Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: updated @ 2023-03-28T15:01:29.227641
HTML
headtrue
encodingUTF-8
<!DOCTYPE html
  SYSTEM "about:legacy-compat">
<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta charset="UTF-8"><meta name="copyright" content="(C) Copyright 20222023"><meta name="DC.rights.owner" content="(C) Copyright 20222023"><meta name="DC.type" content="concept"><meta name="description" content="Over the last decade, the telecom industry initiated an intense migration from legacy networks to Voice Over IP (VoIP). VoIP brings numerous benefits such as reducing communication costs for end users, reducing operation and maintenance costs for carriers, and introducing a large variety of new applications such as instant messaging, file sharing, video conference and much more."><meta name="DC.format" content="HTML5"><meta name="DC.identifier" content="concept_pbf_ncg_1r"><link href="https://fonts.googleapis.com/css?family=Open+Sans" rel="stylesheet"><link rel="stylesheet" type="text/css" href="https://documentation.media5corp.com/download/attachments/45482024/commonltr.css"><link rel="stylesheet" type="text/css" href="https://documentation.media5corp.com/download/attachments/45482024/custom.css"><title>Mediatrix Management Tools</title></head><body><header role="banner"><div class="topicmeta title">Mediatrix Management Tools</div><div class="topicmeta date"></div><div class="topicmeta product"></div><div class="topicmeta version"></div><div class="topicmeta pdf"><a href="https://documentation.media5corp.com/download/attachments/45482024/Mediatrix%20Management%20Tools.pdf" rel="nofollow">Download PDF Document</a></div><hr><span style="float: inline-end;"></span></header><nav role="toc"><ul><li><a href="#concept_pbf_ncg_1r">Provisioning a CPE for VoIP Deployments</a></li><li><a href="#concept_afw_jdg_1r">Management Interfaces</a><ul><li><a href="#unique_10317586211799397765">Management Interfaces</a></li><li><a href="#concept_sfd_ljg_1r">TR-069 or CPE WAN Management Protocol (CWMP)</a></li><li><a href="#concept_rqw_qyn_1r">Simple Network Management Protocol (SNMP)</a></li><li><a href="#concept_zqb_h14_1r">Command Line Interface (CLI)</a><ul><li><a href="#reference_b3m_t2b_5jb">Command Line Interface Parameters</a></li></ul></li><li><a href="#concept_cw1_fhg_1r">Configuration Manager Service</a></li></ul></li><li><span>Configuration Elements</span><ul><li><a href="#concept_tkz_1q3_br">Configuration Parameters</a></li><li><a href="#concept_mmb_qq3_br">Configuration Scripts</a><ul><li><a href="#concept_rrf_jjd_dx">Hypertext Transfer Protocol Secure (HTTPS) </a><ul><li><a href="#concept_dwd_mz5_1x">Transport Layer Security (TLS) </a></li><li><a href="#concept_xqq_svc_dx">Unit Signaling Security </a></li><li><a href="#concept_vq5_r4w_1x">Communications Security</a></li><li><a href="#concept_q2d_fcj_dx">X-509 Certificates </a></li><li><a href="#concept_tpv_m4d_dx">Authentication</a></li><li><a href="#concept_ct2_ns1_bq">SIP Transport Types</a></li><li><a href="#reference_wp5_5dq_4cb">Transport Layer Security (TLS) Parameters</a></li></ul></li></ul></li><li><a href="#concept_twt_xr3_br">Rulesets</a></li><li><a href="#concept_flz_ds3_br">Security Certificates</a></li></ul></li><li><a href="#concept_ix4_xgm_1r">Troubleshooting</a></li><li><a href="#concept_xcz_sz5_1r">Monitoring</a></li><li><a href="#concept_v4k_q3h_1r">DGW Documentation</a></li><li><a href="#topic_title_Customisation_d1e28">Customisation</a><ul><li><a href="#concept_nwx_43p_w5">Branding</a></li><li><a href="#concept_z4m_z5n_1r">Customer Profile</a></li></ul></li><li><a href="#concept_fqm_rv4_k4">Copyright Notice</a></li></ul></nav><main role="main"><article role="article" aria-labelledby="ariaid-title1"><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="nested0" aria-labelledby="ariaid-title1" id="concept_pbf_ncg_1r">
   <h1 class="title topictitle1" id="ariaid-title1">Provisioning a CPE for VoIP Deployments</h1>
   
   <div class="body conbody"><p class="shortdesc">Over the last decade, the telecom industry initiated an intense migration from legacy
      networks to Voice Over IP (VoIP). VoIP brings numerous benefits such as reducing communication
      costs for end users, reducing operation and maintenance costs for carriers, and introducing a
      large variety of new applications such as instant messaging, file sharing, video conference
      and much more.</p>
      <p class="p">With a large variety of functions, different Customer Premise Equipment (CPE) are used by
         providers to deliver telecom services to residential and enterprise subscribers. CPEs
         represent a significant component into the network to secure communications between parties
         and ensure quality of service. CPEs also permit adapting the connection between legacy and
         IP based systems, and fulfill advanced features in compliance with the evolving environment
         of modern communications. For service providers, CPEs represent an important element of the
         capital and operation expenditures. It becomes of major concern for CPE vendors selecting a
         product design that will offer a competitive pricing structure, but also efficient
         management tools that will facilitate enabling new services. The following sections provide
         an overview of Mediatrix Product Line benefits and advantages for VoIP services
         deployments</p>
   </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title2" id="concept_afw_jdg_1r">
 <h1 class="title topictitle1" id="ariaid-title2">Management Interfaces</h1>
 <div class="body conbody">
  <div class="p">
   <br><img class="image" id="concept_afw_jdg_1r__image_fjf_lv3_br" src="https://documentation.media5corp.com/download/attachments/45482024/MediatrixManagementTools.png" width="700"><br>
  </div>
 </div>
<hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title3" id="unique_10317586211799397765">
 <h2 class="title topictitle2" id="ariaid-title3">Management Interfaces</h2>
 <div class="body conbody">
  <div class="p">
   <br><img class="image" id="unique_10317586211799397765__image_fjf_lv3_br" src="https://documentation.media5corp.com/download/attachments/45482024/MediatrixManagementTools.png" width="700"><br>
  </div>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title4" id="concept_sfd_ljg_1r">
 <h2 class="title topictitle2" id="ariaid-title4">TR-069  or CPE WAN Management Protocol (CWMP)</h2>
 
 <div class="body conbody"><p class="shortdesc">The Technical Report 069 (TR-069), also known as CWMP, is a Broadband Forum technical
  specification. This protocol can be used to monitor and update the Mediatrix unit configurations
  and firmware. In other words, when using TR-069, the Mediatrix unit can get in contact with an
  Auto Configuration Server (ACS) to initiate a configuration script transfer/execution and a
  firmware upgrade.  </p>
  <p class="p">The first time the Mediatrix unit is connected to the network, it will attempt to contact the
   Auto Configuration Server (ACS), which is the entry point for the administrator. The Mediatrix
   unit will obtain the URL of the ACS using either the DHCP server with option 43 or by retrieving
   the information directly from the Customer's Profile. Therefore, upon start-up, the Mediatrix
   unit will contact the ACS, which in return will send the required configuration files and
   initiate, if necessary, a firmware update. This automated sequence is what is referred to as
   zero-touch, as the Mediatrix unit is automatically configured by the ACS according to the
   instructions given by the administrator without manual intervention on the unit.</p>
  <div class="p">The administrator can determine a schedule for the Mediatrix unit to periodically contact the
   ACS. These contacts will allow the Mediatrix unit to:<ul class="ul" id="concept_sfd_ljg_1r__ul_efh_f5m_1r">
    <li class="li">verify if new configurations are available,</li>
    <li class="li">verify if a new firmware update is available and</li>
    <li class="li">send notifications for monitoring purposes.</li>
   </ul></div>
  <div class="p">Monitoring is achieved by regularly sending notifications to the ACS, through the mean of
   "Inform" requests, which can be: <ul class="ul" id="concept_sfd_ljg_1r__ul_x24_k5m_1r">
    <li class="li">Passive: the information is sent according to the schedule.</li>
    <li class="li">Active: the information is sent immediately when a parameter status changes, regardless of
     the periodic schedule.</li>
   </ul>Because the Periodic Informs are initiated by the Mediatrix unit, they have no problem
   passing through residential or enterprise NAT and firewalls. </div>
  <p class="p">Furthermore, the administrator can initiate a connection to the Mediatrix unit to perform
   immediate maintenance or monitoring. This will only be possible if the NAT firewall has been
   configured to allow communications initiated by the ACS.</p>
  <p class="p">The TR-069 protocol can be activated on units that are already deployed with a licence key (For
   more details on licences refer to the<a class="xref" href="https://documentation.media5corp.com/display/DGWLATEST/How+to+Activate+a+Licence+on+a+Mediatrix+Device" target="_blank">Technical Bulletin - How to activate a licence on a Mediatrix
    unit</a> published on the <a class="xref" href="https://documentation.media5corp.com/" target="_blank">Media5 Documentation Portal</a>). However, it can
   be enabled/disabled for a specific configuration via the Management interface.</p>
  <div class="p">TR-069 methods supported by the Mediatrix unit include:<ul class="ul" id="concept_sfd_ljg_1r__ul_b5p_hdm_1r">
    <li class="li">SetParameterValues</li>
    <li class="li">GetParameterValues </li>
    <li class="li">AddObject </li>
    <li class="li">DeleteObject</li>
    <li class="li">Download </li>
    <li class="li">Reboot</li>
    <li class="li">Upload</li>
    <li class="li">FactoryReset</li>
   </ul></div>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title5" id="concept_rqw_qyn_1r">
 <h2 class="title topictitle2" id="ariaid-title5">Simple Network Management Protocol (SNMP)</h2>
 
 <div class="body conbody"><p class="shortdesc">The Simple Network Management Protocol (SNMP) can be used to configure all the
  parameters available in the Mediatrix CPE, to perform firmware updates, to import a configuration
  and to monitor the Mediatrix CPE.</p>
  <p class="p">To configure the Mediatrix CPE parameters with the SNMP, a secure SNMPv3 or a non-secure SNMPv1
   connexion can be used. The CPE does not grant an SNMPv3 access without authentication and
   privacy. Because the connexion is initiated by the Management Server, the communication is
   usually unable to go through the NAT Firewall. </p>
  <p class="p">Unit monitoring is possible with SNMP because it provides access to all the status parameters
   of the CPE. Furthermore, the CPE can send notifications, called traps, to the Management Server,
   that will allow the administrator to monitor specific events. Because it is the CPE that sends
   the notifications, the communication is usually able to go through the NAT Firewall however the
   SNMP protocol, based on UDP, does not insure reliable delivery of notifications.</p>
  <div class="p">The Mediatrix CPE supports the following SNMP methods: <ul class="ul" id="concept_rqw_qyn_1r__ul_myh_kj4_1r">
    <li class="li">GetRequest</li>
    <li class="li">SetRequest</li>
    <li class="li">GetResponse</li>
    <li class="li">SetResponse</li>
    <li class="li">Trap</li>
    <li class="li">GetWalk</li>
   </ul></div>
  <div class="p">The following Management Servers are certified to be used with our Mediatrix units:<ul class="ul" id="concept_rqw_qyn_1r__ul_cd4_mpv_1r">
    <li class="li">UMN</li>
    <li class="li">HP Openview</li>
   </ul>The <a class="xref" href="https://documentation.media5corp.com/display/DGWLATEST/Reference+Guide" target="_blank">DGW Configuration Guide - Reference Guide</a> published on the <a class="xref" href="https://documentation.media5corp.com/" target="_blank">Media5 Documentation Portal</a> provides the list of all available parameters.</div>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title6" id="concept_zqb_h14_1r">
 <h2 class="title topictitle2" id="ariaid-title6">Command Line Interface (CLI)</h2>
 
 <div class="body conbody"><p class="shortdesc">The Command Line Interface (CLI) provides an access to interactively configure all the
  Mediatrix unit parameters.</p>
  <div class="p"><div class="note important note_important"><span class="note__title">IMPORTANT:</span> Although it is possible to configure existing ruleset parameters via the
        CLI, it is not possible to create or edit a ruleset from the CLI: it must be either imported
        or directly created or edited in the DGW Web interface.</div>The CLI is accessed through
      either a secure SSH session (default) or an unsecure TELNET session. When using a secure SSH
      session, all communications between Client and server are encrypted before being sent over the
      network, thus packet sniffers are unable to extract user names, passwords, and other
      potentially sensitive data. This is the default and recommended way to access the Command Line
      Interface.</div>
  <p class="p">The command interpreter interface of the CLI allows the user to browse the unit parameters,
   write the command lines, and display the system's notification log.</p>
 </div>
<hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic reference nested2" aria-labelledby="ariaid-title7" id="reference_b3m_t2b_5jb">
  <h3 class="title topictitle3" id="ariaid-title7">Command Line Interface Parameters</h3>
  <div class="body refbody">
    <section class="section">
      <p class="p"> For more details on the scripting language, refer to the <a class="xref" href="https://documentation.media5corp.com/display/DGWLATEST/Configuration+Scripting+Language+Syntax" target="_blank">DGW Configuration guide - Configuration Scripting Language
          Syntax</a> published on the <a class="xref" href="https://documentation.media5corp.com/" target="_blank">Media5 Documentation Portal</a>.</p>
    </section>
  </div>
</article></article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title8" id="concept_cw1_fhg_1r">
 <h2 class="title topictitle2" id="ariaid-title8">Configuration Manager Service</h2>
 
 <div class="body conbody"><p class="shortdesc"> The Configuration Manager (Conf) service allows executing configuration scripts as well
  as performing the backup/restore of the CPE's configuration. Configuration scripts are files
  containing textual commands that are downloaded from a file server over the network to a Mediatrix
  CPE. Scripts can be downloaded using the FTP, TFTP, HTTP and HTTPS protocols. All available
  parameters used to configure the Mediatrix CPE are supported by the configuration
  scripts.</p>
  <div class="p">Written by the system administrator, scripts can be used to assign values to parameters or
   execute configuration commands such as: <ul class="ul" id="concept_cw1_fhg_1r__ul_gnj_nh1_br">
    <li class="li">Automate recurrent configuration tasks</li>
    <li class="li">Batch-apply configuration settings to multiple devices</li>
    <li class="li">Initiate firmware upgrade</li>
   </ul></div>
  <div class="p">The administrator can chose to trigger the execution of scripts in different ways: <ul class="ul" id="concept_cw1_fhg_1r__ul_ugx_ypm_1r">
    <li class="li">Scheduled to be executed once</li>
    <li class="li">Scheduled to be executed periodically at a specified time interval</li>
    <li class="li">When the CPE is restarted</li>
   </ul></div>
  <div class="p">It is possible to generate a configuration script from the configuration running on the
   Mediatrix CPE. This script can be used as a:<ul class="ul" id="concept_cw1_fhg_1r__ul_lk1_3p1_br">
    <li class="li">Starting point to create a variation of the configuration for another CPE</li>
    <li class="li">Troubleshooting tool to view the content of a faulty configuration</li>
    <li class="li">Back-up in case the CPE needs to be reset</li>
   </ul></div>
  <p class="p">The automated importation of configuration scripts can be performed using a Customer Profile or
   using a DHCP server indicating the location of the file server with options 66 or 67. The
   automated importation to a CPE is what is referred to as zero-touch, as the CPE is automatically
   updated with the latest configuration scripts without manual intervention. Because the
   importation is initiated by the Mediatrix CPE, scripts have no problem passing through
   residential or enterprise NAT and Firewalls.</p>
 </div>
</article></article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title9" id="concept_tkz_1q3_br">
  <h1 class="title topictitle1" id="ariaid-title9">Configuration Parameters</h1>
  
  <div class="body conbody"><p class="shortdesc">Mediatrix offers a very detailed level of configuration. This provides a powerful
    flexibility to adapt the configuration to almost any SIP implementation. SIP is a technology
    based on a list of RFC and 3GPP recommendations that SIP vendors address diferently. These
    differences led to interoperability issues that demanded frequent adaptations when deploying
    servers and endpoints from different vendors. The large list of configuration parameters
    available with Mediatrix CPEs make these adaptations possible.</p>
    <div class="p">The configuration database of Mediatrix devices is organised into services. Each service: <ul class="ul" id="concept_tkz_1q3_br__ul_dld_wlc_br">
        <li class="li">Implements a set of related features</li>
        <li class="li">Defines a set of configuration parameters (read-write) and status parameters
          (read-only), organized as single elements or in tables</li>
        <li class="li">Defines a set of commands for performing interactive management actions (adding/deleting
          rows in table, initiating a file transfer, forcing re-registration, etc.)</li>
      </ul></div>
    <p class="p">Parameters configure every aspect of the Mediatrix CPE behaviour including: </p>
    <ul class="ul" id="concept_tkz_1q3_br__ul_hyy_smc_br">
      <li class="li">Networking parameters</li>
      <li class="li">Telephony services activation</li>
      <li class="li">Security policies</li>
      <li class="li">Interoperability adaptations</li>
    </ul>
    <p class="p">Access to parameters is granted according to administrator credentials, 3 access levels are
      supported. This is customizable in Customer Profiles. Manually accessing to configuration
      parameters is available though a web GUI, SNMP management servers and Command Line
      Interface.</p>
  </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title10" id="concept_mmb_qq3_br">
 <h1 class="title topictitle1" id="ariaid-title10">Configuration Scripts</h1>
 
 <div class="body conbody"><p class="shortdesc">Carriers and service providers usually define a configuration that will apply to a large
  number of units in compliance with the network architecture. It is the commands and the parameter
  values grouped in a text file that produce the Configuration Scripts.</p>
  <p class="p">To enforce security, configuration scripts can be encrypted and only Mediatrix units with the
   matching encryption key will be capable of decrypting and applying the configuration settings.
   Furthermore, configuration scripts can be downloaded and uploaded using <a class="xref" href="#concept_rrf_jjd_dx" title="HTTPS is a transfer protocol widely used to secure communications over Internet telephony networks.">HTTPS</a>.</p>
  <p class="p">Configuration Script files are fetched by Mediatrix units from the network
   through any of the management interfaces available. Upon receiving the file, the Mediatrix unit
   executes each command line in sequence and assigns the values to the configuration
   parameters.</p>
 </div>
<hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title11" id="concept_rrf_jjd_dx">
 <h2 class="title topictitle2" id="ariaid-title11">Hypertext Transfer Protocol Secure (HTTPS) </h2>
 
 <div class="body conbody"><p class="shortdesc">HTTPS is a transfer protocol widely used to secure communications over Internet
  telephony networks.</p>
  <p class="p">HTTPS allows for communications over Hypertext Transfer Protocol (HTTP) within a connection
   encrypted by <a class="xref" href="#concept_dwd_mz5_1x" title="The Transport Layer Security protocol provides data privacy and integrity for computer network communications.">Transport Layer
    Security</a> (TLS). HTTPS is mainly used to secure the content of a Web site and securely
   transfer files.</p>
  <p class="p">A communication using HTTPS reasonably guaranties that the targeted peer is the proper one, not
   an impostor, and that media cannot be read or tampered by any third-party.</p>
 </div>
<hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested2" aria-labelledby="ariaid-title12" id="concept_dwd_mz5_1x">
 <h3 class="title topictitle3" id="ariaid-title12">Transport  Layer Security (TLS) </h3>
 
 <div class="body conbody"><p class="shortdesc">The Transport Layer Security protocol provides data privacy and integrity for computer
  network communications.</p>
  <div class="p">In other words, it provides <a class="xref" href="#concept_xqq_svc_dx" title="Signaling is the protocol that activates a device located in the network and establishes calls between peers.">signaling
    security</a> and <a class="xref" href="#concept_vq5_r4w_1x" title="An important aspect of communications security, is that data sent and received from one endpoint to another remains secured, reliable, and private at all times.">communication
    security</a>. TLS is a widely used security protocol that allows for: <ul class="ul" id="concept_dwd_mz5_1x__ul_khp_j1v_1x">
    <li class="li">Server and Client authentication </li>
    <li class="li">Data confidentiality </li>
    <li class="li">Data integrity</li>
   </ul></div>
  <div class="p">TLS is used for: <ul class="ul" id="concept_dwd_mz5_1x__ul_nnq_nmn_qcb">
    <li class="li">DGW Web Access</li>
    <li class="li">HTTP-based Configuration/Firmware File Transfer</li>
    <li class="li">802.1X</li>
    <li class="li">SIP communications</li>
    <li class="li">TR-069 (CWMP)</li>
   </ul></div>
  <div class="p">When a <a class="xref" href="#concept_q2d_fcj_dx" title="The Mediatrix unit uses digital X-509 certificates which are based on the international X.509 public key infrastructure (PKI) standard. The certificates are a collection of data used to verify the identity of individuals, computers, and other entities on a network.">certificate</a> is <a class="xref" href="#concept_tpv_m4d_dx" title="As defined in the Oxford Dictionary, authentication is the process or action of verifying the identity of a user or process.">authenticated</a>, a secure TLS
      connection is established with a peer. Then <a class="xref" href="#concept_ct2_ns1_bq">SIP</a>, <a class="xref" href="#concept_rrf_jjd_dx" title="HTTPS is a transfer protocol widely used to secure communications over Internet telephony networks.">HTTPS</a>, and <a class="xref" href="#concept_sfd_ljg_1r" title="The Technical Report 069 (TR-069), also known as CWMP, is a Broadband Forum technical specification. This protocol can be used to monitor and update the Mediatrix unit configurations and firmware. In other words, when using TR-069, the Mediatrix unit can get in contact with an Auto Configuration Server (ACS) to initiate a configuration script transfer/execution and a firmware upgrade.">TR-069</a> can be used over the TLS connection.
      TLS connections also prevents man-in-the-middle attacks.<div class="note important note_important"><span class="note__title">IMPORTANT:</span>  The Mediatrix
        unit does not support a mix of both TLS and non-TLS links. Once TLS is enabled, it is
        enabled for all configured SIP gateways.</div></div>
  <div class="p">Although some parameters are available through the Web GUI, many parameters are not accessible
      through the Web GUI:<ul class="ul" id="concept_dwd_mz5_1x__ul_lgy_b1l_rdb">
        <li class="li">
          <ul class="ul" id="concept_dwd_mz5_1x__ul_dzb_k1l_rdb">
            <li class="li">Cipher Suite</li>
            <li class="li">TLS version</li>
            <li class="li">Certificate validation and trust level</li>
          </ul>
        </li>
      </ul></div>
    <p class="p">For more details on advanced parameters, refer to <a class="xref" href="#reference_wp5_5dq_4cb">Transport Layer Security (TLS) Parameters</a>.</p>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested2" aria-labelledby="ariaid-title13" id="concept_xqq_svc_dx">
 <h3 class="title topictitle3" id="ariaid-title13">Unit Signaling Security </h3>
 
 <div class="body conbody"><p class="shortdesc">Signaling is the protocol that activates a device located in the network and establishes
  calls between peers. </p>
  <p class="p">To provide security to signaling, the Mediatrix unit will connect to the network via SIP over
   TLS. The network is then authenticated by a certificate that guaranties that the Mediatrix unit
   is connected to a "safe" network.</p>
  <p class="p">The network will then authenticate the device with the username and password to make sure the
   device is part of the network's subscriber list. This authentication is done with the digest
   authentication. The result of these authentications and verifications provides private and
   reliable communications between the network and the device. Calls will be established without
   leaving any possibility to a third party to identify the called or callee number, or to be able
   to interfere with the communication in any way. </p>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested2" aria-labelledby="ariaid-title14" id="concept_vq5_r4w_1x">
 <h3 class="title topictitle3" id="ariaid-title14">Communications Security</h3>
 
 <div class="body conbody"><p class="shortdesc">An important aspect of communications security, is that data sent and received from one
  endpoint to another remains secured, reliable, and private at all times.</p>
  <div class="p">When configured for complete security, signaling is performed with TLS with the use of a
   certificate and the unit transports the audio and video through Secure RTP (SRTP). The Mediatrix
   unit will make sure that the certificate specifically encrypted for the session and issued by the
   end user is valid, e.g.:<ul class="ul" id="concept_vq5_r4w_1x__ul_uvg_t5w_1x">
    <li class="li">the date and hour are not expired</li>
    <li class="li">the certificate was issued by a recognised authority and configured within the unit</li>
    <li class="li">the certificate was issued for the proper IP address or specific FQDN</li>
   </ul>The following diagram combines several use cases of communications security.<br><img class="image" id="concept_vq5_r4w_1x__image_mmn_lf1_cx" src="https://documentation.media5corp.com/download/attachments/45482024/CommunicationSecurity.png" width="800"><br></div>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested2" aria-labelledby="ariaid-title15" id="concept_q2d_fcj_dx">
 <h3 class="title topictitle3" id="ariaid-title15">X-509 Certificates </h3>
 
 <div class="body conbody"><p class="shortdesc">The Mediatrix unit uses digital X-509 certificates which are based on the international
  X.509 public key infrastructure (PKI) standard. The certificates are a collection of data used to
  verify the identity of individuals, computers, and other entities on a network.</p>
  <p class="p">X.509 certificates provide guaranties on confidentiality, authentication, integrity, and
   non-repudiation. It is the Public Key Infrastructure (PKI) which includes hardware, procedures,
   and software than manages the certificates. The PKI also provides public-key encryption.
   Therefore, the Public Key Infrastructure provides information that can guaranty that the signed
   certificates can be trusted. </p>
  <div class="p">To enable a TLS connection on Mediatrix units, at least one CA certificate is needed to
   validate that the certificate presented by the server is valid. This certificate must be uploaded
   to the Mediatrix units. The Mediatrix unit then checks the server's identity by validating the
   host name used to contact it against the information found in the server's certificate. If the
   validation fails, the Mediatrix unit refuses the secure connection. Certificates are used to
   secure the following connections:<ul class="ul" id="concept_q2d_fcj_dx__ul_i4n_mbb_br">
    <li class="li">SIP</li>
    <li class="li">Configuration web pages</li>
    <li class="li">File transfers (scripts, firmwares, etc.) with HTTPS</li>
    <li class="li">Configuration using TR-069</li>
    <li class="li">Wired Ethernet Authentication with EAP (802.1x)</li>
   </ul>Certificates contain:<ul class="ul" id="concept_q2d_fcj_dx__ul_wjn_v33_ns">
    <li class="li">the certificate's name</li>
    <li class="li">the issuer and issued to names </li>
    <li class="li">the validity period (the certificate is not valid before or after this period) </li>
    <li class="li">the use of certificates (TlsClient or TlsServer)</li>
    <li class="li">whether or not the certificate is owned by a Certification Authority (CA)</li>
   </ul>
  </div>
  <p class="p"> </p>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested2" aria-labelledby="ariaid-title16" id="concept_tpv_m4d_dx">
 <h3 class="title topictitle3" id="ariaid-title16">Authentication</h3>
 
 <div class="body conbody"><p class="shortdesc">As defined in the Oxford Dictionary, authentication is the process or action of
  verifying the identity of a user or process.</p>
  <p class="p">In an Internet telephony network environment, authentication will allow the Mediatrix unit to
   make sure the peer it is communicating with is the proper network or endpoint (unit or end-user
   device). This provides a level of security for communications as no communication will be allowed
   if the authentication is not confirmed. </p>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested2" aria-labelledby="ariaid-title17" id="concept_ct2_ns1_bq">
  <h3 class="title topictitle3" id="ariaid-title17">SIP Transport Types</h3>
  <div class="body conbody">
    <p class="p">You can globally set the transport type for SIP all the endpoints of the Mediatrix unit to
      either UDP (User Datagram Protocol), TCP (Transmission Control Protocol), or TLS (Transport
      Layer Security). </p>
    <p class="p">Please note that RFC 3261 states the implementations must be able to handle messages up to
      the maximum datagram packet size. For UDP, this size is 65,535 bytes, including IP and UDP
      headers. However, the maximum datagram packet size the Mediatrix unit supports for a SIP
      request or response is 5120 bytes excluding the IP and UDP headers. This should be enough, as
      a packet is rarely bigger than 2500 bytes.</p>
  </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic reference nested2" aria-labelledby="ariaid-title18" id="reference_wp5_5dq_4cb">
  <h3 class="title topictitle3" id="ariaid-title18">Transport Layer Security (TLS) Parameters</h3>
  <div class="body refbody">
    <section class="section">
      <div class="p">Although the services can be configured in great part in the Web browser, some aspects of
        the configuration can only be completed with the MIB parameters by :<ul class="ul" id="reference_wp5_5dq_4cb__ul_gfn_14v_wr">
          <li class="li">using a MIB browser</li>
          <li class="li">using the CLI</li>
          <li class="li">creating a configuration script containing the configuration parameters</li>
        </ul></div>
    </section>
                <section class="section">For more details on the following parameters, refer to the <a class="xref" href="https://documentation.media5corp.com/display/DGWLATEST/Reference+Guide" target="_blank">DGW Configuration Guide - Reference
                                Guide</a> published on the <a class="xref" href="https://documentation.media5corp.com/" target="_blank">Media5 Documentation Portal</a>. The Reference Guide contains all the parameters
                        used in the DGW software with their description, default values, and
                        interactions. </section>
        <section class="section"><h4 class="title sectiontitle">For certificate transfert</h4>
            
            <ul class="ul" id="reference_wp5_5dq_4cb__ul_np5_blq_4cb">
                <li class="li">To set the  HTTPS transfer cipher suite for certificate transfer: <span class="keyword parmname">
                                                Cert.TransferHttpsCipherSuite</span></li>
                <li class="li">To set the HTTPS transfer Tls Version for certificate transfer::
                                                <span class="keyword parmname">Cert.TransferHttpsTlsVersion</span>
                                </li>
                                <li class="li">To set the level of security to use when validating the server's
                                        certificate when connecting to the ACS using HTTPS:
                                                <span class="keyword parmname">Cwmp.TransportCertificateValidation
                                        </span>
                                </li>
            </ul>
        </section>
                <section class="section"><h4 class="title sectiontitle">For file transfer </h4>
                        
                        <ul class="ul" id="reference_wp5_5dq_4cb__ul_qpp_cnn_qcb">
                                <li class="li">To set the HTTPS transfer cipher suite for file transfer:
                                                <span class="keyword parmname">File.TransferHttpsCipherSuite</span></li>
                                <li class="li">To set the HTTPS transfer Tls Version configuration for file
                                        transfer:
                                        <span class="keyword wintitle">File.TransferHttpsTlsVersion</span></li>
                        </ul>
                </section>
        <section class="section"><h4 class="title sectiontitle">For DGW Web access </h4>
            
            <ul class="ul" id="reference_wp5_5dq_4cb__ul_a2p_mkq_4cb">
                <li class="li">To set the Https Cipher Suite for secure DGW Web access:
                                                <span class="keyword parmname">Web.HttpsCipherSuite</span>.</li>
                <li class="li">To set the Http Mode used for DGW Web access:
                                        <span class="keyword parmname">Web.HttpMode</span></li>
                <li class="li">To select the Secure Server Port used to access the DGW Web interface:
                                                <span class="keyword parmname">Web.SecureServerPort</span></li>
                <li class="li">To set the HTTPS Cipher Suite for secure DGW Web access:
                                                <span class="keyword parmname">Web.HttpsCipherSuite</span></li>
                <li class="li">To set the Tls Version used for secure DGW Web access:
                                                <span class="keyword parmname">Web.TlsVersion</span></li>
            </ul>
        </section>
        <section class="section"><h4 class="title sectiontitle">For SIP TLS transport</h4>
                        
                        <ul class="ul" id="reference_wp5_5dq_4cb__ul_gqg_wmq_4cb">
                                <li class="li">To set the TLS transport cipher suite used for secure SIP
                                        transport:
                                                <span class="keyword parmname">SipEp.TransportTlsCipherSuite</span></li>
                                <li class="li">To set Transport Tls Version  used for secure SIP transport:
                                                <span class="keyword parmname">SipEp.TransportTlsVersion</span></li>
                                <li class="li">To set TLS client authentication: <span class="keyword parmname" id="reference_wp5_5dq_4cb__250120218">SipEp.InteropTlsClientAuthenticationEnable</span></li>
                        </ul>
                </section>
                <section class="section"><h4 class="title sectiontitle">For TR-069 (CWMP) establishment</h4>
                        
                        <ul class="ul" id="reference_wp5_5dq_4cb__ul_ptl_33n_qcb">
                                <li class="li">To set the HTTPS transport cipher suite configuration for TR-069
                                        (CWMP): <span class="keyword parmname">Cwmp.TransportHttpsCipherSuite
                                        </span></li>
                                <li class="li">To set the HTTPS Transport Tls Version configuration for TR-069
                                        (CWMP): <span class="keyword parmname">Cwmp.TransportHTTPSTlsVersion</span>
                                </li>
                                <li class="li">To set the level of security to use when validating the server's
                                        certificate when connecting to the ACS using HTTPS:
                                                <span class="keyword parmname">Cwmp.TransportCertificateValidation
                                        </span>
                                </li>
                        </ul>
                </section>
  </div>
</article></article></article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title19" id="concept_twt_xr3_br">
  <h1 class="title topictitle1" id="ariaid-title19">Rulesets</h1>
  
  <div class="body conbody"><p class="shortdesc">Mediatrix CPEs offering session border controller capabilities address a large variety
    of applications such as network demarcation, SIP firewall, SIP normalization and survivability.
    To facilitate the implementation of these applications, Mediatrix session border controller
    provisioning is based on a catalog of configuration templates named Rulesets. Rulesets define
    one or several rules used to filter, manipulate or route inbound or outbound
    requests.</p>
    <div class="p">For example, they can manage: <ul class="ul" id="concept_twt_xr3_br__ul_dmr_qlb_br">
        <li class="li">NAT Traversal</li>
        <li class="li">Media anchoring</li>
        <li class="li">SIP normalization</li>
      </ul>By selecting these Rulesets, administrators will manage service activations following a
      few steps procedure and saving valuable operation time. A Ruleset editor available with
      Mediatrix session border controllers enables administrators to create new Ruleset or modify
      existing ones to adjust settings to different deployment scenarios.</div>
  </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title20" id="concept_flz_ds3_br">
  <h1 class="title topictitle1" id="ariaid-title20">Security Certificates</h1>
  
  <div class="body conbody"><p class="shortdesc">Security Certificates are files used to authenticate a Mediatrix CPE to other network
    elements and vice versa. In other words, they establish a secure connection, using TLS or HTTPS,
    between the Mediatrix CPE and the network elements. Security certificates contain attributes
    that identify a network element or an organisation. They also include a public or private
    encryption key.</p>
    <div class="p">Certificates are used to secure the following connections:<ul class="ul" id="concept_flz_ds3_br__ul_i4n_mbb_br">
        <li class="li">SIP</li>
        <li class="li">Configuration web pages</li>
        <li class="li">File transfers (scripts, firmwares, etc.) with HTTPS</li>
        <li class="li">Configuration using TR-069</li>
        <li class="li">Wired Ethernet Authentication with EAP (802.1x)</li>
      </ul>Although Security Certificates are factory installed, it is possible to add new ones to
      an existing CPE. </div>
  </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title21" id="concept_ix4_xgm_1r">
 <h1 class="title topictitle1" id="ariaid-title21">Troubleshooting</h1>
 
 <div class="body conbody"><p class="shortdesc">The Mediatrix CPE provides several troubleshooting features such as notification
  messages, diagnostic traces and SIP signalling logs. </p>
  <div class="p">The Syslog daemon is a general purpose utility for monitoring applications and network devices
   with the TCP/ IP protocol. With this software, you can monitor useful messages coming from the
   Mediatrix CPE.<ul class="ul" id="concept_ix4_xgm_1r__ul_eg3_dt5_1r">
    <li class="li"><span class="keyword wintitle">Diagnostic Traces</span> are sent using the Syslog to the Technical Assistance
     Centre to further assist in resolving some issues such as Interoperability.</li>
    <li class="li"><span class="keyword wintitle">PCM traces</span> are two different RTP streams made specifically to record
     all analog signals that are either sent or received on the analog or ISDN side of the Mediatrix
     device. PCM traces are an efficient tool to identify problems with: <ul class="ul" id="concept_ix4_xgm_1r__ul_hxy_rt5_1r">
      <li class="li">Echo in your network</li>
      <li class="li">DTMF signals</li>
      <li class="li">Caller ID signals </li>
      <li class="li">Fax signals or false Fax detection</li>
      <li class="li">Message Waiting Indicator signals</li>
      <li class="li">Any other analog or digital signal</li>
     </ul></li>
    <li class="li"><span class="keyword wintitle">Statistics</span> are collected on each port of the PRI card, on Ping/Pingv6
     on the CLI or on Media. Statistics are collected on: <ul class="ul" id="concept_ix4_xgm_1r__ul_pqw_s4v_1r">
      <li class="li">Packet loss</li>
      <li class="li">Jitter</li>
      <li class="li">Latency</li>
      <li class="li">Packet count</li>
      <li class="li">Octet count</li>
     </ul></li>
    <li class="li"><span class="keyword wintitle">Live Network Captures</span> can be taken with the pcapture command and sent
     to Wireshark located on a separate terminal. The SBC can also capture the SIP/RTP traffic of a
     specific call, selected by rules. The Network Capture will gather information on: <ul class="ul" id="concept_ix4_xgm_1r__ul_ssl_v4v_1r">
      <li class="li">Interoperability</li>
      <li class="li">Timing issues</li>
     </ul>
    </li>
    <li class="li"><span class="keyword wintitle">Configuration scripts </span>can be generated from the configuration running
     on the Mediatrix CPE. This provides the content of your configuration that can be used by
     technical support to troubleshoot your faulty configuration. </li>
   </ul></div>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title22" id="concept_xcz_sz5_1r">
 <h1 class="title topictitle1" id="ariaid-title22">Monitoring</h1>
 
 <div class="body conbody"><p class="shortdesc">Several features are available for monitoring.</p>
  <div class="p">
   <ul class="ul" id="concept_xcz_sz5_1r__ul_olm_wz5_1r">
    <li class="li">Event Notifications are sent to a Syslog server, a SIP server or saved in a local file,
     depending on the rules that are applied to the event. Notifications can be sent for events such
      as:<ul class="ul" id="concept_xcz_sz5_1r__ul_lhw_xz5_1r">
      <li class="li">SIP registration failures</li>
      <li class="li">TLS authentication failures</li>
      <li class="li">Maximum number of calls reached on a PRI line</li>
     </ul></li>
    <li class="li">SNMP traps (notifications) can be sent by the CPE to the Management server allowing the
     administrator to monitor specific events such as:<ul class="ul" id="concept_xcz_sz5_1r__ul_zt1_n1v_1r">
      <li class="li">Cold start</li>
      <li class="li">Warm start</li>
      <li class="li">Link up</li>
      <li class="li">Link down</li>
      <li class="li">Authentication failure</li>
     </ul></li>
    <li class="li">TR-069 notifications are regularly sent to the ACS. These periodic contacts, also called
     Periodic Informs, can be: <ul class="ul" id="concept_xcz_sz5_1r__ul_x24_k5m_1r">
      <li class="li">Passive: the information is sent according to the defined schedule.</li>
      <li class="li">Active: the information is sent immediately when the event occurs, regardless of the
       schedule, if a parameter value changes, because the administrator may want to be informed
       immediately.</li>
     </ul></li>
    <li class="li">Call Details Record are sent by Syslog and the format can be customised. They contain
     information such as: <ul class="ul" id="concept_xcz_sz5_1r__ul_jb1_gbv_1r">
      <li class="li">Source identities (points of origin)</li>
      <li class="li">Destination identities (endpoints)</li>
      <li class="li">Call duration</li>
      <li class="li">Total usage time for the billing period </li>
     </ul></li>
   </ul>
  </div>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title23" id="concept_v4k_q3h_1r">
 <h1 class="title topictitle1" id="ariaid-title23">DGW Documentation</h1>
 
 <div class="body conbody"><p class="shortdesc">Mediatrix devices are supplied with an exhaustive set of documentation. </p>
  <p class="p">Mediatrix user documentation is available on the <a class="xref" href="http://documentation.media5corp.com" target="_blank">Media5 Documentation
    Portal</a>.</p>
  <div class="p">Several types of documents were created to clearly present the information you are looking for.
   Our documentation includes:<ul class="ul" id="concept_v4k_q3h_1r__ul_bqy_cjh_1r">
    <li class="li"><strong class="ph b">Release notes</strong>: Generated at each GA release, this document includes the known and
     solved issues of the software. It also outlines the changes and the new features the release
     includes.</li>
    <li class="li"><strong class="ph b">Configuration notes</strong>: These documents are created to facilitate the configuration of a
     specific use case. They address a configuration aspect we consider that most users will need to
     perform. However, in some cases, a configuration note is created after receiving a question
     from a customer. They provide standard step-by-step procedures detailing the values of the
     parameters to use. They provide a means of validation and present some conceptual information.
     The configuration notes are specifically created to guide the user through an aspect of the
     configuration. </li>
    <li class="li"><strong class="ph b">Technical bulletins</strong>: These documents are created to facilitate the configuration of a
     specific technical action, such as performing a firmware upgrade.</li>
    <li class="li"><strong class="ph b">Hardware installation guide</strong>: They provide the detailed procedure on how to safely and
     adequately install the unit. It provides information on card installation, cable connections,
     and how to access for the first time the Management interface.</li>
    <li class="li"><strong class="ph b">User guide</strong>: The user guide explains how to customise to your needs the configuration
     of the unit. Although this document is task oriented, it provides conceptual information to
     help the user understand the purpose and impact of each task. The User Guide will provide
     information such as where and how TR-069 can be configured in the Management Interface, how to
     set firewalls, or how to use the CLI to configure parameters that are not available in the
     Management Interface.</li>
    <li class="li"><strong class="ph b">Reference guide</strong>: This exhaustive document has been created for advanced users. It
     includes a description of all the parameters used by all the services of the Mediatrix units.
     You will find, for example, scripts to configure a specific parameter, notification messages
     sent by a service, or an action description used to create Rulesets. This document includes
     reference information such as a dictionary, and it does not include any step-by-step
     procedures. </li>
   </ul></div>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic nested0 nobody" aria-labelledby="ariaid-title24" id="topic_title_Customisation_d1e28">
   <h1 class="title topictitle1" id="ariaid-title24">Customisation</h1>
<article class="topic concept nested1" aria-labelledby="ariaid-title25" id="concept_nwx_43p_w5">
    <h2 class="title topictitle2" id="ariaid-title25">Branding</h2>
    
    <div class="body conbody"><p class="shortdesc">Several aspects of branding can be configured through a customer profile.</p>
        <ul class="ul" id="concept_nwx_43p_w5__ul_hq3_fkp_w5">
            <li class="li">Web interface appearance (Logo, colour, and skin)<br><img class="image" id="concept_nwx_43p_w5__image_dpl_zqp_w5" src="https://documentation.media5corp.com/download/attachments/45482024/branding3.png" width="900"><br><br><img class="image" id="concept_nwx_43p_w5__image_u3s_bqp_w5" src="https://documentation.media5corp.com/download/attachments/45482024/branding.png" width="800"><br></li>
            <li class="li">Color of device</li>
            <li class="li">Labels on device<br><img class="image" id="concept_nwx_43p_w5__image_olw_m5p_w5" src="https://documentation.media5corp.com/download/attachments/45482024/UnitBranding.png" width="450"><br></li>
            <li class="li">Custom Model names </li>
            <li class="li">Customer provided Mac address and serial number </li>
        </ul>
    </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title26" id="concept_z4m_z5n_1r">
  <h2 class="title topictitle2" id="ariaid-title26">Customer Profile</h2>
  
  <div class="body conbody"><p class="shortdesc">A profile is a customer factory customisation where parameter values, skins, and
    branding are defined specifically for the customer.</p>
    <div class="p"> Customer profiles can be uploaded via HTTPS/TLS to insure data integrity and
      confidentiality. The customer profile can include information on:<ul class="ul" id="concept_z4m_z5n_1r__ul_dbr_pgd_dx">
        <li class="li">security:<ul class="ul" id="concept_z4m_z5n_1r__ul_urc_mvn_1r">
            <li class="li">default administrator accounts and password policies</li>
            <li class="li">security parameters to be activated </li>
            <li class="li">specific services to activate or not</li>
            <li class="li">the installation of security certificates</li>
            <li class="li">the customisation of web pages</li>
            <li class="li">the installation of Rulesets used by the SBC</li>
            <li class="li">the installation of a VM image</li>
            <li class="li">the URL of the Auto Configuration Server (ACS) or of a configuration script</li>
          </ul></li>
        <li class="li">configuration:<ul class="ul" id="concept_z4m_z5n_1r__ul_mn5_tgd_dx">
            <li class="li">the installation of Rulesets used by the SBC</li>
            <li class="li">the installation of a VM image</li>
            <li class="li">the URL of the Auto Configuration Server (ACS) or of a configuration script</li>
          </ul></li>
        <li class="li">branding:<ul class="ul" id="concept_z4m_z5n_1r__ul_am2_vgd_dx">
            <li class="li">the customisation of web pages</li>
          </ul></li>
      </ul>
    </div>

  </div>
</article></article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title27" id="concept_fqm_rv4_k4">
 <h1 class="title topictitle1" id="ariaid-title27">Copyright Notice</h1>
 

 <div class="body conbody"><p class="shortdesc">Copyright © 20222023 Media5 Corporation.</p>
  <p class="p">This document contains information that is proprietary to Media5 Corporation.</p>
  <p class="p">Media5 Corporation reserves all rights to this document as well as to the Intellectual Property
   of the document and the technology and know-how that it includes and represents.</p>
  <p class="p">This publication cannot be reproduced, neither in whole nor in part, in any form whatsoever,
   without written prior approval by Media5 Corporation.</p>
  <p class="p">Media5 Corporation reserves the right to revise this publication and make changes at any time
   and without the obligation to notify any person and/or entity of such revisions and/or
   changes.</p>
 </div>
</article></article></main></body></html>