When reporting a problem and to make sure that all the relevant information is given to
the Mediatrix support team at once, the following information is required.
Required information
Checkmark
Mediatrix product name, release and build number.
Profile name
Serial number of the Mediatrix unit if a hardware problem is suspected.
Name/manufacturer/type of other VoIP devices along with their IP addresses.
Name/manufacturer/software version of the Proxy server (SIP).
Whenever possible, a diagram of the network or wiring setup.
Call flow/call scenario to reproduce the problem.
Is the call going through a NAT, Firewall, Bridge, VPN, Router, Soft switch, etc?
If you are not using HTTPS, click Activate unsecure
file importation from the Web browser located at the top of the page.
In the Download Script From Web
Browser
table, from the Content selection list, choose if you wish to export only what is different from the
factory configuration script or the complete configuration.
If you wish to use encryption for transfer operations, complete the Privacy Key field.
Note: Media5 strongly recommends to use encryption to protect certificates
and passwords.
Click Export and Download.
Result
The configuration script will be exported to your PC in the Downloads folder. The
system generates a macAddress.cfg file name.
Although a Syslog server can be used, it is recommended to use Wireshark.
Steps
Go to System/Event Log.
In the Remote Host
field, enter the static IP address or domain name and port number of the device
that archives the log entries sent by syslog transport.
Note: Specifying no port, or port 0, sends notifications to port 514.
From the Diagnostic Traces field,
select Enable.
Click Edit.
In the Diagnostic Traces table, select the level of severity an event should have to be reported by
the syslog.
IMPORTANT: Enabling all the traces will reduce the performance of
the Mediatrix unit and may cause it to no longer respond.
Click Apply.
Click Apply
again.
Result
The traces generated by the Mediatrix unit with the selected severity level, will be
sent to the specified address.
Packet captures are data packets intercepted when passing through a specific computer
network.
Captured packets can be sent to a specific location where they can be analysed. The content of
the capture can therefore be used to diagnose or troubleshoot network problems and determine if
network security policies are being followed.
There are three different ways to perform a packet capture:
With the pcapture CLI command available only via the CLI. This method
displays the captured packet directly in the CLI or allows streaming the captured packet to a
SSH tunnel to a remote Wireshark client.
With the Nlm.PCaptureStart command. This is a muse command, it can be
executed via SNMP, a script, and the CLI. This is the same command used when performing packet
captures via the DGW Web page. This method sends the captured file to a file or to a HTTP
server via a standard HTTP upload.
With the DGW Web Interface, under System/Packet Capture.
Note: Available protocols are File, HTTP, and HTTPS but the File protocol is not
available on Mediatrix 4102S units.
IMPORTANT: The HTTP server must allow "slow HTTP requests"
(mod_reqtimeout module for Apache HTTP Server) otherwise the pcapture
feature may not work as expected. Depending on the nature of what is being
captured, chunks can be sent very slowly and with long delays, causing the
capture to be considered as an attack and therefore stopped.
From the Link Name,
select the link to perform the capture.
Click Apply & Start Capture.
Result
If there are no problems with your configuration, the "Last Capture Result" status
will be "Requested". The captured packets will be sent to the specified URL. If the
selected URL started with file://, then the capture will be sent to
the File service.
If there are no problems with your configuration, the status of the "Last Capture
Result" will be "Completed". The captured packets will no longer be sent to the
specified URL.
A remote capture allows a remote Mediatrix unit to capture the traffic on its network
interfaces, and forward it through a SSH tunnel, in order to see the traffic live on a local PC
running Wireshark.
This method is performed using the pcapture command of the
CLI.
Before you begin
You must know the IP address of the unit running the DGW software.
The Mediatrix unit must be running a DGW v2.0.39.689 firmware or higher.
You must have a PC running Wireshark.
The first time the unit is connected via plink/wireshark, do not forget to
answer y to the Store key in cache?
(y/n) question displayed in the CMD window.
Make sure there are no other plink sessions already running.
Steps
From the PC, download the plink utility: plink utility.
Save the plink utility in the same folder as the Wireshark executable is
located.
Open a command line interface (e.g. cmd.exe).
Go to the Wireshark folder where the utility was saved. (e.g. cd "C:\Program
Files\Wireshark")
and replace the password, username, and IP address according to your
setup.
Note:any is to make a capture on all ETH ports, including
VLans (for example ETH1.10 where ) . But it is possible to choose the port,
either ETH1, ETH2, ETH5, ETH1-4, ETH2-5, WAN, or LAN depending on the type
of unit.
Note: Since version 0.71, plink needs to be run with the -no-antispoof option.
In addition, if you have previously configured plink to default to telnet,
you will also need to add the -ssh option.
Capture
from the uplink interface of the Mediatrix unit, the packets going through the Ethernet port
eth1, but using port 5060 only (either source or
destination).
Capture
from the uplink interface of the Mediatrix unit, the packets going through the Ethernet port
eth1, but using port 5060 as the destination
only.
Capture
the packets going through the Ethernet port eth1, for traffic for which the source or the
destination is the unit with the 00:90:F8:07:5A:6D MAC
address.
Capture
the packets going through the Ethernet port eth1, for traffic for which the source or the
destination is the units whit the 10.5.128.11 or host 10.5.128.4 IP
addresses.
Note:any is to make a capture on all ETH ports. But it is
possible to choose the port, either ETH1, ETH2, ETH5, ETH1-4, ETH2-5, WAN,
or LAN depending on the type of unit.
Capture from the uplink interface of the Mediatrix unit, the packets going through the
Ethernet port eth1, but using port 5060 only (either source or
destination).
Capture from the uplink interface of the Mediatrix unit, the packets going through the
Ethernet port eth1, but using port 5060 as the destination
only.
Capture the packets going through the Ethernet port eth1, for traffic for which the
source or the destination is the unit with the 00:90:F8:07:5A:6D MAC
address.
Capture the packets going through the Ethernet port eth1, for traffic for which the
source or the destination is the units whit the 10.5.128.11 or host 10.5.128.4 IP
addresses.
You must have downloaded Wireshark at the following link https://www.wireshark.org/ (Wireshark is a
network protocol analyzer. It is an Open Source software released under the GNU General
Public Licence. It can decode most VoIP protocols: SIP, MGCP, H.323, RTP, etc.). Select
the Windows version. Make sure to install winpcap and read the instructions.
If you
are taking a trace on a switch, the port of the switch connected to the PC must be
configured to mirror the port connected to the Mediatrix unit. Alternatively, you
could use a hub, which should be connected to both the PC running Wireshark and the
Mediatrix unit.
Otherwise you will not capture the packets from the unit.
Steps
In the Capture menu,
select Capture Options.
In the Capture
selection list, select the Ethernet network adapters to use.
In the (Display) Options section, select the Update list of packet in real time
check box.
Select the Automatic scrolling in live
capture check box.
If troubleshooting a random problem happening weekly, select the Use multiple files check
box.
Note: For the latest Wireshark release, this can be configured via
Capture/Options/Ouput/Create
a new file automatically after…
The PCM traces destination must be set so it can be recorded in a Wireshark capture
on your network, normally sent to the PC doing the capture.
Context
If a port is receiving several calls at a time, the capture will be performed on the
first call until it is completed, and only then will a capture be performed on
another call. Traces are taken as soon as the port is opened.
Steps
Using the CLI, set the Mipt.PcmCaptureEnable parameter to
Enable.
Note: For example Mipt.PcmCaptureEnable=Enable or
Mipt.PcmCaptureEnable=1
Set the Mipt.PcmCaptureEndpoint parameter to the unit’s
endpoint on which the PCM capture will be taken from. For endpoint examples,
refer to Endpoint Examples.
Note: To make sure that you are capturing the appropriate endpoint, please
verify its naming by running the following command in CLI:
Epadm.Endpoint. The output of the command displays
a table with the unit's endpoints.
Note: For example Mipt.PcmCaptureEndpoint = FXO2
Note: Port names are case sensitive.
Set the Mipt.PcmCaptureIpAddr MIB parameter to the IP
address of the PC running Wireshark.
Note: For example Mipt.PcmCaptureIpAddr =
192.168.0.17
Note: This IP address does not have to be listening on UDP ports, as it is easy
to filter out ICMP “port unreachable” messages afterwards.
When the capture is done, make sure to disable the
Mipt.PcmCaptureEnable MIB parameter.
Note: For example Mipt.PcmCaptureEnable = Disable or
Mipt.PcmCaptureEnable = 0
Result
In the configuration script, the value of
Mipt.PcmCaptureEnable, Mipt.PcmCaptureIpAddr
and Mipt.PcmCaptureEndpoint should reflect the values
configured.
Enabling PCM Traces of a Port Using the Configuration Script
Before you begin
The PCM traces destination must be set so it can be recorded in a Wireshark capture
on your network, normally sent to the PC doing the capture.
Context
If a port is receiving several calls at a time, the capture will be performed on
the first call until it is completed, and only then will a capture be performed on
another call. Traces are taken as soon as the port is opened.
Steps
Create a txt file, and save it as a *.cfg.
Enter Mipt.PcmCaptureEnable = Enable or
Mipt.PcmCaptureEnable=1
Enter Mipt.PcmCaptureEndpoint = Value , where
Value is the unit’s endpoint on which the PCM capture
will be taken from. For more information, refer to Endpoint Examples.
Note: To make sure that you are capturing the appropriate endpoint, please
verify its naming by running the following command in CLI:
Epadm.Endpoint. The output of the command displays
a table with the unit's endpoints.
Note: The port names are case sensitive.
Enter Mipt.PcmCaptureIpAddr = Value , where
Value is the IP address of the PC running
Wireshark.
Note: The IP address does not have to be listening on UDP ports, as it is easy
to filter out ICMP “port unreachable” messages afterwards.
When the capture is done, make sure to disable the
Mipt.PcmCaptureEnable MIB parameter.
Note: For example Mipt.PcmCaptureEnable = Disable or
Mipt.PcmCaptureEnable = 0
Result
In the configuration script, the value of
Mipt.PcmCaptureEnable, Mipt.PcmCaptureIpAddr
and Mipt.PcmCaptureEndpoint parameters should reflect the values
configured..
The PCM traces destination must be set so it can be recorded in a Wireshark capture
on your network, normally sent to the PC doing the capture.
About this task
If a port is receiving several calls at a time, the capture will be performed on
the first call until it is completed, and only then will a capture be performed on
another call. Traces are taken as soon as the port is opened.
Procedure
Using UMN, right click the name of the unit and select Edit
SNMP...
Browse to:
mediatrixSystem/gen5/mediatrixCommon/mediatrixServices/miptMIB/miptMIBObjects/debugGroup/
pcmCaptureGroup.
Set the pcmCaptureEnable MIB parameter to Enable.
Set the pcmCaptureEndpoint MIB parameter to the unit’s
endpoint on which the PCM capture will be taken from. For endpoint examples,
refer to Endpoint Examples.
Note: To make sure that you are capturing the appropriate endpoint, please
verify its naming by running the following command in CLI:
Epadm.Endpoint. The output of the command displays
a table with the unit's endpoints.
Set the pcmCaptureIpAddr MIB parameter to the IP address
of the PC running Wireshark.
Note: This IP address does not have to be listening on UDP ports, as it is easy
to filter out ICMP “port unreachable” messages afterwards.
When the capture is done, make sure to set the
pcmCaptureEnable MIB parameter to Disable.
In the Diagnostic Log
Configuration
table, select Enable.
Click Apply.
Result
If the unit unexpectedly closes, the diagnostic logs will be automatically generated
in an *.tgz file, available under Management/File in the Internal files table.
All possible endpoint names are listed in the Endpoint table displayed in the DGW Web
interface (System/Endpoints). You may also access this table
via the CLI by using the EpAdm.Endpoint command or directly via
UMN.
If you are not familiar with the meaning of the fields and
buttons, click Show Help, located at the upper right corner of
the Web page. When activated, the fields and buttons that offer online help will
change to green and if you hover over them, the description will bedisplayed.
Several types of documents were created to clearly present the information you are looking for.
Our documentation includes:
Release notes: Generated at each GA release, this document includes the known and
solved issues of the software. It also outlines the changes and the new features the release
includes.
Configuration notes: These documents are created to facilitate the configuration of a
specific use case. They address a configuration aspect we consider that most users will need to
perform. However, in some cases, a configuration note is created after receiving a question
from a customer. They provide standard step-by-step procedures detailing the values of the
parameters to use. They provide a means of validation and present some conceptual information.
The configuration notes are specifically created to guide the user through an aspect of the
configuration.
Technical bulletins: These documents are created to facilitate the configuration of a
specific technical action, such as performing a firmware upgrade.
Hardware installation guide: They provide the detailed procedure on how to safely and
adequately install the unit. It provides information on card installation, cable connections,
and how to access for the first time the Management interface.
User guide: The user guide explains how to customise to your needs the configuration
of the unit. Although this document is task oriented, it provides conceptual information to
help the user understand the purpose and impact of each task. The User Guide will provide
information such as where and how TR-069 can be configured in the Management Interface, how to
set firewalls, or how to use the CLI to configure parameters that are not available in the
Management Interface.
Reference guide: This exhaustive document has been created for advanced users. It
includes a description of all the parameters used by all the services of the Mediatrix units.
You will find, for example, scripts to configure a specific parameter, notification messages
sent by a service, or an action description used to create Rulesets. This document includes
reference information such as a dictionary, and it does not include any step-by-step
procedures.
This document contains information that is proprietary to Media5 Corporation.
Media5 Corporation reserves all rights to this document as well as to the Intellectual Property
of the document and the technology and know-how that it includes and represents.
This publication cannot be reproduced, neither in whole nor in part, in any form whatsoever,
without written prior approval by Media5 Corporation.
Media5 Corporation reserves the right to revise this publication and make changes at any time
and without the obligation to notify any person and/or entity of such revisions and/or
changes.