Printed Documentation

Document Sample
Printed Documentation Powered By Docstoc
					Printed Documentation
                                                         Table of Contents
Chapter 1: Getting Started ............................................................................................................................ 1
   Chapter 1: Getting Started....................................................................................................................... 10
      Logging on ........................................................................................................................................... 10
      Accessing help documentation ............................................................................................................ 10
      Viewing the license agreement ............................................................................................................ 10
   Chapter 2: User Management ................................................................................................................. 11
      Adding a user ....................................................................................................................................... 11
      Deleting a user ..................................................................................................................................... 12
      Modifying a user ................................................................................................................................... 13
      Group Mail overview ............................................................................................................................ 14
      Adding a mail group ............................................................................................................................. 14
      Adding an e-mail account to a mail group ........................................................................................... 14
      Deleting an e-mail account from a mail group ..................................................................................... 15
      Deleting a mail group ........................................................................................................................... 15
      Mail aliases overview ........................................................................................................................... 15
      Viewing aliases associated with a user ............................................................................................... 16
      Adding a mail alias ............................................................................................................................... 16
      Modifying a mail alias........................................................................................................................... 16
      Deleting a mail alias ............................................................................................................................. 17
      Enable and disable users .................................................................................................................... 17
   Chapter 3: Mail Settings .......................................................................................................................... 17
      Mail services overview ......................................................................................................................... 18
      Additional Email Domains .................................................................................................................... 18
      Additional Email Domain Overview...................................................................................................... 18
      Enabling and disabling mail services ................................................................................................... 18
      Modifying the POP3 or SMTP port numbers ....................................................................................... 19
      Virus filtering overview ......................................................................................................................... 19
      Enabling and disabling virus filtering ................................................................................................... 19
      Viewing the quarantine log .................................................................................................................. 20
      Spam filtering overview ........................................................................................................................ 20
      Enabling and disabling spam filtering .................................................................................................. 20
      Enabling and disabling the exclusive whitelist ..................................................................................... 21
      Global e-mail filtering overview ............................................................................................................ 21
      Always accept email from .................................................................................................................... 21
      Don't accept email from ....................................................................................................................... 22



                                                                                                                                                          iii
 Printed Documentation


   Don't send email to .............................................................................................................................. 23
   Don't accept email with these subjects ................................................................................................ 24
   Configure RBL Lists ............................................................................................................................. 25
   Modifying the spam filtering score ....................................................................................................... 26
   Viewing RBL rejections log .................................................................................................................. 26
   Viewing spam rejections log ................................................................................................................ 27
   LDAP overview .................................................................................................................................... 27
   Enabling and disabling LDAP .............................................................................................................. 27
   Adding an LDAP entry ......................................................................................................................... 28
   Modifying an LDAP entry ..................................................................................................................... 28
   Deleting an LDAP entry ....................................................................................................................... 28
   Enabling and disabling mail backups................................................................................................... 29
   Viewing the mail backup log ................................................................................................................ 30
   Modifying the mail backup settings ...................................................................................................... 30
Chapter 4: Security Settings .................................................................................................................... 31
   Firewall overview ................................................................................................................................. 31
   Enabling and disabling global firewall protection ................................................................................. 31
   Configuring firewall protection for a specific IP address ...................................................................... 32
   Web site blocker overview ................................................................................................................... 33
   Allowing and disallowing Web sites ..................................................................................................... 33
   Deleting a site from the allowed/disallowed list ................................................................................... 34
   Temporarily allowing or disallowing access to a site ........................................................................... 34
   Port blocker overview........................................................................................................................... 35
   Blocking a port ..................................................................................................................................... 35
   Enabling and disabling a blocked port ................................................................................................. 35
   Modifying a blocked port ...................................................................................................................... 35
   Deleting a blocked port ........................................................................................................................ 36
   NAT overview ....................................................................................................................................... 36
   Adding a NAT ....................................................................................................................................... 36
   Enabling and disabling a NAT ............................................................................................................. 36
   Deleting a NAT ..................................................................................................................................... 37
   VPN overview ...................................................................................................................................... 37
   Enabling and disabling PPTP .............................................................................................................. 37
   Modifying VPN - PPTP settings ........................................................................................................... 38
   Passwords overview ............................................................................................................................ 38
   Modifying a password .......................................................................................................................... 38
   IPSEC .................................................................................................................................................. 39



 iv
                                                                                                                                   Table of Contents


Chapter 5: Network Services ................................................................................................................... 40
   Host settings overview ......................................................................................................................... 40
   Modifying the hostname ....................................................................................................................... 40
   Modifying the local Ethernet settings ................................................................................................... 41
   Modifying the dedicated IP settings ..................................................................................................... 41
   Modifying your Primary Connection ..................................................................................................... 41
   Modifying your Failover connection ..................................................................................................... 41
   Modifying the connection type ............................................................................................................. 42
   DNS overview ...................................................................................................................................... 44
   Enabling and disabling dynamic DNS.................................................................................................. 44
   Modifying dynamic DNS settings ......................................................................................................... 44
   Network Tools overview ....................................................................................................................... 45
   Ping ...................................................................................................................................................... 45
   Traceroute ............................................................................................................................................ 46
   NS Lookup ........................................................................................................................................... 47
   Whois ................................................................................................................................................... 48
   Services overview ................................................................................................................................ 50
   Enabling and disabling WWW ............................................................................................................. 50
   Enabling and disabling FTP ................................................................................................................. 50
   Enabling and disabling Anonymous FTP ............................................................................................. 50
   Modifying the FTP port......................................................................................................................... 51
   DHCP configuration overview .............................................................................................................. 51
   Enabling and disabling DHCP ............................................................................................................. 51
   Modifying the DHCP IP range .............................................................................................................. 52
   Viewing active DHCP leases ............................................................................................................... 52
   File sharing overview ........................................................................................................................... 52
   Enabling and disabling file sharing ...................................................................................................... 53
   Modifying file sharing settings .............................................................................................................. 53
   DMZ overview ...................................................................................................................................... 54
   Adding a DMZ ...................................................................................................................................... 54
   Modifying a DMZ .................................................................................................................................. 54
   Deleting a DMZ .................................................................................................................................... 55
Chapter 6: System Maintenance ............................................................................................................. 55
   Update overview .................................................................................................................................. 55
   Enabling and disabling automatic updates .......................................................................................... 55
   Manually updating server software ...................................................................................................... 55
   Backup overview .................................................................................................................................. 56



                                                                                                                                                             v
 Printed Documentation


   Manually backing up files ..................................................................................................................... 56
   Enabling and disabling automatic backup ........................................................................................... 58
   Modifying automatic backup settings ................................................................................................... 58
   Restore overview ................................................................................................................................. 60
   Restoring files ...................................................................................................................................... 60
   Time settings overview ........................................................................................................................ 61
   Modifying the server time zone ............................................................................................................ 61
   Modifying the server date and time...................................................................................................... 61
   Modifying the time server ..................................................................................................................... 62
   Shutdown/reboot overview .................................................................................................................. 62
   Shutting down the server ..................................................................................................................... 62
   Rebooting the server............................................................................................................................ 63
   Display overview .................................................................................................................................. 63
   Modifying the logos .............................................................................................................................. 63
   Modifying the system language ........................................................................................................... 64
   UPS overview ...................................................................................................................................... 64
   Enabling and disabling UPS monitoring .............................................................................................. 64
   Modifying UPS settings ........................................................................................................................ 65
   RAID..................................................................................................................................................... 65
Chapter 7: Statistics ................................................................................................................................ 66
   Disk usage overview ............................................................................................................................ 66
   Viewing global disk usage ................................................................................................................... 66
   Setting up disk usage e-mail notification ............................................................................................. 66
   Adding disk quota for a user ................................................................................................................ 66
   Modifying disk quota for a user ............................................................................................................ 67
   System status overview ....................................................................................................................... 67
   Viewing system status ......................................................................................................................... 68
   Traffic statistics overview ..................................................................................................................... 68
   Viewing local network traffic statistics.................................................................................................. 68
   Viewing external network traffic statistics ............................................................................................ 68
   Viewing DMZ traffic statistics ............................................................................................................... 69
   Web statistics overview........................................................................................................................ 69
   Viewing Web statistics ......................................................................................................................... 69
   Server settings overview ...................................................................................................................... 70
   Viewing current server settings ............................................................................................................ 71
Chapter 8: Phone System ....................................................................................................................... 71
   Phone System overview ...................................................................................................................... 71



 vi
                                                                                                                                      Table of Contents


       Extension Control overview ................................................................................................................. 71
       Adding a new extension ....................................................................................................................... 71
       Modifying an extension ........................................................................................................................ 72
       Deleting an extension .......................................................................................................................... 72
       Enable and disable extensions ............................................................................................................ 73
       Phone Number mapping ...................................................................................................................... 73
       Queues ................................................................................................................................................ 75
       Phone Provisioning .............................................................................................................................. 77
       Speed dial overview ............................................................................................................................. 78
       SIP setup overview .............................................................................................................................. 80
       Adding a SIP provider .......................................................................................................................... 80
       Modifying a SIP provider ...................................................................................................................... 80
       Deleting a SIP provider ........................................................................................................................ 81
       Dialing rules overview .......................................................................................................................... 81
       Adding a dialing rule ............................................................................................................................ 81
       Deleting a dialing rule .......................................................................................................................... 82
       Conference room overview .................................................................................................................. 83
       Adding a new conference room ........................................................................................................... 83
       Viewing a conference room's PIN ........................................................................................................ 83
       Deleting a conference room ................................................................................................................. 83
       Adding an external number .................................................................................................................. 84
       Deleting an external number ................................................................................................................ 84
       Global settings overview ...................................................................................................................... 85
       Modifying global voicemail settings ..................................................................................................... 85
       Modifying global user settings ............................................................................................................. 85
       Phone System status overview ............................................................................................................ 86
       Viewing Phone System status ............................................................................................................. 86
       Auto Attendant Overview ..................................................................................................................... 86
       Call records overview........................................................................................................................... 89
       Viewing call records ............................................................................................................................. 89
       Downloading call records ..................................................................................................................... 90
Index .......................................................................................................................................................... 103




                                                                                                                                                              vii
Chapter 1: Getting Started




Administration User Guide


                         1
   Printed Documentation




                                       Table of Contents
Chapter 1: Getting Started
       Logging on
       Accessing help documentation
       Viewing the license agreement

Chapter 2: User Management
  Users
       Adding a user
       Adding a Phone Extension account
       Modifying a user
       Deleting a user


   2
                                                     Chapter 1: Getting Started


    Group Mail
    Group Mail overview
    Adding a mail group
    Adding an e-mail account to a mail group
    Deleting an e-mail account from a mail group
    Deleting a mail group
  Mail Aliases
    Mail aliases overview
    Viewing aliases associated with a user
    Adding a mail alias
    Modifying a mail alias
    Deleting a mail alias
  Enable/Disable User
    Enable/Disable User Overview
    To Enable/Disable a User

Chapter 3: Mail Settings
  Mail Services
    Mail services overview
  Additional Email Domains
    Additional Email Domain Overview
    Adding an Email Domain
    Removing an Email Domain
    Enabling and disabling mail services
    Modifying the POP3 or SMTP port numbers
  Virus Filtering
    Virus filtering overview
    Enabling and disabling virus filtering
    Viewing the quarantine log
  Spam Filtering
    Spam filtering overview
    Enabling and disabling spam filtering
    Enabling and disabling the exclusive whitelist
    Global e-mail filtering overview
    Always accept email from
    Don't accept email from
    Don't send email to
    Don't accept email with these subjects


                                                                             3
   Printed Documentation


       Configure RBL Lists
       Modifying the spam filtering score
       Viewing RBL rejections log
       Viewing spam rejections log
  LDAP
       LDAP overview
       Enabling and disabling LDAP
       Adding an LDAP entry
       Modifying an LDAP entry
       Deleting an LDAP entry
  Mail Backup
       Enabling and disabling mail backups
       Viewing the mail backup log
       Modifying the mail backup settings
       Mail Archive
       Searching the mail archive

Chapter 4: Security Settings
  Firewall
       Firewall overview
       Enabling and disabling global firewall protection
       Configuring firewall protection for a specific IP address
       Web site blocker overview
       Allowing and disallowing Web sites
       Deleting a site from the allowed/disallowed list
       Temporarily allowing or disallowing access to a site
       Port blocker overview
       Blocking a port
       Enabling and disabling a blocked port
       Modifying a blocked port
       Deleting a blocked port
       NAT overview
       Adding a NAT
       Enabling and disabling a NAT
       Deleting a NAT
  VPN
       VPN overview
       Enabling and disabling PPTP


   4
                                                 Chapter 1: Getting Started


   Modifying VPN - PPTP settings
 Passwords
   Passwords overview
   Modifying a password
 IPSEC
     IPSEC Overview
     To Enable or Disable IPSEC
     To Add / Modify or Delete an IPSEC Tunnel



Chapter 5: Network Services
 Host Settings
   Host settings overview
   Modifying the hostname
   Modifying the local Ethernet settings
   Modifying the dedicated IP settings
   Modifying the connection type
 DNS
   DNS overview
   Enabling and disabling dynamic DNS
   Modifying dynamic DNS settings
 Network Tools
   Network Tools overview
   Ping
   Traceroute
   NS Lookup
   Whois
 Services
   Services overview
   Enabling and disabling WWW
   Enabling and disabling FTP
   Enabling and disabling Anonymous FTP
   Modifying the FTP port
 DHCP Configuration
   DHCP configuration overview
   Enabling and disabling DHCP
   Modifying the DHCP IP range
   Viewing active DHCP leases


                                                                         5
  Printed Documentation


 File Sharing
      File sharing overview
      Enabling and disabling file sharing
      Modifying file sharing settings
 DMZ
      DMZ overview
      Adding a DMZ
      Modifying a DMZ
      Deleting a DMZ

Chapter 6: System Maintenance
 Update
      Update overview
      Enabling and disabling automatic updates
      Manually updating server software
 Backup
      Backup overview
      Manually backing up files
      Enabling and disabling automatic backup
      Modifying automatic backup settings
 Restore
      Restore overview
      Restoring files
 Time Settings
      Time settings overview
      Modifying the server time zone
      Modifying the server date and time
      Modifying the time server
 Shutdown/Reboot
      Shutdown/reboot overview
      Shutting down the server
      Rebooting the server
 Display
      Display overview
      Modifying the logos
      Modifying the system language
 UPS
      UPS overview


  6
                                                  Chapter 1: Getting Started


    Enabling and disabling UPS monitoring
    Modifying UPS settings
  RAID
    RAID Overview
    To remove a drive from operation

Chapter 7: Statistics
  Disk Usage
    Disk usage overview
    Viewing global disk usage
    Setting up disk usage e-mail notification
    Adding disk quota for a user
    Modifying disk quota for a user
  System Status
    System status overview
    Viewing system status
  Traffic
    Traffic statistics overview
    Viewing local network traffic statistics
    Viewing external network traffic statistics
    Viewing DMZ traffic statistics
  Web Statistics
    Web statistics overview
    Viewing Web statistics
  Current Settings
    Server settings overview
    Viewing current server settings



Chapter 8. Phone System
    Phone System Overview
  Extension Control
    Extensions overview
    Adding a new extension
    Modifying an extension
    Deleting an extension
    Enable / Disable Extensions
 Extension Mapping



                                                                          7
 Printed Documentation


 Extension Mapping Overview
 To Add an Extension Mapping
 To Remove an Extension Mapping
Multiple Location Mapping
 Multiple Location Mapping Overview
 To Add a Mapping
 To Remove a Mapping
Queue
 Queue Overview
 Adding queues under the extension configuration
 Deleting a queue under the extension configuration
 Adding an extension to a queue under the extension configurations
 Deleting an extension that is part of a queue
 Adding queues under the agent configuration
 Deleting a queue under the agent configuration
 Adding an extension to a queue under the agent configurations
 Deleting an agent that is part of a queue
Phone Provisioning
 Phone Provisioning Overview
 Enable Disable External Phone provisioning
 Adding a new setting for a phone
 Delete a phone
Speed Dial
 Speed Dial overview
SIP Setup
     SIP providers overview
     Adding a SIP provider
     Modifying a SIP provider
     Deleting a SIP provider
Conference
     Conference room overview
     Adding a new conference room
     Viewing a conference room's PIN
     Deleting a conference room
Operator Panel
     Modifying the operator panel password
     Adding an external number



 8
                                         Chapter 1: Getting Started


   Deleting an external number
 Global Settings
   Global settings overview
   Modifying global voicemail settings
   Modifying global user settings
 Status
   VoIP status overview
   Viewing VoIP status
 Dialing Rules
   Dialing rules overview
   Adding a dialing rule
   Deleting a dialing rule
 Call Records
   Call records overview
   Viewing call records
   Downloading call records
 Recorded Calls
  Recorded Calls Overview
  To Play a saved message
  To Delete a saved message
  Auto Attendant
   Auto-Attendant Overview
   To Add an Auto-Attendant
   To Add a Greeting
   To Delete a Greeting
   Auto Attendant Mapping
  Music On Hold
   Music On Hold Overview
   To Add Music On Hold
   To Delete Music On Hold
  FXO
   FXO Overview
   To Setup channels


 Setup Wizard

Glossary




                                                                 9
  Printed Documentation


Index




Chapter 1: Getting Started
  Logging on

To log on

        1.    Copy and paste or type the URL for the administration interface, e.g.
             https://admin.myexamplesite.net, into the address bar of your Web browser and click Go.
             The Administration Login page opens.
        2.   In the Username box, type your administrator username.
        3.   In the Password box, type the password for your administrator username.
        4.   In the interface type drop-down list, select Administration.
        5.   Click Login.

  Accessing help documentation
  Help for using the Administration Interface is available as a full help file (in both online and PDF form)
  and as brief context-sensitive help on each page of the application.

To access the full help file

        1.   In the side navigation menu, click Help. The Help page opens.
        2.    Click Help to open the online help files or click User Guide to open or save the PDF
             version of the help documentation.

To access help for the page you're viewing

  Context-sensitive help for each page that you are viewing is available by clicking the question mark
  button   next to the page's title. The context-sensitive help offers brief help for that page.

  Viewing the license agreement

To view the license agreement

        1.   In the side navigation menu, click Help. The Help page opens.
        2.   Click License Agreement. The full text of the license agreement opens.




  10
                                                                             Chapter 1: Getting Started



Chapter 2: User Management


Users
  Adding a user

   Tip: The username and password should be at least six characters long. The password should
   contain at least one special character such as a pound (#) or dollar ($) symbol.


To add a user

       1.     In the side navigation menu, click User Management. The User Management page
             opens.
       2.    Click Add User. The Add User page opens.
       3.    In the Username box, type the username you want to add.
       4.    In the Password box, type a password for the new user.
       5.    In the Full Name box, type the user's first and last name.
       6.    In the contact information fields (Address, Work Phone, Home Phone, Fax Phone, and
             Other), type the appropriate contact information for the new user.
       7.     In the Disk Quota in MB box, type a number if you want to set a limit to the amount of
             disk storage space (in megabytes) available to the user.
       8.     Select the Set as Administrator checkbox if you want to give the user administrator
             privileges.
       9.    Select the Access OP Panel checkbox if you want to give the user access to the operator
             panel.
       10.     In the Choose a Language drop-down list, select the user's language.
       11. Click Add. A page opens, confirming the addition and displaying the user's details.


       Optional
       If you would like to create an extension for the new user at the same time, please follow the
            steps below:

 Creating a Phone User Extension
   To add a phone user extension account

       1. Enter the extension number you would like this user to be assigned too.
       2.If you would like to record their calls, select the check box.




                                                                                                       11
  Printed Documentation


       3. If you would like this extension to only be able to call other extensions, select the
            checkbox.
       4. If you would like this user to only use a specific VOIP provider, please select the VOIP
            provider from the drop down menu.
       5. Enter the phone extension username into the blank field.
       6. Enter the phone extension password into the blank field.
       7. In the Caller ID box, type the number that should be displayed for this extension, if any.
       8. In the Auto-Forward Number box, type the phone number or extension number to which
           this extension should be forwarded, if any.
       9. In the Voicemail Password box, type the voicemail PIN for this extension.
       10. In the Send to E-mail box, type the e-mail address to which notifications of new voice
            messages should be sent, if any.
       11. In the Quick Dial Operator Panel Pin box, enter the PIN number you would like the user
            to have.
       12. Click Add. A page opens, confirming the addition and displaying the user's details.



  Deleting a user

To delete a user

       1.    In the side navigation menu, click User Management. The User Management page
            opens.
       2.   Click Delete User.
       3.   (a) If you know the username of the user you want to delete:
                      i.     In the Delete User section, in the Username box, type the username of
                        the user you want to delete or select the user from the Select a Username
                        drop-down list.
                      ii.   Click Delete User. A confirmation page opens with that user's details
                        shown. If you would like to delete their phone extension as well, select the
                        checkbox.
            (b) If you do not know the username of the user you want to delete:
                      i.    In the Search section, in the Username box, type all or part of the
                        username or real name of the user you want to delete.
                      ii.  Click Search. A list of users matching the full or partial username or real
                        name appears.
                     iii.    Click the Delete link next to the appropriate username to delete that user.
                         A confirmation page opens with that user's details shown . If you would like to
                         delete their phone extension as well, select the checkbox.
        4. Click Delete to confirm the deletion of this user. A page opens, confirming the deletion of
           the user.I f you would like to delete their phone extension as well, select the checkbox.
        5. Click Click Here if you would like to delete another user.




  12
                                                                            Chapter 1: Getting Started


  Modifying a user

To modify a user

      1.    In the side navigation menu, click User Management. The User Management page
           opens.
      2.   Click Modify User. The Modify page opens.
      3.   (a) If you know the username of the user you want to modify:
                     i.    In the Modify section, in the Username box, type the username of the
                       user you want to modify or select the user from the Select a Username drop-
                       down list.
                    ii.   Click Modify. The Modify page opens with that user's details shown.
           (b) If you do not know the username of the user you want to modify:
                     i.    In the Search section, in the Username box, type all or part of the
                       username or real name of the user you want to modify.
                    ii.  Click Search. A list of users matching the full or partial username or real
                      name appears.
                    iii.    Click the Modify link next to the appropriate username to modify that user.
                        The Modify page opens with that user's details shown.
       4. Modify the fields as required.
       5. Click Modify to save. A page opens, confirming the modifications and displaying the
          user's details.


       Optional
       When Modifying a user, you may create a phone extension for that user.


   To add a phone user extension account

      1. Click on the Phone user Extension bar, once that is done, a menu will appear.
      2. Enter the extension number you would like this user to be assigned too.
      3.If you would like to record their calls, select the check box.
      4. If you would like this extension to only be able to call other extensions, select the
           checkbox.
      5. If you would like this user to only use a specific VOIP provider, please select the VOIP
           provider from the drop down menu.
      6. Enter the phone extension username into the blank field.
      7. Enter the phone extension password into the blank field.
      8. In the Caller ID box, type the number that should be displayed for this extension, if any.
      9. In the Auto-Forward Number box, type the phone number or extension number to which
          this extension should be forwarded, if any.
      10. In the Voicemail Password box, type the voicemail PIN for this extension.


                                                                                                       13
  Printed Documentation


        11. In the Send to E-mail box, type the e-mail address to which notifications of new voice
             messages should be sent, if any.
        12. In the Quick Dial Operator Panel Pin box, enter the PIN number you would like the user
             to have.
        13. Click Modify User. A page opens, confirming the addition and displaying the user's details.




Group Mail
  Group Mail overview
  The Group Mail page allows you to add group mail accounts and modify or delete existing group mail
  accounts.

  Adding a mail group

To add a mail group

        1.    In the side navigation menu, click User Management. The User Management page
             opens.
        2.   Click Group Mail. The Group Mail page opens.
        3.   In the Mail Group Alias Name box, type the name of the alias you want to add.
        4.    Click Add. The page refreshes, showing the new mail group in the table of mail groups at
             the bottom of the page. If this is the first group you've created, additional administration
             options appear above the table.

  Adding an e-mail account to a mail group

To add an e-mail account to a mail group

        1.    In the side navigation menu, click User Management. The User Management page
             opens.
        2.   Click Group Mail. The Group Mail page opens.
        3.    In the middle section of the page, in the Mail Group drop-down list, select the mail group
             to which you want to add a user or external e-mail address.
        4.   In the User drop-down list, select the user you want to add to the selected mail group.

             OR

             In the Email box, type the external e-mail address you want to add to the selected mail
             group.
        5.    Click Add. The page refreshes, showing the new user under the appropriate mail group in
             the table of mail groups at the bottom of the page.


  14
                                                                               Chapter 1: Getting Started


  Deleting an e-mail account from a mail group

 Important: Deletion is immediate -- the system will not ask you to confirm deletion.


To delete an e-mail account from a mail group

        1.    In the side navigation menu, click User Management. The User Management page
             opens.
        2.   Click Group Mail. The Group Mail page opens.
        3.    In the table of mail groups at the bottom of the page, locate the mail group from which you
             want to delete a user or external e-mail address.
        4.    Click Delete next to the username or external e-mail address that you want to delete from
             the appropriate mail group.




  Deleting a mail group

 Important: Deletion is immediate -- the system will not ask you to confirm.


To delete a mail group

        1.    In the side navigation menu, click User Management. The User Management page
             opens.
        2.   Click Group Mail. The Group Mail page opens.
        3.    In the table at the bottom of the page, click Delete Group next to the mail group you want
             to delete. The page refreshes, showing the updated mail groups in the table at the bottom
             of the page.




Mail Aliases
  Mail aliases overview
  The Mail Aliases page lists current e-mail aliases and allows you to create new ones. An e-mail alias
  is an e-mail address that has been set up to forward to another e-mail address or local user. It does
  not have its own mailbox.

    Note: A local user is a user on this server. An external e-mail address is an address that resides
    on another server. For example, if the domain associated with this server is myexamplesite.net,
    an external e-mail address would be an address at any other domain than myexamplesite.net.




                                                                                                         15
  Printed Documentation


  Viewing aliases associated with a user

To view aliases associated with a user

       1.    In the side navigation menu, click User Management. The User Management page
            opens.
       2.   Click Mail Aliases. The Mail Aliases page opens.
       3.    In the Select User drop-down list, select the user whose aliases you want to view or if you
            do not know the name of the user you may user the Search by Name box. The page
            refreshes, showing the aliases associated with the selected user in the table of aliases at
            the bottom of the page.

  Adding a mail alias

To add a mail alias

       1.    In the side navigation menu, click User Management. The User Management page
            opens.
       2.   Click Mail Aliases. The Mail Aliases page opens.
       3.   In the Alias Name box, type the name of the alias you want to add.
       4.    In the Select Local User drop-down list, select the user to whom you want the alias to
            redirect.

            OR

            In the Email box, type an e-mail address to forward the alias to an external e-mail address.
       5.    Click Add. The page refreshes, showing the new alias in the table of aliases at the bottom
            of the page.




  Modifying a mail alias

To modify a mail alias

       1.    In the side navigation menu, click User Management. The User Management page
            opens.
       2.   Click Mail Aliases. The Mail Aliases page opens.
       3.    In the table at the bottom of the page, click Modify next to the alias you want to modify.
            The alias modification page opens.
       4.    In the Change alias from to drop-down list, select the user to whom you want the alias to
            redirect.

            OR

            In the Forward to external email box, type an external e-mail address.



  16
                                                                                Chapter 1: Getting Started


        5.   Click Modify. The page refreshes

  Deleting a mail alias

 Important: Deletion is immediate -- the system will not ask you to confirm.


To delete a mail alias

        1.    In the side navigation menu, click User Management. The User Management page
             opens.
        2.   Click Mail Aliases. The Mail Aliases page opens.
        3.    In the table at the bottom of the page, click Delete next to the alias you want to delete.
             The page refreshes.




  Enable and disable users
  Enable and Disable user overview
  Enable/Disable User allows you to temporarily disable or enable a user.


  To Enable/Disable a User

   To Enable/Disable a User

  1. In the side navigation menu, click User Management. The User Management page opens.
  2. Click Enable/Disable User.
  3. If you know the username you would like to enable/disable, click the enabled or disabled button
  next to the username to either enable them (if disabled) or disable them (if enabled).
  OR
  Search for the username in the search box. The table will refresh with the results, click the enabled
  or disabled button next to the username to either enable them (if disabled) or disable them (if
  enabled)




Chapter 3: Mail Settings


                                                                                                           17
  Printed Documentation



Mail Services
  Mail services overview

 Important: When you click Reboot Server Now on this page, the server will reboot immediately.
 You will not be prompted to confirm your request.

  The Mail Services page allows you to enable or disable mail-related services such as POP3
  (incoming mail), SMTP (outgoing mail), and IMAP. It also allows you to change the port numbers
  used for the POP3 and SMTP services, as well as receive email for multiple domains

  Additional Email Domains

       Additional Email Domain Overview
  The Additional Email Domain feature allows you to receive email for multiple domains.


   Adding an Domain
       Adding a Domain
        1. In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2. Click Mail Services. The Mail Services page opens.
        3. In the Add Domain box, type the domain name you would like to receive Email for.
        4. Click Add.


    Removing an Domain
        Removing a Domain
        1. In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2. Click Mail Services. The Mail Services page opens.
        3. Click the Delete button beside the domain that you would like to remove from the list.




  Enabling and disabling mail services

 Important: Changes will not take effect until the server is rebooted. When you click Reboot Server
 Now on this page, the server will reboot immediately. You will not be prompted to confirm your
 request.


To enable or disable mail services


  18
                                                                               Chapter 1: Getting Started


        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Mail Services. The Mail Services page opens.
        3.    Click Enabled next to the mail service you want to disable (POP3, SMTP, or IMAP) to
             disable that service.

             OR

             Click Disabled next to the mail service you want to enable (POP3, SMTP, or IMAP) to
             enable that service.
        4.   The page refreshes, showing the updated status of the mail services.
        5.    If you have no other changes to make that require a server reboot, click Reboot Server
             Now to reboot the server now.




  Modifying the POP3 or SMTP port numbers

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To modify the POP3 or SMTP port numbers

    Note: The default port number for POP3 service is 110 and the default port number for SMTP
    service is 25.

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Mail Services. The Mail Services page opens.
        3.   Type the port number you want to use in the appropriate port number box.
        4.   Click Change next to the appropriate port number box. The page refreshes.
        5.    If you have no other changes to make that require a server reboot, click Reboot Server
             Now to reboot the server now.




Virus Filtering
  Virus filtering overview
  The Virus Filtering page allows you to enable or disable virus filtering on the server, view the dates
  the virus definition files were last updated, and view the quarantine log.
  For additional information about Clam AntiVirus, visit their Web site at http://www.clamav.net.

  Enabling and disabling virus filtering

                                                                                                           19
  Printed Documentation


To enable or disable virus filtering

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Virus Filtering. The Virus Filtering page opens.
        3.   Click Enabled to disable virus protection.

             OR

             Click Disabled to enable virus protection.
        4.   The page refreshes, showing the updated status of the virus filtering service.




  Viewing the quarantine log
  The quarantine log displays a summary of the e-mail that has been quarantined as a virus or
  scripting attack. The log shows the date and time the e-mail was received and quarantined, the name
  and/or e-mail address of the sender, the intended recipient of the e-mail, the subject of the e-mail,
  the reason the e-mail was quarantined, and version information.

To view the quarantine log

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Virus Filtering. The Virus Filtering page opens.
        3.   In the Logs section, click Quarantine. The Quarantine Log page opens.
        4.   Click Back to return to the Virus Filtering page.




Spam Filtering
  Spam filtering overview
  The Spam Filtering tool allows incoming and outgoing e-mail to be filtered. The filtering can be done
  by file name, file size, and subject line. E-mails rejected as spam are deleted immediately from the
  server and bounced back to the sender. Note: Wildcards are permitted.

  Enabling and disabling spam filtering

To enable or disable spam filtering

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.




  20
                                                                               Chapter 1: Getting Started


        3.   Click Enabled next to Anti-Spam to disable spam filtering.

             OR

             Click Disabled next to Anti-Spam to enable spam filtering.
        4.   The page refreshes, showing the updated status of the spam filtering service.




  Enabling and disabling the exclusive whitelist
  The exclusive whitelist allows you to specify that only email from specific domains and e-mail
  addresses is accepted by the server. Any e-mail coming from senders whose e-mail domains or
  addresses are not in the whitelist is rejected. When you enable the exclusive whitelist, the only global
  e-mail filtering setting you can change is Only accept email from.

To enable or disable the exclusive whitelist

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.   Click Enabled next to Exclusive Whitelist to disable the exclusive whitelist.

             OR

             Click Disabled next to Exclusive Whitelist to enable the exclusive whitelist.
        4.   The page refreshes, showing the updated status of the exclusive whitelist.

  Global e-mail filtering overview
  The following global spam filtering options are available:
        •     Only accept email from - This configuration option is only available if you've enabled the
             exclusive whitelist. (See the Enabling and disabling the exclusive whitelist topic for more
             information.) If this option is available, none of the other configuration options below are
             available. This opens up the Always accept email from configuration page.
        •    Always accept email from
        •    Don't accept email from
        •    Don't send email to
        •    Don't accept email with these subjects
        •    Configure RBL Lists

  Always accept email from
  Specifying a domain or e-mail address from which you will always accept e-mail is known as
  whitelisting. Whitelisting a domain allows all e-mail from that domain through without going through
  spam filtering. Whitelisting a specific e-mail address allows all e-mail from that e-mail address
  through without going through spam filtering.



                                                                                                         21
  Printed Documentation


To whitelist a domain or e-mail address

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click
             Always accept email from. The Always accept email from configuration page opens.
        4.    In the Enter a domain or email address box, type the domain name or e-mail address
             that you want to always accept e-mail messages from.
        5.   Click Submit. The page refreshes.

To modify a whitelisted domain or e-mail address

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click
             Always accept email from. The Always accept email from configuration page opens.
        4.    In the table of domains and addresses at the bottom of the page, click Modify next to the
             domain or e-mail address you want to modify. A modification page opens.
        5.   In the Enter the modified domain or email address box, type the domain name or e-
             mail address that you want to always accept e-mail messages from.
        6.   Click Submit. The Always accept email from configuration page opens.

To delete a whitelisted domain or e-mail address

    Important: Deletion is immediate -- the system will not ask you to confirm.

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click
             Always accept email from. The Always accept email from configuration page opens.
        4.    In the table of domains and addresses at the bottom of the page, click Delete next to the
             domain or e-mail address you want to delete. The page refreshes.

  Don't accept email from
  Specifying a domain or e-mail address from which you never want to receive e-mail is known as
  blacklisting. Blacklisting a domain or e-mail address blocks all e-mail from that domain or e-mail
  address.

To blacklist a domain or e-mail address

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click Don't
             accept email from. The Don't accept email from configuration page opens.



  22
                                                                              Chapter 1: Getting Started


        4.    In the Enter a domain or email address box, type the domain name or e-mail address
             from which you never want to accept e-mail messages.
        5.   Click Submit. The page refreshes.




To modify a blacklisted domain or e-mail address

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click Don't
             accept email from. The Don't accept email from configuration page opens.
        4.    In the table of domains and addresses at the bottom of the page, click Modify next to the
             domain or e-mail address you want to modify. A modification page opens.
        5.   In the Enter the modified domain or email address box, type the domain name or e-
             mail address from which you never want to accept e-mail messages.
        6.   Click Submit. The Don't accept email from configuration page opens.

To delete a blacklisted domain or e-mail address

    Important: Deletion is immediate -- the system will not ask you to confirm.

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click Don't
             accept email from. The Don't accept email from configuration page opens.
        4.    In the table of domains and addresses at the bottom of the page, click Delete next to the
             domain or e-mail address you want to delete. The page refreshes.

  Don't send email to
  Specifying a domain or e-mail address to which you never want to send e-mail prevents any e-mail
  from being sent to that domain or e-mail address.

To add a domain or e-mail address to which you don't want to send e-mail

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click Don't
             send email to. The Don't send email to configuration page opens.
        4.    In the Enter a domain or email address box, type the domain name or e-mail address to
             which you never want to send e-mail messages.
        5.   Click Submit. The page refreshes.




                                                                                                      23
  Printed Documentation




To modify a domain or e-mail address to which you don't want to send e-mail

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click Don't
             send email to. The Don't send email to configuration page opens.
        4.    In the table of domains and addresses at the bottom of the page, click Modify next to the
             domain or e-mail address you want to modify. A modification page opens.
        5.    In the Enter the modified email or domain box, type the domain name or e-mail address
             to which you never want to send e-mail messages.
        6.   Click Submit. The Don't send email to configuration page opens.

To delete a domain or e-mail address to which you don't want to send e-mail

    Important: Deletion is immediate -- the system will not ask you to confirm.

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click Don't
             send email to. The Don't send email to configuration page opens.
        4.    In the table of domains and addresses at the bottom of the page, click Delete next to the
             domain or e-mail address you want to delete. The page refreshes.

  Don't accept email with these subjects
  Any e-mails received containing any of the specified words or phrases in their subject are flagged as
  spam. Several words and phrases are included by default.

To add a subject

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click Don't
             accept mail with these subjects. The Don't accept these subjects configuration page
             opens.
        4.   In the subject box, type the words or phrase to block.
        5.   Click Submit. The page refreshes.

To modify a subject

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.



  24
                                                                               Chapter 1: Getting Started


        3.    In the Please choose an option to configure Global Email Filtering section, click Don't
             accept mail with these subjects. The Don't accept these subjects configuration page
             opens.
        4.    In the table of words and phrases at the bottom of the page, click Modify next to the word
             or phrase you want to modify. A modification page opens.
        5.   In the Enter the modified subject box, type the corrected subject.
        6.   Click Submit. The Don't accept these subjects configuration page opens.

To delete a subject

    Important: Deletion is immediate -- the system will not ask you to confirm.

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click Don't
             accept mail with these subjects. The Don't accept these subjects configuration page
             opens.
        4.    In the table of words and phrases at the bottom of the page, click Delete next to the word
             or phrase you want to delete. The page refreshes.

  Configure RBL Lists
  This setting allows you to specify the block listing domain that you want to use for spam filtering. The
  default server is www.spamhaus.org.

To add the RBL domain

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click
             Configure RBL Lists. The Configure RBL Lists page opens.
        4.   In the Enter a RBL Domain to use box, type the RBL domain name.
        5.   Click Submit. The page refreshes.



To modify an RBL domain

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click
             Configure RBL Lists. The Configure RBL Lists page opens.
        4.    In the table of RBL domains at the bottom of the page, click Modify next to the RBL
             domain you want to modify. A modification page opens.
        5.   In the Enter the modified RBL domain box, type the corrected RBL domain.
        6.   Click Submit. The page refreshes.


                                                                                                        25
  Printed Documentation




To delete an RBL domain

    Important: Deletion is immediate -- the system will not ask you to confirm.


        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Please choose an option to configure Global Email Filtering section, click
             Configure RBL Lists. The Configure RBL Lists page opens.
        4.    In the table of RBL domains at the bottom of the page, click Delete next to the RBL
             domain you want to Delete.




  Modifying the spam filtering score
  The spam filter looks at various parts of each incoming e-mail (including the body, subject, and
  headers) to determine the likelihood that the e-mail is spam. The filter then assigns a numerical score
  from 0.0 to 10.0 to the e-mail based on what it finds. The higher the score, the more likely it is that
  the e-mail is spam.
  You can set the score threshold for the spam filter to any number between 0.0 and 10.0. E-mails
  assigned a score higher than the threshold specified are not passed on to the user's inbox. The
  default setting is 8.0. That means that only e-mails given a score of less than 8.0 will be passed
  through to users. At that high a setting, a great deal of spam is likely to get through, but you don't run
  a high risk of flagging legitimate e-mails as spam. Lowering the setting will trap more spam but also
  raises the risk of flagging legitimate e-mails as spam.

To modify the spam filtering score

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.    In the Spam Filtering Score section, use the drop-down lists to select a numerical value
             for the spam filtering threshold.
        4.   Click Submit.

  Viewing RBL rejections log
  The RBL (real-time block list) rejections log identifies the IP address blocked, the pid (process
  identification number), the rejection reason, and the URL to the spamhaus.org information for that IP
  address.

To view the RBL rejections log


  26
                                                                             Chapter 1: Getting Started


        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.   Click RBL Rejections. The RBL Rejections log page opens.

  Viewing spam rejections log
  The Spam rejections log identifies the senders and recipients of the blocked e-mails as well as the
  reason the e-mail was rejected.

To view the spam rejections log

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Spam Filtering. The Spam Filtering page opens.
        3.   Click RBL Rejections. The RBL Rejections log page opens.




LDAP
  LDAP overview
  LDAP (Lightweight Directory Access Protocol) is a protocol that enables you to search for contacts
  from anywhere on the Internet or from your internal network. It can also be used to look up services
  on a network.



  Enabling and disabling LDAP

    Important: Changes to the status will not take effect until the server is rebooted. When you click
    Reboot Server Now on this page, the server will reboot immediately. You will not be prompted
    to confirm your request.


To enable or disable LDAP

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click LDAP. The LDAP page opens.
        3.   Click Enabled to disable LDAP.

             OR

             Click Disabled to enable LDAP.
        4.   The page refreshes, showing the updated status of LDAP.
        5.    If you have no other changes to make that require a server reboot, click Reboot Server
             Now to reboot the server now.



                                                                                                         27
  Printed Documentation


  Adding an LDAP entry

To add an LDAP entry

       1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
       2.   Click LDAP. The LDAP page opens.
       3.   In the Personal Information section, type your contact details.
       4.   In the Business Information section, type your business's contact details.
       5.   Click Add Entry. The page refreshes, showing the new LDAP entry in the list of entries.




  Modifying an LDAP entry

To modify an LDAP entry

       1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
       2.   Click LDAP. The LDAP page opens.
       3.   3.   (a) If you know the name associated with the LDAP entry you want to modify:
                      i.   In the Select Entry list box, select the LDAP entry you want to modfy.
                     ii.   Click Modify.
            (b) If you do not know the name associated with the LDAP entry you want to delete:
                      i.     In the Search for Entry box, type all or part of the name associated with
                        the LDAP entry you want to modify.
                     ii.   Note: The search is not case-sensitive.
                     iii.     Click Search. The page refreshes and displays a list of matching LDAP
                         entries at the bottom of the page.
                     iv.   Click the Modify link next to the LDAP entry you want to modify.
       4.    Click Modify to save your changes. The page refreshes and displays a blank LDAP entry
            form.

  Deleting an LDAP entry

To delete an LDAP entry

       1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
       2.   Click LDAP. The LDAP page opens.
       3.   (a) If you know the name associated with the LDAP entry you want to delete:
                      i.   In the Select Entry list box, select the LDAP entry you want to delete.
                     ii.   Click Delete. A confirmation page opens.




  28
                                                                               Chapter 1: Getting Started


                      iii.    Click Confirm Deletion to confirm the deletion, or click Back to return to
                          the LDAP page. The LDAP page opens.
             (b) If you do not know the name associated with the LDAP entry you want to delete:
                       i.     In the Search for Entry box, type all or part of the name associated with
                         the LDAP entry you want to delete.
                      ii.   Note: The search is not case-sensitive.
                      iii.     Click Search. The page refreshes and displays a list of matching LDAP
                          entries at the bottom of the page.
                      iv.    Click the Delete link next to the LDAP entry you want to delete. A
                        confirmation page opens.
                      v.    Click Confirm Deletion to confirm the deletion, or click Back to return to
                       the LDAP page. The LDAP page opens.




Mail Backup
  Enabling and disabling mail backups
  You can set the mail backup to either keep a complete copy of all e-mail messages or keep a copy of
  the e-mail header information only. You can also choose to disable mail backup completely by
  disabling both options.

To keep a complete copy of all e-mail messages

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Mail Backup. The Mail Backup page opens.
        3.    If the Enabled/Disabled column next to Keep a complete copy of all email messages
             shows Disabled, click Disabled to enable the full backup.

              Tip: If Keep a complete copy of all email messages shows Enabled, then the full
              backup is already enabled.


To keep a copy of the e-mail header information only

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Mail Backup. The Mail Backup page opens.
        3.   If the Enabled/Disabled column next to Keep a copy of all email HEADER information
             ONLY shows Disabled, click Disabled to enable the header-only backup.

              Tip: If Keep a copy of all email HEADER information ONLY shows Enabled, then the
              header-only backup is already enabled.


To disable mail backups



                                                                                                           29
  Printed Documentation


        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Mail Backup. The Mail Backup page opens.
        3.    If the Enabled/Disabled column next to Keep a complete copy of all email messages
             shows Enabled, click Enabled to disable the full backup.
        4.   If the Enabled/Disabled column next to Keep a copy of all email HEADER information
             ONLY shows Enabled, click Enabled to disable the header-only backup.

              Tip: If both Keep a complete copy of all email messages and Keep a copy of all
              email HEADER information ONLY show Disabled, then mail backups are disabled.




  Viewing the mail backup log
  The mail backup log contain a log of all changes made to the mail backup settings, including the date
  and time of the change, the username of the person who made the change, the change made, and
  the names of the backup files that have been created.

To view the mail backup log

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Mail Backup. The Mail Backup page opens.
        3.   In the Logs section, click Mail Backup. The Mail Backup Log page opens.

  Modifying the mail backup settings
  The Mail Backup page allows you to change the number of months that mail backups are retained
  (the default retention period is 36 months) and to set an e-mail address to which notifications about
  the success or failure of the backup will be sent. An external USB hard drive is recommended. If one
  is present, it will appear in the Mail Backup Settings section of the Mail Backup page and show the
  size of the drive. If one is not present, the section indicates "Not Present".

To modify the mail backup settings

        1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
        2.   Click Mail Backup. The Mail Backup page opens.
        3.   Click Enable either Keep a complete copy of all E-mail messages OR Keep a copy of all
             E-mail HEADER information ONLY
        3.    In the Mail Backup Settings section, in the Store the Email for (Months) box, type the
             number of months you want the mail backups stored.
        4.    In the Mail Backup E-mail box, type the e-mail address to which mail backup notifications
             should be sent.
        5.   If there is a USB Drive present, you may select this option for where you want to backup
             your mail.
        6.   Click Submit. The page refreshes.




  30
                                                                             Chapter 1: Getting Started




       Mail Archive
       You can search the mail archive for messages from an individual users email, or from every
          user on the system.



       To search the mail archive:

       1.   In the side navigation menu, click Mail Settings. The Mail Settings page opens.
       2.   Click Mail Archive. The Mail Archive page opens.
       3.   Select the user you would like to search for message under, OR select ALL USERS to
            search every user.
       4.   Enter the keyword you would like to search for.
       5.   Select the category of the message body that you would like to search from the category
            drop down (From, To, Subject, CC, or BCC), OR select ALL MESSAGES to search all
            messages.
       6.   Click Search. The page refreshes.




Chapter 4: Security Settings


Firewall
 Firewall overview
 A firewall protects a server by preventing unauthorized access to the private network. The Firewall
 section of the administration interface allows you to enable or disable global protection, configure
 custom protection for a specific IP address, block or allow specific Web sites, block ports, and
 configure NATs.

 Enabling and disabling global firewall protection



                                                                                                        31
  Printed Documentation


  The Global Firewall Configuration page gives the statuses of firewall protection for all services
  running on the server. These global settings apply to all IP addresses on the network except IP
  addresses for which custom settings have been added. Services for which firewall protection can be
  enabled or disabled include Telnet, FTP, Secure Shell, SMTP, WWW, POP3, NNTP, IMAP, ICQ, IRC
  DCC, Napster, QuickTime (streaming video), Real Audio, Shoutcast Server, MSN Game Zone, Citrix
  MetaFrame, pcAnywhere, and Windows 2000 Terminal Server.

To enable or disable firewall protection

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.   Click Global Firewall Configuration. The Global Firewall Configuration page opens.
        4.   Click Enabled next to the mail service for which you want to disable firewall protection.

             OR

             Click Disabled next to the service for which you want to enable firewall protection.
        5.   The page refreshes, showing the updated status of the mail services.




  Configuring firewall protection for a specific IP address
  By default, the global firewall protection settings apply to all network IP addresses, but you can
  configure custom firewall protection for individual IP addresses.
  The Specific IP Address to configure page allows you to customize firewall settings for a specific IP
  address on the local network. The page also displays a list of IP addresses that have custom firewall
  settings.
  Services for which custom firewall protection can be enabled or disabled include Telnet, FTP, Secure
  Shell, SMTP, WWW, POP3, NNTP, IMAP, ICQ, IRC DCC, Napster, QuickTime (streaming video),
  Real Audio, Shoutcast Server, MSN Game Zone, Citrix MetaFrame, pcAnywhere, and Windows
  2000 Terminal Server.

To add firewall protection for a specific IP address

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.    Click Specific IP Address to configure. The Specific IP Address to configure page
             opens.
        4.    In the IP Address box, type in the IP address for which you want to configure firewall
             protection.
        5.    Click Configure. The User Defined Firewall Configuration page for that IP address opens,
             showing the current status of firewall protection for that IP address.
        6.    Click Enabled next to a service to disable firewall protection for that service or click
             Disabled next to a service to enable firewall protection for that service.




  32
                                                                                 Chapter 1: Getting Started


To modify firewall protection for a specific IP address

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.    Click Specific IP Address to configure. The Specific IP Address to configure page
             opens.
        4.    Click Modify next to the IP address whose firewall configuration you want to modify. The
             User Defined Firewall Configuration page for that IP address opens, showing the current
             status of firewall protection for that IP address.
        5.    Click Enabled next to a service to disable firewall protection for that service or click
             Disabled next to a service to enable firewall protection for that service.

To delete custom firewall configuration for a specific IP address

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.    Click Specific IP Address to configure. The Specific IP Address to configure page
             opens.
        4.    In the IP Addresses with modified firewall configurations section at the bottom of the
             page, click Delete next to the IP address whose custom firewall configuration you want to
             delete. The User Defined Firewall Configuration page for that IP address opens, showing
             the current status of firewall protection for that IP address.
        5.    Click Delete User Defined Firewall Configuration. The Specific IP Address to configure
             page opens.

  Web site blocker overview
  The Web Site Blocker tool allows you to manage global access to Web sites based on IP address or
  domain. You can also toggle the settings for individual sites to temporarily allow or disallow access to
  a Web site or IP address in the list.
  You can choose to either only allow access to the list of Web sites in the tool or allow access to all
  Web sites except those listed in the tool.

  Allowing and disallowing Web sites
  Setting up the Web Site Blocker to allow or disallow a list of sites involves two main tasks:
        1.   Creating the list of Web sites or IP addresses to either allow or block
        2.   Setting the flag to allow or block the list of Web sites or IP addresses

To create a list of Web sites or IP addresses

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.   Click Web Site Blocker. The Web Site Blocker page opens.
        4.   In the Web/IP Address box, type the Web site or IP address that you want to block.



                                                                                                           33
  Printed Documentation


        5.    Click Add Site. The page refreshes, showing the Web site or IP address in the list at the
             bottom of the page.

To allow access only to the list of Web sites or IP addresses

        •     On the Web Site Blocker page, click Allow Listed Websites. The page refreshes and
             displays "Only websites listed are allowed." at the top of the table of Web sites.

To block access to the list of Web sites or IP addresses

        •     On the Web Site Blocker page, click Disallow Listed Websites. The page refreshes and
             displays "All websites except those in the list below are allowed." at the top of the table of
             Web sites.




  Deleting a site from the allowed/disallowed list

To delete a site from the allowed/disallowed list

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.   Click Web Site Blocker. The Web Site Blocker page opens.
        4.   Click Delete next to the Web site you want to delete from the list. The page refreshes.

  Temporarily allowing or disallowing access to a site
  Once you've set up a list of blocked or allowed sites, you can toggle the settings for individual sites in
  the list to temporarily allow or disallow access to the site or IP address.

To temporarily allow access to a Web site in disallowed list

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.   Click Web Site Blocker. The Web Site Blocker page opens.
        4.    Click Disabled next to the Web site you want to allow access. The page refreshes and
             displays the new access status for the Web site.

To temporarily disallow access to a Web site in allowed list

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.   Click Web Site Blocker. The Web Site Blocker page opens.
        4.    Click Enabled next to the Web site you want to disallow access. The page refreshes and
             displays the new access status for the Web site.



  34
                                                                                Chapter 1: Getting Started


  Port blocker overview
  The Port Blocker page allows you to block access to the server based on port number.

    Note: Incoming ports are local ports and outgoing ports are remote ports.




  Blocking a port

To block a port

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.   Click Port Blocker. The Port Blocker page opens.
        4.   In the Port box, type the port number to block.
        5.   In the Destination drop-down list, select Local or Remote.
        6.   In the Protocol drop-down list, select TCP or UDP.
        7.    Click Add. The page refreshes, displaying the port in the list of blocked ports at the
             bottom of the page.

  Enabling and disabling a blocked port

    Note: Enabling temporarily unblocks a port. Disabling re-establishes the block.


To enable or disable a blocked port

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.   Click Port Blocker. The Port Blocker page opens.
        4.   Click Disabled next to the port you want to enable.

             OR

             Click Enabled next to the port you want to disable again.
        5.   The page refreshes, showing the update status of that port.

  Modifying a blocked port

To modify a blocked port

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.



                                                                                                       35
  Printed Documentation


        3.   Click Port Blocker. The Port Blocker page opens.
        4.    Click Modify next to the port you want to modify. The page refreshes, showing the details
             for that port at the top of the page.
        5.   Modify the fields as required.
        6.   Click Modify Port. The page refreshes, showing the updated details for that port.

  Deleting a blocked port

To delete a blocked port

 Important: Deletion is immediate -- the system will not ask you to confirm.

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.   Click Port Blocker. The Port Blocker page opens.
        4.   Click Delete next to the port you want to delete. The page refreshes.

  NAT overview
  The NAT (Network Address Translation) page allows you to specify a port you wish to have
  translated to an internal machine in order to have Internet packets routed to it.

  Adding a NAT

To add a NAT

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.    Click NAT (Network Address Translation). The NAT (Network Address Translation)
             page opens.
        4.   In the IP Address box, type the IP address.
        5.   In the Destination Port box, type the port you want translated.
        6.    Click Add Site. The page refreshes, showing the new NAT in the table at the bottom of
             the page.

  Enabling and disabling a NAT

To enable or disable a NAT

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.    Click NAT (Network Address Translation). The NAT (Network Address Translation)
             page opens.




  36
                                                                             Chapter 1: Getting Started


        4.   Click Enabled next to the NAT you want to disable.

             OR

             Click Disabled next to the NAT you want to enable.
        5.   The page refreshes, showing the update status of that port.

  Deleting a NAT

To delete a NAT

    Important: Deletion is immediate -- the system will not ask you to confirm.

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Firewall. The Firewall page opens.
        3.    Click NAT (Network Address Translation). The NAT (Network Address Translation)
             page opens.
        4.   Click Delete next to the NAT you want to delete. The page refreshes.




VPN
  VPN overview
  A Virtual Private Network (VPN) enables IP traffic to travel securely over a public TCP/IP network
  (Internet) by encrypting all traffic from one network to another and allowing secure communication.
  PPTP (Point-to-Point Tunneling Protocol) is the protocol used to implement a VPN.

  Enabling and disabling PPTP

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To enable or disable PPTP

        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click VPN. The VPN - PPTP (Point to Point Tunneling Protocol) page opens.
        3.   Click Enabled to disable the VPN.

             OR

             Click Disabled to enable the VPN.
        4.   The page refreshes, showing the updated status of the VPN-PPTP service.



                                                                                                        37
  Printed Documentation


       5.    If you have no other changes to make that require a server reboot, click Reboot Server
            Now to reboot the server now.




  Modifying VPN - PPTP settings

Modifying VPN - PPTP settings

       1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
       2.   Click VPN. The VPN - PPTP (Point to Point Tunneling Protocol) page opens.
       3.    In the Username box, type the username of the account on the external network to
            connect to.
       4.   In the Password box, type the password for the specified username.
       5.   In the MS Wins / NT Server IP box, type the IP address of the external server or network.
       6.    In the Local IP Range box, type the three trailing digits of the external IP range. This
            identifies the range of IP addresses that are allowed to be assigned on the internal
            network.
       7.    In the Remote IP Range, type the three trailing digits of the external IP range. This
            identifies the range of IP addresses that will be assigned on the external network.

             Note: Each local IP address on the network must have a corresponding IP address on
             the external network, also known as a Point-to-Point connection

       8.   Click Submit. The page refreshes, showing the updated information




Passwords
  Passwords overview
  The Passwords page allows you to change the passwords for the following system usernames:
       •    netadmin (global administration account)
       •    wwwadmin (FTP account into site)
       •    ftpadmin (separate account for anonymous FTP)
       •    mailadmin (account for accessing the directory where the mail backups are saved)
       •    root (master account on shell)

  Modifying a password

To change a password



  38
                                                                             Chapter 1: Getting Started


        1.   In the side navigation menu, click Security Settings. The Security Settings page opens.
        2.   Click Passwords. The Passwords page opens.
        3.   In the Password box next to the appropriate username, type the new password.
        4.   Click Change. The page refreshes.



   IPSEC


     Important: Changes will not take effect until the server is rebooted. When you click Reboot
     Server Now on this page, the server will reboot immediately. You will not be prompted to
     confirm your request.



IPSEC Overview
The IPSEC page allows you to create a IPSEC connection between your machine and another.



To enable or disable IPSEC
  To Enable or Disable IPSEC

      1. In the side navigation menu, click Security Settings. The Security Settings page opens.
      2. Click IPSEC.
      3. Click enable to Enable IPSEC.
      OR
      Click Disable to Disable IPSEC.
      4. The page will refresh.


To Add / Modify or Delete an IPSEC Tunnel
   To Add an IPSEC Tunnel

      1. In the side navigation menu, click Security Settings. The Security Settings page opens.
      2. Click IPSEC.
      3. Enter your IPSEC Information (Tunnel Name, Secret, Left, Right, Left Subnet, Right
      Subnet, Left Next Hop, Right Next Hop, IKE Life Time Min., Key Life Min., PFS, Compress)

      4. Click Add.




                                                                                                    39
  Printed Documentation


       Modify or Delete an IPSEC Tunnel
       1. In the side navigation menu, click Security Settings. The Security Settings page opens.
       2. Click IPSEC.
       3. Modify the IPSEC tunnel information as needed.
       4. Click Modify.
       5. If you would like to delete an IPSEC Tunnel, simply click the delete button under the IPSEC
       tunnel you would like to delete.


Chapter 5: Network Services


Host Settings
  Host settings overview
  The Host Settings page allows host-related information such as domain name and host IP address to
  be changed.
         •     The Hostname section of the page identifies and allows you to change the current
              hostname associated with the server.
         •     The Local Ethernet (LAN) section of the page identifies and allows you to change the
              local Ethernet (LAN) IP address and subnet mask.
         •     The Dedicated IP section of the page identifies and allows you to change the dedicated
              IP address, netmask, and gateway IP address associated with the server.
         •     The Connection Type section of the page allows you to change the connection type
              (dedicated IP, PPPoe, cable modem, or modem)
                  •   The Primary Connection section defines your primary connection to the internet.
                  •   The Failover Connection section defines your secondary connection (if one)
                      which is used in the event that your primary connection to the internet is lost.

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.



  Modifying the hostname
  The hostname is the domain name associated with the network server.

To modify the hostname

         1.   In the side navigation menu, click Network Services. The Network Services page opens.
         2.   Click Host Settings. The Host Settings page opens.


  40
                                                                               Chapter 1: Getting Started


        3.   In the Hostname box, type the new hostname.
        4.   Click Modify Domain.

  Modifying the local Ethernet settings
  The local Ethernet IP address is the IP of this server on the network.

To modify the local Ethernet settings

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click Host Settings. The Host Settings page opens.
        3.   In the Local Ethernet (LAN) section, in the IP Address box, type the new IP address.
        4.   In the Netmask box, type the new subnet mask.
        4.   Click Modify. The page refreshes.

  Modifying the dedicated IP settings
  The dedicated IP address is the IP address of this server on the Internet.

To modify dedicated IP addresses

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click Host Settings. The Host Settings page opens.
        3.   In the Dedicated IP section, in the IP Address box, type the new dedicated IP address.
        4.   In the Netmask box, type the new subnet mask.
        5.   In the Gateway box, type the new gateway IP address.
        6.   Click Modify. The page refreshes.



  Modifying your Primary Connection
        1. In the side navigation menu, click Network Services. The Network Services page opens.
        2. Click Host Settings. The Host Settings page opens
       3. Select the Connection Type.
       4. Enter the required information for the selected connection type.
       5. Click Modify.
       6. A restart will be required for the changes to take effect.

  Modifying your Failover connection
        1. In the side navigation menu, click Network Services. The Network Services page opens.
        2. Click Host Settings. The Host Settings page opens
       3. Select the connection type.



                                                                                                      41
  Printed Documentation


       4. Enter the required information for the selected connection type.
       5. Click Modify.
       6. A restart will be required for the changes to take effect.



  Modifying the connection type
  The connection type can be changed to one of the following:
        •    Dedicated IP
        •    PPPoe-
        •    Cable modem
        •    Modem

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To change the connection type to dedicated IP

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click Host Settings. The Host Settings page opens.
        3.   In the Connection Type drop-down list, select Dedicated IP.
        4.    Click Change Connection Type. The Change Connection Type - Dedicated IP page
             opens.
        5.   In the IP Address box, type the dedicated IP address.
        6.   In the Netmask box, type the subnet mask.
        7.   In the Gateway box, type the gateway IP address.
        8.   Click Submit. The Host Settings page opens.
        9.    If you have no other changes to make that require a server reboot, click Reboot Server
             Now to reboot the server now.

To change the connection type to PPPoe

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click Host Settings. The Host Settings page opens.
        3.   In the Connection Type drop-down list, select PPPoe.
        4.   Click Change Connection Type. The Change Connection Type - PPPoe page opens.
        5.   In the Username box, type the username used to connect to PPPoe.
        6.   In the Password box, type the password associated with the PPPoe username.
        7.   Click Submit. The Host Settings page opens.
        8.    If you have no other changes to make that require a server reboot, click Reboot Server
             Now to reboot the server now.



  42
                                                                          Chapter 1: Getting Started


To change the connection type to cable modem

      1.   In the side navigation menu, click Network Services. The Network Services page opens.
      2.   Click Host Settings. The Host Settings page opens.
      3.   In the Connection Type drop-down list, select Cable Modem.
      4.    Click Change Connection Type. The Change Connection Type - Cable Modem page
           opens.
      5.   In the DHCP drop-down list, select Yes if DHCP is used or No if DHCP is not used.
      6.   Click Next.
      7.   (a) If you indicated that, yes, DHCP is used:
                      i.   In the CR Number box, type the xx.
                     ii.   In the Domain box, type the xx.
                    iii.   Click Submit. The Host Settings page opens.
           (b) If you indicated that, no, DHCP is not used:
                      i.   In the IP Address box, type the IP address of the cable modem.
                     ii.   In the Netmask box, type the subnet mask for the cable modem.
                    iii.   In the Gateway box, type the IP address of the gateway.
                    iv.    Click Submit. The Host Settings page opens.
       8. If you have no other changes to make that require a server reboot, click Reboot Server
          Now to reboot the server now.

To change the connection type to modem

      1.   In the side navigation menu, click Network Services. The Network Services page opens.
      2.   Click Host Settings. The Host Settings page opens.
      3.   In the Connection Type drop-down list, select the type of connection.
      4.   Click Change Connection Type. The Change Connection Type - Modem page opens.
      5.   In the Username box, type the username used to log onto the dial-up account.
      6.   In the Password box, type the password associated with the account.
      7.   In the Phone Number box, type the phone number for the dial-up connection.
      8.    In the Custom Modem init String box, type the modem initialization string you want to
           use.
      9.   Click Submit. The Host Settings page opens.
      10. If you have no other changes to make that require a server reboot, click Reboot Server
          Now to reboot the server now.




DNS

                                                                                                    43
  Printed Documentation


  DNS overview
  The Dynamic DNS page allows you to enable or disable dynamic DNS, define the dynamic DNS host
  to use, and modify the login details for the user account with that host.

  Enabling and disabling dynamic DNS

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To enable or disable dynamic DNS

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click DNS. The Dynamic DNS page opens.
        3.   Click Disabled next to Dynamic DNS to enable dynamic DNS.

             OR

             Click Enabled next to Dynamic DNS to disable dynamic DNS.




  Modifying dynamic DNS settings
  More information about DynDNS's dynamic DNS services is available at
  http://www.dyndns.com/services/dns/dyndns. More information about No-IP.com is available at.
  http://www.no-ip.com.

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To modify dynamic DNS settings

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click DNS. The Dynamic DNS page opens.
        3.   In the Dynamic DNS Host box, type the hostname of the dynamic DNS to use.
        4.   In the Username box, type the username for connecting to the dynamic DNS.
        5.   In the Password box, type the password for the username.
        6.   In the Provider drop-down list, select the dynamic DNS provider to use.
        7.   Click Submit.




  44
                                                                              Chapter 1: Getting Started



Network Tools
  Network Tools overview
  Available network tools include:
        •     Ping - The Ping Query tool allows you to enter an IP address that is local or external and
             retrieve the current network status of that IP.
        •     Traceroute - The Traceroute tool shows the path that a packet (your connection) would
             take to a desired destination.
        •    NS Lookup - The NS Lookup Query tool allows you to look up the IP address associated
             with a hostname (e.g. myexamplesite.net) or the hostname associated with an IP address.
        •     Whois - The Whois Query tool allows you to look up a hostname to determine if it is
             registered and if so the related information such as contact information.




  Ping
  The Ping Query tool allows you to enter an IP address that is local or external and retrieve the
  current network status of that IP. It sends a packet to the destination IP address and times how long
  it takes for a response to come back. It is useful for helping to determine if there is a problem with
  your Internet connection or DNS servers. Consistent ping times higher than 250 ms could indicate a
  problem with your connection. More information about this tool is available at
  http://en.wikipedia.org/wiki/Ping.

To perform a ping

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click Network Tools. The Network Tools page opens.
        3.   Click Ping Query. The Ping Query page opens.
        4.   In the hostname box, type the domain or IP address that you want to ping.
        5.   Click Query.

Ping results




                                                                                                       45
  Printed Documentation




  The Ping Query results page lists each ping request and the time taken for the response. It also
  shows the minimum, average, and maximum ping times, the number of packets sent and received,
  and the percentage of packet loss.




  Traceroute
  The Traceroute tool traces the route that a packet of data takes from your computer (or a server) to a
  desired destination. It identifies the number of hops that the data makes as well as the latency (or
  delay, usually in milliseconds) experienced for each hop. More information about the tool is available
  at http://en.wikipedia.org/wiki/Traceroute.

To perform a traceroute

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click Network Tools. The Network Tools page opens.
        3.   Click Traceroute Query. The Traceroute Query page opens.
        4.    In the hostname box, type the hostname or IP address for which you want to perform a
             traceroute.
        5.   Click Query.

Traceroute results




  46
                                                                               Chapter 1: Getting Started




  The Traceroute results page lists each server and IP address that your packet took to reach its final
  destination. Note: the pattern or steps of a traceroute are rarely consistent and each traceroute result
  will probably not be identical.
  For each hop, the results show:
        •    the hop number, starting with 1
        •    the hostname and host IP address for that hop
        •    the latency (or delay) in milliseconds for each of the three packets for that hop




  NS Lookup
  The NS Lookup Query tool allows you to look up the IP address associated with a hostname (e.g.
  myexamplesite.net) or the hostname associated with an IP address.

To perform an NS lookup query

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click Network Tools. The Network Tools page opens.
        3.   Click NS Lookup Query. The NS Lookup Query page opens.
        4.    In the hostname box, type the hostname or IP address for which you want to perform an
             NS lookup.
        5.   Click Query.

NS Lookup results




                                                                                                       47
  Printed Documentation




  The results page shows any errors encountered during the query as well as the related CNAME
  information such as IP address and hostname.

  Whois
  The Whois Query tool allows you to look up a hostname to determine if it is registered and if so the
  related information such as contact information. More information about the tool is available at
  http://en.wikipedia.org/wiki/Whois.

 Important: Do not include the leading www. in the domain name. For example, type
 myexamplesite.net, not www.myexamplesite.net.


To perform a Whois lookup

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click Network Tools. The Network Tools page opens.
        3.   Click Whois Query. The Whois Query page opens.
        4.   In the hostname box, type the domain for which you want to perform a Whois lookup.
        5.   Click Query.




Whois results




  48
                                                                        Chapter 1: Getting Started




 The Whois Results page displays the information related to the hostname such as the domain
 expiration date, host, DNS, and contact information.




Services
                                                                                               49
  Printed Documentation


  Services overview
  The Services page allows you to restart system network services and change service-related port
  numbers.

  Enabling and disabling WWW

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To enable or disable WWW

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click Services. The Services page opens.
        3.   Click Enabled next to WWW to disable the WWW service.

             OR

             Click Disabled next to WWW to enable the WWW service.
        4.   The page refreshes, showing the updated status of the WWW service.



  Enabling and disabling FTP

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To enable or disable FTP

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click Services. The Services page opens.
        3.   Click Enabled next to FTP to disable the FTP service.

             OR

             Click Disabled next to FTP to enable the FTP service.
        4.   The page refreshes, showing the updated status of the FTP service.
        5.    If you have no other changes to make that require a server reboot, click Reboot Server
             Now to reboot the server now.

  Enabling and disabling Anonymous FTP




  50
                                                                            Chapter 1: Getting Started



    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To enable or disable Anonymous FTP

       1.   In the side navigation menu, click Network Services. The Network Services page opens.
       2.   Click Services. The Services page opens.
       3.   Click Enabled next to Anonymous FTP to disable the Anonymous FTP service.

            OR

            Click Disabled next to Anonymous FTP to enable the Anonymous FTP service.
       4.   The page refreshes, showing the updated status of the Anonymous FTP service.



  Modifying the FTP port

To modify the FTP port

       1.   In the side navigation menu, click Network Services. The Network Services page opens.
       2.   Click Services. The Services page opens.
       3.   In the FTP Port box, type the new port number to use for FTP service.
       4.   Click Change. The page refreshes.




DHCP Configuration
  DHCP configuration overview
  The DHCP Configuration page allows you to Enable and Disable DHCP and change the DHCP IP
  range (range of IP addresses available for assignment to the local network).




  Enabling and disabling DHCP

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To enable or disable DHCP


                                                                                                   51
  Printed Documentation


       1.   In the side navigation menu, click Network Services. The Network Services page opens.
       2.   Click DHCP. The DHCP Configuration page opens.
       3.   Click Enabled next to DHCP to disable the DHCP service.

            OR

            Click Disabled next to DHCP to enable the DHCP service.
       4.   The page refreshes, showing the updated status of the DHCP service.



  Modifying the DHCP IP range

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To modify the DHCP IP range

       1.   In the side navigation menu, click Network Services. The Network Services page opens.
       2.   Click DHCP. The DHCP Configuration page opens.
       3.    In the Current IP Range section, in the From box, type the last one to three digits of the
            starting IP address of the range.
       4.   In the To box, type the last one to three digits of the ending IP address of the range.
       5.   Click Modify. The page refreshes.




  Viewing active DHCP leases
  The table of active DHCP leases shows the network IP addresses with active DHCP leases and the
  MAC addresses of the computers connected to them.

To view active DHCP leases

       1.   In the side navigation menu, click Network Services. The Network Services page opens.
       2.    Click DHCP. The DHCP Configuration page opens, showing the table of active DHCP
            leases at the bottom of the page.




File Sharing
  File sharing overview


  52
                                                                                Chapter 1: Getting Started


  File sharing involves making a drive or folder on the network accessible from other computers,
  typically through a LAN or Intranet. The File Sharing page allows you to change file sharing settings
  such as work group and server description. (More information about file sharing is available at
  http://en.wikipedia.org/wiki/Shared_resource.)

  Enabling and disabling file sharing

    Important: Changes will not take effect until the server is rebooted. When you click Reboot
    Server Now on this page, the server will reboot immediately. You will not be prompted to
    confirm your request.


To enable or disable file sharing

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click File Sharing. The File Sharing page opens.
        3.   Click Enabled next to File Sharing to disable the file sharing service.

             OR

             Click Disabled next to File Sharing to disable the file sharing service.
        4.   The page refreshes, showing the updated status of the file sharing service.




  Modifying file sharing settings

To modify file sharing settings

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click File Sharing. The File Sharing page opens.
        3.    In the Act as Primary Domain Controller drop-down list, select Yes if you want the
             server to act as a primary domain controller.
        4.    In the Common Directory Share drop-down list, select Yes to identify the file share as a
             common directory share.
        5.   In the Encrypt Passwords drop-down list, select Yes to encrypt passwords.
        6.   In the Work Group box, type the name of the work group.
        7.   In the Server Name box, type the name of the server.
        8.   In the Server Description box, type a description of the server.
        9.    In the NT WINS Server IP Address box, type the IP address for the NT WINS server, if
             any.
        10. If you would like to add custom folders, simply enter the folder name into the "Create
            Custom Folder" text field, and click the submit button.




                                                                                                       53
  Printed Documentation


               10. a) To add a user to a customer folder, once the folder is created, a new box will
                   appear beneath the "Create Custom Folder" that will show the name of the folder.
                   Simply select a user from the drop down menu, and click the "add user" button
                   b) To remove a user, simply click the delete button beside the user you want to
                   remove.
                   c) To rename your customer folder, simply enter the new name into the "folder
                   name" text field and click the "change folder" button.
                   d) To delete a customer folder, simply click the "Delete folder" button under the
                   "action" column .
        11. Click Submit. The page refreshes.




DMZ
  DMZ overview
  The DMZ is a separated and protected subnetwork that is in place between the internal network and
  the Internet. It allows the users on the server to access the Internet without exposing the entire
  network. The DMZ page allows you to create or modify a DMZ. (More information is available at
  http://en.wikipedia.org/wiki/Demilitarized_zone_%28computing%29.)

  Adding a DMZ

To add a DMZ

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click DMZ. The DMZ page opens.
        3.   In the Configuration section, in the IP Address box, type the IP address for the DMZ.
        4.    In the Configuration section, in the Netmask box, type the subnet mask address for the
             DMZ.
        5.    Click Add. The page refreshes, showing the new DMZ in the table of DMZs at the bottom
             of the page.

  Modifying a DMZ

To modify a DMZ

        1.   In the side navigation menu, click Network Services. The Network Services page opens.
        2.   Click DMZ. The DMZ page opens.
        3.    In the DMZ section, in the IP Address box for the DMZ you want to modify, type the new
             IP address for the DMZ.
        4.   In the DMZ section, in the Netmask box for the DMZ you want to modify, type the subnet
             mask address for the DMZ.



  54
                                                                             Chapter 1: Getting Started


       5.   Click Modify. The page refreshes.

  Deleting a DMZ

    Important: Deletion is immediate -- the system will not ask you to confirm.


To delete a DMZ

       1.   In the side navigation menu, click Network Services. The Network Services page opens.
       2.   Click DMZ. The DMZ page opens.
       3.    In the DMZ section, click Delete next to the DMZ you want to delete. The page refreshes,
            showing the updated list of DMZs at the bottom of the page.




Chapter 6: System Maintenance


Update
  Update overview
  The Update page allows you to enable and disable automatic updates and view and manually
  retrieve the current software updates for your server.

  Enabling and disabling automatic updates

To enable or disable automatic updates

       1.    In the side navigation menu, click System Maintenance. The System Maintenance page
            opens.
       2.   Click Update. The Updates page opens.
       3.   Click Enabled next to Automatic Update to disable automatic updates.

            OR

            Click Disabled next to Automatic Update to enable automatic updates.
       4.   Select Required to automatically download required updates.
       5.   Select Recommended to automatically download recommended updates.
       6.   Click Submit.

  Manually updating server software


                                                                                                    55
  Printed Documentation


  The server regularly checks for software updates and displays information about available updates in
  the table of the top of the page. Information shown includes the name and description of the update,
  the version, and the date the update was issued.

To manually update server software

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.    Click Update. The Updates page opens.
        3.    In the Download column next to the update you want to retrieve, click Download.




Backup
  Backup overview
  The Backup page allows you to modify automatic backup settings and manually perform a system
  backup either locally or remotely. It can back up required files (system files such as the password
  and config files), recommended files (includes MySQL database files and user home directories), and
  optional files (user-selected files). The backup files are stored as compressed tar ball files in the
  chosen location and use the following naming convention:
       backup-#-#-#-TIMESTAMP.tar
  where the first number identifies whether the backup includes required files (1 for yes or 0 for no), the
  second number identifies whether the backup includes recommended files (2 for yes or 0 for no), the
  third number identifies whether the backup includes optional files (3 for yes or 0 for no), and
  TIMESTAMP is the Unix time stamp (see glossary) representing the date of the backup. For
  example, a backup file with the name backup1-2-3-1119628367.tar includes required, recommended,
  and optional files and was created on June 24, 2005, at 11:52 a.m. UTC.
  Backup types are:
        •    Local Backup - Allows you to back up files to an attached tape device / USB or to a local
             user's directory for downloading via FTP. The system stores the backup as a compressed
             tar ball file in the selected location.
        •     Remote Backup - Allows you to transfer the backup file to a remote server. For remote
             backup to work successfully, you must have a Unix-based server with SSH (Secure Shell)
             and a valid tape drive installed.
        •     Windows NT Share - Allows you to back up the system onto a Windows NT share drive.



  Manually backing up files

To manually back up files to a local device or directory

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.




  56
                                                                            Chapter 1: Getting Started


       2.   Click Backup. The Backup page opens.
       3.   In the Backup Method drop-down list, select Local Backup.
       4.   Click Perform Backup. The Local Backup page opens.
       5.   In the backup type drop-down list, select the type of backup to perform.
       6.    In the home directory drop-down list, select the user in whose home directory you want
            the backup file placed for FTP download.
       7.   Click Proceed with Backup.
       8.   Select the types of files to back up.
       9.    Click Start Backup. The Backup Progress page opens, showing the status of the backup
            as it progresses.




To manually back up files to a remote server

       1.    In the side navigation menu, click System Maintenance. The System Maintenance page
            opens.
       2.   Click Backup. The Backup page opens.
       3.   In the Backup Method drop-down list, select Remote Backup.
       4.   Click Perform Backup. The Remote Backup page opens.
       5.    In the Hostname or IP Address box, type the hostname or IP address of the remote
            server.
       6.    In the Tape Device box, type the path for the backup device on the remote server, e.g.
            /mnt/tape.
       7.   In the Username box, type the username used to connect to the remote server.
       8.   In the Password, type the password for the username.
       9.   Click Proceed with Backup.
       10. Select the types of files to back up.
       11. Click Start Backup. The Backup Progress page opens, showing the status of the backup
           as it progresses.

To manually back up files to a Windows NT share server

       1.    In the side navigation menu, click System Maintenance. The System Maintenance page
            opens.
       2.   Click Backup. The Backup page opens.
       3.   In the Backup Method drop-down list, select Windows NT Share.
       4.   Click Perform Backup. The Windows NT Share page opens.
       5.    In the Hostname or IP Address box, type the hostname or IP address of the share
            server.
       6.   In the Share Name box, type the name of the share.




                                                                                                      57
  Printed Documentation


       7.   In the Username box, type the username used to connect to the share server.
       8.   In the Password, type the password for the username.
       9.   Click Proceed with Backup. The Finalize Backup page opens.
       10. Select the types of files to back up.
       11. Click Start Backup. The Backup Progress page opens, showing the status of the backup
           as it progresses.

  Enabling and disabling automatic backup

To enable or disable automatic backup

       1.    In the side navigation menu, click System Maintenance. The System Maintenance page
            opens.
       2.   Click Backup. The Backup page opens.
       3.   Click Enabled next to Automatic Backup to disable the automatic backup.

            OR

            Click Disabled next to Automatic Backup to enable the automatic backup.
       4.   The page refreshes, showing the updated status of the automatic backup.

  Modifying automatic backup settings

To modify automatic backup frequency

       1.    In the side navigation menu, click System Maintenance. The System Maintenance page
            opens.
       2.   Click Backup. The Backup page opens.
       3.    In the Automatic Backup Settings section, in the frequency drop-down list, select Daily
            to perform daily backups, Weekly to perform weekly backups, or Monthly to perform
            monthly backups. The page refreshes, displaying additional fields for the chosen type of
            backup.
       4.    If you chose Daily, use the Hour and Minute drop-down lists to specify the time (UTC, in
            24-hour clock format) at which the system should perform the daily backup.

            OR

            If you chose Weekly, use the Day, Hour, and Minute drop-down lists to specify the day of
            the week and time (UTC, in 24-hour clock format) at which the system should perform the
            weekly backup.

            OR

            If you chose Monthly, use the Day, Hour, and Minute drop-down lists to specify the day of
            the month and time (UTC, in 24-hour clock format) at which the system should perform the
            monthly backup.
       5.   Click Submit next to the Minute drop-down list. The page refreshes.



  58
                                                                            Chapter 1: Getting Started


To modify the notification e-mail address

       1.    In the side navigation menu, click System Maintenance. The System Maintenance page
            opens.
       2.   Click Backup. The Backup page opens.
       3.    In the Automatic Backup Settings section, in the Automatic Backup E-Mail box, type
            the e-mail address to which notifications about the status of the automatic backup should
            be sent.
       4.   Click Submit.

To modify automatic backup settings

       1.    In the side navigation menu, click System Maintenance. The System Maintenance page
            opens.
       2.   Click Backup. The Backup page opens.
       3.    In the Files to Backup section, select Required to backup up system files (required),
            Recommended to backup MySQL database files, and Optional to backup user-selected
            files.
       4.   (a) If you're backing files up to a local directory or drive:
                       i.    In the Local Backup FTP/USB section, select Local USB Storage if you
                         want to use a local USB drive to store the backup.
                      ii.    In the home directory drop-down list, select the user in whose home
                        directory you want the backup file placed for FTP download.
            (b) If you're backing files up to a remote server:
                       i.     In the Hostname or IP Address box, type the hostname or IP address of
                         the remote server.
                      ii.   In the Tape Device box, type the path for the backup device on the remote
                        server, e.g. /mnt/tape.
                     iii.    In the Username box, type the username used to connect to the remote
                         server.
                      iv.    In the Password, type the password for the username.
            (c) If you're backing files up to a Windows NT share drive:
                       i.     In the Hostname or IP Address box, type the hostname or IP address of
                         the share server.
                      ii.   In the Share Name box, type the name of the share.
                     iii.    In the Username box, type the username used to connect to the share
                         server.
                      iv.    In the Password, type the password for the username.
       5.   Click Submit. The page refreshes.




Restore

                                                                                                    59
  Printed Documentation


  Restore overview
  The Restore page allows you to restore files locally (from a tape, via FTP or by uploading a restore
  file), remotely (via SSH from a Unix tape drive), or by mounting a Windows NT share drive:
        •             Local Restore - Allows you to restore files from an attached tape device or from a
             local user's home directory.
        •     Remote Restore - Allows you to transfer the backup file to a remote server. For a remote
             restore to work successfully, you must have a Unix-based server with SSH (Secure Shell)
             and a valid tape drive installed.
        •    Windows NT Share - Allows you to restore the files from a Windows NT share drive.




  Restoring files

To perform a local restore

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.   Click Restore. The Restore page opens.
        3.   In the Restore Method drop-down list, select Local.
        4.   Click Perform Restore. The Local Restore page opens.
        5.    In the Restore Type drop-down list, select the type of restore to perform (local FTP or
             USB).
        6.    In the Home Directory drop-down list, select the user in whose home directory the
             backup file is.
        7.   Click Proceed with Restore.

To perform a remote restore

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.   Click Restore. The Restore page opens.
        3.   In the Restore Method drop-down list, select Remote.
        4.   Click Perform Restore. The Remote Restore page opens.
        5.   In the Hostname or IP Address for restore box, type the hostname or IP address.
        6.    In the Tape Device box, type the path for the restore device on the remote server, e.g.
             /mnt/tape.
        7.   In the Username box, type the username used to connect to the share drive.
        8.   In the Password box, type the password associated with the username.
        9.   Click Proceed with Restore.




  60
                                                                             Chapter 1: Getting Started


To perform a share restore

       1.    In the side navigation menu, click System Maintenance. The System Maintenance page
            opens.
       2.   Click Restore. The Restore page opens.
       3.   In the Restore Method drop-down list, select Share.
       4.   Click Perform Restore. The Share Restore page opens.
       5.   In the Hostname or IP Address for restore box, type the hostname or IP address.
       6.   In the Share Name box, type the share name.
       7.   In the Username box, type the username used to connect to the share drive.
       8.   In the Password box, type the password associated with the username.
       9.   Click Proceed with Restore.




Time Settings
  Time settings overview
  The Time Settings page allows you to: view and change the server time zone; view and change the
  current server date and time; and view and change the current time server.




  Modifying the server time zone

    Note: The current time zone is shown in the Time Zone drop-down list.


To modify the server time zone

       1.    In the side navigation menu, click System Maintenance. The System Maintenance page
            opens.
       2.   Click Time Settings. The Time Settings page opens.
       3.   In the Time Zones drop-down list, select the time zone to use.
       4.   Click Modify. The page refreshes.

  Modifying the server date and time

    Note: The current date and time are shown above the date and time setting drop-down lists.


To modify the server date and time


                                                                                                    61
  Printed Documentation


        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.   Click Time Settings. The Time Settings page opens.
        3.   In the MM/DD/YY (date) drop-down lists, select the current month, day, and year.
        4.    In the hh/mm/ss (time) drop-down lists, select the hour, minutes, and seconds of the
             current time.
        5.   Click Set Date & Time. The page refreshes.

  Modifying the time server

    Note: The current time server is shown above the Time Server box.

  The time server is used to synchronize the server clock. The default time server is the Canadian
  National Research Council (NRC) time server at time.nrc.ca. (More information about their time
  services is available on their site at http://inms-ienm.nrc-
  cnrc.gc.ca/time_services/time_services_e.html.)

To modify the time server

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.   Click Time Settings. The Time Settings page opens.
        3.   In the Set Time Server box, type the domain name of the time server you want to use.
        4.   Click Set. The page refreshes.




Shutdown/Reboot
  Shutdown/reboot overview
  The Shutdown/Reboot page allows you to completely shut down the server or reboot it.

  Shutting down the server

    Important: The server will shut down as soon as you click Shutdown System. You will not be
    prompted to confirm your request.


To shutdown the server

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.   Click Shutdown/Reboot. The Shutdown/Reboot page opens.
        3.   Click Shutdown System. The system shuts down and powers off.



  62
                                                                            Chapter 1: Getting Started


  Rebooting the server

    Important: The server will reboot as soon as you click Reboot System. You will not be
    prompted to confirm your request.


To reboot the server

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.   Click Shutdown/Reboot. The Shutdown/Reboot page opens.
        3.    Click Reboot System. A "Rebooting system now please wait..." message appears.
             Reboot takes less than a minute.




Display
  Display overview
  The Display page allows you to alter the system and Login page logos as well as the system
  language.
  The system logo appears at the top left corner of the administration panel. You can change this logo
  to display an image of your own. The image should be 222 pixels wide and 93 pixels high.
  The Login page logo appears at the top of the Login page. The image should be 425 pixels wide and
  105 pixels high.

  Modifying the logos

To modify the system logo

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.   Click Display. The Display page opens.
        3.    Click Browse next to the Upload Logo (200W x 93H) box and browse for the image file
             you want to upload.
        4.   Click Upload.
        5.   To view the new logo, click Refresh on your browser button bar.

To modify the Login page logo

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.   Click Display. The Display page opens.




                                                                                                    63
  Printed Documentation


        3.    Click Browse next to the Upload Logo (424W x 197H) box and browse for the image file
             you want to upload.
        4.    Click Upload. You will see the new logo on the Login page the next time you log onto the
             server.




  Modifying the system language

To modify the system language

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.   Click Display. The Display page opens.
        3.   In the Choose a Language drop-down list, select the language you want to use.
        4.   Click Change Language. The page refreshes.




UPS
  UPS overview
  A UPS is an uninterruptible power supply or source. It supplies backup power to any electrical
  equipment attached to it for, allowing the equipment to be unaffected by brief utility power outages.
  The UPS Settings page shows the current status of UPS monitoring. If a UPS is attached to the
  server, the page shows the make and model as well as the approximate battery time and power level
  remaining and allows you to change the make and model and connection type.

  Enabling and disabling UPS monitoring

 Important: Changes will not take effect until the server is rebooted. When you click Reboot Server
 Now on this page, the server will reboot immediately. You will not be prompted to confirm your
 request.


To enable or disable UPS monitoring

        1.    In the side navigation menu, click System Maintenance. The System Maintenance page
             opens.
        2.   Click UPS. The UPS Settings page opens.
        3.   Click Enabled next to Monitor UPS to disable UPS monitoring.

             OR




  64
                                                                              Chapter 1: Getting Started


              Click Disabled next to Monitor UPS to enable UPS monitoring. The page refreshes,
              showing the updated status of UPS monitoring.
         4.    If you have no other changes to make that require a server reboot, click Reboot Server
              Now to reboot the server now.




  Modifying UPS settings

To modify UPS settings

         1.    In the side navigation menu, click System Maintenance. The System Maintenance page
              opens.
         2.   Click UPS. The UPS Settings page opens.
         3.   In the Choose UPS drop-down list, select the make and model of the UPS.
         4.    In the UPS Connection drop-down list, select USB if the UPS is connected via USB or
              Serial if the UPS is connected via a serial connection.
         5.   Click Submit. The page refreshes.



  RAID
  RAID Overview
  Setting up a raid will allow you to have multiple hard drive devices that can be used as storage,
  backup or act as hot swappable drives in case of a failure on the primary hard drive device. In the
  RAID section, you will find helpful information about your raid which will include:

  •     RAID Status
  •     RAID Level
  •     Array Size
  •     State
  •     Active Devices
  •     Working Devices
  •     Failed Devices
  •     RAID Operations
  •     Drive Operations


  To remove a drive from operation
       To remove a drive from operation
      1. In the side navigation menu, click System Maintenance. The System Maintenance page
           opens.
      2. Click RAID, the RAID settings will open.



                                                                                                        65
  Printed Documentation


       3. Click Remove Beside the drive you would like to remove.




Chapter 7: Statistics


Disk Usage
  Disk usage overview
  The Disk Usage page shows information about disk usage, globally and by user. It also allows you to
  set and modify disk quotas for users.

  Viewing global disk usage

    Tip: You can sort the table of user quotas at the bottom of the page by clicking the Username or
    Quota column titles.


To view global disk usage

          1.   In the side navigation menu, click Statistics. The Statistics page opens.
          2.   Click Disk Usage. The Disk Usage page opens.

  Setting up disk usage e-mail notification

To set up disk usage e-mail notification

          1.   In the side navigation menu, click Statistics. The Statistics page opens.
          2.   Click Disk Usage. The Disk Usage page opens.
          3.    In the Enter an email or SMS account to let me know when my hard drive is getting
               full box, type an e-mail address or SMS account.
          4.   Click Submit. The page refreshes.




  Adding disk quota for a user




  66
                                                                               Chapter 1: Getting Started


  A disk quota identifies the maximum amount of hard drive space that a specific user may use. By
  default, users have no quota set (identified by zero value for the quota).

To add disk quote for a user

        1.   In the side navigation menu, click Statistics. The Statistics page opens.
        2.   Click Disk Usage. The Disk Usage page opens.
        3.    In the table of usernames at the bottom of the page, click Add Quota next to a username.
             The Modify Disk Quota page opens.
        4.   In the quota box, type in a number identifying the disk quota you want to set for this user.
        5.   Click Modify. The Disk Usage page opens.

  Modifying disk quota for a user

To modify disk quote for a user

        1.   In the side navigation menu, click Statistics. The Statistics page opens.
        2.   Click Disk Usage. The Disk Usage page opens.
        3.   In the Username box, type the full or partial name of the user whose quota you want to
             modify.

              Tip: If you know the username of the user whose quota you want to modify, click
              Modify Quota next to the username in the table of usernames at the bottom of the
              page. The Modify Disk Quota page opens.

        4.   Click Modify.
        5.    In the table of usernames at the bottom of the page, click Modify Quota next to the
             username. The Modify Disk Quota page opens.
        6.   In the quota box, type in a number identifying the disk quota you want to set for this user.
        7.   Click Modify. The Disk Usage page opens.




System Status
  System status overview
  The System Status page gives a summary of the status of the enabled DHCP, FTP, HTTP, POP3,
  and SMTP services on the system. If a service is disabled, no status information for it is shown on
  this page.
        •
             A green bar under a service indicates that the service is running OK.


                                                                                                        67
  Printed Documentation


        •
             A yellow bar under a service indicates that the service has a low-severity problem.
        •
             A blinking, red bar under a service indicates that the service has a high-severity problem
        •
             A black bar under a service indicates that the service is not currently running.

  Viewing system status

To view system status

        1.   In the side navigation menu, click Statistics. The Statistics page opens.
        2.   Click System Status. The System Status page opens.




Traffic
  Traffic statistics overview
  The Traffic Statistics page allows you to view statistics for local traffic, external traffic, and DMZ
  traffic. (More information about the Multi Router Traffic Grapher is available on their Web site,
  http://oss.oetiker.ch/mrtg/.)




  Viewing local network traffic statistics
  The Traffic Analysis for eth0 page gives a traffic summary of eth0 (network card adapter 1), which
  handles local network traffic.

To view local network traffic statistics

        1.   In the side navigation menu, click Statistics. The Statistics page opens.
        2.   Click Traffic. The Traffic Statistics page opens.
        3.   Click Local Network. The Traffic Analysis for eth0 page opens.

  Viewing external network traffic statistics
  The Traffic Analysis for eth1 page gives a traffic summary of eth1 (network card adapter 2), which
  handles external Internet traffic.

To view external network traffic statistics




  68
                                                                              Chapter 1: Getting Started


        1.   In the side navigation menu, click Statistics. The Statistics page opens.
        2.   Click Traffic. The Traffic Statistics page opens.
        3.   Click External Network. The Traffic Analysis for eth1 page opens.

  Viewing DMZ traffic statistics
  The Traffic Analysis for eth2 page gives a traffic summary of eth2, which handles traffic in the DMZ.

To view DMZ traffic statistics

        1.   In the side navigation menu, click Statistics. The Statistics page opens.
        2.   Click Traffic. The Traffic Statistics page opens.
        3.   Click DMZ Network. The Traffic Analysis for eth2 page opens.




Web Statistics
  Web statistics overview
  The Web Statistics screen allows you to view Web statistics in either a graphical format or a text-
  based format.

Graphic Web Statistics

  This report gives a graph-based view of Web traffic, generated by a Web server log analysis program
  called the Webalizer.
  (More information about the Webalizer -- including an FAQ and their Simpletons Guide to Web
  Server Analysis -- is available on their Web site, http://www.mrunix.net/webalizer.)

Text based Web Statistics

  This report gives a primarily text-based view of Web traffic, generated by a logfile analyzer program
  called Analog. It includes statistical data as well as bar and pie charts.
  (More information about Analog -- including a user manual and tutorials -- is available on their Web
  site, http://www.analog.cx.)

  Viewing Web statistics

To view Web statistics

        1.   In the side navigation menu, click Statistics. The Statistics page opens.


                                                                                                         69
  Printed Documentation


        2.   Click Web Statistics. The Web Statistics page opens.
        3.   To view the graph-based statistics, click Graphic Web Statistics.

             OR

             To view the text-based statistics, click Text based Web Statistics.




Current Settings
  Server settings overview




  The Current Settings page gives information about the server's hardware, network, partitions, date,
  uptime, and current software versions.

Hardware Information

  Identifies the type of CPU on the server and how much memory (RAM) is installed (in kilobytes or
  kBs).

Network Information

  Identifies the server's local IP address, remote IP address, and gateway IP addresses.

Partition Information

  Identifies the server's partitions and provides information about the hard drive space usage for each
  partition, including amount used, amount available, and percentage used.



  70
                                                                                Chapter 1: Getting Started


Current Information

  Identifies how long the server has been up since the last reboot (uptime) as well as the current date
  and time.

Current Software Versions

  Identifies the current version of the server software as well as the serial number associated with it.

  Viewing current server settings

To view current server settings

        1.   In the side navigation menu, click Statistics. The Statistics page opens.
        2.   Click Current Settings. The Current Settings page opens.




Chapter 8: Phone System
  Phone System overview
  VoIP (Voice over Internet Protocol) is a protocol for the transmission of voice over the Internet. The
  Phone System page allows you to manage the server's VoIP settings, including adding, modifying,
  and deleting phone extensions and conference rooms.




Extension Control
  Extension Control overview
  The Extension Control page allows you to manage user phone extensions. You can add their name,
  extension number, username, caller ID, and a forwarding number. You can also set the user's voice
  mail password and include an e-mail address to which a message is sent each time a voice message
  is received.

  Adding a new extension

To add a new extension

        1.    In the side navigation menu, click Phone Systems. The Phone Systems Settings page
             opens.
        2.   Click Extension Control. The User Extensions page opens.
        3.   Click Extensions.



                                                                                                           71
  Printed Documentation


       4.    Click Add New Extension. The Add User Extensions page opens.
       5.    In the Full Name box, type the full name of the user.
       6.    In the Extension box, type the extension number for the identified user.
       7.    In the Record Calls selection box, click the checkbox if you would like to record that
             extensions calls.
       8.    In the Extension to Extension only selection box, click the checkbox if would like this
             extension to only call other extensions that you have setup.
       9. In the Include in Directory selection box, click the checkbox if you would like this user to
           appear in your company directory.
       10.    In the Only user Provider drop down list, select the provider you would like the user to
             use when making phone calls.
       11.     In the Username box, type the username for this user.
       12.     In the Password box, type the password for this user.
       13.     In the Local Username drop-down list, select the local username associated with the
             extension user, if any.
       14.     Check the OP Panel Access checkbox if you would like the user to be able to access
             the OP panel
       15.     In the Caller ID box, type the number that should be displayed for this extension, if any.
       16. In the Auto-Forward Number box, type the phone number or extension number to which
          this extension should be forwarded, if any.
       17. In the Voicemail Pin box, type the voicemail PIN for this extension.
       18. In the Send to E-mail box, type the e-mail address to which notifications of new voice
           messages should be sent, if any.
       19. In the Quick Dial Operator Panel Pin box, enter the PIN number you would like the user
           to have.
       20. Click Submit. The User Extensions page opens, showing the new extension in the table
           at the bottom of the page.

  Modifying an extension

To modify an extension

       1.     In the side navigation menu, click Phone Systems. The Phone Systems Settings page
             opens.
       2.    Click Extension Control. The User Extensions page opens.
       3.    Click Extensions.
       4.     In the table of extensions at the bottom of the page, click Modify next to the extension
             you want to modify. The Modify User page opens.
       5.    Modify the information as required.
       6.    Click Submit.

  Deleting an extension



  72
                                                                               Chapter 1: Getting Started


To delete an extension

        1.    In the side navigation menu, click Phone System. The Phone Systems Settings page
             opens.
        2.   Click Extension Control. The User Extensions page opens.
        3.   Click Extensions.
        4.    In the table of extensions at the bottom of the page, click Delete next to the extension you
             want to delete. The Delete User page opens.
        5.   Click Delete to confirm the deletion of this user.




  Enable and disable extensions
  Enable and Disable extensions overview
  Enable/Disable User allows you to temporarily disable or enable an extension.


  To Enable/Disable an extension

  To Enable/Disable a User

  1. In the side navigation menu, click Phone System. The User Management page opens.
  2. Click Enable/Disable Extension.
  3. If you know the extension you would like to enable/disable, click the enabled or disabled button
  next to the extension to either enable them (if disabled) or disable them (if enabled).
  OR
  Search for the extension in the search box. The table will refresh with the results, click the enabled
  or disabled button next to the extension to either enable them (if disabled) or disable them (if
  enabled)

  Phone Number mapping

        Phone Number mapping overview

        The Phone Number Mapping page allows you to create custom mappings to internal
           extensions. If you have multiple DIDs you may enter the number into the
           External/Extension number and then choose a Extension to point it towards (ie
           6135555555 to 200).

             If you would like to ring multiple external extensions you can also point a external mapping
             to multiple internal extension




                                                                                                       73
Printed Documentation


       To Add a Phone Number Mapping
         To Add a Phone Number Mapping
       1. In the side navigation menu, click Phone System. The Phone System Settings page opens.
       2. Click Extension Control. The Extension Control page opens.
       3. Click Phone Number mapping.
       4. Enter the Phone Number you would like to add.
       5. Enter the Extension Number you would like the phone number to be associated with OR
           the or DAHDI Channel you would like it associated with.
       6. Click Submit.


       To Remove a Phone Number Mapping
        To Remove a Phone Number Mapping
       1.In the side navigation menu, click Phone System. The Phone System Settings page opens..
       2.Click Extension Control. The Extension Control page opens.
       3. Click Phone Number Mapping.
       4. Click the Delete button beside the use and external number you want to remove. .
       6. The page will refresh with the new table.




Multiple Location Mapping
          Multiple Location Mapping Overview
        The Multiple Location Mapping section allows one extension to ring multiple phone numbers or
     extensions.

      To Add a Mapping
       To Add a Mapping
       1. In the side navigation menu, click Phone System. The Phone System Settings page opens.
       2. Click Extension Control. The Extension Control page opens.
       3. Click Multiple Location Mapping.
       4. Select the extension you would like to use.
       5. Enter the phone number or extension that the extension will be associated with.
       6. Click Submit.


       To Remove a Mapping
        To Remove a Mapping


74
                                                                        Chapter 1: Getting Started


   1.In the side navigation menu, click Phone System. The Phone System Settings page opens..
   2.Click Extension Control. The Extension Control page opens.
   3. Click Multiple Location Mapping.
   4. Click the Delete button beside the use and external number you want to remove. .
   6. The page will refresh with the new table.




Queues


Queues overview

      The Queue section enables you to either have the queues as an "extension" configuration,
      or as an"agent" configuration. Both sections enable you add or delete queues, as well as
      add/delete extensions/agents set to those queues.


   NOTE: You may only have ONE queue type at a time, if you chose to change queue
     types your information in your current queue type will be deleted.

       Adding queues under the "extension" configuration
           Adding queues under the "extension" configuration
       1. In the side navigation menu, click Phone System. The Phone System Settings page
       opens.
      2. Click Extension Control. The User Extensions page opens.
      3. Click Queue.
      4. Under the Create New Queue section, enter an Extension Queue you would like to
      have.
      5. Select the Ring Type that will be associated to the queue itself.
      6. Click the Submit button.

       Deleting a queue under the "extension" configuration
         Deleting a queue under the "extension" configuration
       1. In the side navigation menu, click Phone System. The Phone System Settings page
       opens.
      2. Click Extension Control. The User Extensions page opens.
      3. Click Queue.
      4. Click the Delete beside the queue you would like to remove.




                                                                                               75
Printed Documentation


         Adding an extension to a queue under the "extension"
         configurations
          Adding an extension to a queue under the "extension"
         configurations
        1. In the side navigation menu, click Phone System. The Phone System Settings page
         opens.
        2. Click Extension Control. The User Extensions page opens.
        3. Click Queue.

        4. Under the Add Extension to Queue section, select the extension you would like to
        add.
        5. Select the queue you would to add it to.
        6. Click the submit button

         Deleting an extension that is part of a queue
          Deleting an extension that is part of a queue
         1. In the side navigation menu, click Phone System. The Phone System Settings page
         opens.
         2. Click Extension Control. The User Extensions page opens.

         3. Click Queue.
         4. Click the Delete button beside the extension you would like to remove.

         Adding queues under the "agent" configuration
          Adding queues under the "agent" configuration
         1. In the side navigation menu, click Phone System. The Phone System Settings
         page opens.
         2. Click Extension Control. The User Extensions page opens.
         3. Click Queue.
         4. In the Drop down box, select agent.
         5. Under the Create New Queue section, enter an extension queue you would like to
         have.
         6. Select the Ring Type that will be associated to the queue itself.
         7. Click the Submit button.

         Deleting a queue under the "agent" configuration
          Deleting a queue under the "agent" configuration
         1. In the side navigation menu, click Phone System. The Phone System Settings page
         opens.
         2. Click Extension Control. The User Extensions page opens.
         3. Click Queue.


76
                                                                        Chapter 1: Getting Started


        4. Click the Delete button beside the queue you would like to remove.

        Adding an extension to a queue under the "agent"
        configurations
         Adding an extension to a queue under the "agent" configurations
        1. In the side navigation menu, click Phone System. The Phone System Settings page
        opens.
        2. Click Extension Control. The User Extensions page opens.
        3. Click Queue.
        4. Under the Create New agent section, enter the username that you would like to have
        for this agent.
        5. Enter a password for this agent.
        6. Select the queue you would like to add it to.
        7. Click Submit button.

        Deleting an agent that is part of a queue
          Deleting an agent that is part of a queue
        1. In the side navigation menu, click Phone System. The Phone System Settings page
        opens.
        2. Click Extension Control. The User Extensions page opens.

        3. Click Queue.
        4. Click the delete button beside the agent you would like to remove.



Phone Provisioning

   Phone Provisioning Overview
   The phone provisioning section enables you to assign extensions to MAC address of VOIP
      phones, that will automatically configure once they have connected.


   Enable/Disable External Phone provisioning
    Enable/Disable External Phone provisioning
   1.In the side navigation menu, click Phone System. The Phone System Settings page
       opens.
   2. Click Extension Control. The Extension Control page opens.
   3. Click Phone Provisioning.
   4. Click the enable button beside Allow external phone provisioning to enable phone
       provisioning.
   OR
   Click the disable button beside Allow external provisioning to disable external provisioning.



                                                                                                   77
 Printed Documentation




       Adding a new setting for a phone
             Adding a new setting for a phone
       1. In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
       2. Click Extension Control. The Extension Control page opens.
       3. Click Phone Provisioning.
       4. Select the manufacturer.
       5. Select the phone type.
       6. Enter the MAC address.
       7. Enter the extension you would like the phone to be assigned to.
       8. Click the Submit button.


       Delete a phone
             Delete a phone
       1. In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
       2. Click Extension Control. The Extension Control page opens.
       3. Click Phone Provisioning.
       4. Click the Delete button next to the phone you would like to delete form auto provisioning.




Speed dial
 Speed dial overview
 Speed-dial is a function available on many telephone systems allowing the user to place a call by
 pressing a reduced number of keys. This function is particularly useful for phone users who dial
 certain numbers on a regular basis.


 To   add a speed dial mapping

       1.     In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
       2.    Click Extension Control. The Extension Control page opens.
       3.    Click Speed Dial.
        4.   In the Quick Dial Number box, enter the quick dial number that you would like to use.



 78
                                                                       Chapter 1: Getting Started


   5.   In the Number to call box, type the phone number.
   6.   In the Company Name box, enter the company name..
   7.   Click Submit.


   NOTE: if you would like to export this number, click the export button.


   To delete a Speed Dial number
          1.    In the side navigation menu, click Phone System. The Phone System Settings
               page opens.
          2.   Click Extension Control. The Extension Control page opens.
          3.   Click Speed Dial.
          4.   Click the Delete all Button. OR
          5.   Click the Delete button beside the number you want to delete.


   To Modify a Speed Dial number
          1.    In the side navigation menu, click Phone System. The Phone System Settings
               page opens.
          2.   Click Extension Control. The Extension Control page opens.
          3.   Click Speed Dial.
          4.   Click the Modify Button button beside the number you want to edit.
          5.   Enter the new information.
          6.   Click Submit


   To Import Speed Dial numbers
          1.    In the side navigation menu, click Phone System. The Phone System Settings
               page opens.
          2.   Click Extension Control. The Extension Control page opens.
          3.   Click Speed Dial.
          4.   Click the browse button and locate your CSV file.
          5.   Select if you would like to delete entries first.
          6.   Click Import




SIP Setup


                                                                                              79
  Printed Documentation


  SIP setup overview
  The Service Providers page allows you to manage the SIP providers available to the server for its
  VoIP services. A SIP (Session Initiation Protocol) provider provides access for voice communications
  or video over the Internet.

  Adding a SIP provider

To add a SIP provider

        1.    In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
        2.   Click SIP Setup. The SIP Setup page opens.
        3.   Click SIP Providers.
        4.   In the Username box, type the username used to connect to the service provider.
        5.   In the Password box, type the password.
        6.   In the Auth ID box, type the Auth ID (if provided).
        7.   In the Realm/Domain box, type the Realm/Domain.
        8.   In the Host box, type the hostname for the service provider.
        9.   In the Port box, type the port number.
        10. In the Auth box, type the Auth number (if provided)
        11. In the Additional Host Options box, type any additional options for the service provider.
        12. In the Qualify section, click the checkbox if you would like to the SIP provider to qualify.
        13. In The Override Code Field, enter the override code to use another SIP provider (if
            needed).
        14. Click the IPSEC button to set your IPSEC settings.
        15. In the Allowed Codecs section, select the allowed codecs for this service provider.
        16. Click Add. The page refreshes.




  Modifying a SIP provider

To modify a SIP provider

        1.    In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
        2.   Click SIP Setup. The SIP Setup page opens.
        3.   Click SIP Providers.
        4.    In the table of Service Providers at the top of the page, click Modify next to the provider
             you want to modify. The Modify Service Provider page opens.




  80
                                                                                Chapter 1: Getting Started


        5.   Modify the fields as required.
        6.   Click Modify. The page refreshes.

  Deleting a SIP provider

To delete a SIP provider

        1.    In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
        2.   Click SIP Setup. The SIP Setup page opens.
        3.   Click SIP Providers.
        4.    In the table of Service Providers at the top of the page, click Delete next to the provider
             you want to delete. The page refreshes.


        NOTE: You can re-register to your SIP Providers by clicking the Re-Register to SIP
          Providers button.




Dialing Rules
  Dialing rules overview
  The Dialing Rules page allows you to specify that the server use different service providers for
  different destinations. It also shows you the current dialing rules in effect.

  Adding a dialing rule


Adding a dialing rule (Basic Rules)

        1.    In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
        2.   Click SIP Setup. The SIP Setup page opens.
        3.   Click Dialing Rules. The Dialing Rules page opens.
        4.   Enter the Area Code in the Area code box.
        5.   Enter the Exchange number in the Exchange box.
        6.   Select the SIP provider or Analog Lines from the drop down menu.
        7.   In the FXO box, type the FXO extension associated with this dialing rule.
        8.   Click Submit.




                                                                                                            81
  Printed Documentation


       NOTE: To switched to advanced dial rules, click the "Switch to Advance Dialing Rules"
         button.

Adding a dialing rule (Advanced Rules)

       1.    In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
       2.   Click SIP Setup. The SIP Setup page opens.
       3.   Click Dialing Rules. The Dialing Rules page opens.
       4.    In the Country drop-down list (Advanced Dialing Rules) select the country for which you
            want to add a dialing rule. The page refreshes to show the Number Area options specific to
            that country.
       5.    In the Number Area drop-down list, select the number area within that country for which
            you want to add a dialing rule.

             Tip: To add all number areas within the country, select All.

             Important: If you select All for a country with a large number of area codes or
             prefixes, the system will take a long time to display and mass add the number
             areas.

       6.    In the Provider drop-down list, select the SIP provider or Analog Lines to use for this
            dialing rule.
       7.   In the FXO box, type the FXO extension associated with this dialing rule.
       8.   Click Submit.




  Deleting a dialing rule

    Important: Deletion is immediate -- the system will not ask you to confirm.


To delete a dialing rule

       1.    In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
       2.   Click SIP Setup The SIP Setup page opens.
       3.   Click Dialing Rules. The Dialing Rules page opens.
       4.    In the table of current dialing rules at the bottom of the page, click Delete next to the
            dialing rule that you want to delete.

             Tip: Click a specific page number to view the dialing rules on that page.




To delete all dialing rules


  82
                                                                              Chapter 1: Getting Started


        1.    In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
        2.   Click SIP Setup The SIP Setup page opens.
        3.   Click Dialing Rules. The Dialing Rules page opens.
        4.    In the table of current dialing rules at the bottom of the page, click Delete All Custom
             Dialing Rules to delete all dialing rules.




Conference
  Conference room overview
  The Conference page allows you to manage the conference rooms that are a part of the server's
  VoIP services. VoIP conference rooms allow multiple users to hold conversations, much as a
  physical conference room would.

  Adding a new conference room

To add a new conference room

        1.    In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
        2.   Click Conference. The Conference page opens.
        3.    In the New Conference Room Extension box, type a new conference room extension
             number.
        4.   In the PIN box, type a PIN to be used for this conference room, if any.
        5.    In the Admin PIN box, type an administration PIN to be used for this conference room, if
             any.
        6.   In the Record Meetings selection box, click the checkbox if you want to record the
             conference call.
        7.   Click Submit. The page refreshes.

  Viewing a conference room's PIN

To view a conference room's PIN

        1.    In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
        2.    Click Conference. The Conference page opens, showing a table of existing extensions
             as well as their PINs and Admin PINs, if any.

  Deleting a conference room



                                                                                                         83
  Printed Documentation



    Important: Deletion is immediate -- the system will not ask you to confirm.


To delete conference room

       1.    In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
       2.   Click Conference. The Conference page opens.
       3.   Click Delete next to the conference room you want to delete. The page refreshes.




Operator Panel


  Adding an external number

To add an external number to the operator panel

       1.    In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
       2.   Click Operator Panel. The Operator Panel page opens.
       3.   In the Contact Name box, type the contact name associated with this external number.
       4.   In the External Number box, type the external number to add to the operator panel.
       5.   Click Submit.

  Deleting an external number

    Important: Deletion is immediate -- the system will not ask you to confirm.


To delete an external number from the operator panel

       1.    In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
       2.   Click Operator Panel. The Operator Panel page opens.
       3.    In the table of current external numbers at the bottom of the page, click Delete next to
            the external number you want to delete.




Global Settings
  84
                                                                            Chapter 1: Getting Started


  Global settings overview
  The Global Settings page allows you to modify global user and voice mail settings including the
  extension number that users must call to retrieve their voice messages and the minimum and
  maximum length of time for voice messages.

  Modifying global voicemail settings

To modify global voicemail settings

        1.    In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
        2.   Click Global Settings. The Global Settings page opens.
        3.    In the VoiceMail Extension box, type the extension number users should use to check
             their voice mail.
        4.    In the Min Message Time box, type the minimum length (in seconds) a message must be
             to be saved.
        5.    In the Max Message Time box, type the maximum length (in seconds) a message may
             be.
        6.   Click Submit.

  Modifying global user settings

To modify global user settings

        1.    In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
        2.   Click Global Settings. The Global Settings page opens.
        3.   Adjust the other global settings accordingly (Call Time Out, Parking Extension,
             Global Page Extension, Directory Extension, Park Call, Blind Transfer).
        4. In the SIP Registry Time Out box, enter the length of time before your sip registry times
            out.
        5. For each individual category, click the Submit button to update the information.

              Tip: 24 seconds equals 4 rings.




Status


                                                                                                       85
  Printed Documentation


  Phone System status overview
  The Phone System Status page shows the names of any connected users as well as the host and
  port number they're connected to. It also shows the statuses of all SIP peers.

  Viewing Phone System status

To view Phone System status

         1.    In the side navigation menu, click Phone System. The Phone System Settings page
              opens.
         2.   Click Status. The Phone System Status page opens.




Auto Attendant
  Auto Attendant Overview


       The Auto Attendant page allows you to manage your voice prompts and office hours for your
       phone system.
       Use the browse button for the Greeting (Open) and select a 8Khz mono WAV file that you wish to
       be played while your business is open. By default your business will be open 24 hours a day, 365
       days a year. If you wish to change that you may use the drop down boxes to choose the times
       you will be open.

       If you have hours that you are closed you will want to upload another 8Khz mono WAV file into
       the Greeting (Closed) otherwise customers will hear nothing.



         To Add an Auto Attendant
           To Add an Auto Attendant:

              1. In the side navigation menu, click Phone System. The Phone System Settings page
              opens.
              2. Click Auto Attendant. The Auto Attendant page opens.
              3. Click Auto Attendant.
              4. Select A Language Menu that you would like to use (Note that to change the language
              file you will need to upload a new one).
              5. Enter the Hours (from the drop down menu) and which set of days (from the drop
              down menu) you would like to have the Auto Attendant play.
              6. Click Submit.



  86
                                                                    Chapter 1: Getting Started




To Add a Greeting
  To Add a Greeting:

   1. In the side navigation menu, click Phone System. The Phone System Settings page
   opens.
   2. Click Auto Attendant. The Auto Attendant page opens.
   3. Click Auto Attendant.
   4. Click the English button bar or French button bar, and upload your greeting for
   opening, and closing time.
   5. Click Submit.



To Delete a Greeting
   To Delete a Greeting:

   1. In the side navigation menu, click Phone System. The Phone System Settings page
   opens.
   2. Click Auto Attendant. The Auto Attendant page opens.
   3. Click Auto Attendant.
   4. Click the Delete button beside the greeting you want to delete.



   Auto Attendant Mapping

   Auto attendant mapping allows you to set a specific auto attendant for a specific DID.


   To Add an Auto Attendant Mapping

   1. In the side navigation menu, click Phone System. The Phone System Settings page
   opens.
   2. Click Auto Attendant. The Auto Attendant page opens.
   3. Click Auto Attendant Mapping.
   4. Select the greeting you would like to upload.
   5. Input the DID you would like the auto attendant to play on.
   6. Select the language.
   7. Click Submit.




                                                                                            87
 Printed Documentation


            To Remove an Auto Attendant Mapping

            1. In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
            2. Click Auto Attendant. The Auto Attendant page opens.
            3. Click Auto Attendant Mapping.
            4. Click the Delete button beside the greeting you want to delete.




Music On Hold

Music On hold Overview


      The Music on Hold page allows you to upload MP3 files to your machine that your clients will hear
      when a employee places them on hold.




      To Add Music On Hold


         To Add Music On Hold

            1. In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
            2. Click Auto Attendant. The Auto Attendant page opens.
            3. Click Music on Hold.
            4. You may upload the New Music you would like to have playing when an individual is on
            hold.
            5. Click Submit.
            NOTE: You can select the method that you would like music on hold use to play
            music by using the pull down menu under the Music on Hold Options.




      To Delete Music On Hold
        To Delete Music On Hold:


 88
                                                                               Chapter 1: Getting Started




             1. In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
             2. Click Auto Attendant. The Auto Attendant page opens.
             3. Click Music on Hold.
             4. Click the Delete button beside the music you want to delete.




Call Records
  Call records overview




  The Caller Records page shows you a history of calls received and allows you to download a copy in
  Microsoft Excel CSV format. You can search for call records by extension or by date or you can
  browse chronologically through the list.

  Viewing call records

To view call records

        1.    In the side navigation menu, click Phone System. The Phone System Settings page
             opens.
        2.   Click CDR. The CDR page opens.
        3.   Click Call Records.
        4.    Click Call Records. The Caller Records page opens, showing the first 30 call records for
             all extensions.




                                                                                                      89
  Printed Documentation



             Tip: Click a specific page number to view the records on that page. Searching call
             records




To search call records

       1.    In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
       2.   Click CDR. The CDR page opens
       3.   Click Call Records.
       4.    In the Search by Extension drop-down list, select the extension for which you want to
            search for calls.

            OR

            In the Search by Date: Start and End drop-down lists, select the starting and ending dates
            of the date range for which you want to search for calls.
       5.    Click Search. The page refreshes, showing just the call records that match the search
            criteria used.

  Downloading call records

    Note: The call records download as a Microsoft Excel .csv (comma-separated values) file.


To download call records

       1.    In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
       2.   Click CDR. The CDR page opens
       3.   Click Call Records.
       4.   Click Download Call Records. A Windows File Download dialog box opens.
       5.   Click Open to open the file in Microsoft Excel or Save to save the file.



  Associate a File Number to Call Records

       Associating a file number to a call record:
       1.    In the side navigation menu, click Phone System. The Phone System Settings page
            opens.
       2.   Click CDR. The CDR page opens
       3.   Click Associate a File Number to Call Records.
       4.   Enter a file name you would like to use.


  90
                                                                                Chapter 1: Getting Started


         5.    Click Add.


         Deleting an associated file:
         1.    In the side navigation menu, click Phone System. The Phone System Settings page
              opens.
         2.    Click CDR. The CDR page opens
         3.    Click Associate a File Number to Call Records.
         4.    Click the delete button beside the file association you would like to remove.




Recorded Calls

Recorded Calls Overview


The Recorded Calls will display any recorded calls, the date and time they were recorded and allow you
to listen/save or delete the records. To delete a call record you may click on "Delete".To Listen or Save a
recording click on "Play/Save" which will either use your browsers default WAV player or ask you which
program you wish to use, or if you would like to save the file.




      To Play a saved message


         To Play a saved message

                 1.    In the side navigation menu, click Phone System. The Phone System Settings
                      page opens.
                 2.   Click CDR. The CDR page opens
                 3.   Click Recorded Calls.
                 4.   Click The Play button beside the message.


         To Delete a saved message
              To Delete a saved message




                                                                                                        91
Printed Documentation


      1.    In the side navigation menu, click Phone System. The Phone System Settings page
           opens.
      2.    Click CDR. The CDR page opens
      3.    Click Recorded Calls.
      4.    Click The Delete button beside the message.



      Recorded Conference Calls

     To Play a saved message


      To Play a saved message

              1.    In the side navigation menu, click Phone System. The Phone System Settings
                   page opens.
              2.   Click CDR. The CDR page opens
              3.   Click Recorded Conference Calls.
              4.   Click The Play button beside the message.


      To Delete a saved message
           To Delete a saved message

      1.    In the side navigation menu, click Phone System. The Phone System Settings page
           opens.
      2.    Click CDR. The CDR page opens
      3.    Click Recorded Conference Calls.
      4.    Click The Delete button beside the message.




FXO
      FXO Overview
      The FXO section enables you to manage your local dialing area code, as well as select the
         configurations for each of your different channels for your FXO card.


      To Setup your channels


92
                                                                            Chapter 1: Getting Started


         To Setup channels
        1. In the side navigation menu, click Phone System. The Phone System Settings page opens.
        2. Click FXO.
        3. Set the configuration listed (TX Gain, RX Gain, Echo Cancel, Echo Train) .
        4. Select configurations for each channel (Incoming Only, Outgoing Only, In/Out,
            Disabled, if you require a detailed view, click the detail button)
        5. Click Submit.




Setup Wizard
   Important: If you start the Setup Wizard but do not finish it, you will see the page you
   stopped at the next time you start the Setup Wizard.

  The Setup Wizard takes you through the main setup options for the server page-by-page and
  then reboots the server.
  To start the Setup Wizard, click Setup Wizard in the side navigation menu. The Hosting Settings
  page opens.

Hosting Settings page

        1.    Type the domain name to use for this server and select the services that you want to
             enable.
        2.   Click Next. The Local Network Settings page opens.

Local Network Settings page

        1.   In the IP Address box, type the IP address for this server.
        2.   In the Netmask box, type the netmask to use for this server.

              Note: The netmask is typically 255.255.255.0

        3.   Click Next. The Please Select A Remote Network Type page opens.

Please Select A Remote Network Type page

        1.    In the connection type drop-down list, select the type of connection used (dedicated
             IP, PPPoE, cable modem, or modem).
        2.   Click Next. The Change Connection page opens.

Change Connection page



                                                                                                     93
  Printed Documentation


  If you chose Dedicated IP on the previous page:
       1.   In the IP Address box, type the dedicated IP address.
       2.   In the Netmask box, type the subnet mask.
       3.   In the Gateway box, type the gateway IP address.
       4.   Click Next. The Time Settings page opens.
  If you chose PPPoe on the previous page:
       1.   In the Username box, type the username used to connect to PPPoe.
       2.   In the Password box, type the password associated with the PPPoe username.
       3.   Click Next. The Time Settings page opens.
  If you chose Cable Modem on the previous page:
       1.   In the DHCP drop-down list, select Yes if DHCP is used or No if DHCP is not used.
       2.   Click Next.
       3.   (a) If you indicated that, yes, DHCP is used:
                       i.   In the CR Number box, type the xx.
                      ii.   In the Domain box, type the xx.
            (b) If you indicated that, no, DHCP is not used:
                       i.   In the IP Address box, type the IP address of the cable modem.
                      ii.   In the Netmask box, type the subnet mask for the cable modem.
                     iii.   In the Gateway box, type the IP address of the gateway.
                     iv.    Click Next. The Time Settings page opens.
  If you chose Modem on the previous page:
       1.   In the Username box, type the username used to log onto the dial-up account.
       2.   In the Password box, type the password associated with the account.
       3.   In the Phone Number box, type the phone number for the dial-up connection.
       4.    In the Custom Modem init String box, type the modem initialization string you want to
            use.
       5.   Click Next. The Time Settings page opens.

Time Settings page

       1.   In the Time Zones box, select the time zone and click Modify. The page refreshes.
       2.   In the MM/DD/YY (date) drop-down lists, select the current month, day, and year.
       3.    In the hh/mm/ss (time) drop-down lists, select the hour, minutes, and seconds of the
            current time.
       4.   Click Set Date & Time. The page refreshes.
       5.    In the Time Server box, type the domain name of the time server you want to use (if any)
            and click Set. The page refreshes.
       6.   Click Next. The Passwords page opens.




  94
                                                                                Chapter 1: Getting Started


Passwords page

        1.    In the various password boxes, type the passwords you want to use for those user
             accounts and click Change. The page refreshes.
        2.   Click Next. The Reboot page opens.

Reboot page

        1.    Click Reboot Now to reboot the server. A status message appears, indicating the server
             is now rebooting.
        2.    Once the server has rebooted, click (click here) to return to the main administration
             interface page.




                                                                                    Glossary
24-hour notation

  The 24-hour clock is a method of time-keeping in which the day runs from midnight to midnight and is
  divided into 24 hours, numbered from 0 to 23. For example, 11:30 p.m. is represented as 23:30 using
  24-hour notation. It is frequently referred to as "military time".
  For additional information, see Wikipedia's 24-hour clock article at http://en.wikipedia.org/wiki/24-
  hour_clock.

Alias

  An e-mail or mail alias is an e-mail address that has been set up to forward to another e-mail
  address. An alias does not have its own mailbox.

Anonymous FTP

  File Transfer Protocol (FTP) for which you don't need to have a user account in order to
  download files.

APS

  Application Program System

Bytes

  Computer storage space and memory is measured in bytes. A byte is a series of 8 bits.
        •    A kilobyte (kB or KB) represents 1024 bytes.


                                                                                                          95
  Printed Documentation


        •    A megabyte (MB) represents 1024 KB (or 1024 X 1024 bytes)
        •    A gigabyte (GB) represents 1024 MB (or 1024 X 1024 X 1024 bytes)
        •    A terabyte (TB) represents 1024 GB (or 1024 X 1024 X 1024 X 1024 bytes)

Bounce

  A bounced e-mail is an e-mail that has been returned to the sender as undeliverable, usually
  because the address no longer exists or is over quota, or because the e-mail has triggered a spam
  filter. The bounce message usually indicates why the e-mail is undeliverable.




Codec

  Coder-decoder or compression-decompression

  Codecs convert an analog signal to a digital signal. Quality and requirements vary among
  them.

  Additional information about codecs is available on Wikipedia:
  http://en.wikipedia.org/wiki/Codec (information about codecs in general),
  http://en.wikipedia.org/wiki/List_of_codecs (list of available codecs), and
  http://en.wikipedia.org/wiki/Speech_encoding (information about encoding specifically for
  speech applications).

Context-sensitive help

  Context-sensitive help provides information related to the use of the page or function
  currently being accessed. For example, context-sensitive help on an application log on page
  would offer information about how to log on to the application.

  Context-sensitive help is accessible by clicking on the question mark button              to the right
  of the page title.
  For additional information, see Wikipedia's online help (http://en.wikipedia.org/wiki/Online_help),
  tooltip (http://en.wikipedia.org/wiki/Tooltip), and mouseover (http://en.wikipedia.org/wiki/Mouseover)
  articles.

Dedicated IP

  A dedicated IP is one that is exclusively assigned to a virtual host rather than being shared. The
  primary reason for using a dedicated IP is to facilitate setting up a secure server.

DHCP

  Dynamic Host Configuration Protocol
  (More information is available at http://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol.)




  96
                                                                               Chapter 1: Getting Started


DNS

  Domain Name Service
  DNS servers translate domain names such as myexamplesite.net into their associated IP addresses,
  allowing you to access the domain names.

Dynamic DNS

  Allows the updating of DNS records in real time.
  (See http://en.wikipedia.org/wiki/Dynamic_DNS for additional information about dynamic
  DNS.)
  Dynamické DNS
  (See http://cs.wikipedia.org/wiki/Dynamic_DNS for additional information about dynamic DNS.)




Firewall

  A firewall is a physical device or software program that controls traffic within the network and to/from
  the Internet.

FTP

  File Transfer Protocol
  FTP is a protocol that allows you to upload files to and download files from the server. Transfers are
  typically accomplished using an FTP client such as CuteFTP or WS_FTP or your Web browser.

FXO

  Foreign Exchange Office
  FXO is an interface that receives regular telephone service and allows the use of analog (i.e.
  not digital) telephone sets, fax machines, and other devices.

Gateway

  A gateway is a piece of equipment that acts as an entrance to a network, e.g. a router.
  (More information is available at http://en.wikipedia.org/wiki/Gateway_(telecommunications).)

Hostname

  A hostname is the unique nickname by which a device such as a computer or file server is known on
  a network. On the Internet, the hostname is frequently a domain name. (More information is available
  at http://en.wikipedia.org/wiki/Hostname.)

HTTP



                                                                                                        97
     Printed Documentation


     Hypertext Transfer Protocol
     HTTP is a communications protocol originally designed to facilitate the publication and
     viewing of Web pages on the Internet.

IMAP

     Interactive Mail Access Protocol
     IMAP is a common Internet protocol for the retrieval of e-mail from a remote server over a TCP/IP
     connection, usually using a software program like Microsoft Outlook. E-mail clients using IMAP
     generally leave messages on the server until the user explicitly deletes them. An example of an
     IMAP e-mail application is SquirrelMail, which is commonly provided with Web hosting plans.

IP

     Internet Protocol




LDAP

     Lightweight Directory Access Protocol
     LDAP is a protocol used to enable you to search for contacts from anywhere on the Internet
     or from your internal network.

MAC address

     Media Access Control address
     The MAC address is a unique 12-character identifier associated with network adapters such
     as an Ethernet card or wireless network card.

Modem initialization string

     The modem initialization string (or modem init string) is a sequence of codes that tell the modem how
     to handle the connection it sets up. (Search Google for information about modem init strings.)

MySQL

     My Structured Query Language
     MySQL is a database management system.

Netmask

     See subnet mask.

NT WINS

     Windows Internet Name Service



     98
                                                                          Chapter 1: Getting Started


  WINS converts Windows computer names to IP addresses.

PID

  Process Identification Number
  A unique number identifying the process or script.

PIN

  Personal identification number
  Usually a four-digit password used for verification purposes.

POP3

  Post Office Protocol 3
  POP3 is a common Internet protocol for the retrieval of e-mail from a remote server over a
  TCP/IP connection, usually using a software program like Microsoft Outlook.

Port numbers

  A computer has 65,535 ports available. Many are associated with specific programs or processes.
  (See http://en.wikipedia.org/wiki/Port_numbers for a list of commonly used port numbers.)

PPPoe

  Point-to-Point Protocol over Ethernet
  PPPoe is a protocol used primarily with DSL services.

PPTP

  Point-to-Point Tunneling Protocol
  PPTP (Point-to-Point Tunneling Protocol) is the protocol used to implement a VPN.

RAM

  Simple Mail Transfer Protocol

RBL

  Real-time Block List

Secure shell

  See SSH.

SIP



                                                                                                    99
  Printed Documentation


  Session Initiation Protocol
  A SIP provider provides access for voice communications or video over the Internet.

SMTP

  Simple Mail Transfer Protocol
  Protocol for sending e-mail over the Internet.

Spam

  Spam originally referred to unsolicited e-mail (usually advertisements) but the definition has
  expanded over the last several years to include things like advertising or useless messages on
  forums, in blog comments, and in newsgroups.

SSH

  Secure Shell
  SSH is a protocol that allows secure communications between two computers, typically
  between a user's computer and a network server (i.e. client-server).

SSL

  Secure Sockets Layer
  A protocol used for encrypted communications.

Subnet mask

  The subnet mask defines the IP range of a network. It is typically 255.255.255.0, which indicates that
  anything with the same first three numbers as the base IP address is considered internal. Any data
  going to an IP address outside the network's IP range would be sent to the network's gateway.

TCP

  Transmission Control Protocol

TCP/IP

  Transmission Control Protocol/Internet Protocol

UDP

  User Datagram Protocol
  UDP is an Internet protocol that allows programs on networked computers to send short
  messages to each other.

Unix time




  100
                                                                                 Chapter 1: Getting Started


  Unix time marks the number of seconds since 00:00:00 UTC on January 1, 1970. For example,
  a Unix time stamp of 1209278554 translates to April 27, 2008 at 2:42 a.m. UTC (Coordinated
  Universal Time) is essentially the same time zone as the old Greenwich Mean Time, which
  was the time zone at the Earth's prime meridian.
  (See http://en.wikipedia.org/wiki/Unix_time for more information.)

Uptime

  Uptime measures the amount of time a server has been up and running since the last time it
  rebooted. It's often expressed as a percentage, e.g. 99% uptime.

Virus definition files

  Virus definition files contain the patterns that anti-virus programs use to identify viruses. They usually
  consist of master definition files that contain all of the patterns up to the time that the master file was
  created and daily files that contain new patterns that have been identified since the master file was
  last updated.

Viruses

  A computer virus is an unwanted program that infects a computer.




VoIP

  Voice over Internet Protocol
  VoIP is a protocol for the transmission of voice over the Internet. The VoIP Settings page allows you
  to manage the server's VoIP settings, including adding, modifying, and deleting phone extensions
  and conference rooms.

VPN

  Virtual Private Network
  A Virtual Private Network enables IP traffic to travel securely over a public TCP/IP network
  (Internet) by encrypting all traffic from one network to another and allowing secure
  communication.

Wildcards

  Wildcards are characters that substitute for one or more specific characters in a string of
  characters, particularly when performing a search or similar activity. For example, a question
  mark (?) substitutes for a single character and an asterisk (*) substitutes for any number of
  characters.
  Examples:
       dog? would find dogs but it wouldn't find dog or dogged
       dog* would find dog, dogs, and dogged




                                                                                                         101
  Printed Documentation


Windows share drive

  A share drive is a storage device that is accessible by other computers on a network.

WINS

  Windows Internet Name Service
  (More information is available at
  http://en.wikipedia.org/wiki/Windows_Internet_Name_Service.)

WWW

  World Wide Web also known as the Web
  The Web is a series of interlinked hypertext pages on the Internet. (More information is
  available at http://en.wikipedia.org/wiki/WWW.)




                                                                                     Index




  102
                                                                                                                                Index
    A                                                                      Firewall ............................................................. 31
anonymous FTP ............................................... 50           flie sharing ........................................................ 53
automatic backup ............................................. 58          FTP .................................................................. 50
automatic backups ........................................... 58               G
automatic updates ............................................ 55          global ............................................................... 66
    B                                                                      Global E-mail Filtering ..................................... 23
Backups............................................................ 56        accessing ..................................................... 10
blocked port ................................................35, 36           Don't send email to ....................................... 23
    C                                                                         user .............................................................. 85
conference room .............................................. 83             voicemail ...................................................... 85
Controlling Web site access ............................. 33               global e-mail settings ....................................... 21
    D                                                                          L
deleting .................................... 55, 72, 82, 83, 84           LDAP ................................................................ 27
DHCP ............................................................... 51       adding ........................................................... 28
dialing rule ..................................................81, 82         deleting ......................................................... 28
disk quota ......................................................... 66       enabling and disabling ................................. 27
DMZ............................................................ 54, 55        modifying ...................................................... 28
downloading ..................................................... 90       LDAP entry....................................................... 28
dynamic DNS ................................................... 44         leases viewing.................................................. 52
    E                                                                      license agreement............................................ 10
e-mail account from a mail group ..................... 15                  Logging on ....................................................... 10
e-mail account to a mail group ......................... 14                   aliases .......................................................... 15
e-mail notification ............................................. 66               adding ....................................................... 16
enabling or disabling ........................................ 58                  deleting ..................................................... 17
exclusive whitelist ............................................. 21               disabling.................................................... 29
extension ....................................................71, 72               enabling .................................................... 29
Extensions ........................................................ 71             logs ........................................................... 30
external number ............................................... 84                 mail rotation settings ................................. 30
    F                                                                              modifying .................................................. 16
file sharing ........................................................ 53           viewing ...................................................... 16
File sharing ....................................................... 52       automatic backup settings ............................ 58
firewall ........................................................31, 32       connection type ............................................ 42



                                                                                                                                              103
 Printed Documentation


dedicated IP settings .................................... 41               UPS settings ................................................. 65
DHCP IP range ............................................. 52              user .............................................................. 13
disk quota ..................................................... 67         VPN - PPTP settings .................................... 38
DMZ .............................................................. 54        M
dynamic DNS ................................................ 44          mail alias .................................................... 16, 17
extension ...................................................... 72      mail backups .................................................... 29
file sharing .................................................... 53     mail group .................................................. 14, 15
global user settings ....................................... 85          mail services .................................................... 18
global voicemail settings............................... 85              manual ............................................................. 56
groups ........................................................... 14        N
   adding a group .......................................... 14          NAT ............................................................ 36, 37
   adding a new e-mail to a group ................ 14                       deleting ......................................................... 37
   deleting a group ........................................ 15          Network Tools .................................................. 45
   deleting an e-mail from a group ................ 15                      blocking ........................................................ 35
   modifying POP3 or SMTP numbers.......... 19                              conference room .......................................... 83
hostname ...................................................... 40          definition of ................................................... 99
LDAP ............................................................ 28             modifying .................................................. 19
local ethernet settings ................................... 41              deleting blocked port .................................... 36
logos ............................................................. 63           POP3 or SMTP ......................................... 19
mail alias ....................................................... 16       NS Lookup.................................................... 47
mail backups ................................................. 30           Ping .............................................................. 45
mail rotation settings ..................................... 30             POP3 ............................................................ 19
   administrator ............................................. 38           rejections log ................................................ 26
   blocked ...................................................... 35        SMTP ........................................................... 19
   FTP ........................................................... 51       Traceroute .................................................... 46
   POP3 or SMTP ......................................... 19                viewing ......................................................... 20
quarantine ..................................................... 20         Whois ........................................................... 48
RBL rejections .............................................. 26             P
server date and time ..................................... 61            PIN viewing ...................................................... 83
server time zone ........................................... 61          PPTP ................................................................ 37
Services ........................................................ 18         R
   disabling .................................................... 18     Rebooting ......................................................... 63
   enabling .................................................... 18      Restore ............................................................ 60
SIP provider .................................................. 80          server ........................................................... 71
spam rejections ............................................ 27              S
system language .......................................... 64            searching ......................................................... 90
time server .................................................... 62      settings ............................................................. 58



 104
                                                                                                                                            Index


Setup wizard ................................................... 93              external network ........................................... 68
Shutting down .................................................. 62              local network ................................................ 68
   definition of ................................................. 100              automatic updates .................................... 55
      modifying ................................................... 19              manual updates ........................................ 55
   deleting ......................................................... 81         system .......................................................... 68
SIP provider ...............................................80, 81               VoIP .............................................................. 86
site from the allowed/disallowed list ................. 34                       Web .............................................................. 69
Spam ................................................................ 20         whitelisting .................................................... 21
   deleting a site from the allowed/disallowed                                      DMZ .......................................................... 69
     list .............................................................. 34
                                                                                    external network ....................................... 68
   enabling and disabling filtering ..................... 20
                                                                                    local network ............................................. 68
   enabling and disabling the exclusive whitelist21
                                                                                  T
   filtering score ................................................ 26
                                                                              traffic statistics ................................................. 69
   global settings ............................................... 21
                                                                                  U
      RBL rejections ........................................... 26
                                                                              UPS monitoring ................................................ 64
      spam rejections ......................................... 27
                                                                              user ............................................................ 11, 12
spam filtering .................................................... 20
                                                                                  V
Spam Filtering .................................................. 23
                                                                              viewing ............................................................. 89
   adding ........................................................... 11
                                                                              virus filtering ..................................................... 19
   Always accept email from ............................. 21
                                                                              Viruses ............................................................. 19
   Configure RBL lists ....................................... 25
                                                                                 definition files ........................................... 101
   deleting ......................................................... 12
                                                                                 enabling and disabling filtering ..................... 19
      to modify ................................................... 13
                                                                                 quarantine log............................................... 20
   DMZ .............................................................. 69
                                                                                 status ............................................................ 86
   Don't accept email from ................................ 22
                                                                                  W
   Don't accept email with these subjects......... 24
                                                                              WWW ............................................................... 50
   Don't send email to ....................................... 23




                                                                                                                                               105

				
DOCUMENT INFO