Aastra Telecom 55I IP Phone User Manual


 
41-001160-00, Release 2.1 Rev 04 ix
Contents
Chapter 6
Configuring Advanced Operational Features
.
About this chapter ...........................................................................................................6-1.
Advanced Operational Features .....................................................................................6-3.
Description ...............................................................................................................6-3.
MAC Address/Line Number in REGISTER Messages .............................................6-5.
SIP Message Sequence for Blind Transfer ..............................................................6-7.
Update Caller ID During a Call .................................................................................6-8.
Boot Sequence Recovery Mode ..............................................................................6-9.
Auto-discovery Using mDNS ..................................................................................6-10.
Single Call Restriction (57i CT only) ......................................................................6-11.
Missed Call Summary Subscription .......................................................................6-13.
Blacklist Duration (Broadsoft Servers) ...................................................................6-17.
Whitelist Proxy .......................................................................................................6-19.
Transport Layer Security (TLS) ..............................................................................6-21.
Symmetric UDP Signaling ......................................................................................6-27.
Removing UserAgent and Server SIP Headers .....................................................6-28.
Multi-Stage Digit Collection (Billing Codes) Support (for Sylantro Servers) ...........6-29.
Chapter 7
Encrypted Files on the IP Phone
.
About this chapter ...........................................................................................................7-1.
Encrypted Files on the IP Phone ....................................................................................7-2.
Configuration File Encryption Method ......................................................................7-2.
Procedure to Encrypt/Decrypt Configuration Files ...................................................7-3.
Chapter 8
Upgrading the Firmware
.
About this chapter ...........................................................................................................8-1.
Upgrading the Firmware .................................................................................................8-2.
Manual Firmware Update (TFTP only) .....................................................................8-2.
Manual Firmware and Configuration File Update .....................................................8-4.
Automatic Update (auto-resync) ..............................................................................8-6.
......................................................................................................................................8-10.