Management
Use the Management pages to manage web access to the ATA web page and to enable protocols for remote configuration and network management.
Web Access Management
Use the
page to configure the settings for access to the administration of the ATA.Cisco ATA 191 Web Access Fields
Access to the Cisco ATA 191 web page is enabled by default. Admin Access allows you to manage the configuration from a computer in your office network, and Web Utility Access allows you to connect from a computer on a different subnet or on the Internet.
To access the ATA web page, launch a web browser and enter the URL in the address bar. The URL must include the specified protocol, the WAN IP address of the ATA, and the specified port number. For example, with the HTTPS protocol, a WAN IP address of 203.0.113.50, and port 443, you would enter: https://203.0.113.50:443
Field |
Description |
---|---|
Admin Access |
This feature controls access to the ATA web page from devices that are connected via the ETHERNET (LAN) port. Click Enabled to enable this feature, or click Disabled to disable it. The default setting is Enabled. If you administer and configure the ATA from a computer that is connected to the LAN, this feature must be enabled. |
Web Utility Access |
Select the protocol to use for access to the ATA web page from a device on the WAN. Choose HTTP, HTTPS, or both entries. For secure Internet access, select HTTPS. The default value is HTTPS. |
Remote Management Port |
Enter the port number to use for access to the ATA web page from a device on the WAN side of the ATA. The default port number is 443 for HTTPS, 80 for HTTP. Include the specified port when you enter the address in your web browser. For example, with the HTTPS protocol, a WAN IP address of 203.0.113.50, and the default Remote Management Port of 443, you would enter: https://203.0.113.50:443 |
Cisco ATA 192 Web Access Fields
Access to the Cisco ATA 192 web page is enabled by default. Admin Access allows you to manage the configuration from a computer in your office network, and Web Utility Access allows you to connect from a computer on a different subnet or on the Internet.
Field |
Description |
---|---|
Admin Access |
This feature controls access to the ATA web page from devices that are connected via the ETHERNET (LAN) port. Click Enabled to enable this feature, or click Disabled to disable it. The default setting is Enabled. If you administer and configure the ATA from a computer that is connected to the LAN, this feature must be enabled. |
Web Utility Access |
Select the protocol to use for access to the ATA web page from a device on the WAN. Choose HTTP and/or HTTPS. For secure Internet access, select HTTPS. The default value is HTTPS. |
Cisco ATA 192 Remote Access Fields
In addition to the ATA web page access, the Cisco ATA 192 provides more features of Remote Management.
Field |
Description |
---|---|
Remote Management |
Allows access to the ATA web page from a device that is on the WAN side of the ATA. For example, you could connect from another subnet in your office or from your home computer. Click Enabled to enable this feature, or click Disabled to disable it. The default setting is Disabled. The other fields in this section of the page are available only if you enable this feature. If you attempt to enable this feature while using the default administrator login credentials, you will be prompted to change the credentials. Click OK to acknowledge the warning message. Use the page to change the administrator password. For more information, see User List (Password Management). |
Web Utility Access |
Select the protocol to use for access to the ATA web page from a device on the WAN side of the ATA. Choose HTTP and/or HTTPS. The default value is HTTPS. Include the specified protocol when you enter the address in your web browser. For example, with the HTTPS protocol, a WAN IP address of 203.0.113.50, and the default Remote Management Port of 443, you would enter: https://203.0.113.50:443 |
Remote Upgrade |
If you enabled Remote Management, choose whether or not to allow firmware upgrades from a device on the WAN side of the ATA. Click Enabled to enable this feature, or click Disabled to disable it. The default value is Disabled. You can change this setting only when your computer is connected to the configuration utility from the LAN. |
Allowed Remote IP Address |
You can use this feature to limit access to the ATA web page based on the IP address of a device. Choose Any IP Address to allow access from any external IP address. To specify an external IP address or range of IP addresses, select the second radio button and then enter the desired IP address or range. The default setting is Any IP Address. |
Remote Management Port |
Enter the port number to use for access to the ATA web page from a device on the WAN side of the ATA. The default port number is 443 for HTTPS, 80 for HTTP. Include the specified port when you enter the address in your web browser. For example, with the HTTPS protocol, a WAN IP address of 203.0.113.50, and the default Remote Management Port of 443, you would enter: https://203.0.113.50:443 |
TR-069
Use the
page to configure communication with an Auto-Configuration Server (ACS) via TR-069 CPE WAN Management Protocol (CWMP). TR-069 (Technical Report 069) provides a common platform to manage all voice devices and other customer-premises equipment (CPE) in large-scale deployments. It provides the communication between the CPE and the ACS.Enter the settings as described below. After making changes, click Submit to save your settings, or click Cancel to redisplay the page with the saved settings.
Field |
Description |
---|---|
Status |
Click Enabled to enable remote provisioning, or click Disabled to disable this feature. The default setting is Disabled. |
ACS URL |
The URL for the ACS. The format should be http(s)://xxx.xxx.xxx.xxx:port or xxx.xxx.xxx.xxx:port. The xxx.xxx.xxx.xxx is the domain name or IP address of the ACS server. Both the IP address and the port number are required. |
ACS Username |
The username for the ACS. The default username is the Organization Unit Identifier (OUI). This value is required and must match the username configured on the ACS. |
ACS Password |
The password for the ACS. This value is required and must match the password configured on the ACS. |
Connection Request Port |
The port to use for connection requests |
Connection Request Username |
The username for connection requests. This value must match the Connection Request Username configured on the ACS. |
Connection Request Password |
The password for connection requests. This value must match the Connection Request Password configured on the ACS. |
Periodic Inform Interval |
If Periodic Inform is enabled, the duration, in seconds, between CPE attempts to connect to the ACS. The default value is 86400 seconds. |
Periodic Inform Enable |
Click Enabled to enable CPE connection requests to the ACS, or click Disabled to disable this feature. |
Request Download |
If applied, ACS may call the Download RPC after it receives the request from the ATA. |
SNMP
Use the
page to set up Simple Network Management Protocol (SNMP) for the ATA.SNMP is a network protocol that allows network administrators to manage, monitor, and receive notifications of critical events as they occur on the network. The ATA supports SNMPv2 and SNMPv3.
It acts as an SNMP agent that replies to SNMP commands from SNMP Network Management Systems. It supports the standard SNMP get, next, and set commands. It also generates SNMP traps to notify the SNMP manager when configured alarm conditions occur. Examples include reboots, power cycles, and INTERNET (WAN) events.
Enter the settings as described below. After making changes, click Submit to save your settings, or click Cancel to redisplay the page with the saved settings.
SNMP Settings
Field |
Description |
---|---|
Enabled, Disabled |
Click Enabled to enable this feature, or click Disabled to disable it. The default setting is Disabled. |
Trusted IPv4 |
Choose Any to allow access from any IPv4 address (not recommended). Click Address to specify the IPv4 address and subnet mask of a single SNMP manager or trap agent that can access the ATA through SNMP. |
Trusted IPv6 |
Choose Any to allow access from any IPv6 address (not recommended). Click Address to specify the IPv6 address and prefix length of a single SNMP manager or trap agent that can access the ATA through SNMP. |
Get/Trap Community |
Enter a community string for authentication for SNMP GET commands. The default value is public. |
Set Community |
Enter a community string for authentication for SNMP SET commands. The default value is private. |
SNMPv3 Settings
Field |
Description |
---|---|
Enabled, Disabled |
Click Enabled to enable this feature, or click Disabled to disable it. The default setting is Disabled. |
R/W User |
Enter the user name for SNMPv3 authentication. The default value is v3rwuser. |
Auth-Protocol |
Choose the SNMPv3 authentication protocol from the drop-down list (HMAC-MD5 or HMAC-SHA). |
Auth-Password |
Enter the authentication password. |
PrivProtocol |
Choose a privacy authentication protocol from the drop-down list (None or CBC-DES). If you select CBCDES, the privKey encrypts the data portion of the message that is being sent. |
Privacy Password |
Enter the key for the authentication protocol to use. |
Trap Configuration
Field |
Description |
---|---|
IP Address |
The IP Address of the SNMP manager or trap agent. |
Port |
The SNMP trap port used by the SNMP manager or trap agent to receive the trap messages. Valid entries are 162 or 1025–65535. The default value is162. |
SNMP Version |
The SNMP version in use by the SNMP manager or trap agent. Choose a version from the list. |
User List (Password Management)
Use the
page to manage the two user accounts for the ATA web page. The user-level account has access to modify a limited set of features.For the IVR, you can configure these passwords on the System page.
Update a Password
Procedure
Step 1 |
In the User List table, click the pencil icon for the account that you want to update. |
Step 2 |
On the User Account page, enter the username and password, as described below.
|
Step 3 |
After making changes, click Submit to save your settings, or click Cancel to redisplay the page with the saved settings. |
Bonjour
Use the
page to enable or disable Bonjour. Bonjour is a service discovery protocol that locates network devices such as computers and servers on your LAN. It may be required by network management systems that you use. When this feature is enabled, the ATA periodically multicasts Bonjour service records to its entire local network to advertise its existence.Click Enabled to enable this feature, or click Disabled to disable it. The default setting is Enabled.
After making changes, click Submit to save your settings, or click Cancel to redisplay the page with the saved settings.
Reset Button
Click Enabled to enable the reset button, or click Disabled to disable it. The default setting is Enabled.
After making changes, click Submit to save your settings, or click Cancel to redisplay the page with the saved settings.
SSH
Use the
to configure SSH related setting.
Field |
Description |
---|---|
User Name |
Set SSH login user name. |
Password |
Set SSH login password. |
SSH Access |
Set the SSH access to enable or disable. |