Avaya TSAPI with SIPREC and Alvaria Dialer

This topic provides guidelines for configuring Avaya TSAPI interface with SIPREC for CXone Multi-ACD (CXone Open).

The supported Avaya AES TSAPI versions are 8.1.3 and 10.1.

Avaya site engineer is responsible for all procedures in the Avaya environment. The procedures described in this section are by recommendation only!

Follow these steps to set up the Avaya TSAPI interface with SIPREC and configure an optional dialer.

Step 1: Prepare Avaya AES TSAPI Environment

Step 2: Prepare Session Border Controllers (SBCs) to integrate with CXone Multi-ACD (CXone Open):

(Optional) Step 3: Configure a dialer:

Step 4: Download and save the Essential Data for 3rd Party Connectivity Config in CXone Excel file. You will be required to fill in essential information as you proceed. Once you have finished entering all the necessary details and prepared your environment for CXone Multi-ACD, you must submit the Excel file to your NICE Professional Services representative.

Prepare Avaya AES TSAPI Environment

You must configure the Avaya AES TSAPI Server before you configure CXone Multi-ACD.

The supported Avaya AES TSAPI versions are 8.1.3 and 10.1.

Perform these steps to prepare the Avaya AES TSAPI environment:

Step 1: Verify the TSAPI License and Status

Step 2: Prepare the AES Environment

Step 3: Add a User

Step 4: Verify the Tlink

Step 5: Create a Secure Connection Using VPN

Step 1: Verify the TSAPI License and Status

Before configuring the Avaya TSAPI interface, you must verify that the Avaya TSAPI Service is running, and that the license is valid.

To verify the TSAPI Service and status:

  1. Log in to the AES Server. The Application Enablement Services page appears.

  2. From the menu, select AE Services.

  3. Verify:

    • The TSAPI Service Status column is Online and that the State is Running.

    • The Licensed Mode column shows Normal Mode.

Step 2: Prepare the AES Environment

An Avaya site engineer is responsible for all procedures in the Avaya environment. These procedures are recommendations and guidelines only!

In an AES environment, the AES administrator must prepare the AES-CTI link connections.

Step 3: Add a User

The user must be added to the system via the webpage.

This procedure must be performed together with an Avaya administrator. The AES administrator must first prepare the AES-CTI link connection.

At the end of this step, you are required to provide to NICE Professional Services:

  • User credentials.

To add a user:

  1. On the AE Services menu, navigate to User Management > User Admin and click Add User.

  2. In the Add User window, configure the mandatory fields:

    1. User Id

    2. Common Name

    3. Surname

    4. User Password

    5. Confirm Password

    6. Change the CT User setting to Yes.

  3. Click Apply to save the information.

  4. Save these user credentials in the Excel file. Once you have finished entering all the necessary details and prepared your environment, submit the Excel file to NICE Professional Services.

  5. Verify that the User created successfully message appears in the Add User Results window.

  6. Provide unrestricted monitoring for all devices to user:

    1. On the AE Services menu, expand Security > Security Database > CTI Users and click Search Users.

    2. In the Search Users window, search for the user created previously.

    3. Click Search. The new user appears.

    4. Click Edit.

    5. In the Edit CTI User window, in the User Profile area, select Unrestricted Access.

    6. Click Apply Changes.

    7. In the Apply Changes to CTI User Properties, click Apply.

Step 4: Verify the Tlink

In the CTI Connection TSAPI configuration, the Server Name parameter uses the Tlink value.

At the end of this step, you are required to provide to NICE Professional Services:

  • Tlink name

To verify the Tlink:

  1. In the AES webpage, select Security > Security Database > Tlinks.

    The list of Tlinks appears in the Tlink Name column. If your site uses more than one Tlink, make sure you choose the correct Tlink, according to the switch name.

    The Tlink consists of these segments:

    • AVAYA - Vendor

    • # - Separator

    • AVAYA10 - Switch / Connection Name (as defined in Communication Manager Interface> Switch Connections)

    • CSTA/CSTA-S - Non-Secure / Secure Portal

    • AES10 - AES Server Name

  2. Save the correct Tlink name in the Excel file. Once you have finished entering all the necessary details and prepared your environment, submit the Excel file to NICE Professional Services.

  3. If using the secured Tlink, verify that the TLS version is configured in the AES. Navigate to Networking > TCP/TLS Settings.

  4. By default, only Support TLSv1.2 Protocol is enabled. TLSv1.2 Protocol is supported as a sole security protocol.

  5. Since default certificates are no longer provided, the Avaya site engineer must generate the relevant certificate and upload it to the Avaya telephony system in CXone. Navigate to Security > Certificate Management > Server Certificates.

  6. In the Server Certificates window, in the Alias column, select the certificate and click Export.

  7. In the Server Certificate Export window, verify that No, do not export the private key is selected and click Export.

  8. Upload this exported certificate to the Avaya telephony system in Cxone.

Step 5: Create a Secure Connection Using VPN

This step must be performed only in coordination with NICE Professional Services.

At the end this step, by completing the form in the Essential Data for 3rd Party Connectivity Config in CXone Excel file, you will provide the necessary details to NICE Professional Services, who will aid you in establishing a secure VPN connection with CXone.

SIPREC environments only are required to complete additional information in the form, so that SBC can establish a connection between SIPREC and CXone.

  1. NICE Professional Services will provide you with the VPN connect form.

    1. Fill out the provided form with details of your side and the necessary information for CXone Multi-ACD.

    2. NICE Professional Services will coordinate with CXone teams to ensure all fields are appropriately filled out.

    3. Both parties must agree on the form and details.

  2. NICE Professional Services will schedule a collaborative call:

    1. To agree on the form and provided details with CXone Multi-ACD.
    2. With CXone teams for VPN provisioning.

  3. You will set up two VPNs: one for resiliency and one for failover.

  4. Configure routing by setting up BGP over VPN with CXone Multi-ACD firewalls or create static routes to the provided IP addresses.

  5. Configure NAT. NAT your endpoint behind a public IP, either advertised via BGP or using static routing.

  6. Configure firewall settings:

    1. Allow inbound traffic from the provided IP addresses (2) into the CTI Endpoint.

    2. Open the required ports. See Ports and Protocols by Application for more information.

    3. For High Availability environments, the ports mentioned above in step b must be open for all servers, active and standby.

  7. NICE Professional Services will coordinate with CXone teams to:

    • Ensure the VPN form is correctly filled out.

    • Schedule a time with CXone teams for VPN provisioning and routing setup.

    • Test VPN tunnel, routing, and connectivity.

Prepare Oracle (Acme Packet) SBC

This section describes how to prepare the Oracle (Acme Packet) Session Border Controller (SBC) to integrate with CXone Multi-ACD (CXone Open).

The procedures described in this section are recommendations only. The Oracle site engineer should perform all procedures.

Workflow

Use this workflow to prepare your Oracle (Acme Packet) SBC for CXone Multi-ACD. Before beginning this workflow, you must ensure that site components are configured.

phase

Description

reference

Phase 1: Site Preparation
  Step 1: Review the prerequisites.

(Optional) Encryption Prerequisites

Phase 2: Set up Oracle SBC
  Step 1: Verify that the license is valid and includes the Session Recording feature. SRTP requires Software TLS. Verify the License
  Step 2: Configure the recording realm to which the SBC connects. Configure the Recording Realm
  Step 3: Configure the Session Recording Server (SRS) connection. Configure the Session Recording Server (SRS) Connection
  Step 4: (Optional) For more than one recorder, configure the connection to the session recording group (SRG). (Optional) Configure the Session Recording Group (SRG)
  Step 5: Configure a SIP Interface. Configure SIP Interfaces, Realms, and Session Agents for the SRS and SRG
  Step 6: Configure an ingress or egress realm:  
  Step 7: Configure a session agent. Configure SIP Interfaces, Realms, and Session Agents for the SRS and SRG
  Step 8: Generate UCIDs for inbound calls. Configure the Generation of Universal Call Identifiers for Inbound Calls

Configure the Generation of Universal Call Identifiers for Inbound Calls

The Universal Call Identifier Session Plug-in Language (SPL) plug-in for an Oracle SBC can be configured to generate or preserve a universal call identifier based on the configuration. Once a universal call identifier is generated or preserved, the system adds the value to all subsequent egress SIP requests within the session. You can also configure the plug-in to remove unwanted universal call identifier headers to avoid duplicity in egress SIP requests. Avaya UCID can be added as extension data to the session element in the metadata of a recording when SIPREC is used.

(Optional) Encryption Prerequisites

  1. Verifying one call leg is encrypted:

    For encryption of the recorder call leg, verify that one of the other SBC call legs either going in/coming out of the SBC is encrypted.

  2. Follow the Oracle documentation for configuring certificates.

Verify the License

Verify that the license is valid and includes the Session Recording feature.

  1. Connect to the Acme Packet CLI and type the user password.

  2. Type the following and press Enter:

    enable

  3. Type the superuser password and press Enter:

  4. Type the following and press Enter:

    configure terminal

  5. Type the following and press Enter:

    system

  6. Type the following and press Enter:

    license

  7. Type the following and press Enter:

    show

  8. Verify that the license is valid (not expired).

  9. Verify that the license includes Session Recording.

  10. For SRTP, verify that the license includes Software TLS.

Configure the Recording Realm

  1. Connect to the Acme Packet CLI and type the user password.

  2. Type the following and press Enter:

    enable

  3. Type the superuser and press Enter:

  4. Type the following and press Enter:

    configure terminal

  5. Type the following and press Enter:

    media-manager

  6. Type the following and press Enter:

    realm-config

  7. Configure the realm name, type:

    identifier <Name of the realm>

    This must be the same as the recording realm name you define in Configuring the Session Recording Server (SRS) Connection or (Optional) Configuring the Session Recording Group (SRG).

  8. Configure the interface, type the following and press Enter:

    network-interfaces <interface>

    For example: network-interfaces M01:0

  9. Configure the RTCP Mux feature, type the following and press Enter:

    rtcp-mux enable

  10. Type the following and press Enter:

    done

    The graphic above is for example purposes only. In a non secure environment, the media-sec- policy is blank.

Configure the Session Recording Server (SRS) Connection

The SRS is the VRSP.

  1. Make sure you completed Configuring the Recording Realm.

  2. Connect to the Acme Packet CLI and type the user password.

  3. Type the following and press Enter:

    enable

  4. Type the superuser password and press Enter.

  5. Type the following and press Enter:

    configure terminal

  6. Type the following and press Enter:

    session-router

  7. Type the following and press Enter:

    session-recording-server

  8. Configure the SRS name, type the following and press Enter:

    name <name of the SRS>

    For example: name NiceVRSP

  9. (Optional) Configure the SRS description, type the following and press Enter:

    description <description of the SRS>

    For example: description SignalingToVRSP

  10. Configure the SRS realm, type the following and press Enter:

    realm <Name of the realm>

    For example: realm recording-realm

  11. Configure the SRS mode, type the following and press Enter:

    mode selective

  12. Configure the destination IP address, type the following and press Enter:

    destination <IP address of the VRSP>

    For example: destination 192.168.10.10

  13. Configure the destination port:

    • In a non-secure environment, type port 5060 and press Enter

    • In a secure environment, type port 5061 and press Enter

  14. Configure the transport layer protocol:

    • In a non-secure environment, for TCP as the transport layer protocol, type transport-method TCP and press Enter

    • In a secure environment, type DynamicTLS and press Enter

  15. Type the following and press Enter:

    done

  16. Add the SRS to a SIP Interface, Realm, or Agent Session. See Configuring SIP Interfaces, Realms, and Session Agents for the SRS and SRG.

    While you can add the SRS to all three recording options, the system automatically prioritizes your selection in this order: first Agent Session, then Realm, and then SIP Interface.

  17. To enable recording with recorders that expect RTP on consecutive ports (VoIP loggers), you must disable force-parity. By default, force-parity is already disabled using the force-parity parameter. To verify that force-parity is disabled, type:

    configure terminal

    session-router

    session-recording-server

    select [choose the recording server name by number]

    show

    The configuration of the Session Recording Server appears.

  18. Check that force-parity is disabled.

  19. If force-parity is enabled, type the following and press Enter:

    force-parity disabled

    done

  20. Save and activate the configuration.

(Optional) Configure the Session Recording Group (SRG)

Configure this if you have more than one recorder.

  1. Verify you completed Configuring the Recording Realm.

  2. Connect to the Acme Packet CLI and type the user password.

  3. Type the following and press Enter:

    enable

  4. Type the superuser password and press Enter.

  5. Type the following and press Enter:

    configure terminal

  6. Type the following and press Enter:

    session-router

  7. Type the following and press Enter:

    session-recording-group

  8. Configure the SRG name, type the following and press Enter:

    name SRG:<name of the session recording group>

    For example: name SRG:NiceRecordingServer

  9. (Optional) Add the SRG description, type the following and press Enter:

    description <description of the SRG>

    For example: description SignalingToRecGroup

  10. Configure the strategy of the SRG, for example, RoundRobin (see below). Type the strategy name and press Enter:

    strategy RoundRobin

    Note that a NICE VRSP pair does not support load balancing.

  11. To view additional strategy options (such as Hunt, LeastBusy, PropDist, and LowSusRate), type the following and press Enter:

    strategy?

  12. Configure the number of session recording servers that will be allocated to the SRG, type the following and press Enter:

    simultaneous-recording-servers

    followed by the number of servers.

    For a NICE VRSP pair, the number is 2.

  13. Type exit and repeat this action until you reach the first superuser prompt (#), for example:

    NiceSBC4500(configure)# session-router

    NiceSBC4500(session-router)# session-recording-group

    NiceSBC4500(session-recording-group)# exit

    NiceSBC4500(session-router)# exit

    NiceSBC4500(configure)# exit

    NiceSBC4500#

  14. Specify the session recording servers to be included in the group. Type the session recording server names in quotation marks, with a space between each session recording server name, and press Enter:

    "<servername1> <servername2>"

    This must be the same as the recording realm name you define in Configuring the Session Recording Server (SRS) Connection.

  15. Type the following and press Enter:

    done

  16. Type the following and press Enter:

    verify-config

  17. When you receive the notice Verification successful, type the following and press Enter:

    save-config

  18. Type the following and press Enter:

    activate-config

Configure SIP Interfaces, Realms, and Session Agents for the SRS and SRG

While you can select all of these interfaces for the components above, the system will automatically prioritize the selection in this order: first session agent, then realm, and then SIP interface.

Prepare Ribbon (Sonus) SBC

This section describes how to prepare the Ribbon (Sonus) Session Border Controller (SBC) to integrate with CXone Multi-ACD (CXone Open). The information in this guide is relevant for the Ribbon 5000 and 7000 Series Core SBC and the Virtual Core SBC.

The procedures described in this guide are recommendations only and should be performed by a certified Ribbon engineer.

Verify the License

The first step in configuring the Ribbon SBC to integrate with the CXone Multi-ACD environment is to verify that the license is valid and includes the SBC-SIPREC feature.

  1. Connect to the Ribbon SBC with the user name admin.

  2. In the Command Line Interface (CLI) type: show table system licenseInfo.

    The license information appears.

  3. Verify that the license is valid (not expired).

  4. Verify that the line for the SBC-SIPREC feature includes the license ID, an expiration date that has not yet passed, and a usage limit greater than 0.

Configure an Additional Zone

An additional zone, which can be named, for example, NICE_ZONE, must be added for the recorder. The name of the zone is arbitrary, but the same name that is used to configure it must also be used to reference it in subsequent steps.

This zone must have properties similar to those shown in the example.

To create a new zone named NICE_ZONE (an example):

  1. At the command line prompt in the Command Line Interface (CLI), enter:

    configure

    The CLI responds with this message:

    Entering configuration mode private

  2. At the CLI command line prompt, enter:

    set addressContext default zone NICE_ZONE id 0

  3. At the CLI command line prompt, enter:

    set addressContext default zone NICE_ZONE sipTrunkGroup NICE_TG state enabled mode inService policy carrier 0000 country 1 localizationVariant northAmerica tgIPVersionPreference both-ipv4-and-ipv6 digitParameterHandling numberingPlan NANP_ACCESS Value for 'media mediaIpInterfaceGroupName' [LIF1,LIF2]: LIF2

  4. At the CLI command line prompt, enter:

    set addressContext default zone NICE_ZONE sipTrunkGroup NICE_TG ingressIpPrefix 172.0.0.0 8

  5. At the CLI command line prompt, enter:

    set addressContext default zone NICE_ZONE sipTrunkGroup NICE_TG signaling messageManipulation outputAdapterProfile UUID-MessageBody

  6. At the CLI command line prompt, enter:

    set addressContext default zone NICE_ZONE sipSigPort 1001 ipInterfaceGroupName LIF1 ipAddressV4 172.21.13.62 portNumber 5060 mode inService state enabled recorder disabled siprec enabled transportProtocolsAllowed sip-udp,sip-tcp

  7. At the CLI command line prompt, enter:

    commit

Configure Call Recording

There are five steps to configuring call recording.

Send a UCID to the Recorder

In an Avaya environment the Universal Call Identifier (UCID) of every call must be sent to the recorder.

Configure TLS and SRTP

Follow these procedures for TLS and SRTP configuration.

Prepare AudioCodes SBC

This section describes how to prepare and configure the AudioCodes Session Border Controller (SBC) to integrate with CXone Multi-ACD (CXone Open).

The supported AudioCodes SBC version is 7.4.

The procedures described in this section are recommendations only. The AudioCodes site engineer must perform the AudioCodes preparation and configuration.

Workflow

Use this workflow to prepare your AudioCodes SBC system for CXone Multi-ACD (CXone Open).

Step 1: Verify the License

Step 2: Configure the Proxy Set for CXone Environment

Step 3: Configure the IP Group for the CXone AudioCodes SBC

Step 4: (Secure/Non-secure Environments) Configure SIP Recording

Step 5: Send a UCID to the CXone AudioCodes SBC

Workflow for Secure SIPREC

Use this workflow to prepare your AudioCodes SBC system for secure SIPREC configuration with CXone Multi-ACD (CXone Open).

Step 1: Verify the License

Step 2: (Secure Environments only) Configure the Proxy Set

Step 3: Configure Secure IP Profile

Step 4: (Secure Environments only) Configure the IP Group

Step 5: (Secure Environments only) Import and Export Certificates for SIP Recording

Step 6: (Secure/Non-secure Environments) Configure SIP Recording

Step 7: Send a UCID to the CXone AudioCodes SBC

Verify the License

Verify that the license is valid and that the SBC-SIPREC feature is supported.

  1. Connect to the AudioCodes SBC via web.

  2. Click the ADMINISTRATION menu.

  3. Under TIME & DATE, expand MAINTENANCE and select License Key.

  4. Under VOIP FEATURES, verify that the license supports SIPRec Sessions.

Configure the Proxy Set for CXone Environment

This procedure provides guidelines for configuring the SBC for the CXone AudioCodes SBC, including the IP address of the CXone AudioCodes SBC.

  1. In the menu, click SIGNALING & MEDIA.

  2. Under TOPOLOGY VIEW, expand CORE ENTITIES and select Proxy Sets.

  3. In the list of Proxy Sets, click New.

  4. In the Proxy Set window, under GENERAL:

    1. In the Name field, enter a name.

    2. From the SBC IPv4 SIP Interface drop-down list, select the SIP interface.

    3. Click APPLY.

  5. Scroll down and click the Proxy Address link.

  6. In the Proxy Sets > Proxy Address window, click New and add IP address for CXone AudioCodes SBC.

  7. In the Proxy Address window, under GENERAL, in the Proxy Address field, enter the CXone AudioCodes SBC IP address.

  8. Click APPLY.

(Secure Environments only) Configure the Proxy Set

This procedure provides guidelines for configuring the SBC Proxy Set and the Proxy IP address for the CXone AudioCodes SBC for secure connection.

  1. In the menu, click SIGNALING & MEDIA.

  2. Under TOPOLOGY VIEW, expand CORE ENTITIES and select Proxy Sets.

  3. In the list of Proxy Sets, click New.

  4. In the Proxy Set window, under GENERAL:

    1. In the Name field, enter a name.

    2. From the SBC IPv4 SIP Interface drop-down list, select the SIP interface.

    3. From the TLS Context Name drop-down list, select the TLS Context with the SBC certificate.

  5. Scroll down and click the Proxy Address link.

  6. In the Proxy Sets > Proxy Address window, click New and add the IP address for CXone AudioCodes SBC.

  7. In the Proxy Address window, under GENERAL, in the Proxy Address field, enter the CXone AudioCodes SBC IP address and set the Transport Type to TLS.

  8. Click APPLY.

Configure Secure IP Profile

  1. From the Setup menu, go to SIGNALING & MEDIA. Under TOPOLOGY VIEW, expand CODERS & PROFILES and select IP Profiles.

  2. In the list of IP Profiles, click New.

  3. In the list IP Profiles window, under MEDIA SECURITY, make sure the SBC Media Security Mode is set to Secured.

  4. Click APPLY.

Configure the IP Group for the CXone AudioCodes SBC

  1. In the menu, click SIGNALING & MEDIA.

  2. Under TOPOLOGY VIEW, expand CORE ENTITIES and select IP Groups.

  3. In the list of IP Groups, click New.

  4. In the IP Groups window, under GENERAL:

    1. In the Index field, configure the next sequential number.

    2. In the Name field, enter a name.

    3. From the Topology Location drop-down list, select the location.

    4. From the Type drop-down list, select Server.

    5. From the Proxy Set field, select the Proxy Set for this IP Group.

    6. In the IP Profile field, enter an existing IP Profile ID.

    7. In the Media Realm Name field, select the existing Media Realm name.

  5. Click APPLY.

(Secure Environments only) Configure the IP Group

Verify that the secure IP Profile was configured. See Configure Secure IP Profile.

  1. In the menu, click SIGNALING & MEDIA.

  2. Under TOPOLOGY VIEW, expand CORE ENTITIES and select IP Groups.

  3. In the list of IP Groups, click New.

  4. In the IP Groups window, under GENERAL:

    1. In the Index field, configure the next sequential number.

    2. In the Name field, enter a name.

    3. From the Topology Location drop-down list, select the location.

    4. From the Type drop-down list, select Server.

    5. From the Proxy Set field, select the CXone Proxy Set for this IP Group.

    6. In the IP Profile field, select the secure IP Profile previously created in Configure Secure IP Profile.

    7. In the Media Realm Name field, select the existing Media Realm name.

  5. Click APPLY.

  6. Then click Save.

(Secure Environments only) Import and Export Certificates for SIP Recording

At the end of this step, you are required to provide to NICE Professional Services:

  • The certificate in PEM format

Before import, the CXone AudioCodes SBC certificate must be saved in PEM format.

  1. To import the CXone AudioCodes SBC certificate to the SBC, go to SETUP > IP NETWORK. Under NETWORK VIEW, expand SECURITY and select TLS Contexts.

  2. In the TLS Context window, click Trusted Root Certificates.

  3. Click Import.

  4. In the Import New Certificate window, click Choose File and browse to the CXone AudioCodes SBC certificate. Verify the CXone AudioCodes SBC certificate is in PEM format.

  5. Click OK.

  6. In the TLS Contexts window, click Certificate Information.

  7. On the Certificate Information page, under CERTIFICATE, copy the text of the certificate. Create a certificate from this text.

  8. Send the certificate in PEM format to the NICE Professional Services together with the CA, if exists.

(Secure/Non-secure Environments) Configure SIP Recording

This section describes the procedure for SIP Recording enablement and the SIP Recording routing configuration.

  1. In the menu, click SIGNALING & MEDIA.

  2. Expand SIP RECORDING and select SIP Recording Settings.

  3. Under General, from the SIP Recording Metadata Format drop-down list, select either Legacy or RFC 7865 Metadata option. CXone Multi-ACD (CXone Open) supports both options. Configure according to your preferences.

  4. Click APPLY.

  5. Form SIP RECORDING, select SIP Recording Rules.

  6. In the SIP Recording Rules area, click New.

  7. In the SIP Recording Rules window, under GENERAL:

    1. From the Recorded IP Group list, select the existing agent's side group ID.

    2. In the Recorded Source Pattern field, enter the source prefix to be recorded.

    3. In the Recorded Destination Pattern field, enter the destination prefix to be recorded.

    4. From the Peer IP Group list, select the Service Provider side's group ID.

    5. From the Caller list, select Both.

  8. Under RECORDING SERVER:

    1. From the Recording Server (SRS) IP Group list, select the previously created IP Group for the Recorder.

      See Configure the IP Group for the CXone AudioCodes SBC or (Secure Environments only) Configure the IP Group.

  9. Click APPLY.

  10. A new row is added in the SIP Recording Routing section.

  11. To save all new information, click Save.

Send a UCID to the CXone AudioCodes SBC

In an Avaya environment, the Universal Call Identifier (UCID) of every call must be sent to the CXone AudioCodes SBC.

Prepare the Alvaria Aspect Unified IP Dialer Environment

Alvaria Aspect Unified IP dialer can only be used in combination with Oracle (Acme Packet) or AudioCodes SBC.

This document details the preparation of the Aspect Unified IP Dialer environment.

To receive CTI Events, you must verify the port number.

To verify the port number:

  1. Verify the IP address of the Aspect Unified IP portal.

  2. Connect to the Server Configurator.

  3. Navigate to Sites > Tenants > EPro > Servers.

  4. Right-click CenterCord and select Properties. The Server Properties window appears.

  5. In the Server Properties Window, select the CenterCord tab.

  6. The Call Logger lists the port, for example 15161. This is the port used to receive CTI events.