ScopTEL Reserved Call Parking

  • The purpose of Call Parking is to put a call on hold and resume the call from another extension.
  • Legacy Phone systems used to have what were called Square Line Appearances aka Shared Line Appearances. The point of Square Line Appearances was to assign POTS lines to DSS/programmable keys on a phone. If the POTS line received a call the DSS key would blink to show Ringing and the phone would ring for an audible warning. All phones in such an environment would have the same Line Appearances appearing but not necessarily ringing on their DSS keys. If by example extension 221 answered a call on Line 1 and wanted another extension to pick it up they would press the hold button on their phone and tell another extension to press the blinking held line on their phone to retrieve the call. This pre-dates transfer and was never considered a function of a PBX. PBX’s typically use Trunks like ISDN PRI services or in today’s technology use SIP Trunks. These trunks have no concept of Lines in the way that old POTS lines worked. Call Parking was invented to place a call on hold and resume the call somewhere else without having to transfer the caller to another extension.
  • Reserved Parking in an advanced way to Park calls which is especially useful to break up Call Parking configurations into departments. With Reserved Parking each department gets their own Call Park extension and Parking Lots.
ScopTEL - Reserved Parking
Read More

Managing Tenants

A Tenant is a segregated dial plan Container with segregated Reporting structures. Each Tenant can be regarded as its own Customer container without requiring a unique physical installation for each Customer. This feature allows public IP addresses and FQDN’s and hardware to be optimized and shared for multiple Customers saving money on memory, CPU’s, dedicated storage space, and rack space.

Examples:

  • Extension 100 is required for two customers to exist on the same hosted or CPE installation of ScopTEL without creating a VM Container for each Customer. Each Customer can be regarded as a Tenant. Each unique Tenant|Name can support its own Extension 100
ScopTEL - Managing Tenants
Read More

Configuring BLF for Pickup Groups

Configuring BLF for Pickup Groups

Background and Pre-Requisites for Pickup Groups with BLF lights
A configured Pickup Group puts more than one extension into a Group ID
A Feature Code or the BLF button itself can be used to answer any ringing Extension in the configured Group ID
For each new Pickup Group ScopTEL automatically assigns a Hint (BLF) which can be added as a BLF context to a supported SIP Phone.
This document will explain how to provision a phone to support one or more Busy Lamp Field buttons for Extensions|Pickup Groups
Pre-Requisites:
A phone that supports BLF keys which is also included by https://blog.scopserv.com/2019/04/supported-sip-devices-in-the-scoptelautomatic-provisioning-system/
Not all Cisco phones support BLF so you must reference https://blog.scopserv.com/2017/07/scoptel-cisco-sip-phone-integration/
scopserv-telephony25-6.6.6.0.5.20190520.el6.scopserv.noarch or higher
The following phones support APS BLF Key|BLF|BLF Mode|Pickup Group drop list configuration
Yealink, Astra, Grandstream, Panasonic, Snom
Polycom phones must be configured with either Speed Dial|Buddy Watch|True or BLF with the Extensions|Pickup Groups|Group ID|Hint
(BLF)|<context> manually entered into the Destination/Extension field

ScopTEL - Configuring BLF for Pickup Groups
Read More

How to Manage Automatic Call Distribution (ACD) Queues | Contact Centers

Automatic Call Distribution queues put callers into a queue and typically play Music on Hold or custom announcement messages to keep them informed or relaxed while they wait for an agent to become available.

  • Studies prove that a caller listening to Music on Hold will stay on hold longer than a caller hearing a ring back tone
  • Agents are typically employees of a contact center that login to one or more queues in order to answer callers.
Module 15 - ScopTEL - Managing ACD
Read More

How to Configure Applications

Applications are advanced Objects in ScopTEL configurations:

  • An extension number is given to an application to include the destination in the dial plan.
  • An application cannot be dialed directly from an Auto Attendant but if you choose the option ‘Allow Extensions to use this application as destination’ within the General application options then you can build a Ring Group or Virtual Extension and set the destination to the application. Only then can Ring Group and Virtual Extensions can be dialed from an Auto Attendant menu.
Module 16 - ScopTEL - Managing Applications
Read More

How to Manage Auto Attendants/IVR Menus

If you need help managing Auto Attendants/IVR Menus please refer to this training manual.

 

Module 14 - ScopTEL - Managing Auto Attendants
Read More

How to use the Extensions Manager to add new Users and Extensions

How to use the Extensions Manager to add new Users and Extensions

 

Module 9 - ScopTEL - Extensions Management
Read More

ScopTEL- AdHoc Conference Feature Management

  • ScopServ is very pleased to announce the addition of a new Feature Code known as ‘AdHoc Conference’
  • The purpose of the feature is to allow users with no Admin GUI access to the ScopTEL management interface to create Conference Bridges on the fly.
  • A phone user with access to the AdHoc Conference (Admin) Feature Code by virtue of their extensions’ Class of Service can create virtually unlimited Conference Bridge applications any time one is needed by dialing some codes from their phone.
  • The Admin creator must set the ADMIN PIN code and optionally create USER PIN codes to restrict access to any of their Conference application Extension Numbers.
  • Users Dial the AdHoc Conference (User) Feature Code by virtue of their extensions’ Class of Service then dial the Conference Bridge Extension and the Admin defined PIN code to enter the bridge
  • Anyone with the Admin password of any Conference Bridge extension and a valid Class of Service applied to their extension can use the Conference PIN change Feature Code to quickly change PIN’s on an existing Conference Bridge application
  • The Conference PIN change Feature Code must be carefully safeguarded by Class of Service since it can be used to modify the USER PIN of any existing Conference Bridge application
  • AdHoc Conferences have a limited time to live set to a default of 30 days after which they are automatically deleted.

 

ScopTEL- AdHoc Conference Feature Management
Read More

How to Provision Bria Soft Phone

If you have purchased a valid license from http://www.counterpath.com you can use this document to provision your Bria Soft Phone

 

ScopTEL - How to Provision Bria
Read More

Securing Configuration Files with HTTP Authentication

  • Hackers are routinely scanning IP addresses for open ports and if they find an IP address vulnerable to brute force scanning they will execute a remote Provisioning scan using the first 6 digits of popular vendor ID’s like Polycom, Yealink and then brute force the last 6 digits of a 12 digit MAC address.
  • By example a ScopTEL server using the default HTTP listen port of 5555 can be attacked using this method. Other vendors are also vulnerable on whatever HTTP listen port they use to remotely provision IP phones.
  • TFTP is especially vulnerable on UDP port 69 because no specific path is required to the MAC.cfg file. Only the <MAC>.cfg variable is required to harvest the MAC.cfg file. TFTP should be denied on the Firewall whenever possible.
  • If you have enabled Telephony>Configuration>Security>Flood Protection and the ScopTEL Firewall and Telephony Flood Protection (Fail2ban) Service then the remote attacker’s IP address will be blacklisted by the Firewall when a brute force attack is detected.
  • But if the remote attacker knows of a valid MAC address on the network then this MAC.cfg file can easily be harvested unless HTTP Authentication is configured. The exact methodology won’t be published here as this should not be public knowledge.
  • This document will explain how to lock down a server using HTTP Authentication

 

ScopTEL - Securing Configuration Files with HTTP Authentication
Read More