Setup of key parameters of a system is made in this section . These settings are recommended to be configured right after installation of PBX.
Enter the Name of a PBX system , and it will be displayed on the homepage of Miko PBX. The additional description will be seen only by system administrators. You can select one of two available languages for system messages in this subsection.
Set length of extensions : possible range is from three to six digits. By means of switches you can turn on/off record of a talk in Miko PBX or turn on/off restart of Miko PBX every night.
Two options of the parking of a call from the client will be of use in Miko PBX:
Range of slot numbers of the parked call can be set in the section Call transfers : Initial parking slot and End parking slot.
Miko PBX offers two types of call transfers: attended and blind .
ou can talk to the person before readdressing a call when using attended translation . The calling party is on deduction at this time. Readdressing successfully comes to the end after the person who readdresses a call hangs up a receiver.
If you translate a call, without having talked previously to the colleague, then this translation blind. For example, if the second incoming call goes to you, and you already speak by phone. You transfer a new call to the free colleague not to interrupt the current call.
Timeout is defined for all types of translations. All values are stated by default in the drawing. The maximum timeout in milliseconds at input of the extension number makes 2500 sec. Time of return of a call if is not present the answer after unconditional translation - 45 sec. It is possible to change values of these timeouts in the section “Call transfers”.
Session Initiation Protocol (SIP) is the signal protocol used by the majority of the VoIP phones. You can change SIP port (by default port 5060) for increase in safety. Besides, to SIP providers additional parameters, such as the registration Periods (Through which time registration will be reset) are necessary for some. Some firewalls close ports after the inactivity period. Such behavior can demand to reduce waiting time of registration of SIP providers. Need in different timeouts can be other cause at registration some SIP providers. Values by default:
In real time Transport Protocol (RTP) determines a standard format for transfer of audio and video by IP networks. By default, RTP uses the range of ports between 10000 and 10200 . For some routers and firewalls, perhaps, it will be required to configure the range of ports. One more reason for setup of range of ports - a large number of parallel calls. Each call uses two RTP ports. It means that if there are 200 ports, then only 100 parallel calls are possible. If your telephone system should process more calls at the same time, it is necessary to expand the range of ports.
Asterisk Manger Interface (AMI) — the powerful and convenient application programming interface (API) Asterisk for system management from external programs. Thanks to AMI external programs can carry out connections with Asterisk by means of the TCP protocol, initiate execution of commands, read out result of their execution, and also receive notifications on the taking place events in real time. AMI often use for integration with business processes and systems, the software of CRM (Customer Relationship Managment — management of interaction with clients). AMI accepts the connections set on the network port (by default - TCP port 5038 ). The client software program is connected to AMI through this port and authenticated, after this Asterisk will respond to the requests and also to send notifications on state changes of the set subsystems.
SSH or Secure Shell — the ciphered protocol which is often used for interaction and remote control by servers. The SSH server can carry out authentication of users by means of different algorithms. The most popular is password authentication . It is rather simple, but not really safe. Passwords are transferred on secure channel, but they are insufficiently difficult for opposition to search attempts. Computing power of modern systems in a combination to special scripts do search very simple.
There is safer and reliable way of authentication — SSHA keys . Each couple of keys consists of public and private key. The secret key remains on client side and should not be available to someone else. Leakage of a key will allow the malefactor to enter on the server if additional password authentication was not configured.
The public key is used for enciphering of messages which can be decrypted only private key. This property is also used for authentication by means of couple of keys. The public key is loaded on a remote server to which it is necessary to get access. It needs to be added to the special file ~/.ssh/authorized_keys.
When the client tries to execute authentication through this key, the server will send the message ciphered by means of public key if the client is able to decrypt it and to return the correct answer — authentication is undergone.
Public (open) SSH key is possible to save on automatic telephone exchange in the field of SSH AuthorizedKeys . If you have several public clavicles, then it is possible to copy them in a row, a divider - blank line.
In this subsection for increase in safety you can change HTTP port (by default port 80) or to activate the HTTPS mode.
HTTPS (HyperText Transfer Protocol Secure) — expansion of the HTTP protocol for support of enciphering for the purpose of increase in safety. Data are transferred in the HTTPS protocol over the cryptographic SSL or TLS protocols. Unlike HTTP with TCP port 80, for HTTPS TCP port 443 is by default used.
It is necessary to change the Login of the WEB interface and the Password of the WEB interface in this subsection .