Available list.
5. Click Save.
If the call distribution pattern is Top Down or Round Robin, the position of the member in the
workgroup list can affect how likely that user is to receive an incoming call.
When Top Down is selected, it is more likely that agents closer to the top of list will be selected to
receive a call. This is because for each new call, the hunt for a free agent always begins at the top of
the list.
When Round Robin is selected, the position of an agent in the list can also affect the likelihood that the
particular agent will be selected to receive a call. This is because for each new call, the hunt for a free
agent moves down the list, starting with the agent that immediately follows the last agent to accept a
call. For example, if Agent 12 is higher in the list than Agent 18 and Agent 19, and if a call comes into
the workgroup while Agent 12 is busy and Agent 18 and Agent 19 are free, Agent 18 is more likely to
receive the call.
For information about changing the call distribution pattern, see Routing Tab on page 503.
4. Select the agent to move in the Selected list, and then do one of the following:
5. Click Save.
5. Under Select agent state, select the desired status for the agent.
Table 150 describes the parameters on the Members tab of the Workgroups page.
Logged Out
Logged In
In Wrap Up
Queue handling information for new and existing workgroups is provided on the Queue Handling tab
on the Workgroups page.
Note: If this check box is cleared, agents can still view all
calls in the queue, but cannot select a call to answer. Calls
continue to be distributed according to the routing
parameters.
There are a maximum of five steps that a call can be routed through once the call reaches the call
queue. Each of the subtabs on the Queue Handling tab represents one of the five steps.
Each step requires a recorded prompt and can specify different caller interactions and give the caller
the ability to select where the call is routed. Only Step 5 is required; any of the first four steps can be
skipped.
Table 152 describes the parameters on the Queue Handling tab and Step n subtabs of the Workgroups
page.
Note: This option is not available for step 5, the final step.
Announce estimated wait time Select this check box to announce the estimated wait time
to callers in this step of the queue.
Select this check box to maintain total wait time when a call
moves from one queue to another. If this check box is
cleared, wait time for the call restarts when the call changes
queues.
DNIS Tab
Table 153 describes the parameters on the DNIS tab on the Workgroups page.
The approximate wait time is a moving average that depends on the duration of the previous calls. The
wait time is approximate; the system rounds off the wait time to the nearest minute. The wait time is
announced as a number of minutes, not a number of seconds.
The estimated wait time is determined based on the following two formulas in this order:
Where New wait time is the number of seconds the last caller waited before reaching an agent.
Where Position in queue refers to the position of the call in relation to other calls in the queue.
For example, after 10 calls, 61% of the calculated wait time depends on the 10 most recent calls. After
20 calls, 86% of the time is based on the last 20 calls. The announced wait time might be inaccurate
during periods of low call volume or when call volume increases rapidly.
Distributed Workgroups
This section describes the operation and configuration of distributed workgroups. A distributed
workgroup has greater availability and resilience than a regular workgroup because it has a significant
level of independence from the Headquarters server.
The database of real-time and historical records resides on the Headquarters server, but if a remote
server is disconnected from the Headquarters server, the agent logs remain in a buffer until the
Headquarters server and the remote server reconnect. After the servers reconnect, the DVS sends the
logs to the Headquarters server.
A site-specific workgroup runs on a local DVS at a remote site. No part of this workgroup resides
at other sites.
Note
If a distributed workgroup loses connectivity to the Headquarters server, the agent members of that
workgroup who were logged in at the time connectivity was lost continue to receive calls. In addition,
any wrap-up time configured for those agents continues to be available to them.
No supervisor or system administrator can change an agent’s state in the absence of Headquarters
server connectivity. Furthermore, an agent’s Connect client availability state cannot change in the
absence of Headquarters connectivity; for example, an agent’s availability state cannot change from
Available to Do Not Disturb.
Note
Voice mail switches can host a hunt group in support of distributed workgroups. However, these switch
types cannot host the actual workgroup.
For general backup purposes, a backup extension can direct to a workgroup, hunt group, menu, or any
system extension. However, to use a workgroup as a backup for another workgroup, the backup
extension must direct to a hunt group.
The distributed workgroup capability is either on or off. If it is on, site-specific and multi-site workgroups
are possible.
A Mitel Connect system can support either distributed workgroups or Distributed Database (DDB), but
not both at the same time. If a DVS is running a DDB, the DVS is not available for selection as a
Workgroup server. If DDB is enabled, the distributed workgroups cabability is disabled and the
Headquarters server manages all workgroup calls whether the workgroup is on the Headquarters
server or a DVS. In this case, if the Headquarters server becomes unavailable, all workgroups in the
network are also inoperative.
Note
To verify that a DVS is not running a distributed database, click Maintenance > Status > Servers to
display the Servers status page. If the DVS is running a distributed database, there is a green
database icon in the DB column. For more information about distributed databases, see Mitel
Distributed Database on page 121.
Figure 23 shows three separate workgroups (250, 251 and 252). These workgroups are part of a
distributed workgroup because they are not on the Headquarters server. However, these workgroups
are set up to back up each other using backup extensions as follows:
Workgroup 250 is on SVR1. The backup for this workgroup is Workgroup 251.
Workgroup 251 is on SVR2. The backup for this workgroup is Workgroup 252.
Workgroup 252 is on SVR3. The backup for this workgroup is Workgroup 250.
Link failures in the following two scenarios illustrate the limitations of this type of backup when
connectivity to the WAN is lost. In the first example, Link 1 fails. In the next example, Link 3 fails.
The server and switches still connect to each other; Trunk Group 1 can still reach all the agents
that SVR1 manages.
Agents on the switches that SVR2 and SVR3 manage are not available to SVR1.
If WAN Link 1 fails and a call arrives on Trunk Group 2, the following applies:
If WAN Link 1 fails and a call arrives on Trunk Group 3, the following applies:
The call for Workgroup 250 is unable to reach Workgroup 250 on SVR1.
The switch routes the call to the backup workgroup, Workgroup 251 on SVR2.
In the next example, WAN Link 3 in Figure 23 is down. A call arrives on Trunk Group 1 and Trunk
Group 2 for Workgroup 250:
Furthermore, a call that arrives on Trunk Group 3 for Workgroup 250 is unable to reach Workgroup
250 on SVR1. The backup extension for Workgroup 250 is Workgroup 251, but Workgroup 251 is
also unavailable. In this situation, calls eventually go to the backup auto attendant on the switch.
As Figure 24 shows, the members of Hunt Group 261 are workgroups 250 and 251.
At Site 3 in Figure 24, Hunt Group 262 supports workgroups 250 and 252. Calls enter the network on
Trunk Group 3 and go to Hunt Group 262. Calls that arrive on Trunk Group 3 go to Workgroup 250. If
no agent in Workgroup 250 answers the call, it goes to Workgroup 252 at Site 3.
Returning to the scenario with WAN Link 1 down but with Hunt Groups providing the Distributed
Workgroup capability, again refer to Figure 24:
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
To edit an existing DVS, click the name of the DVS in the list pane.
To add a new DVS, click New.
The General tab in the details pane displays parameters for the new or existing DVS.
4. Verify that the Enable local database check box is not selected, as explained in Distributed
Workgroups on page 516.
5. After configuring all desired parameters for the DVS, click Save.
For information about configuring the remaining parameters for the DVS, see Chapter 6,
Configuring Application Servers on page 105.
To edit an existing workgroup, click the name of the workgroup in the list pane.
To create a copy of an existing workgroup, click Copy.
To create a new workgroup, click New.
The General tab in the details pane displays parameters for the new or existing workgroup.
8. In the Backup extension field, type the extension to support back-up call routing in case of a
system failure.
For more detailed information about the backup extension, see General Tab on page 500.
9. In the Server drop-down list, select the local DVS to host the workgroup.
Note
If a DVS is running a DDB, the DVS is not available in the Server drop-down list.
10. Review the parameters on all of the tabs in the details pane, and specify values as appropriate.
(For more information about all of the workgroup parameters on the various tabs of the details
pane, see Workgroup Parameters.)
1. Configure the servers. (For details, see Configuring Servers for a Multi-Site Workgroup on page
522.)
2. Configure workgroups.
For each workgroup in a multi-site workgroup, set the value of the Backup extension field to the
hunt group extension. For a description of each parameter in a workgroup configuration, see
Workgroup Parameters on page 500.
3. Configure hunt groups. (For details, see Configuring Hunt Groups for a Multi-Site Workgroup on
page 523. The steps in this section are for selecting the workgroup extensions that are to be
members of the hunt group. A hunt group can have up to 24 workgroup members.)
Note
If at least one workgroup exists in a hunt group’s membership list, the hunt group can use only the Top
Down distribution pattern. Simultaneous distribution pattern can be used only if the hunt group
members list contains no workgroups, route points, menus, or other hunt groups.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. Do the following for each DVS that will be part of the workgroup:
The General tab in the details pane displays parameters for the new or existing DVS.
b. Verify that the Enable local database check box is not selected, as explained in Distributed
Workgroups on page 516.
c. After configuring all desired parameters for the DVS, click Save.
For information about configuring the remaining parameters for the DVS, see Chapter 6,
Configuring Application Servers on page 105.
2. In the navigation pane, click Administration > Features > Call Control > Hunt Groups.
To edit an existing hunt group, click the name of the hunt group in the list pane.
To create a copy of an existing hunt group, click Copy.
To add a new hunt group, click New.
The General tab in the details pane displays parameters for the new or existing hunt group.
5. In the On-hours schedule drop-down list, select the desired on-hours schedule.
6. On the Members tab, add the desired workgroup and other extensions to the hunt group.
For detailed information about adding hunt group members and changing the position of a
member in the list, see Configuring Hunt Groups on page 316.
7. Click Save.
The call routing specifications combine with the system’s scheduling facility to provide different
responses to callers at different times. Each mode can support different options and transfer callers to
different destinations when no agents are available. The scheduling facility determines the start and
stop time of each call routing mode.
Hunt Group schedule times depend on the Headquarters server time. Workgroup schedule times
depend on the workgroup server time.
Local IP phones and Connect client applications do not show the agent enter and leave wrap-up. If an
agent is in a workgroup that is managed by a server that is outside the off-line site — in a multi-site
workgroup, for example — the outside server also is not informed of agent state changes on the
isolated, remote site.
This chapter describes how you can view and manage the System Directory by using the Connect
Director.
The following topics are included to help you manage the System Directory effectively:
Overview
The system directory is a list of users and off-system contacts across your organization. This directory
is read-only for general users. Only users with administrative privileges can make changes to the
system directory.
The Connect client instantly populates each user’s Quick Dialer with contacts from the system
directory, the user’s personal directory, and all Microsoft Outlook Contact folders. This includes each
user’s personal contacts as well as any contacts on the Microsoft Exchange Server.
By using Connect Director, you can view, create, edit, copy, export, and delete system directory
contacts as explained in subsequent sections. This chapter does not deal with the creation of user
accounts, which is explained in Configuring a User Account on page 390.
2. In the navigation pane, click Administration > Features > System Directory.
The System Directory page that is displayed is split into the list pane (top) and the details pane
(bottom). The list pane displays all the contacts in the system directory, with parameters as
described in Table 154. The details pane allows you to view the details for a selected contact.
Note
If you do not select a contact, by default the details of the first contact in the list are displayed.
You can sort the system directory by any of the parameters described in Table 154, in the order of
your choice (ascending or descending).
User Extension
Local Voice Mail Extension
Distribution List
Account Code Extension
System Conference Extension
Auto-Attendant
Local Auto-Attendant
Site The site where the extension is located.
Trunk Group Name of the trunk group associated with the extension number.
DID Direct inward dialing (DID) number of the user/directory contact.
Work Work number of the user/directory contact.
Note: This must not be the same as the extension number of the user/
contact.
Home Home number of the user/directory contact.
Fax Fax number of the user/directory contact.
Cell Cell number of the user/directory contact.
Pager Pager number of the user/directory contact.
2. In the navigation pane, click Administration > Features > System Directory.
The System Directory page that is displayed is split into the list pane (top) and the details pane
(bottom). The list pane displays all the contacts in the system directory, with parameters as
described in Table 154 on page 526. The details pane allows you to view and edit the details for a
selected contact.
3. Click New on the list pane, and type the required information on the details pane.
You can refer to the parameter descriptions in Table 154 on page 526 for entering the details.
4. Click Save.
The information is saved in the directory and instantly updated in the list pane.
Note
To create a copy of the non-Mitel entries in the System Directory, click Copy.
2. In the navigation pane, click Administration > Features > System Directory.
The System Directory page that is displayed, is split into the list pane (top) and the details pane
(bottom). The list pane displays all the contacts in the system directory, with parameters as
described in Table 154 on page 526. The details pane allows you to view and edit the details for a
selected contact.
3. Select the contact that you want to export into a CSV file, and click Export.
The information for the selected contact is downloaded as a CSV file to your local machine.
2. In the navigation pane, click Administration > Features > System Directory.
The System Directory page that is displayed is split into the list pane (top) and the details pane
(bottom). The list pane displays all the contacts in the system directory, with parameters as
described in Table 154 on page 526. The details pane allows you to view and edit the details for a
selected contact.
3. Select the contact that you want to delete, and click Delete.
4. You are prompted to confirm the deletion in the Confirmation dialog box. Do one of the following:
If you chose to delete the contact, the contact is no longer displayed in the list pane.
This chapter describes how to configure Mitel’s implementation of Session Initiation Protocol (SIP). It
contains the following information:
Overview
Mitel’s implementation of SIP can apply to the following:
SIP trunks
SIP extensions
Integration of Mitel with a unified messaging system from a third-party vendor
This chapter also contains technical information to help with planning for SIP on a Mitel Connect
system.
Among SIP trunk profiles, an important distinction between profiles is whether the profile enables
hairpinning of media streams through the switch. Without hairpinning, a Mitel SIP trunk supports only
the call control tasks and not the media stream. In this scheme, the media stream flows directly
between the end-points. (Therefore, switch resources are not needed for controlling media flows.)
However, for SIP trunks to support the full set of telephony features in the current release, certain
functions are possible only if the media stream flows through a switch. For media streams to flow
through a switch, hairpinning must have been applied to the SIP trunk group by a SIP trunk profile that
enables it.
Mitel provides some SIP profiles, and customers can create custom profiles by using an existing SIP
profile as the basis of a new profile. Custom profiles are an advanced task, as further described in SIP
Profiles for Interoperability on page 532.
The current release includes generic and default, carrier-specific SIP trunk profiles. The introduction to
these SIP profiles, including the list of switches that support the full set of SIP trunk functions, is in
Configuring SIP Trunk Profiles on page 539, and their effects on individual SIP functions are described
in applicable sections throughout this chapter. Customized profiles are also supported. However,
customization and the detailed descriptions of SIP trunk profiles exist only in the SIP-related
application notes on interoperability from Mitel. Mitel application notes are available for customers in
the Mitel Innovation Network Partner Program.
We recommend that existing customers implement the higher trunking functionality on half-width
switches by applying SIP trunk profiles, as described in this chapter. However, we also support two
legacy SIP profiles for customers that upgrade. Some customers might have no interest in the full
feature set after upgrading to Release 13 or later. For example, a customer might have a remote office
that uses only the most basic telephony.
When an existing customer upgrades to the current Mitel release while the SystemTrunk or the
ATTBVOIP SIP trunk profile is in use, the SIP trunk profile remains in use on the trunk group but with
the string “_DEPRECATED” appended to the profile name. Therefore, if profiles SystemTrunk and
ATTBVOIP were in use at the time of the upgrade, these profiles remain in use but appear in Connect
Director to SystemTrunk_DEPRECATED and ATTBVOIP_DEPRECATED.
Note
New installations of the current Mitel release do not contain legacy SIP trunk profiles. Only customers
who have applied SIP trunk profiles previously and then upgrade to the current Mitel release retain the
legacy SIP trunk profiles.
Customers wanting to retain legacy configurations need to be aware that, for a specific trunk group,
they cannot mix old functions with the new versions of these functions. (Trunk groups cannot mix old
and new SIP trunk profiles.)
In this chapter, wherever a difference exists between the current release and the legacy version, the
feature section describes the new capability and the limitation of the legacy version. Where a new
function is independent of the new SIP profiles, the new capability is described without reference to
either to legacy or to new status.
http://www.shoretel.com/partners/tech_developers/ecosystem
For information about the benefits of being a Mitel technology partner or to become a technology
partner, go to: http://www.shoretel.com/partners/tech_developers
For example, one analog switch port supports up to five SIP trunks. Therefore, if one to five SIP trunks
is configured on an analog switch port, one less Time Division Multiplexing (TDM) port is available for
analog, T1, and so on.
For SIP Trunk Media Proxy—the switch-level enable for using hairpinning through a SIP profile in a
trunk group—the half-width switches do either of the following:
Support port-specific configuration for making tradeoffs between SIP trunks, SIP proxy ports, or IP
phones that use either SIP or media gateway control protocol (MGCP).
Note
Be aware that if a site’s headquarters, DVS, or voicemail model switch is using file-based music on
hold (MOH) and a G.729 call comes in on a SIP Trunk on a ST-generation switch that has media proxy
ports, the file-based MOH will not play to the external party because the call is hairpinned. By default,
ST-generation switches that have media proxy ports are hardcoded for always-on hairpinning.
This file-based MOH scenario is similar when a call comes in using G.729 on SG-generation switches
that have media proxy ports for which hairpinning is configured to be on. Hairpinning is not always on
by default on SG-generation switches.
If hairpinning is enabled on the SIP trunk(s) and no phones on the conference are SIP phones, the
SIP Media Proxy Resources provide the ports for the conference so that no Make Me ports are
involved. However, the following details apply:
A three-party conference can use SIP Media Proxy Resources instead of Make Me ports.
However, four-party (up to eight-party) conferences always go to Make Me conference ports.
If even one SIP extension participates in the conference, the conference does not use any SIP
Media Proxy Resources, so therefore, reserved Make Me ports must be available for the
conference.
If most SIP Media Proxy Resources are in use at the time a user initiates a conference, such
that an insufficient amount of these resources are available, the switch uses Make Me
conference resources instead.
If the conference call includes at least one SIP extension, Make Me ports for conferences must
be available on the initiating side of the conference call. A conference call consists of three to
six terminating endpoints.
Without the use of SIP Media Proxy Resources and the association of a SIP trunk profile to a trunk
group, a minimum of four Make Me conference ports must be reserved—even for a three-way
conference.
The following points need consideration if media streams are not hairpinned:
The carrier or service provider must provide DTMF through SIP INFO messages.
Note
The trunk group must have the SIP INFO Method for transmitting Dual Tone Multi-Frequency
(DTMF) enabled. To enable this, select the SIP info for G.711 DTMF check box on the General
tab of the Trunk Groups page. See Trunk Group Parameters on page 190 for more information.
If the service provider does not provide DTMF through SIP INFO, Extension Assignment works
only if the user’s configuration in Connect client enables “Accept call by answering.”
The user cannot use keypad features during the call because they rely on DTMF.
Note
According to RFC 2976, an INFO message carries application-level information along the SIP
signaling path. The INFO method is not used to change the state of SIP calls or the parameters of
the session that SIP initiates. The INFO message just carries optional application layer
information generally related to the session.
In the current release, the following features are supported by SIP only if the trunk has a SIP trunk
profile with hairpinning and the trunk is on a half-width switch or a virtual switch:
Silent Coach
Silent Monitor
Barge-In
Call recording
Fax (and modem) redirection works only if the carrier or ITSP supports T.38. For details about
T.38, see T.38 Support on Switches on page 161.
The maximum number of music on hold (MOH) streams that a SIP-enabled switch can support
varies with the switch model and the switch’s configuration. Also, the allotment of resources for
jack-based MOH includes streams for Backup Auto Attendant and transmission of ringback tones.
The range of such streams across all the voice switch models is 14–60.
Note
For SIP trunks to transport jack-based MOH, the Jack-based music on hold check box must be
selected to enabled jack-based MOH for the SIP trunk switch. The MOH source is the SIP trunk
switch, as follows: An external source for MOH plugs into the SIP trunk switch at the switch’s
MOH jack, and the switch places the stream on the trunk.
A SIP switch attempts to transmit MOH over G.711 U. (Switches supports G.711 A-law and U-law.)
If the far end does not support G.711, the switch uses G.729.
If Make Me conferences are planned, a minimum of four Make Me ports must be reserved. A
three-way Make Me conference uses three Make Me ports, a four-way conference uses four ports,
and so on up to the maximum of an eight-way conference. For each media stream, up to the
maximum of eight-way conferencing, an additional Make Me conference port must be available.
End-users can set up Make Me conference calls by using their Connect client or IP phone. SIP
extensions require permissions and a minimum of four MakeMe ports to set up MakeMe
conference call.
A SIP trunk can be a member of a three-party conference but cannot initiate a three-way
conference (unless the SIP device merges the media streams).
Mitel SIP supports basic transfers (blind transfers) and attended transfers (consultative transfers).
Note
You can perform tasks [1] and [2] in any order.
5. (Optional) Configure users for trunk group access through membership in a user-group
The sections that follow provide the detailed descriptions of these tasks.
Voice Switches provide two SIP proxy port sources: Built-in capacity and port assignment. Definitions
of these two sources follow.
Built-in capacity: The half-width switches, such as the Voice Switch 50, provide IP phone, SIP
trunk, and SIP proxy resources that are independent of port switches. The number of resources
varies with each switch model. Each resource unit supports one IP phone, one SIP trunk, or five
SIP proxy ports.
To allocate the Built-in resource for SIP proxy ports, type the number of IP Phone and SIP Trunk
resources in their respective data entry fields. The remaining resources are available to serve as
SIP proxy ports.
Port resources: A switch port can be configured to support 100 SIP proxy ports.
Routing the media streams through the switch consumes a large amount of the switch’s resources. A
large portion of the resources are reserved when SIP Trunk Media Proxy is enabled to support
hairpinning. SIP Trunk Media Proxy pertains to the ports that the switch can use for hairpinned media
streams. Hairpinning and its prerequisite enable described in this section apply only to the half-width
switches listed in this section and in Supporting Switches on page 540.
Notes
If an existing customer is satisfied with the features and performance supported by the SIP
configuration before an upgrade to the current Mitel release, enabling SIP Trunk Media Proxy and
applying a SIP trunk profile with hairpinning enabled is not necessary. These functions are
necessary only if the customer wants the features listed in General SIP Feature Considerations on
page 534.
Enabling hairpinning is applicable only to SG-generation switches. ST-generation switches that
have media proxy ports are configured to have always-on hairpinning.
This section illustrates the similarities and the differences between two schemes for reserving SIP
Trunk Media Proxy, based on switch model. In these two schemes:
Regardless of whether SIP Media Proxy resources are reserved for ports, the switch must have at
least five SIP trunks reserved.
On the ST100DA, ST1D, 220T1, 220T1A, 220E1, T1k, and E1k, all of the switch’s trunk resources
are reserved for SIP Trunk Media Proxy through one check-box enable. When SIP Trunk Media
Proxy is enabled, the Built-in capacity fields remain active, but the drop-down lists for physical port
configuration are deactivated.
When SIP Trunk Media Proxy is enabled on the all-or-none users of this resource, the built-in
capacity increases from 70 to 100 on the 220T1A and 220E1.
Note
Once the SIP Trunk Media Proxy check box is selected, no configurable Make-Me conference
capability exists on the switch.
On the ST2D, all of the trunk resources for each span on the switch are reserved for SIP Trunk
Media Proxy through one check-box enable for each span. Resources can be reserved for SIP
Trunk Media Proxy on one or both spans. When SIP Trunk Media Proxy is enabled for a span, the
drop-down lists for physical port configuration are deactivated for that span.
Note
If one span is dedicated to SIP trunks, the second span can be configured for E1/T1 ISDN PRI
trunks.
Reserve individual ports for SIP Trunk Media Proxy by way of a drop-down list. Applicable
switches are the Voice Switch models ST50A, ST100A, 90, 90V, 90BRI, 90BRIV, 50, 50V, 50BRI,
50BRIV, and 30BRI and 30. The Small Business Edition (SBE) models also have the drop-down
list for individual ports.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. Click the name of the switch to reserve port resources on in the list pane.
This example uses the 220T1 to illustrate the necessary enable when the use of hairpinning is
expected.
5. Select the Assign digital ports as 20 SIP Trunks with Media Proxies check box.
Once this parameter is enabled, all port-level reservations are disabled. For information about
applying a SIP trunk profile, see Configuring SIP Trunk Profiles on page 539.
6. Click Save.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. Click the name of the switch to reserve port resources on in the list pane.
This example uses the 50V to illustrate the necessary enable when the use of hairpinning is
expected.
5. For each port that you want to reserve for SIP Medial Proxy, do the following:
a. In the Port Type column, select SIP Trunk with Media Proxy.
6. Click Save.
Now that SIP resources have been reserved, the next tasks are the creation of a SIP trunk group and
then creation of a SIP trunk.
2. In the navigation pane, click Administration > Trunks > Trunk Groups > Trunk Groups.
3. Click New.
The General tab in the details pane displays parameters for the new trunk group.
5. Review the remaining parameters on all of the tabs in the details pane, and specify values as
appropriate. For complete information about creating a trunk group, see Adding or Editing a Trunk
Group on page 190.
6. Click Save.
3. Click New.
The General tab in the details pane displays parameters for the new trunk.
4. In the Trunk group list, select the SIP trunk group to assign the trunk to.
5. Review the remaining parameters and specify values as appropriate. For complete information
about creating a trunk, see Adding or Editing an Individual Trunk on page 214.
6. Click Save.
Support for features that work only if the media stream passes through a switch. This capability
becomes possible when hairpinning is enabled in the profile and the profile is applied to the trunk
group.
Tip
For ST-generation switches with media proxy, hairpinning is always on. These switches support
only a single G.729 stream per physical port. If a SIP trunk call on a ST-generation switch is
hairpinned using G.729 codec on the external leg of the call, the other connected endpoint, which
is the internal leg of the call, must have additional codecs outside of G.729, such as G711 or other
supported codecs.
The flexibility to interoperate in certain environments or with very specific configurations from third-
party services or equipment providers.
Whether provided by Mitel or created by a customer, a SIP trunk profile exists independently of the
trunks and the system administrator assigns profiles to a SIP trunk group.
Whether for a new Mitel installation or after an upgrade, customers who want to use all the features
that SIP trunks can support must apply a profile with hairpinning enabled. The exceptions are
customers who are satisfied with features that do not involve media streams traversing the switch. For
a list of features that use hairpinning, see General SIP Feature Considerations on page 534.
Supporting Switches
The switches that support hairpinning of media streams are listed in Table 155.
Note
Hairpinning is also supported on Virtual SIP Trunk Switches.
You can view a list of all SIP profiles on the SIP Trunk Profiles page.
Note
SIP trunk profiles that are in use at the time of a system upgrade are retained after the upgrade. These
profiles are renamed by appending the string “_DEPRECATED” to the name of the profile. Users can
disable a deprecated profile that survived the upgrade process and apply a new profile from the
current Mitel release.
2. In the navigation pane, click Administration > Trunks > SIP Profiles.
The SIP Trunk Profiles page is displayed. For descriptions of the columns on the SIP Trunk
Profiles page, see Table 156.
The SIP trunk profiles provided by Mitel in the current release are listed in Table 157.
Note
The predefined profiles provided by Mitel cannot be edited or deleted. However, the profiles can be
enabled or disabled.
2. In the navigation pane, click Administration > Trunks > SIP Profiles.
To edit an existing profile, click the name of the trunk group in the list pane.
To create a copy of an existing profile, click Copy.
To create a new profile, click New.
The General tab in the details pane displays parameters for the new or existing profile.
4. Review the parameters and specify values as appropriate. For descriptions of the profile
parameters, see Table 158.
5. Click Save.
Note
Because of variations and ongoing development in phones from third-party vendors, customers might
have to test phone models under consideration for interoperability with the Mitel Connect system.
Network Elements
This section describes the system and network components that the administrator specifies to enable
SIP endpoints to communicate. In a Mitel Connect system, SIP endpoints typically are phones. If you
are very familiar with these components, you can proceed to the configuration steps for Connect
Director in Configuring SIP Extensions on page 553.
In general, the resources that a system uses to support SIP extensions are:
IP phone resources for SIP extensions: Each SIP extension must point to a SIP proxy server.
SIP proxy resources: A SIP proxy server is a Voice Switch that you configure to provide the
necessary support for SIP extensions. A Mitel network can have one primary SIP proxy server that
is operational and a backup server.
In general, resources on a Voice Switch can be allocated to trunks, analog extensions, SIP proxy
media, or IP phones (which can be SIP endpoints). Two approaches are available for allocating
SIP resources: one approach is a switch-level reservation of built-in resources (in the Built-in part
of the switch configuration page), and the other approach is called the trade-off method. The trade-
off method reallocates resources at the port-level. Both of these approaches are available on the
same switch configuration page.
For reallocating resources on each port, the resource trade-offs are as follows:
In particular, a SIP proxy server (also called a registrar server) is a Voice Switch switch that
facilitates communication between SIP endpoints, as follows:
A proxy server forwards requests from a SIP endpoint to another SIP endpoint or another
server (when the other server actually processes the request).
Within a Mitel network, proxy server functionality is built into half-width and full-width switches.
You can designate up to two proxy switches per site: one switch is assigned as the primary
proxy server, and the other switch acts as the back-up proxy server in case the primary fails.
A Virtual IP Address is an IP address for the voice switch that you configure to be the SIP
proxy server for the site. This IP address must be static. It applies to both the primary
(operational) and back-up SIP proxy server. (The Virtual IP Address moves to the backup
proxy server if the primary proxy server fails.)
Note
If the site does not have a back-up SIP proxy server, you do not need to specify an IP address
for the Virtual IP Address. In this case, only the name of the one proxy server is needed.
The page for specifying the Virtual IP Address is Administration > System > Sites.
When registration is available through the phone’s interface, the end-user configures the SIP
extension in response to prompts that appear on the phone. The user presses phone buttons to enter
the requested data at each prompt.
Users must have received a SIP password from the system administrator before starting the
configuration tasks. To configure SIP, the user enters the following:
The Mitel Connect system recognizes the extension, the DID number, or the Client Username. Client
Username is the best choice. For information on Client Username (or simply User ID), see Configuring
a User Account on page 390.
The phone sends a SIP REGISTER request to the SIP proxy server. For a new registration, the
server’s response can take a few seconds.
Note
Changing the IP address of a SIP device can result in that device being listed twice on the Telephones
page in Connect Director. In this case, the most recent registration takes precedence.
If many SIP phones register simultaneously, a significant delay might result while completing SIP
phone registration. Distributing SIP phones to multiple switches and multiple sites could help overall
with SIP registration.
Extension Assignment
The Extension Assignment feature lets a user temporarily assign his or her primary phone to another
device. Consequently, the other device temporarily functions as an assigned phone.
The user can assign the primary extension to a Mitel phone or the user’s personal phone. For
example, if a user wants to use a personal cellphone for the Mitel extension while moving around a
Mitel site or off-site, that user activates Extension Assignment from the cellphone.
The user configures one or two phone numbers for Extension Assignment in the Connect client
Options window to point to the primary phone. Thereafter, whenever the user enables Extension
Assignment capability in the Options window, he or she can place or receive calls on the assigned
phone.
During an Extension Assignment session, if the user’s primary phone is an IP phone, it goes into
anonymous mode during the session. Although Extension Assignment is available for SIP phones and
regular IP phones, the display on these two phone types behaves differently during an Extension
Assignment session. On a regular IP phone, the phone’s display shows the word “Anonymous” during
the session. However, because SIP supports only the regular phone display, a SIP phone in the
anonymous state still displays the standard information and gives no indication of being anonymous.
When ready to end the Extension Assignment session, the user can disable Extension Assignment
from Connect client or the assigned phone.
Note
The user must complete the REGISTER process for the primary SIP phone before activating
Extension Assignment. (In contrast, for a regular phone, an end-user must use voicemail to manage
Extension Assignment.)
A user has a phone on his or her desk: The user registers a SIP Softphone or Wi-Fi phone that
temporarily becomes the assigned extension.
User Features
This section describes the user features supported by SIP extensions.
Make Call: Calls can be made from a SIP phone or from Connect client.
Note
On a SIP extension, an Intercom call arrives like a regular call.
Redial and Speed dial: Redial and Speed dial initiated from SIP extensions through Connect
client operate similar to on-hook dialing.
Redial and Speed dial methods differ for each SIP device model. Feature keys on a specific model
of a SIP device can be programmed to support speed dial.
E911: Calls to emergency numbers from a SIP extension (or regular phone) send an emergency
identification number or CESID number with the call. For a description of the extent of Mitel’s
support for emergency calls, see Appendix A, Emergency Dialing Operations.
Dial plans and extension lengths: When the SIP call manager receives an incomplete number
or an illegally formed number from a SIP device, the system terminates the call after it transmits a
“That extension is not valid” message to the caller.
Night bell: SIP extensions can pick up the night bell by pressing star code *14.
Call Routing
Call routing operations provide options for answering or routing incoming calls. SIP extensions support
the following call routing options:
Answer call: SIP extensions can answer calls only from the phone.
Offering calls can be redirected to Voice Mail, an Auto-Attendant, or another extension through
Connect client.
Hang-up: SIP extensions can hang up calls from the phone or from Connect client.
Ring No Answer (RNA): The number of rings that trigger a No Answer response is specified in
the Availability States parameters for each user. When the No Answer condition is triggered, the
SIP call manager redirects the call to the RNA destination as specified by Connect Director.
Busy: When the user call stack is larger than the phone call stack, and the SIP phone rejects
overflow calls with SIP response 486 Busy, the switch can redirect the call to the busy destination
as specified in Connect Director.
Forward Always: SIP extensions support Forward Always. When this parameter is set, all calls
will be forwarded to the destination specified in Connect Director.
Call waiting: The specific call waiting implementation differs for each SIP phone model. SIP
extensions support call waiting to one or multiple simultaneously-offered calls for the SIP devices
that support this feature.
Call rejection: If the SIP phone rejects the call with 603 Decline response code, the switch fails
the call and plays the reorder tone to the caller.
Call redirect: If the SIP phone returns a 3xx response code, the switch redirects the call to the
user’s RNA destination. If the RNA destination is not configured, the reorder tone is played.
Find Me: SIP extensions support FindMe and Voice Mail Notification.
Caller ID
Caller ID is the caller information transmitted to the other party during a voice call.
Caller ID presentation: SIP extensions can display caller name and number.
Caller ID blocking: SIP extensions support caller ID blocking and private extensions.
Caller ID for Workgroup and Hunt Group agents: The system sends the original caller
information while the phone rings. After the recipient answers the call, the system continues to
display the original caller name and number.
Call Control
Users manage active voice calls through call control operations. Mitel SIP extensions support the
following call controls:
Hold: Call hold and unhold are performed on the phone. Implementation of the reminder ring for
held calls differs among SIP phone models.
Basic transfer: SIP extensions support blind transfers that use REFER messages. Transfers that
use re-INVITE are not supported.
Consultative transfer: SIP extensions support consultative transfers that use REFER. Transfers
that use re-INVITE are not supported.
Park from SIP phone: Calls from SIP extensions are parked when the user selects a different line
and then presses the following sequence of keys: *11 number.
Unpark on SIP phone: SIP phone users pick up a parked call by pressing *12 and then the
extension number, for example: * 1 2 2508. (On a SIP phone, taking the handset off-hook is not
sufficient to resume a parked call.)
Pickup: SIP phone users pick up a call by pressing *13, followed by the number.
Unpark: SIP phone users unpark a parked call by pressing *12 and then the number.
Conference Calls: Three-party conference calls initiated from the phone use the phone’s resident
multipoint control unit (MCU).
A three-party conference call initiated from Connect client uses Make Me conferencing.
Make Me conferencing is used when a SIP phone joins a conference call.
Four to eight-party conference calls are supported using Make Me conferencing. Conferences
must be initiated through Connect client.
Call recording: A SIP extension user can record calls that traverse a SIP trunk if the user has
permission. Call recording is enabled through the user’s Class of Service. The user initiates call
recording in Connect client.
Voicemail: SIP extensions reach voice mail by pressing # on the phone or by pressing the
Connect client VM button.
MWI: SIP extensions support Message Warning Indicator by using NOTIFY or SUBSCRIBE/
NOTIFY on phone models that support MWI. MWI is configurable through SIP phone profiles.
Agents: SIP extensions are available for Workgroup and Hunt Group agents.
Bridged call appearance: SIP extensions do not support Bridged Call Appearances.
Huntgroup busy out: SIP extensions can busy out huntgroups by pressing *18, followed by the
hunt group number.
Silent Monitor: SIP extensions cannot initiate or be the recipient of this operation.
Silent Coach: SIP extensions cannot initiate or be the recipient of this operation.
Barge In: SIP extensions cannot initiate or be the recipient of this operation.
Whisper Page: SIP extensions cannot initiate or be the recipient of this operation.
System Features
SIP extensions support the following system features:
Account codes: Users on SIP extension can be forced to use account codes for external calls.
Backup Auto Attendant (BAA): The SIP call manager switch provides BAA to the SIP extension.
Supported Codecs: Mitel default settings support the negotiation of supported codecs. For
information about codecs, see Codec Negotiation and Bandwidth Management on page 352.
Fax redirection: Fax calls to SIP extensions are redirected to the site’s fax redirect number.
Music on Hold (MoH): Mitel does not support jack-based MOH for SIP extensions; file-based
MOH is supported for SIP extensions.
Extension Assignment – external devices: A SIP extension user can be configured so that the
Extension Assignment feature can be initiated from devices that are external to the Mitel Connect
system.
PSTN failover: If PSTN Failover is enabled at the time of a WAN disconnection, a user can still
reach someone at another site by using the PSTN. For example, if the WAN connection between
two Mitel sites is down and a user calls the other office and PSTN failover is enabled, the call
traverses the PSTN (instead of failing).
Packetization period: The default packetization period for all calls involving SIP extensions is
20 ms.
Video call: The “Allow intersite video calls” setting in the Telephony Features Permissions allows
or prevents video calls between Mitel sites for users with that Class of Service. For a video call to
exist, all participating members must be members of a user group with a COS that enables
intersite video. Each user must also have a supported camera model and have currents drivers for
the camera and the video graphics card.
Note
The Mitel Connect system does not allocate bandwidth for video calls. Consequently, heavy traffic
on the network can have an impact on video calls and even audio communication.
Country Call Progress Tones and Ring Tones: SIP extensions provide call progress and ring
tones for countries supported by Mitel.
Language support: SIP extensions provide support for languages as required by the countries
supported by Mitel.
User Assignment
This section briefly mentions the type of information that Mitel customers need for configuring third-
party SIP phones. The operational variations and regular updates in the phones from individual
manufacturers mean that Mitel cannot give specific directions for phone models from third parties.
However, several items are very commonly configured on a SIP phone to identify it, as follows:
User ID - According to individual deployments, can be extension number, DID, or Client User ID.
SIP password - Configured in Connect Director and can consist of the following characters:
!#$%&'()*+,-.0123456789:;=@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_/
`abcdefghijklmnopqrstuvwxyz{|}~
Designating the switches that serve as the site’s SIP proxy servers; the site can have a primary
server and a secondary server
The General tab in the details pane displays parameters for the selected site.
4. Review the parameters at the bottom of the General tab and specify values as appropriate. For
descriptions of the SIP Proxy parameters, see Table 159.
Redundant Setups
In a redundant setup, the Virtual IP Address is used for configuring SIP extensions.
The system instantiates the Virtual IP Address on the switch specified as “Proxy Switch 1.” If “Proxy
Switch 1” fails, “Proxy Switch 2” activates the Virtual IP Address on its network interface. When the first
proxy returns to service, it again uses the Virtual IP Address, and the back-up proxy releases the
address.
Non-Redundant Setups
2. In the navigation pane, click Administration > Features > Call Control > Options.
3. Review the parameters in the SIP area of the page, and specify values as appropriate. For
descriptions of the SIP call control options parameters, see Table 160.
4. Click Save.
Predefined profiles support generic devices or devices for which a specific profile is not defined.
Although predefined profiles cannot be deleted or modified, they can be deactivated or
superseded by user defined profiles.
User-defined profiles are created through Connect Director and specify settings for certain SIP
device models.
You can view a list of all pre-defined and user-created SIP Phone Profiles on the SIP Phone Profiles
page in Connect Director.
2. In the navigation pane, click Administration > Telephones > SIP Profiles.
The SIP Phone Profiles page is displayed. For descriptions of the columns on the SIP Phone Profiles
page, see Table 161.
The User Agent field of successive profiles are compared to the User-Agent field of the SIP packet
header until a match is found. The profile containing the matching User-Agent field is then used to
specify device configuration settings.
Note
The predefined profiles provided by Mitel cannot be edited or deleted. However, the profiles can be
enabled or disabled.
2. In the navigation pane, click Administration > Telephones > SIP Profiles.
To edit an existing profile, click the name of the profile in the list pane.
To create a copy of an existing profile, click Copy.
To create a profile group, click New.
The General tab in the details pane displays parameters for the new or existing profile.
4. Review the parameters and specify values as appropriate. For descriptions of the profile
parameters, see Table 162.
5. Click Save.
Custom Parameters
The custom parameters are additional device settings or overrides of the default settings listed in the
System Parameters field. For a description of each available custom parameter, see Table 163.
To edit an existing user, click the name of the user in the list pane.
To create a copy of an existing user, click Copy.
To create a new user, click New.
The General tab in the details pane displays parameters for the new or existing user.
4. In the SIP phone password field, type a password for the SIP extension.
6. Click Save.
3. Click the name of the SIP device you want to view details for in the list pane.
The General tab in the details pane displays parameters for the SIP device.
For more information on configuring Mitel-supported, third-party UM solutions, contact the Mitel
Innovation Network Partner Program.
http://www.shoretel.com/partners/tech_developers
Note
A Unified Messaging SIP Link license is required for every Unified Messaging (SIP) server added in
Connect Director. To add a server, the check box Allow External Voice Mail for Extension-Only User
must be selected.
After Mitel user accounts move to a third-party UM server, those users’ existing voicemails are
deleted from the Mitel Connect system. Therefore, we recommend that you save existing
voicemails before integrating with Mitel.
Mitel does not actually integrate voicemail with Outlook even though you can enable Outlook
integration in Connect client. This option enables Mitel partners or outside vendors to set up
integration of voicemail with Outlook.
The message waiting indicator (MWI) that signals a waiting voicemail message is not available for
Connect client.
The following voicemail features are not available to a user when Mitel is integrated with third-party
UM systems:
Any Phone
Find-Me
Escalation Profiles
Switching between Mitel and External SIP Unified Messaging voicemail results in the following
conditions.
Loss of all existing Mitel messages (initial backup is recommended)
Users might need to re-create the Connect client rules to reflect the new voicemail number
Note
An important behavior that relates to Connect client’s Power Routing should be understood.
The action is Forward Call to Voice Mail, and the circumstance when this behavior is relevant
is when a Mitel customer changes the voicemail server to a SIP Unified Messaging (SIPUM)
server. Before the migration to SIPUM, any rule that forwards calls to voice mail (or all rules if
that is more convenient) should be disabled. If a rule whose action forwards calls to voice mail
remains enabled during migration, the rule fails to migrate.
To integrate Mitel with a third-party UM system, the system administrator must do the following:
Note
Enable a Voice Switch to act as the SIP proxy for the site where you add the SIP UM Server.
2. In the navigation pane, click Administration > Appliances/Servers > Integrated Servers > SIP
Servers.
To edit an existing server, click the name of the server in the list pane.
To create a copy of an existing server, click Copy.
To create a new server, click New.
The General tab in the details pane displays parameters for the new or existing server.
4. Review the parameters at the bottom of the General tab and specify values as appropriate. For
descriptions of the SIP Proxy parameters, see Table 164.
5. Click Save.
For complete information about configuring user groups, see Configuring User Groups on page 386.
2. In the navigation pane, click Administration > Users > User Groups.
To edit an existing user group, click the name of the user group in the list pane.
To create a copy of an existing user group, click Copy.
To create a new user group, click New.
The General tab in the details pane displays parameters for the new or existing user group.
4. In the Voice mail interface mode drop-down list, select External Voice Mail, SIP.
5. Click Save.
The Availability States destinations for this user group are set to the selected SIP server extension.
For complete information about configuring users, see Configuring a User Account on page 390.
To edit an existing user, click the name of the user in the list pane.
To create a copy of an existing user, click Copy.
To create a new user, click New.
The General tab in the details pane displays parameters for the new or existing user.
5. In the User group list, select the user group to associate with the user.
Note
You must select a user group with the voice mail interface mode set to External Voicemail, SIP.
See Configuring a User Group with Access to SIP Servers on page 563 for information about
setting the voice mail interface mode for a user group.
7. Click Save.
This chapter provides details about using the Diagnostics & Monitoring system available through
Connect Director. It contains the following information:
Overview
The Diagnostics & Monitoring system is a comprehensive set of tools that enables:
Architecture
The Diagnostics & Monitoring system is accessible through the Maintenance and Diagnostics menus
in Connect Director and consists of the following components:
Monitoring Service
Monitoring Agents
Monitoring Database
Status Database
Monitoring Service
The Monitoring Service receives and processes data from the following sources:
To collect statistics, the Monitoring Service requires that switches, service appliances, and
softswitches have an active network connection to the Headquarters server. If the network connection
is not functioning, statistics are not reported. In addition, because metrics are not collected if the
Monitoring Service is not running, any average calculations for a particular time period that includes
time when the Monitoring Service was down will not be accurate.
Monitoring Agents
The Monitoring Agents are integrated services residing on switches, servers, and phones in the Mitel
Connect system. They collect call quality metrics and path trace information, summarize the data in
one or more reports, and send the reports to the Monitoring Service at the end of each call. Any media
streams without IP media do not send reports.
Monitoring Database
The Monitoring Database (shorewaremonitoring) is installed on the Headquarters server. It stores the
raw data collected by the Monitoring Service.
For information about configuring the Monitoring Database, see Changing Settings for the Monitoring
Database on page 569.
Requirements
The Diagnostics & Monitoring system has the following requirements:
To collect call quality data, switches need active connections to phones and a call’s duration needs
to be at least 30 seconds.
The Monitoring Service requires that the local time zone of the computer on which the
Headquarters server is running be the same as the local time zone specified for the Headquarters
server in Connect Director.
Change the leadership of the Monitoring Service from Headquarters to a remote server
Change the settings for the Monitoring Database
If you have installed a remote instance of the Monitoring Service, you would assign the Main Service
role to the remote instance and the Event Collector role to the instance on the Headquarters server.
(The remote server is never in the Event Collector role.) For details about the information displayed on
the Monitoring Service list pane, see Table 165 on page 569.
To change the leadership of the Monitoring Service instance from the Headquarters server to the
remote server:
2. In the navigation menu, click Maintenance > Configuration > Monitoring Service.
3. In the Monitoring Service pane at the top of the page, select the row for the Headquarters server.
4. In the Monitoring Service Instance pane at the bottom of the page, in the Role drop-down list,
select Event Collector.
Tip
To revert to the default settings, click Reset.
5. Click Save.
2. In the navigation menu, click Maintenance > Configuration > Monitoring Database.
3. If you want to change the default values, use each drop-down list box to select a value for a
particular field.
Tip
To revert to the default settings, click Reset.
The Alerts and Call Quality pages do not automatically refresh. To get real-time status, you can refresh
those pages by clicking the Refresh button at the top right corner of the page.
To scroll up or down within a chart, click and drag anywhere on the chart.
Last 1 Hour
Last 12 Hours
Last 24 Hours
Last 7 Days
Last 30 Days
The time frame you select depends on your purpose. If you want to monitor current system
performance, select “Last 1 Hour” (the default) as the time period. If you want to do capacity planning,
select “Last 30 Days” as the time period.
3. Use the time chooser in the upper left corner to select a different time period in the drop-down list.
Call Volume
The Call Volume chart shows the total number of calls and the number of bad calls for the system
during the specified time interval. In the bar graph, the green segment indicates the number of good
calls and the red segment indicates the number of bad calls. A call’s designation as good or bad is
derived from the Mean Opinion Score (MOS). A MOS value above 3.6 indicates good call quality, and
a MOS value below 3.0 indicates bad call quality.
3. In the Call Volume chart (upper left corner), hover over a bar on the graph to see the following
details:
The green segment shows the total number of calls (good and bad) and the time range.
The red segment shows the number of bad calls, the percentage of total calls that were bad,
and the time range.
3. In the Call Volume chart (upper left corner), click a bar in the graph.
The Call Quality page is launched, and the information it displays varies depending on whether
you click a green or red segment of a bar:
If you click a green segment, the Call Quality page shows the following information:
Calls filtered by the time interval for the bar you clicked, with the most recent call during
that interval listed first
Metrics for the most recent call (on the Details tab)
IP path for the most recent call (on the IP Path Trace tab)
If you click a red segment, the Call Quality page shows bad quality calls filtered by the time
interval for the bar you clicked.
For more information about the information displayed on the Call Quality page, see Monitoring Call
Quality on page 635.
Call Quality
The Call Quality chart shows the average and worst call quality during the selected time interval. Call
quality is measured using the Mean Opinion Score (MOS) scale. A MOS value of 3.6 or higher is
considered “toll quality.” A MOS value between 3 and 3.6, which is shown in the yellow area of the
chart, indicates substandard but acceptable call quality. A MOS value below 3.0, which is shown in the
red area of the chart, indicates poor call quality.
For more information about factors that impact call quality, see Monitoring Call Quality on page 635.
3. In the Call Quality chart (upper right corner), hover over a point on the graph to see the following
details:
To see the average score for a particular time range, hover over a circle on the blue line.
To see the worst score for a particular time range, hover over a square on the purple line.
3. In the Call Quality chart (upper right corner), do one of the following:
To view the following details about an average quality call, click a circle on the blue line for the
desired time frame:
Calls filtered by the time interval for the bar you clicked, with the most recent call during
that interval listed first
Metrics for the most recent call (on the Details tab)
IP path for the most recent call (on the IP Path Trace tab)
To view the following details about the worst quality call, click a square on the purple line for
the desired time frame:
The call with the lowest MOS score during the specified time frame
Metrics for this worst quality call (on the Details tab)
IP path for this worst quality call (on the IP Path Trace tab)
For more information about the information displayed on the Call Quality page, see Monitoring Call
Quality on page 635.
Bandwidth Utilization
The Bandwidth Utilization chart shows the trend lines for the five sites that consumed the most intersite
bandwidth for media streams for the selected time period. Site names and their associated colors are
listed at the top of the chart, and the color of each trend line corresponds to a site’s color. Of the sites
with the highest bandwidth utilization, the site with the highest bandwidth utilization is on the left and
the site with the lowest bandwidth utilization is on the right.
The information displayed in the Bandwidth Utilization chart could be useful for the following purposes:
Capacity planning — Frequent bandwidth utilization peaks above 80 percent (in the chart’s red
zone) could indicate a need for increased WAN bandwidth. But occasional spikes of bandwidth
utilization above 80 percent do not necessarily mean that you need to increase bandwidth.
Troubleshooting — Rejected calls or poor audio quality could be the result of a critical shortage of
intersite bandwidth.
System provisioning — Reviewing bandwidth utilization and trunk group utilization together can
provide information to help you better provision the system.
For more information about how bandwidth impacts your Mitel Connect system, see the “Network
Requirements and Preparation” chapter in the Mitel Connect Planning and Installation Guide.
3. In the Bandwidth Utilization chart (middle left), hover over a point on the graph to see the following
details about a site’s bandwidth:
Site name
Average bandwidth utilization for that site during the given time range
Maximum bandwidth utilization for that site during the given time range
Time range
3. In the Bandwidth Utilization chart (middle left), click on a point on a site’s trend line.
The Status and Maintenance > Sites page is launched, and it displays detailed information about
the selected site. For more information about the details displayed on the Status and Maintenance
> Sites page, see Monitoring Site Status on page 592.
The information displayed in the Highest Trunk Group Usage chart could be useful for the following
purposes:
Troubleshooting — Failing calls could result when the call volume exceeds the trunk group
capacity in your system.
Capacity planning — Trunk group usage over 50 percent (in the chart’s yellow zone) could indicate
a need to increase trunk group capacity or WAN bandwidth. But occasional spikes of trunk group
usage above 50 percent do not necessarily mean that you need to increase trunk group capacity.
System provisioning — Reviewing trunk group utilization and bandwidth utilization together can
provide information to help you better provision the system.
3. In the Highest Trunk Group Usage chart (middle right), hover over a point on the graph to see the
following details about the trunk groups with the highest usage:
3. In the Highest Trunk Group Usage chart (middle right), click on a point on the usage trend line for
a trunk group.
The Status and Maintenance > Trunk Groups page is launched, and it displays detailed
information about the selected trunk group and time interval. For more information about the
details displayed on the Status and Maintenance > Trunk Groups page, see Monitoring Trunk
Group Status on page 625.
Switch names and their associated colors are shown at the top of the chart, and each trend line’s color
corresponds to a switch’s color. At the top of the chart, the switches are listed from highest feature
usage on the left to lowest feature usage on the right.
Feature usage counts reflect the number of active calls at the time TMS writes to the Monitoring
Database, not the cumulative number of active calls between measurement intervals. For this reason,
calls less than 30 seconds in duration might not be reflected in feature usage counts.
The information displayed in the Highest Feature Usage chart could be useful for the following
purposes:
Load balancing — High feature usage on a particular switch might indicate a need to move
frequently used features to ports on different switches.
Capacity planning — High feature usage on the switches in your Mitel Connect system might
indicate a need to add switch capacity to the system.
3. In the Highest Feature Usage chart (lower left), hover over a point on the graph to see the
following details about features with the highest usage:
Name of the site where the ports supporting the features are being used
Name of the switch on which the feature depends
Total number of ports used during the specified time range
Time range
3. In the Highest Feature Usage chart (lower left), click on a point on a usage trend line for a switch.
The Appliances page is launched, and it displays detailed information about the switch with the
highest feature usage during the selected time interval. For more information about the details
displayed on the Appliances page, see Monitoring Appliance Status on page 597.
The information displayed in the Highest Average CPU Usage chart could be useful for the following
purposes:
Capacity planning — Frequent spikes in average CPU usage for a switch could indicate that the
switch is overburdened.
Troubleshooting — Average CPU usage above 60 percent could cause performance issues.
Load balancing — High CPU usage on a particular switch or softswitch could indicate a need to
add more switches or move frequently used features to ports on different switches.
3. In the Highest Average CPU Usage chart (lower right), hover over a point on the graph to see the
following details about switches or softswitches (servers) with the highest average CPU usage:
Site name
Switch name
Average CPU usage during the specified time range
Maximum CPU usage during the specified time range
Average memory usage during the specified time range
Maximum memory usage during the specified time range
Time range
3. In the Highest Average CPU Usage chart (lower right), click a point on a usage trend line for a
switch or soft switch.
The Appliances page or the Servers page is launched, and it displays detailed information about
the switch or softswitch with the highest average CPU usage during the selected time interval. For
more information about the details displayed on the Appliances page, see Monitoring Appliance
Status on page 597. For more information about the details displayed on the Servers page, see
Monitoring Server Status on page 614.
The System view shows all configured sites, including all voice switches and servers for each site.
This view provides a high-level overview of your system’s configuration and status.
The Site view shows all configured components (including servers, voice switches, service
appliances, softswitches, voice mail switches, trunk groups, and phones) for a particular site.
In both views, the node icons are color coded, which allows you to see the current status of each site
and component at a glance. Status for sites is aggregated to the most severe status based on the
site’s components. For example, if a switch at a site is down, the icon for the switch would be red and
the icon for the site would be red, even if other switches at the site are green or yellow. The topology
node icons and the status colors are described in Table 168 on page 580.
You can see the status of the connections or associations between nodes by clicking a particular node.
The connections or associations are displayed based on the perspective of the node that you click.
Therefore, if you click on each of the two nodes that are connected by a line, the line could indicate a
different connectivity status based on which node is in focus.
The status of the connectivity between nodes is represented by a colored line or other indicator, as
follows:
A dashed yellow line indicates that the connection between the nodes is functional but impaired or
limited in some way.
A dashed red line indicates that there is no communication between the nodes because of a
software, hardware, or network issue for at least one of the nodes.
A gray line indicates one of the following, depending on the nodes connected with it:
When DRS is enabled, a gray line connecting two sites indicates that calls can be routed
between the sites, but protocol communication between the sites is not necessary.
In the System view, a gray line between the WAN node and nodes with gray site icons
indicates that these sites have been defined in the system but currently have no hardware
configured.
In the Site view, a gray line between voice switches and trunk groups or phones indicates
which switch manages those trunk groups or phones.
Connectivity status is independent of device status. For example, a green switch icon means that the
device is operating normally, but if you click the switch node icon you might see that it has a dashed
red connectivity line to one or more switches, indicating that it cannot communicate with these
switches.
When you click a site node, the site’s connectivity to other sites is aggregated based on the
connectivity status of the site’s switches and servers. For example, if a site has a switch that is down
(red) and a switch that is operating with some impairment (yellow), the line showing that site’s
connectivity to other sites is yellow, indicating some impairment.
When you click a switch or server node, the lines represent switch-to-switch, switch-to-server, or
server-to-server connections, depending on the type of node you click. Connectivity between these
components relies on one or more of the following Mitel proprietary protocols, which are described in
the Mitel Connect Maintenance Guide:
The communication protocol for these connections depends on whether Distributed Routing Service
(DRS) is enabled or disabled, as follows:
If DRS is enabled:
For switch-to-switch connections within the same site, the connectivity line represents a
connection using LSP.
For switch-to-server connections, the connectivity line represents a connection using LSP. If
the switch is managed by the server, the connectivity line also represents an NCC RPC
connection.
For server-to-server connections, the connectivity line represents a connection using DTAS
and LSP.
If DRS is disabled:
For switch-to-switch connections, the connectivity line represents a connection using LSP.
For switch-to-server connections, the connectivity line represents a connection using LSP. If
the switch is managed by the server, the connectivity line also represents NCC RPC
connections.
For server-to-server connections, the connectivity line represents a connection using DTAS
and LSP connections.
When more than one protocol is used, the color of the connectivity line represents the worst status of
any active protocols.
Note
Status and connection information displayed in the topology map could be up to two minutes old.
Green indicates that all switches and servers at the site are in service.
Yellow indicates that one or more switches or servers are impaired but not out of
service.
Red indicates that one or more switches or servers are out of service.
Green indicates that all switches and servers at the site are in service.
Yellow indicates that one or more switches or servers at the site are impaired but not
out of service.
Red indicates that one or more switches or servers are out of service.
Gray indicates that the system does not have enough information to determine the
status.
Yellow indicates that the switch is impaired or FTP booted but not out of service. For
example, if some trunk or phone ports on the switch are out of service, that switch’s
node icon would be yellow.
Gray indicates that the system does not have enough information to determine the
status.
Represents a server. The color of the icon changes based on status:
Gray indicates that the system does not have enough information to determine the
status.
Represents a trunk group. The color of the icon changes based on status:
Green indicates that the ratio of In Service trunks to Configured trunks is greater than
50 percent.
Yellow indicates that the ratio of In Service trunks to Configured trunks is between 20
and 50 percent.
Red indicates that the ratio of In Service trunks to Configured trunks is 20 percent or
less.
For sites that include hardware, you can click the site’s node icon and then click on the node.
You can collapse the All Sites list by clicking at the top of the heading bar, and you can expand it
by clicking . To reset the topology map to the high-level System view, click the “All Sites” entry in
the All Sites list. To close the All Sites list, click the Hide Sites Menu button.
Repositioning the Node Icons and All Sites List in the Map View
To focus on a particular node within the topology map, you can adjust the view as follows:
Click and drag any node icon to change its orientation in the topology map.
Click any point in the background of the topology map and drag to reposition the map.
To reposition the All Sites list on the page, click and drag the expanded or minimized list to a different
area on the page.
4. Right click the WAN icon and select Expand All Sites.
All sites, servers, and switches in the Mitel Connect system and their logical connections are
displayed.
Note
The System view reflects logical connectivity. For this reason, the network icon labeled as a WAN
might actually represent a LAN.
The high-level Connect System view is displayed, showing sites configured in the system.
3. To see all configured components and associations, click the WAN node icon.
4. Right-click the highlighted WAN node icon, and select Expand All Sites from the pop-up menu.
All sites, switches, and servers in the Connect system are displayed.
5. Click any site, server, or switch to see the one-way connectivity for that component to other
components in the system.
Tip
You can easily remove components from the topology view for a particular site by clicking the
site’s node icon and then clicking .
The high-level Connect System view is displayed, showing sites configured in the system.
3. To see the topology for a site where hardware is installed, do one of the following:
All servers, switches, trunk groups, and phone collections for the site are displayed.
2. Right-click the highlighted site node icon, and select Show Site Topology from the pop-
up menu.
All servers, switches, trunk groups, and phone collections for the site are displayed.
4. Click the icon for any server, switch, trunk group, or phone collection to see the one-way
connectivity from that component to other components in the system.
b. Right-click the highlighted node, and select one of the following commands from the pop-up
menu:
The site’s icon is highlighted with a blue circle, and the site’s one-way connectivity to other
components is displayed.
The server is highlighted with a blue circle, and one-way connectivity to other components is
displayed.
The switch is highlighted with a blue circle, and the switch’s one-way connectivity to other
components is displayed. The server that manages the switch is indicated by a small circle (switch
management indicator) on the connection line.
When Distributed Routing Service (DRS) is enabled, the switch connectivity table is organized by site.
When DRS is disabled, status for all Mitel Connect voice switches is shown.
In the connectivity grid, the following indicators provide information about a switch:
Green with a check mark indicates that the switch is connected and communicating with other
switches in the system.
Yellow with a question mark indicates that the switch connectivity is unknown because it cannot
communicate with TMS.
Red with an “X” indicates that the switch has lost communications with the server.
System
Sites
Appliances
Servers
IP phones
Trunk groups
Voice mail
Make Me Conferencing
Audio/Web Conferencing
IM
Connect Sync
The status pages are divided into a top pane and a bottom pane. The top pane (the “list pane”)
displays a list of components and their status, and the bottom pane (the “details pane”) displays
detailed information about the specific component highlighted in the top pane. Where appropriate, the
bottom pane also provides additional tabs for information such as detailed status, performance, and
related calls.
When you click a particular type of status page in the navigation menu, by default the first item in the
list pane is selected and that item’s detailed information is displayed in the details pane. You can select
another item in the list pane and view its details in the details pane.
On the Status and Maintenance > System page, you can click a site name to open the Status and
Maintenance > Sites page or a server or appliance name to open the Status and Maintenance >
Servers page. For more information, see Monitoring Site Status on page 592 and Monitoring Server
Status on page 614.
Table 169: Columns in the Status and Maintenance > System List Pane
Column Name Description
Sites
site status indicator High-level status of the site:
Table 169: Columns in the Status and Maintenance > System List Pane (Continued)
Column Name Description
Service The current service status for the site. More than one service state can be in effect for a
site, but only the most severe service state is displayed until that state is resolved.
Possible values are:
Unknown—The state of the switch is unknown. This is typically the case during an
upgrade when the switch is disconnected from the system.
Restart Pending—A Restart When Idle command was issued, but the restart did not
occur because switch ports are still in use.
Platform Version Mismatch—The switch firmware version does not match the build
version installed on the Headquarters server.
Booting From FTP—The voice switch did not boot from flash memory but booted from
an FTP server, most likely on the server. You can correct this problem by rebooting the
voice switch. If this does not correct the problem, contact Mitel Technical Support.
Port Out Of Service—One or more, but not all, trunk or phone ports are out of service
on the voice switch. Ports or IP phones typically go out of service because either
someone manually put them out of service or the call control software automatically
put them out of service due to a signaling problem (for example, the dial tone was not
received from the central office).
Hunt Group Out Of Service—All ports associated with a hunt group are out of service.
SIP Trunks out Of Service—All ports associated with a SIP trunk are out of service.
SIP Trunks Out Of Service Operational—All ports associated with a SIP trunk are out
of service because of operational trouble, typically on the other side of the trunk
connection.
SIP Trunks Out Of Service Administrative—All ports associated with a SIP trunk are
out of service because an administrator has set them to an “out of service” state.
SoftPhones Out Of Service—All softphones are out of service for one or more
switches in the system.
All Ports Out Of Service—All ports (trunk, softphone, analog phone, and IP phone) on
a voice switch at the site are out of service.
Table 169: Columns in the Status and Maintenance > System List Pane (Continued)
Column Name Description
Service (continued) Configuration Mismatch—A configuration mismatch has been detected between a
switch and a server, between two servers, or between two switches.
Firmware Mismatch—The firmware on one or more phones does not match the build
version installed on the Headquarters server.
Voltage Failure—The voltage associated with a switch has exceeded the normal safe
range.
Firmware Update Failure—A firmware update was requested for a phone, but it failed.
Lost Communication—The server lost communication with the voice switch. Note that
the voice switch may be fully operational but the server cannot see the voice switch
due to a networking issue. This also occurs when the voice switch is powered off.
Servers and Appliances
status indicator Status of the server or appliance
Server/Appliance The name of the server or appliance
Type The type of server or appliance
Table 169: Columns in the Status and Maintenance > System List Pane (Continued)
Column Name Description
Status The current status of the server or appliance. Possible values are:
Software Upgrade Available—A new software version is available for the server or
appliance.
Software Version Mismatch—The version of the server software does not match the
Headquarters server, which could cause instability.
SMTP Send Error—The SMTP server is having persistent trouble sending email.
Error Initialize TMS—The TMS instance on the server has encountered an error upon
initialization.
Unexpected Error—An unknown error has occurred, which indicates a critical problem.
Services The status of the server’s services. Possible values are:
Running
Not Running
Unknown
Disk Used The percentage of the server’s disk space in use
DB The status of the server’s local database, if it has one:
A green icon indicates that the server’s local database is functioning normally.
A red icon indicates that the database is down or, if distributed database is enabled, is
not synchronized with the database on the Headquarters server.
Apply This If you want to apply one of the following commands to all switches and appliances in the
Command to All system, select the command from the drop-down and click Apply:
Switches and
Appliances Restart
Reboot
Table 169: Columns in the Status and Maintenance > System List Pane (Continued)
Column Name Description
Apply this Command If you want to apply one of the following commands to all servers in the system, select
to All Servers the command from the drop-down list and click Apply:
Publish Wallpapers
Publish Ringtones
Publish All
Temporarily Disable For some maintenance tasks, such as system-wide maintenance, enable this option to
IP Phone Failover temporarily disable IP phone failover. When this feature is enabled, spare switches also
Across Sites do not fail over throughout the system.
Table 170: Columns in the Status and Maintenance > System Bottom Pane (Conferencing)
Column Name Description
Total Conference The types of conferencing services available on the system
Ports
In-Use The total number of audio and Web conference ports currently in
use
Licensed Capacity The number of audio and Web licenses on the system
System Capacity The system’s configured maximum capacity for simultaneous
audio or Web conferences
For information about how to use the maintenance commands at the bottom of the Status and
Maintenance > System page, see the Mitel Connect Maintenance Guide.
Table 171: Columns in the Status and Maintenance > Sites List Pane
Column Name Description
Command (two drop- Select one of the following maintenance commands to perform on the switches at the
down lists) selected site or sites:
Reboot and Reset: Manage how you reboot appliances or restart services.
Reboot Appliance(s) When Idle stops and restarts all services on each switch or
appliance at the selected site after the calls they are managing are completed. Calls
that are active when these commands are selected are allowed to finish normally. For
the following voice switches and service appliances, the Reboot Appliance(s)
When Idle option performs an upgrade and reboot if a new software version is
available: SG-90V, SG-50V, SG-90BRIV, virtual phone switch, virtual trunk switch,
SA-100, SA- 400, and virtual service appliance.
Restart Mitel Services restarts the appliance or service immediately. Calls that the
switches are servicing when this command is selected will be lost.
Restart Mitel Services When Idle stops and restarts all services on each switch or
appliance at the selected site after the calls they are managing are completed. Calls
that are active when these commands are selected are allowed to finish normally.
Download to Appliance(s) downloads software to the switches that use the two-
stage upgrade process.
Cancel Pending Download stops the download of switch software for the switches
that use the two-stage upgrade process.
Update Appliance(s) When Idle triggers the selected switches to upgrade to the
downloaded software when the switches are idle and then to reboot when the
upgrade is complete.
For more information about the two-stage upgrade process for switches, see the Mitel
Connect Maintenance Guide.
command check box Allows you to select one or more sites to apply maintenance commands to the switches
at that site or sites
Table 171: Columns in the Status and Maintenance > Sites List Pane (Continued)
Column Name Description
status indicator High-level status of the site:
Yellow indicates a problem (a warning state) at the site that does not affect the site’s
service.
Red indicates that the site is down or experiencing a severe service impact.
Site The name of the site
TMS Comm The communication state of all switches at the site. The first number represents
switches with which the Telephony Management Service (TMS) can currently
communicate. The second number is the total number of switches at the site. For more
information about TMS, see the Mitel Connect Maintenance Guide.
Usage The current switch and phone usage for the site. Possible values are:
Table 171: Columns in the Status and Maintenance > Sites List Pane (Continued)
Column Name Description
Service The current service status for the site. Possible values are:
Unknown—The state of the switch is unknown. This is typically the case during an
upgrade when the switch is disconnected from the system.
Restart Pending—A Restart When Idle command was issued, but the restart did not
occur because switch ports are still in use.
Version Mismatch—The switch software version does not match the build version
installed on the Headquarters server.
Booting From FTP—The voice switch did not boot from flash memory but booted
from an FTP server, most likely on the server. You can correct this problem by
rebooting the voice switch. If this does not correct the problem, contact Mitel
Technical Support.
Port Out Of Service—One or more, but not all, trunk or phone ports are out of service
on the voice switch. Ports or IP phones typically go out of service because either
someone manually put them out of service or the call control software automatically
put them out of service due to a signaling problem (for example, the dial tone was not
received from the central office).
Hunt Group Out Of Service—All ports associated with a hunt group are out of
service.
SIP Trunks Out Of Service—All ports associated with a SIP trunk are out of service.
Table 171: Columns in the Status and Maintenance > Sites List Pane (Continued)
Column Name Description
Service (continued) SIP Trunks Out Of Service Operational—All ports associated with a SIP trunk are out
of service because of operational trouble, typically on the other side of the trunk
connection.
SIP Trunks Out Of Service Administrative—All ports associated with a SIP trunk are
out of service because an administrator has set them to an “out of service” state.
SoftPhones Out Of Service—All softphones are out of service for one or more
switches in the system.
All Ports Out Of Service—All ports (trunk, softphone, analog phone, and IP phone)
on a voice switch at the site are out of service.
Firmware Mismatch—The software on one or more phones does not match the build
version installed on the Headquarters server.
Voltage Failure—The voltage associated with a switch has exceeded the normal safe
range.
Firmware Update Failure—A software update was requested for a phone, but it
failed.
Lost Communication—The server lost communication with the voice switch. Note
that the voice switch may be fully operational but the server cannot see the voice
switch due to a networking issue. This also occurs when the voice switch is powered
off.
SIP Trunks The first number represents the SIP trunks in use (total SIP trunks configured in the
database for all switches at each site), and the second number represents the SIP trunk
capacity count (the sum of each switch’s built-in and configured SIP port capacity).
IP Phones The first number represents IP phones in use (the total number of IP phone ports
configured in the database), and the second number represents IP phone capacity (the
sum of all switches’ built-in and configured IP phone ports capacity).
Bandwidth The first number represents active bandwidth, and the second number represents
admission bandwidth.
Status Tab
For the site selected in the details pane, the Status tab displays:
A list of the site’s softswitches, voice switches, voicemail-enabled switches, and service
appliances on the left side of the pane
For details about the columns included in the lists, see Table 172 on page 598.
On the Status tab, click the name of the switch or server/appliance that you want more information
about.
Performance Tab
The Trunk Group Usage chart shows the five trunk groups with the highest usage on the selected
site.
The Bandwidth Usage chart shows the bandwidth usage trend for the site for the selected time
period.
Calls Tab
The Calls tab displays a list of the 10 most recent calls, by default, associated with the selected site.
For details about the fields on the Calls tab, see Monitoring Call Quality on page 635.
The Call Quality page, which shows details for the selected call, is displayed.
Table 172: Columns in the Status and Maintenance > Appliances List Pane
Column Name Description
Command Allows selection of one or more appliances to apply one of the following maintenance
commands, which are available from the drop-down list. Not all commands can be applied
to all switch types.
Reboot Appliance(s) immediately stops all services and reboots each switch. Calls that
the switches are servicing when this command is selected are lost. For the following voice
switches and service appliances, this option performs an upgrade and reboot if a new
software version is available: SG-90V, SG-50V, SG-90BRIV, virtual phone switch, virtual
trunk switch, SA-100, SA- 400, and virtual service appliance.
Reboot Appliance(s) When Idle stops all services and reboot each switch after the calls
that it is managing are completed. Calls that are active when this command is selected
are allowed to finish normally. For the following voice switches and service appliances,
this option performs an upgrade and reboot if a new software version is available: SG-
90V, SG-50V, SG-90BRIV, virtual phone switch, virtual trunk switch, SA-100, SA- 400,
and virtual service appliance.
Restart Mitel Services immediately stops all services and reboots appliance(s). Calls
that the switches are servicing when this command is selected are lost. For the following
voice switches and service appliances, this option performs an upgrade and reboot if a
new firmware version is available: SG-90V, SG-50V, SG-90BRIV, virtual phone switch,
virtual trunk switch, SA-100, SA- 400, and virtual service appliance.
Restart Mitel Services When Idle stops and restarts all services on each switch or
appliance at the selected site after the calls they are managing are completed. Calls that
are active when these commands are selected are allowed to finish normally.
Reboot Phones immediately reboots the selected phone(s). This operation interrupts
calls.
Reboot Phones When Idle reboots the selected phone(s) after calls are completed.
Put Appliance(s) In service puts all ports on the switch in service. Ports already in
service with active calls are not affected.
Put Appliance(s) Out of Service places all ports on the voice switch out of service.
Active calls are dropped. This command is a forceful way to remove traffic from a voice
switch before you replace the switch.
Put Appliance(s) Out of Service When Idle puts all idle ports out of service, and
remaining ports are also put out of service when they go idle. This command is a graceful
way to remove traffic from a voice switch before you replace it.
Failback Spare clears the parameters assigned to the system for failover and returns the
switch to the spare-switch state.
Table 172: Columns in the Status and Maintenance > Appliances List Pane (Continued)
Column Name Description
Command Update Software: Manage updates on appliances.
(continued)
Update Appliance triggers a reboot of the switch, which launches an upgrade of the
switch software to a new software version that has already been downloaded to the
switch. For complete details on the two-stage upgrade process, see the Mitel Connect
Maintenance Guide.
Update Appliance(s) When Idle waits until the switch is idle before triggering a reboot of
the switch, which launches an upgrade of the switch software to a new software version
that has already been downloaded to the switch. For complete details on the two-stage
upgrade process, see the Mitel Connect Maintenance Guide.
Force Appliance(s) Update launches an upgrade of the current active partition with
software from <drive>:\inetpub\ftproot\tsb. Be aware that this command
immediately disrupts switch operations.
Download Phone Software to Linux DVS pushes a phone software image to a Linux
distributed voice server (Linux DVS).
Start USB Logging and Reboot turns on logging to a USB device for the selected switch
or switches for diagnostic purposes. After you apply this command, you must immediately
reboot the selected switches for the command to take effect.
Stop USB Logging and Reboot turns off logging to a USB device for the selected switch
or switches. After you apply this command, you must immediately reboot the selected
switches for the command to take effect.
Archive Switch Logs creates an archive copy of the logs for voice switches. The logs
are uploaded to the configured FTP location (<drive>:\inetpub\ftproot\Logs).
command check Allows you to select one or more switches to which to apply the selected command.
box
status indicator High-level status of the site:
For a complete list of switch types, see the “Voice Switches” appendix in the Mitel Connect
Planning and Installation Guide.
Site Name of the site associated with the switch.
IP The IP address of the switch or appliance.
MAC The MAC address of the switch or appliance.
Table 172: Columns in the Status and Maintenance > Appliances List Pane (Continued)
Column Name Description
Comms TMS connections within the site. Displayed as X/Y where X is the available connections and
Y is the expected total number of connections.
Usage The usage state of the switch:
Table 172: Columns in the Status and Maintenance > Appliances List Pane (Continued)
Column Name Description
Service The current service status for the switch. Possible values are:
Unknown—The state of the switch is unknown. This is typically the case during an
upgrade when the switch is disconnected from the system.
Firmware Update Available—The server has a new optional version of software available
for voice switches. A voice switch in this state continues to run call control as well as
access the voice services on the server. To propagate the patch to the voice switches,
you must restart them.
Restart Pending—A Restart When Idle command was issued, but the restart did not occur
because switch ports are still in use.
Upgrade In Progress—The voice switch is currently being upgraded with a new software
version.
Platform Version Mismatch—The switch software version does not match the build
version installed on the Headquarters server.
Booting From FTP—The voice switch did not boot from flash memory but booted from an
FTP server, most likely on the server. You can correct this problem by rebooting the voice
switch. If this does not correct the problem, contact Mitel Technical Support.
Port Out Of Service—One or more, but not all, trunk or phone ports are out of service on
the voice switch. Ports or IP phones typically go out of service because either someone
manually put them out of service or the call control software automatically put them out of
service due to a signaling problem (for example, the dial tone was not received from the
central office).
Hunt Group Out Of Service—All ports associated with a hunt group are out of service.
SIP Trunks Out Of Service—All ports associated with a SIP trunk are out of service.
SIP Trunks Out Of Service Operational—All ports associated with a SIP trunk are out of
service because of operational trouble, typically on the other side of the trunk connection.
SIP Trunks Out Of Service Administrative—All ports associated with a SIP trunk are out of
service because an administrator has set them to an “out of service” state.
SoftPhones Out Of Service—All softphones are out of service for one or more switches in
the system.
All Ports Out Of Service—All ports (trunk, softphone, analog phone, and IP phone) on a
voice switch at the site are out of service.
Table 172: Columns in the Status and Maintenance > Appliances List Pane (Continued)
Column Name Description
Service Firmware Mismatch—The software on one or more phones does not match the build
(continued) version installed on the Headquarters server.
Voltage Failure—The voltage associated with a switch has exceeded the normal safe
range.
Firmware Update Failure—A software update was requested for a phone, but it failed.
Lost Communication—The server lost communication with the voice switch. Note that the
voice switch may be fully operational but the server cannot see the voice switch due to a
networking issue. This also occurs when the voice switch is powered off.
Download Status The download status of the firmware for the switch or appliance.
Phone Image For distributed voice servers, the download status of a phone firmware image.
Download
Phones The first number represents IP phones in use (the total number of IP phone ports configured
in the database), and the second number represents IP phone capacity (the sum of all
switches’ built-in and configured IP phone ports capacity).
For a virtual phone switch, a red number indicates that the number of IP phones in use
exceeds the provisioned capacity.
SIP Trks The first number represents the SIP trunks in use (total SIP trunks configured in the
database for all switches at each site), and the second number represents the SIP trunk
capacity count (the sum of each switch’s built-in and configured SIP port capacity).
For a virtual trunk switch, a red number indicates that the number of SIP trunks in use
exceeds the provisioned capacity.
Conf The first number represents conferences in use, and the second number represents
conference capacity.
For a virtual phone switch, a red number indicates that the number of active conferences
exceeds the provisioned capacity.
BCA The number of bridged call appearances (BCAs) configured for the switch.
HG The number of hunt groups configured for the switch.
Role Specifies whether the switch is operating as a primary switch or a failed-over spare switch.
Active Build The active firmware build running on the switch or appliance.
Staged Build The firmware build that has been downloaded to a second partition on the switch or
appliance but that has not yet been installed on the switch or appliance (using the Update
Firmware command).
Status Tab
The Status tab on the Status and Maintenance > Appliances page lets you monitor details for each
switch. The details displayed depend on the type of switch or appliance selected. All fields displayed
on the Status tab, regardless of switch or appliance type, are described in Table 173.
Note
If you select a softswitch in the list pane, the details pane does not include a Status tab
Table 173: Fields in the Appliances Details Pane (Status Tab) (Continued)
Area Field Description
Ports Conference Type of conference port
(applies to Ports
service
Active The number of audio or web conferences that are currently
appliances)
Conferences active
(In Use)
For a virtual service appliance, a red number in this field
indicates that the number of active conferences exceeds the
provisioned capacity.
Ports (In Use) The number of ports used for audio or web conferences
Table 173: Fields in the Appliances Details Pane (Status Tab) (Continued)
Area Field Description
Channels command Allows selection of one or more channels to apply maintenance
check box commands (Reset, Put in service, Put out of service, Put out of
service when idle)
status indicator Status of the port:
Table 173: Fields in the Appliances Details Pane (Status Tab) (Continued)
Area Field Description
Hardware Fan Provides status for the switch’s fan. Possible values are as
follows:
OK
Slow
Failed
Unknown
Temperature Provides status about the temperature of the switch. Possible
values are as follows:
OK
Yellow Alarm
Red Alarm
Unknown
Voltages Provides status for the switch’s talk battery and ring voltages.
Possible values are as follows:
OK
Failed
Unknown
Table 173: Fields in the Appliances Details Pane (Status Tab) (Continued)
Area Field Description
Link Status D-Channel For a PRI, displays the status of the D-Channel. Possible values
are as follows:
Down
In Service
Out of Service
Unknown
Line Coding Displays the status of the line coding for the switch. Possible
values are as follows:
OK
Bipolar Violations
Loss of Signal
Unknown
Framing Displays the status of the framing for the switch. Possible values
are as follows:
OK
Yellow Alarm
Bit Error
Out of Frame
Unknown
Loopback Displays the status of loopback for the switch. Possible values
are as follows:
Off
On
Unknown
You can apply a loopback command (Off, Line, PayLoad) by
selecting a command from the drop-down list.
Span Using the check box, provides the option to apply the following
commands:
Reset
Put in service
Put out of service when idle
Table 173: Fields in the Appliances Details Pane (Status Tab) (Continued)
Area Field Description
Link Error Error Free The number of error-free seconds that occurred in the last 15
Summary Seconds minutes and 24 hours.
Errored The number of errored seconds that occurred in the last 15
Seconds minutes and 24 hours.
Severely The number of severely errored seconds that occurred in the
Errored last 15 minutes and 24 hours.
Seconds
Unavailable The number of seconds the server was not available.
Seconds
Out of Frame The number of times the link has been out of frame in the past
15 minutes and 24 hours.
USB Storage USB device The current status of logging to a USB device connected to the
logging status switch. (Rebooting this switch is required before logging actually
begins.) Possible values are as follows:
Logging ongoing
Logging stopped
USB device is not present
USB device The total amount of storage space available on the USB device.
total storage
USB device The total amount of free storage space available on the USB
free storage device.
Table 173: Fields in the Appliances Details Pane (Status Tab) (Continued)
Area Field Description
Details Last Boot Time The last time the switch booted
Boot Source The source of the last time the switch booted. Possible values:
Flash
FTP boot
unknown boot source
Connect Time The most recent time that the server reestablished a connection
with the switch
Boot ROM The boot ROM version number
Version
Firmware The version number of the firmware the switch is running
Version
Platform The version number of the platform for the virtual service
Version appliance
CPU Board The version number of the switch’s CPU board
Version
CPU Board The version number of the switch’s CPU board field-
FPGA Version programmable gate array
CPU Usage The current CPU utilization (by percentage) for the switch
Memory Usage The current memory utilization (by percentage) for the switch
Active Calls The number of calls currently in progress on the switch
Number of CPU The number of CPU cores configured for the virtual machine
Cores hosting the virtual switch
CPU Speed The CPU speed of the virtual machine that hosts the virtual
(MHz) switch
Memory The amount of memory configured on the virtual machine that
Configured hosts the virtual switch
(MB)
Disk Total (GB) The total disk space capacity of the virtual machine that hosts
the virtual service appliance
Link Status The status of the connection
Active Interface The name of the active network interface card
Time Server The IP address of the time server
Table 173: Fields in the Appliances Details Pane (Status Tab) (Continued)
Area Field Description
Hunt Groups Status Indicator Indicates the status of the hunt group:
Idle
Normal
Service The current service state of the hunt group. Possible values are:
Normal
Out of Service (Operational)
Out of Service (Administrative)
IP Phones status indicator High-level status for the IP phones configured on the switch:
Idle
Normal
Service The current service state of the IP phones. Possible values are:
In Service
Out of Service (Operational)
Table 173: Fields in the Appliances Details Pane (Status Tab) (Continued)
Area Field Description
SIP Trunks command Allows selection of one or more trunks to which to apply
check box maintenance commands (Reset, Put in service, Put out of
service, Put out of service when idle), as specified in the
Command field at the top of the pane
status indicator Indicates the status of the trunk group based on the percentage
of In Service trunks divided by the ports within the trunk group:
Idle
Normal
Service The current service state of the trunk group. Possible values are:
In Service
Out of Service
Unknown
Span x Category Possible values:
(Disabled or
Enabled) Layer 1
Layer 2
Loopback
Span
Status Possible values:
Active
Off
Command Use the command drop-down lists to turn Loopback on or off
and to apply various commands to the Span.
Table 173: Fields in the Appliances Details Pane (Status Tab) (Continued)
Area Field Description
Link Category For a BRI or E1, provides performance details for each Span for
Performance the past 15 minutes and the past 24 hours for the following
categories:
Link Active
Rx/Tx Frames
Rx/Tx Errors
Warnings
Status The status of the link and the number of frames, errors, and
warnings
Command The number of commands executed on the link
Failover Status Failover Status For a spare switch, indicates whether the switch has failed over
Current Site The spare switch’s current site
Home Site The spare switch’s home site
Performance Tab
The Feature Usage chart shows the maximum and average number of calls related to specific
features during the specified time interval. The features included in the chart are voicemail,
Hunt Groups, Workgroups, BCA, and Paging Groups. Each feature is displayed separately so
that you can see the extent to which each feature has been used for a given time interval.
Feature usage counts reflect the number of active calls at the time TMS writes to the
Monitoring Database, not the cumulative number of active calls between measurement
intervals. For this reason, calls less than 30 seconds in duration might not be reflected in
feature usage counts.
The Platform Resources chart shows the CPU and memory usage trend for the selected
switch for the selected time period.
Because high feature usage can lead to an increase in CPU and memory usage, the information in
these charts might be correlated.
Calls Tab
The Calls tab displays a list of the 10 most recent calls, by default, associated with the selected switch.
For details about the fields on the Calls tab, see Monitoring Call Quality on page 635.
The Call Quality page, which shows details for the selected call, is displayed.
Table 174: Columns in the Status and Maintenance > Servers List Pane
Column Name Description
status indicator Shows the status of the server:
Table 174: Columns in the Status and Maintenance > Servers List Pane (Continued)
Column Name Description
Status The status of the server. Possible values are:
Running
Not Running
Unknown
DB The status of the server’s local database if it has one:
Status Tab
The Status tab displays different information based on the server type you select in the list pane. The
fields for the various types of servers are described in the following tables:
Table 175 describes the fields on the Status tab for a Headquarters server.
Table 176 describes the fields on the Status tab for a Distributed Voice Server.
Service appliances include only an Application Service Status area on the Status tab, which lists
services relevant to service appliances.
Table 175: Fields in the Status and Maintenance > Servers Details Pane (Status Tab) for a
Headquarters Server
Field Description
Create Database Snapshot Provides a means to create a snapshot of the master database
button
Status Shows status of TAPI and SMTP Send, as follows:
status indicator
Master State
Master Log File Name
Master Log Position
Application Service Status Provides a list of services running on the server and their status,
and allows you to apply commands to these services. For more
information about these services, see Table 177 on page 617.
Table 176: Fields in the Status and Maintenance > Servers Details Pane (Status Tab) for a
Distributed Voice Server
Field Description
Resync Database command Provides a means to resynchronize the remote database with the
button master database on the Headquarters server. For more
information, see Creating a Database Snapshot and
Resynchronizing Databases on page 620.
Status Shows status of TAPI and SMTP Send, as follows:
The Application Service Status area, which is included on the Status tab for Headquarters servers,
Distributed Voice Servers, and service appliances, provides current status for the Mitel services, which
are listed in Table 177 on page 617. For service appliances, the Application Service Status area lists
only the services that are relevant to the service appliance.
2. In the navigation menu, click Maintenance > Status and Maintenance > Servers.
The details for the Headquarters server are displayed on the Status tab.
4. On the Status tab, scroll to the Application Service Status area, and in the Command drop-down
list select Start or Stop.
5. Select the check box of the service or services you want to start or stop.
6. Click Apply.
You can determine if you need to create a database snapshot by determining how far out of
synchronization the remote database is from the Headquarters database. To determine the database
synchronization status, compare the master log file name and the master log file position for the
Headquarters database (available in the Database section of the Status tab for the Headquarters
server) with the details for the remote database (available in the Local Database section of the Status
tab for the remote server). You can synchronize the two database systems. The synchronization point
is the last snapshot performed on the master database.
2. In the navigation menu, click Maintenance > Status and Maintenance > Servers.
The details for the Headquarters server are displayed on the Status tab.
2. In the navigation menu, click Maintenance > Status and Maintenance > Servers.
The details for the remote server are displayed on the Status tab.
Calls Tab
The Calls tab displays a list of the 10 most recent calls, by default, for the selected server. For details
about the fields on the Calls tab, see Monitoring Call Quality on page 635.
You can use the filtering capability to quickly find a particular phone. For details on filtering, see
Filtering Information on page 32.
Table 178: Columns in the Status and Maintenance > IP Phones List Pane
Column Name Description
Command Allows selection of one or more phones to apply one of the following maintenance commands,
which are available from the drop-down list. Not all commands can be applied to all phone
types:
Reboot: Select this option to immediately reboot the selected phone. This operation
interrupts calls.
Download Firmware: Select this option to download the firmware to the phone’s inactive
partition. This option applies to IP400-Series phones.
Update 400-Series Phone: Select this option to immediately update the firmware on the
phone. This operation interrupts any in-progress calls.
Update 400-Series Phone When Idle: Select this option to update the firmware on the
phone when the phone is idle. Calls that are active when this command is selected are
allowed to finish normally.
Put Out of Service: Select this option to immediately remove a phone from service. This
operation interrupts calls.
Put Out of Service When Idle: Select this option to remove a phone from service only when
the phone is idle. Calls that are active when this command is selected are allowed to finish
normally.
command Allows selection of one or more phones for application of maintenance commands
check box
status indicator The current status of the phone:
Table 178: Columns in the Status and Maintenance > IP Phones List Pane (Continued)
Column Name Description
Firmware The current firmware status of the phone:
Status
Up to Date indicates that the phone’s current firmware version is greater than or equal to the
minimum firmware version required for the phone.
Update Available indicates that the phone is running an acceptable firmware version, but a
more recent firmware version is available for download. In other words, the phone is running
a firmware version above or equal to the minimum version, but less than the recommended
version.
Firmware Version Mismatch indicates that the phone’s current firmware version is less
than the minimum firmware version required for the phone.
PBX Mismatch indicates that the current PBX version is not compatible with the phone’s
current firmware version.
Download Pending indicates that all download resources are busy and the phone is waiting
for a resource to become available before initiating the download.
Download Ready indicates that a firmware download on the phone was successful.
Reboot Failed indicates that the reboot of the phone was not successful.
Unknown indicates that the phone firmware status cannot be determined. This could be
because the phone cannot be reached over the network or the switch the phone is assigned
to is disconnected from the server.
Service The current service status for the phone. Possible values are:
Out Of Service (Operational)—The phone is not registered with the system and is in an
“out of service” state.
Usage The current usage state for the phone. Possible values are:
Table 178: Columns in the Status and Maintenance > IP Phones List Pane (Continued)
Column Name Description
MAC The MAC address of the phone
RAST Indicates whether or not the phone is connected to the Mitel Connect phone system using
RAST.
The Button Box Information tab provides the following details about any BB424 button boxes attached
to the IP phone selected in the list pane The fields displayed on the Button Box Information tab are
described in Table 179.
Table 179: Columns on the Status and Maintenance > IP Phones Details Pane (Button Box Information
Tab)
Column Name Description
Button Box MAC Address The MAC address of the BB424 device.
Button Box Model The model number of the button box.
Button Box Hardware Revision The hardware revision level of the button box.
Button Box Firmware Revision The firmware revision level of the button box.
Calls Tab
The Calls tab provides a detailed view of call information for the selected IP phone. The phone
extension and user name are displayed in either the Source or Destination endpoint column. For
details about the fields on the Calls tab, see Monitoring Call Quality on page 635.
Events Tab
The Events tab provides a list of events relevant to the phone. The fields displayed on the Events tab
are described in Table 180.
Table 180: Columns on the Status and Maintenance > IP Phones Details Pane (Events Tab)
Column Name Description
Severity One of the following severity levels:
Error (Red)
Warning (Yellow)
Informational
Events The event text
Time Created The time the event was reported.
Overrides Tab
The Overrides tab lets you view and change current automatic phone firmware upgrade settings for the
selected phone. The displayed values are derived from the parameters specified on the Overrides tab
of the Phone Download Settings page, but you can modify them. Table 181 describes the parameters
you can set for this feature.
Table 181: Fields on the Status and Maintenance > IP Phones Details Pane (Overrides Tab)
Field Name Description
Override Use the drop-down list to enable or disable the
phone firmware version override option.
Phone Model The phone model of the selected phone
Hardware Version The hardware version of the selected phone
MAC Address The MAC address of the selected phone
Firmware Version Select the desired firmware version from the
drop-down list.
Use recommended Enable this option if you want to use the
recommended phone firmware version.
Table 182: Columns in the Status and Maintenance > Trunk Groups List Pane
Column Name Description
status indicator Indicates the status of the trunk group based on the percentage
of In Service trunks divided by the ports within the trunk group:
Status Tab
The Status tab displays detailed information about the trunk group selected in the list pane. The fields
displayed on the Status tab are described in Table 183.
Table 183: Columns on the Status and Maintenance > Trunk Groups Details Pane (Status Tab)
Column Name Description
command check box Allows selection of one or more trunks to which to apply
maintenance commands (Reset, Put in service, Put out
of service, Put out of service when idle), as specified in
the Command field at the top of the pane
status indicator The service status for the trunk/port:
Idle
Normal
Service The current service state of the trunk group. Possible
values are:
In Service
Out of Service
Unknown
Performance Tab
The Trunks Occupancy chart shows how many trunks out of the total configured trunks were used
on average (and at the peak) for each point within the selected time interval. The information this
chart provides can be helpful in planning for trunk allocation.
The Call Volume chart shows call volume, including the number of good calls, the number of bad
calls, and the intersite calls for the selected trunk group.
Calls Tab
The Calls tab on the Trunk Group details pane lists the 10 most recent calls, by default, for the selected
trunk group. For all calls, the selected trunk group appears in either the Source or Destination User/TG
column.
For details about the fields on the Calls tab, see Monitoring Call Quality on page 635.
List Pane
The list pane displays a list of all voicemail servers configured in the system and lets you view current
status information for any voice mail server listed. Table 184 shows the columns in the list pane on the
Voice Mail page.
Table 184: Columns in the Status and Maintenance > Voice Mail List Pane
Column Name Description
status indicator Shows the status of the voice mail server:
Performance Tab
The Performance tab provides details for the selected voice mail server, including mailboxes and disk
usage.
The Mailboxes Summary area shows the number of mailboxes and the number of messages on the
selected server.
The Disk Summary area shows the free space and the total space as well as the space used for the
following components:
users
recorded names
auto-attendant prompts
music-on-hold files
logs and other data
The Details section on the Performance tab provides information about all the mailboxes assigned on
the selected voice mail server. The fields are described in Table 185.
Table 185: Columns in the Status and Maintenance > Voice Mail Servers Details Pane
(Performance Tab)
Column Name Description
status indicator Shows the status of the voice mailbox:
Table 185: Columns in the Status and Maintenance > Voice Mail Servers Details Pane
(Performance Tab) (Continued)
Column Name Description
Allowed The age, in days, when messages marked as heard are removed
from the server
Space Used (KB) The disk space required to store contents of the specified mailbox.
This includes space required for messages that are deleted but not
purged.
Calls Tab
The Calls tab displays a list of voice mail calls associated with the selected voice mail server. For
details about the columns on the Calls tab, see Table 190 on page 636.
Monitoring IM Status
The Status and Maintenance > IM page provides a list of service appliances that support an IM service
instance and some related statistics for that instance.
Table 188: Columns in the Status and Maintenance > IM Page’s List Pane
Column Name Description
check box Allows selection of one or more service appliances for
stopping and starting the appliance
status indicator Shows the status of the service appliance:
Table 188: Columns in the Status and Maintenance > IM Page’s List Pane (Continued)
Column Name Description
Active The number of users who are currently logged in to IM
on the service appliance
Sessions
Peak The peak number of IM sessions during the last 24
hours
Current The number of current active sessions
Monitoring Alerts
Alerts provide a mechanism for notifying you of possible issues within the Mitel Connect system. The
alerts can identify issues at a variety of levels, such as in the overall system, within a site, or in an
individual component such as a switch.
The Alerts tool accessible in the Maintenance menu includes the following types of alerts:
Many Mitel Connect system components use the Windows Event Log to report status updates,
inconsistencies, misbehavior, and critical system issues. The Monitoring Service captures all
events logged by these components and attempts to find any correlations involving system issues.
The Monitoring Service raises the appropriate alert and attaches all associated events.
Composite Alerts
The Monitoring Service identifies when several common issues occur within a physical or logical
range. For example, if alerts are raised for a number of problematic switches within the same site,
it would create an alert for that site that references the individual alerts as the cause.
Threshold Alerts
The Monitoring Service analyzes metrics from call quality reports as well as periodic status reports
for the system and its components and compares these metrics to thresholds that indicate when
an alert is necessary. The Monitoring Service continues to monitor when these metrics fall below
the threshold limits and determines when the alerts can be safely cleared.
Note
Because a small set of events for Distributed Voice Servers are not captured in the Maintenance
component of Connect Director, some alerts are missing or get stuck. Status pages correctly reflect
the current state of a local or remote server.
Blank—Information
—Warning
—Critical
Time Created The time that the alert was generated
Last Updated The date and time when the alert was
created or cleared
Category The category of the alert. See the Mitel
Connect Maintenance Guide for more
information.
Site If the alert involves a switch, the name of the
site where the switch resides
Switch If the alert involves a switch, the name of the
switch
Trunk Group If the alert involves a trunk group, the name
of the trunk group
State The state of the alert. Possible values are
Active or Cleared.
Description The description of the alert
Clearing Alerts
You can clear an alert, which marks the alert as cleared. Cleared alerts are not deleted; they remain in
the system so that they are available for investigative purposes and to provide historical perspective
for troubleshooting and other analysis.
4. In the list pane at the top, select the check box for the alert you want to clear.
5. Click Apply.
Packet Loss
Packet loss refers to the percentage of media packets lost over the duration of a media session. You
can view the following metrics related to packet loss in the Maintenance menu in Connect Director:
average packet loss, which is the ratio of lost packets to total packets over the entire call
maximum packet loss, which is the highest ratio of lost packets measured in any 10-second
interval
Calculation of packet loss is performed per RFC 3550 using RTP header sequence numbers.
The causes of packet loss include queue drops, corrupted packets dropped in transit, and jitter buffer
drops due to late arrival.
Delay/Latency
Delay or latency refers to the amount of time it takes for speech to exit the speaker’s mouth and reach
the listener’s ear. Latency sounds like an echo or a two-way radio.
The causes of delay or latency include network congestion, route flapping, extremely long routes
between endpoints, and satellite hops.
Jitter
Jitter, also known as Per Packet Delay Variation (PPDV), is the measure of the variability over time of
the latency across a network. VoIP endpoints require media packets to be received in a steady stream
at a consistent rate, or audio quality quickly degrades, which users hear as clicks or pops.
Applications that run on standard operating systems could inject jitter from the sending or receiving
side due to process scheduling delays (timing drift). Network congestion can also cause jitter.
To address problems with jitter, use a dynamic jitter buffer and configure Quality of Service settings to
reduce the impact of network congestion.
The List pane at the top provides a list of call streams (the media stream from the source to the
destination endpoint).
The Details pane at the bottom has multiple tabs that show metrics and configuration data for both
media streams involved in the call, along with both path traces.
Note
The Call Quality page does not automatically refresh, but you can refresh the page by clicking the
Refresh button.
Note
For calls longer than 60 minutes, statistics are collected for only the most recent 60 minutes of the call.
Note
The Details pane does not show all media streams involved in conference calls that include multiple
parties.
Details Tab
The information on the Details tab is displayed in separate columns for Endpoint A and Endpoint B.
The rows in the table provide the collected values for the configuration and metric information from the
individual media stream record. The values displayed are described in Table 191.
3. To select a particular media stream, click on a row in the list pane at the top of the page.
To see metrics for the selected media stream, review the details on the Details tab.
To see the IP path for the selected media stream, click the IP Path Trace tab.
3. Click on the bottom left corner of the Call Quality list pane.
Text boxes are added under each column heading in the Call Quality list pane.
4. Click in the text box under the Source Site column heading, and type the site name for which you
want to find all recent calls.
The list is filtered to include only streams where the source site matches the site name that you
entered in the text box.
3. Click on the bottom left corner of the Call Quality list pane.
Text boxes are added under each column heading in the Call Quality list pane so that you can
enter a filter.
4. Click in the text box under the User/TG column heading in the Source area, and type the user
name for which you want to find all recent calls.
5. Click in the text box under the Start Time column heading, and choose a date from the calendar
and a time (hour and minute), and click done.
The list is filtered to include only streams where the source endpoint user matches the entered
user and that started during the specified time range.
3. Click in the column heading for the call quality status indicator.
The list is sorted from worst call quality to best call quality.
Application
System
Event ID The event identifier number.
Server The name of the server for which the event was reported.
Source The system
Task Category The category of the event
Severity One of the following values:
4. Edit or specify values for the parameters as described in Table 194 on page 642.
Only the switches and phones on which remote packet capture is supported are listed on the
Remote Packet Capture page.
You can capture packet information for up to 25 devices simultaneously. If you select more than 25
devices when you initiate a capture operation, the system notifies you that some capture
operations will not begin immediately. If you proceed, some of the capture operations are put into a
pending state.
The maximum size of a capture file is 70 MB. When the maximum file size is reached, the capture
session stops.
The total maximum disk usage allowed for capture files is 4 GB. If this limit is reached, the system
notifies you to delete capture files to clear space before you can initiate more capture sessions.
A capture session can run for a maximum of 120 minutes. The capture operation stops running
when it reaches this limit.
Note
If the network on which you are running a packet capture has high resource usage or environmental
issues, when running a packet capture you might see problems with connected phones going out of
service because of switches resetting. If this occurs, rather than using the Remote Packet Capture
tool in Connect Director, capture packets through a port mirror on the data switch to the switch.
Table 195: Columns on the Remote Packet Capture List Pane (Continued)
Column Name Description
Duration The configured duration of the packet capture operation in minutes
Logging Status The status of the packet capture operation. Possible values are:
No capture is running
Client Failed
Complete
Note: You cannot stop a capture session when the Logging Status is
“Session Processing.” You must wait and stop the capture session
when the status is “Session Running.” To force a status update, click
Refresh.
The Remote Packet Capture page launches, showing the list of eligible switches and phones in
the top pane.
a. Click .
b. Enter text in one or more filter text boxes for the columns you want to use as a filter.
c. Click .
4. To designate the phones and/or switches for which you want to capture packets, select the check
box for one or more phones or switches.
5. In the Command drop-down list, select Start and then click Apply.
A dialog box that lets you choose settings for the log capture is displayed.
Note
If you select both switches and phones, the list of protocols that you can specify is limited to
protocols common to switches and phones.
7. If you want to capture only SIP + TLS and SHORESIP protocols on one or more switches for an
indefinite period of time, select the Ignore the duration for the SIP and SHORESIP protocols
for switches check box. In this case, the value entered in the Capture Duration field is ignored
and the capture runs until one of the following events occurs:
To capture log information for all protocols listed, select the Capture every protocol check
box.
To select specific protocols, clear the Capture every protocol check box and select the check
boxes for the protocols you want to capture.
A message notifying you that the capture request was submitted successfully is displayed.
The Remote Packet Capture page launches. The list pane at the top lists switches and IP phones.
a. Click .
The filter text boxes are displayed under the column headings in the list pane.
b. Enter text in one or more filter text boxes for the columns you want to use as a filter.
Tip
To filter for capture sessions that are currently running, enter “Session Running” in the text
box under the Logging Status column heading.
c. Click .
4. To designate the phones or switches for which you want to stop capturing packets, select the
check box for one or more switches or phones in the list.
5. In the Command drop-down list, select Stop and then click Apply.
6. Click OK.
3. In the All Previous Log Files pane, which shows the list of available capture files, locate the
capture session whose log file you want to view.
In the File column, click the log file you want to open.
In the File column, right-click the log file you want to open and select Open or another option
from the pop-up menu.
Note
This step assumes that you have a network protocol analysis tool (such as Wireshark)
installed that allows you to open .pcap files.
3. In the All Previous Log Files pane, which shows the list of available capture files, select the check
box for one or more log files that you want to delete.
4. In the Command drop-down list, select Delete Files and then click Apply.
5. Click OK.
For example, you can automatically maintain all 400-Series IP phones at the recommended firmware
level, or you can override the automatic updates if you want to select a different firmware version or
disable automatic update for certain phone models or for specific phones.
To accomplish this, you define global settings for 400-Series phone firmware updates and you specify
any desired overrides to the default settings.
2. In the navigation menu, click Maintenance > Configuration > Phone Firmware Update > Global
Settings.
The Phone Firmware Update page showing global update settings is displayed.
3. Specify default settings, and, if desired, specify settings that apply during the defined maintenance
window. (For details on the parameters, see Table 197.)
4. Click Save.
2. In the navigation menu, click Maintenance > Configuration > Phone Firmware Update >
Overrides.
The Phone Firmware Update page showing override settings is displayed. (For details about the
parameters on the details pane, see Table 198 on page 651.)
To edit the details for an existing override, click the name of the override in the list pane and
edit the parameters in the details pane.
To create a new override definition, click New and specify the parameters in the details pane.
4. Click Save.
2. In the navigation menu, click Maintenance > Status and Maintenance > IP Phones.
3. In the list pane, click the name of the 400-Series phone for which you want to define a firmware
update override.
The details for that phone are displayed in the details pane.
5. On the Overrides tab, specify the parameters for the override. (For details about the override
parameters, see Table 198.)
6. Click Save.
This chapter describes the procedures for backing up and restoring system files. The tools for
performing these tasks are scripts and, optionally, batch files. The topics discussed in this chapter
include:
Overview
A system administrator can use the default scripts that we provide or use the default scripts to create
new scripts. Also, the system administrator can back up and restore all files or selected files.
When following the descriptions in this chapter, readers need to understand that two types of
interfaces can apply to the topics of back up and restore. The choice of interface depends on the task
that the system administrator is doing:
To search for and modify scripts or other components, the system administrator uses Windows
Explorer and, when necessary, a text editor for modifying a script.
To initiate a backup or restore, the administrator uses the server’s command prompt.
To cache an RSA key for each Voice Switch and Service Appliance, the administrator uses the
server’s command prompt.
Note
The person who runs a script must have Administrator privileges and enter a username and password
when the system prompts for these credentials.
The system copies the script file to a directory on the Headquarters and DVS servers when the system
administrator installs the server software.
By design, the backup and restore scripts support a server. Therefore, by default, the script backs up
and restores only the server on which the script exists. However, with the correct configuration, the
script can also back up and restore any voicemail switch or service appliance in the network.
Furthermore, the system can use a batch file to initiate system-wide backup or restore. A Mitel
installation includes default batch files in the folder that contains the backup and restore scripts.
System administrators can use programs such as Microsoft Scheduler to configure automatic
backups.
Table 199 shows the files that the system can back up.
\Shoreline Data\CrashDumps
\Shoreline Data\data
\Shoreline Data\Database
\Shoreline Data\IMAAData
\Shoreline Data\IMArchives
\Shoreline Data\keystore
\Shoreline Data\Logs
\Shoreline Data\MCM
\Shoreline Data\MessageFiles
\Shoreline Data\Prompts
\Shoreline Data\Scripts
\Shoreline Data\SoftSwitch
\Shoreline Data\Temp
\Shoreline Data\Templates
\Shoreline Data\UserData
\Shoreline Data\Vms
\Shoreline Data\wss
The following two system loads illustrate approximate times for a Mitel backup:
Clean System—no voicemail or Call Data Records (CDRs) and no service appliance
Total – 379 secs
VM – 2 secs
CDR– 35 secs
Loaded System (VM: 100 messages/13.5 MB; CDR: 500,000 calls)
Total – 508 secs
Backup VM – 21 secs
Backup CDR – 104 secs
Clean System
Total – 416 secs
VM – 3 secs
CDR – 32 secs
Loaded System (VM: 100 messages/13.5 MB – CDR for 500,000 calls)
Total – 525 secs
VM – 22 secs
CDR – 98 secs
Note
While running Anti-virus scan, if you perform a backup on Configuration (shoreware) or CDR
(shorewarecdr) database, the backup process fails.
Backup Strategy
Before a server backup begins, server activity must be stopped prior to prevent file corruption. We
provide the procedures for stopping server activity before a backup and restarting the server after the
backup is complete. We recommend system backup during scheduled down times or periods of low
activity.
Note
Care should be taken to avoid backups during nightly server voicemail maintenance, since stopping
the services could interfere with the maintenance. The default time for this is 2:00 AM.
When backing up an entire system, we recommend starting with the DVSs (if present) and backing up
the Headquarters server last. You can back up multiple DVSs simultaneously. After DVS backup is
complete, the system administrator can back up the files on the Headquarters server. This sequence
allows the Headquarters server to operate while other servers are unavailable.
Restoration
The Mitel restore scripts perform all necessary tasks to restore the Headquarters server, DVSs,
voicemail switches, and service appliances. The scripts can do either a complete restore or a selective
restoration of specific files.
Operations and files saved on a server after the backup was created are lost when the files are
restored to the server. When restoring a Headquarters server, all files on distributed servers that do not
require restoring remain intact; however, voicemail received for mailboxes created since the backup
was created may be lost regardless of the server upon which they reside.
During file restoration, the server must have no activity. The Mitel restore scripts stop the server before
restoring the files and restarts the server after the restoration is complete. Restored files must come
from the same folder where the backup operation stored them.
For restoring an entire system, Mitel recommends first restoring the headquarters server. Doing so
establishes a functioning system. After the headquarters server restore, restore distributed servers
while the headquarters server is active. This sequence minimizes the down time of the headquarters
server. Restart DVS after restoring Headquarters database.
Files can only be restored to the server from which they were backed up. Backup files from the
headquarters server can restore only the headquarters server. For systems with more than one
distributed server, backup files are not interchangeable between the servers.
In the script, type the path to the folder that is the destination of the backup. For a restore
operation, this same path points to the folder as a source.
Letter of the disk drive where the script file resides (if different from the C drive).
Type path to the script file on the Headquarters server or DVS—if the path is different from the
default path that we provide.
Type the path on the server where the PLINK and PSCP functions reside—if the path is different
from the default).
Note
The default folder path for 32-bit and 64-bit applications differs as follows:
For a DVS:
4. On the line “Window.Install.Drive – ”, type the letter of the drive that has the Windows
operating system. The default drive is C:.
5. In the Back Options section, specify where to create the backup files:
a. On the line “Backup.Drive – ”, type the path for the volume to which the Mitel Connect
system backs up the files.
b. On the line “ShoreWare.Drive – ”, type the letter of the drive on which the Mitel Connect
system files go. The default value is C.
c. On the line “Backup.Root.Directory – ” type the path that you want to use for backing
the files up. The default path is:
\ShorewareBackup\Backup
d. On the line “Backup.Shoreware.Directory – ” type the name of the file to which the
system backs up the files. The default name is: \Shoreline Data.
6. In the Shoreware File Location section, specify the location of the Mitel files on the current server.
The Headquarters server and DVSs have different default paths.
C:\ProgramFiles(x86)\ShorelineCommunications\ShoreWare Server\Scripts
C:\ProgramFiles(x86)\ShorelineCommunications\ShoreWare Remote
Server\Scripts
7. On the line “VMB.ip.list – ”, type the IP addresses of the voicemail switches that this server
backs up. Type a comma (,) between the addresses.
8. On the line “UCB.ip.list – ”, type the IP addresses of the service appliances that this server is
backing up. Separate each address with a comma.
9. For the plink command: on the line “PLINK.CMD – ”, type the path to the plink command. The
default path is (keep in mind the difference between the servers and the operating systems):
On a Headquarters server:
C:\ProgramFiles(x86)\Shoreline Communications\
ShoreWare Server\Scripts\Sample_Backup_Restore\plink
On a DVS:
C:\ProgramFiles (x86)\Shoreline Communications\
ShoreWare Remote Server\Scripts\Sample_Backup_Restore\plink
10. For the pscp command: on the line: “PSCP.CMD – ”, type the path to the pscp command. The
default path is (keep in mind the 64-bit and 32-bit OSs):
On a Headquarters server:
C:\Program Files(x86)\Shoreline Communications\
ShoreWare Server\Scripts\Sample_Backup_Restore\pscp
On a DVS:
C:\Program Files(x86)\Shoreline Communications\
ShoreWare Remote Server\Scripts\Sample_Backup_Restore\pscp
In the context of backup or restore, Voice Switches and Service Appliances are remote devices. These
devices are remote from the standpoint of the Headquarters server or a DVS. On the Headquarters
server or a DVS, the system administrator initiates the backup or restore operation for a voicemail
switch or a service appliance.
To perform backup or restore, an SSH connection must exist between the server and the remote
device. The PuTTY commands plink and pscp provide the access to remote devices. These
commands use RSA keys for validation.
1. Open a command prompt window on the server that initiates the backup and restore for the
voicemail switch or service appliance.
On a Headquarters server:
C:\Program Files (x86)\Shoreline Communications\ShoreWare Server\
Scripts\Sample_Backup_Restore
On a DVS:
C:\Program Files (x86)\Shoreline Communications\ShoreWare Remote
Server\Scripts\Sample_Backup_Restore
4. Press Enter. The system response includes the storage status of the RSA key in the registry on
the server. Figure 25 illustrates the response if the key is not present. It states “The server's host
key is not cached in the registry.”
Figure 25: Caching the Registry Key by Using the plink Command
5. If the key is not cached to the registry, press y at the prompt (“Store key in cache? (y/n)”).
6. Repeat Step 3 through Step 5 for each remote device for which this server is to initiate backup and
restore operations.
7. When the commands are run through plink, bashrc must be sourced manually.
For example, command to check service status on the UCB (/shoretel/bin/svccli getsvcstatus):
Note
Server activity must stop before file backup to prevent file corruption. The processes from Mitel stop
the server before the backup and restarts the server after the backup finishes. Mitel recommends
backing up files during scheduled down times or periods of light activity.
2. Navigate to the directory where the Mitel backup and restore script resides. The default path is:
4. To ensure the backup completed correctly, check that the backup files were created in the location
specified in the .ini file.
2. Navigate to the directory where the Mitel backup and restore script resides. The default path is:
cscript.exe shoreware_backup.wsf x y
where x is the component type to back up, and y is the file type. For the definitions of possible x
and y values and their combinations, see Table 200 on page 663. For example, if x equals ucb,
then y must be all: cscript.exe shoreware_backup.wsf ucb all
4. Click Enter.
When backing up the Headquarters server or a DVS, a notification appears when the backup is
complete.
When backing up a voicemail switch or service appliance, the status for the backup is displayed on
the command line.
5. To ensure the backup completed correctly, check that the backup files were created in the location
specified in the .ini file.
You can configure these backup tasks to run on demand or to run automatically.
2. Right-click the task you want to configure runtime for, and then select Properties.
The backups are stored in <install_dir>\Shoreware Backup. The Backup, Backup1, and Backup2
folders are created to store the information and are rotated each time the backup runs. The backup
process also includes the MySQL folder, which stores database information for each run.
If the backup does not complete, refer to the log files for details. The log files are stored in
c$\Windows\OEM\shoretel\scripts hqbackup.log and sqlbackup.log.
To safely preserve backed up data, copy completed backups to a fault tolerant location.
Tip
Periodically check the amount of free disk space on the UC30 to ensure that backed up data is not
consuming too much space.
Note
To prevent the system from corrupting files during the backup, server activity must stop before the
backup begins. The processes that Mitel provides stop the server before the backup and restarts the
server after the backup finishes.
2. Navigate to the following directory where the Mitel backup and restore script resides.
4. To ensure the backup completed correctly, check that the backup files were created in the location
specified in the .ini file.
2. Navigate to the following directory where the Mitel backup and restore script resides.
where y is the file type. See Table 200 on page 663 for the possible values of y (when x is dvm).
4. To ensure the backup completed correctly, check that the backup files were created in the location
specified in the .ini file.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. Click the name of the Linux DVS to configure in the list pane.
The General tab in the details pane displays parameters for the selected Linux server.
5. Under Enable daily backup, in the Start time field, type the time of day to start the daily backup.
6. In the IP address field, type the IP address of the FTP server to save the backup files to.
7. In the FTP port field, type the port number that the Linux DVS uses to communicate with the
recipient FTP server.
8. In the Directory field, type the name of the folder on the FTP server to which you want to back the
Linux DVS files up.
9. In the Username field, type the user name that the Linux server uses to access the backup files on
the FTP server.
10. In the first Password field, type the password that the Linux server uses to access the backup files
on the FTP server.
11. In the second Password field, retype the password that you entered into the first field.
Note
To restore a configuration, refer to Backing Up Voice Mail Switches on page 670.
On Demand Backup
To perform on demand back up of the Connect Edge Gateway configuration:
3. Click the Name of the Edge Gateway from the list pane to launch the Connect Edge Gateway
administration portal.
Table 201 includes a list of on demand parameters for the Connect Edge Gateway.
Note
The FTP or TFTP server must be running for the backup to succeed.
WARNING!
/var/tmp” should not be used in the local host machine for backups. This is a temporary folder and the
file is susceptible to being deleted. Use an external host to complete the backup.
5. Select Backup.
The Connect Edge Gateway displays a status prompt indicating the backup is in progress. If the
backup is successful, the “Backup Succeeded” message displays. If the backup fails, the “Backup
failed. See server log” message displays.
Scheduled Backup
To schedule a back up of the Connect Edge Gateway configuration:
3. Click the Name of the Edge Gateway from the list pane to launch the Connect Edge Gateway
administration portal.
4. Select Maintenance > System > Scheduled Backup. The Schedules tab displays any previous
scheduled backup yet to be performed. The History tabs displays previously performed backups.
Table 202 includes a list of scheduled backup parameters for the Connect Edge Gateway.
Weekly: Select the Day of the week and the Hour in 24 hour
increments.
Note
The FTP or TFTP server must be running for the backup to succeed.
WARNING!
/var/tmp” should not be used in the local host machine for backups. This is a temporary folder and the
file is susceptible to being deleted. Use an external host to complete the backup.
3. Click the Name of the Edge Gateway from the list pane to launch the Connect Edge Gateway
administration portal.
Table 203 includes a list of restore parameters for the Connect Edge Gateway.
Note
The FTP or TFTP server must be running for the backup to succeed.
WARNING!
/var/tmp” should not be used in the local host machine for backups. This is a temporary folder and the
file is susceptible to being deleted. Use an external host to complete the backup.
6. Select Restore. If the restore is successful, the “Configuration is restored. You need to restart your
browser.” message displays. If the restore fails, the “Restore failed. See server log” message
displays.
8. Log in to the Connect Edge Gateway admin portal by entering the Admin login and password.
Default gateway
Domain name
3. Click the Name of the Edge Gateway from the list pane to launch the Connect Edge Gateway
administration portal.
5. Click Revert.
6. Click OK to confirm setting the Connect Edge Gateway to the factory-default configuration. You
are logged out.
7. Exit and restart the Web browser. Log in as administrator in to the Connect Edge Gateway admin
portal by entering the Admin login and password.
Requirements
Headquarters server or DVS to implement the backup.
1. Access the command prompt on the server that is configured to backup to the voice mail switches.
2. Navigate to the following directory where the Mitel backup and restore script resides.
4. To ensure the backup completed correctly, check that the backup files were created in the location
specified in the .ini file.
sw_backup_restore.ini file on the server that initiates the backup (a file that contains the IP
address of the service appliances to back up)
Capability of the server to establish an SSH connection with each service appliance
1. Open a command prompt on the server that backs up the service appliances.
2. Navigate to the following directory where the Mitel backup and restore script resides.
Note
Running the hq_backup_all batch file also calls the command in Step 3. For details about using
a batch file, see Using Batch Files on page 677.
4. To ensure the backup completed correctly, check that the backup files were created in the location
specified in the .ini file.
2. Navigate to the following directory where the Mitel backup and restore script resides.
A prompt appears notifying you that restoring will wipe out all existing data.
5. To ensure the backup completed correctly, check that the backup files were created in the location
specified in the .ini file.
2. Navigate to the appropriate directory where the Mitel backup and restore script resides.
cscript.exe shoreware_restore.wsf x y
where x is the component type to restore, and y is the file type. For the definitions of possible x
and y values and their combinations, see Table 204. For example, if x equals ucb, then y must be
all: cscript.exe shoreware_restore.wsf ucb all
4. Press Enter.
When backing up the Headquarters server or a DVS, a notification appears when the restore is
complete.
When backing up a voicemail switch or service appliance, the status for the restore is displayed on
the command line.
5. To ensure the backup completed correctly, check that the backup files were created in the location
specified in the .ini file.
2. Navigate to the directory where the Mitel backup and restore scripts are found. The default path is:
2. Navigate to the appropriate directory where the Mitel backup and restore script resides.
where y is the file type. See Table 204 on page 673 for the possible values of y (when x is dvm).
Creating an SSH or serial connection from the main server to the service appliance
Executing the restoreweb command on the command line interface (CLI) of the service
appliance.
Note
Backupweb and restoreweb are Services Manager CLI (SVCCLI) commands.
Library files
Public: /site/vlibrary
Private: /site/<user_id>/vlibrary
Recordings: /site/<user_id>/vmeetings/<rec_meeting_id>
During the restore, all services on the service appliance stop running.
The restore operation does not delete files that are in the file system and are not part of the last
backup.
Files that are created after the previous backup remain intact.
If a backed-up file on the system changes after the most recent backup, the restore operation
replaces the modified file with the backed-up version.
The restore process can appear to restore files that have been deleted since the previous backup.
However, these files are not accessible through the service appliance GUI because the system
does not maintain database links to deleted files. To retrieve these disconnected files (if
necessary), start an SSH session or serial connection to the appliance and retrieve them by using
the correct Linux command.
4. Entries are visible for the files that were not backed up before the device failure.
Although a restore job might accidentally restore deleted files, you cannot access them through the
Conferencing web interface because the Headquarters database does not link to them. However, you
can use Linux commands to log into the system and extract the deleted files.
Mitel supports backup of multiple service appliances to one machine. If multiple service appliances use
the same machine for backup, a unique backup destination directory must exist for each service
appliance. Although the backup or restore operation relies on command prompt commands, the
enable or disable and the configuration of a multi-device backup also depends on information in
Connect Director. Specifically, the location for the backed-up files is the destination directory in
Connect Director.
For a subsequent file restoration, the restore process copies files from the right directory to restore
each service appliance.
Note
If the network has more than one service appliance, back up or restore the database and all the
service appliances at the same time to avoid dead links.
1. Activate the SVC command prompt by entering one of the following commands at the Linux
prompt:
3. Wait for the restore to complete. The restore is complete when the restoreweb command returns
you to the svccli prompt ('>').
5. Figure 26 illustrates all of the steps for accessing a service appliance through SSH and then
running the restoreweb command.
Figure 26: The SVC Command Prompt with restoreweb Command Appliance
Headquarters
Distributed Voicemail
Service Appliances
hq_backup_all.bat
dvm_backup_all.bat
vmb_backup_all.bat
ucb_backup_all.bat
hq_restore_all.bat
dvm_restore_all.bat
vmb_restore_all.bat
ucb_restore_all.bat
2. Navigate to the directory where the script resides. The default path is:
3. At the prompt, enter the batch file to use for backup or restore.
When backing up the Headquarters server or a DVS, a notification appears when the backup is
complete.
When backing up a voicemail switch or service appliance, the status for the restore is displayed on
the command line.
Log Files
Log files display the commands that are performed during backup and restore operations at
SwBackupRestore.log. By default, Windows maintains three log files. The log files reside in the
same directory as the scripts.
Failover Support
To support high availability, Mitel provides failover at two points in the network:
Voice Switches
For the headquarters server, you can install a backup server that mirrors and monitors the primary
server. If the primary server fails, operations are immediately transferred to the back-up server with
minimal interruption of services. After the primary server is repaired, you must manually fail back the
secondary server to return operations to the primary server and return the backup server to its backup
role.
This section discusses failover at the server level. For more information about switch failover, see "" on
page 153.
To provide failover protection for servers, Mitel recommends that you use Double-Take. For a
description of how to implement Double-Take, refer to the Double-Take application note on the Mitel
website.
For switches, you set up the failover capability by either of the following methods:
Installing spare switches that can temporarily manage the phones upon switch failure. Spare
switches can reside on a network that is remote to the failed switch and its phones, but the level of
service might not equal the switches in the local network.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
The General tab in the details pane displays parameters for the Headquarters server.
4. In the Secondary IP address field, type the IP address of the server that you want to use for
failover.
5. Click Save.
To convert a system to single Headquarters Server mode, remove the address from the secondary IP
address field, then reboot the Headquarters server. If you are modifying the IP address of a DVM
server, then reboot the DVM.
When the primary and secondary servers reside in different subnets, the IP address for each server
must be static.
The DNS server that a Mitel Connect system accesses must associate the same server name to the
primary and secondary servers if:
The primary and secondary servers are configured with static IP addresses.
and
The Headquarters server supports the Connect client or clients on Citrix or Windows Terminal
servers.
Note
Mitel services cannot be running on the primary and secondary Headquarters servers at the same
time. However, the servers can be on the network at the same time.
Note
System failover and failback operations are only available if your system has been configured using
the third-party Double Take application to monitor both servers.
The administrator can initiate a failback operation to restore Headquarters server function to the
primary server, after ensuring the server is ready to be returned to service. After the failback is
complete, the system structure that existed before the failback operation is restored.
Failover and failback operations typically last 5 to 20 minutes. The times depends on the system
configuration. During these operations, no server services are available. The effects failover and
failback operation are resolved after the operations are complete and the secondary (for failover) or
primary (failback) server is functioning as the Headquarters server.
The effects of failover and failback operation on Connect client include the following:
Users whose configuration exists on the Headquarters server lose most connectivity capabilities.
The operations disrupt telephony and video but not IM connectivity.
Configuration changes (such as availability state, Find Me, and external assignment) are
unavailable.
Users logging into Connect client while the secondary server controls the system must specify the
IP Address of the secondary server.
Refer to the Mitel Connect Client User Guide for instructions on specifying the server IP address.
Failover and failback operation can affect voicemail in the following ways:
Sites that receive voicemail through the Headquarters server lose voicemail access.
Mailboxes lose access to any voicemail whose routing includes the Headquarters server.
Sites that receive voicemail from distributed servers retain voicemail access.
Failover and failback operation can affect other system components in the following ways:
License Compliance
After a failover operation transfers the Headquarters server control to the secondary server, license
status on the secondary server is non-compliant. To restore the system to compliance, reinstall all
licenses that were originally purchased for the secondary server.
License Compliance
After a failback operation transfers Headquarters server control to the primary server, license status on
the primary server is non-compliant. To restore the system to compliance, reenter the system key that
was originally purchased for the primary server.
The sections under the following sections describe how to restore normal operation after a failover
occurs:
Obtain a replacement switch that has the same capabilities as the failed switch.
Physically install the replacement switch on the same network as the old switch.
Assign the new switch an IP address.
Unplug the port connections (telephones, trunks) from the existing voice switch and plug them into
the new voice switch.
2. In the navigation pane, click Administration > Appliances/Servers > Platform Equipment.
3. In the list pane, select the voice switch that is being replaced.
The General tab in the details pane displays parameters for the switch.
In the IP address field, type the IP address (or Ethernet address) of the new switch that you
want to use to replace the original switch.
Click Find switches to search for and select the replacement switch.
5. Click Save.
3. In the list pane, select the check box for each IP phone that you want to move.
Note
You can select multiple phones to move at one time. The phones do not have to be registered to
the same switch.
4. In the Move to site drop-down list, select the site where the switch you want to move the phones
to is installed.
5. In the and switch drop-down list, select the switch to move the IP phones to.
6. Click Move.
Note
Calls that are currently in progress are dropped during the move.
Note
Make sure that zero (0) IP phones are connected to the spare switch before initiating the fail back.
The Phones column in the list pane should display 0/N where 0 is the number of phones currently
registered with the switch and N is the switch capacity.
The Performance tab in the details pane displays details for the switch.
The failback process starts. The process takes a few minutes to complete and includes rebooting
the spare switch. When the process is complete and successful, the spare switch returns to the
spare state.
22. Reporting
This chapter describes how you can generate Call Detail and Web Conference reports for the Mitel
network by using Connect Director.
The following topics are included to help you use the Reporting feature effectively:
Introduction
By using the Reporting feature, you can create and view reports about calls and web conferences in
your Mitel system.
In addition to viewing detailed call and web conference reports, you can also send call detail records
(CDRs) through the serial (COM) port on the server, or archive them locally in a database. To configure
these reporting options, see Configuring Reporting Options on page 734.
Note
The CDR data that is collected from different time zones is adjusted to the time zone of the
Headquarters server.
The Call Details page allows you to generate and view the following different types of call detail
reports:
Notes
1. The system can generate a maximum of five reports simultaneously. For example, you can
generate a report and start another report before the first report is complete.
2. The Reporting feature utilizes CPU resources that are required for system operation. To avoid
impacting or disrupting service, no more than two users should run reports at the same time. Mitel
recommends running reports during low CPU usage periods to avoid negatively impacting
system performance.
2. In the navigation pane, click Reporting > Reports > Call Details.
To enter a specific account code for which to generate the report, click Add and specify the
account code. Repeat this step if you want to add more account codes.
To generate a report for all account codes, proceed with the next step.
Specify the extensions for which you want to generate the report, as follows:
To enter a specific extension, click Add and specify that extension in both the Start of
range and End of range fields. Repeat this step if you want to add more extensions.
To enter a range of extensions, click Add and specify the lowest extension in the Start of
range field and the highest extension in the End of range field, or leave either field blank.
Repeat this step if you want to add more extension ranges.
6. In the Date range section, enter the start date and end date for the report period, or accept the
default values.
7. In the Time range section, enter the start time and end time for the report period, or accept the
default values. The parameters you can set for this report are described in Table 205.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
After the report is generated, you can print it, export it, or navigate it interactively, similar to compiled
reports. The fields in the Account Detail report are described in Table 206.
The second Start field indicates the start time as entered prior to generating the
report. If you selected No lower limit when generating this report, this field is
left blank. If you did not enter a specific value, this field displays the default start
time of 12:00 AM.
End The first End field indicates the end date as entered prior to generating the
report. If you selected No upper limit when generating this report, this field is
left blank. If you did not enter a specific date, this field displays the default date
(typically the date that you generated the report).
The second End field indicates the end time as entered prior to generating the
report. If you selected No upper limit when generating this report, this field is
left blank. If you did not enter a specific value, this field displays the default end
time of 11:59 PM.
Date The date the call was placed in MM/DD/YYYY format.
Time The time the call was placed in HH:MM:SS 12-hour format.
Dialed Number For outbound calls, this is the number that the user dialed. It is reported in full
canonical format (including country code). For inbound calls, this is the
destination of the call. If the call was a DID or DNIS call, this is the DID or DNIS
information for the number dialed. For other types of calls, this is the extension
where the call first terminates.
The information for this field is retrieved from the DialedNumber field of the Call
table record.
Calling Extension The extension number that placed the call.
Duration The duration of the call, which is recorded from the time that the call is answered
to the time it is terminated.
Total Calls The total number of calls made for the specified account code.
Average Duration The average duration of the calls made for the specified account code.
Total Duration The total duration of the calls made for the specified account code.
Grand Total The total number of calls made for all specified account codes.
2. In the navigation pane, click Reporting > Reports > Call Details.
To enter a specific account code for which to generate the report, click Add and specify the
account code. Repeat this step if you want to add more account codes.
To generate a report for all account codes, proceed with the next step.
Specify the extensions for which you want to generate the report, as follows:
To enter a specific extension, click Add and specify that extension in both the Start of
range and End of range fields. Repeat this step if you want to add more extensions.
To enter a range of extensions, click Add and specify the lowest extension in the Start of
range field and the highest extension in the End of range field, or leave either field blank.
Repeat this step if you want to add more extension ranges.
6. In the Date range section, enter the start date and end date for the report period, or accept the
default values.
7. In the Time range section, enter the start time and end time for the report period, or accept the
default values.
8. You can choose to select the Enable user breakdown to see the details of each user of the
account option to segregate the report for each user, or leave it with the default setting.
The parameters you can set for this report are described in Table 207.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
The report is generated and is displayed in a different browser tab.After the report is generated,
you can print it, export it, or navigate it interactively, similar to compiled reports. The fields in the
Account Summary Report are described in Table 208.
The first Start field indicates the start date as entered by you
while generating the report. If you had selected No lower limit,
this field is left blank.
The first End field indicates the end date as entered by you
while generating the report. If you had selected No upper limit,
this field is left blank. If you did not enter a specific date, this
field displays the date of generating the report.
The second End field specifies the end time as entered by you
while generating the report. If you had selected No upper limit,
this field is left blank. If you did not enter a specific value, this
field displays the default end time of 11:59:59 PM.
Total Calls The total number of calls made for the specified account code.
Total Duration The total duration of all calls made for the specified account
code.
Average Duration The average duration of all calls made for the specified account
code.
Total The sum of the number of calls made, total duration, and
average duration for the specified account code.
Grand Total The sum of the number of calls made, total duration, and
average duration for all specified account codes.
2. In the navigation pane, click Reporting > Reports > Call Details.
3. In the Report type drop-down list, select Trunk Activity Detail Report.
4. In the Date range section, enter the start date and end date for the report period, or accept the
default values.
5. In the Time range section, enter the start time and end time for the report period, or accept the
default values.
The parameters you can set for this report are described in Table 209.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
After the report is generated, you can print it, export it, or navigate it interactively, similar to compiled
reports. The fields in the Trunk Activity Detail Report are described in Table 210.
If you left selected the No lower limit option while generating this
report, this field does not display a date. The displayed start time is as
entered by you while generating the report. If you had selected the No
lower limit option while generating this report, this field is left blank. If
you did not enter a specific value, this field displays the default start
time of 12:00:00 AM.
Ending Date The end date and time as entered by you while generating the report.
If you had selected the No upper limit option while generating this
report, this field is left blank. If you did not enter a specific date, this field
displays the default date of generating the report (current date).
The date is extracted from the ConnectTime field in the Connect table
record.
Time The time that the trunk was added to the call.
The time is extracted from the ConnectTime field in the Connect table
record.
In/Out Trunk activity is considered to be In if the TrunkDirection field in the
Connect table record is set to 2 (Inbound). Otherwise, the trunk activity
is considered to be Out. When an external user calls the external
number of a service appliance, two records appear in the report, and
each record is listed as In.
For other types of calls, this is the extension where the call first
terminates. This information is retrieved from the PartyId field of the
Connect table record.
Calling # For inbound calls, this is the calling number—ANI or Caller ID—
received by the Mitel system and is reported as delivered by the PSTN
(may or may not include the 1 before the area code).For outbound calls,
this is the extension of the user who placed the call.
This information is retrieved from the Extension field in the Call table
record. For other types of calls, this information is retrieved from the
CallerID field in the Call table record.
User Name associated with the extension that was the initial target of the call.
For outbound calls, the user is the extension that first initiated the call.
For inbound calls, the user is the extension that was the initial target of
the call.
For an inbound call, the duration of the call begins when the trunk is
seized and includes the talk time and hold time. The duration ends
when the user hangs up or when the external party hangs up and
disconnect supervision is received by the Mitel system.
For an outbound call, the duration of the call begins when the trunk is
seized. The duration ends when the user hangs up, or when the
external party hangs up and disconnect supervision is received by the
Mitel system.
This information is retrieved from the Duration field of the Connect table
record.
Subtotal The total number of calls for a trunk.
Total The total number of calls for a trunk group.
Grand Total The total number of calls for all trunk groups.
Note
Inbound and outbound is relative to the call, and not to trunk usage.
2. In the navigation pane, click Reporting > Reports > Call Details.
3. In the Report type drop-down list, select Trunk Activity Summary Report.
4. In the Date range section, enter the start date and end date for the report period, or accept the
default values.
5. In the Time range section, enter the start time and end time for the report period, or accept the
default values.
The parameters you can set for this report are described in Table 211.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
After the report is generated, you can print it, export it, or navigate it interactively, similar to compiled
reports. The fields in the Trunk Activity Summary Report are described in Table 212.
If you had selected the No lower limit option for the date, the
date field is left blank.
If you had selected the No lower limit option for the time, the
time field is left blank. If you did not enter a specific value for
time, the time field displays the default start time of 12:00:00
AM.
Ending Date Indicates the end date and time as entered by you while
generating the report.
If you had selected the No upper limit option for the date, the
date field is left blank. If you did not enter a specific date, the
date field displays the date of generating the report.
If you had selected the No upper limit option for time, the time
field is left blank. If you did not enter a specific time, the time
field displays the default end time of 11:59:59 PM.
Trunk Group Name / Trunk Name of the trunk group and individual trunk being reported.
Name
The trunk group name is retrieved from the GroupName field,
and the trunk name is retrieved from the PortName field of the
Connect table record.
Duration is the sum of all the duration fields for the Connect
table records that indicate inbound trunk usage.
Duration is the sum of all the duration fields for the Connect
table records that indicate outbound trunk usage.
Duration
Average Duration
Total The total number of calls for a trunk group.
Grand Total The total number of calls for all trunk groups.
2. In the navigation pane, click Reporting > Reports > Call Details.
3. In the Report type drop-down list, select User Activity Detail Report.
Specify the extensions for which you want to generate the report, as follows:
To enter a specific extension, click Add and specify that extension in both the Start of
range and End of range fields. Repeat this step if you want to add more extensions.
To enter a range of extensions, click Add and specify the lowest extension in the Start of
range field and the highest extension in the End of range field, or leave either field blank.
Repeat this step if you want to add more extension ranges.
5. In the Date range section, enter the start date and end date for the report period, or accept the
default values.
6. In the Time range section, enter the start time and end time for the report period, or accept the
default values.
7. You can choose to select the Break report into 30 minute intervals option to segregate the user
activities into 30 minute intervals, or leave it unselected.
8. You can choose to select the Show internal calls option to have the report include all internal call
details.
The parameters you can set for this report are described in Table 213.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
Note
You can also select to include unanswered calls in the report (Unanswered calls are
displayed with a talk time of zero.) For information about including unanswered calls
in the report, see Reporting Options on page 772.
Conference calls that use a Mitel conferencing device have two entries in the User
Activity Detail report. The first entry shows the amount of time (duration) used to enter
a pass code or user prompt. The second entry shows the duration of the entire
conference call.
After the report is generated, you can print it, export it, or navigate it interactively, similar to compiled
reports. The fields in the User Activity Detail Report are described in Table 214.
If you had selected the No lower limit option for the date, the
date field is left blank.
End Date The end date as entered by you while generating the report.
If you had selected the No upper limit option for the date, the
date field is left blank. If you did not enter a specific date, the
date field displays the date of generating the report.
Start Time The start time as entered by you while generating the report.
If you had selected the No lower limit option for the time, the
time field is left blank. If you did not enter a specific value for
time, the time field displays the default start time of 12:00:00
AM.
End Time The end time as entered by you prior to generating the report.
If you had selected the No upper limit option for time, the time
field is left blank. If you did not enter a specific time, the time
field displays the default end time of 11:59:59 PM.
Show Internal Calls Indicates whether you selected to include internal calls in the
report. Values are either True (internal calls are included) or
False (internal calls are not included.
These details are retrieved come from the StartTime field in the
Call table record for the call being reported. When interval
reports are generated, the actual time that the call had started is
displayed, even if the call extends into another interval.
In/Out Indicates if the call is inbound/outbound/internal/external.
If the CallType field of the Call record for the call is 2 (Inbound),
In-Int is displayed for internal calls and In-Ext for external calls.
For inbound calls, this is the destination of the call. If the call
was a DID or DNIS call, this is the DID or DNIS information for
the number dialed. For other types of calls, this is the extension
where the call first terminates.
For outbound calls, this is the extension of the user that placed
the call. In the case of Outbound calls, this data is retrieved
from the PartyID field of the Connect record for the party that
initiated the call.
The report always displays external calls and can be configured to display internal Calls. External calls
are the calls where the CallType value in the Call table record has a value of 2 (Inbound) or 3
(Outbound).
2. In the navigation pane, click Reporting > Reports > Call Details.
3. In the Report type drop-down list, select User Activity Summary Report.
Specify the extensions for which you want to generate the report, as follows:
To enter a specific extension, click Add and specify that extension in both the Start of
range and End of range fields. Repeat this step if you want to add more extensions.
To enter a range of extensions, click Add and specify the lowest extension in the Start of
range field and the highest extension in the End of range field, or leave either field blank.
Repeat this step if you want to add more extension ranges.
5. In the Date range section, enter the start date and end date for the report period, or accept the
default values.
6. In the Time range section, enter the start time and end time for the report period, or accept the
default values.
7. You can choose to select the Break report into 30 minute intervals option to segregate the user
activities into 30 minute intervals, or leave it with the default setting.
8. You can choose to select the Show internal calls option to have the report include all internal call
details.
The parameters you can set for this report are described in Table 215.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
Note
You can also select to include unanswered calls in the report (Unanswered calls are displayed with a
talk time of zero.) For information about including unanswered calls in the report, see Configuring
Reporting Options on page 734.
After the report is generated, you can print it, export it, or navigate it interactively, similar to compiled
reports. The fields in the User Activity Summary Report are described in Table 216.
If you selected the No lower limit option for the date, the date
field is left blank.
End Date The end date as entered by you when generating the report.
If you selected the No upper limit option for the date, the date
field is left blank. If you did not enter a specific date, the date
field displays the date of generating the report.
If you selected the No lower limit option for the time, the time
field is left blank. If you did not enter a specific value for time,
the time field displays the default start time of 12:00:00 AM.
End Time The end time as entered by you when generating the report.
If you selected the No upper limit option for time, the time field
is left blank. If you did not enter a specific time, the time field
displays the default end time of 11:59:59 PM.
Show Internal Calls Indicates whether you selected to include internal calls in the
report. Values are either True (internal calls are included) or
False (internal calls are not included.
Name The name of the user who placed the call in the last Name, first
Name, (extension number) format is displayed.
Total Duration during any period is the sum of the duration for
the Inbound calls during the period. Average duration is found
by dividing the total duration by the number of calls during the
period.
Outbound All: Indicates the quantity, total duration, and average duration for
outbound calls during the reporting period.
Qty
Duration is calculated in the same manner as for Inbound calls.
Duration
Average Duration
Total All: Indicates the quantity, total duration, and average duration of all
calls during the reporting period.
Qty
Inbound and Outbound quantity and total duration are added
Duration and averaged.
Average Duration
Outbound Non-Local Trunk: Indicates the quantity, total duration, and average duration for
outbound non-local calls during the reporting period. The calls
Qty reported here, are a subset of the calls reported under
Duration Outbound all.
Average Duration Duration is calculated in the same manner as for Inbound calls.
Outbound WAN Trunk: Indicates the quantity, total duration, and average duration for
outbound non-local calls during the reporting period. A call is
Qty considered a WAN call if a media stream was established
Duration between 2 sites. The calls reported here, are a subset of the
calls reported under Outbound all.
Average Duration
Duration is calculated here in the same manner as for Inbound
calls.
Grand Total Indicates the total number of calls, total duration, and average
duration for all users.
2. In the navigation pane, click Reporting > Reports > Call Details.
3. In the Report type drop-down list, select User Activity Summary Report.
4. In the Date range section, enter the start date and end date for the report period, or accept the
default values.
5. In the Time range section, enter the start time and end time for the report period, or accept the
default values.
6. You can choose to view inter-site calls or all calls in the report by selecting the relevant option in
the drop-down list.
The parameters you can set for this report are described in Table 217.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
After the report is generated, you can print it, export it, or navigate it interactively, similar to
compiled. The fields in the WAN Media Stream Detail Report are described in Table 218.
If you had selected the No lower limit option for the date, the
date field is left blank. If you had selected the No lower limit
option for the time, the time field is left blank. If you did not enter
a specific value for time, the time field displays the default start
time of 12:00:00 AM.
Ending The end date and time as entered by you while generating the
report.
If you had selected the No upper limit option for the date, the
date field is left blank. If you did not enter a specific date, the
date field displays the date of generating the report.
If you had selected the No upper limit option for time, the time
field is left blank. If you did not enter a specific time, the time
field displays the default end time of 11:59:59 PM.
Site A The name of the site. This information is retrieved from the
ASiteName field in the Media Stream table.
Site B The name of the site that communicates with Site A. This
information is retrieved from the BSiteName field in the Media
Stream table.
Start Time The time stamp and the date that the media stream started in
MM/DD/YYYY HH:MM:SS 12-hour format. This information is
retrieved from the StartTime field in the Media Stream table.
WAN Indicates if the media stream accessed the WAN.
Table 218: WAN Media Stream Detail Report Field Descriptions (Continued)
Field Description
Call ID The call identification number for the listed media stream. By
matching the Call ID in the report to the Call ID of a WAN call
with voice quality issues, you can understand the cause of the
problems.
AAC_LC32000
ADPCM
ALAW)
BV16
BV32
CUSTOM
G722
G729A
G729B
LINEAR
LINEARWIDEBAND
MULAW
Max Jitter The maximum jitter encountered in milliseconds. This value is
the maximum of the A MaxJitter or B MaxJitter for the
corresponding record in the Media Stream table.
The report lists a matrix of all sites and the links to other sites on the system and summarizes media
streams (not calls) between the two sites. Media streams can be for extensions or trunks. Calls can be
quite complex involving multiple parties, including users, voice mail, and auto-attendant. Each media
stream that is reported includes the associated Call ID (Call Identification) that can be correlated to the
parties on the call for troubleshooting purposes using the CDR database.
You can configure the report to display information for all calls or for only inter-site calls. IP phone
media streams are not included in this report.
2. In the navigation pane, click Reporting > Reports > Call Details.
3. In the Report type drop-down list, select WAN Media Stream Summary Report.
4. In the Date range section, enter the start date and end date for the report period, or accept the
default values.
5. In the Time range section, enter the start time and end time for the report period, or accept the
default values.
6. You can choose to view inter-site calls or all calls in the report by selecting the relevant option in
the drop-down list.
The parameters you can set for this report are described inTable 219.
Table 219: WAN Media Stream Summary Report Parameter Descriptions (Continued)
Parameter Description
Time range: Start and end time (in 24-hour format) to define the time period
for each day that you want the report generated.
Time start
If you do not want to specify a start time, you can leave it as is
Time end (00:00) or select the No lower limit check box. If you do not
want to specify an end time, you can leave it as is (23:59) or
select the No upper limit check box.
Select the type of calls you Indicates the type of calls you want to generate a report on. You
want to report on can select Intersite to report only calls made between the sites.
You can select All calls to report all calls made over the WAN.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
After the report is generated, you can print it, export it, or navigate it interactively, similar to compiled
reports. The fields in the WAN Media Stream Summary Report are described in Table 220.
If you had selected the No lower limit option for the date, the
date field is left blank. If you had selected the No lower limit
option for the time, the time field is left blank. If you did not enter
a specific value for time, the time field displays the default start
time of 12:00:00 AM.
Ending The end date and time as entered by you while generating the
report.
If you had selected the No upper limit option for the date, the
date field is left blank. If you did not enter a specific date, the
date field displays the date of generating the report.
If you had selected the No upper limit option for time, the time
field is left blank. If you did not enter a specific time, the time
field displays the default end time of 11:59:59 PM.
Table 220: WAN Media Stream Summary Report Field Descriptions (Continued)
Field Description
Site A The name of the site. This information is retrieved from the
ASiteName field in the Media Stream table.
Site B The name of the site that communicates with Site A. This
information is retrieved from the BSiteName field in the Media
Stream table.
Quality: The quality of the media streams between the sites in terms of
the maximum and average jitter, percentage of packets lost,
Avg Jitter (ms) and number of blocked calls.
Max Jitter (ms) The average of the maximum per-media stream jitter between
% Packets Lost the sites in milliseconds. This information is retrieved from the A
MaxJitter and B MaxJitter fields in the Media Stream table.
Blocked Calls
The maximum jitter encountered on any media stream between
the sites in milliseconds. This information is retrieved from the A
MaxJitter and B MaxJitter fields in the Media Stream table. The
jitter buffer should be larger than this value for proper operation.
The number of packets that did not reach the destination and
were probably dropped while traversing the network.
The number of calls that were not routed across the WAN due
to insufficient WAN bandwidth (admission control reached).
This could indicate that more WAN bandwidth is required.
The duration of all the media streams used between the two
sites. The value is the sum of duration for all records between
the two sites in the Media Stream table.
This report includes calls routed to workgroup agents by the workgroup server, and non-workgroup
calls (both inbound and outbound). The report assigns non-workgroup calls to an agent's membership
within a workgroup by examining the workgroup the agent was logged into during or before the call.
Non-workgroup calls made while an agent is logged out are not reported.
Workgroup agents can be a member of more than one workgroup. When they log in, their login time is
reported for all workgroups of which they are a member. Non-workgroup calls are reported for the
workgroup with the lowest dial number that the agent is a member of when the call is made. For
example, if the agent is a member of workgroups with dial numbers of 1100, 1200, and 1250, non-
workgroup calls are reported against 1100.
2. In the navigation pane, click Reporting > Reports > Call Details.
3. In the Report type drop-down list, select Workgroup Agent Detail Report.
Specify the workgroup extensions for which you want to generate the report, as follows:
To enter a specific extension, click Add and specify that extension in both the Start of
range and End of range fields. Repeat this step if you want to add more extensions.
To enter a range of extensions, click Add and specify the lowest extension in the Start of
range field and the highest extension in the End of range field, or leave either field blank.
Repeat this step if you want to add more extension ranges.
To generate a report for all workgroup extensions, proceed with Steps 5 to 11.
Specify the agent extensions for which you want to generate the report, as follows:
To enter a specific extension, click Add and specify that extension in both the Start of
range and End of range fields. Repeat this step if you want to add more extensions.
To enter a range of extensions, click Add and specify the lowest extension in the Start of
range field and the highest extension in the End of range field, or leave either field blank.
Repeat this step if you want to add more extension ranges.
To generate a report for all agent extensions, proceed with Steps 6 to 11.
6. In the date range section, enter the start date and end date for the report period, or accept the
default values.
7. In the time range section, enter the start time and end time for the report period, or accept the
default values.
8. You can choose to select the Break report into 30 minute intervals option to segregate the user
activities into 30 minute intervals in the report, or leave it with the default setting.
9. You can choose to select the Show internal calls option to include all internal call details in the
report, or leave it unselected.
10. You can choose to select the Show outbound calls option to include all outbound call details in
the report, or leave it unselected.
The parameters you can set for this report are described in Table 221.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
After the report is generated, you can print it, export it, or navigate it interactively, similar to compiled
reports. The fields in the Workgroup Agent Detail Report are described in Table 222.
The second Start field indicates the start time as entered prior
to generating the report. If you selected No lower limit when
generating this report, this field is left blank. If you did not enter
a specific value, this field displays the default start time of 12:00
AM.
End The first End field indicates the end date as entered prior to
generating the report. If you selected No upper limit when
generating this report, this field is left blank. If you did not enter
a specific date, this field displays the default date (typically the
date that you generated the report).
The second End field indicates the end time as entered prior to
generating the report. If you selected No upper limit when
generating this report, this field is left blank. If you did not enter
a specific value, this field displays the default end time of 11:59
PM.
Workgroup Workgroup name with extension for which you generated the
report.
Agent Name of the workgroup agent with extension number.
Date/Time The date and time for the call being reported. The date is
displayed in MM/DD/YYYY format. The time is displayed in
HH:MM:SS 12-hour format.
When interval reports are generated, the call is reported for the
time when it starts even if it extends into another interval.
The user was not the originator of the call, which is indicated
by the ConnectReason field in the Connect table not being
equal to 19
Note: For all calls, calls with CallType value of 1 (internal) are
included only if the option to include internal calls is chosen.
Duration defined the time period that the user was on the
call.This information is collected by adding the TalkTime and
HoldTime fields in the Connect record for the call.
This value is generally lesser than the total time the call spends
within the Mitel system. The period between the moment the
trunk was seized and the call was accepted by the workgroup,
or any time the call spends with a menu or other extension, is
not reflected.
Sub Total The total number of calls for a workgroup agent.
Total The total number of calls for all agents in a workgroup.
Grand Total The total number of calls for all agents in the system.
The report includes calls routed to workgroup agents by the workgroup server, and non-workgroup
calls (both inbound and outbound). Workgroup agents can be a member of more than one workgroup.
When they log in, their login time is reported for all workgroups of which they are a member. Non-
workgroup calls are reported against the workgroup with the lowest dial number that the agent is a
member of when the call is made. For example, if the agent is a member of workgroups with dial
numbers of 1100, 1200, and 1250, non-workgroup calls are reported against 1100.
The report assigns non-workgroup calls to an agent's membership within a workgroup by examining
the workgroup the agent was logged into during or before the call. No calls are reported when an agent
is logged out.
While the summary report displays agent activity, which consists of agent wrap-up and login time, the
report displays this information only for periods that had a call for the agent (workgroup or non-
workgroup).
2. In the navigation pane, click Reporting > Reports > Call Details.
3. In the Report type drop-down list, select Workgroup Agent Summary Report.
Specify the workgroup extensions for which you want to generate the report, as follows:
To enter a specific extension, click Add and specify that extension in both the Start of
range and End of range fields. Repeat this step if you want to add more extensions.
To enter a range of extensions, click Add and specify the lowest extension in the Start of
range field and the highest extension in the End of range field, or leave either field blank.
Repeat this step if you want to add more extension ranges.
To generate a report for all workgroup extensions, proceed with the next step.
Specify the agent extensions for which you want to generate the report, as follows:
To enter a specific extension, click Add and specify that extension in both the Start of
range and End of range fields. Repeat this step if you want to add more extensions.
To enter a range of extensions, click Add and specify the lowest extension in the Start of
range field and the highest extension in the End of range field, or leave either field blank.
Repeat this step if you want to add more extension ranges.
To generate a report for all agent extensions, proceed with Steps 6 to 10.
6. In the Date range section, enter the start date and end date for the report period, or accept the
default values.
7. In the Time range section, enter the start time and end time for the report period, or accept the
default values.
8. You can choose to select the Show internal calls option to include all internal call details in the
report, or leave it with the default setting.
9. You can choose to select the Show outbound calls option to include all outbound call details in
the report, or leave it with the default setting.
The parameters you can set for this report are described in Table 223.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
After the report is generated, you can print it, export it, or navigate it interactively, similar to compiled
reports. The fields in the Workgroup Agent Summary Report are described in Table 224.
If you had selected the No lower limit option for the date, the
date field is left blank.
End Date Indicates the end date as entered by you while generating the
report.
If you had selected the No upper limit option for the date, the
date field is left blank. If you did not enter a specific date, the
date field displays the date of generating the report.
Start Time Indicates the start time as entered by you while generating the
report.
If you had selected the No lower limit option for the time, the
time field is left blank. If you did not enter a specific value for
time, the time field displays the default start time of 12:00 AM.
End Time Indicates the end time as entered by you while generating the
report.
If you had selected the No upper limit option for time, the time
field is left blank. If you did not enter a specific time, the time
field displays the default end time of 11:59 PM.
Duration format Indicates the format used while displaying the duration.
Workgroup Workgroup name and extension for which you generated the
report.
Agent Name of the workgroup agent with extension number.
Total Calls: The quantity, total duration, and average duration of all calls
during the reporting period. Total calls are the sum of all
Qty inbound, outbound and other calls.
Duration Average duration is calculated by dividing total duration by the
Average Duration reported quantity.
Agent Activity: Agent action time during the reporting period in terms of total
wrapup time, average wrapup time, and total login time.
Total Wrapup
The total login time is the period for which an agent was logged
Average Wrapup in as a workgroup agent and had received at least one active
Total Login call.
When a workgroup server processes a call, a record about the call status is added to the Queue Call
table. In most cases the call is recorded just once, but if forwarded, a call can be recorded twice. When
a call comes in it is processed by the server where it is routed to an agent. The caller then chooses to
go to voice mail or another destination, or hangs up (abandons the call) before it is routed beyond the
workgroup. Since the report shows how the call was disposed of by the workgroup server, the call is
reported once in the report. However, if the call is forwarded, the same call can pass through the
workgroup server more than once. For example, a call goes to a workgroup server. While on the call,
the user transfers it to another extension. The user extension availability state forwards the call to the
same or a different workgroup. In this case, the call passes through the workgroup server more than
once and is reported each time the workgroup server processes the call. For each time the workgroup
server processes the call, a record is added to the Queue Call table.
External calls to a workgroup are always included in the report. Internal workgroup calls are only
included in the report if the option to include them is enabled. (The default setting is to not include
them.)
If the workgroup service is not operational, the call is not processed by the workgroup server (it simply
goes to the backup extension) and not included in the report. When this occurs, there is no record of
the call in the Queue Call table, since records are only added to that table when the workgroup server
processes the call.
2. In the navigation pane, click Reporting > Reports > Call Details.
3. In the Report type drop-down list, select Workgroup Queue Summary Report.
Specify the extensions for which you want to generate the report, as follows:
To enter a specific extension, click Add and specify that extension in both the Start of
range and End of range fields. Repeat this step if you want to add more extensions.
To enter a range of extensions, click Add and specify the lowest extension in the Start of
range field and the highest extension in the End of range field, or leave either field blank.
Repeat this step if you want to add more extension ranges.
5. In the date range section, enter the start date and end date for the report period, or accept the
default values.
6. In the time range section, enter the start time and end time for the report period, or accept the
default values.
7. You can choose to select the Break report into 30 minute intervals option to segregate user
activities into 30 minute intervals in the report, or leave it unselected.
8. You can choose to select the Show internal calls option to include all internal call details in the
report, or leave it unselected.
The parameters you can set for this report are described in Table 225.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
After the report is generated, you can print it, export it, or navigate it interactively, similar to compiled
reports. The fields in the Workgroup Queue Summary Report Field Report are described in Table 226.
If you had selected the No lower limit option for the date, the
date field is left blank.
End Date The end date as entered by you prior to generating the report.
If you had selected the No upper limit option for the date, the
date field is left blank. If you did not enter a specific date, the
date field displays the date of generating the report.
Start Time The start time as entered by you prior to generating the report.
If you had selected the No lower limit option for the time, the
time field is left blank. If you did not enter a specific value for
time, the time field displays the default start time of 12:00:00
AM.
End Time The end time as entered by you prior to generating the report.
If you had selected the No upper limit option for time, the time
field is left blank. If you did not enter a specific time, the time
field displays the default end time of 11:59:59 PM.
Abandoned Calls abandoned for the workgroup. The numbers indicate
callers who hung up or disconnected while waiting in queue.
Handled by Agent The number of calls that were answered by agents in the
workgroup.
Handled by WG Voice Mail Number of calls that went to the workgroup voice mail (either as
a result of call routing or when the caller chose to transfer to
voice mail).
Queue Transfer Number of calls transferred by Workgroup agents.
Queue Overflow / Interflow Number of automatic call transfers, based on caller wait time to
a dial-able number (interflow), or to another Workgroup queue
(overflow).
Handled by Others Number of calls handled by others (not workgroup agents or
voice mail).
Note: The average time could be zero even though there were
handled calls in the case of the call being forwarded
immediately to voice mail.
Total Calls All calls processed by the workgroup. This includes calls that go
straight to agents without waiting in queue.
Abandoned
Handled by Agent
Handled by Voice Mail
Handled by Others
The report always includes external calls to a workgroup. Internal workgroup calls are included in the
report only if the option to include them is selected (the default is not included).
If the workgroup service is not operational, the call is not processed by the workgroup server (it simply
goes to the backup extension) and is not included in this report. When this occurs, there is no record of
the call in the Queue Call table since records are only added to the table when the workgroup server
processes the call.
2. In the navigation pane, click Reporting > Reports > Call Details.
3. In the Report type drop-down list, select Workgroup Service Level Summary Report.
Specify the extensions for which you want to generate the report, as follows:
To enter a specific extension, click Add and specify that extension in both the Start of
range and End of range fields. Repeat this step if you want to add more extensions.
To enter a range of extensions, click Add and specify the lowest extension in the Start of
range field and the highest extension in the End of range field, or leave either field blank.
Repeat this step if you want to add more extension ranges.
To generate a report for all workgroup extensions, proceed with the next step.
5. In the Date range section, enter the start date and end date for the report period, or accept the
default values.
6. In the Time range section, enter the start time and end time for the report period, or accept the
default values.
7. You can choose to select the Break report into 30 minute intervals option to segregate user
activities into 30 minute intervals in the report, or leave it with the default setting.
8. You can choose to select the Show internal calls option to include all internal call details in the
report, or leave it with the default setting.
The parameters you can set for this report are described in Table 227.
Table 227: Workgroup Service Level Summary Report Parameter Descriptions (Continued)
Parameter Description
Time range: Start and end time (in 24-hour format) to define the time period
for each day that you want the report generated.
Time start
If you do not want to specify a start time, you can leave it as is
Time end (00:00) or select the No lower limit check box. If you do not
want to specify an end time, you can leave it as is (23:59) or
select the No upper limit check box.
Maximum wait time Select the maximum time that the workgroup server can take
before processing the call in its queue.
Note
When you specify a start time and an end time, the report is generated between the specified
range for each day. For example, if the start time is 10:00 (10:00 AM) and the end time is 22:00
(10:00 PM), the report is generated only for this period every day. If you want the reports
generated for the entire day, every day, then use the default start time of 00:00 (12:00 AM) and the
default end time of 23:59 (11:59 PM).
After the report is generated, you can print it, export it, or navigate it interactively, similar to compiled
reports. The fields in the Workgroup Service Level Summary Report are described in Table 228.
If you had selected the No lower limit option for the date, the
date field is left blank.
End Date The end date as entered by you prior to generating the report.
If you had selected the No upper limit option for the date, the
date field is left blank. If you did not enter a specific date, the
date field displays the date of generating the report.
Table 228: Workgroup Service Level Summary Report Field Descriptions (Continued)
Field Description
Start Time The start time as entered by you prior to generating the report.
If you had selected the No lower limit option for the time, the
time field is left blank. If you did not enter a specific value for
time, the time field displays the default start time of 12:00:00
AM.
End Time The end time as entered by you prior to generating the report.
If you had selected the No upper limit option for time, the time
field is left blank. If you did not enter a specific time, the time
field displays the default end time of 11:59:59 PM.
Max. Wait Time The maximum time that the workgroup server can take before
processing the call in its queue.
Workgroup Workgroup name and extension for which you generated the
report.
Date Date in Month DD, YYYY format when the call was processed
by the workgroup server.
Wait Time Range of wait-for-service time in seconds for the workgroup for
processing a call in its queue.
The duration is recorded from the time that the call is offered to
the workgroup server until it leaves the call queue.
Abandoned Number of callers who abandoned the call (hung up) during the
period.
Handled by Agent Number of calls handled by agents during the period.
Table 228: Workgroup Service Level Summary Report Field Descriptions (Continued)
Field Description
Handled by Others Number of calls handled by others (neither workgroup agents
nor voice mail).
Abandoned
Handled by Agent
Handled by Voice Mail
Picked Up from the Queue
Unparked from the Queue
Handled by Others for the period.
2. In the navigation pane, click Reporting > Reports > Web Conference.
3. Click the appliance for which you want to generate the reports.
The Web Conference Reports page is displayed. You can view the Concurrent Web Port Usage
Report on this page, in addition to the Web Conference Report.
Click Concurrent ports, specify the following options, and click Go to view the Concurrent
Web Port Usage Report:
From the Time zone drop-down menu, select the time zone in which you want the
report generated.
From the Show drop-down menu, select the reporting period.
Select the appliance, for which you want the report generated.
The resulting report is displayed on the screen.You can click Download to download the
report in a CSV file format to your local drive.
Click Conference sessions, specify the following options, and click Go to view the Web
Conference Report:
On the Time zone drop-down menu, select the time zone in which you want the report
generated.
On the Show conference sessions for drop-down menu, select the reporting period.
Select the appliance, for which you want the report generated.
In the Access Code field, enter the access code you want to report on, and click
Search to view and select the required code. If you leave this field blank, the report is
generated for all access codes.
The resulting report is displayed on the screen. You can click Download to download the
report in a CSV file format to your local drive.
The fields in the Web Conference Reports are described in Table 229.
Sending Call Detail Reports / Call Data Records (CDRs) through the serial (COM) port of the
server: The Mitel system supports the ability to send CDR data out of a serial port on the main
server. The Reporting Options page allows you to designate the COM port to be enabled. CDR
data is subsequently sent out this port, in addition to being sent to the regular text file and/or a
database. Sending the CDR data out the serial port does not alter the formatting of the data.
The parameters you can configure to enable these options are described in Table 230.
Table 231:
Parameter Definition
Enable CDR archiving Enables the creation of an archive database for CDR data.
Retention period for CDR archive The period for which you want the CDR archive retained in
the database. You can select a value from 1 to 2000 days.
The default value is 125 days.
Archive database name The name of the archive database.
Note: Saving the name of the database does not create the
archive database. For information about creating an archive
database, see Creating a CDR Archive Database on page
765.
Archive database IP address The IP address of the server on which the archive database
must be saved.
Select Language Variant The field specifies the languages that is supported on the
computer running Director.
Japanese
Simplified Chinese
Traditional Chinese
Note: Only one set of files, which supports one language,
can be installed on a computer at a time
Include unanswered calls Includes unanswered calls in the reports with a duration of
zero.
3. To send the CDR data through the serial (COM) port of the server, select the respective port
number from the COM port for CDR output drop-down list. If you do not want to configure this
option, proceed to the next step.
4. Enter the duration for which you want to retain the CDR data on the Mitel system. If you do not
enter a value, the default value of 36 days is selected.
5. To enable the creation of a CDR archive database, select the Enable CDR archiving option. If
you select this option, you must follow the steps outlined in Creating a CDR Archive Database on
page 765 to create the archive database. If you do not select this option, you can proceed to Step
9 to complete configuring the reporting options.
6. Enter the duration for which you want to retain the archive database on the Headquarters server. If
you do not enter a value, the default value of 125 days is selected.
7. Enter the name of the archive database you want to create for CDR data. The name you enter
here must match the one you use while creating the archive database as outlined in Chapter B,
Call Detail Record Reports.
8. Enter the IP address of the Headquarters server on which you are going to create the archive
database.
9. Select the Asian language variant to be installed on your system. If you do not select a value,
Simplified Chinese is selected by default.
10. Click Install font to install the selected font on your system. The executable file is downloaded to
your system, which you can open and run to complete the font installation.
11. You can choose to select the Include answered calls option to include all unanswered calls in all
reports. By default, unanswered calls are not included in the report.
This chapter explains the chain of events in the call flow when a emergency call is placed. This chapter
also provides instructions for configuring your Mitel system to ensure that emergency services are
dispatched to the correct location. And finally, the chapter tells you how to select which of the various
pieces of caller ID information will be used to identify callers when an emergency call is placed. These
topics are discussed in the following sections:
2. The Mitel system identifies the call as an emergency and automatically routes it to an outbound
trunk. Caller ID information is provided in either of the following ways:
When the call is sent over a PRI trunk, the Mitel system provides caller ID information.
When the call is sent over a non-PRI trunk, the service provider provides caller ID information.
3. The call is passed over the Public Switched Telephone Network (PSTN) to the exchange of the
service provider.
4. The service provider passes the call to a Public Safety Answering Point (PSAP). This is the
location of the emergency services dispatcher.
5. The dispatcher at the PSAP gets a “screen pop” which displays information contained in a
emergency database. The database contains a mapping between the caller ID number and the
geographic location of the caller.
6. The dispatcher sends emergency response personnel to the calling party’s location.
For emergency calls placed from residential or a single-site businesses, determining the location of the
calling party is fairly simple and straightforward. However, when dealing with large offices and campus
environments, your emergency configuration can get complex. If you are maintaining a configuration
that has many remote sites, it is imperative that you do the following:
Work with your service provider to find out what kinds of caller ID information they will accept.
Work with the local PSAP to ensure that any changes in your emergency configuration (i.e.
names, phone numbers, locations of the members) are mirrored in the PSAP’s database.
Pass the correct caller ID information to the exchange of the service provider when a PRI trunk is
used to send the call.
Work with the customer to ensure the correct caller ID number is passed to the PSAP.
Pass the caller information to the PSAP.
Note
The billing number of the trunk is used if no other caller information is available.
Decide which type of caller ID information best fits your needs for emergency calls.
Work with the service provider to verify that they will accept your preferred type of caller ID
information.
Communicate any changes to your emergency configuration to ensure the PSAP is current.
A PS/ALI service provider maintains a database that stores specific address information for each
extension or DID on your system. Subscribing to PS/ALI services ensures that accurate automatic
number identification (ANI) information is passed to the PSAP in the event of an emergency call, and
prevents the emergency responder from showing up at the wrong location.
This critical error can be prevented if a PS/ALI database is in place. Such a database, which is
maintained by a PS/ALI service provider, can identify the location associated with a specific DID.
Note
Mitel does not provide PS/ALI service. Contact the local telco carrier for information about PS/ALI
service providers in the relevant areas.
Feature Operation
This section describes the following features:
If the user dials an access code followed by an emergency number, digit collection terminates
immediately and the call is routed to an emergency-capable trunk.
If the user forgets to dial an access code before dialing the emergency number, the system waits
five seconds before routing the call to an emergency-capable trunk. This pause has been
introduced to eliminate accidental calls to the emergency number.
Note
Systems that use 911 for the emergency number often also use 9 as an access code for outbound
calls. This makes it easy for users to mistakenly dial 911 on a long-distance call by adding an
extra 1 before the area code, such as dialing the following number: 9-1-1-408-555-1212. If
additional digits are entered after 9-1-1 during the five-second timeout period, the system will
consider it a dialing error and the calling party will hear a reorder tone.
If all available emergency-enabled trunks are busy, the Mitel system will not route the emergency
call.
If a site has no emergency-enabled trunk and ‘Parent as Proxy’ is enabled for that site, the Mitel
system will not route the call to the emergency-enabled trunks of the parent site if the admission
control bandwidth is exceeded at either site.
If the SIP tie-trunk is unavailable, the Mitel system will not failover and route the call through the
parent site when the following are true:
The site is connected to the parent site by an emergency-enabled SIP tie-trunk.
Parent as proxy is enabled for the site.
The site has no available emergency-enabled trunk.
Note
At sites with multiple trunks, the trunk selection order is SIP, ISDN, Digital, Analog. Additionally,
when trunk groups are configured in the Mitel system, the default programming enables
emergency services in each trunk group.
System administrators should consider that emergency calls will be routed over SIP if a SIP trunk is
available and are encouraged to configure a dedicated, non-SIP, non-emergency trunk and disable
Emergency Services in SIP Trunk Groups.
WARNING!
A dedicated emergency-enabled trunk must be configured at each site to ensure emergency calls
always reach the CO and PSAP.
Call permissions are ignored when an emergency call is placed to ensure that a user can dial
emergency number from any extension on the system, regardless of the permissions associated with
that user or the extension from which he or she is calling.
Once the user dials an emergency number, the call leaves the extension, arrives at the switch, and is
routed to any available emergency-capable trunk at the originating site. If the user belongs to a user
group that does not have access to any emergency-capable trunks, then the call will not be placed.
WARNING!
When adding users to the Mitel system, make sure each user is placed in a user group that has
access to an emergency-capable trunk group. If a user is placed in a user group that does not have
access to an emergency-capable trunk, such as a user group with long distance trunks only, members
of that user group will not be able to dial emergency numbers, and they will get a reorder tone when
attempting to do so.
To better understand this, you must realize that users are placed into user groups when added to the
Mitel system. The user groups are assigned to trunk groups, and these trunk groups have different
capabilities, one of which is the ability to place emergency calls. If a user belongs to only one user
group, that group must have access to an emergency-capable trunk. It is crucial that each site have at
least one emergency-capable trunk.
For details about adding users to a user group that has access to an emergency-capable trunk, see
Configuring User Groups on page 386.
Always confirm with your service provider that a trunk supports emergency calls. In some instances,
this may not be the case, such as with long-distance trunks. If the trunk does not support emergency,
be sure to un-check the emergency parameter as an available service in the associated trunk group in
Connect Director.
If you have mistakenly set up a site that has no available emergency-capable trunks, emergency calls
will be routed to the emergency-capable trunk at the proxy site if one has been designated. By routing
the call to a proxy site, the Mitel system is making a “last ditch” attempt to place the emergency call.
This failover behavior can be unreliable and should not be relied upon to ensure that users on your
system can dial emergency numbers. If you use the “parent as proxy” configuration, make sure the
boundary between the two sites never traverses geographic locations that would send an emergency
call to the incorrect emergency-service provider. For example, if improperly configured, a caller in
Houston could pick up a phone, dial 911, and reach a 911 service in Boston because the system was
configured to have the Boston site as the parent of the Houston site with “parent as proxy” checked.
Each site should have at least one emergency-capable trunk. If there will only be one trunk at a
particular site, that trunk should be capable of placing an emergency call. You should also be
aware that if there is only one trunk at a site, only one emergency call can be placed at a time.
Therefore, you should make sure you have enough emergency trunks at each site to accommodate
the realistic potential emergency traffic for that site.
WARNING!
If VPN phones are to be deployed in locations that are different from the site with which they are
associated, placing an emergency call from a VPN phone requires special consideration.
In the default case, an emergency call dialed from a VPN phone will be sent to the PSAP associated
with the site that hosts the switch and VPN concentrator. The emergency call would be answered but
likely by a response center that is out of area for the VPN phone user which could delay or prevent an
appropriate response.
Mitel strongly recommends that you deploy a 3rd party solution that can send a VPN phone's
emergency call to the appropriate response center. Otherwise you should clearly mark VPN phones to
alert users that emergency calls should not be attempted from such phones and you should educate
your VPN phone users about the emergency-number limitations of the VPN phone.
When an emergency call is routed through a T1 PRI trunk, the Mitel System sends the proper caller ID
information to the service provider, and the service provider must forward the information to the PSAP.
User’s have a home port defined in Connect Director. If a user is not at his home port, it could change
the caller ID number delivered to the service provider on emergency calls.
For mobile workers who travel between sites, the user must have access to an emergency-capable
trunk at every site. In remote locations, the user should use the emergency trunk associated with that
remote location.
The CESID is the telephone extension that a switch sends to a Public Safety Answering Point
(PSAP). A CESID helps to locate callers who require emergency services.
6. Nothing sent by Mitel system (the service provider sends the caller ID number associated with the
trunk)
For details on selecting the best choice for your situation, refer to Available Caller ID Options on page
745.
If you are configuring a system in the Netherlands, please see Special Considerations for Netherlands
on page 754.
In the scenarios described above and below, the user’s caller ID number will only be sent when the
user is at his home port. If the user is not at his home port, then the next available caller ID type is sent.
If a DHCP server is present, an IP phone will automatically receive an IP address within the specified
range when it is connected to the network.
Sending the CESID for a specified IP address range for outbound emergency calls works best for
larger organizations where simply identifying the site’s street address would not provide enough
information for an emergency response team to locate the caller (see Figure 29). Furthermore, this
option offers the best flexibility, the highest accuracy, and is the least likely to become out of date in the
PSAP’s emergency database. This option is defined on the IP Phone Address Map page.
Site (Caller's Emergency Service Identification (CESID) – This option delivers the CESID associated
with the site to the service provider during emergency calls. This approach might not be granular
enough for larger enterprises, but it could work well for single-site organizations or for situations in
which it would be adequate to provide the emergency response personnel with a building address.
This option is defined on the Site Edit page. (See Figure 30).
Table 232 shows several customer scenarios and provides recommendations for how to configure
E911 along with reasons for the recommendation.
Rules and regulations for E911 can vary between geographical regions. Consult with the local public
safety agency to ensure the system configuration meets the local requirements.
(with PRI at headquarters) Use the IP phone address map (home CESID) as a backup.
VPN Phone – Fixed Remote worker install phone once, then never moves it.
Location
Configure Caller ID of phone to reflect geographic location.
One option is setting Caller ID to be identical to worker’s
home phone number.
VPN Phone – Variable Remote worker uses phone when traveling from various
Location locations.
Trunk Groups
Make sure you have an outbound trunk group with outbound access that also supports the emergency
trunk service. If there is no emergency-capable trunk group configured, create one on the appropriate
Trunk Group edit page.
Note
You should uncheck 911 option while configuring SIP tie trunk groups.
Complete the following steps to configure a trunk group to support emergency service:
2. In the navigation pane, click Administration > Trunks > Trunk Groups > Trunk Groups.
3. In the list pan, select the trunk that you want to configure to support emergency dialing.
The General tab in the details pane displays parameters for the selected trunk group.
6. Click Save.
As a precaution, you should review all other trunk groups to ensure that the emergency check box is
not inadvertently enabled on a trunk that is not emergency-capable.
User Groups
Make sure each user group has access to a emergency-capable trunk group. You can select the
desired emergency Caller ID choice on the User Groups page.
To send the Caller ID as the CESID number, verify the Send caller ID as caller’s emergency
identification (CESID) check box is selected.
To send the DID as the CESID number, verify the Send DID as caller’s emergency identification
(CESID) check box is selected.
Complete the following steps to enable a user group to support emergency dialing:
3. In the list pan, select the user group that you want to configure to support emergency dialing.
The General tab in the details pane displays parameters for the selected user group.
4. Select the Send caller ID as caller’s emergency identification (CESID) check box to send the
Caller ID as the CESID number.
5. Select the Send DID as caller’s emergency identification (CESID) check box to send the DID
as the CESID number.
6. Click Save.
Make sure you give access to trunk groups at other sites in case users in the group use the Extension
Assignment feature from another site. Refer to Configuring Extension Assignment on page 429 for
more information about extension assignments.
Users
Make sure the Caller ID field is configured if you are sending Caller ID as CESID for this user.
Similarly, make sure the DID check box is selected (and contains a valid number in the DID field) if you
are sending DID as CESID for this user.
Verify each user belongs to the correct user group. See Configuring a User Account on page 390 for
more configuration information.
3. In the list pane, select the user that you want to configure to send caller ID as CESID.
The General tab in the details pane displays parameters for the selected user.
In the Caller ID field, enter the number that you want to send for this user.
Select the Enable DID check box and select the desired DID range in the DID Range list.
Select the Enable DID check box and make sure there is a valid number listed in the DID
number field.
5. In the User group list, select a user group that has the type of emergency support that users must
have enabled.
6. Click Save.
You cannot configure any user, workgroup, or route points to have a 911, 911n, or 911nn extension.
The 911 feature reserves these extension ranges.
Note
Outside the U.S., be sure that extension numbers do not overlap or otherwise conflict with local
emergency phone numbers.
3. In the list pane, select the site to which you want to associate the local CESID.
The General tab in the details pane displays parameters for the selected site.
4. In the Caller’s emergency service identification (CESID) field, enter the emergency phone
number that is local for the site.
5. Click Save.
Switch
Complete the following steps to configure a switch with a CESID.
3. In the list pane, select the switch that you want to configure with a CESID number.
The General tab in the details pane displays parameters for the selected switch.
4. In the Caller’s emergency service identification (CESID) field, enter the CESID number that is
local for the area the switch services.
5. Click Save.
Sites
Use the Sites page to configure a site’s CESID number. Refer to Chapter 5, Configuring Sites on page
95, for additional information about configuring sites.
3. In the list pane, select the site that you want to configure to support emergency numbers.
4. In the Caller’s emergency service identification (CESID) field, enter the number that you want
the site to send for emergency responses.
Note
Make sure this field is configured with the appropriate number for the country or area the site
services. For example, sites serving phones in the United States and Canada use 911.
b. Type the exact emergency number required to contact the associated Emergency Service
Provider.
c. Select the Trunk access code required check box with the trunk access code over which you
want to send emergency calls.
6. Click Save.
We recommend training the personnel at all sites on the emergency operations of your Mitel IP voice
system. All users should know how to access emergency services during normal and power outage
situations.
Call Notification
You can set up an event filter to generate an e-mail message to help coordinate your emergency
response. For more information about event filters, refer to Database Maintenance on page 641 for
more configuration information.
The General tab displays the default parameters for the new event filter.
Select the server that you want to monitor for emergency events from the list.
Select All to monitor all servers for emergency events.
5. In the Source section, select ShoreWare, and then select Switch in the list.
8. In the Email field, enter the email address of the party to whom you want emergency notification
sent.
9. Click Save.
We suggest naming your switches with location information such that you can understand which site
the call was made from.
Note
Extensions should never begin with “0”.
Each site can have a maximum of ten emergency numbers to accommodate locations where multiple
emergency service numbers are required.
For more information on international installations, refer to the Mitel Connect Planning and Installation
Guide.
Any number entered in the CESID field in the Switch Edit Page and Site Edit Page will only be sent if
the number matches the number associated with the incoming DID for that trunk.
We recommend calling your local law enforcement agency’s non-emergency number to understand
how to go about the test and to arrange a call time during non-peak hours. Do not place your
emergency test call without making prior arrangements. Depending on your location, an officer may be
required on-site when making test calls.
Table 233 is intended to help you plan your test call to the local dispatch center.
Additional Recommendations
All sites should be configured with a designated power failure emergency phone configured
appropriately. Each designated power failure emergency phone should be configured on the following
ports, based on type of switch, to take advantage of Mitel's emergency line power failure feature:
Call detail record (CDR) reports allow the system administrator or other individual to review the
ongoing call activity on the Mitel system. Sections in this appendix include:
Overview
Note
All collected CDR data from sites in different time zones are adjusted to the time zone of the
Headquarters (Director) server.
The Mitel system tracks all of the call activity and places CDRs in a database and a text file on the
server. The system uses the records to generate CDR reports. A new Mitel system has 12 CDR
reports based on data from the CDR database. In addition, the text files provide a simple and standard
way to access the call data to third-party call accounting systems.
Note
Call activity is not tracked and call detail records are not recorded for users who have the Call History
Privacy feature enabled. For more information about this feature, see Configuring Call History Privacy
on page 429.
If the server is not running, it does not generate call detail records, and calls from the associated
period do not appear in CDR reports.
In the WAN fails, CDR data is stored for up to two hours on the distributed server. When WAN
connectivity returns, the stored data goes to the Headquarters database. After two hours, the
distributed server deletes the data and logs an error to the NT event log.
CDR Reports
A new Mitel system includes 12 CDR reports that it can generate by using data from the CDR
database on the server. CDR reports present information about users, trunks, WAN links, workgroup
queues, account codes, and workgroup agents. The two categories of reports are summary and detail.
Summary reports provide a high-level view of the activity that occurred in a particular area, and detail
reports provide a detailed view of activity. The most common use of the summary report is to identify
discrepancies or problems. The detail report uncovers specific information.
Workgroup Agent Summary: Summarizes all inbound workgroup calls for each agent. The
workgroup queue report has only a summary report.
Workgroup Agent Detail: Lists every inbound workgroup call for each agent and optionally,
outbound calls. Non-workgroup calls for the agent are also reported.
Workgroup Queue Summary: Summarizes queue activity for every workgroup, including calls that
went directly to agents.
Workgroup Service Level Summary: Summarizes data on call processing by the workgroup server.
WAN Media Stream Summary: Summarizes media stream traffic and call quality for calls made
over the WAN in multi-site deployments.
WAN Media Stream Detail: Lists media stream made over the WAN in multi-site deployments.
Account Code Summary: Summarizes call information for each account; counts of calls each day,
along with their total and average duration. There are also totals for the reporting period.
Account Code Detail: Provides a detailed list of calls that occurred for each account. For each call
the date/time of the call, number dialed, the extension making the call and the duration of the call
is included. For each account, a summary is provided of the number of calls, along with their total
and average duration.
For more information about the CDR reports, see Chapter 22, Reporting on page 685.
The system processes media statistics for all calls and formats the raw data into separate lines, with
each line partitioned into several columns separated by a comma. Formatted data is then saved in a
text file and is subjected to appropriate rollovers similar to the other server logs.
One media stream statistic record will be generated for each RTP stream on a call. Thus, a 3-way fully-
meshed conference call would generate 6 records.
Formatting
Media statistics are collected and deposited line by line into a file. A delimiter separates one column
from the previous one, with no delimiter prior to the first column and none after the last column. The
column values will be left-justified and padded with spaces to the right. A value that exceeds the fixed-
width column limit will be truncated so that it fits within the limit.
value-1,value-2,value-3,…..,value-n
0 Unknown
1 Station
2 Trunk
3 Virtual
4 Workgroup
5 AutoAttendant
6 VMForward
7 VMLogin
8 BackupAA
9 Anonymous Phone
10 Nightbell
11 Paging
12 Workgroup Agent
13 Unknown
14 RoutePoint
15 ACC
16 Hunt Groups
17 Group Paging
4 Integer 2
5 String 32 SIP Call ID
6 String 16 Local IP Address (Switch, Trunk Switch, or IP Phone etc.) in
dotted decimal form
7 String 16 Remote IP Address (Remote end point. Switch or Trunk or IP
Phone etc.) in dotted decimal form
8 Integer 20 Local Site ID (Site ID of extension or trunk or phone that
generated starts)
9 String 16 Local Site Name (UTF-8)
3 LINEAR, L16/16000
4 ADPCM, DVI4/8000
5 G729A, G729A/8000
6 G729B, G729B/8000
8 G722, G722/8000
9 BV32, BV32/16000
10 BV16, BV16/8000
11 AAC_LC32000, AAC_LC/32000
0 – Norma
1 – Failure
13 String 12 Starting time of the collection in string HH:MM:SS.MSEC format
14 Integer 20 Number of seconds of this collection, in decimal.
15 Integer 20 Number of received packets
16 Integer 20 Number of lost packets
17 Integer 20 Max jitter
18 Integer 20 Underruns
19 Integer 20 Overruns
This feature applies only on the main (headquarter) server. By default, it is disabled. Enabling the
TMS-CDR Media Stream Statistics feature requires making the appropriate changes to the registry
settings.
WARNING!
Do not make changes to the registry settings unless you are certain of what you are doing!
2. Select the regedit application to display a window similar to the one shown in Figure 31.
4. Double-click the file named LogMediaStatsToFile to open the Edit DWORD Value dialog box
shown in Figure 32.
CDR Database
The call accounting service generates call detail records into the active CDR database. This file
includes all call activity for the period of time specified in the Retention Period for CDR Data parameter
in the Director Reporting Options page.
To access this page, select Reporting > Report Options from the Director menu.
When Enable Archiving is selected on the Report Options page, a nightly routine automatically
moves call detail records that are older than the limit specified by the Retention Period for CDR Data
into the Archive database.
This appendix describes how the system stores data in the CDR database tables. The CDR database
records the call data in the following tables:
Call Table: An entry is made in the Call table for each call in the Mitel system. Other tables often
reference the entries to the Call table.
Connect Table: An entry is made in the Connect table for each connection to a call. When used
with the Call table, a complete call history is provided.
Media Stream Table: An entry is made in the Media Stream table each time there is a media
stream between two switches that are at different sites. In some cases, such as for conference
calls, there may be multiple media streams per call.
Agent Activity Table: An entry is made in the Agent Activity table each time a workgroup agent
logs into a workgroup and when he or she completes wrap-up.
Queue Call Table: An entry is made in the Queue Call table for each call that is handled by a
workgroup server. The entry identifies how the call leaves the workgroup—either by abandonment
or for handling.
Queue Step Table: An entry is made in the Queue Step table for each step where the workgroup
server either hunts for agents or walks through workgroup queue steps. This provides more
detailed information about how the call was disposed of by the workgroup server.
Queue Depth Table: An entry is made in the Queue Depth table each time the depth of a
workgroup server's call queue changes.
In addition to these tables, the database contains enumeration tables, which are documented below
when discussing the tables that reference these enumeration/lookup tables.
Logged data reflects the time of its logging. For example, certain records contain the name of a trunk
group from the configuration database. The name of the trunk group can be changed in the
configuration database. New log entries reflect the changed name, but existing logs continue to have
the old name.
MakeCDR.dll
MakeCDR.sql
MakeCDR_sp.sql
2. Open the command prompt window in the same directory and run the following command.
MakeCDRArchive –d databasename
Note
3. The archive database is created and the records from the active CDR database are written to the
archive database when the services begin every night (approximately 12:00:00 AM).
Call Table
The CDR database reflects all calls within the system with a few exceptions which are listed below.
These exceptions reflect the Telephony Management Server (TMS) that allows calls to continue even
when portions of the system or network are not available. As the TAPI service provider for the Server,
TMS manages the call control communications between all other Mitel services.
If TMS is not connected to any of the call endpoints, the call is not recorded in the Call table.
Because of network outages, TMS may not be connected to call endpoints, yet the call endpoints
may have the connectivity necessary to complete the call (for example, the switches are able to
communicate with each other but not to TMS).
If TMS is not connected to some of the call endpoints (for example, a switch involved in the call),
the information about the call can be incomplete (for example, the information in the Connect table
as explained in the next section would only reflect some of the parties involved in the call).
If TMS is restarted, any call entries that were incomplete, along with their associated Connect
entries are destroyed. Incomplete calls do not show “Yes” in the locked field.
Figure 33 illustrates how new entries are added to the Call table whenever there is a call in the Mitel
system. Note that an entry is added to the Call table when the call begins (or when TMS starts up, for
any calls in progress) and is updated when the call ends.
The Call table is reference by other tables, most important among them being the Connect table. You
can analyze the Call and Connect tables to understand the complete disposition of a call as attempts
are made to add parties, transfers occur, and so on. Other tables can index the Call table, through the
primary key “ID,” which is unique for each record.
There is a CallID field that is used internally by the Mitel system to identify calls. This, however, should
not be used as the index into the table).
Close examination of the Call table shows that there are more calls recorded than you may initially
expect. For example, if a call is made to a workgroup, you will see an initial call, generally from an
incoming trunk. As agents are hunted, calls are made by the workgroup server to agents. If multiple
agents are hunted, there will be multiple calls. Once one of the agents is successfully hunted, if you
looked at the Connect table you see the agent being attached to the original call. Table 235 provides
information about the elements in the Call Table.
This field is blank for an outbound call from an anonymous phone with no
currently assigned DN.
For an inbound call, the extension field contains the DN of the last party
involved in the call (excluding voice mail or auto-attendant). For example, an
incoming call to an extension that transferred the call to extension 300 has
“300” in the extension field (the complete history of parties connecting to the
call is in the Connect table).
All calls to an extension that are forwarded to voice mail have the extension of
the called party and not the voice mail number (15 characters, 0-length).
Duration Date/Time Elapsed time of the call from beginning to end. Calculated by subtracting
StartTime from EndTime. Start time begins when the first party is added to a
call. End time is when the last party leaves resulting in the end of the call. (8-
byte date/time).
CallType Number See enumeration in CallType table. (1-byte integer, required)
WorkGroupCall Yes/No Is this a workgroup call? Yes indicates that the workgroup server was involved
in processing the call.
If the call was directed toward a workgroup server, but that server was
unavailable, then this field is set to “No” because the workgroup server never
becomes involved in the call. (boolean)
A trunk call can be transferred or conferenced, so the total long distance time
can only be determined by examining all Connect records. (boolean)
DialedNumber Text Extension-to-extension and outbound: Number dialed plus trunk access code if
any. (15 characters, zero-length)
CallerID Text For CallType=Inbound only: Caller-ID number if present. If blocked or
unavailable text is provided by the PSTN to indicate caller ID as unavailable it
is included here; for example, the text may be “blocked” or “unavailable” (15
characters, zero-length)
Archived Yes/No Has this call been archived? (boolean)
Connect Table
The Connect table contains a record for each party in a call. There are many different types of parties
that can be reflected in the table including individual user extensions, workgroups, workgroup agents,
and trunks.
Figure 34 illustrates how new entries are added to the Connect table each time a party is added to a
call within the Mitel system.
Initial parties on outbound call, value indicates time dialing was complete.
ConnectTimeMS Number Append to ConnectTime to determine start time of call with millisecond
precision. (11-bit integer, milliseconds)
DisconnectTime Date/ Time when party disconnected from call.
Time
DisconnectTimeMS Number Append to DisconnectTime to determine end time of call with millisecond
precision. (11-bit integer, milliseconds)
ConnectReason Number Connect reason code. Refer to Table 240. (6-bit integer – required)
DisconnectReason Number Disconnect reason code. Refer to Table 241. (6-bit integer – required)
PartyIDFlags Number Caller ID flags that specifies the data available in ID and Name fields
Internal party: number, name and last name from system address book.
Field is blank for external party – PartyIDName contains first and last name,
as provided by PSTN Caller ID service.
CtrlPartyIDFlags Number Caller ID flags that specifies the data available in ID and Name fields for the
controlling party. Controlling party causes the event. Example: for an entry
listing a call was transferred from extension 400 to extension 300, the
controlling party is extension 400. Original call will not have a control party.
Example: A call with 25 hour time has a HoldTime of 1 day and 1 hour.
RingTime Date/ Inbound calls: time spent offering
Time
Outbound calls: ringback time.
Duration Date/ The time between ConnectTime and DisconnectTime
Time
LongDistance Number Lists trunk connected long distance for outbound calls if PartyType – trunks
TrunkDirection Number Indicates inbound / outbound direction. Refer to TrunkDirection Enumeration
Table.
SecurityFlag Number AES/SRTP flags that indicates call encryption status. (6-bit integer)
SiteName Text Reserved (50 characters)
ServerName Text Reserved (64 characters)
PartyType
Table 238 lists the Connect Table party types.
PartyIDFlag
Table 239 lists the Connect Table party ID flags.
ConnectReason
Table 240 lists the Connect Table connect reason codes.
Disconnect Reasons
Table 241 lists the Connect Table disconnect reason codes.
Trunk Direction
Table 242 lists the Trunk Direction flags.
The Media Stream table logs media information about InterSite Calls. At a high level, there is one such
entry for each InterSite call. Information about both parties involved in the call is recorded. Table 243
describes the elements in the Media Stream Table.
The left flow shows how each time a workgroup agent logs in, a LogInOut entry is added, which is then
updated at logout time. The right flow shows how the Agent Activity table is also updated as agents
complete their handling of workgroup calls. Table 244 describes the elements in the Agent Activity
table.
Two types of records are placed in the Agent Activity table. The State field identifies the type of
record.
LogInOut Records record the time that an agent is logged into the workgroup.
All records in the table should have ID, AgentDN, AgentFirstName, AgentLastName (unless
blank), State, WorkGroupDN, WorkGroupName, StartTimeStamp, and Archived.
LogInOut Records may exist for agents that have Logged into the workgroup but have not yet
logged out. For these records the StartTimeStamp indicates the time when the agent logged into
the workgroup. The EndTimeStamp is updated when the agent logs out of the workgroup with the
time of the logout.
For wrapup records the StartTimeStamp indicates the time when the agent entered wrapup time
and EndTimeStamp indicates when they exit wrapup state.
Wrapup records can contain a CallID to identify the Call that the agent was wrapping up from for
the Wrapup record. This will not be provided in cases where the agent is manually placed in
wrapup state when not on a call.
There is always a wrapup record when an agent wraps up a call, even for the case where wrapup
time is set to zero.
Each time a call is made to a workgroup when the workgroup server is operational, an entry is made in
the Queue Call table; moreover, there is only one entry for each call. In other words, one and only one
entry appears for each call. A call can be made to the workgroup dialed number, but if the workgroup
server does not process the call, an entry is not made in the Queue Call table for the call. Moreover,
the call will not be marked as a workgroup call in the call table.
Figure 36 illustrates how updates are made to the Queue Call table.
Each entry in the Queue Call table contains the following fields as shown in Table 246.
If you want information from the Call table entry for this call, the
reference to the Call table in the Connect entry should be used to
find the Call table entry. (4-byte integer)
StartTime Date/Time The time at which the call is answered by the workgroup server,
thereby beginning it’s time on the call queue (workgroup) DN.
(8-byte date/time)
Partial records are never written. A record is written only once, either when the call is abandoned,
the call is connected to an agent, or leaves the queue for other reasons as enumerated in
QueueExitReasonLUT.
A QueueExitReason is always entered. The field will never be blank. “Unknown” will only be used
in the case of failure (and maybe not at all).
Exit Reasons for Forwarding (2-5) reflects the call being forwarded from the workgroup. These are
used when the call leaves the workgroup as a result of call routing and the call routing indicates to
forward the call to an internal or external number. Call routing can also indicate that the call is
entering the call queue for the workgroup. In that case, these exit reasons are not used because
the call does not exit the queue at that point.
Exit Reason 8, Abandon, is used when the caller drops the call either by physically hanging up or
by taking an option on a Queue Step to hang up.
Even after a call is forwarded to the queue, it remains on the queue and it may still be successfully
transferred to an agent or abandoned. Exit Reason 1 or 7 is recorded if either of these occurs.
In addition to a call being successfully hunted or abandoned while on the queue, it may exit the
queue because of an option taken during a queue step. The call will exit the queue if the caller
takes any of the following options:
Take a message
Transfer to extension
Go to menu
Exit reasons 9, 10, and 11 have been added to cover these cases.
Table 248 describes the elements in the Queue Call Target Type Enumeration table.
There is a record for each period that the call spends hunting and for each period a call spends in a
queue step. For example, if a call to a workgroup initially hunts for agents, then goes to the queue and
exits the workgroup from that queue step, there will be two records for the call in the Queue Step table.
The first record would be for hunting (the duration may be zero if, for example, no agents were logged
in). The second record is for the first queue step from which the call exited.
Web Tables
Web tables log call data for audio only, web only, and audio and web conferences.
A meeting session record is written to the web_session table after the meeting ends.
The Web_session table holds a CallID that references Call.CallID. If a web attendee reconciles his
or her audio leg, web_attendee.caller_id references Connect.PartyID.
Trunk utilization
Toll fraud
The CDR*.log files are text files created daily at midnight. It contains call records from midnight to
midnight. Any call records that span the midnight hour will be recorded on the day that calls are
completed.
Format
The file name format for the daily CDR-YYMMDD.HHMMSS.log where
YY, MM, and DD are zero-padded character strings that represent the year, month, and day of the
date when the file was created.
HH, MM, and SS are zero-padded character strings that represent the hour, minute, and second of
the time when the file was created.
Call records are entered in the log file in the order of when the call was completed and not when it
began.
It is the responsibility of the third-party reporting application to delete the daily log files.
The format of the record is column based, must be justified correctly, and end with a carriage return
and line feed. A single blank character is inserted between each data field for readability. Table 252
provides information about elements in the CDR text file.
0 – Incoming
1 – Outgoing
right
justified
Account 103 20 The account code entered by the caller.
Code
CR /LF 124 Carriage return.
The Talk Time Enhancement feature increases the usability of log data from the Call Detail Records by
compiling only the actual time spent in a conversation between the calling parties. All call ring back
time is eliminated from the Call Detail Records retaining only the actual Talk Time spent on the call.
When a call is placed the destination phone acknowledges and a ring tone is provided to both parties.
The time of the call starts on the first ring and terminates when the calling parties hang up. The Mitel
Appliance uses the Telephony Management Service (TMS) to report the call and it's the time to the
Headquarters server. There the call is captured in the Call Detail Records. The entire length of the call
is logged here, including the first ring up to the entire call tear down.
Talk Time Enhancements uses the FarEndAnswered event provided by certain trunks to determine
when the called party answers the call. The length of time the call has been answered is reported to
the CDR. If you choose to include unanswered calls in the CDR, these calls are reported with a
duration of zero. For information about including unanswered calls in the report, see Configuring
Reporting Options on page 734.
Calls placed over Digital Wink, PRI, BRI or SIP trunks support FarEndAnswered events. These events
mark the moment when the called party answers the call. Talk Time Enhancement uses this event to
report the Talk Time of the call to the Call Detail Records. The Call time represents only the actual Talk
Time of the call. Calls over Analog loop start and Digital loop start trunks do not support
FarEndAnswered events. These calls still report to the CDR through TMS, but their time values include
the time for Ring Back.
As administrators evaluate CDR reports, an understanding of the trunk types that support Talk Time
Enhancement helps them to gain an accurate picture of the talk time being reported in the CDR.
MySQL Database
The system supports CDR records and related queries in a MySQL database. The maximum
supported size for MySQL database and database table depends on the operating system and MySQL
version on the main server. For more information, refer to the documentation specific to your operating
system and MySQL version.
The data in the MySQL files can be viewed using a new Web-Based Reporting feature from Connect
Director. (See the Introduction on page 686 for more information.) Alternatively, administrators can use
common database command utilities in a command line interface to dump and restore files.
Connect Director provides the access for generating CDR reports, as Introduction on page 686
describes.
Connect Director also lets you start, stop, and monitor the health status of MySQL databases. To do
so, navigate to Maintenance > Services and then select MySQL in the table on the Services page.
Although the main and archive databases are typically stored on the same server, MySQL permits the
storage of the databases on different servers.
Virus Checkers: Virus checker utilities that run on the server must exclude MySQL database files.
Specifically, if a virus checker is running on the server, it must exclude the MySQL CDR Database file
from the anti-virus utility (wherever ShoreLine Data installed, such as \Shoreline Data\Call Records
2\Data\[ibdata1, ib_logfile0, ib_logfile1]). If these files are not in the exclusion list, the MySQL service
stops.
Disk or Backup utilities: MySQL database files must be excluded from all disk or backup utilities
running on the server. Failure to exclude the database causes a MySQL failure.
To restart the database after a failure, access the MySQL Service page from Connect Director by
selecting Maintenance > Services in the menu page and then selecting MySQL in the table on the
Services page.
Retention Period for CDR Data specifies the number of days that records remain in the main
CDR database. The system deletes the oldest records from the archive database each day. The
default period for CDR data retention is 36 days.
Retention Period for CDR Archive specifies the number of days that records remain in the
MySQL archive database on a secondary server. The system deletes the oldest records from the
archive database each day. The default period for CDR archive retention is 125 days.
Archival services are configured and enabled in Connect Director, where you can specify the number
of days that records are maintained in the main database and in the archive database. When archiving
is enabled, archival services are performed daily. The archival service copies records to the archive
database that exceed the main database age limit, then removes those records from the main
database. Records that exceed the age limit for the archive database are removed from the archive
database. Age limits are established separately for each database; valid limits range from one to 2000
days. The default age limits for each database is 125 days.
Example: A sample implementation sets a 30 day limit on the main database and a 365 day limit on
the archive database. In this case, the main database contains records for calls handled during the
past 30 days while the archive database contains records for calls handled during the past 365 days.
The Backup utility can be used for record storage requirements that exceed 2000 days.
2. Access the Reporting Options page in Connect Director (Reporting | Options from the Menu page)
to configure Mitel to access the archive database.
Archiving is configured once then performed daily. Backups are performed only when a command
is executed.
Archival operations are configured from Connect Director. Backups are performed from the
command line.
Archive databases can be accessed directly to generate reports. Backup databases must be
restored before performing search and report generation tasks.
Backup and Restore operations can be performed without shutting down the MySQL service.
Performing these operations during off peak hours reduces the execution time and the impact on other
system services.
Database Replication
MySQL provides a Database Replication tool. For information, see the following websites:
http://www.mysql.com/ to search for tools and add-ons that assist with database replication.
Upgrade the archive on a secondary server to MySQL 5.6.25 (in the current release)
Although similar to a new installation, the upgrade of the archive, from MySQL 5.5 to 5.6.25, for
example, has additional tasks.
To conserve resources on the main server, the most logical place for an archive database is a
secondary server (although the archive can also exist on the main server). For the current release of
Mitel software, a separate, licensed copy of MySQL Enterprise Server 5.6.25 or MySQL Community
Server 5.6.25 is the requirement for a new Mitel system or an upgrade of the database that exists on a
secondary server.
Specifying port 4309 and it specifying pacing the port in firewall exception list.
Note
For the current release of the Mitel system, the version of MySQL to install on the secondary server is
MYSQL Server 5.6.25.
2. Download the appropriate MySQL 5.6.25 installer to the following default location or to an
alternative of the customer’s choosing:
Tip
Both MySQL5.6.25 Community and MySQL5.6.25 Enterprise are supported.
3. Launch the installer. The first window to appear is the Welcome window. It displays the version of
MySQL that will be installed.
Note
While installing MySQL on the secondary server, use the default MySQL installation options
unless otherwise specified in this Administration Guide.
7. Click Next.
11. Back up the file to C:\Program Files\MySQL\MySQL Server 5.6\my.ini from the Secondary server
to a safe location (C:\MySQL_backup, for example).
12. Back up the files c:\Program Files\MySQL\MySQL Server 5.6\Data\[ib_logfile*] from the
Secondary server to a safe location (C:\MySQL_backup, for example).
13. Select Start > Administrative Tools > Services > MySQL on the server.
14. Click Stop the service and check that MySQL service status is blank.
15. Compare the following values of specific fields in the archive_MySQL_my.ini file from the Main
server directory with the secondary server's my.ini file:
Make sure that all the values in the archive_MySQL_my.ini are appropriate and update the same
values to my.ini file of the secondary server. The archive_MySQL_my.ini values should be:
[mysql]
default-character-set – utf8
[mysqld]
default-character-set – utf8
tmp_table_size – 30M
key_buffer_size – 2M
read_buffer_size – 2M
read_rnd_buffer_size – 2M
sort_buffer_size – 2M
innodb_additional_mem_pool_size – 2M
innodb_flush_log_at_trx_commit – 0
innodb_file_per_table
innodb_log_buffer_size – 5M
innodb_buffer_pool_size – 150M
innodb_log_file_size – 24M
default-storage-engine – INNODB
16. Delete the file ib_logfile* from the Secondary server directory (c:\Program
Files\MySQL\MySQL Server 5.6\Data).
17. Be sure that the value for innodb_flush_log_at_trx_commit – 0 on the secondary server
(C:\Program Files\MySQL\MySql Server 5.6).
Note
If the value is not 0, the archiving operation is more than 20 times slower.
18. Select Start > Administrative Tools > Services > MySQL
19. Click Restart the service and verify that MySQL has returned to service.
Note
Please note the following pre-requisites to installing this 32-bit application on 64-bit operating
systems:
If you are running Windows Server 2008 R2 (Enterprise or Standard Editions only) (64-bit version)
with or without SP1, you must install the .Net Framework 4.0.
For any supported version of Windows Server, the Microsoft C++ 2010 x86 runtime libraries must
be installed. If they are not, visit the Microsoft web site to download the Microsoft Visual C++ 2010
Redistributable Package (x86).
Refer to the Software Build notice for information about supported versions of Window Server.
1. Launch the MySQL Community installer that you installed in Installing MySQL on a Secondary
Server on page 795.
2. Click Add, expand the MySQL Connectors item, and then select Connector/ODBC 5.3.4 X86.
3. Click the right arrow to move Connector/ODBC 5.3.4 X86 to the Products/Features To Be
Installed section.
When installation is complete, view the ODBC driver version in the registry editor to verify that the
5.3.4 X86 version is installed.
1. Verify the following files are placed in an equivalent location on the Secondary Server to that on
the Main servers (default location is \\Shoreline Communications \Shoreware Server)
Archive.ini
MakeCDR.dll
MakeCDR.sql
MakeCDR_sp.sql
MakeCDRArchive.exe
2. Run MakeCDRArchive –d databasename, where databasename is the name for the archive.
Navigate to Reporting > Options to specify the name of the archive database.
Default setting:
INNODB_BUFFER_POOL_SIZE – 150 MB
INNODB_BUFFER_POOL_SIZE – 200 MB
INNODB_BUFFER_POOL_SIZE – 250 MB
Browsing a large CDR database on the Headquarters server may potentially degrade the call
processing server.
A large amount of temporary disk space may be used by these MySQL browser tools. To avoid
affecting call processing performance on the Headquarters server, you can use a query with LIMIT
criteria to show a subset of rows.
Mitel Connect supports Centralized Dial Numbers (DN), which guarantee the data integrity for DN
references within the system. When administrators delete a particular DN, Centralized DN checks all
the references to that DN across the system. Depending on the significance of references to the DN to
be deleted, the system either allows the deletion by removing all the DN references or prevents the
deletion by prompting the administrator with a message indicating that the referenced DN cannot be
deleted.
To delete non-significant references together with the DN eliminates the unnecessary pop-up
messages when administrators delete an unwanted DN, which simplifies DN management for the
administrator. Table 254 provides information about the centralized dial number table as it relates to
the Mitel Connect system.