Information | Comments | Example | Status |
Hypervisor host Access to hypervisor: - IP address
- login data of administrator / root or specific account
| Only reqired, if VMs are to be configured. | 1.1.1.1 root / secret |
|
Hypervisor type The type of the hypervisor used is needed if the tools are not pre-installed. | Part of the standard installation is to install tools for Hyper-V or VMWare If the hypervisor is neither of these, the tools must be installed by the customer. | HyperV / VMWare |
|
Network For the subnet(s) of the virtual machines: - IP range
- Netmask
- Default gateway
- Domain suffix
|
| Network: 192.168.1.0 Netmask: 255.255.255.0 Gateway: 192.168.1.254 Domain Suffix: example.com |
|
Naming convention The required naming convention for the virtual machines. | Only reqired, if VMs are to be configured. | acd-dbm.example.com acd-jb1.example.com acd-tel1.example.com |
|
DNS Servers The addresses of the DNS servers used in the network are required. |
| 192.168.1.254 |
|
Time server The IP address of at least one reliable time server. If not available, is a reliable time server accessible via customer firewall by NTP? | A reliable NTP time server must be available for the installation. Windows domain controllers are not always reliable NTP sources. | ptbtime1.ptb.de ptbtime2.ptb.de ptbtime3.ptb.de |
|
CentOS Root Login The root user and password is required for the CentOS servers. | If the root user is not supplied, the supplied user account must be able to execute commands with sudo and change to root with sudo -s. | User: root Password: secret |
|
Windows Login An AD domain user or a local user is required for the Windows Server(s). | This user must have local administrator rights to the machine. | User: administrator Password: secret |
|
Internet connection Available from the VMs directly or proxy server settings. | The installation cannot be performed without internet access. If a proxy is required to access the internet, the proxy server address, port, user and password is required. | Proxy Server: proxy.example.com:8080 |
|
Windows updates All windows updates should be performed on the windows server before handover. | The customer is responsible for updating the windows operating system. |
|
|
Virus scanners Not all virus scanners are good news. The jtel system is a real-time communication system - and some virus scanners are very intrusive indeed (or just plain and simply badly configured) and can have a serious impact on system performance. | It is solely the customer's responsibility for deploying an adequate virus scanner. |
|
|
External file share The file share used by the system can be external and provided, for example, by a high availability storage system. If this is to be external, an SMB file share is required and the following information: | Note, because Windows machines will inevitably use the logged in user and password when accessing the share, this is recommended to be the same as the username and password used on the windows machine(s). This is required to be so if the applications on the windows machine are to be configured as windows services. | User: jtelacd Password: secret |
|
Firewall and Routing All of the machines for the ACD installation will be installed with a firewall, and the necessary ports opened for communication between the machines. An additional firewall between the servers of the ACD is not recommended. A firewall between the PBX and the ACD must be correctly configured to allow SIP / RTP and the PBX connector from the jtel system to access the PBX. | A firewall between the servers is not recommended, better as a standalone solution in it's own subnet with a firewall covering access to the load balancer by http(s) for accessing the webservers. A firewall between the PBX and the ACD is not recommended. A proxy between the PBX and the ACD (for accessing the PBX connector) is definately not recommended and may cause serious problems with operation (timeouts and other errors). |
|
|
Web Access If a certificate is required (i.e. the portal should be accessed via https) then a certificate is to be provided before installation. The certificate must be provided in .pem Format including the following: - Certificate for server
- Intermediate CA certificate (chain)
- Private Key
|
|
|
|