User's Manual
Table Of Contents
- Contents
- List of Tables
- List of Figures
- 1 Introduction and Important Notes
- 2 Overview
- 3 Planning a HiPath Cordless IP System
- 3.1 Planning According to Call Traffic Load
- 3.2 General
- 3.3 Propagation Conditions for Radio Traffic
- 3.4 Determining the Installation Site
- 3.5 Installing Base Stations
- 4 Putting Into Service
- 5 Installation and Administration
- 5.1 Terminology
- 5.2 Network Concept
- 5.3 Synchronisation over air concept
- 5.4 WBM related issues
- 5.5 Phone related issues
- 5.6 Partition concept of BSIP1
- 5.7 Factory reset of BSIP1
- 5.8 Release notes
- 5.9 Quick Start
- 5.10 Quick start overview
- 5.11 Prepare and connect hardware
- 5.12 Configure BSIP1 for IWU mode
- 5.13 Configuration of VoIP (Infrastructure) network
- 5.14 Configuration of DECT network
- 5.15 Configuration of users at the PBX
- 5.16 Configuration of users at the BSIP IWU
- 5.17 Start system services and register handsets
- 5.18 Configure further BSIP Only to the system
- 5.19 "Quick Start" Completion
- 5.20 Further steps
- 5.21 Configuration reference
- 5.22 WBM overview
- 5.23 Administration
- 5.24 "Network/Gateways" Configuration
- 5.25 "Group" Configuration
- 5.26 Users Configuration
- 5.27 Dect Configuration
- 5.27.1 Configuration Page "Dect - Device"
- 5.27.2 Configuration Page "Dect - Sync"
- 5.27.3 Configuration Page "Dect - ARI"
- 5.27.4 Configuration Page "Dect - About"
- 5.27.5 Configuration Page "Dect - Radio" (Advanced mode)
- 5.27.6 Configuration Page "Dect - Call" (Advanced mode)
- 5.27.7 Configuration Page "Dect - Debug" (Advanced mode)
- 5.27.8 General DECT configuration
- 5.28 Debugging Configuration
- 5.29 "Status" Configuration
- 5.30 "System" Configuration
- 5.31 Configuration Hints for PBXs
- 5.32 HiPath OpenOffice EE
- 5.33 HiPath OpenOffice ME
- 5.34 Troubleshooting / FAQ
- 5.35 Configuration hints for Web Browser
- 6 Technical Data
- 7 Diagnosis and Maintenance
- 8 Open Source Software used in the Product
- Index
c08.fm
A31003-C1010-S100-2-7620, 08/2010
HiPath Cordless IP, Service Manual
213
Nur für den internen Gebrauch Open Source Software used in the Product
Text of the used Open Source Software Licenses
[The licence continues]
Note that any information and cryptographic algorithms used in this soft-
ware are publicly available on the Internet and at any major bookstore,
scientific library, and patent office worldwide. More information can
be found e.g. at "http://www.cs.hut.fi/crypto".
The legal status of this program is some combination of all these per-
missions and restrictions. Use only at your own responsibility. You will
be responsible for any legal consequences yourself; I am not making any
claims whether possessing or using this is legal or not in your country,
and I am not taking any responsibility on your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PRO-
GRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, IN-
CLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE
OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA
OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES
OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
2)
The 32-bit CRC compensation attack detector in deattack.c was contributed
by CORE SDI S.A. under a BSD-style license.
* Cryptographic attack detector for ssh - source code
*
* Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
*
* All rights reserved. Redistribution and use in source and binary
* forms, with or without modification, are permitted provided that
* this copyright notice is retained.
*