ing, free email, and internet appliance management.
com88's has become big because their customers like
having the SIP accounts that match their email ac-
counts. com88 offers its clients a number of phones,
including the snom 100.
Most of the com88 clients have private IP addresses
and use a SIP enabled firewall that keeps out un-
wanted access to their network but allows SIP teleph-
ony.
After signing up at www.com88.com, snom receives
an order to prepare three devices for com88 and ship
them to the given address. Before shipping, snom
marks the phones as "com88"-phones in their data-
base and ships the devices together with a firewall to
the customer.
The customer installs the firewall into his or her DSL
outlet and connect the phones to the firewall (using a
hub, eventually connecting other devices like PCs as
well). The firewall powers up and receives its IP ad-
dress via DHCP from com88. The phones start up and
receive their IP addresses and the necessary network
information from the firewall.
The phones now perform the following steps:
1) Because there are no settings stored on the
device,
http://www.snom.de/snom100/snom100.htm
and reads the settings that have been stored
there. In our case, nothing important is in
there.
2) It
then
http://www.snom.de/snom100/snom100-
0004130032FE.htm. The snom web server
checks in the database, which operator has
received the phone with the MAC address
0004130032FE and sends the configuration in-
formation for com88 to the phone. This infor-
mation contains the URL for the com88
phones.
3) The phone reboots again and now checks
com88-config.com/snom100.htm. com88 has
it
connects
reads
the
device
76
to
specific
file