User's Manual
Table Of Contents
- Contents
- List of Tables
- List of Figures
- 1 Introduction and Important Notes
- 2 Overview
- 3 Planning a HiPath Cordless IP System
- 3.1 Planning According to Call Traffic Load
- 3.2 General
- 3.3 Propagation Conditions for Radio Traffic
- 3.4 Determining the Installation Site
- 3.5 Installing Base Stations
- 4 Putting Into Service
- 5 Installation and Administration
- 5.1 Terminology
- 5.2 Network Concept
- 5.3 Synchronisation over air concept
- 5.4 WBM related issues
- 5.5 Phone related issues
- 5.6 Partition concept of BSIP1
- 5.7 Factory reset of BSIP1
- 5.8 Release notes
- 5.9 Quick Start
- 5.10 Quick start overview
- 5.11 Prepare and connect hardware
- 5.12 Configure BSIP1 for IWU mode
- 5.13 Configuration of VoIP (Infrastructure) network
- 5.14 Configuration of DECT network
- 5.15 Configuration of users at the PBX
- 5.16 Configuration of users at the BSIP IWU
- 5.17 Start system services and register handsets
- 5.18 Configure further BSIP Only to the system
- 5.19 "Quick Start" Completion
- 5.20 Further steps
- 5.21 Configuration reference
- 5.22 WBM overview
- 5.23 Administration
- 5.24 "Network/Gateways" Configuration
- 5.25 "Group" Configuration
- 5.26 Users Configuration
- 5.27 Dect Configuration
- 5.27.1 Configuration Page "Dect - Device"
- 5.27.2 Configuration Page "Dect - Sync"
- 5.27.3 Configuration Page "Dect - ARI"
- 5.27.4 Configuration Page "Dect - About"
- 5.27.5 Configuration Page "Dect - Radio" (Advanced mode)
- 5.27.6 Configuration Page "Dect - Call" (Advanced mode)
- 5.27.7 Configuration Page "Dect - Debug" (Advanced mode)
- 5.27.8 General DECT configuration
- 5.28 Debugging Configuration
- 5.29 "Status" Configuration
- 5.30 "System" Configuration
- 5.31 Configuration Hints for PBXs
- 5.32 HiPath OpenOffice EE
- 5.33 HiPath OpenOffice ME
- 5.34 Troubleshooting / FAQ
- 5.35 Configuration hints for Web Browser
- 6 Technical Data
- 7 Diagnosis and Maintenance
- 8 Open Source Software used in the Product
- Index
c08.fm
A31003-C1010-S100-2-7620, 08/2010
HiPath Cordless IP, Service Manual
215
Nur für den internen Gebrauch Open Source Software used in the Product
Text of the used Open Source Software Licenses
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
5)
One component of the ssh source code is under a 3-clause BSD license,
held by the University of California, since we pulled these parts from
original Berkeley code.
* Copyright (c) 1983, 1990, 1992, 1993, 1995
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
* THE POSSIBILITY OF SUCH DAMAGE.
6)
Remaining components of the software are provided under a standard
2-term BSD licence with the following names as copyright holders: