675i Series

Aastra 675i Series, 9143i Series, 9480i CT Series, 9480i Series User manual

  • Hello! I am an AI chatbot trained to assist you with the Aastra 675i Series User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Administrator Guide
Release 2.4
SI
SIP
I
IP
PHONE
PHONE
41-001160-03
Rev 00
9143i, 9480i, 9480i CT
9143i, 9480i, 9480i CT
and 675xi Series Phones
and 675xi Series Phones
Draft 1
Aastra Telecom will not accept liability for any damages and/or long distance charges, which result from
unauthorized and/or unlawful use. While every effort has been made to ensure accuracy, Aastra Telecom will
not be liable for technical or editorial errors or omissions contained within this documentation. The
information contained in this documentation is subject to change without notice.
Copyright 2008 Aastra Telecom. www.aastratelecom.com
All Rights Reserved.
Draft 1
41-001160-03, Rev 00, Release 2.4 iii
Software License Agreement
Aastra Telecom Inc., hereinafter known as "Seller", grants to Customer a
personal, worldwide, non-transferable, non-sublicenseable and non-exclusive,
restricted use license to use Software in object form solely with the Equipment for
which the Software was intended. This Product may integrate programs, licensed
to Aastra by third party Suppliers, for distribution under the terms of this
agreement. These programs are confidential and proprietary, and are protected as
such by copyright law as unpublished works and by international treaties to the
fullest extent under the applicable law of the jurisdiction of the Customer. In
addition, these confidential and proprietary programs are works conforming to the
requirements of Section 401 of title 17 of the United States Code. Customer shall
not disclose to any third party such confidential and proprietary programs and
information and shall not export licensed Software to any country except in
accordance with United States Export laws and restrictions.
Customer agrees to not reverse engineer, decompile, disassemble or display
Software furnished in object code form. Customer shall not modify, copy,
reproduce, distribute, transcribe, translate or reduce to electronic medium or
machine readable form or language, derive source code without the express
written consent of the Seller and its Suppliers, or disseminate or otherwise
disclose the Software to third parties. All Software furnished hereunder (whether
or not part of firmware), including all copies thereof, are and shall remain the
property of Seller and its Suppliers and are subject to the terms and conditions of
this agreement. All rights reserved.
Customer's use of this software shall be deemed to reflect Customer's agreement
to abide by the terms and conditions contained herein. Removal or modification
of trademarks, copyright notices, logos, etc., or the use of Software on any
Equipment other than that for which it is intended, or any other material breach of
this Agreement, shall automatically terminate this license. If this Agreement is
terminated for breach, Customer shall immediately discontinue use and destroy or
return to Seller all licensed software and other confidential or proprietary
information of Seller. In no event shall Seller or its suppliers or licensors be liable
for any damages whatsoever (including without limitation, damages for loss of
business profits, business interruption, loss of business information, other
pecuniary loss, or consequential damages) arising out of the use of or inability to
use the software, even if Seller has been advised of the possibility of such
damages.
Draft 1
Draft 1
41-001160-03, Rev 00, Release 2.4 v
Third Party Copyright Compliance
This product contains software provided under license to Aastra Telecom by one
or more third parties. In addition to the Aastra SLA shown above, use and
distribution of this product is subject to the following license terms:
Expat XML Parser
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd and Clark Cooper
Copyright (c) 2001, 2002, 2003, 2004, 2005, 2006 Expat maintainers.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction,
including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense,
and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do
so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial
portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Draft 1
vi 41-001160-03, Rev 00, Release 2.4
M5T SIP Stack - M5T
Portions of this software are © 1997 - 2006 M5T a Division of Media5 Corporation ("M5T( tm )").
All intellectual property rights in such portions of the software and documentation are owned by
M5T and are protected by Canadian copyright laws, other applicable copyright laws and
international treaty provisions. M5T and its suppliers retain all rights not expressly granted.
MD5 RSA
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data
Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this
software or this function. License is also granted to make and use derivative works provided that
such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest
Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this
software or the suitability of this software for any particular purpose. It is provided "as is" without
express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
OpenSSL
License Issues
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License
and the original SSLeay license apply to the toolkit. See below for the actual license texts.
Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to
OpenSSL please contact op[email protected].
Draft 1
41-001160-03, Rev 00, Release 2.4 vii
OpenSSL License
/* ============================================================
* Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* openssl-core@openssl.org.
*
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
Draft 1
viii 41-001160-03, Rev 00, Release 2.4
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*
* This product includes cryptographic software written by Eric Young
* ([email protected]). This product includes software written by Tim
* Hudson (tjh@cryptsoft.com).
*/
Original SSLeay License
/* Copyright (C) 1995-1998 Eric Young ([email protected])
* All rights reserved.
*
* This package is an SSL implementation written
* by Eric Young ([email protected]).
* The implementation was written so as to conform with Netscapes SSL.
*
* This library is free for commercial and non-commercial use as long as
Draft 1
41-001160-03, Rev 00, Release 2.4 ix
* the following conditions are aheared to. The following conditions
* apply to all code found in this distribution, be it the RC4, RSA,
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
* included with this distribution is covered by the same copyright terms
* except that the holder is Tim Hudson ([email protected]).
*
* Copyright remains Eric Young's, and as such any Copyright notices in
* the code are not to be removed.
* If this package is used in a product, Eric Young should be given attribution
* as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young ([email protected])"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson ([email protected])"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
Draft 1
x 41-001160-03, Rev 00, Release 2.4
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE
LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
Draft 1
41-001160-03, Rev 00, Release 2.4 xi
libSRTP (SRTP) - Cisco
Copyright (c) 2001-2005 Cisco Systems, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials provided
with the distribution.
Neither the name of the Cisco Systems, Inc. nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION).
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
Draft 1
xii 41-001160-03, Rev 00, Release 2.4
Wind River Systems - VxWorks software
The VxWorks Run-Time software module is Copyright (c) WindRiver Systems Inc, all rights
reserved. It is licensed for use, not sold. All use of this product and the VxWorks Run-Time
module is subject to agreement with the following EULA terms
With respect to the Run-Time Module, Wind River and its licensors are third party beneficiaries of
the End User License Agreement and that the provisions related to the Run-Time Module are made
expressly for the benefit of, and are enforceable by, Wind River and its licensors.
Activities expressly prohibited: (i) copying the Run-Time Module, except for archive purposes
consistent with the End Users archive procedures; (ii) transferring the Run-Time Module to a
third party apart from the Target Application; (iii) modifying, decompiling, disassembling, reverse
engineering or otherwise attempting to derive the Source Code of the Run-Time Module; (iv)
exporting the Run-Time Module or underlying technology in contravention of applicable U.S. and
foreign export laws and regulations; and (v) using the Run-Time Module other than in connection
with operation of the Target Application.
Aastra Telecom and Wind River Systems: (i) Retain ownership of all copies of the Run-Time
Module; (ii) expressly disclaim all implied warranties, including without limitation the implied
warranties of merchantability, fitness for a particular purpose, title and non-infringement; (iii)
exclude liability for any special, indirect, punitive, incidental and consequential damages; and (iv)
require that any further distribution of the Run-Time Module be subject to the same restrictions set
forth herein.
UPnP - Intel
INTEL SOFTWARE LICENSE AGREEMENT (Final, Site License)
IMPORTANT - READ BEFORE COPYING, INSTALLING OR USING.
Do not use or load this software and any associated materials (collectively, the "Software") until
you have carefully read the following terms and conditions. By loading or using the Software, you
agree to the terms of this Agreement. If you do not wish to so agree, do not install or use the
Software.
LICENSE. You may copy the Software onto your organization's computers for your organization's
use, and you may make a reasonable number of back-up copies of the Software, subject to these
conditions:
Draft 1
41-001160-03, Rev 00, Release 2.4 xiii
1. You may not copy, modify, rent, sell, distribute or transfer any part of the Software except as
provided in this Agreement, and you agree to prevent unauthorized copying of the Software.
2. You may not reverse engineer, decompile, or disassemble the Software.
3. You may not sublicense the Software.
4. The Software may include portions offered on terms in addition to those set out here,
as set out in a license accompanying those portions.
OWNERSHIP OF SOFTWARE AND COPYRIGHTS. Title to all copies of the Software remains
with Intel or its suppliers. The Software is copyrighted and protected by the laws of the United
States and other countries, and international treaty provisions. You may not remove any copyright
notices from the Software. Intel may make changes to the Software, or to items referenced therein,
at any time without notice, but is not obligated to support or update the Software. Except as
otherwise expressly provided, Intel grants no express or implied right under Intel patents,
copyrights, trademarks, or other intellectual property rights. You may transfer the Software only if
the recipient agrees to be fully bound by these terms and if you retain no copies of the Software.
LIMITED MEDIA WARRANTY. If the Software has been delivered by Intel on physical media,
Intel warrants the media to be free from material physical defects for a period of ninety days after
delivery by Intel. If such a defect is found, return the media to Intel for replacement or alternate
delivery of the Software as Intel may select.
EXCLUSION OF OTHER WARRANTIES. EXCEPT AS PROVIDED ABOVE, THE
SOFTWARE IS PROVIDED "AS IS" WITHOUT ANY EXPRESS OR IMPLIED WARRANTY
OF ANY KIND INCLUDING WARRANTIES OF MERCHANTABILITY,
NONINFRINGEMENT, OR FITNESS FOR A PARTICULAR PURPOSE.
Intel does not warrant or assume responsibility for the accuracy or completeness of any
information, text, graphics, links or other items contained within the Software.
LIMITATION OF LIABILITY. IN NO EVENT SHALL INTEL OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION,
LOST PROFITS, BUSINESS INTERRUPTION, OR LOST INFORMATION) ARISING OUT
OF THE USE OF OR INABILITY TO USE THE SOFTWARE, EVEN IF INTEL HAS BEEN
ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME JURISDICTIONS PROHIBIT EXCLUSION OR
Draft 1
xiv 41-001160-03, Rev 00, Release 2.4
LIMITATION OF LIABILITY FOR IMPLIED WARRANTIES OR CONSEQUENTIAL OR
INCIDENTAL DAMAGES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. YOU
MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY FROM JURISDICTION TO
JURISDICTION. TERMINATION OF THIS AGREEMENT.
Intel may terminate this Agreement at any time if you violate its terms. Upon termination, you will
immediately destroy the Software or return all copies of the Software to Intel.
APPLICABLE LAWS. Claims arising under this Agreement shall be governed by the laws of
California, excluding its principles of conflict of laws and the United Nations Convention on
Contracts for the Sale of Goods. You may not export the Software in violation of applicable export
laws and regulations. Intel is not obligated under any other agreements unless they are in writing
and signed by an authorized representative of Intel.
GOVERNMENT RESTRICTED RIGHTS. The Software is provided with "RESTRICTED
RIGHTS."
Use, duplication, or disclosure by the Government is subject to restrictions as set forth in
FAR52.227-14 and DFAR252.227-7013 et seq. or its successor. Use of the Software by the
Government constitutes acknowledgment of Intel's proprietary rights therein. Contractor or
Manufacturer is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95052.
Draft 1
41-001160-03, Rev 00, Release 2.4 v
Contents
Contents
Software License Agreement iii
Third Party Copyright Compliance v
Expat XML Parser ....................................................................................................1-v
.
M5T SIP Stack - M5T ..............................................................................................1-vi.
MD5 RSA ................................................................................................................1-vi.
OpenSSL .................................................................................................................1-vi.
License Issues ........................................................................................................1-vi.
OpenSSL License ..................................................................................................1-vii.
Original SSLeay License ....................................................................................... 1-viii.
libSRTP (SRTP) - Cisco ..........................................................................................1-xi.
Wind River Systems - VxWorks software ...............................................................1-xii.
UPnP - Intel ............................................................................................................1-xii.
Preface
About this guide .......................................................................................................... 1-xvii
.
Introduction .......................................................................................................... 1-xvii.
Audience .............................................................................................................. 1-xvii.
Other Documentation ...........................................................................................1-xviii.
Chapters and appendixes in this guide .................................................................1-xix.
Chapter 1
Overview
.
About this chapter ...........................................................................................................1-1.
IP Phone Models ............................................................................................................1-3.
Description ...............................................................................................................1-3.
Model 9143i IP Phone ..............................................................................................1-6.
Model 9480i and 9480i CT IP Phones ...................................................................1-10.
Model 6751i IP Phone ............................................................................................1-15.
Model 6753i IP Phone ............................................................................................1-20.
Draft 1
vi 41-001160-03, Rev 00, Release 2.4
Contents
Model 6755i IP Phone ............................................................................................1-23.
Model 6757i and 6757i CT IP Phones ...................................................................1-27.
Firmware Installation Information .................................................................................1-33.
Description .............................................................................................................1-33.
Installation Considerations .....................................................................................1-33.
Installation Requirements .......................................................................................1-34.
Configuration Server Requirement .........................................................................1-35.
Firmware and Configuration Files .................................................................................1-36.
Description .............................................................................................................1-36.
Configuration File Precedence ...............................................................................1-38.
Installing the Firmware/Configuration Files ............................................................1-39.
Chapter 2
Configuration Interface Methods
.
About this chapter ...........................................................................................................2-1.
Configuration Methods ...................................................................................................2-2.
Description ...............................................................................................................2-2.
IP Phone UI ..............................................................................................................2-2.
Aastra Web UI ..........................................................................................................2-6.
Configuration Files (Administrator Only) ................................................................2-17.
Chapter 3
Administrator Options
.
About this chapter ...........................................................................................................3-1.
Administrator Level Options ...........................................................................................3-3.
Description ...............................................................................................................3-3.
IP Phone UI Options ................................................................................................3-3.
Aastra Web UI Options ............................................................................................3-6.
Configuration File Options ........................................................................................3-8.
Phone Status ............................................................................................................3-9.
Restarting Your Phone ...........................................................................................3-13.
Set Phone to Factory Defaults/Erase Local Configuration .....................................3-15.
Basic Settings ........................................................................................................3-19.
Account Configuration ............................................................................................3-35.
Network Settings ....................................................................................................3-37.
Line Settings ..........................................................................................................3-71.
Draft 1
41-001160-03, Rev 00, Release 2.4 vii
Contents
Softkeys, Programmable Keys, Expansion Module Keys ......................................3-72.
Action URI ..............................................................................................................3-73.
Configuration Server Settings ................................................................................3-75.
Firmware Update Features ....................................................................................3-84.
TLS Support ...........................................................................................................3-85.
802.1x Support .......................................................................................................3-89.
Troubleshooting .....................................................................................................3-92.
Chapter 4
Configuring Network and
Session Initiation Protocol (SIP) Features
.
About this chapter ...........................................................................................................4-1.
Overview .........................................................................................................................4-3.
Network Settings ............................................................................................................4-4.
Basic Network Settings ............................................................................................4-4.
Advanced Network Settings ...................................................................................4-30.
Global SIP Settings ......................................................................................................4-70.
Description .............................................................................................................4-70.
Basic SIP Settings ..................................................................................................4-71.
Advanced SIP Settings (optional) ..........................................................................4-84.
Real-time Transport Protocol (RTP) Settings .........................................................4-93.
Autodial Settings ..................................................................................................4-103.
Configuration Server Protocol ....................................................................................4-108.
Configuring the Configuration Server Protocol .....................................................4-108.
Chapter 5
Configuring Operational Features
.
About this chapter ...........................................................................................................5-1.
Operational Features ......................................................................................................5-5.
Description ...............................................................................................................5-5.
User Passwords .......................................................................................................5-5.
Administrator Passwords .........................................................................................5-9.
Locking/Unlocking the Phone .................................................................................5-10.
Defining an Emergency Dial Plan ..........................................................................5-16.
Time and Date ........................................................................................................5-19.
Backlight Mode (9480i, 9480i CT, 6755i, 6757i, and 6757i CT only) .....................5-30.
Draft 1
viii 41-001160-03, Rev 00, Release 2.4
Contents
Live Dial Pad* .........................................................................................................5-33.
Language ...............................................................................................................5-34.
Locking IP Phone Keys ..........................................................................................5-49.
Locking/Unlocking the SAVE and DELETE keys (6753i) .......................................5-50.
Local Dial Plan .......................................................................................................5-53.
Park Calls/Pick Up Parked Calls ............................................................................5-59.
Suppressing DTMF Playback .................................................................................5-63.
Display DTMF Digits ..............................................................................................5-65.
Call Waiting/Call Waiting Tone ...............................................................................5-67.
Stuttered Dial Tone .................................................................................................5-70.
XML Beep Support .................................................................................................5-72.
Status Scroll Delay .................................................................................................5-74.
Incoming Call Interrupts Dialing .............................................................................5-76.
Switch Focus to Ringing Line .................................................................................5-79.
Preferred Line and Preferred Line Timeout ............................................................5-81.
Goodbye Key Cancels Incoming Call .....................................................................5-85.
UPnP Mapping Lines (for remote phones) .............................................................5-87.
Message Waiting Indicator Line .............................................................................5-89.
DND Key Mode ......................................................................................................5-91.
Call Forward Mode .................................................................................................5-93.
Link Layer Discovery Protocol for Media Endpoint Devices (LLDP-MED) and Emergency
Location Identification Number (ELIN) ...................................................................5-97
.
Incoming/Outgoing Intercom with Auto-Answer and Barge In .............................5-102.
Group Paging RTP Settings .................................................................................5-107.
Key Mapping ........................................................................................................5-113.
Ring Tones and Tone Sets ...................................................................................5-117.
Priority Alerting .....................................................................................................5-122.
Directed Call Pickup (BLF or XML Call Interception) ...........................................5-129.
Softkeys/Programmable Keys/Feature Keys/Expansion Module Keys ................5-141.
Customizing the Key Type List in the Aastra Web UI ...........................................5-164.
Speeddial Prefixes ...............................................................................................5-167.
Enabling/Disabling Ability to Add or Edit a Speeddial Key ...................................5-168.
Busy Lamp Field (BLF) ........................................................................................5-169.
BLF Subscription Period ......................................................................................5-176.
BLF/Xfer and Speeddial/Xfer Keys ......................................................................5-178.
Draft 1
41-001160-03, Rev 00, Release 2.4 ix
Contents
Speeddial/Conference Key (not applicable to the 6751i) .....................................5-184.
Automatic Call Distribution (ACD) (for Sylantro Servers) .....................................5-188.
ACD Subscription Period .....................................................................................5-198.
BLA Subscription Period ......................................................................................5-200.
Directed Call Pickup/Group Call Pickup (for Sylantro Servers) ............................5-202.
Do Not Disturb (DND) ..........................................................................................5-211.
Bridged Line Appearance (BLA) ..........................................................................5-222.
BLA Support for Third Party Registration .............................................................5-229.
P-Preferred Identity Header for BLA Accounts ....................................................5-230.
BLA Support for Message Waiting Indicator (MWI) .............................................5-231.
Park/Pick Up Key .................................................................................................5-234.
Last Call Return (lcr) (Sylantro Servers) ..............................................................5-245.
Call Forwarding ....................................................................................................5-249.
Callers List ...........................................................................................................5-288.
Customizable Callers List and Services Keys ......................................................5-294.
Missed Calls Indicator ..........................................................................................5-295.
Directory List ........................................................................................................5-297.
Voicemail (9480i, 9480i CT, 6755i, 6757i, and 6757i CT only) .............................5-308.
XML Customized Services ...................................................................................5-311.
XML Override for a Locked Phone .......................................................................5-356.
Audio Transmit and Receive Gain Adjustments ...................................................5-357.
Centralized Conferencing (for Sylantro and Broadsoft Servers) ..........................5-359.
“SIP Join” Feature for 3-Way Conference (not applicable to the 6751i) ..............5-363.
Authentication Support for HTTP/HTTPS Download Methods, used with Broadsoft Client
Management System (CMS) ................................................................................5-365
.
Customizing the Display Columns on the M675i Expansion Module ...................5-368.
Chapter 6
Configuring Advanced
Operational Features
.
About this chapter ...........................................................................................................6-1.
Advanced Operational Features .....................................................................................6-3.
Description ...............................................................................................................6-3.
MAC Address/Line Number in REGISTER Messages .............................................6-5.
SIP Message Sequence for Blind Transfer ..............................................................6-7.
Draft 1
x 41-001160-03, Rev 00, Release 2.4
Contents
Update Caller ID During a Call .................................................................................6-8.
Boot Sequence Recovery Mode ..............................................................................6-9.
Auto-discovery Using mDNS ..................................................................................6-10.
Single Call Restriction (6757i CT and 9480i CT only) ............................................6-11.
Missed Call Summary Subscription .......................................................................6-13.
As-Feature-Event Subscription ..............................................................................6-17.
Blacklist Duration ...................................................................................................6-22.
Whitelist Proxy .......................................................................................................6-24.
Transport Layer Security (TLS) ..............................................................................6-26.
802.1x Support .......................................................................................................6-31.
Symmetric UDP Signaling ......................................................................................6-43.
Removing UserAgent and Server SIP Headers .....................................................6-44.
GRUU and sip.instance Support ............................................................................6-45.
Multi-Stage Digit Collection (Billing Codes) Support (for Sylantro Servers) ...........6-46.
Configurable DNS Queries .....................................................................................6-49.
Ignore Out of Sequence Errors ..............................................................................6-51.
“Early-Only” Parameter in Replaces Header RFC3891 .........................................6-52.
Reason Header Field in SIP Message ...................................................................6-52.
Chapter 7
Encrypted Files on the IP Phone
.
About this chapter ...........................................................................................................7-1.
Encrypted Files on the IP Phone ....................................................................................7-2.
Configuration File Encryption Method ......................................................................7-2.
Procedure to Encrypt Configuration Files ................................................................7-4.
Vendor Configuration File Encryption .......................................................................7-6.
Chapter 8
Upgrading the Firmware
.
About this chapter ...........................................................................................................8-1.
Upgrading the Firmware .................................................................................................8-2.
Using the “Firmware Update” Page in the Aastra Web UI .......................................8-2.
Using the Restart Feature ........................................................................................8-5.
Using the Auto-Resync Feature ...............................................................................8-7.
Draft 1
/