User's Guide
EZ Unified Device Manager Pro
Provided by Event Zero
The information contained in this document represents the current view of Event Zero on the software discussed as of the date of publication and is subject to change at any time without notice to you. This document and its contents are provided AS IS without warranty of any kind, and should not be interpreted as an offer or commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented. EVENT ZERO MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT.
The descriptions of other companies' products in this document, if any, are provided only as a convenience to you. Any such references should not be considered an endorsement or support by Event Zero. Event Zero cannot guarantee their accuracy, and the products may change over time. Also, the descriptions are intended as brief highlights to aid understanding, rather than as thorough coverage. For authoritative descriptions of these products, please consult their respective manufacturers.
All trademarks are the property of their respective companies.
©2017 Event Zero. All rights reserved.
Event Zero is either registered trademarks or trademarks of Event Zero Pty Ltd. in Australia and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Event Zero's EZ Unified Device Manager (UDM) Pro is an Enterprise-scale application platform for managing your voice-over-IP (VoIP) infrastructure. The application consists of two main components:
EZ UDM Pro is the visual configuration and management component of the infrastructure. The provisioning bridge resides locally on your network, close to the phone devices that EZ UDM Pro manages. Provisioning bridges put the software images and resource files on your local network instead of at the application's local storage, dramatically speeding up the provisioning of your phone devices.
EZ UDM Pro is cloud-based or on-premises, and provisioning bridges will always be on-premises. Load balancers – hardware or software-based – are used to ensure end-to-end encryption of the communications path, high availability, and to distribute the content consistently to all bridges.
The following sections of this guide provides information and detail on how to use the application. Installation information is contained in the Installation Guide.Need link and location for the Installation Guide.
The Overview page reveals a quick look at your infrastructure and devices. From here, you can view:
Listing of all bridges that have requested association with EZ UDM Pro. The bridges are identified by name and if approved, a green check mark. If the bridge is not yet approved, a yellow triangle.
Approved Devices is the number of phone devices that are approved for use and are ready for provisioning or have been provisioned. Clicking the number takes you to the Devices sub-menu, described later under Devices.
Unapproved Devices is the opposite of Approved Devices. The number represents phone devices that not yet approved. Clicking the number takes you to the Unapproved Devices sub-menu, described later under Unapproved Devices
The number of Provisioning Bridges requesting association with EZ UDM Pro. Clicking the number takes you to the Bridges sub-menu, described later under Bridges.
The number, displayed in a pie chart of device sets with number of devices assigned, of device sets configured to manage the phone devices assigned to a given set
Displayed as vertical bar graph, models of approved devices are listed at the bottom and the number of devices in that model is listed on the left of the graph
The Sideboard (essentially a menu), on the left side of the page, is your access to all functions for managing the software, provisioning bridges, and your deployed phone devices.
The sideboard is broken down to logical sections, each responsible for managing a part of configuration, management, and deployment.
Located at the top, above Overview, is the name of the currently logged in user. Immediately below the user's name is a link to logout. Click Logout to quit this session of EZ UDM Pro.
The Overview selection, when clicked, takes you to the main dialog page, described in Overview Page.
Tags represent a powerful feature in EZ UDM Pro. The concept of tags is both simple, and potentially difficult, to understand. The reasoning for this seeming contradiction is this:
Tags are simple to understand if you are using just a tag or two to collect like items in hierarchy for ease of management.
Tags become a more complex subject when you start using tags to modify the applied set of features, software, locations, etc., depending on what tags are applied, where they are applied, and how one tag affects another.
Before we get into the actual application of tags, we need to discuss the logic behind the tags.
In applications and in computing in general, everything is comprised of data. Data could be described as attributes with values applied. It might seem simplistic, but at a high level, you could describe a column or row in a database this way. And, you could describe the operation of a processor using assembly language, machine language (the binary, not the technology), or any language much the same way. Remember, this is high level and probably doesn't hold up well once you get into the implementation details. Regardless, it will work for this discussion of tag concepts.
If you have a background in Microsoft's Group Policy for Active Directory, this may seem too simple to believe. It's like the way that Group Policy is applied and what a resultant set of policy is.
For those that don't have a background or familiarity with Group Policy, or if you just need a refresher, Group Policy operates like this.
In an Active Directory domain environment, there is a policy called the Default Domain Policy that applies to most (we'll discuss just User and Computer objects for the sake of clarity) objects. The Default Domain Policy sets attributes and values (settings) for those attributes. The policy is then applied to all objects. For example, let's assume that your domain is called contoso.com. In Group Policy Management (the management tool in Windows Server for Group Policy configuration) opening the domain contoso.com shows one policy by default – the Default Domain Policy.
Right-clicking on the Default Domain Policy and selecting Edit opens the Group Policy Management Editor. Using this tool, one can view and modify the Default Domain Policy.
Note! Just for clarity – Microsoft strongly recommends NEVER editing or changing the values of the Default Domain Policy. If you need to change a setting or behavior enforced by the Default Domain Policy, create a new policy that will override the setting in the Default Domain Policy. We're getting ahead of ourselves. Just don't modify the Default Domain Policy if you can avoid it.
In the Group Policy Management Editor note that there are two main nodes – Computer and User. These are the primary object classes that the Group Policy Management Editor can edit. If you were to expand User Configuration > Policies > Administrative Templates, there are a number of sub-nodes. Of these sub-nodes is Desktop, then Desktop. We are going to look at attributes that correlate directly to phone devices and computers – Wallpaper (for the Windows desktop), or a background image (for the phone device.)
By default, the Default Domain Policy contains the attribute "Desktop Wallpaper", and the purpose of the attribute and associated setting is to apply a desktop wallpaper file to each user, and by inference, the computer the user logs onto. The distinction is important; the attribute - because it applies to the user – will apply to any computer that the user logs onto. If the attribute was at the Computer level, it would apply to all Computers that are a part of the domain that this policy applies to. (As a side note, there is no companion attribute at the Computer level. A wallpaper can be applied at the computer level, but it's a less efficient and more complex task and does not gain any additional benefit for the required task.)
The default setting for most attributes in the Default Domain Policy is "Not Configured." Essentially, this setting is ignored because until there is a setting, it's just additional processing by the Group Policy engine that would need to take place. The other options are "Enabled", meaning read and apply the settings in the policy, or "Disabled" meaning that even if there is a setting, do not apply it. This will become important shortly.
Let's assume that we Enable the attribute "Desktop Wallpaper" and set a path to the file \\nas01.contoso.com\assets\company_logo.jpg. We commit this setting. The next time a user logs in, the policy is read, and this attribute changes the desktop wallpaper to the company_logo.jpg. We've set a baseline configuration for all users across the company to use a standard logo for their desktop wallpaper.
Because Contoso is an international company, each country has the permission to personalize the logo in accordance with their country's affinity. Changes are made to the company_logo.jpg by other country branches. Germany, for example, changes the wallpaper to put the logo over the German flag. The German Active Directory (AD) administrator creates a new Group Policy Object (GPO) and places the new GPO into the DE Organizational Unit (OU). The subtle change – setting the same attribute Desktop Wallpaper to \\nas01.de.contoso.com\assets\company_logo_DE.jpg - applies the German-specific company logo desktop wallpaper for users only in the DE OU.
One further change is made. The Sales group petitions for and receives special permission to modify the logo to add their main customer, Tail Spin Toys, logo to the German logo. The new Wallpaper needs to apply to just the Users in the Sales OU in the DE OU. The AD Administrator creates a new GPO and links it to the Sales OU in the DE OU, modifying the attribute Desktop Wallpaper \\nas01.de.contoso.com\assets\company_logo_DE_Sales.jpg. When the users in the Sales OU log in, the desktop wallpaper with the German flag and the company logo, plus the Tail Spin Toys logo, is displayed.
For some who have a passing knowledge of AD and GPO, you might think that creating a Site linked GPO for Germany (assuming, as would be good practice, Germany is defined as a Site) would work. Precedence of GPO policy application potentially works against you here. GPO is applied in the following order: Local System, Site, Domain, then OU, where the policy on the Local System policy is applied first, and then over-written by policy settings that conflict at the Site GPO, then the Domain GPO and finally the OU GPO. If the German logo was applied at the Site level, it would be over-written by the contoso.com Domain-level policy for the "All Company" logo wallpaper.
(There are mitigations and ways to get around the issue outlined with the Site vs. Domain setting. But, it's unimportant to our overall theme on Tags.)
That's it for the Group Policy 101 refresher. Let's look at how tags work in a similar manner to apply settings to your devices.
Tags are created and configured on the Tags main page. Tags can be created for four (4) types of objects:
There are two default Tag types that cannot be modified, deleted, or created.
(Lots more on Tags to come… Adding Tags looks to be misbehaving at the moment.)
In Device Profiles, you create new device profiles, and manage existing ones. Device profiles are a collection of attributes that will apply to the devices that this profile is a member of. Assigning a tag to the device profile associates the device profile with a defined set of devices.
For example, you have a location in France that requires that the French flag is displayed. A resource file for an image of the French flag is available in Resources. You configure the device profile to use the image file and apply it to all phones that meet the criteria. The criteria in this case is that the devices are part of a tag group France Office. Adding the XML attributes to use the image file and apply it to the device, plus using the tag France Office applies the French flag as the image displayed on the devices in the France Office.
Note! For assigning a device profile to a tag, see the section Tags. The device profile must exist prior to assigning it to a given tag.
To add a device profile, do the following:
Tip! The name that you type here is what will be displayed in all subsequent configuration sections.
Tip! We recommend using a description to define what this device profile is and what it does. Referring to the example, the description might be "Uses the resource file france_flag.png and applies to assigned phones."
Note! If you navigate to another selection in EZ UDM Pro from the Device Profiles – Add New dialog page without saving your changes, you are warned that you are exiting the page without saving your changes. You are given the option to Cancel and return to the Device Profiles – Add New dialog or Proceed and discard the changes you have made. The same notification is displayed if you select (in the upper right corner) Cancel instead of Save to exit the page.
The ability to filter your Device Profiles is a handy feature as the number of device profiles increase, making it much easier to locate the device profile that you need to change, assign, or delete.
To filter your Device Profiles, do the following:
Tip! If you are looking for a device profile or all profiles that contain a given attribute, start typing the name of that profile, attribute, or any part of that attribute or profile. For example, to find all profiles that contain the word 'enable', type enable in the text box. Only profiles that contain an attribute with the word 'enable' within the attribute (e.g. bg.background.enabled) are returned. It's important to understand that if you type 'enable' the filter will find enable and enabled, and any other matches that contain 'enable'. This feature is especially powerful given that without this feature, you would need to open and examine each device profile to locate the profiles that contain attributes with a given phrase.
A function of good management is to delete items that you no longer need. To delete a device profile, do the following:
In addition to the Filter feature, you can sort Device Profiles on the Name, Attributes, or Tags columns. To sort a column, ascending or descending, do the following:
Tags, described in the section Tags in this guide, are used in Device Profiles to associate a profile with any Location, Device Set, Model, or Bridge. Device Profiles can also be associated with the unique Global tag.
Tags are only displayed for reference. All tag management for associations, creation, deletion, and other management of tags functions is configured in the Tags selection.
Speed Dial is a convenience feature for users. Instead of dialing an often-used number, needing to remember the country code, area code, and number – not to mention the occasions where an extension is needed – the user can dial a short sequence (for example, two, three, or four numbers) of numbers to execute the entire phone number. For most companies this is a powerful feature that end users have become accustomed to.
EZ UDM Pro implements this feature fully by allowing you to configure Speed Dial sets that combine lists of numbers for users who share common speed dial needs. The entries can be internal users, external parties, such as customers or colleagues. Speed dial entries are assigned to departments, locations, up to and including the entire company.
Selecting Speed Dial from the sidebar displays the main page for viewing and managing Speed Dial configurations. The main page displays:
Note! The Label field is Required and must be unique if you are using GENBAND (also known as Experius™ A2) in your environment.
To edit existing Speed Dial configurations, do the following:
The ability to filter your Speed Dial configurations is a handy feature as the number of device profiles increase, making it much easier to locate the device profile that you need to change, assign, or delete.
To filter your Device Profiles, do the following:
Tip! If you are looking for a specific entry or all entries that contain a given string, start typing the name of that entry, contact, or any part of speed dial elements. For example, to find all contacts that contain the string 'contoso', type contoso in the text box. Similarly, the filter works for phone numbers, first name, last name and label. It's important to understand that if you type 'bob' the filter will find bob and the string 'bob' in a SIP URL, or Bob as a first name, etc. This feature is especially powerful given that without this feature, you would need to open and examine each Speed Dial configuration and entry to locate entries that contain the information that you are looking for.
A function of good management is to delete items that you no longer need. To delete a Speed Dial configuration, do the following:
Caution! The action of delete is absolute. Clicking the delete action removes the entry. If you accidentally delete the wrong entry, click Cancel in the upper right. If you click Save, you will need to recreate the lost entry.
In addition to the Filter feature, you can sort Speed Dial configurations on the Name, Entries, or Tags columns. To sort a column, ascending or descending, do the following:
Tags, described in the section Tags in this guide, are used Speed Dial configurations to associate a Speed Dial with any Location, Device Set, Model, or Bridge. Speed Dial can also be associated with the unique Global tag.
Tags are only displayed for reference. All tag management for associations, creation, deletion, and other management of tags functions is configured in the Tags selection.
Software is the code, provided by the device manufacturer, that tells the phone how to operate. Basically, software is akin to the phone's operating system. The manufacturer provides software as a downloadable package. The package is uploaded to EZ UDM Pro, unpacked, and then processed for all attribute values. The attribute values are written to the SQL database instance for fast reference.
Though software is a critical component of creating a functional device, there are just a few simple functions to use the software in your device's configuration.
You add software to EZ UDM Pro just as you would upload software to any website. All the work to unpackage, process the software, then commit all attributes to the database is done by EZ UDM Pro in the background.
To upload a software package to EZ UDM Pro, do the following.
Note! If there was a problem in processing, the status of the software will be Error. See the Appendix for information and steps to resolve the Error statusAdd FAQ or TS steps/article for Error status in Processing/Processed.
The ability to filter software packages is a handy feature as the number of software packages increase, making it much easier to locate the software packages that you need to assign or delete.
To filter software packages, do the following:
Tip! If you are looking for a software package or all packages that contain given text in the readme, start typing the name of that software package, software version, status, or text in the readme file as uploaded. For example, to find only software that applies to a VVX 510 device and the model numbers are referenced in the readme, the software package is returned from the filter. It's important to understand that if you type 'enable' the filter will find enable and enabled, and any other matches that contain 'enable'. This feature is especially powerful given that without this feature, you would need to open and examine each software package detail screen to locate the package that contains strings with a given phrase.
In addition to the Filter feature, you can sort software packages on the Name, Version, File Size, or Status columns. To sort a column, ascending or descending, do the following:
A function of good management is to delete items that you no longer need. When the last device that is using a given software and is upgraded to a newer or different software the software can be safely deleted.
Note! Deleting software that is in use by devices deletes all references and the source files for the software from EZ UDM Pro. Devices will continue to operate normally. However, you cannot deploy the deleted version of software to other devices without uploading the package into EZ UDM Pro. Due to all references to the software being removed, the software deployed to devices that was deleted
To delete a software package, do the following:
Information on the software packages that are available on your system is viewed by clicking Software in the sidebar and clicking the software package that you need to view.
To view details and what is available, do the following:
Tags, described in the section Tags in this guide, are used in Software to associate a software package with any Location, Device Set, Model, or Bridge. Software can also be associated with the unique Global tag.
Tags are only displayed for reference. All tag management for associations, creation, deletion and other management of tags functions is configured in the Tags selection.
Resource files are image or sound files that you use to personalize images on the phone screen or to use a sound file for Music on Hold (MoH.) Resource files are uploaded to EZ UDM Pro and assigned as resources to phones based on the same type of criteria that you might use to configure the Sales Department using Device Profiles.
In Device Profiles, you use attributes to define the background image and enable the image. Similarly, you define a sound file for MoH by assigning the sound file resource name to the feature.moh.filename and activate it by configuring the attribute feature.moh.enabled and toggling the value to Yes.
You add resources to EZ UDM Pro just as you would upload a file to any website. EZ UDM Pro does feature a simple to use drag and drop feature for uploading files, as well as a classic File Explorer interface.
To add new resource files to EZ UDM Pro, you do the following.
The ability to filter your resource files is a handy feature as the number of resource files increase, making it much easier to locate the resource files that you need to change, assign, or delete.
To filter your Resource Files, do the following:
Tip! If you are looking for a specific file or all files that contain a given string, start typing the name of the file or format. For example, to find all resource files that contain the string 'contoso', type contoso in the text box. Similarly, the filter works for filtering by file size. It's important to understand that if you type 'bob' the filter will find bob and the string 'bob' in the file name or typing the number '1' will find all files that contain '1' and all file sizes that contain '1'.
In addition to the Filter feature, you can sort resource files on the Name, File Size, or Date Created columns. To sort a column, ascending or descending, do the following:
A function of good management is to delete items that you no longer need.
To delete a resource file, do the following:
Information on the resource files that are available on your system is viewed by clicking Resources in the sidebar and clicking the resource file that you need to view.
To view details and what is available, do the following:
Device sets represent the collection of configured items – Devices, Device Profiles, Software, and Speed Dial – that when brought together, are the totality of items that you use to change a device a functioning phone.
Note that the flow of the items in the sidebar are logically ordered such that if you start your configuration tasks at the top and move down, by the time you get to Device Sets, items that make up the configuration sets are ready to bring together.
Selecting Device Sets in the sidebar (if you have not yet created a device set) is an empty list. On the right side is Filter, Import, and Add. In the following sections details on how to create device sets and manage them is provided.
To add a new device set, do the following.
The next four sections – Devices, Device Profiles, Software, Speed Dials – contain no entries to multiple entries, based on the requirements for this device set.
Tip! Use the Filter to limit your selections by models, IP addresses (or portions of the IP address), or SIP URIs.
Tip! Use the Filter to limit your selections by name, attribute (number of attributes), and tags (number of tags).
Tip! Use the Filter to limit your selections by name, entries (number of contacts in the entry), and tags (number of tags). The Filter feature can also return only Speed Dial entries that contain a contact that is part of that Speed Dial entry.
The ability to filter your device sets is a handy feature as the number of device sets increase, making it much easier to locate the device sets that you need to reboot or delete.
To filter your Device Sets, do the following:
Tip! If you are looking for a specific element of a device set that contains a given string, start typing the name of the element. For example, to find all contacts in a speed dial that is part of a device set that contains the string 'contoso', type contoso in the text box. Similarly, the filter works for filtering by number of devices in a device set. It's important to understand that if you type 'bob' the filter will find bob and the string 'bob' in contact name or typing the number '1' will find all elements contain '1' and all devices sets that contain 1, 10, 21, or any number that contains '1'.
[Have no idea what this is]
In addition to the Filter feature, you can sort device sets on the Name and Devices columns. To sort a column, ascending or descending, do the following:
You can edit an existing Device Set to add or remove items from the existing configuration. You can change the Device Set name, Add devices, device profiles, software or speed dials. You remove items from a device set by clicking the associated Delete, or trash can icon.
Important! The Global Device Set is a special case device set. You cannot change the name and can only add devices. If you note that you are looking at the Devices item in the sidebar, this is the indicator of what the Global Device Set is.
To edit an existing Device Set, click Device Sets in the sidebar. Do the following. You can save after every change, or you can save when you are done with the entire device set edit.
A function of good management is to delete items that you no longer need.
To delete a Device Set, do the following:
If you need to make changes to the Global Device Set, refer to the section Devices later in this guide.
Locations allow for logical grouping of Device Profiles, Software, and Speed Dials to a specific physical location, and a network location. The physical location is defined by Address, City, State, Post Code, Country, Timezone. Additionally, a Contact Name, contact Number, and Contact Email for the location can be configured.
Logical location is defined by the network Subnets. You define the Subnets associated with the physical location by defining the TCP/IP network using classless inter-domain routing (CIDR) notation.
At a minimum, for each location, you should define all fields in the Location section and define at least one network. You add device profiles, software and speed dial entries to apply these elements to devices in the location and subnet.
To add a new location, do the following.
The ability to filter your locations is a handy feature as the number of locations increase, making it much easier to locate the locations that you need to manage.
To filter your Locations, do the following:
Click Filter and in the text field and start typing the name of a location
Tip! If you are looking for a location that contains a given string, start typing the string. For example, to find all locations that contain the string 'contoso', type contoso in the text box.
It's important to understand that if you type 'bob' the filter will find bob and the string 'bob' in the location or number '1' will find all parts of the location that contain '1' and all location attributes that contain 1, 10, 21, or any number that contains '1'.
In addition to the Filter feature, you can sort locations on the Name, Postcode, City, State, and Country columns. To sort a column, ascending or descending, do the following:
You can edit an existing Location to add or remove items from the existing configuration. You can change the Location name, physical address and point of contact information, Add, edit or remove subnets, add or remove device profiles, add or remove software, or add or remove speed dials.
To edit an existing Location, click Locations in the sidebar. Do the following.
Note! You can save after every change, or you can save when you are done with the entire Location edit.
A function of good management is to delete items that you no longer need.
To delete a Location, do the following:
Bridges represent a connection from the EZ UDM Pro server, cloud-based or on your own network, to the devices that you manage. Additionally, the provide a local repository for the data and software that your devices use. Instead of retrieving data from a cloud-based repository, local data storage allows network speed access for the devices that you manage instead of the possible inconsistencies in latency and speed that the Internet can introduce.
Unlike other components in EZ UDM Pro, Bridges are not added by using the user interface. Bridges are added by installing the EZ UDM Pro Bridge software on a server on your local network. When installed, the bridge software registers with the target EZ UDM Pro server.
The bridge, once registered with the EZ UDM Pro server, cannot have a dialog with the command and control portion of EZ UDM Pro until the EZ UDM Pro administrator approves the bridge. This is a security measure, preventing rogue bridges (or computers that look like bridges) from accessing your system. Once approved, devices that connect to the bridge are can receive data and report back information to EZ UDM Pro.
To add a bridge, do the following. (Complete details are presented in the accompanying Installation Guide.)
If you want to provide unique identifiers, select Manual. Two fields are revealed that you then supply your identifier information.
Bridge ID is a universally unique identifier (UUID) field for use as an absolute identifier and is a feature to be used for future purposes.
Bridge API Key is a feature to be used for future purposes.
Click Next.
Installing the EZ UDM Pro Bridge software on your local server registers the bridge with EZ UDM Pro. You, as an Administrator on EZ UDM Pro, must approve the bridge to allow it to communicate and establish a full dialog with the application. To approve a bridge, do the following.
To view details on the status of a bridge and configure what a bridge will offer to connected devices, locate the bridge in the list of bridges and select the bridge by clicking the link.
Bridge Detail displays information about the bridge and a text field to add notes for this bridge. Details for the bridge:
Details on troubleshooting a bridge that might be experiencing problems can be found in the Appendix of this guide.
Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.
This section of the Bridge information is read-only and displays all devices that have registered with this bridge.
Devices are listed by media access control (MAC) address, IP Address, Model, Software (version), Approved, Last Seen.
You can click on the MAC address to view information about this device.
You can click on the Model to view information about this device model.
Actions are listed on the right side for each device. Actions that you can take on a given device:
Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.
In Device Profiles, you view existing Device Profiles assigned to the bridge for use by devices connected. Columns in Device Profiles are Name, Attributes (number), and Tags (number). You Add a device profile to the Device Profiles section by clicking Add.
When you click Add, you select one or more previously configured Device Profiles from a pick list of device profiles.
To remove a Device Profile from the bridge, click Delete (a trash can icon) to remove the device profile.
You can filter device profiles by clicking Filter and typing the name of a device profile or attributes used in the device profile. This is a powerful feature, allowing you to determine which device profiles include a given attribute. You can type a part of an attribute or the entire attribute name.
You can sort the columns in Device Profiles by clicking the arrows to the right of the column label. After the first click, you should see a descending list result, items sorted from 0 – 9, A to Z. Click the arrow to change the ascending sort to a descending sort, Z – A, 9 – 0. You do the same on the other columns where ascending is the number 0 to the letter Z, and descending is from the letter Z to the number 0.
Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.
The software section of the bridge configuration assigns software to the bridge for provisioning. Columns in Software are Name, Version and File Size. Click Add in the Software section to add a software package.
When you click Add, you select one or more previously uploaded software packages from a pick list of available software packages. Click Apply to add the software packages to your bridge.
To remove a software package from the bridge, click Delete (a trash can icon) to remove the software package.
You can filter software by clicking Filter and typing the name of a software package, version or file size of the software package. This is a powerful feature, allowing you to determine which software package is a given version or size. You can type a part of package name or version to limit the selection criteria.
You can sort the columns in Software by clicking the arrows to the right of the column label. After the first click, you should see a descending list result, items sorted from 0 – 9, A to Z. Click the arrow to change the ascending sort to a descending sort, Z – A, 9 – 0. You do the same on the other columns where ascending is the number 0 to the letter Z, and descending is from the letter Z to the number 0.
Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right, or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.
The speed dials section of the bridge configuration assigns speed dials to the bridge for provisioning. Columns in Speed Dials are Name, Entries (number), and Tags (number). Click Add in the Speed Dials section to add a speed dial set.
When you click Add, you select one or more previously created speed dial sets from a pick list of available speed dials. Click Apply to add the speed dial(s) to your bridge.
To remove a speed dial set from the bridge, click Delete (a trash can icon) to remove the speed dial entry.
You can filter speed dials by clicking Filter and typing the name of a speed dial name. This is a powerful feature, allowing you to type a part of a speed dial to limit the selection criteria.
You can sort the columns in Speed Dials by clicking the arrows to the right of the column label. After the first click, you should see a descending list result, items sorted from 0 – 9, A to Z. Click the arrow to change the ascending sort to a descending sort, Z – A, 9 – 0. You do the same on the other columns where ascending is the number 0 to the letter Z, and descending is from the letter Z to the number 0.
Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right, or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.
The ability to filter your bridges is a handy feature as the number of bridges increase, making it much easier to locate the bridges that you need to manage.
To filter your Bridges, do the following:
In addition to the Filter feature, you can sort bridges on the Bridge Name, Devices, or Last Seen columns. To sort a column, ascending or descending, do the following:
While functionally you can delete a bridge by clicking the Delete icon, the recommended process is a two-step procedure. To delete a bridge, you do the following.
Models is a repository of all device models that are in use in your organization. The information that is populated here is a quick means to see which devices you currently have deployed and to configure features specifically to device models.
To manage models of a device type, locate the device model that you want to manage. Click on the model name. Use each of the sections to manage device model configurations as required
Model Detail displays (if available) a picture of a device in the model series. Also, displayed for your informational purposes is the current number of devices of this model, the number of approved devices of this model, and the number of unapproved models of this model.
In Device Profiles, you view existing Device Profiles assigned to the device model for use by devices connected. Columns in Device Profiles are Name, Attributes (number), and Tags (number). You Add a device profile to the Device Profiles section by clicking Add.
When you click Add, you select one or more previously configured Device Profiles from a pick list of device profiles.
To remove a Device Profile from the device model, click Delete (a trash can icon) to remove the device profile.
You can filter device profiles by clicking Filter and typing the name of a device profile or attributes used in the device profile. This is a powerful feature, allowing you type a part of a device profile or the entire device profile.
You can sort the columns in Device Profiles by clicking the arrows to the right of the column label. After the first click, you should see a descending list result, items sorted from 0 – 9, A to Z. Click the arrow to change the ascending sort to a descending sort, Z – A, 9 – 0. You do the same on the other columns where ascending is the number 0 to the letter Z, and descending is from the letter Z to the number 0.
Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right, or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.
The software section of the device model configuration assigns software to the device model for provisioning. Columns in Software are Name, Version and File Size. Click Add in the Software section to add a software package.
When you click Add, you select one or more previously uploaded software packages from a pick list of available software packages. Click Apply to add the software packages to your device model.
To remove a software package from the device model, click Delete (a trash can icon) to remove the software package.
You can filter software by clicking Filter and typing the name of a software package, version or file size of the software package. This is a powerful feature, allowing you to determine which software package is a given version or size. You can type a part of package name or version to limit the selection criteria.
You can sort the columns in Software by clicking the arrows to the right of the column label. After the first click, you should see a descending list result, items sorted from 0 – 9, A to Z. Click the arrow to change the ascending sort to a descending sort, Z – A, 9 – 0. You do the same on the other columns where ascending is the number 0 to the letter Z, and descending is from the letter Z to the number 0.
Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right, or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.
The speed dials section of the device model configuration assigns speed dials to the bridge for provisioning. Columns in Speed Dials are Name, Entries (number), and Tags (number). Click Add in the Speed Dials section to add a speed dial set.
When you click Add, you select one or more previously created speed dial sets from a pick list of available speed dials. Click Apply to add the speed dial(s) to your bridge.
To remove a speed dial set from the device model, click Delete (a trash can icon) to remove the speed dials.
You can filter software by clicking Filter and typing the name of a speed dial. This is a powerful feature, allowing you to type a part of speed dial name to limit the selection criteria.
You can sort the columns in Speed Dials by clicking the arrows to the right of the column label. After the first click, you should see a descending list result, items sorted from 0 – 9, A to Z. Click the arrow to change the ascending sort to a descending sort, Z – A, 9 – 0. You do the same on the other columns where ascending is the number 0 to the letter Z, and descending is from the letter Z to the number 0.
Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right, or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.
The ability to filter your models is a handy feature as the number of bridges increase, making it much easier to locate the bridges that you need to manage.
To filter your Bridges, do the following:
Tip! If you are looking for a device model that contains a given string, start typing the string. For example, to find all model that contains the string 'VVX', type VVX in the text box.
It's important to understand that if you type '5' the filter will find 5 for any string in the device model. The filter also returns device models that contain 5, such as 15, 510, or any string that contains '5'.
In addition to the Filter feature, you can sort device models on the Name or Devices (number) columns. To sort a column, ascending or descending, do the following:
Devices is very different from Models where each device is a unique physical phone. And a Model represents a distinct model of a phone that a vendor might create thousands of devices in a model.
Devices are listed by the following columns:
Bridges communicate to EZ UDM Pro information about devices that have connected. At the device level, EZ UDM Pro reveals which bridge a given device is connected to. The columns that are available for devices connected to a bridge:
Logs that the device makes available to EZ UDM Pro through the bridge. This section is populated only if files are available.
If logs are available, you can do the following.
Configuration or other files (codecs, for example) that are specific to a unique set of devices. This section will be empty unless there are files for these devices for the device you are viewing.
There are three actions that you can perform on your devices.
Devices features the ability to select multiple devices by selecting the checkbox to the left of the MAC address, or you can select all devices by selecting the checkbox to the left of the MAC Address column label.
When you have selected the devices that you want to act on, you choose to Delete the selected devices, or export the details to a CSV file, or download device log files.
Note! Download of log files only appears if there are log files available on the device or a device(s) in your multi-selection. The file that contains the log files is downloaded to your computer as a compressed .zip format file named as the MAC address of the device that the logs were retrieved from.
Unapproved devices are devices that have registered with a bridge, the bridge has notified EZ UDM Pro of the registration, but the administrator has not yet approved the device to do anything more than simply register. Consider that the process of registering is asking permission to use the totality of services that the bridge and EZ UDM Pro can offer.
Unapproved devices display the same type of information that an approved device would show.
Unapproved Devices are listed by the following columns:
One item that is unique to unapproved devices that is not on proper devices is the action Approve. Approving a device is acknowledging that you know what the device is, where it is and that it is a known part of your phone infrastructure
Caution! Never approve devices that you do not know. The stance that you should take is that you cannot know if the you are approving is, in fact, a device that you trust. It might be a rogue phone (or a program emulating a phone) that someone has attached to your network. Approving the device might give the person the ability to improperly use your phone system for a wide variety of purposes that violate your policies, such as toll theft to mention only one.
As always, there are exceptions to rules. Many environments use safeguards that are network-based. For example, the act of plugging in a phone without allowing communication beyond a network device (typically a switch) prevents the type of abuse vector that approval in EZ UDM Pro is designed to prevent. In these cases, use of a feature in EZ UDM Pro and common to phone provisioning, zero-touch approval (ZTA) is an option that reduces the administrative effort of manually approving new devices by allowing the system to accept and approve new devices automatically.
Security is a critical part of any system. Device management for your phone system is no different.
EZ UDM Pro uses two roles, admin or administrator, and Auditor. Additionally, there is a default account, admin. We recommend that the admin account only used for initial setup and if other administrative accounts cannot log in. Create unique accounts for each user that will administer the system and assign the users the admin role.
Admin Account – The admin account is a hard-coded account with full permissions to the entire system. The admin account should be used for setup of the system and if all other accounts are otherwise unable to access the system. The reasoning is that you cannot audit who is doing what to your system if all users that administrate it are using the admin account.
Admin Role – Creating an account for a person that will administrate your system should have a unique account for that person with the admin role assigned. This will allow all actions to be tracked if there are potential issues, and you need to understand what happened from the person that may have seen the issue occur.
Auditor Role The Auditor role seems to have disappeared? Or can there only be one auditor? And, even though the JWeaver account is listed as an auditor, the option is not available on that user account, either. Nor do I have any current guidance on the AUDITOR role– The auditor role is a role that allows someone who will monitor the system and forensically investigate issues, but not be able to change settings. Essentially, this role when assigned to a user account allows the user a read-only login capability. This role is a good fit for a person in your Information Security area or compliance.
To create a user and assign the user a role, do the following.
To change the password of your account or of another user, you do the following.
Settings in EZ UDM Pro include Bridge Management Settings, implementing the option to enable Zero Touch Registration (ZTR). Zero Touch Registration gives you the option to either enable or disable EZ UDM Pro to allow a bridge to register with no manual intervention. But, before a bridge can provision devices, you must approve the bridge for provisioning.
See the Bridges section in this guide for how you approve a bridge.
Additionally, there is a Device Management Settings feature Zero Touch Approval (ZTA) allowing the option to enable or disable the ability to for automatic approval and provisioning of devices. If this setting is enabled, the administrator does not need to approve each device that registers with EZ UDM Pro before it can request registration and provisioning.
To enable or disable Zero Touch Registration (ZTR), do the following.
Note! By default, this period is five (5) days. If the Last Seen Time of the bridge exceed five days, the bridge is unregistered. If the bridge communicates with EZ UDM Pro after the threshold has been exceeded, it will need to re-register and be approved.
To enable or disable Zero Touch Approval (ZTA), do the following.
Caution! Logs, while not huge for a single device, can become very large with hundreds to thousands of devices. Typically, there are two logs per device – a boot log and application (app) log. These logs, based on the activity of the device, can be as small as 1k and up. Given that these are a per-device log, if you have thousands of devices the storage requirements could get out of control quickly if not controlled by an automatic pruning setting such as Log Retention Period.
Noted earlier in the Overview section, your logged in user control is at the very top of the sidebar. From here, you can logout of your current session of EZ UDM Pro by clicking the Logout option.
Polycom publishes all technical documentation and software here:
http://support.polycom.com/PolycomService/support/us/support/voice/index.html
Sample links for common software guides:
Polycom RealPresence Trio Administrators Guide
Polycom UC Software 5.5.0