SlideShare a Scribd company logo
Asterisk™ BLF Configuration for GXP2000 Page 1 of 3
Grandstream Networks, Inc. 09/2009
Asterisk™ Configuration & Busy Lamp Field (BLF) for the GXP2000
This configuration enables a user to use the speed dial key as an Asterisk™ BLF key so that:
• When JaneDoe1 with extension 502 receives a call, the key 2 LED will be flashing in red, and
the user can pick up the call for JaneDoe1 by simply pressing key 2. The GXP-2000 will send a
SIP INVITE with “**502” to Asterisk™.
• When JaneDoe1 picks up the call, the key 2 LED will become solid red
• When JaneDoe1 is making a call, the key 2 LED will become solid red as well.
• If the key 2 LED is not red, pressing key 2 will initiate a call to JaneDoe1 at extension 502
To enable the Asterisk™ BLF, you need to update both the GXP2000 configuration and the Asterisk™
configuration.
GXP-2000 Configuration
In the Basic Settings web configuration page, configure the Multi Purpose Keys to be used. Set the Key
Mode to Busy Lamp Field (BLF), and specify Account to the SIP account that will be using the BLF key.
Lastly, use the Name field to label the key and set User ID to the User ID of the user to be monitored:
Asterisk™ BLF Configuration for GXP2000 Page 1 of 3
Grandstream Networks, Inc. 09/2009
Asterisk™ Configuration:
1. To monitor the status of other users, the GXP-2000 subscribes to hints from Asterisk. The
following configuration in the extensions.conf file creates two groups of extensions which are hinted:
[BLF_Group_1]
exten => 501,hint,SIP/501
exten => 502,hint,SIP/502
exten => 503,hint,SIP/503
[BLF_Group_2]
exten => 504,hint,SIP/504
exten => 505,hint,SIP/505
exten => 506,hint,SIP/506
exten => 507,hint,SIP/507
2. To monitor and pickup other users with BLF keys, a user’s SIP account must first be set to subscribe
to a BLF group. The configuration below demonstrates two SIP accounts configured as such in the
sip.conf file:
[501]
type=friend
username=501
secret=mypassword
context=internal
host=dynamic
nat=yes
subscribecontext=BLF_Group_1
[504]
type=friend
username=504
secret=mypassword
context=internal
host=dynamic
nat=yes
subscribecontext=BLF_Group_2
Using Asterisk version 1.4
Under each of the above users, a call-limit needs to be placed. Use something overly-generous,
such as:
call-limit=20
Under the [general] settings in sip.conf, the following line needs to be added:
limitonpeers=yes
Asterisk™ BLF Configuration for GXP2000 Page 1 of 3
Grandstream Networks, Inc. 09/2009
3. When a call is ringing to a user, all BLF key LEDs set to monitor that user will become flashing red. If
an attempt is made to pick up the call by pressing the BLF key, the GXP-2000 will send the UserID of
the ringing user, prefixed by “**”. For example, if JaneDoe1 at UserID 502 shows flashing red, pressing
the BLF key will trigger the GXP-2000 to dial “**502” to Asterisk.
Configure Asterisk to match any **5XX call and pick up the call ringing at 5XX by configuring the
following in the extensions.conf file:
[BLF_group_pickup]
exten => _**5XX,1,Pickup(${EXTEN:2})
exten => _**5XX,2,Hangup
You can either add the two dial-plan lines above to the context that your SIP accounts are in (i.e.
internal), or you may create it as a separate context, as shown above. If in a separate context, the
context will need to be included in the context that your SIP accounts are in. For example, under
context “internal”, you can add the following line:
include => BLF_group_pickup
4. When configuration changes are complete, first reload the extensions and the chan_sip.so module in
Asterisk, or simply restart the service. The commands vary depending on the version of Asterisk. Then
update the changes on the GXP-2000 and reboot the phone. If the GXP-2000 is rebooted before the
Asterisk modules are reloaded, it may take a short moment before the BLF LEDs begin to monitor on
the GXP-2000.

More Related Content

Similar to Gxp2000 interop asterisk_blf

CLP S7 300 E S7 400
CLP S7 300 E S7 400 CLP S7 300 E S7 400
CLP S7 300 E S7 400 confidencial
 
Hướng dẫn sử dụng tổng đài IP của Grandstream
Hướng dẫn sử dụng tổng đài IP của GrandstreamHướng dẫn sử dụng tổng đài IP của Grandstream
Hướng dẫn sử dụng tổng đài IP của Grandstream
www.thegioitongdai .com.vn
 
procedure_to_config_OSS_over_IP (2).ppt
procedure_to_config_OSS_over_IP (2).pptprocedure_to_config_OSS_over_IP (2).ppt
procedure_to_config_OSS_over_IP (2).ppt
Arbab Husain
 
Cucm bk b1000_f29_00_be6k-install-guide-10
Cucm bk b1000_f29_00_be6k-install-guide-10Cucm bk b1000_f29_00_be6k-install-guide-10
Cucm bk b1000_f29_00_be6k-install-guide-10용원 이
 
Cucm bk b1000_f29_00_be6k-install-guide-10
Cucm bk b1000_f29_00_be6k-install-guide-10Cucm bk b1000_f29_00_be6k-install-guide-10
Cucm bk b1000_f29_00_be6k-install-guide-10용원 이
 
Gxe502x usermanual english
Gxe502x usermanual englishGxe502x usermanual english
Gxe502x usermanual english
jaxian
 
Asibul Ahsan(063473056)
Asibul Ahsan(063473056)Asibul Ahsan(063473056)
Asibul Ahsan(063473056)mashiur
 
Security context on asa firewall
Security context on asa firewallSecurity context on asa firewall
Security context on asa firewall
NetProtocol Xpert
 
Integra sppt-elastix-asterisk-configuration
Integra sppt-elastix-asterisk-configurationIntegra sppt-elastix-asterisk-configuration
Integra sppt-elastix-asterisk-configuration
Mohammed Taher Alhomadei
 
Grandstream gxw42xx-configuration
Grandstream gxw42xx-configurationGrandstream gxw42xx-configuration
Grandstream gxw42xx-configuration
Silvano Ferreira de Souza
 
Getting started
Getting startedGetting started
Getting startedrovan21
 

Similar to Gxp2000 interop asterisk_blf (13)

CLP S7 300 E S7 400
CLP S7 300 E S7 400 CLP S7 300 E S7 400
CLP S7 300 E S7 400
 
Hướng dẫn sử dụng tổng đài IP của Grandstream
Hướng dẫn sử dụng tổng đài IP của GrandstreamHướng dẫn sử dụng tổng đài IP của Grandstream
Hướng dẫn sử dụng tổng đài IP của Grandstream
 
procedure_to_config_OSS_over_IP (2).ppt
procedure_to_config_OSS_over_IP (2).pptprocedure_to_config_OSS_over_IP (2).ppt
procedure_to_config_OSS_over_IP (2).ppt
 
Cucm bk b1000_f29_00_be6k-install-guide-10
Cucm bk b1000_f29_00_be6k-install-guide-10Cucm bk b1000_f29_00_be6k-install-guide-10
Cucm bk b1000_f29_00_be6k-install-guide-10
 
Cucm bk b1000_f29_00_be6k-install-guide-10
Cucm bk b1000_f29_00_be6k-install-guide-10Cucm bk b1000_f29_00_be6k-install-guide-10
Cucm bk b1000_f29_00_be6k-install-guide-10
 
Gxe502x usermanual english
Gxe502x usermanual englishGxe502x usermanual english
Gxe502x usermanual english
 
Asibul Ahsan(063473056)
Asibul Ahsan(063473056)Asibul Ahsan(063473056)
Asibul Ahsan(063473056)
 
Security context on asa firewall
Security context on asa firewallSecurity context on asa firewall
Security context on asa firewall
 
Integra sppt-elastix-asterisk-configuration
Integra sppt-elastix-asterisk-configurationIntegra sppt-elastix-asterisk-configuration
Integra sppt-elastix-asterisk-configuration
 
Slim Server Practical
Slim Server PracticalSlim Server Practical
Slim Server Practical
 
LTRSEC-2017-LG
LTRSEC-2017-LGLTRSEC-2017-LG
LTRSEC-2017-LG
 
Grandstream gxw42xx-configuration
Grandstream gxw42xx-configurationGrandstream gxw42xx-configuration
Grandstream gxw42xx-configuration
 
Getting started
Getting startedGetting started
Getting started
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Gxp2000 interop asterisk_blf

  • 1. Asterisk™ BLF Configuration for GXP2000 Page 1 of 3 Grandstream Networks, Inc. 09/2009 Asterisk™ Configuration & Busy Lamp Field (BLF) for the GXP2000 This configuration enables a user to use the speed dial key as an Asterisk™ BLF key so that: • When JaneDoe1 with extension 502 receives a call, the key 2 LED will be flashing in red, and the user can pick up the call for JaneDoe1 by simply pressing key 2. The GXP-2000 will send a SIP INVITE with “**502” to Asterisk™. • When JaneDoe1 picks up the call, the key 2 LED will become solid red • When JaneDoe1 is making a call, the key 2 LED will become solid red as well. • If the key 2 LED is not red, pressing key 2 will initiate a call to JaneDoe1 at extension 502 To enable the Asterisk™ BLF, you need to update both the GXP2000 configuration and the Asterisk™ configuration. GXP-2000 Configuration In the Basic Settings web configuration page, configure the Multi Purpose Keys to be used. Set the Key Mode to Busy Lamp Field (BLF), and specify Account to the SIP account that will be using the BLF key. Lastly, use the Name field to label the key and set User ID to the User ID of the user to be monitored:
  • 2. Asterisk™ BLF Configuration for GXP2000 Page 1 of 3 Grandstream Networks, Inc. 09/2009 Asterisk™ Configuration: 1. To monitor the status of other users, the GXP-2000 subscribes to hints from Asterisk. The following configuration in the extensions.conf file creates two groups of extensions which are hinted: [BLF_Group_1] exten => 501,hint,SIP/501 exten => 502,hint,SIP/502 exten => 503,hint,SIP/503 [BLF_Group_2] exten => 504,hint,SIP/504 exten => 505,hint,SIP/505 exten => 506,hint,SIP/506 exten => 507,hint,SIP/507 2. To monitor and pickup other users with BLF keys, a user’s SIP account must first be set to subscribe to a BLF group. The configuration below demonstrates two SIP accounts configured as such in the sip.conf file: [501] type=friend username=501 secret=mypassword context=internal host=dynamic nat=yes subscribecontext=BLF_Group_1 [504] type=friend username=504 secret=mypassword context=internal host=dynamic nat=yes subscribecontext=BLF_Group_2 Using Asterisk version 1.4 Under each of the above users, a call-limit needs to be placed. Use something overly-generous, such as: call-limit=20 Under the [general] settings in sip.conf, the following line needs to be added: limitonpeers=yes
  • 3. Asterisk™ BLF Configuration for GXP2000 Page 1 of 3 Grandstream Networks, Inc. 09/2009 3. When a call is ringing to a user, all BLF key LEDs set to monitor that user will become flashing red. If an attempt is made to pick up the call by pressing the BLF key, the GXP-2000 will send the UserID of the ringing user, prefixed by “**”. For example, if JaneDoe1 at UserID 502 shows flashing red, pressing the BLF key will trigger the GXP-2000 to dial “**502” to Asterisk. Configure Asterisk to match any **5XX call and pick up the call ringing at 5XX by configuring the following in the extensions.conf file: [BLF_group_pickup] exten => _**5XX,1,Pickup(${EXTEN:2}) exten => _**5XX,2,Hangup You can either add the two dial-plan lines above to the context that your SIP accounts are in (i.e. internal), or you may create it as a separate context, as shown above. If in a separate context, the context will need to be included in the context that your SIP accounts are in. For example, under context “internal”, you can add the following line: include => BLF_group_pickup 4. When configuration changes are complete, first reload the extensions and the chan_sip.so module in Asterisk, or simply restart the service. The commands vary depending on the version of Asterisk. Then update the changes on the GXP-2000 and reboot the phone. If the GXP-2000 is rebooted before the Asterisk modules are reloaded, it may take a short moment before the BLF LEDs begin to monitor on the GXP-2000.