Configuration

Menu for managing the system configuration.


General

Here you can find and edit the basic settings of the system.

 

Be careful, do not use incorrect values as this would lead to system instability.

Telephony

 

Address: Portal address.

Local Address: Portal address IP.

User: Uses root user by default but other user could be defined. (AsteriskUser)

Password: User password Operating System of the PBX (default: password is that you must install the operating system), changing here also changes automatically in the OS, not directly change the operating system because the system will fail. (AsterisUserPass)

Recordings Backup Address: IP of the Recordings Backup server, this can be a storage server or any server that has the old recordings and has access via http, this means that there must be a web server (any), that can access the files of the recordings through their url. Example: http://IPBACKUPRECORDS/GUIDgrabacion.gsm should be able to access the recording. (BackupRecordsIP)

Integra Server Address: IP of PBX server. (AsteriskIP)

External IPP: Apps server IP.

Asterisk SSH Port: Port to connect through SSH. (AsteriskSSHPort)

Stun Server: Stun's server address, allows the NAT clients to configure calls to a VOIP provider located outside from their local network.

Email

 

Email Providers: E-mail provider for system messages.

Alerts Mail: Email address you want to report to in case of system issues.

Allow pixel tracking: If this option is active the system can track emails on the dialers.

SMS providers: SMSprovider for system messages.

AMD

 

Add dispositions to the list by writing it and then press on the ‘+' button. In order to delete a disposition from the list, first select it and then press on the '-’ button.

Audit

 

Enable Audit Log: If logs all system actions.

Log

Log File: If checked, saved the log in a file.

ELK Address: If checked the log can be visualized in Elastic Search, Log Stash and Kibana.

Log Level: System log level (SEVERE, INFO, WARNING).

Agents

License

System

Security

 

 


Data sources


Tasks