SC-ETC-001 5.7 Exercises
SC-ETC-001 5.7 Exercises
SC-ETC-001 5.7 Exercises
7
TRAINING GUIDE
GENETEC INC.
Innovative Solutions
genetec.com | Security Center 5 2
Table of Contents
Module 1 – Multi site architectures 5
Install expansion server(s) 5
Post installation settings 8
Configure the Network view task 11
Assign a role to the expansion server 13
Advanced streaming & redirection 14
Adding redirectors 20
Load balancing redirectors 22
Adding and configuring routes 24
Public server (Public/Private IP’s) 30
Module 3 - High Availability 31
Basic role failover 31
Media Router failover 34
Role with database failover 35
Archiver failover 41
Redundant archiving 43
Directory failover 44
Failover disaster recovery server 53
Module 5 – Federation and GCM 55
Federating Security Center 55
Global Cardholder Synchronization (as a group) 58
Module 6 - Expansion & Customization 66
Threat Level Management 66
External systems’ integration – Plugins 67
Security Center Mobile 69
Web client 73
Plan Manager 75
Sipelia 90
When prompted for a database server, select install a new database server.
Accept the default username and password for the Service Logon Parameters
Select: Allow Genetec Security Center 5.x to create necessary firewall rules for its applications. Click
Next
Accept the Recommended Security Settings. Click Next
(If prompted) Select: Install WinPcap. Proceed through the WinPcap installer.
Click Install and allow the software installer to run.
Allow the Server Admin to be launched and click Finish
Click the menu button at the top left corner of the page and select your local expansion server
Enter the Main server’s name or IP (port 5500) and click Save
While the page is still loading, immediately click Stay on this expansion server
If your browser prompts you with a security certificate warning, click Proceed to this website
Notice the difference between the configurable properties available for the top level Default network compared
to the lower level network(s)
Rename the top level Default network to Internet. Click Apply
Rename the lower level network(s) to Head office, Branch office, Warehouse, Sales office, etc. Click Apply
Ensure that the top level network’ Capabilities is set to Unicast TCP
Expand all the branches by clicking the little triangles on the left side of the tree structure
Where are the main server ( ) and expansion server(s) ( ) found?
If local network’s switches & routers support multicast (IGMP), set your lower level network’s Capabilities to
Multicast. Otherwise leave it at the default Unicast UDP. Click Apply if you made any changes.
Once the role has been created, successfully started, connected to SQL and created a new database, it should
appear online in the list just like all the other server roles.
Network properties
(Testing streaming and redirection)
•Archiver transmits
to redirector
The second “hop” represents the redirector’s reception of the video •Redirector receives
Redirector from archiver
stream from the archiver
•Redirector transmits
The third “hop” represents the workstation’s reception of the video to client
•Client receives from
stream from the redirector Client redirector
In this example:
One last time, return to your Config Tool System task Network view task
Select the lower level network that contains your main server / archiver
Modify the Capabilities to Multicast. Click Apply
Open your Config Tool System task Video task
Double click a camera ( ) to preview its live video stream, note the source IP and network transport.
Where is your workstation receiving video packets from now (camera or server)?
In this example:
Camera’s IP: 10.0.30.155
Server’s IP: 10.0.30.140
Client’s IP: 10.0.30.79
NOTE: Some cameras do not support multicast transmissions. When the Security Center network has been configured
for multicast, and the camera doesn’t support multicast, it will send its stream to the archiver in Unicast UDP, the
archiver will hand those packets to the redirector, and the redirector will generate the multicast transmission to all the
client workstations
The higher-level network will be the Internet. Unicast TCP will be the preferred transport (reducing firewall issues)
The three lower-level networks will represent our company’s offices each supporting a different network transport:
Configure this!
NOTE:
These configurations are typically used:
• To configure the streaming options for different branch offices connected across the Internet
• To configure streaming options and video redirection across different VLANs within a larger corporate network
My workstation is (physically) in the Head office network which supports multicast. But because I used the application
options to “teleport” myself to a workstation out there on the Internet, I am receiving a redirected Unicast TCP
transmission instead of multicast.
So far, we have installed a main server and installed an expansion server. It should be considered as additional
computing resources for the Security Center system.
While the expansion server is connected to the main server, it has very little work to do. We have created a simple role
on it but the expansion server is doing little other work. Let’s make the expansion server into a video redirector.
Rule of thumb: Every archiver includes a redirector by default. Any other Genetec server can be made into a
redirector by explicitly naming it as such.
For this exercise, you will need a minimum of 3 servers: A main server with an archiver, plus at least 2 expansion
servers.
2 Genetec servers sharing the workload of video redirection in the Sales office network
Ensure that the main server and archiver are in the same network as the cameras (eg Head office)
Ensure that at least 2 expansion servers are in another network (eg Sales office)
Ensure that the remote network (eg Sales office) is configured for Unicast UDP
Configure Unicast TCP for the higher level network that connects the 2 lower level networks together.
Restart the Media Router by selecting the Media Router role in Config Tool System task Roles
Click Deactivate role at the bottom of the page. Wait a few seconds, then click again to Activate the role
You should find that the Unicast UDP is coming to you from 2 different redirectors. They are sharing the workload of video redirection to the clients.
Tap the [Shift] + [CTRL] + A keys simultaneously again to turn off diagnose all tiles
Here’s how:
Test by displaying a camera. Using your application’s Options menu, when you place yourself in the Head office
network, you should receive Unicast UDP video, but when you place yourself in the Sales office or, warehouse
networks, you should receive Unicast TCP video.
This is expected because when you are in the Head office network, the redirector will send you a Unicast UDP
stream but if you are in one of the remote networks, the redirector must send the video over the Internet using
Unicast TCP.
The same result would apply (Unicast TCP) if the client is not at a remote office site, but simply “on the Internet”.
• A head office site connected to the Internet with Unicast TCP. It is also connected to its 2 remote offices
using private network connections (Unicast UDP to the Sales office and to the Warehouse)
• Each of the remote sites also has a TCP connection to the Internet and a private network connection to the
head office. No direct route between the remote offices exist.
• The head office has the main server with the directory, archiver, media router, etc
• Each of the remote sites has an expansion server with a redirector
Note: TCP should be available for all TCP/IP networks. You will always find it in a route’s capabilities.
Multicast is a type of UDP transmission. Therefore, when you configure a given route to support Multicast, you
will see Unicast UDP and TCP added automatically (multicast is not available if UDP is not supported). And,
when you configure Unicast UDP for a given route, Unicast TCP will be added.
Restart the Media Router by selecting the Media Router and clicking Deactivate role at the bottom of the page.
Wait 10 seconds, and then click Activate role
Test the configuration by displaying a camera when you’re in each of the different networks (Options menu)
In the previous test, if you were not in the Head office network, the video would stream over the Internet using
Unicast TCP to arrive at your client workstation.
Now that we’ve create “private routes” between our sites, we expect to see:
In a multiple server system, the client workstation may need to communicate with various servers running on different
physical machines. (Not only the Directory role.) Clients need to communicate with the media router and the
redirectors.
If the Security Center’s multiple servers are behind a firewall or NAT, this may not be possible.
Naming one of our servers as the “Public server” allows it to be used as a proxy passing all client communication back
to the other servers behind the firewall/NAT.
In this way we need only to expose one server to the internet instead of all servers.
Once the server has completed its service restart and reconnected to the main server, validate your settings in
the Config Tool Network view task Network Public server
Open Config Tool System task Roles. Select the Report Manager role. Select its Resources tab
Click Add ( ) to add your expansion server to the role. Click Remove ( ) to remove the main server from
the role. Click Apply
Wait for the role to come back online. It should now be running on your expansion server
The Report Manager role is now running on the 2nd server (all we have done so far is to move it). We will now
configure the main server to offer failover protection to the Report Manager role running on the 2nd server.
Open Config Tool System task Roles. Select the Report Manager role. Select its Resources tab
Click Add ( ) to add your main server to the role. The order of this list determines which server is primary and
which server(s) is/are for failover.
Ensure that there is a check mark in the box “Force execution on highest priority server”
That’s it, that’s all. You have configured failover protection for your Report Manager role.
Disconnect the network cable of the server running the Report Manager role.
1) Server hosting the Report Manager falls offline (TrainingVM3 in this example)
3) Report Manager role comes back online. This time, running on the failover server as the primary is offline
Plug the network cable back in and test if the role moves back to the original server.
For most roles using a database, we would configure the role to use an external SQL server for its database. The
media router is an exception. The media router’s database can be quickly deleted and rebuilt at any time so unlike
other roles, we will keep its database local and let the role failover from one server to another. Upon failover, the media
router will quickly rebuild a new database.
Open Config Tool System task Roles. Select the Media Router role. Select its Resources tab
Click Add ( ) to add your expansion server to the role. Click Remove ( ) to remove the main server from
the role. Click Apply
Wait for the role to come back online. It should now be running on your expansion server
The Media Router role is now running on the 2nd server (all we have done so far is to move it). We will now configure
the main server to offer failover protection to the Media Router role running on the 2nd server.
Open Config Tool System task Roles. Select the Media Router role. Select its Resources tab
Click Add ( ) to add your main server to the role. The order of this list determines which server is primary and
which server(s) is/are for failover.
Ensure that there is a check mark in the box “Force execution on highest priority server”
That’s it, that’s all. You have configured failover protection for your Media Router role.
Disconnect the network cable of the server running the Media Router role.
Security Center’s failover mechanism will protect the role, but not the SQL database. So, for failover of roles that use a
database, we will use a 3rd server to host SQL. Both Genetec server 1 and Genetec server 2 will be pointed to the
same external SQL server for their database needs. If server 1 fails, the role will move to server 2 who is connected to
the same external database.
a) Windows
b) SQL
c) Security Center
Windows configuration:
SQL configuration
Open SQL Management Studio on the SQL server(s) and connect to the local database instance. By default, the
instance is called (local)\SQLEXPRESS
Right-click the SQL Instance name at the top of the tree and select Properties.
Click OK.
Restart the SQL Server service
Open SQL Server Configuration Manager. Select SQL Server Network Configuration.
• Double click Named Pipes and TCP/IP to change them from Disabled, to Enabled.
Repeat the same steps on all Genetec servers hosting roles whose databases are external.
• Double click the SQL Browser service and change the Startup Type from Disabled, to Automatic.
Click OK.
SQL configuration
Open SQL Management Studio on the SQL server(s) and connect to the local database instance. By default,
the instance is called (local)\SQLEXPRESS
Right-click the SQL Instance name at the top of the tree and select Properties.
• Add the new Windows user as a Login ensuring that Windows Authentication is used.
• Click OK.
• Double click Named Pipes and TCP/IP to change them from Disabled, to Enabled.
4. Add the Failover server to the server list for the Zone Manager role.
6. If the Genetec server cannot connect to the SQL server, you may see a message that a database upgrade is
required. If so, click the Upgrade database button.
Click Apply
The archiver role will need to restart to apply the change. Click Yes
Does the bottom of the archiver’s Resources page now show 2 tabs for the 2 physical servers protecting the
archiver role?
Inspect each tabbed page to verify the server’s database connection and recording configuration
Select the archiver’s Camera recording tab and modify its recording mode from the default On motion / Manual
to Continuous. Click Apply
Display 2 cameras in the Security Desk Monitoring task and add a bookmark to each.
Using Windows File Explorer, browse the Video Archive files on the failover archiver.
Do you find G64 files that were created during the failover?
Redundant archiving
Open SQL Management Studio on the SQL server(s) and connect to the local database instance. By default, the
instance is called (local)\SQLEXPRESS
Right-click the SQL Instance name at the top of the tree and select Properties.
Select Connections, and ensure that there is a check mark beside Allow remote connections to this server.
Click OK.
• Click OK.
• Restart the SQL Server service
Open SQL Server Configuration Manager. Select SQL Server Network Configuration.
• Select Protocols for SQLEXPRESS (or, your SQL Instance name)
• Double click Named Pipes and TCP/IP to change them from Disabled, to Enabled.
Close SQL Server Configuration Manager. Restart the SQL Server service.
Open the Windows Control panel on both main Directory server and failover Directory server
Create a new Windows user account
Ensure that the user has the identical username and password on both servers
Configure the new Windows user so that its password never expires and it doesn’t need to change
upon first logon.
Make sure that the new user is a member of the local Windows Administrators’ user group
Close the Windows Control Panel
On the main Directory server, open the Windows Services MMC ([Windows key] + S Services.msc [Enter]).
Double click the Genetec server service and select its Log On tab.
Unselect Local system account and use instead, This account
Enter the new Windows user name and password that you created earlier. Click OK.
Restart the Genetec server service.
Double click the SQL Browser service and change the Startup Type from Disabled, to Automatic. Click OK.
Start the SQL Browser service
Repeat the same steps on failover Directory server.
Open the Server Admin on the main Directory server. Select the Directory tab
Modify the Database server path from the default (local)\SQLEXPRESS to MachineName\SQLEXPRESS
Click OK to accept changing the database location
Click Apply
Apply the Security Center 5.5 server license that supports Directory failover
The failover server should restart its Genetec server service to apply the license and create a Directory role. As it
does this, you should see the failover server turn red temporarily.
Once the service has finished restarting, the server should come back online. If it doesn’t, go back to check the
Server Admin. It may be waiting for you to accept the TLS certificate since changing the service user.
While in the Server Admin of the failover server, check to ensure that a Directory role has been created,
You should now have 2 Directory servers in your system. Both are connected to the same Directory database.
Client workstations can login to the system through either of the Directories. If one should fail, the other should
remain available. Directory failover and load balancing have been configured.
Test by logging off and logging on repeatedly with client applications. Where are they connected?
Can you see the Backup and Restore of the Directory database from the main server to the failover server in the
State field?
What is the Last backup time?
These problems are often due to the inability of the SQL services on the 2 servers to communicate with one another. Check SQL configurations.
Click the Show more link towards the top of the page for more details
In this case, it looks like there is a problem communicating with the SQL server on our failover server (VMSRV2)
Upon opening the SQL Server Configuration Manager, a missed configuration becomes apparent:
Change Protocols: Named Pipes and TCP/IP to Enabled and then restart the SQL service to fix this problem.
Sometime messages may appear in the Windows Event Viewer logs (Application log, System log and Custom:
Genetec log) revealing clues as to what could be causing the problem.
And sometimes, a blue “I” will appear beside the problem server in the Directory Manager’s Databases available
for failover list. Click the blue “I” for details
Do you see the date/time stamp update on the backup/restore files on the failover server?
Follow the same configuration and testing steps previously used to test “normal” directory failover.
This time, no directory load balancing should occur. The Disaster recovery server should only manage the
directory role when all other directories are unavailable.
Once it has successfully connected, the Federation role should come online
Notice that all your local entities (areas, cameras, doors) are represented with standard icons. But the remote
federated entities have big yellow arrows over their icons
Expand the branch beside the remote system and browse the contents.
Double click a camera to view live video from the remote system
Open Security Desk Door activities investigation task and generate a Door activities report. Export the
report it in Microsoft Excel format.
Global cardholders are local cardholders who can be shared with other (independent) Security Center systems. You
will need 2 independent Security Center systems to try this exercise. We will consider the existing training server as
the “Sharing host”, and the newly added secondary system as the “Sharing guest”.
Create a user profile for the Global cardholder synchronizer on the Sharing host
For a remote system to be able to connect and download cardholder and credential information from a central system,
authentication will be required to establish the connection. It is recommended to create a new user profile on the host
system to be used by remote systems who need to connect.
The minimum privileges required for a remote system to connect and download cardholder/credential info.
Select the new partition’s Properties page and click Add a Member ( ) to add 2 cardholders and their
credentials as members of this new partition
Toggle Global partition to ON.
Select the new partition’s Accepted users tab. Ensure that the new user created for the remote Global
Cardholder Synchronizer connections is an Accepted user of the new global partition
With your Config Tool logged into the “remote system” or the Sharing guest, open Config Tool System
task Roles
Click Add an entity ( ) Global Cardholder Synchronizer
In the Specific info page, enter the following parameters, and click Next.
Server. Server where this role will be hosted.
Directory. Sharing host’s main server name or IP.
Username and Password. Credentials used to connect to the sharing host. The extent of what the
sharing guest can do on the global partition will be limited by what this user can see and do on the
sharing host. The user must have the Global Cardholder Synchronizer privilege on the sharing host in
order to connect as well as the privilege to see cardholders and credentials
Synchronize automatically. Select this option to have the GCS to update the guest system
immediately, every time a change is made on the host.
In the Basic information page, enter the name, description, and partition where the GCS role should be
created.
Click Next, Create, and Close.
Select the partition(s) you want your local system to synchronize and click Apply.
If the Global Cardholder Synchronizer is not configured to synchronize automatically, then click
Synchronize now ( ). Click Apply.
Once the Global Cardholder Synchronizer has successfully
connected and synchronized with the Sharing Host, we
find can both local cardholders and global cardholders
in our own system.
List of cardholders
before the Global
Cardholder-
Synchronizer was
configured.
List of cardholders
after the Global
Cardholder-
Synchronizer was
configured.
Notice that the global cardholders and their credentials have been imported but not automatically added to any
cardholder groups nor access rules.
Test access at each of the doors. Do you see the appropriate access granted and access denied events?
Select your Area, select your Threat level and click Apply
You should receive your treat level activation message
Display your camera in the Monitoring task
Your camera should be in recording state. A bookmark icon should appear on the timeline at the moment the
threat level was applied
Double click the threat level icon in the notification tray again
Remove your threat level from the area
One at a time, please:
In the Security Desk, double click the threat level icon in the notification tray
Apply your threat level to the entire system instead of your area.
All users connected with the Security Desk should see a colour change to the Security Desk skin
Download the plugin installer and save a copy on your Security Center server (whichever one will run the plugin
for the external integration)
Select the new plugin to be created. Click Next, Next, Create and Close
The new plugin role should appear in your System task’s list of roles
Download the mobile server installer and save a copy on your Security Center server (whichever one will run
mobile server). Alternatively, it could be installed on one of the participants’ laptops (with good hardware specs)
Open a Remote Desktop connection to your Security Center server. Open a Windows file browser and browse
the contents of the mobile server installer files
Enter the connection details for the mobile server to connect to your main directory
Click Apply
You may be prompted to accept the Main server’s security certificate to complete the connection.
Return to the Home page, and go back to the Configuration Security Center page
Has your Mobile server successfully connected to your main Security Center directory?
If not, use the green + Add an entity button at the bottom of the page to create it.
Test web client connections
In the Config Tool System task Roles, select the Web Client server role and select its Properties tab
Click the URL to test client browser access to the web server
To verify the configuration of the Map Manager role, open the System task’s Role view, and click on Map Manager.
From the Resources tab, verify which server the role is running on
Depending on the network accessibility and the existing resource utilization, we would usually choose one of
our least busy servers to host the Map Manager role
Click on the Properties tab, and confirm the map cache location; we recommend having the cache folder
accessible to all servers that may run the Map Manager role
If you are using any external GIS map servers, add them in the Map providers list
KML objects may be added from the Map layers list as well
Open the Area view task, and create any areas needed to represent your map structure.
There are two ways to associate a map with an area, first from the Area view task:
This will load the Map designer task with the area selected
You can also associate a map with an area from the Map designer task:
Click on an existing area, or click on the New area button on the bottom of the list
The area entity icon can also be changed to one of the pre-loaded area icons
Either method will bring you to the point where we need to select a background for our map. This can be an imported
image file, or one of the map providers configured previously in the role properties
If Image is selected, click on Select file to load a file from your drive
This can be a JPG, BMP, PNG, or PDF (including vectorial PDF) file
We have included a couple of samples for you to try in the installation package (SC Packages\Plan
Manager\program files\Genetec Plan Manager ConfigTool\Demo maps)
Click Create when you have your background selected, this will complete the map creation if a GIS map
provider was selected
If an image was selected, you will see additional controls to rotate
the image, crop the image, or remove the image to select a new file
When cropping an image, drag the handles until the section you wish to use is within the highlighted area, and
click on the checkmark icon on the top right
With Specific scale selected, click and drag on the map to move it to a position where you know the scale of
the map, and use your mouse wheel to zoom in or out
Select a unit of measurement and enter a specific length, then click on Draw line
Click on the map and drag to make a line that will represent the length chosen
The end points can be repositioned by clicking and dragging, or you can Clear the line and draw another
Click Create and the image will be processed (you will see a progress indicator in the notification tray)
The Area view will now update to show you the new area icon, and you will be in edit mode in the Map designer task.
Click on the pin to dock the Area view on the side, if you will be adding many objects
Locate a camera from your Area view and drag it onto the map
Use the corner handles to change the object size, or the rotation handle to turn the camera icon
Hold the shift while rotating to limit the change to 15 degree increments
From the object properties on the right, put a check in the Show field of view checkbox
What color is the cone that shows up on the map? Green is for PTZ cameras, blue is for fixed cameras
To reposition the camera, click on the camera object or the field of view and drag the object around
Click on Apply when your changes have been made and the camera is in position
Go back to the Area view task and select the camera you have added to the map
If this is not a Federated camera, you can change the object icon by clicking on the arrow next to the entity
type in the Identity tab
Select one of the presets, or browse to a new camera image for this object
Now open the Security Desk application, and start a Monitoring task
Locate the area we associated the map with, and drag it into one of the tiles
Click and drag to move the map, and use the scroll wheel to zoom in or out, as with the Map designer
Find the camera you added, do you see the red recording light
on the object? If not, start recording on the camera to see the
recording indicator
Create some motion in front of the camera, did you see the green circles around the object?
If this is a PTZ camera, move the camera from another tile to see the field of view change on the map
You can also click and drag the field of view to rotate the camera
Right click inside the tile for more camera options, or use the playback controls to review video
If you have the access control events set to display in a tile, you will see the cardholder picture appear above
the door; hover on it to see more details about the event
Click on the settings button on the top right and choose Show dashboard
Click on the door to see the door actions that can be performed from the Door widget
Areas can be added to maps; if a map has been associated with the area, the area will show a preview of the
map, and will operate as a link to that map
Click on the I/O object type and drag an output on to the map
From the Output behaviors widget, associate some actions with this object
Also from the I/O object type, drag an input onto the map
Apply the changes and switch back to the Security Desk
Test the output object by clicking on it and choosing an action
Try other entity types that are available from the Area view, such as camera sequences, zones, and
Federation entities
For each one, look at the properties of the widgets in the dashboard on the side
The line, rectangle, and polygon object types can be used to represent walls
Draw a line in front of a camera object’s field of view, and put a check in the Block field of view option
Apply the change, and note that the field of view is not blocked when in the Map designer
Switch over to the Security Desk and find your wall on the map, the field of view should be blocked
Go back to the Map designer task and select a rectangle, polygon, or ellipse object
From the Identity widget in the dashboard, you can associate any of these object types with an area
Under the links widget, use the drop down menu to choose another map on your system
Use the advanced button to choose more than one map
Jump back to the Map designer task and select the rectangle object covering the camera
From the top menu, click on the Arrange menu, and select Send to back, then hit Apply
Go back to your Maps task in the Security Desk and try to select the camera again
You should see the video tile pop up now, as the camera is on top of the vector object
Note the widgets for this object type; images can be associated to areas and used as links to other maps
If the image aspect ratio is distorted, change the Stretch value to Proportional
From the Visual category, experiment adding text to your map as well
Note the font and alignment options in the Text widget
Text can also be associated with an area and used as a link to another map
Select the Sipelia Plugin. Click Next, Next, Create and Close
Do you see the Sipelia plugin added to the Plugin tree?
Open Config Tool Plugins task and select the Sipelia plugin
Select its General tab
Ensure that the server hosting the RabbitMQ communications service is shown by name or IP address in the
field Communication service address (default is localhost)
The default value for the Communication service port is 5672.
Open the Network task, and then select the server that is hosting the Sipelia Plugin role.
Click Properties, and make sure that the first IP address shown in Private addresses, that is, the IP address
listed at the top, is the one that you want to be used by the server.
Configuring the SIP port of Sipelia server and the ranges for its extensions
To enable the SIP protocol on Sipelia Server, you must configure the SIP port of Sipelia Server, and ensure that all
connected SIP endpoints (hard-wired phones, voice mail systems, intercoms, software SIP phones and Security Desk
clients) use the same port value.
Open Config Tool Plugins task and select the Sipelia plugin
Select its Servers tab
Set the following:
•SIP port: The port used to enable the SIP protocol on Sipelia Server. As a result, it is the basis of all SIP
communication in Sipelia. The default value is 5060. Every SIP endpoint, such as softphones and SIP
intercoms, that needs to connect to the Sipelia Server must have this port value in their respective
configurations.
If you changed the default value of the SIP port, make sure that all SIP clients that are connected to Sipelia
Server also use the new port value.
The phone extension ranges are sets of SIP extensions from which you can assign an extension number to each
of your SIP entities. Each extension range must have a default password for the extensions, you can only have a
maximum of 1000 extensions per range, and you must have a minimum of one defined extension range to be able
to connect a SIP entity to Sipelia. By default, Sipelia provides five extension ranges (Range 1 to Range 5), each
with a default password of 1234.
To define a range of SIP phone extensions:
Note the extension ranges that are already defined, and decide on how to assign them to your various SIP
entities
To add an extension range, click Add range ( )
Enter the following:
• Start: The start value of the SIP extension range. The start value must be unique and cannot be greater
than the end value.
• End: The end value of the SIP extension range. The end value must be unique and cannot be less than
the start value.
• Description: A phrase that describes the range, and perhaps indicates what SIP entity the range is
reserved for.
NOTE: The start and end values for the extension ranges are inclusive.
Log on to Security Center with Config Tool, and then open the Security task.
Click Users, and then select one from the list.
Click the VoIP tab to set up this SIP entity as a SIP endpoint.
Assign a SIP extension to your SIP entity in one of the following ways:
• Click Auto-assign. Auto-assign automatically assigns the SIP entity the next available phone extension in
a given range. As a result, it is the recommended way of assigning a SIP extension to users, ring groups,
and SIP intercoms. Simply click this button, choose an existing range, and then click Apply.
• Enter the following:
o SIP extension: The SIP entity's phone extension. To be able to communicate with other SIP
endpoints, every SIP entity (user, ring group, or intercom) in Security Center must have a unique
SIP extension assigned to it. Either enter the extension manually, or use the recommended
approach of clicking Auto-assign.
o Password: The password for the extension. This password was specified when creating the
extension range. Each SIP extension within a given range has its password automatically set to
match the default password for that range. Clicking Auto-assign automatically populates this field
with the correct password for the range, and is therefore the recommended approach.
IMPORTANT: Although you can change the password for a given SIP extension by simply entering a new
password, it is not recommended to do so here. It is recommended to change passwords for phone extensions
only in the Servers tab of the Sipelia Plugin role.
You should see Sipelia call panel open displaying your photo, first and last name, extension and status
Click the Contacts tab
You should see a list of other Sipelia users and their respective extensions
Note: Connected users appear green. Disconnected users appear white