Support – View Changelog
The View Changelog page allow the user to view the UCX changelog report from the Start Date to the End Date.If the End Date is not specified (empty), then it will default…
The View Changelog page allow the user to view the UCX changelog report from the Start Date to the End Date.If the End Date is not specified (empty), then it will default…
The Event Viewer page displays errors, warnings, and informational events that are related to the operation of your UCX system.To access the page, select Support followed by the subtab Event Viewer.FiltersSelect the Show Filter button to display…
IMPORTANT To allow the VPN connection to be established, the UCX system must be able to communicate with our server (remote.emetrotel.org) using the TCP port 1194. IMPORTANT The remote access…
UCX Administration can be used to capture packets on any of the available network interfaces (e.g. eth0, eth1). This section describes Packet Capture related functions.StartStopDeleteDownloadStartTo Start Packet Capture, perform the…
System Log Files stored under /var/log folder can be viewed from UCX Administration. This section lists the type of system log files you can view.Log fileTypeDescriptionasterisk/fullUCXTelephony Service log entries (i.e.…
USEFUL TIP For step-by-step instructions to install a commercially signed SSL Certificate, go to How to Generate and Install a Commercially Signed SSL Certificate page. Generate CSRThe Generate Certificate Signing…
The Audit page displays a log of login attempts to the web interface, logout information, and information about all management pages accessed by users.To view the Audit log, perform the following steps:Open…
The Weak Secrets page allows you to view and fix a list of extensions with weak secrets. The list shows the Extension, Description, and Status.If the secret meets password strength requirements, the status…
IMPORTANT E-MetroTel AWS cloud instances are pre-configured with AWS security rules that minimize the exposure of the UCX software to the internet. Proceed with caution before activating and making changes…
Any computer system that is exposed to the internet risks being maliciously attacked through repeated attempts to login to the system, often refered to as brute force attacks. Brute force attackers…