AASTRA SIP-DECT (Release 2.1)- OM System Manual - Installation, Administration and Maintenance EN User Manual

Page 171

Advertising
background image

SIP – DECT OM System Manual Release 2.1

8 Maintenance

depl-1230/1.3

Page: 171 (196)

Display of DECT transactions IP DECT base station <–> telephone in clear tabular form
with highlighting of handover situations. Real-time display.

Display of further events concerning the status or actions of IP DECT base stations and
telephones of the SIP – DECT system.

All events can also be recorded in a log file.

Display of the synchronization relations between the RFPs.

Monitoring of systems with up to 256 IP DECT base stations and 512 PPs.

Reading out and display of IP DECT RFP statistics data, either for a single IP DECT RFP
or for all IP DECT RFPs.

Display of DECT central data of the SIP – DECT system.

The DECT Monitor program can only be used when the

DECT monitor

checkbox is

activated on the flag in the OMM

System settings

web page (see also chapter 5.4.1).

Please note:

Because of security, the DECT monitor flag is not stored permanently in the
internal flash memory of the OMM/RFP. After a reset the DECT monitor flag is
disabled.

The DECT monitor program is used together with the SIP – DECT system. When the
program is started, the user is requested to enter the IP address of the IP DECT RFP or the
server running the OpenMobility Manager (OMM) software.

There can be several reasons for an unsuccessful link establishment:

Operation of DECT monitor is not enabled inside the OMM. Use the OMM web service to
enable DECT monitor operation.

IP address is not correct. It has to be the address of the RFP the OMM is running on.

A link routed to the RFP is not supported.

The program displays the IP address which was used last time. When the program is started,
a link to the OMM is automatically established and the program window shows all user
configured child windows and tables. When all links have been established, the DECT data
of the system are automatically read out and entered in the tables “RFP-Table” and “PP-
Table”. This procedure is called “Config Request”.

Advertising