Site-Data Required For The Capture Analysis - Avaya Communication Server 1000 Installation And Commissioning Manual

Wlan ip telephony
Hide thumbs Also See for Communication Server 1000:
Table of Contents

Advertisement

Troubleshooting WLAN IP Telephony installations
1. Before you begin the data capture, disable any encryption protocols so that the data
2. Time sync the wired and wireless IP sniffer traces (to the second if possible) and
3. Include the Avaya case number and the capture date in the name of each file.
4. Use a compression program to compress the files before you send them. If the files
Important:
All captures, except the screenshots, must be concurrent during the same time frame that
the problem scenario is executed. This ensures that each capture is for the same problem
scenario.

Site-data required for the capture analysis

To analyze the captured data, certain site information is required. Ensure that the information is
current for the time at which you obtain the captures. Gather the following information for your
site:
• the MAC address of the test handset
• the alias IP of the test handset
• the DHCP supplied IP or manually configured static IP of the test handset
• the IP and MAC addresses of the WLAN IP Telephony Manager 2245
• the TLAN and ELAN IPs for the Signaling Servers
• the TLAN and ELAN IPs for the Voice Gateway Media Cards (VGMC)
• a network diagram
For more information, see
• a site survey
• screenshots of the DHCP server scope with the fields fully expanded (no truncation of
data in the view)
• the encryption protocol
• the software version of the WLAN IP Telephony Manager 2245
• the hardware version of the test handset
• the release (RLS) of the PBX software
• the version of the code that currently runs on the Signaling Servers
• the software version on the VGMCs
• the make, model and software version of the AP, the Controller or the WLAN Manager
248
Avaya WLAN IP Telephony Installation and Commissioning
can be analyzed. If this is not possible, you must supply the encryption keys.
note whatever difference is present. This is crucial for the captures to be analyzed as
a whole event.
are password protected, send the passwords in a separate e-mail.
Network diagram
on page 249.
November 2010

Advertisement

Table of Contents
loading

Table of Contents