The document provides instructions for registering a Grandstream BT-200 phone with a PBXware server using either manual configuration, auto-provisioning, or auto-configuration. It outlines the requirements and steps to configure the UAD settings and create an extension on the PBXware server. The instructions also describe how to configure the Grandstream phone by accessing its web interface and setting the TFTP server. Once completed, the phone should successfully register with the PBXware system and be ready for use.
Rancher et Kubernetes sont le moteur de la majorité des applications modernes en production. Mais la chaine d'automatisation permettant de livrer du code l'esprit léger commence bien plus en amont grace à un outillage Open Source.
Au programme :
- Commit Code : Avec Gitlab et les outils de collaboration
- Build Image : Toujours plus de fiabilité avec les images SLE Base Container Image
- Store in Registry : Archivage et scan de vulnérabilité avec Harbor
- Test & Go : Livraison en continue avec le mode GitOps et Rancher Fleet
***** DevOps Masters Program : https://www.edureka.co/masters-program/devops-engineer-training *****
This DevOps Docker Commands tutorial ( Docker Tutorial Blog Series: https://goo.gl/z93Ed1 ) will introduce you to the most commonly used Docker commands. The Hands-On session is performed on an Ubuntu-64 bit machine in which Docker is installed.
To learn how Docker can be used to integrate multiple DevOps tools, watch the video titled 'DevOps Tools', by clicking this link: https://goo.gl/up9iwd
This talk discusses the core concepts behind the Kubernetes extensibility model. We are going to see how to implement new CRDs, operators and when to use them to automate the most critical aspects of your Kubernetes clusters.
Bartosz Tkaczewski - Przygód z Dockerem ciąg dalszy
http://www.tsh.io
Docker jest zauważalny już niemal wszędzie. Na prezentacji zobaczysz działające środowisko developerskie, poznasz kilka sztuczek, jak sobie z nim dobrze radzić i efektywnie pracować, zobaczysz też, jak szybko można prosty projekt wzbogacić o zaawansowane stacki aplikacji (na przykładzie ELK). Postaram się również opowiedzieć, jak można sobie z tym potworkiem poradzić na produkcji.
Prezentacja z Uszanowanka Programowanka #16 - http://www.meetup.com/Uszanowanko-Programowanko/events/234826115/
Rancher et Kubernetes sont le moteur de la majorité des applications modernes en production. Mais la chaine d'automatisation permettant de livrer du code l'esprit léger commence bien plus en amont grace à un outillage Open Source.
Au programme :
- Commit Code : Avec Gitlab et les outils de collaboration
- Build Image : Toujours plus de fiabilité avec les images SLE Base Container Image
- Store in Registry : Archivage et scan de vulnérabilité avec Harbor
- Test & Go : Livraison en continue avec le mode GitOps et Rancher Fleet
***** DevOps Masters Program : https://www.edureka.co/masters-program/devops-engineer-training *****
This DevOps Docker Commands tutorial ( Docker Tutorial Blog Series: https://goo.gl/z93Ed1 ) will introduce you to the most commonly used Docker commands. The Hands-On session is performed on an Ubuntu-64 bit machine in which Docker is installed.
To learn how Docker can be used to integrate multiple DevOps tools, watch the video titled 'DevOps Tools', by clicking this link: https://goo.gl/up9iwd
This talk discusses the core concepts behind the Kubernetes extensibility model. We are going to see how to implement new CRDs, operators and when to use them to automate the most critical aspects of your Kubernetes clusters.
Bartosz Tkaczewski - Przygód z Dockerem ciąg dalszy
http://www.tsh.io
Docker jest zauważalny już niemal wszędzie. Na prezentacji zobaczysz działające środowisko developerskie, poznasz kilka sztuczek, jak sobie z nim dobrze radzić i efektywnie pracować, zobaczysz też, jak szybko można prosty projekt wzbogacić o zaawansowane stacki aplikacji (na przykładzie ELK). Postaram się również opowiedzieć, jak można sobie z tym potworkiem poradzić na produkcji.
Prezentacja z Uszanowanka Programowanka #16 - http://www.meetup.com/Uszanowanko-Programowanko/events/234826115/
This is an introduction session to containers and docks. Why do we need this technology, why is it different from virtualization and how you can use it for your next project.
This presentation covers the basics of dockers, its security related features and how certain misconfigurations can be used to escape from container to host
DevSecOps is a word that combines development, security, and operations. DevSecOps deals with software development, operations, security, and services. It emphasizes communication, collaboration, and integration between software developers, security teams, and information technology operations personnel.
In this session, you will learn how to integrate security techniques into the DevOps process.
Jirayut Nimsaeng
Founder & CEO
Opsta (Thailand) Co., Ltd.
Youtube Record: https://youtu.be/mi8Zo9O6OUY
TechTalkThai Conference: Enterprise Cybersecurity 2021
October 5, 2021
Kubernetes or OpenShift - choosing your container platform for Dev and OpsTomasz Cholewa
Kubernetes has become the most popular choice among container orchestrators with strong community and growing numbers of production deployments. There is no shortage of various K8s distros, at the moment 20+ and counting. There are many distributions available that just simply add toolsets and products that embed it and adds more features. In this presentation, you'll learn about OpenShift and how it compares to vanilla Kubernetes - their major differences, best features and how they can help to build a consistent platform for Dev and Ops cooperation.
Linux Kernel Cryptographic API and Use CasesKernel TLV
The Linux kernel has a rich and modular cryptographic API that is used extensively by familiar user facing software such as Android. It's also cryptic, badly documented, subject to change and can easily bite you in unexpected and painful ways.
This talk will describe the crypto API, provide some usage example and discuss some of the more interesting in-kernel users, such as DM-Crypt, DM-Verity and the new fie system encryption code.
Gilad Ben-Yossef is a principal software engineer at ARM. He works on the kernel security sub-system and the ARM CryptCell engine. Open source work done by Gilad includes an experiment in integration of network processors in the networking stack, a patch set for reducing the interference caused to user space processes in large multi-core systems by Linux kernel “maintenance” work and on SMP support for the Synopsys Arc processor among others.
Gilad has co-authored O’Reilly’s “Building Embedded Linux Systems” 2nd edition and presented at such venues as Embedded Linux Conference Europe and the Ottawa Linux Symposium, as well as co-founded Hamakor, an Israeli NGO for the advancement for Open Source and Free Software in Israel. When not hacking on kernel code you can find Gilad meditating and making dad jokes on Twitter.
Aperçu de Docker et Kubernetes
Déploiement de Rancher
- Machine Provisioning
- Installation du serveur de Rancher
- Présentation de l'interface graphique
Déploiement de Kubernetes
- Installation du cluster Kubernetes
- Management du cluster Kubernetes
- Déploiement applicatif
My cloud native security talk I gave at Innotech Austin 2018. I cover container and Kubernetes security topics, security features in Kubernetes, including opensource projects you will want to consider while building and maintaining cloud native applications.
This talk explains what what Pod Security Policy is and it's importance in Kubernetes Security. The talk also takes a look at the current situation of docker hub's popular images and helm charts repository.
This talk stresses on the fact that having PSP enabled the right way is absolutely necessary for the real security of the cluster.
Link to the demos:
What is Pod Security Policy? https://www.youtube.com/watch?v=nrWRMP94vqc
Kubernetes Hostpath exploit thrawted with Pod Security Policy https://www.youtube.com/watch?v=APS0CfD6DsE
Everyone heard about Kubernetes. Everyone wants to use this tool. However, sometimes we forget about security, which is essential throughout the container lifecycle.
Therefore, our journey with Kubernetes security should begin in the build stage when writing the code becomes the container image.
Kubernetes provides innate security advantages, and together with solid container protection, it will be invincible.
During the sessions, we will review all those features and highlight which are mandatory to use. We will discuss the main vulnerabilities which may cause compromising your system.
Contacts:
LinkedIn - https://www.linkedin.com/in/vshynkar/
GitHub - https://github.com/sqerison
-------------------------------------------------------------------------------------
Materials from the video:
The policies and docker files examples:
https://gist.github.com/sqerison/43365e30ee62298d9757deeab7643a90
The repo with the helm chart used in a demo:
https://github.com/sqerison/argo-rollouts-demo
Tools that showed in the last section:
https://github.com/armosec/kubescape
https://github.com/aquasecurity/kube-bench
https://github.com/controlplaneio/kubectl-kubesec
https://github.com/Shopify/kubeaudit#installation
https://github.com/eldadru/ksniff
Further learning.
A book released by CISA (Cybersecurity and Infrastructure Security Agency):
https://media.defense.gov/2021/Aug/03/2002820425/-1/-1/1/CTR_KUBERNETES%20HARDENING%20GUIDANCE.PDF
O`REILLY Kubernetes Security:
https://kubernetes-security.info/
O`REILLY Container Security:
https://info.aquasec.com/container-security-book
Thanks for watching!
Introduction à Docker et utilisation en production /Digital apéro Besançon [1...Silicon Comté
Docker est une plateforme open source, pour les développeurs et les administrateurs systèmes, destinée à empaqueter une application et ses dépendances dans le but de l’exécuter sur n’importe quel serveur.
Il a pour objectif de faciliter le déploiement d’une application, d’avoir plusieurs versions de celle-ci et également d’automatiser son packaging tout en gardant un système de base propre.
Alexandre Di Pino nous présentera cette technologie et l’utilisation qu’il en fait dans un contexte de production.
A propos de l’intervenant
Titulaire d’un master en informatique à Epitech, Alexandre travaille au sein de la société InSimo, société développant un moteur physique temps réel pour la simulation médicale. Twitter : @a_dipino / LinkedIn : alexandredipino
Prometheus was recently accepted into the Cloud Native Computing Foundation, making it the second project after Kubernetes to be given their blessing and acknowledging that Prometheus and Kubernetes make an awesome combination. In this talk we'll cover common patterns for running Prometheus on Kubernetes, how to monitor services on Kubernetes, and some cool tips and hacks to ensure you get the most out of your Prometheus + Kubernetes deployment.
We have heard about several battery fires in the news recently. Most of us are completely unaware to how many types of batteries we use every day. The way we use them and how we treat them might be the difference between a good day and a personal disaster. WVU's Dr. Roy Nutter explains a lot of details about the various sorts of batteries and how they are used and how they function.
This is an introduction session to containers and docks. Why do we need this technology, why is it different from virtualization and how you can use it for your next project.
This presentation covers the basics of dockers, its security related features and how certain misconfigurations can be used to escape from container to host
DevSecOps is a word that combines development, security, and operations. DevSecOps deals with software development, operations, security, and services. It emphasizes communication, collaboration, and integration between software developers, security teams, and information technology operations personnel.
In this session, you will learn how to integrate security techniques into the DevOps process.
Jirayut Nimsaeng
Founder & CEO
Opsta (Thailand) Co., Ltd.
Youtube Record: https://youtu.be/mi8Zo9O6OUY
TechTalkThai Conference: Enterprise Cybersecurity 2021
October 5, 2021
Kubernetes or OpenShift - choosing your container platform for Dev and OpsTomasz Cholewa
Kubernetes has become the most popular choice among container orchestrators with strong community and growing numbers of production deployments. There is no shortage of various K8s distros, at the moment 20+ and counting. There are many distributions available that just simply add toolsets and products that embed it and adds more features. In this presentation, you'll learn about OpenShift and how it compares to vanilla Kubernetes - their major differences, best features and how they can help to build a consistent platform for Dev and Ops cooperation.
Linux Kernel Cryptographic API and Use CasesKernel TLV
The Linux kernel has a rich and modular cryptographic API that is used extensively by familiar user facing software such as Android. It's also cryptic, badly documented, subject to change and can easily bite you in unexpected and painful ways.
This talk will describe the crypto API, provide some usage example and discuss some of the more interesting in-kernel users, such as DM-Crypt, DM-Verity and the new fie system encryption code.
Gilad Ben-Yossef is a principal software engineer at ARM. He works on the kernel security sub-system and the ARM CryptCell engine. Open source work done by Gilad includes an experiment in integration of network processors in the networking stack, a patch set for reducing the interference caused to user space processes in large multi-core systems by Linux kernel “maintenance” work and on SMP support for the Synopsys Arc processor among others.
Gilad has co-authored O’Reilly’s “Building Embedded Linux Systems” 2nd edition and presented at such venues as Embedded Linux Conference Europe and the Ottawa Linux Symposium, as well as co-founded Hamakor, an Israeli NGO for the advancement for Open Source and Free Software in Israel. When not hacking on kernel code you can find Gilad meditating and making dad jokes on Twitter.
Aperçu de Docker et Kubernetes
Déploiement de Rancher
- Machine Provisioning
- Installation du serveur de Rancher
- Présentation de l'interface graphique
Déploiement de Kubernetes
- Installation du cluster Kubernetes
- Management du cluster Kubernetes
- Déploiement applicatif
My cloud native security talk I gave at Innotech Austin 2018. I cover container and Kubernetes security topics, security features in Kubernetes, including opensource projects you will want to consider while building and maintaining cloud native applications.
This talk explains what what Pod Security Policy is and it's importance in Kubernetes Security. The talk also takes a look at the current situation of docker hub's popular images and helm charts repository.
This talk stresses on the fact that having PSP enabled the right way is absolutely necessary for the real security of the cluster.
Link to the demos:
What is Pod Security Policy? https://www.youtube.com/watch?v=nrWRMP94vqc
Kubernetes Hostpath exploit thrawted with Pod Security Policy https://www.youtube.com/watch?v=APS0CfD6DsE
Everyone heard about Kubernetes. Everyone wants to use this tool. However, sometimes we forget about security, which is essential throughout the container lifecycle.
Therefore, our journey with Kubernetes security should begin in the build stage when writing the code becomes the container image.
Kubernetes provides innate security advantages, and together with solid container protection, it will be invincible.
During the sessions, we will review all those features and highlight which are mandatory to use. We will discuss the main vulnerabilities which may cause compromising your system.
Contacts:
LinkedIn - https://www.linkedin.com/in/vshynkar/
GitHub - https://github.com/sqerison
-------------------------------------------------------------------------------------
Materials from the video:
The policies and docker files examples:
https://gist.github.com/sqerison/43365e30ee62298d9757deeab7643a90
The repo with the helm chart used in a demo:
https://github.com/sqerison/argo-rollouts-demo
Tools that showed in the last section:
https://github.com/armosec/kubescape
https://github.com/aquasecurity/kube-bench
https://github.com/controlplaneio/kubectl-kubesec
https://github.com/Shopify/kubeaudit#installation
https://github.com/eldadru/ksniff
Further learning.
A book released by CISA (Cybersecurity and Infrastructure Security Agency):
https://media.defense.gov/2021/Aug/03/2002820425/-1/-1/1/CTR_KUBERNETES%20HARDENING%20GUIDANCE.PDF
O`REILLY Kubernetes Security:
https://kubernetes-security.info/
O`REILLY Container Security:
https://info.aquasec.com/container-security-book
Thanks for watching!
Introduction à Docker et utilisation en production /Digital apéro Besançon [1...Silicon Comté
Docker est une plateforme open source, pour les développeurs et les administrateurs systèmes, destinée à empaqueter une application et ses dépendances dans le but de l’exécuter sur n’importe quel serveur.
Il a pour objectif de faciliter le déploiement d’une application, d’avoir plusieurs versions de celle-ci et également d’automatiser son packaging tout en gardant un système de base propre.
Alexandre Di Pino nous présentera cette technologie et l’utilisation qu’il en fait dans un contexte de production.
A propos de l’intervenant
Titulaire d’un master en informatique à Epitech, Alexandre travaille au sein de la société InSimo, société développant un moteur physique temps réel pour la simulation médicale. Twitter : @a_dipino / LinkedIn : alexandredipino
Prometheus was recently accepted into the Cloud Native Computing Foundation, making it the second project after Kubernetes to be given their blessing and acknowledging that Prometheus and Kubernetes make an awesome combination. In this talk we'll cover common patterns for running Prometheus on Kubernetes, how to monitor services on Kubernetes, and some cool tips and hacks to ensure you get the most out of your Prometheus + Kubernetes deployment.
We have heard about several battery fires in the news recently. Most of us are completely unaware to how many types of batteries we use every day. The way we use them and how we treat them might be the difference between a good day and a personal disaster. WVU's Dr. Roy Nutter explains a lot of details about the various sorts of batteries and how they are used and how they function.
• Create a business model for a start up in an established market and present the business concept, highlight critical success factors and layout the competitive framework of the industry
• In the video rental market, my team was asking investors to put money into HappyKids, an online kids focused content streaming and downloading website.
The Nature of Responsibility of an Undertaking in Antitrust Proceedings and t...Michal
The present article aims to answer the question whether an undertaking’s
responsibility (sometimes also referred to as liability) in an antitrust proceeding held
by the President of the Office of Competition and Consumer Protection (the Polish
National Competition Authority) is of a criminal nature. The notion of ‘criminal
charge’ is rather extensively construed in the jurisprudence of European Court
of Human Rights, which has formulated the criteria for criminal responsibility.
Taking these criteria into account, the author postulates that the severe character
of pecuniary sanctions imposed in Polish antitrust proceedings is an argument for the criminal character of the proceedings. Thus the guarantees of Article 6 of the
European Convention on Human Rights should be applicable to Polish antitrust
proceedings.
Congratulations……!!!!! A Good news for all of us. Now you can buy all electronic products like bluetooth relays, iPhone relays to automate your home, Fusion Series Controllers, Ethernet Controlled Relay, ethernet relay, ethernet relay control, remote controlled electrical switch, remote controlled dimmer, Push Notifications IOS, ios push notification server, wifi power switch, home automation ideas, wifi relay controller etc. only at https://www.controlanything.co.in/
Siemens catalog hmi-td 200 operator interfaceDien Ha The
Tự Động Hóa Siemens,
Catalog Thiết Bị Điện Tự Động Hóa Siemens,
Catalog Phụ Kiện Tự Động Hóa Siemens,
Catalog Tự Động Hóa Siemens,
http://dienhathe.com,
Chi tiết các sản phẩm khác của Tự Động Hóa Siemens tại https://dienhathe.com
Xem thêm các Catalog khác của Tự Động Hóa Siemens tại https://dienhathe.info
Để nhận báo giá sản phẩm Tự Động Hóa Siemens vui lòng gọi: 0907.764.966
Connect to Internet using your "Phone" as ModemDanish Mehraj
This is how to connect your PC to Internet using your Phone as Modem.
NOTE: If you are connecting using USB then you may need USB Driver for that specific phone.
If you are connecting via Bluetooth, then no need of anything.
Siemens catalog hmi-td 200 operator interface 1Dien Ha The
Tự Động Hóa Siemens,
Catalog Thiết Bị Điện Tự Động Hóa Siemens,
Catalog Phụ Kiện Tự Động Hóa Siemens,
Catalog Tự Động Hóa Siemens,
http://dienhathe.com,
Chi tiết các sản phẩm khác của Tự Động Hóa Siemens tại https://dienhathe.com
Xem thêm các Catalog khác của Tự Động Hóa Siemens tại https://dienhathe.info
Để nhận báo giá sản phẩm Tự Động Hóa Siemens vui lòng gọi: 0907.764.966
Lightspeed II Marine WiFi Hotspot Sharing System - Zero Coax Cable - Marine WiFi Router System - Share WiFi Hotspots onboard your yacht or other marine vessel
3. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or
mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the
written permission of the publisher.
Products that are referred to in this document may be either trademarks and/or registered trademarks of the
respective owners. The publisher and the author make no claim to these trademarks.
While every precaution has been taken in the preparation of this document, the publisher and the author assume no
responsibility for errors or omissions, or for damages resulting from the use of information contained in this
document or from the use of programs and source code that may accompany it. In no event shall the publisher and
the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused
directly or indirectly by this document.
Printed: avgust 2010
Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
Publisher
Special thanks to:
Managing Editor
Technical Editors
Cover Designer
...
...
...
...
...
Production
...
Team Coordinator
...
4. Grandstream BT-200 How ToI
(c) 2003-2010 Bicom Systems
Table of Contents
Foreword I
Part I Introduction 2
Part II Registering Grandstream BT-200 4
................................................................................................................................... 41 Requirements
................................................................................................................................... 42 Manual Configuration
......................................................................................................................................................... 4UAD Settings
......................................................................................................................................................... 7Creating Extension
......................................................................................................................................................... 10Registering Phone
................................................................................................................................... 133 Auto Provisioning
......................................................................................................................................................... 13UAD Settings
......................................................................................................................................................... 16Creating Extension
......................................................................................................................................................... 19Registering Phone
................................................................................................................................... 224 Auto Configuration
......................................................................................................................................................... 22Requirements
......................................................................................................................................................... 22Auto Configuration
Part III Glossary 28
Index 0
7. 2Introduction
(c) 2003-2010 Bicom Systems
1 Introduction
Grandstream BT-200
How to use Grandstream BT-200 with PBXware
This "How to" is written to as general guide on how to use your Grandstream BT-200
with PBXware using 1.0.8.16 Grandstream BT-200 firmware. It covers the most
common tasks required in order to have your Grandstream BT-200 working efficiently.
9. 4Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
2 Registering Grandstream BT-200
- Requirements
- Manual Configuration
- Auto Provisioning
- Auto Configuration
2.1 Requirements
1. Grandstream BT-200 firmware.
- Make sure that device is loaded with 1.0.8.16 firmware.
2. DHCP server.
- Fully configured and operational DHCP server.
2.2 Manual Configuration
- UAD Settings
- Creating Extension
- Registering Phone
2.2.1 UAD Settings
STEP ONE: PBXware IP address.
1. Find out the IP address of PBXware server.
STEP TWO: Login to PBXware.
1. Open a new browser window and enter the IP address to access the PBXware
administration interface login screen.
Example: http://192.168.1.2
an example with IP address
2. Hit "Enter" on your keyboard.
3. Login to PBXware with your e-mail address and password.
10. 5 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
STEP THREE: UAD status.
1. Make sure the UAD is enabled. To check the UAD status navigate to "Settings:UAD",
and click on the "edit" icon corresponding to "Grandstream BT-200".
11. 6Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
2. Make sure "Status" is set to "active", "Auto provisioning" is set to "Yes" and "DHCP"
is set to "Yes".
12. 7 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
3. Click on the "Save" button to save changes.
2.2.2 Creating Extension
STEP ONE: Add Extension.
1. Navigate to "Extensions". Click on "Add Extension".
2. The standard options window will be shown below.
3. Select Grandstream BT-200 from "UAD" select box.
4. Select Location: "Local" or "Remote".
13. 8Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
Note:
-"Local" is for all extensions registered on LAN.
-"Remote" is for all extensions registered from remote networks, WAN, Internet etc.
5. Click on the "Next" button.
STEP TWO: Extension values.
1. Enter values into required field text boxes.
REQUIRED FIELDS:
Name:
Enter a name for the extension being created. Example: John Doe.
E-mail:
Enter the e-mail address associated with this extension. This e-mail address will
receive all system notification messages. Example: john@domain.com
Auto provisioning:
Set to "Yes".
MAC Address:
Grandstream BT-200 MAC address. Example: 001646f5f797
14. 9 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
an example with details filled in
2. Click on the "Save" button.
an example with details filled in
3. Click on the "Save & E-mail" button. Account details will be sent to the e-mail address
associated with this extension.
OPTIONAL FIELDS:
Extension:
An auto-generated extension number based on the next available sequential
number. An extension value can be changed. Example: 1000.
Username:
Username is auto generated/populated and cannot be changed since it allows the
system to use this value for other important operations.
Secret:
A secret value associated with the UAD is auto-generated in order to allow the UAD
to successfully register with the system. The secret value can be changed.
15. 10Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
PIN:
An auto-generated PIN will allow access to voicemail and online self care.
2.2.3 Registering Phone
STEP ONE: Electricity and Ethernet.
- The Grandstream BT-200 needs electricity. Plug the adapter into its jack then
connect it to the electricity network.
- Connect ethernet port to a hub, router or switch as access to LAN
After successfully connecting the Grandstream BT-200 to the electricity and data
networks it is time to register it to PBXware.
"TFTP Server" must be set with TFTP server value.
STEP TWO: Grandstream BT-200 IP address.
Find out the IP address of the Grandstream BT-200 connected to network.
1. Press the "Menu" button.
2. On the display screen, scroll to the IP address using "Up and Down button".
3. Press the "Menu" button.
16. 11 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
STEP THREE: Grandstream BT-200 Web Interface.
1. Open a new browser window and enter the IP address in order to access the
Grandstream BT-200 administration interface.
Example: http://192.168.1.101
an example with IP address
2. Hit "Enter" on your keyboard.
STEP FOUR: Configuring TFTP server.
1. Login to the Grandstream BT-200 Web Interface. The factory default password is
lower case "admin".
17. 12Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
2. Navigate down to "Firmware Upgrade".
- Config Server Path" must be set with TFTP server value. Example: 192.168.1.2
an example with details filled in
3. Navigate down and click on the "Update" button.
4. Click on the "Reboot" button. The Grandstream BT-200 will reboot for changes to
take effect.
- Conclusion: If everything is done as above described you should have successfully
registered your Grandstream BT-200 to PBXware. Dial *123 to verify registration.
18. 13 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
- For further information, please contact the manufacturer or check their web site www.
grandstream.com.
2.3 Auto Provisioning
- UAD Settings
- Creating Extension
- Registering Phone
2.3.1 UAD Settings
STEP ONE: PBXware IP address.
1. Find out the IP address of the PBXware server.
STEP TWO: Login to PBXware.
1. Open a new browser window and enter the IP address to access the PBXware
administration interface login screen.
Example: http://192.168.1.2
an example with IP address
2. Hit "Enter" on your keyboard.
3. Login to PBXware with your e-mail address and password.
19. 14Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
STEP THREE: UAD status.
1. Make sure the UAD is enabled. To check the UAD status navigate to "Settings:UAD",
and click on the "edit" icon corresponding to "Grandstream BT-200".
20. 15 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
2. Make sure "Status" is set to "active", "Auto provisioning" is set to "Yes" and "DHCP"
is set to "Yes".
21. 16Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
3. Click on the "Save" button to save changes.
2.3.2 Creating Extension
STEP ONE: Add Extension.
1. Navigate to "Extensions". Click on "Add Extension".
2. The standard options window will be shown below.
3. Select Grandstream BT-200 from "UAD" select box.
4. Select Location: "Local" or "Remote".
22. 17 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
Note:
-"Local" is for all extensions registered on LAN.
-"Remote" is for all extensions registered from remote networks, WAN, Internet etc.
5. Click on the "Next" button.
STEP TWO: Extension values.
1. Enter values into required field text boxes.
REQUIRED FIELDS:
Name:
Enter a name for the extension being created. Example: John Doe.
E-mail:
Enter the e-mail address associated with this extension. This e-mail address will
receive all system notification messages. Example: john@domain.com
Auto provisioning:
Set to "Yes".
MAC Address:
Grandstream BT-200 MAC address. Example: 001646f5f797
23. 18Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
an example with details filled in
2. Click on the "Save" button.
an example with details filled in
3. Click on the "Save & E-mail" button. Account details will be sent to the e-mail address
associated with this extension.
OPTIONAL FIELDS:
Extension:
An auto-generated extension number based on the next available sequential
number. An extension value can be changed. Example: 1000.
Username:
Username is auto generated/populated and cannot be changed since it allows the
system to use this value for other important operations.
Secret:
A secret value associated with the UAD is auto-generated in order to allow the UAD
to successfully register with the system. The secret value can be changed.
24. 19 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
PIN:
An auto-generated PIN will allow access to voicemail and online self care.
2.3.3 Registering Phone
STEP ONE: Electricity and Ethernet.
- The Grandstream BT-200 needs electricity. Plug the adapter into its jack then
connect it to the electricity network.
- Connect the ethernet port to a hub, router or switch as to access LAN.
After successfully connecting your Grandstream BT-200 to the electricity and data
networks it is time to register it to PBXware.
"TFTP Server" must be set with TFTP server value.
STEP TWO: Grandstream BT-200 IP address.
Find out the IP address of Grandstream BT-200 connected to network.
1. Press the "Menu" button.
2. On the display screen, scroll to the IP address using "Up and Down button".
3. Press the "Menu" button.
25. 20Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
STEP THREE: Grandstream BT-200 Web Interface.
1. Open a new browser window and enter the IP address in order to access
Grandstream BT-200 administration interface.
Example: http://192.168.1.101
an example with IP address
2. Hit "Enter" on your keyboard.
STEP FOUR: Configuring TFTP server.
1. Login to the Grandstream BT-200 Web Interface. The factory default password is
lower case "admin".
26. 21 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
2. Navigate down to "Firmware Upgrade".
- Config Server Path" must be set with TFTP server value. Example: 192.168.1.2
an example with details filled in
3. Navigate down and click on the "Update" button.
4. Click on the "Reboot" button. Grandstream BT-200 will reboot for changes to take
effect.
an example with details filled in
- Conclusion: If everything is done as above described you should have successfully
27. 22Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
registered your Grandstream BT-200 to PBXware. Dial *123 to verify registration.
- For further information, please contact the manufacturer or check their web site www.
grandstream.com.
2.4 Auto Configuration
- Requirements
- Auto Configuration
2.4.1 Requirements
1. Make sure that your devices are properly connected to the same LAN as your
PBXware.
2. Ensure that all devices are set to Factory Defaults.
3. Ensure that all devices are using port 5060.
2.4.2 Auto Configuration
1. Navigate to "Extensions: Find Phones".
2. A pop up window will appear. Input range of IP addresses
Example:
- Start IP: 192.168.1.2
- End IP: 192.168.1.254
3. Click on the "Start" button. The PBXware will search for devices connected to the
same LAN in selected range of IP addresses.
28. 23 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
an example with range of IP addresses
4. After PBXware has finished searching for devices, a list of all devices found will be
shown.
5. Change activation status from "Not Activated" to "Auto Configuration" for one or
more displayed devices by your choice.
6. Click on the "edit" button next to the activation select box to enter properties for
selected device.
29. 24Registering Grandstream BT-200
(c) 2003-2010 Bicom Systems
an example with list of found devices
7. After you have edited a device, a pop up window will appear.
30. 25 Grandstream BT-200 How To
(c) 2003-2010 Bicom Systems
an example with 1 configured line
8. The Grandstream BT-200 has 4 lines available, you can configure just one or all of
them as shown above.
Line 1 example
Name: John Smith
E-mail: john@domain.com
Ext: 1000
PIN: 1223
Secret: Enter an at least 6 digit or letter long secret.
9. Click on the "Save" button, entered values will be saved and the pop up window will
disappear.
10. Click on the "Save" button shown below to finalize "Auto Configuration",
33. 28Glossary
(c) 2003-2010 Bicom Systems
3 Glossary
- DHCP = Dynamic Host Configuration Protocol (DHCP) is a communications protocol
that lets network administrators manage and automate the assignment of Internet.
- HUB = A common connection point for devices in a network.
- IP Address = Internet Protocol address.
- Local = A local area network (LAN) is a computer network covering a local area, like a
home, office or small group of buildings such as a college.
- LAN = Local Area Network.
- PIN = Personal Identification Number.
- Remote = Network devices that are managed or controlled from a network system
other than the system to which they are directly connected.
- Router = A device that forwards data packets from one local area network (LAN) or
wide area network (WAN) to another.
- Switch = Network device that selects a path or circuit for sending a unit of data to its
next destination.
- UAD = User Agent Device.
- VoiceMail = The electronic transmission of voice messages over the Internet. The
messages are stored on a computer until the recipient accesses and listens to them.
- WAN = Wide Area Network.
- Web Interface = A web interface is the system of controls with which the user
controls a device.