<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://wiki.ipbrick.com/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.ipbrick.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ipbwikiadmin</id>
		<title>wiki.IPBRICK.COM - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.ipbrick.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ipbwikiadmin"/>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Special:Contributions/Ipbwikiadmin"/>
		<updated>2026-05-13T13:10:46Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.23.2</generator>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2018-12-04T16:46:06Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: srv001.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 85.86.87.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
srv001.domain.com.            IN A     85.86.87.88&lt;br /&gt;
voip.domain.com.              IN A     85.86.87.88&lt;br /&gt;
webrtc.domain.com.            IN A     85.86.87.88&lt;br /&gt;
cafe.domain.com.              IN A     85.86.87.88&lt;br /&gt;
ucoip.domain.com.             IN A     85.86.87.88&lt;br /&gt;
im.domain.com.                IN A     85.86.87.88&lt;br /&gt;
iportaldoc.domain.com.        IN A     85.86.87.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
contacts.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
jwchat.domain.com.             IN CNAME   srv001.domain.com.&lt;br /&gt;
light.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webphone.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
groupware.domain.com.	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webmail.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webrtcproxy.domain.com.        IN CNAME   srv001.domain.com.&lt;br /&gt;
autoconfig.domain.com.         IN CNAME   srv001.domain.com.&lt;br /&gt;
autodiscover.domain.com.       IN CNAME   srv001.domain.com.&lt;br /&gt;
*.domain.com.                  IN CNAME   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.       IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com.  IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com.  IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.        IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.         IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.       IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com.         IN MX       5     srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPF - Sender Policy Framework&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com          IN TXT      &amp;quot;v=spf1 mx ip4:85.86.87.88 -all&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 88.87.86.85.in-addr.arpa.     IN PTR      srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP           - 80 TCP&lt;br /&gt;
HTTPS          - 443 TCP&lt;br /&gt;
SMTP           - 25 TCP&lt;br /&gt;
SIP            - 5060 UDP/TCP&lt;br /&gt;
SIPS           - 5061 TCP&lt;br /&gt;
RTP            - 40000:45000 UDP&lt;br /&gt;
RTP            - 50000:55000 UDP&lt;br /&gt;
RTP            - 60000:65000 UDP&lt;br /&gt;
XMPP-client    - 5222 TCP&lt;br /&gt;
XMPP-server    - 5269 TCP&lt;br /&gt;
XMPPS          - 5223 TCP&lt;br /&gt;
WebRTC         - 8888 TCP&lt;br /&gt;
Webphone       - 10060 UDP/TCP&lt;br /&gt;
Webphone       - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's mandatory ensure that IPBrick can access the local addresses, so coud be necessary configure the DNS hosts.&lt;br /&gt;
&lt;br /&gt;
If IPBrick public interface '''is behind a NAT''' and:&lt;br /&gt;
&lt;br /&gt;
''- IPBrick have 2 network interfaces (ETH0 and ETH1) configured with private IPs''&lt;br /&gt;
&lt;br /&gt;
''- The communication between IPBrick and the router is done by ETH1&lt;br /&gt;
&lt;br /&gt;
''- Public IP is on the router&lt;br /&gt;
&lt;br /&gt;
''- Public DNS zone configured in IPBrick and all registers are resolved to public IP''&lt;br /&gt;
&lt;br /&gt;
''- IPBrick resolves local addresses in your local DNS (public zone)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then, requests made from IPBRICK to any of their addresses are always going to be routed to the public IP. &lt;br /&gt;
&lt;br /&gt;
As these orders leave and re-enter, they are blocked, so you need configure the IPBrick DNS hosts to '''resolve the local addresses to the internal IP'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On IPBrick interface (&amp;quot;DNS -&amp;gt; Name Resolution -&amp;gt; Local names resolution&amp;quot;) add the following entries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
   - cafe.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - contacts.&amp;lt;domain&amp;gt;   -&amp;gt;   Internal IP&lt;br /&gt;
   - groupware.&amp;lt;domain&amp;gt;  -&amp;gt;   Internal IP&lt;br /&gt;
   - im.&amp;lt;domain&amp;gt;         -&amp;gt;   Internal IP&lt;br /&gt;
   - iportaldoc.&amp;lt;domain&amp;gt; -&amp;gt;   Internal IP&lt;br /&gt;
   - ucoip.&amp;lt;domain&amp;gt;      -&amp;gt;   Internal IP&lt;br /&gt;
   - voip.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - webrtc.&amp;lt;domain&amp;gt;     -&amp;gt;   Internal IP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://eshop.ipbrick.com/eshop/software_info.php?cPath=7_74_16&amp;amp;products_id=907&amp;amp;language=en Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2018-11-12T16:05:55Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: srv001.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 85.86.87.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
srv001.domain.com.            IN A     85.86.87.88&lt;br /&gt;
voip.domain.com.              IN A     85.86.87.88&lt;br /&gt;
webrtc.domain.com.            IN A     85.86.87.88&lt;br /&gt;
cafe.domain.com.              IN A     85.86.87.88&lt;br /&gt;
ucoip.domain.com.             IN A     85.86.87.88&lt;br /&gt;
im.domain.com.                IN A     85.86.87.88&lt;br /&gt;
iportaldoc.domain.com.        IN A     85.86.87.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
contacts.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
jwchat.domain.com.             IN CNAME   srv001.domain.com.&lt;br /&gt;
light.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webphone.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
groupware.domain.com.	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webmail.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webrtcproxy.domain.com.        IN CNAME   srv001.domain.com.&lt;br /&gt;
autoconfig.domain.com.         IN CNAME   srv001.domain.com.&lt;br /&gt;
autodiscover.domain.com.       IN CNAME   srv001.domain.com.&lt;br /&gt;
*.domain.com.                  IN CNAME   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.       IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com.  IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com.  IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.        IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.         IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.       IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com.         IN MX       5     srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPF - Sender Policy Framework&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com          IN TXT      &amp;quot;v=spf1 mx ip4:85.86.87.88 -all&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 88.87.86.85.in-addr.arpa.     IN PTR      srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP           - 80 TCP&lt;br /&gt;
HTTPS          - 443 TCP&lt;br /&gt;
SMTP           - 25 TCP&lt;br /&gt;
SIP            - 5060 UDP/TCP&lt;br /&gt;
SIPS           - 5061 TCP&lt;br /&gt;
RTP            - 40000:45000 UDP&lt;br /&gt;
RTP            - 50000:55000 UDP&lt;br /&gt;
RTP            - 60000:65000 UDP&lt;br /&gt;
XMPP-client    - 5222 TCP&lt;br /&gt;
XMPP-server    - 5269 TCP&lt;br /&gt;
XMPPS          - 5223 TCP&lt;br /&gt;
WebRTC         - 8888 TCP&lt;br /&gt;
Webphone       - 10060 UDP/TCP&lt;br /&gt;
Webphone       - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's mandatory ensure that IPBrick can access the local addresses, so coud be necessary configure the DNS hosts.&lt;br /&gt;
&lt;br /&gt;
If IPBrick public interface '''is behind a NAT''' and:&lt;br /&gt;
&lt;br /&gt;
''- IPBrick have 2 network interfaces (ETH0 and ETH1) configured with private IPs''&lt;br /&gt;
&lt;br /&gt;
''- The communication between IPBrick and the router is done by ETH1&lt;br /&gt;
&lt;br /&gt;
''- Public IP is on the router&lt;br /&gt;
&lt;br /&gt;
''- Public DNS zone configured in IPBrick and all registers are resolved to public IP''&lt;br /&gt;
&lt;br /&gt;
''- IPBrick resolves local addresses in your local DNS (public zone)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then, orders made from IPBRICK to any of their addresses are always going to be routed to the public IP. &lt;br /&gt;
&lt;br /&gt;
As these orders leave and re-enter, they are blocked, so you need configure the IPBrick DNS hosts to '''resolve the local addresses to the internal IP'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On IPBrick interface (&amp;quot;DNS -&amp;gt; Name Resolution -&amp;gt; Local names resolution&amp;quot;) add the following entries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
   - cafe.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - contacts.&amp;lt;domain&amp;gt;   -&amp;gt;   Internal IP&lt;br /&gt;
   - groupware.&amp;lt;domain&amp;gt;  -&amp;gt;   Internal IP&lt;br /&gt;
   - im.&amp;lt;domain&amp;gt;         -&amp;gt;   Internal IP&lt;br /&gt;
   - iportaldoc.&amp;lt;domain&amp;gt; -&amp;gt;   Internal IP&lt;br /&gt;
   - ucoip.&amp;lt;domain&amp;gt;      -&amp;gt;   Internal IP&lt;br /&gt;
   - voip.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - webrtc.&amp;lt;domain&amp;gt;     -&amp;gt;   Internal IP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://eshop.ipbrick.com/eshop/software_info.php?cPath=7_74_16&amp;amp;products_id=907&amp;amp;language=en Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2018-11-12T16:02:25Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: srv001.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 85.86.87.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
srv001.domain.com.            IN A     85.86.87.88&lt;br /&gt;
voip.domain.com.              IN A     85.86.87.88&lt;br /&gt;
webrtc.domain.com.            IN A     85.86.87.88&lt;br /&gt;
cafe.domain.com.              IN A     85.86.87.88&lt;br /&gt;
ucoip.domain.com.             IN A     85.86.87.88&lt;br /&gt;
im.domain.com.                IN A     85.86.87.88&lt;br /&gt;
iportaldoc.domain.com.        IN A     85.86.87.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
contacts.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
jwchat.domain.com.             IN CNAME   srv001.domain.com.&lt;br /&gt;
light.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webphone.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
groupware.domain.com.	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webmail.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webrtcproxy.domain.com.        IN CNAME   srv001.domain.com.&lt;br /&gt;
autoconfig.domain.com.         IN CNAME   srv001.domain.com.&lt;br /&gt;
autodiscover.domain.com.       IN CNAME   srv001.domain.com.&lt;br /&gt;
*.domain.com.                  IN CNAME   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.       IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com.  IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com.  IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.        IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.         IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.       IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com.         IN MX       5     srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPF - Sender Policy Framework&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com          IN TXT      &amp;quot;v=spf1 mx ip4:85.86.87.88 -all&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 88.87.86.85.in-addr.arpa.     IN PTR      srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP           - 80 TCP&lt;br /&gt;
HTTPS          - 443 TCP&lt;br /&gt;
SMTP           - 25 TCP&lt;br /&gt;
SIP            - 5060 UDP/TCP&lt;br /&gt;
SIPS           - 5061 TCP&lt;br /&gt;
RTP            - 40000:45000 UDP&lt;br /&gt;
RTP            - 50000:55000 UDP&lt;br /&gt;
RTP            - 60000:65000 UDP&lt;br /&gt;
XMPP-client    - 5222 TCP&lt;br /&gt;
XMPP-server    - 5269 TCP&lt;br /&gt;
XMPPS          - 5223 TCP&lt;br /&gt;
WebRTC         - 8888 TCP&lt;br /&gt;
Webphone       - 10060 UDP/TCP&lt;br /&gt;
Webphone       - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's mandatory ensure that IPBrick can access the local addresses, so coud be necessary configure the DNS hosts.&lt;br /&gt;
&lt;br /&gt;
If IPBrick public interface '''is behind a NAT''' and:&lt;br /&gt;
&lt;br /&gt;
''- IPBrick have 2 network interfaces (ETH0 and ETH1) configured with private IPs''&lt;br /&gt;
&lt;br /&gt;
''- The communication between IPBrick and the router is done by ETH1&lt;br /&gt;
&lt;br /&gt;
''- Public IP is on the router&lt;br /&gt;
&lt;br /&gt;
''- Public DNS zone configured in IPBrick and all registers are resolved to public IP''&lt;br /&gt;
&lt;br /&gt;
''- IPBrick resolves local addresses in your local DNS (public zone)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then, orders made from IPBRICK to any of their addresses are always going to be routed to the public IP. As these orders come out and re-enter, they are blocked, so you need configure the DNS hosts to '''resolve the local addresses to the internal IP'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On IPBrick interface (&amp;quot;DNS -&amp;gt; Name Resolution -&amp;gt; Local names resolution&amp;quot;) add the following entries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
   - cafe.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - contacts.&amp;lt;domain&amp;gt;   -&amp;gt;   Internal IP&lt;br /&gt;
   - groupware.&amp;lt;domain&amp;gt;  -&amp;gt;   Internal IP&lt;br /&gt;
   - im.&amp;lt;domain&amp;gt;         -&amp;gt;   Internal IP&lt;br /&gt;
   - iportaldoc.&amp;lt;domain&amp;gt; -&amp;gt;   Internal IP&lt;br /&gt;
   - ucoip.&amp;lt;domain&amp;gt;      -&amp;gt;   Internal IP&lt;br /&gt;
   - voip.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - webrtc.&amp;lt;domain&amp;gt;     -&amp;gt;   Internal IP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://eshop.ipbrick.com/eshop/software_info.php?cPath=7_74_16&amp;amp;products_id=907&amp;amp;language=en Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2018-11-12T16:01:52Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: srv001.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 85.86.87.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
srv001.domain.com.            IN A     85.86.87.88&lt;br /&gt;
voip.domain.com.              IN A     85.86.87.88&lt;br /&gt;
webrtc.domain.com.            IN A     85.86.87.88&lt;br /&gt;
cafe.domain.com.              IN A     85.86.87.88&lt;br /&gt;
ucoip.domain.com.             IN A     85.86.87.88&lt;br /&gt;
im.domain.com.                IN A     85.86.87.88&lt;br /&gt;
iportaldoc.domain.com.        IN A     85.86.87.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
contacts.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
jwchat.domain.com.             IN CNAME   srv001.domain.com.&lt;br /&gt;
light.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webphone.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
groupware.domain.com.	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webmail.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webrtcproxy.domain.com.        IN CNAME   srv001.domain.com.&lt;br /&gt;
autoconfig.domain.com.         IN CNAME   srv001.domain.com.&lt;br /&gt;
autodiscover.domain.com.       IN CNAME   srv001.domain.com.&lt;br /&gt;
*.domain.com.                  IN CNAME   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.       IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com.  IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com.  IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.        IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.         IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.       IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com.         IN MX       5     srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPF - Sender Policy Framework&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com          IN TXT      &amp;quot;v=spf1 mx ip4:85.86.87.88 -all&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 88.87.86.85.in-addr.arpa.     IN PTR      srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP           - 80 TCP&lt;br /&gt;
HTTPS          - 443 TCP&lt;br /&gt;
SMTP           - 25 TCP&lt;br /&gt;
SIP            - 5060 UDP/TCP&lt;br /&gt;
SIPS           - 5061 TCP&lt;br /&gt;
RTP            - 40000:45000 UDP&lt;br /&gt;
RTP            - 50000:55000 UDP&lt;br /&gt;
RTP            - 60000:65000 UDP&lt;br /&gt;
XMPP-client    - 5222 TCP&lt;br /&gt;
XMPP-server    - 5269 TCP&lt;br /&gt;
XMPPS          - 5223 TCP&lt;br /&gt;
WebRTC         - 8888 TCP&lt;br /&gt;
Webphone       - 10060 UDP/TCP&lt;br /&gt;
Webphone       - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's mandatory ensure that IPBrick can access the local addresses, so coud be necessary configure the DNS hosts.&lt;br /&gt;
&lt;br /&gt;
If IPBrick public interface '''is behind a NAT''' and:&lt;br /&gt;
&lt;br /&gt;
''- IPBrick have 2 network interfaces (ETH0 and ETH1) configured with private IPs''&lt;br /&gt;
&lt;br /&gt;
''- The communication between IPBrick and the router is done by eth1&lt;br /&gt;
&lt;br /&gt;
''- Public IP is on the router&lt;br /&gt;
&lt;br /&gt;
''- Public DNS zone configured in IPBrick and all registers are resolved to public IP''&lt;br /&gt;
&lt;br /&gt;
''- IPBrick resolves local addresses in your local DNS (public zone)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then, orders made from IPBRICK to any of their addresses are always going to be routed to the public IP. As these orders come out and re-enter, they are blocked, so you need configure the DNS hosts to '''resolve the local addresses to the internal IP'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On IPBrick interface (&amp;quot;DNS -&amp;gt; Name Resolution -&amp;gt; Local names resolution&amp;quot;) add the following entries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
   - cafe.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - contacts.&amp;lt;domain&amp;gt;   -&amp;gt;   Internal IP&lt;br /&gt;
   - groupware.&amp;lt;domain&amp;gt;  -&amp;gt;   Internal IP&lt;br /&gt;
   - im.&amp;lt;domain&amp;gt;         -&amp;gt;   Internal IP&lt;br /&gt;
   - iportaldoc.&amp;lt;domain&amp;gt; -&amp;gt;   Internal IP&lt;br /&gt;
   - ucoip.&amp;lt;domain&amp;gt;      -&amp;gt;   Internal IP&lt;br /&gt;
   - voip.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - webrtc.&amp;lt;domain&amp;gt;     -&amp;gt;   Internal IP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://eshop.ipbrick.com/eshop/software_info.php?cPath=7_74_16&amp;amp;products_id=907&amp;amp;language=en Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2018-11-12T16:01:11Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: srv001.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 85.86.87.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
srv001.domain.com.            IN A     85.86.87.88&lt;br /&gt;
voip.domain.com.              IN A     85.86.87.88&lt;br /&gt;
webrtc.domain.com.            IN A     85.86.87.88&lt;br /&gt;
cafe.domain.com.              IN A     85.86.87.88&lt;br /&gt;
ucoip.domain.com.             IN A     85.86.87.88&lt;br /&gt;
im.domain.com.                IN A     85.86.87.88&lt;br /&gt;
iportaldoc.domain.com.        IN A     85.86.87.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
contacts.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
jwchat.domain.com.             IN CNAME   srv001.domain.com.&lt;br /&gt;
light.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webphone.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
groupware.domain.com.	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webmail.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webrtcproxy.domain.com.        IN CNAME   srv001.domain.com.&lt;br /&gt;
autoconfig.domain.com.         IN CNAME   srv001.domain.com.&lt;br /&gt;
autodiscover.domain.com.       IN CNAME   srv001.domain.com.&lt;br /&gt;
*.domain.com.                  IN CNAME   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.       IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com.  IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com.  IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.        IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.         IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.       IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com.         IN MX       5     srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPF - Sender Policy Framework&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com          IN TXT      &amp;quot;v=spf1 mx ip4:85.86.87.88 -all&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 88.87.86.85.in-addr.arpa.     IN PTR      srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP           - 80 TCP&lt;br /&gt;
HTTPS          - 443 TCP&lt;br /&gt;
SMTP           - 25 TCP&lt;br /&gt;
SIP            - 5060 UDP/TCP&lt;br /&gt;
SIPS           - 5061 TCP&lt;br /&gt;
RTP            - 40000:45000 UDP&lt;br /&gt;
RTP            - 50000:55000 UDP&lt;br /&gt;
RTP            - 60000:65000 UDP&lt;br /&gt;
XMPP-client    - 5222 TCP&lt;br /&gt;
XMPP-server    - 5269 TCP&lt;br /&gt;
XMPPS          - 5223 TCP&lt;br /&gt;
WebRTC         - 8888 TCP&lt;br /&gt;
Webphone       - 10060 UDP/TCP&lt;br /&gt;
Webphone       - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's mandatory ensure that IPBrick can access the local addresses, so coud be necessary configure the DNS hosts.&lt;br /&gt;
&lt;br /&gt;
If IPBrick public interface '''is behind a NAT''':&lt;br /&gt;
&lt;br /&gt;
''- IPBrick have 2 network interfaces (ETH0 and ETH1) configured with private IPs''&lt;br /&gt;
&lt;br /&gt;
''- The communication between IPBrick and the router is done by eth1&lt;br /&gt;
&lt;br /&gt;
''- Public IP is on the router&lt;br /&gt;
&lt;br /&gt;
''- Public DNS zone configured in IPBrick and all registers are resolved to public IP''&lt;br /&gt;
&lt;br /&gt;
''- IPBrick resolves local addresses in your local DNS (public zone)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then, orders made from IPBRICK to any of their addresses are always going to be routed to the public IP. As these orders come out and re-enter, they are blocked, so you need configure the DNS hosts to '''resolve the local addresses to the internal IP'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On IPBrick interface (&amp;quot;DNS -&amp;gt; Name Resolution -&amp;gt; Local names resolution&amp;quot;) add the following entries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
   - cafe.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - contacts.&amp;lt;domain&amp;gt;   -&amp;gt;   Internal IP&lt;br /&gt;
   - groupware.&amp;lt;domain&amp;gt;  -&amp;gt;   Internal IP&lt;br /&gt;
   - im.&amp;lt;domain&amp;gt;         -&amp;gt;   Internal IP&lt;br /&gt;
   - iportaldoc.&amp;lt;domain&amp;gt; -&amp;gt;   Internal IP&lt;br /&gt;
   - ucoip.&amp;lt;domain&amp;gt;      -&amp;gt;   Internal IP&lt;br /&gt;
   - voip.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - webrtc.&amp;lt;domain&amp;gt;     -&amp;gt;   Internal IP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://eshop.ipbrick.com/eshop/software_info.php?cPath=7_74_16&amp;amp;products_id=907&amp;amp;language=en Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2018-11-12T10:26:56Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: srv001.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 85.86.87.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
srv001.domain.com.            IN A     85.86.87.88&lt;br /&gt;
voip.domain.com.              IN A     85.86.87.88&lt;br /&gt;
webrtc.domain.com.            IN A     85.86.87.88&lt;br /&gt;
cafe.domain.com.              IN A     85.86.87.88&lt;br /&gt;
ucoip.domain.com.             IN A     85.86.87.88&lt;br /&gt;
im.domain.com.                IN A     85.86.87.88&lt;br /&gt;
iportaldoc.domain.com.        IN A     85.86.87.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
contacts.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
jwchat.domain.com.             IN CNAME   srv001.domain.com.&lt;br /&gt;
light.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webphone.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
groupware.domain.com.	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webmail.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webrtcproxy.domain.com.        IN CNAME   srv001.domain.com.&lt;br /&gt;
autoconfig.domain.com.         IN CNAME   srv001.domain.com.&lt;br /&gt;
autodiscover.domain.com.       IN CNAME   srv001.domain.com.&lt;br /&gt;
*.domain.com.                  IN CNAME   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.       IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com.  IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com.  IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.        IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.         IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.       IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com.         IN MX       5     srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPF - Sender Policy Framework&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com          IN TXT      &amp;quot;v=spf1 mx ip4:85.86.87.88 -all&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 88.87.86.85.in-addr.arpa.     IN PTR      srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP           - 80 TCP&lt;br /&gt;
HTTPS          - 443 TCP&lt;br /&gt;
SMTP           - 25 TCP&lt;br /&gt;
SIP            - 5060 UDP/TCP&lt;br /&gt;
SIPS           - 5061 TCP&lt;br /&gt;
RTP            - 40000:45000 UDP&lt;br /&gt;
RTP            - 50000:55000 UDP&lt;br /&gt;
RTP            - 60000:65000 UDP&lt;br /&gt;
XMPP-client    - 5222 TCP&lt;br /&gt;
XMPP-server    - 5269 TCP&lt;br /&gt;
XMPPS          - 5223 TCP&lt;br /&gt;
WebRTC         - 8888 TCP&lt;br /&gt;
Webphone       - 10060 UDP/TCP&lt;br /&gt;
Webphone       - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is also necessary ensure that IPBrick can access the local addresses, so if:&lt;br /&gt;
&lt;br /&gt;
''- IPBrick public interface '''is behind a NAT''' and eth1 it's a private IP''&lt;br /&gt;
&lt;br /&gt;
''- IPBrick resolves local addresses to public IP''&lt;br /&gt;
&lt;br /&gt;
''- IPBrick requests for local addresses are being blocked''&lt;br /&gt;
&lt;br /&gt;
you need configure the DNS hosts to '''resolve the local addresses to the internal IP'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On IPBrick interface (&amp;quot;DNS -&amp;gt; Name Resolution -&amp;gt; Local names resolution&amp;quot;) add the following entries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
   - cafe.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - contacts.&amp;lt;domain&amp;gt;   -&amp;gt;   Internal IP&lt;br /&gt;
   - groupware.&amp;lt;domain&amp;gt;  -&amp;gt;   Internal IP&lt;br /&gt;
   - im.&amp;lt;domain&amp;gt;         -&amp;gt;   Internal IP&lt;br /&gt;
   - iportaldoc.&amp;lt;domain&amp;gt; -&amp;gt;   Internal IP&lt;br /&gt;
   - ucoip.&amp;lt;domain&amp;gt;      -&amp;gt;   Internal IP&lt;br /&gt;
   - voip.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - webrtc.&amp;lt;domain&amp;gt;     -&amp;gt;   Internal IP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://eshop.ipbrick.com/eshop/software_info.php?cPath=7_74_16&amp;amp;products_id=907&amp;amp;language=en Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2018-11-09T18:19:25Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: srv001.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 85.86.87.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
srv001.domain.com.            IN A     85.86.87.88&lt;br /&gt;
voip.domain.com.              IN A     85.86.87.88&lt;br /&gt;
webrtc.domain.com.            IN A     85.86.87.88&lt;br /&gt;
cafe.domain.com.              IN A     85.86.87.88&lt;br /&gt;
ucoip.domain.com.             IN A     85.86.87.88&lt;br /&gt;
im.domain.com.                IN A     85.86.87.88&lt;br /&gt;
iportaldoc.domain.com.        IN A     85.86.87.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
contacts.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
jwchat.domain.com.             IN CNAME   srv001.domain.com.&lt;br /&gt;
light.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webphone.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
groupware.domain.com.	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webmail.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webrtcproxy.domain.com.        IN CNAME   srv001.domain.com.&lt;br /&gt;
autoconfig.domain.com.         IN CNAME   srv001.domain.com.&lt;br /&gt;
autodiscover.domain.com.       IN CNAME   srv001.domain.com.&lt;br /&gt;
*.domain.com.                  IN CNAME   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.       IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com.  IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com.  IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.        IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.         IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.       IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com.         IN MX       5     srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPF - Sender Policy Framework&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com          IN TXT      &amp;quot;v=spf1 mx ip4:85.86.87.88 -all&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 88.87.86.85.in-addr.arpa.     IN PTR      srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP           - 80 TCP&lt;br /&gt;
HTTPS          - 443 TCP&lt;br /&gt;
SMTP           - 25 TCP&lt;br /&gt;
SIP            - 5060 UDP/TCP&lt;br /&gt;
SIPS           - 5061 TCP&lt;br /&gt;
RTP            - 40000:45000 UDP&lt;br /&gt;
RTP            - 50000:55000 UDP&lt;br /&gt;
RTP            - 60000:65000 UDP&lt;br /&gt;
XMPP-client    - 5222 TCP&lt;br /&gt;
XMPP-server    - 5269 TCP&lt;br /&gt;
XMPPS          - 5223 TCP&lt;br /&gt;
WebRTC         - 8888 TCP&lt;br /&gt;
Webphone       - 10060 UDP/TCP&lt;br /&gt;
Webphone       - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It is also necessary ensure that IPBrick can access the local addresses, so if IPBrick public interface '''is behind a NAT''' and eth1 it's a private IP, it's necessary configure the DNS hosts to resolve the local addresses to the internal IP.&lt;br /&gt;
&lt;br /&gt;
On IPBrick interface (&amp;quot;DNS -&amp;gt; Name Resolution&amp;quot;) add the following entries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
   - cafe.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - contacts.&amp;lt;domain&amp;gt;   -&amp;gt;   Internal IP&lt;br /&gt;
   - groupware.&amp;lt;domain&amp;gt;  -&amp;gt;   Internal IP&lt;br /&gt;
   - im.&amp;lt;domain&amp;gt;         -&amp;gt;   Internal IP&lt;br /&gt;
   - iportaldoc.&amp;lt;domain&amp;gt; -&amp;gt;   Internal IP&lt;br /&gt;
   - ucoip.&amp;lt;domain&amp;gt;      -&amp;gt;   Internal IP&lt;br /&gt;
   - voip.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - webrtc.&amp;lt;domain&amp;gt;     -&amp;gt;   Internal IP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://eshop.ipbrick.com/eshop/software_info.php?cPath=7_74_16&amp;amp;products_id=907&amp;amp;language=en Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2018-11-09T17:32:28Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: srv001.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 85.86.87.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
srv001.domain.com.            IN A     85.86.87.88&lt;br /&gt;
voip.domain.com.              IN A     85.86.87.88&lt;br /&gt;
webrtc.domain.com.            IN A     85.86.87.88&lt;br /&gt;
cafe.domain.com.              IN A     85.86.87.88&lt;br /&gt;
ucoip.domain.com.             IN A     85.86.87.88&lt;br /&gt;
im.domain.com.                IN A     85.86.87.88&lt;br /&gt;
iportaldoc.domain.com.        IN A     85.86.87.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
contacts.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
jwchat.domain.com.             IN CNAME   srv001.domain.com.&lt;br /&gt;
light.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webphone.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
groupware.domain.com.	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webmail.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webrtcproxy.domain.com.        IN CNAME   srv001.domain.com.&lt;br /&gt;
autoconfig.domain.com.         IN CNAME   srv001.domain.com.&lt;br /&gt;
autodiscover.domain.com.       IN CNAME   srv001.domain.com.&lt;br /&gt;
*.domain.com.                  IN CNAME   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.       IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com.  IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com.  IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.        IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.         IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.       IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com.         IN MX       5     srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPF - Sender Policy Framework&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com          IN TXT      &amp;quot;v=spf1 mx ip4:85.86.87.88 -all&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 88.87.86.85.in-addr.arpa.     IN PTR      srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is '''behind a NAT''' at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP           - 80 TCP&lt;br /&gt;
HTTPS          - 443 TCP&lt;br /&gt;
SMTP           - 25 TCP&lt;br /&gt;
SIP            - 5060 UDP/TCP&lt;br /&gt;
SIPS           - 5061 TCP&lt;br /&gt;
RTP            - 40000:45000 UDP&lt;br /&gt;
RTP            - 50000:55000 UDP&lt;br /&gt;
RTP            - 60000:65000 UDP&lt;br /&gt;
XMPP-client    - 5222 TCP&lt;br /&gt;
XMPP-server    - 5269 TCP&lt;br /&gt;
XMPPS          - 5223 TCP&lt;br /&gt;
WebRTC         - 8888 TCP&lt;br /&gt;
Webphone       - 10060 UDP/TCP&lt;br /&gt;
Webphone       - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It is also necessary ensure that IPBrick can access the local addresses. This can be done by configuring the DNS hosts to resolve the local addresses to the internal IP.&lt;br /&gt;
&lt;br /&gt;
On IPBrick interface (&amp;quot;DNS -&amp;gt; Name Resolution&amp;quot;) add the following entries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
   - cafe.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - contacts.&amp;lt;domain&amp;gt;   -&amp;gt;   Internal IP&lt;br /&gt;
   - groupware.&amp;lt;domain&amp;gt;  -&amp;gt;   Internal IP&lt;br /&gt;
   - im.&amp;lt;domain&amp;gt;         -&amp;gt;   Internal IP&lt;br /&gt;
   - iportaldoc.&amp;lt;domain&amp;gt; -&amp;gt;   Internal IP&lt;br /&gt;
   - ucoip.&amp;lt;domain&amp;gt;      -&amp;gt;   Internal IP&lt;br /&gt;
   - voip.&amp;lt;domain&amp;gt;       -&amp;gt;   Internal IP&lt;br /&gt;
   - webrtc.&amp;lt;domain&amp;gt;     -&amp;gt;   Internal IP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://eshop.ipbrick.com/eshop/software_info.php?cPath=7_74_16&amp;amp;products_id=907&amp;amp;language=en Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2018-11-09T17:24:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: srv001.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 85.86.87.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
srv001.domain.com.            IN A     85.86.87.88&lt;br /&gt;
voip.domain.com.              IN A     85.86.87.88&lt;br /&gt;
webrtc.domain.com.            IN A     85.86.87.88&lt;br /&gt;
cafe.domain.com.              IN A     85.86.87.88&lt;br /&gt;
ucoip.domain.com.             IN A     85.86.87.88&lt;br /&gt;
im.domain.com.                IN A     85.86.87.88&lt;br /&gt;
iportaldoc.domain.com.        IN A     85.86.87.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
contacts.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
jwchat.domain.com.             IN CNAME   srv001.domain.com.&lt;br /&gt;
light.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webphone.domain.com.           IN CNAME   srv001.domain.com.&lt;br /&gt;
groupware.domain.com.	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webmail.domain.com. 	       IN CNAME   srv001.domain.com.&lt;br /&gt;
webrtcproxy.domain.com.        IN CNAME   srv001.domain.com.&lt;br /&gt;
autoconfig.domain.com.         IN CNAME   srv001.domain.com.&lt;br /&gt;
autodiscover.domain.com.       IN CNAME   srv001.domain.com.&lt;br /&gt;
*.domain.com.                  IN CNAME   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.       IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com.  IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com.  IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.        IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.         IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.       IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com.         IN MX       5     srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPF - Sender Policy Framework&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com          IN TXT      &amp;quot;v=spf1 mx ip4:85.86.87.88 -all&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 88.87.86.85.in-addr.arpa.     IN PTR      srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is '''behind a NAT''' at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP           - 80 TCP&lt;br /&gt;
HTTPS          - 443 TCP&lt;br /&gt;
SMTP           - 25 TCP&lt;br /&gt;
SIP            - 5060 UDP/TCP&lt;br /&gt;
SIPS           - 5061 TCP&lt;br /&gt;
RTP            - 40000:45000 UDP&lt;br /&gt;
RTP            - 50000:55000 UDP&lt;br /&gt;
RTP            - 60000:65000 UDP&lt;br /&gt;
XMPP-client    - 5222 TCP&lt;br /&gt;
XMPP-server    - 5269 TCP&lt;br /&gt;
XMPPS          - 5223 TCP&lt;br /&gt;
WebRTC         - 8888 TCP&lt;br /&gt;
Webphone       - 10060 UDP/TCP&lt;br /&gt;
Webphone       - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is also necessary to ensure that IPBrick resolves the local addresses for the internal IP. To do that configure &amp;quot;DNS -&amp;gt; Name Resolution&amp;quot; with the following entries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
   - cafe.&amp;lt;domain&amp;gt;       -&amp;gt;   &amp;lt;Internal IP&amp;gt;&lt;br /&gt;
   - contacts.&amp;lt;domain&amp;gt;   -&amp;gt;   &amp;lt;Internal IP&amp;gt;&lt;br /&gt;
   - groupware.&amp;lt;domain&amp;gt;  -&amp;gt;   &amp;lt;Internal IP&amp;gt;&lt;br /&gt;
   - im.&amp;lt;domain&amp;gt;         -&amp;gt;   &amp;lt;Internal IP&amp;gt;&lt;br /&gt;
   - iportaldoc.&amp;lt;domain&amp;gt; -&amp;gt;   &amp;lt;Internal IP&amp;gt;&lt;br /&gt;
   - ucoip.&amp;lt;domain&amp;gt;      -&amp;gt;   &amp;lt;Internal IP&amp;gt;&lt;br /&gt;
   - voip.&amp;lt;domain&amp;gt;       -&amp;gt;   &amp;lt;Internal IP&amp;gt;&lt;br /&gt;
   - webrtc.&amp;lt;domain&amp;gt;     -&amp;gt;   &amp;lt;Internal IP&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://eshop.ipbrick.com/eshop/software_info.php?cPath=7_74_16&amp;amp;products_id=907&amp;amp;language=en Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP</id>
		<title>UCoIP</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP"/>
				<updated>2017-05-26T11:58:41Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[UCoIP_DNS/firewall_configuration| How to configure DNS and the Firewall to make UCOIP available to Internet]]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP</id>
		<title>UCoIP</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP"/>
				<updated>2017-05-26T11:57:19Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: Created page with &amp;quot;*  How to configure DNS and firewall for make UCOIP available to Internet&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[UCoIP_DNS/firewall_configuration| How to configure DNS and firewall for make UCOIP available to Internet]]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/IPBrick_Disk_migration</id>
		<title>IPBrick Disk migration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/IPBrick_Disk_migration"/>
				<updated>2016-08-09T14:55:15Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Procedure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This guide is to assist the IT IPBRICK administrator in the process of migrating a running IPBRICK installation from:&lt;br /&gt;
* scenario 1 : one server machine - one disk to another disk on the same server machine&lt;br /&gt;
* scenario 2 : two server machine - one disk to another disk on a different server machine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''ATTENTION: This is an advanced procedure. The tasks described bellow are to be performed by an IT technician familiar with IPBRICK.IC operating system architecture and linux command line interface. This guide refers to the IPBRICK installation manual and the disaster recovery procedure. Before starting please make sure that you have an up to date backup of all data files, databases and configurations. Proceed at your own risk.'''&lt;br /&gt;
&lt;br /&gt;
=On the original server machine=&lt;br /&gt;
On the original installation, apply configurations and download/save a backup copy configurations file to your Desktop. (Advanced Configurations -&amp;gt; Disaster Recovery -&amp;gt; Download : select the last one with the current timestamp).&lt;br /&gt;
&lt;br /&gt;
Just stop the the services you use.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/systemmonitor stop&lt;br /&gt;
/etc/init.d/asterisk stop&lt;br /&gt;
/etc/init.d/apache2 stop&lt;br /&gt;
/etc/init.d/ejabberd stop&lt;br /&gt;
/etc/init.d/qmail stop&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Execute this command to backup all the databases.&lt;br /&gt;
* IPBRICK.OS version 6.x or above&lt;br /&gt;
&amp;lt;pre&amp;gt;php5 /opt/system/backupSYS/backup_DBs.php &amp;lt;/pre&amp;gt;&lt;br /&gt;
* IPBRICK.IC versions: 5.3, 5.4 or 5.5&lt;br /&gt;
&amp;lt;pre&amp;gt;php5 /opt/ipbox/backupSYS/backup_DBs.php &amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== IPortalDoc ==&lt;br /&gt;
If you have IPortalDoc installed, you must backup this database separatelly.&lt;br /&gt;
* IPBRICK.OS version 6.x or above - use '''ipbrickdb_ipb6'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ipbrick2:~# mkdir /home2/_backup_db_dbdoc&lt;br /&gt;
ipbrick2:~# cd /home2/_backup_db_dbdoc&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc# wget http://downloads3.ipbrick.com/wiki/ipbrickdb_ipb6&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc# php5 ipbrickdb_ipb6 --dump --dbname dbdoc --file dbdoc_20160512_1700.sql&lt;br /&gt;
&lt;br /&gt;
STARTING DUMP OF DATABASE dbdoc TO FILE dbdoc_20160512_1717.sql&lt;br /&gt;
&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc# ls -al dbdoc_20160512_1700.sql&lt;br /&gt;
-rw-r--r--  1 root root 570695550 May 12 17:20 dbdoc_20160512_1700.sql&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc#&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* IPBRICK.IC version 5.x - use '''ipbrickdb_ipb5'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ipbrick2:~# mkdir /home2/_backup_db_dbdoc&lt;br /&gt;
ipbrick2:~# cd /home2/_backup_db_dbdoc&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc# wget http://downloads3.ipbrick.com/wiki/ipbrickdb_ipb5&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc# php5 ipbrickdb_ipb5 --dump --dbname dbdoc --file dbdoc_20160512_1700.sql&lt;br /&gt;
&lt;br /&gt;
STARTING DUMP OF DATABASE dbdoc TO FILE dbdoc_20160512_1717.sql&lt;br /&gt;
&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc# ls -al dbdoc_20160512_1700.sql&lt;br /&gt;
-rw-r--r--  1 root root 570695550 May 12 17:20 dbdoc_20160512_1700.sql&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc#&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Scenario 1 - only one server machine=&lt;br /&gt;
Procedure:&lt;br /&gt;
* shutdown the server machine&lt;br /&gt;
* remove/detach the original (old) disk from the server&lt;br /&gt;
* install/attach the replacement (new) disk&lt;br /&gt;
* install the IPBRICK.IC operating system (please refer to IPBRICK.IC installation manual)&lt;br /&gt;
** perform the first boot, proceed with initial setup (FQDN, IP)&lt;br /&gt;
** after finishing installation and initial configuration proceed to the next step&lt;br /&gt;
* with the server power on, connect the old (original) disk using a USB connector&lt;br /&gt;
** now at the command line you can check for the disks&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
fdisk -l&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* confirm that you have 2 (two) disks: sda (new internal disk) and sdb (old disk connected via usb)&lt;br /&gt;
** you shoudl  be able to identify the partition tables&lt;br /&gt;
* create two temporary folders to map/mount the work areas from the old disk&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mkdir /old_home1&lt;br /&gt;
mkdir /old_home2&lt;br /&gt;
ls /old_home* -al&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* Then we need to mount the partitions we need to copy.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mount /dev/sdb7 /old_home1&lt;br /&gt;
mount /dev/sdb8 /old_home2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* Now lets start the rsync&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rsync -aAuv /old_home1/ /home1/ &amp;gt; /tmp/rsync_home1.log 2&amp;gt; /tmp/rsync_home1.err &amp;amp;&lt;br /&gt;
rsync -aAuv /old_home2/ /home2/ &amp;gt; /tmp/rsync_home2.log 2&amp;gt; /tmp/rsync_home2.err &amp;amp;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* You can see the logs in these files (log is normal output, err is for status warning)&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
tail /tmp/rsync_home1.log&lt;br /&gt;
tail /tmp/rsync_home1.err&lt;br /&gt;
tail /tmp/rsync_home2.log&lt;br /&gt;
tail /tmp/rsync_home2.err&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* When the rsync process finishes, you can unmap/unmount the old disk&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
umount /old_home1&lt;br /&gt;
umount /old_home2&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
* after successfull unmount you can disconnect the old disk (usb)&lt;br /&gt;
** NOTE: we recommend you to keep the old disk safe until this procedure is completly finished (backup procedure)&lt;br /&gt;
* Now please access to web interface, insert and replace the configurations file that you have previously saved on your desktop&lt;br /&gt;
** Please refer to the installation manual and/or disaster recover procedure in order to perform settings replacement&lt;br /&gt;
** The server machine performs a reboot&lt;br /&gt;
* After the server boot up, go to IPBRICK web interface, Advanced configurations -&amp;gt; Disaster Recovery -&amp;gt; Aplications -&amp;gt; Databases : for each database, click on the database name, then you get a listing of all the available backups, click on the last timestamp (click on the timestamp, not on the download link), and click on Restore to proceed to restore.&lt;br /&gt;
* When this Finnish test the services you have on IPBrick&lt;br /&gt;
* For the last step you need to re-activate your license - Advanced configurations -&amp;gt; IPBrick -&amp;gt; Web Access : License activation (please refer to the installation manual, license activation)&lt;br /&gt;
&lt;br /&gt;
=Scenario 2 - two server machine=&lt;br /&gt;
&lt;br /&gt;
== Second server installation ==&lt;br /&gt;
Install the IPBrick on the new machine (refer to IPBRICK.IC installation manual)&lt;br /&gt;
** NOTE: you must install exactly the same software version, this means that you must use the same IPBRICK.OS version and the exact same list of IPBRICK packages and/or updates&lt;br /&gt;
&lt;br /&gt;
'''NOTE - Licence Activation''' - during this procedure you will need to reactivate your product, please send file.dat to email address support@ipbrick.com requesting licence activation - to (re)activate a licence you are required to have a valid maintenance/software assurance contract. &lt;br /&gt;
&lt;br /&gt;
== Procedure == &lt;br /&gt;
EX: IPBrick1 New (192.168.69.199) and IPBrick2 OLD (192.168.69.200)&lt;br /&gt;
&lt;br /&gt;
On machine IPBrick1 generate ssh key:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ipbrick1:~# cd /root&lt;br /&gt;
ipbrick1:~# ssh-keygen -t rsa&lt;br /&gt;
#assume default location /root/.ssh/id_rsa&lt;br /&gt;
#enter empty passphrase&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/root/.ssh/id_rsa): &lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /root/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /root/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
3d:90:bf:f3:95:b3:96:6f:9d:90:95:98:69:fd:fb:0b root@ipbrick1&lt;br /&gt;
The key's randomart image is:&lt;br /&gt;
+--[ RSA 2048]----+&lt;br /&gt;
|                 |&lt;br /&gt;
|         .       |&lt;br /&gt;
|        o     = .|&lt;br /&gt;
|         +   = + |&lt;br /&gt;
|        S + . o .|&lt;br /&gt;
|           o o ..|&lt;br /&gt;
|          o  E=.+|&lt;br /&gt;
|           o .+=o|&lt;br /&gt;
|            ...+=|&lt;br /&gt;
+-----------------+&lt;br /&gt;
ipbrick1:~# &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Copy contents of public key from IPBrick1 to IPBrick2.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ipbrick1:~# cat /root/.ssh/id_rsa.pub &lt;br /&gt;
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCRRerZEo0cyzCP3JxTabRAG8uPe4DVnAuduIUUayn+r64mrpy1RFcu1qQLGiKFyOgxCg3m+pC&lt;br /&gt;
tg79yxvWfrx/XR/SIXh1uuLSmG/SOnFmn5WQJLXSCNBYGp/2BOQ1e4p6J2GFzmJF5/QnUXWCbLyIG/j7+klidLhktv/8+gHJClehMm6H31KynRe&lt;br /&gt;
aiuSyNiPFoG9+q5EmF+7Ibjqk5ZG6XeGodgINpfnNNFNLTmG+RyCK0vttGwVyKbnz2s3ypAbHpjQcNm7vG9iq73KjPaH1Y2r/09XoV3Bw15/0ZP&lt;br /&gt;
VkkvlNHSwBpnsHrCAL8KT3m7qgDy2WT3cuArXRpm/PGTMXH root@ipbrick1&lt;br /&gt;
ipbrick1:~# &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Select and copy the output/contents of file id_rsa.pub from IPBrick1 as example above, install it on IPBrick2. Example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ipbrick2:~# mkdir -p /home1/_ssh/root/.ssh&lt;br /&gt;
ipbrick2:~# echo &amp;quot;ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCRRerZEo0cyzCP3JxTabRAG8uPe4DVnAuduIUUayn+r64mrpy1RFcu1qQLGiKFyOgxCg3m+pC&lt;br /&gt;
tg79yxvWfrx/XR/SIXh1uuLSmG/SOnFmn5WQJLXSCNBYGp/2BOQ1e4p6J2GFzmJF5/QnUXWCbLyIG/j7+klidLhktv/8+gHJClehMm6H31KynRe&lt;br /&gt;
aiuSyNiPFoG9+q5EmF+7Ibjqk5ZG6XeGodgINpfnNNFNLTmG+RyCK0vttGwVyKbnz2s3ypAbHpjQcNm7vG9iq73KjPaH1Y2r/09XoV3Bw15/0ZP&lt;br /&gt;
VkkvlNHSwBpnsHrCAL8KT3m7qgDy2WT3cuArXRpm/PGTMXH root@ipbrick1&amp;quot; &amp;gt;&amp;gt; /home1/_ssh/root/.ssh/authorized_keys&lt;br /&gt;
ipbrick2:~# &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now for the first root ssh access from ipbrick1 to ipbrick2 using the ssh key.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ipbrick1:~# ssh -i /root/.ssh/id_rsa root@192.168.69.200&lt;br /&gt;
The authenticity of host '192' can't be established.&lt;br /&gt;
RSA key fingerprint is 2d:b9:97:b6:c0:e9:1e:b7:c4:51:01:ab:e9:21:12:51.&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? ^C&lt;br /&gt;
ipbrick1:~# ssh -i /root/.ssh/id_rsa root@localhost&lt;br /&gt;
The authenticity of host '192.168.69.200 (192.168.69.200)' can't be established.&lt;br /&gt;
RSA key fingerprint is 2d:b9:97:b6:c0:e9:1e:b7:c4:51:01:ab:e9:21:12:51.&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
Warning: Permanently added '192.168.69.200' (RSA) to the list of known hosts.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
++++++++++++++++++++++++++++++: System Info :+++++++++++++++++++++++++++++++++&lt;br /&gt;
+         FQDN =  ipbrick2.domain.com&lt;br /&gt;
+   IP address =  192.168.69.200&lt;br /&gt;
+       Kernel =  3.2.0-4-amd64&lt;br /&gt;
+       Uptime =  10:05:02 up 458 days, 32 min, 10 users,  load average: 3.04, 2.51, 2.20&lt;br /&gt;
+   Total CPUs =  4 x Architecture x86_64 @ 2399.734 Hz &lt;br /&gt;
+ Total Memory =  16470664 kB&lt;br /&gt;
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ipbrick2:~# logout&lt;br /&gt;
Connection to 192.168.69.200 closed.&lt;br /&gt;
ipbrick1:~#&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now you can access as root from ipbrick1 (NEW, 192.168.69.199)  to ipbrick2 (OLD, 192.168.69.200).&lt;br /&gt;
&lt;br /&gt;
Now lets start the rsync on IPBrick1.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ipbrick1:~# rsync -avu --delete --rsh=&amp;quot;ssh -l root -i /root/.ssh/id_rsa &amp;quot; 192.168.69.200:/home1/ /home1/ &amp;gt; rh1.log 2&amp;gt; rh1.err&lt;br /&gt;
ipbrick1:~# rsync -avu --delete --rsh=&amp;quot;ssh -l root -i /root/.ssh/id_rsa &amp;quot; 192.168.69.200:/home2/ /home2/ &amp;gt; rh2.log 2&amp;gt; rh2.err&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see the logs in this file -&amp;gt; rsync_home1.log&lt;br /&gt;
Or the errors in this file -&amp;gt; rsync_home1.err&lt;br /&gt;
&lt;br /&gt;
Wen the rsync is finish access to web interface and then insert and replace the configuration that you save on your desktop.&lt;br /&gt;
&lt;br /&gt;
After replacing, go to Advanced configuration -&amp;gt; disaster recovery -&amp;gt; aplication -&amp;gt; databases -&amp;gt; and replace the last one.&lt;br /&gt;
&lt;br /&gt;
== IPortalDoc ==&lt;br /&gt;
If you have IPortalDoc installed, you must now restore the database backup separatelly. This procedure is now executed in the new server (NOTE that after replacing configurations this server is now called ipbrick2, just like the original server.)&lt;br /&gt;
* IPBRICK.OS version 6.x or above - use '''ipbrickdb_ipb6'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ipbrick2:~# cd /home2/_backup_db_dbdoc&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc# php5 ipbrickdb_ipb6 --restore --dbname dbdoc --file /home2/_backup_db_dbdoc/dbdoc_20160512_1700.sql&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc#&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* IPBRICK.IC version 5.3, 5.4 or 5.5 - use '''ipbrickdb_ipb5'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ipbrick2:~# cd /home2/_backup_db_dbdoc&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc# php5 ipbrickdb_ipb5 --restore --dbname dbdoc --file /home2/_backup_db_dbdoc/dbdoc_20160512_1700.sql&lt;br /&gt;
ipbrick2:/home2/_backup_db_dbdoc#&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Go to IPortalDoc Web interface, login with an administrator account, &lt;br /&gt;
* rebuild iPortalDoc workflow accounts:&lt;br /&gt;
** a) Definitions Menu -&amp;gt; Configuration Interface&lt;br /&gt;
** b) Poplist on the right (Menu) -&amp;gt; Workflows&lt;br /&gt;
** c) Click on the Rebuild button&lt;br /&gt;
* rebuild share &amp;quot;Access&amp;quot; and the account of Associated Emails to Documents, of iPortalDoc:&lt;br /&gt;
** a) Access Share: Definitions -&amp;gt; Configuration Interface-&amp;gt; Build Global FS&lt;br /&gt;
** b) Emails associated to documents: Definitions -&amp;gt; Configuration Interface -&amp;gt; Build Global mailFS&lt;br /&gt;
*** (This task is scheduled to be executed at midnight);&lt;br /&gt;
&lt;br /&gt;
Go to IPContacts application, login with an administrator account&lt;br /&gt;
* rebuild entities and contacts&lt;br /&gt;
** a) Administration -&amp;gt; Rebuild Contacts&lt;br /&gt;
&lt;br /&gt;
= Finish =&lt;br /&gt;
Now it is time to test and check all services.&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-06-08T12:02:35Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: srv001.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 85.86.87.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
srv001        IN A     85.86.87.88&lt;br /&gt;
voip          IN A     85.86.87.88&lt;br /&gt;
webrtc        IN A     85.86.87.88&lt;br /&gt;
cafe          IN A     85.86.87.88&lt;br /&gt;
ucoip         IN A     85.86.87.88&lt;br /&gt;
im            IN A     85.86.87.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
jwchat             IN CNAME   srv001&lt;br /&gt;
webphone           IN CNAME   srv001&lt;br /&gt;
groupware	   IN CNAME   srv001&lt;br /&gt;
webmail 	   IN CNAME   srv001&lt;br /&gt;
jsmith             IN CNAME   srv001&lt;br /&gt;
webrtcproxy        IN CNAME   srv001&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.      86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.       86400 IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.        86400 IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.      86400 IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com.         IN MX       5     srv001.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&lt;br /&gt;
 88.87.86.85.in-addr.arpa.     IN PTR      srv001.domain.com.&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP           - 80 TCP&lt;br /&gt;
HTTPS          - 443 TCP&lt;br /&gt;
SMTP           - 25 TCP&lt;br /&gt;
SIP            - 5060 UDP/TCP&lt;br /&gt;
SIPS           - 5061 TCP&lt;br /&gt;
RTP            - 40000:45000 UDP&lt;br /&gt;
RTP            - 50000:55000 UDP&lt;br /&gt;
RTP            - 60000:65000 UDP&lt;br /&gt;
XMPP-client    - 5222 TCP&lt;br /&gt;
XMPP-server    - 5269 TCP&lt;br /&gt;
XMPPS          - 5223 TCP&lt;br /&gt;
WebRTC         - 8888 TCP&lt;br /&gt;
Webphone       - 10060 UDP/TCP&lt;br /&gt;
Webphone       - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://eshop.ipbrick.com/eshop/software_info.php?cPath=7_74_16&amp;amp;products_id=907&amp;amp;language=en Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Click2call_Windows</id>
		<title>Click2call Windows</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Click2call_Windows"/>
				<updated>2016-04-20T12:40:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Installing the TAPI Client */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Module for the usage of Click2Call on Windows.&lt;br /&gt;
&lt;br /&gt;
Pages:&lt;br /&gt;
&lt;br /&gt;
* TTTelecom [http://www.tttelecom.nl]&lt;br /&gt;
&lt;br /&gt;
* Taridium [http://wiki.taridium.com/Click_to_Call]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Necessary configurations ==&lt;br /&gt;
&lt;br /&gt;
=== IPBrick Configurations ===&lt;br /&gt;
&lt;br /&gt;
* Go to IPBrick's Web Interface:&lt;br /&gt;
** Advanced Configurations » Telephony » Configurations » IP PBX remote managers » Enable. &lt;br /&gt;
* Configure IP PBX remote managers:&lt;br /&gt;
** Define the authorized networks and determine a login and password;&lt;br /&gt;
** After creating the remote manager, edit its ''Access permissions'', by selecting the checkbox ''originate - Ability to originate''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Click2call1.png| center|1250px]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Click2call2.png| center|1250px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Windows Configurations for Outlook, using the modem feature ===&lt;br /&gt;
&lt;br /&gt;
==== Installing the TAPI Clien ====&lt;br /&gt;
&lt;br /&gt;
Download ActivaTSP [http://sourceforge.net/projects/activa/files/].&lt;br /&gt;
&lt;br /&gt;
Open the Zip file and install &amp;quot;SetupActiva.exe&amp;quot; in the folder ''Activa''. This configuration will ask for details of the server.&lt;br /&gt;
&lt;br /&gt;
==== ActivaTSP Configuration ====&lt;br /&gt;
&lt;br /&gt;
* '''Line DN:''' The extension that will be used (E.g.: For the extension 305, enter SIP/305.)&lt;br /&gt;
* '''Line Prefix:''' AST (default)&lt;br /&gt;
* '''Caller ID Name:''' Empty&lt;br /&gt;
&lt;br /&gt;
===== Asterisk Connection =====&lt;br /&gt;
&lt;br /&gt;
* '''Host IP:''' 192.168.19.5 (IPBrick's IP)&lt;br /&gt;
* '''Port:''' 5038&lt;br /&gt;
* '''User:''' adm&lt;br /&gt;
* '''Password:''' &amp;lt;Password&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Context =====&lt;br /&gt;
&lt;br /&gt;
* '''Outgoing:''' local_processing&lt;br /&gt;
* '''Agent:''' local_processing&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Click2call3.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click ''OK'' to save configurations. It may be necessary to reboot the PC.&lt;br /&gt;
&lt;br /&gt;
We can always access to this menu on Control Panel » Telephones and modems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Test the functioning ====&lt;br /&gt;
&lt;br /&gt;
On the contacts of the list view, right-click and make the call.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Click2call4.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now click on '''Start Call'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Click2call5.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It may be necessary to configure the calling line; to do so, go to the menu '''Dialing Properties...'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Click2call6.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Windows configurations, using ADAT===&lt;br /&gt;
&lt;br /&gt;
* Link to download ADAT: [http://dl.tttelecom.nl/index.php/en/component/docman/doc_download/6-adat-r2-0713];&lt;br /&gt;
&lt;br /&gt;
* Execute the program and proceed to its installation;&lt;br /&gt;
&lt;br /&gt;
* After installing, go to the configuration menu and perform the following configurations (see images).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Click2call7.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Click2call8.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This configuration allows us to select the number, in any application, and click on '''Alt + c''' to make the call.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Browser support - Google Chrome ===&lt;br /&gt;
&lt;br /&gt;
We can use Google Chrome's extension: [https://chrome.google.com/webstore/detail/asterisk-click2call/hlnmjkbpmnbgeondjeceaomhafdacmlj].&lt;br /&gt;
&lt;br /&gt;
We create a site with the following information (for example, calls.domain.com):&lt;br /&gt;
&lt;br /&gt;
cat /home1/_sites/calls/site/call.php&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;?if (!empty( $_REQUEST['phone'])   &amp;amp;&amp;amp; !empty( $_REQUEST['exten']  ) )&lt;br /&gt;
{&lt;br /&gt;
        $num = $_REQUEST['phone'];&lt;br /&gt;
        $ext = $_REQUEST['exten'];&lt;br /&gt;
        $num = preg_replace( &amp;quot;/^\+7/&amp;quot;, &amp;quot;8&amp;quot;, $num );&lt;br /&gt;
        $num = preg_replace( &amp;quot;/\D/&amp;quot;, &amp;quot;&amp;quot;, $num );&lt;br /&gt;
 &lt;br /&gt;
        if ( ! empty( $num ) )&lt;br /&gt;
        {&lt;br /&gt;
                echo &amp;quot;Dialing $num\r\n&amp;quot;;&lt;br /&gt;
 &lt;br /&gt;
                $timeout = 10;&lt;br /&gt;
                $asterisk_ip = &amp;quot;192.168.19.5&amp;quot;;&lt;br /&gt;
 &lt;br /&gt;
                $socket = fsockopen($asterisk_ip,&amp;quot;5038&amp;quot;, $errno, $errstr, $timeout);&lt;br /&gt;
                fputs($socket, &amp;quot;Action: Login\r\n&amp;quot;);&lt;br /&gt;
                fputs($socket, &amp;quot;UserName: ADM\r\n&amp;quot;);&lt;br /&gt;
                fputs($socket, &amp;quot;Secret: C3r34l1s#\r\n\r\n&amp;quot;);&lt;br /&gt;
 &lt;br /&gt;
                $wrets=fgets($socket,128);&lt;br /&gt;
 &lt;br /&gt;
                echo $wrets;&lt;br /&gt;
 &lt;br /&gt;
                fputs($socket, &amp;quot;Action: Originate\r\n&amp;quot; );&lt;br /&gt;
                fputs($socket, &amp;quot;Channel: Local/$ext@local_processing\r\n&amp;quot; );&lt;br /&gt;
                fputs($socket, &amp;quot;Exten: $num\r\n&amp;quot; );&lt;br /&gt;
                fputs($socket, &amp;quot;Context: local_processing\r\n&amp;quot; );&lt;br /&gt;
                fputs($socket, &amp;quot;Priority: 1\r\n&amp;quot; );&lt;br /&gt;
                fputs($socket, &amp;quot;Async: yes\r\n&amp;quot; );&lt;br /&gt;
                fputs($socket, &amp;quot;WaitTime: 15\r\n&amp;quot; );&lt;br /&gt;
                fputs($socket, &amp;quot;Callerid: $ext\r\n\r\n&amp;quot; );&lt;br /&gt;
 &lt;br /&gt;
                $wrets=fgets($socket,128);&lt;br /&gt;
                echo $wrets;&lt;br /&gt;
        }&lt;br /&gt;
        else&lt;br /&gt;
        {&lt;br /&gt;
                echo &amp;quot;Unable to determine number from (&amp;quot; . $_REQUEST['phone'] . &amp;quot;)\r\n&amp;quot;;&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
else&lt;br /&gt;
{?&amp;gt;Please enter a number to dial.&lt;br /&gt;
&amp;lt;?}?&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All we have to do it's modify the IP, login and password.&lt;br /&gt;
&lt;br /&gt;
In the application, we place the extension.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Click2call9.png]]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1</id>
		<title>How to buy and configure a SSL certificate at IPBrick 6.1</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1"/>
				<updated>2016-04-18T10:08:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The site www.ssls.com is a good option to buy cheap SSL certificates.&lt;br /&gt;
&lt;br /&gt;
Here are presented the steps to buy a Wildcard certificate and to configure it at IPBrick 6.1. So its a certificate type that can be used for all names and services from a DNS domain. &lt;br /&gt;
&lt;br /&gt;
Let suppose first the following info:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Country: Portugal&lt;br /&gt;
City: Porto&lt;br /&gt;
Company Name: Domain&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
Wildcard certificate: *.domain.com&lt;br /&gt;
Approver email: administrator@domain.com&lt;br /&gt;
Email to receive the certificate: jsmith@xpto.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
so in that case, the certificate is valid for all names under the domain &amp;quot;domain.com&amp;quot;. Eg: domain.com, groupware.domain.com, www.domain.com, cafe.domain.com, iportaldoc.domain.com.&lt;br /&gt;
&lt;br /&gt;
=A - CSR generation=&lt;br /&gt;
&lt;br /&gt;
* Go to Advanced Configurations - IPBrick - Certificates and Insert a certificate. Eg: wildcard-domain-2015&lt;br /&gt;
* Click at Certificate and generate the Private Key. After that generate the CSR with the following definitions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Country code: PT&lt;br /&gt;
State or province: Porto&lt;br /&gt;
City: Porto&lt;br /&gt;
Company: Domain  &lt;br /&gt;
Department:   &lt;br /&gt;
Common Name (CN): *.domain.com&lt;br /&gt;
Email: jsmith@xpto.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: If you are buying not a wildcard certificate but a certificate for a specific name/FQDN like groupware.domain.com, the CN must be: groupware.domain.com&lt;br /&gt;
&lt;br /&gt;
* Download the CSR&lt;br /&gt;
&lt;br /&gt;
=B - Buy a certificate from www.ssls.com=&lt;br /&gt;
&lt;br /&gt;
* Go to www.ssls.com and register with a new account&lt;br /&gt;
* Sign in and choose the cheapest CA to buy a Wildcard certificate and the number of years. Eg: PositiveSSL, 1 year&lt;br /&gt;
* Activate the certificate&lt;br /&gt;
&lt;br /&gt;
# When activating enter the file .CSR (generated at IPBrick)&lt;br /&gt;
# Choose the '''email approval''' - administrator@domain.com&lt;br /&gt;
# Go to administrator@domain.com email account and aprove it.&lt;br /&gt;
# Enter the company information and the email address that will receive the certificate (jsmith@xpto.com)&lt;br /&gt;
&lt;br /&gt;
=C - Install the certificate at IPBrick=&lt;br /&gt;
&lt;br /&gt;
* Go to jsmith@xpto.com email account and download and decompress the .zip file attached. The content is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
COMODORSADomainValidationSecureServerCA.crt -&amp;gt; Intermediate 2 CA certificate&lt;br /&gt;
COMODORSAAddTrustCA.crt -&amp;gt; Intermediate 1 CA certificate&lt;br /&gt;
AddTrustExternalCARoot.crt -&amp;gt; Root CA certificate&lt;br /&gt;
STAR_domain_com.crt -&amp;gt; Your Wildcard certificate&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Open the following files at Notepad:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
COMODORSADomainValidationSecureServerCA.crt&lt;br /&gt;
COMODORSAAddTrustCA.crt&lt;br /&gt;
AddTrustExternalCARoot.crt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
# Create a new file called ca_bundle.crt and concatenate all the three files content in that order&lt;br /&gt;
# Go back to IPBrick at Configurations - IPBrick - Certificates, click at wildcard-domain-2015 and at &amp;quot;Certificate&amp;quot; insert the file STAR_domain_com.crt&lt;br /&gt;
# Choose &amp;quot;Certificate Authority (CA)&amp;quot; and insert the file ca_bundle.crt&lt;br /&gt;
# Hit &amp;quot;Back&amp;quot; and at &amp;quot;Services with certificate&amp;quot; option, choose the certificate wildcard-domain-2015 for all the services.&lt;br /&gt;
# Apply Configurations&lt;br /&gt;
# Now all the client applications running SSL will accept the certificate (browsers, email clients etc.)&lt;br /&gt;
&lt;br /&gt;
NOTE: If the current IPBrick have a valid SSL certificate manually installed by the IPBrick Support Team, please send an email to support@ipbrick.com in order to check the configurations&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T16:13:01Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
cafe           A     88.88.88.88&lt;br /&gt;
ucoip          A     88.88.88.88&lt;br /&gt;
im             A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
webrtcproxy        CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.      86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.       86400 IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.        86400 IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.      86400 IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&lt;br /&gt;
 88.88.88.88     IN PTR      voip.domain.com&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5269 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. More information here:&lt;br /&gt;
&lt;br /&gt;
[http://downloads.ipbrick.com/IPBrick/documentation/EN/update04_v61_security_guide.pdf Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T15:16:22Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
cafe           A     88.88.88.88&lt;br /&gt;
ucoip          A     88.88.88.88&lt;br /&gt;
im             A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
webrtcproxy        CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.      86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.       86400 IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.        86400 IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.      86400 IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&lt;br /&gt;
 88.88.88.88     IN PTR      voip.domain.com&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5269 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate. You have detailed information here:&lt;br /&gt;
&lt;br /&gt;
[http://downloads.ipbrick.com/IPBrick/documentation/EN/update04_v61_security_guide.pdf - Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1</id>
		<title>How to buy and configure a SSL certificate at IPBrick 6.1</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1"/>
				<updated>2016-04-07T12:31:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* B - Buy a certificate from www.ssls.com */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The site www.ssls.com is a good option to buy cheap SSL certificates. Its possible to have a certificate for a FQDN for less than $7 a year.&lt;br /&gt;
&lt;br /&gt;
Here are presented the steps to buy a Wildcard certificate and to configure it at IPBrick 6.1. So its a certificate type that can be used for all names and services from a DNS domain. &lt;br /&gt;
&lt;br /&gt;
Let suppose first the following info:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Country: Portugal&lt;br /&gt;
City: Porto&lt;br /&gt;
Company Name: Domain&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
Wildcard certificate: *.domain.com&lt;br /&gt;
Approver email: administrator@domain.com&lt;br /&gt;
Email to receive the certificate: jsmith@xpto.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
so in that case, the certificate is valid for all names under the domain &amp;quot;domain.com&amp;quot;. Eg: domain.com, groupware.domain.com, www.domain.com, cafe.domain.com, iportaldoc.domain.com.&lt;br /&gt;
&lt;br /&gt;
=A - CSR generation=&lt;br /&gt;
&lt;br /&gt;
* Go to Advanced Configurations - IPBrick - Certificates and Insert a certificate. Eg: wildcard-domain-2015&lt;br /&gt;
* Click at Certificate and generate the Private Key. After that generate the CSR with the following definitions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Country code: PT&lt;br /&gt;
State or province: Porto&lt;br /&gt;
City: Porto&lt;br /&gt;
Company: Domain  &lt;br /&gt;
Department:   &lt;br /&gt;
Common Name (CN): *.domain.com&lt;br /&gt;
Email: jsmith@xpto.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: If you are buying not a wildcard certificate but a certificate for a specific name/FQDN like groupware.domain.com, the CN must be: groupware.domain.com&lt;br /&gt;
&lt;br /&gt;
* Download the CSR&lt;br /&gt;
&lt;br /&gt;
=B - Buy a certificate from www.ssls.com=&lt;br /&gt;
&lt;br /&gt;
* Go to www.ssls.com and register with a new account&lt;br /&gt;
* Sign in and choose the cheapest CA to buy a Wildcard certificate and the number of years. Eg: PositiveSSL, 1 year&lt;br /&gt;
* Activate the certificate&lt;br /&gt;
&lt;br /&gt;
# When activating enter the file .CSR (generated at IPBrick)&lt;br /&gt;
# Choose the '''email approval''' - administrator@domain.com&lt;br /&gt;
# Go to administrator@domain.com email account and aprove it.&lt;br /&gt;
# Enter the company information and the email address that will receive the certificate (jsmith@xpto.com)&lt;br /&gt;
&lt;br /&gt;
=C - Install the certificate at IPBrick=&lt;br /&gt;
&lt;br /&gt;
* Go to jsmith@xpto.com email account and download and decompress the .zip file attached. The content is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
COMODORSADomainValidationSecureServerCA.crt -&amp;gt; Intermediate 2 CA certificate&lt;br /&gt;
COMODORSAAddTrustCA.crt -&amp;gt; Intermediate 1 CA certificate&lt;br /&gt;
AddTrustExternalCARoot.crt -&amp;gt; Root CA certificate&lt;br /&gt;
STAR_domain_com.crt -&amp;gt; Your Wildcard certificate&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Open the following files at Notepad:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
COMODORSADomainValidationSecureServerCA.crt&lt;br /&gt;
COMODORSAAddTrustCA.crt&lt;br /&gt;
AddTrustExternalCARoot.crt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
# Create a new file called ca_bundle.crt and concatenate all the three files content in that order&lt;br /&gt;
# Go back to IPBrick at Configurations - IPBrick - Certificates, click at wildcard-domain-2015 and at &amp;quot;Certificate&amp;quot; insert the file STAR_domain_com.crt&lt;br /&gt;
# Choose &amp;quot;Certificate Authority (CA)&amp;quot; and insert the file ca_bundle.crt&lt;br /&gt;
# Hit &amp;quot;Back&amp;quot; and at &amp;quot;Services with certificate&amp;quot; option, choose the certificate wildcard-domain-2015 for all the services.&lt;br /&gt;
# Apply Configurations&lt;br /&gt;
# Now all the client applications running SSL will accept the certificate (browsers, email clients etc.)&lt;br /&gt;
&lt;br /&gt;
NOTE: If the current IPBrick have a valid SSL certificate manually installed by the IPBrick Support Team, please send an email to support@ipbrick.com in order to check the configurations&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T12:30:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
cafe           A     88.88.88.88&lt;br /&gt;
ucoip          A     88.88.88.88&lt;br /&gt;
im             A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
webrtcproxy        CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.      86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.       86400 IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.        86400 IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.      86400 IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&lt;br /&gt;
 88.88.88.88     IN PTR      voip.domain.com&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5269 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: With update04_6.1, it's crucial too to have a Wildcard SSL Certificate [http://downloads.ipbrick.com/IPBrick/documentation/EN/update04_v61_security_guide.pdf - Update04 security guide]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1 How to buy and configure a SSL certificate at IPBrick]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T12:17:31Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* DNS configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
cafe           A     88.88.88.88&lt;br /&gt;
ucoip          A     88.88.88.88&lt;br /&gt;
im             A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
webrtcproxy        CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.      86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.       86400 IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.        86400 IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.      86400 IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&lt;br /&gt;
 88.88.88.88     IN PTR      voip.domain.com&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5269 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T12:16:47Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* DNS configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
cafe           A     88.88.88.88&lt;br /&gt;
ucoip          A     88.88.88.88&lt;br /&gt;
im             A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com.      86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.       86400 IN SRV 1 0 80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.        86400 IN SRV 1 0 443  cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.      86400 IN SRV 1 0 8888 webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&lt;br /&gt;
 88.88.88.88     IN PTR      voip.domain.com&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5269 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T12:14:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
cafe           A     88.88.88.88&lt;br /&gt;
ucoip          A     88.88.88.88&lt;br /&gt;
im             A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com. 86400      IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 im.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 im.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for UCoIP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_ucoip._tcp.domain.com.                    86400    IN     SRV   1   0   80   ucoip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for CAFE:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_cafe._tcp.domain.com.                     86400    IN     SRV   1   0   443   cafe.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV record for WebRTC:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_webrtc._tcp.domain.com.                   86400    IN     SRV   1   0   8888   webrtc.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Costumer ISP must add this PTR record at reverse DNS zone:&lt;br /&gt;
&lt;br /&gt;
 88.88.88.88     IN PTR      voip.domain.com&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5269 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T10:08:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
im                 CNAME   voip&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
cafe               CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com. 86400      IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
UCoIP concept uses many services running on their standard ports. IPBrick firewall is prepared to accept all this traffic at public interface (eth1).&lt;br /&gt;
&lt;br /&gt;
But if IPBrick public interface is behind a NAT at Router/Firewall, its necessary to forward the necessary traffic to IPBrick. The list is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5269 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T09:53:07Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* DNS configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. &lt;br /&gt;
&lt;br /&gt;
Next is given an example for the public DNS zone configuration. In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
im                 CNAME   voip&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
cafe               CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com. 86400      IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
If the eth1 IPBrick is behind a NAT at Router/Firewall, its necessary to forward the following traffic to eth1 IP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5269 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T09:32:50Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. Next is given an example for the public DNS zone configuration.&lt;br /&gt;
&lt;br /&gt;
In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
im                 CNAME   voip&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
cafe               CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com. 86400      IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
If the eth1 IPBrick is behind a NAT at Router/Firewall, its necessary to forward the following traffic to eth1 IP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5269 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T09:25:44Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working at LAN/Internet it's necessary to configure some DNS records at internal and external DNS servers of the company domain. Next is given an example for the public DNS zone configuration.&lt;br /&gt;
&lt;br /&gt;
In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
im                 CNAME   voip&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
cafe               CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com. 86400      IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
If the eth1 IPBrick is behind a NAT at Router/Firewall, its necessary to forward the following traffic to eth1 IP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5280 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T09:09:24Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working from the Internet, it's necessary to configure some DNS records at the public DNS zone.&lt;br /&gt;
&lt;br /&gt;
In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
im                 CNAME   voip&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
cafe               CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com. 86400      IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
If the eth1 IPBrick is behind a NAT at Router/Firewall, its necessary to forward the following traffic to eth1 IP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5280 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 UDP/TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T09:05:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working from the Internet, it's necessary to configure some DNS records at the public DNS zone.&lt;br /&gt;
&lt;br /&gt;
In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
im                 CNAME   voip&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
cafe               CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com. 86400      IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
If the eth1 IPBrick is behind a NAT at Router/Firewall, its necessary to forward the following traffic to eth1 IP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5280 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-07T08:58:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working from the Internet, it's necessary to configure some DNS records at the public DNS zone.&lt;br /&gt;
&lt;br /&gt;
In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
im                 CNAME   voip&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
cafe               CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com. 86400      IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
If the eth1 IPBrick IP is behind a NAT at Router/Firewall, its necessary to forward the following traffic to eth1 IP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5280 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 10060 TCP&lt;br /&gt;
Webphone - 10062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-06T18:10:43Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Firewall/Router configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working from the Internet, it's necessary to configure some DNS records at the public DNS zone.&lt;br /&gt;
&lt;br /&gt;
In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
im                 CNAME   voip&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
cafe               CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com. 86400      IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
If the eth1 IPBrick IP is behind a NAT at Router/Firewall, its necessary to forward the following traffic to eth1 IP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP     - 80 TCP&lt;br /&gt;
HTTPS    - 443 TCP&lt;br /&gt;
SMTP     - 25 TCP&lt;br /&gt;
SIP      - 5060 UDP/TCP&lt;br /&gt;
SIPS     - 5061 TCP&lt;br /&gt;
RTP      - 40000:45000 UDP&lt;br /&gt;
RTP      - 50000:55000 UDP&lt;br /&gt;
RTP      - 60000:65000 UDP&lt;br /&gt;
XMPP     - 5222 TCP&lt;br /&gt;
XMPP     - 5280 TCP&lt;br /&gt;
XMPPS    - 5223 TCP&lt;br /&gt;
WebRTC   - 8888 TCP&lt;br /&gt;
Webphone - 1060 TCP&lt;br /&gt;
Webphone - 1062 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration</id>
		<title>UCoIP DNS/firewall configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/UCoIP_DNS/firewall_configuration"/>
				<updated>2016-04-06T17:59:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* DNS configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=DNS configuration=&lt;br /&gt;
&lt;br /&gt;
In order to get the full UCoIP concept working from the Internet, it's necessary to configure some DNS records at the public DNS zone.&lt;br /&gt;
&lt;br /&gt;
In that example lets suppose that: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
IPBrick FQDN: voip.domain.com&lt;br /&gt;
Public IP associated to IPBrick: 88.88.88.88&lt;br /&gt;
User UCoIP page to create: jsmith.domain.com &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So in this case we need to configure the following DNS records:&lt;br /&gt;
&lt;br /&gt;
A records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
voip           A     88.88.88.88&lt;br /&gt;
webrtc         A     88.88.88.88&lt;br /&gt;
webrtcproxy    A     88.88.88.88&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CNAME records:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
im                 CNAME   voip&lt;br /&gt;
jwchat             CNAME   voip&lt;br /&gt;
webphone           CNAME   voip&lt;br /&gt;
groupware	   CNAME   voip&lt;br /&gt;
cafe               CNAME   voip&lt;br /&gt;
jsmith             CNAME   voip&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for VoIP (SIP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_sips._tcp.domain.com.     IN     SRV   1   0   5061   voip.domain.com.&lt;br /&gt;
_sip._tcp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
_sip._udp.domain.com.      IN     SRV   1   0   5060   voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SRV records for chat (Jabber/XMPP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
_jabber._tcp.domain.com. 86400      IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-server._tcp.domain.com. 86400 IN SRV 5 0 5269 voip.domain.com.&lt;br /&gt;
_xmpp-client._tcp.domain.com. 86400 IN SRV 5 0 5222 voip.domain.com.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If IPBrick will be the email server, we need to modify/add the MX record:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
domain.com         MX       5     voip.domain.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Firewall/Router configuration=&lt;br /&gt;
&lt;br /&gt;
If the eth1 IPBrick IP is behind a NAT at Router/Firewall, its necessary to forward the following traffic to eth1 IP:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP   - 80 TCP&lt;br /&gt;
HTTPS  - 443 TCP&lt;br /&gt;
SMTP   - 25 TCP&lt;br /&gt;
SIP    - 5060 UDP/TCP&lt;br /&gt;
SIPS   - 5061 TCP&lt;br /&gt;
RTP    - 40000:45000 UDP&lt;br /&gt;
RTP    - 50000:55000 UDP&lt;br /&gt;
RTP    - 60000:65000 UDP&lt;br /&gt;
XMPP   - 5222 TCP&lt;br /&gt;
XMPP   - 5280 TCP&lt;br /&gt;
XMPPS  - 5223 TCP&lt;br /&gt;
WebRTC - 8888 TCP&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Vmware_tools_for_ipbrick_5.5_or_later_versions</id>
		<title>Vmware tools for ipbrick 5.5 or later versions</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Vmware_tools_for_ipbrick_5.5_or_later_versions"/>
				<updated>2015-12-14T11:35:01Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Procedure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT NOTE''': This procedure is '''only''' for IPBrick version 5.5 or later versions!&lt;br /&gt;
&lt;br /&gt;
1 - Activate the VMWare installation via VSphere&lt;br /&gt;
&lt;br /&gt;
 &amp;quot;Guest -&amp;gt; Install/Upgrade VMware tools&amp;quot;&lt;br /&gt;
 (this will create a virtual cd with vmware-tools)&lt;br /&gt;
 mount /dev/cdrom1 /cdrom (note: it can be cdrom1,2,3...)&lt;br /&gt;
 cp /cdrom/VMwareTools-8.3.7-341836.tar.gz /root&lt;br /&gt;
&lt;br /&gt;
2 - Prepare and decompress the content for installation.&lt;br /&gt;
&lt;br /&gt;
'''NOTE''': As an example we use the VMwareTools-8.3.7 version, but this procedure applies to other versions as well.&lt;br /&gt;
&lt;br /&gt;
 cd /root &lt;br /&gt;
 tar xvzf VMwareTools-8.3.7-341836.tar.gz&lt;br /&gt;
&lt;br /&gt;
3 - Execute the installation script&lt;br /&gt;
&lt;br /&gt;
 cd vmware-tools-distrib/&lt;br /&gt;
 ./vmware-install.pl&lt;br /&gt;
&lt;br /&gt;
(leave all options by default)&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1</id>
		<title>How to buy and configure a SSL certificate at IPBrick 6.1</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1"/>
				<updated>2015-12-07T17:59:29Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The site www.ssls.com is a good option to buy cheap SSL certificates. Its possible to have a certificate for a FQDN for less than $7 a year.&lt;br /&gt;
&lt;br /&gt;
Here are presented the steps to buy a Wildcard certificate and to configure it at IPBrick 6.1. So its a certificate type that can be used for all names and services from a DNS domain. &lt;br /&gt;
&lt;br /&gt;
Let suppose first the following info:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Country: Portugal&lt;br /&gt;
City: Porto&lt;br /&gt;
Company Name: Domain&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
Wildcard certificate: *.domain.com&lt;br /&gt;
Approver email: administrator@domain.com&lt;br /&gt;
Email to receive the certificate: jsmith@xpto.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
so in that case, the certificate is valid for all names under the domain &amp;quot;domain.com&amp;quot;. Eg: domain.com, groupware.domain.com, www.domain.com, cafe.domain.com, iportaldoc.domain.com.&lt;br /&gt;
&lt;br /&gt;
=A - CSR generation=&lt;br /&gt;
&lt;br /&gt;
* Go to Advanced Configurations - IPBrick - Certificates and Insert a certificate. Eg: wildcard-domain-2015&lt;br /&gt;
* Click at Certificate and generate the Private Key. After that generate the CSR with the following definitions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Country code: PT&lt;br /&gt;
State or province: Porto&lt;br /&gt;
City: Porto&lt;br /&gt;
Company: Domain  &lt;br /&gt;
Department:   &lt;br /&gt;
Common Name (CN): *.domain.com&lt;br /&gt;
Email: jsmith@xpto.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: If you are buying not a wildcard certificate but a certificate for a specific name/FQDN like groupware.domain.com, the CN must be: groupware.domain.com&lt;br /&gt;
&lt;br /&gt;
* Download the CSR&lt;br /&gt;
&lt;br /&gt;
=B - Buy a certificate from www.ssls.com=&lt;br /&gt;
&lt;br /&gt;
* Go to www.ssls.com and register with a new account&lt;br /&gt;
* Sign in and choose the cheapest CA to buy a Wildcard certificate and the number of years. Eg: PositiveSSL, 1 year&lt;br /&gt;
* Activate the certificate&lt;br /&gt;
&lt;br /&gt;
# When activating enter the file .CSR (generated at IPBrick)&lt;br /&gt;
# Choose the email approval - administrator@domain.com&lt;br /&gt;
# Go to administrator@domain.com email account and aprove it.&lt;br /&gt;
# Enter the company information and the email address that will receive the certificate (jsmith@xpto.com)&lt;br /&gt;
&lt;br /&gt;
=C - Install the certificate at IPBrick=&lt;br /&gt;
&lt;br /&gt;
* Go to jsmith@xpto.com email account and download and decompress the .zip file attached. The content is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
COMODORSADomainValidationSecureServerCA.crt -&amp;gt; Intermediate 2 CA certificate&lt;br /&gt;
COMODORSAAddTrustCA.crt -&amp;gt; Intermediate 1 CA certificate&lt;br /&gt;
AddTrustExternalCARoot.crt -&amp;gt; Root CA certificate&lt;br /&gt;
STAR_domain_com.crt -&amp;gt; Your Wildcard certificate&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Open the following files at Notepad:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
COMODORSADomainValidationSecureServerCA.crt&lt;br /&gt;
COMODORSAAddTrustCA.crt&lt;br /&gt;
AddTrustExternalCARoot.crt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
# Create a new file called ca_bundle.crt and concatenate all the three files content in that order&lt;br /&gt;
# Go back to IPBrick at Configurations - IPBrick - Certificates, click at wildcard-domain-2015 and at &amp;quot;Certificate&amp;quot; insert the file STAR_domain_com.crt&lt;br /&gt;
# Choose &amp;quot;Certificate Authority (CA)&amp;quot; and insert the file ca_bundle.crt&lt;br /&gt;
# Hit &amp;quot;Back&amp;quot; and at &amp;quot;Services with certificate&amp;quot; option, choose the certificate wildcard-domain-2015 for all the services.&lt;br /&gt;
# Apply Configurations&lt;br /&gt;
# Now all the client applications running SSL will accept the certificate (browsers, email clients etc.)&lt;br /&gt;
&lt;br /&gt;
NOTE: If the current IPBrick have a valid SSL certificate manually installed by the IPBrick Support Team, please send an email to support@ipbrick.com in order to check the configurations&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/VMWare_tools_for_IPBrick_6.X</id>
		<title>VMWare tools for IPBrick 6.X</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/VMWare_tools_for_IPBrick_6.X"/>
				<updated>2015-11-02T18:53:00Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Please use that procedure for IPBrick 6.X https://wiki.ipbrick.com/index.php/Vmware_tools_for_ipbrick_5.5_or_later_versions&lt;br /&gt;
&lt;br /&gt;
= Installation =&lt;br /&gt;
&lt;br /&gt;
 ipbrick:~# apt-get update&lt;br /&gt;
&lt;br /&gt;
 ipbrick:~# apt-get install open-vm-tools&lt;br /&gt;
 Reading package lists... Done&lt;br /&gt;
 Building dependency tree       &lt;br /&gt;
 Reading state information... Done&lt;br /&gt;
 The following extra packages will be installed:&lt;br /&gt;
   dkms menu open-vm-dkms zerofree&lt;br /&gt;
 Suggested packages:&lt;br /&gt;
   menu-l10n open-vm-toolbox&lt;br /&gt;
 The following NEW packages will be installed:&lt;br /&gt;
   dkms menu open-vm-dkms open-vm-tools zerofree&lt;br /&gt;
 0 upgraded, 5 newly installed, 0 to remove and 253 not upgraded.&lt;br /&gt;
 Need to get 2645 kB of archives.&lt;br /&gt;
 After this operation, 10.6 MB of additional disk space will be used.&lt;br /&gt;
 Do you want to continue [Y/n]? y&lt;br /&gt;
 Get:1 http://ftp.pt.debian.org/debian/ stable/main dkms all 2.2.0.3-1.2 [77.4 kB]&lt;br /&gt;
 Get:2 http://ftp.pt.debian.org/debian/ stable/main menu amd64 2.1.46 [480 kB]&lt;br /&gt;
 Get:3 http://ftp.pt.debian.org/debian/ stable/main open-vm-dkms all 2:8.8.0+2012.05.21-724730-1+nmu2 [1221 kB]&lt;br /&gt;
 Get:4 http://ftp.pt.debian.org/debian/ stable/main open-vm-tools amd64 2:8.8.0+2012.05.21-724730-1+nmu2 [858 kB]&lt;br /&gt;
 Get:5 http://ftp.pt.debian.org/debian/ stable/main zerofree amd64 1.0.2-1 [8398 B]&lt;br /&gt;
 Fetched 2645 kB in 5s (469 kB/s)&lt;br /&gt;
 Selecting previously unselected package dkms.&lt;br /&gt;
 (Reading database ... 95%&lt;br /&gt;
 (Reading database ... 183125 files and directories currently installed.)&lt;br /&gt;
 Unpacking dkms (from .../dkms_2.2.0.3-1.2_all.deb) ...&lt;br /&gt;
 Selecting previously unselected package menu.&lt;br /&gt;
 Unpacking menu (from .../archives/menu_2.1.46_amd64.deb) ...&lt;br /&gt;
 Selecting previously unselected package open-vm-dkms.&lt;br /&gt;
 Unpacking open-vm-dkms (from .../open-vm-dkms_2%3a8.8.0+2012.05.21-724730-1+nmu2_all.deb) ...&lt;br /&gt;
 Selecting previously unselected package open-vm-tools.&lt;br /&gt;
 Unpacking open-vm-tools (from .../open-vm-tools_2%3a8.8.0+2012.05.21-724730-1+nmu2_amd64.deb) ...&lt;br /&gt;
 Selecting previously unselected package zerofree.&lt;br /&gt;
 Unpacking zerofree (from .../zerofree_1.0.2-1_amd64.deb) ...&lt;br /&gt;
 Processing triggers for man-db ...&lt;br /&gt;
 Processing triggers for install-info ...&lt;br /&gt;
 Processing triggers for initramfs-tools ...&lt;br /&gt;
 update-initramfs: Generating /boot/initrd.img-3.2.0-4-amd64&lt;br /&gt;
 W: mdadm: /etc/mdadm/mdadm.conf defines no arrays.&lt;br /&gt;
  /usr/share/initramfs-tools/hooks/mdadm: line 156: 17329 Terminated              /usr/share/mdadm/mkconf &amp;gt; $tmpfile&lt;br /&gt;
 W: mdadm: failed to auto-generate temporary mdadm.conf file.&lt;br /&gt;
 W: mdadm: no configuration file available.&lt;br /&gt;
 Setting up dkms (2.2.0.3-1.2) ...&lt;br /&gt;
 Setting up menu (2.1.46) ...&lt;br /&gt;
 Setting up open-vm-dkms (2:8.8.0+2012.05.21-724730-1+nmu2) ...&lt;br /&gt;
 Loading new open-vm-tools-2012.05.21 DKMS files...&lt;br /&gt;
 First Installation: checking all kernels...&lt;br /&gt;
 Building only for 3.2.0-4-amd64&lt;br /&gt;
 Building initial module for 3.2.0-4-amd64&lt;br /&gt;
 Done.&lt;br /&gt;
 &lt;br /&gt;
 vmblock:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/&lt;br /&gt;
 &lt;br /&gt;
 vmci.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/ &lt;br /&gt;
 &lt;br /&gt;
 vmhgfs.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/  &lt;br /&gt;
 &lt;br /&gt;
 vmsync.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/&lt;br /&gt;
 &lt;br /&gt;
 vmxnet.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/  &lt;br /&gt;
 &lt;br /&gt;
 vsock.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/&lt;br /&gt;
 &lt;br /&gt;
 depmod.......................................&lt;br /&gt;
 &lt;br /&gt;
 DKMS: install completed.&lt;br /&gt;
 Setting up open-vm-tools (2:8.8.0+2012.05.21-724730-1+nmu2) ...&lt;br /&gt;
 . ok &lt;br /&gt;
 update-initramfs: deferring update (trigger activated)&lt;br /&gt;
 . ok &lt;br /&gt;
 Setting up zerofree (1.0.2-1) ...&lt;br /&gt;
 Processing triggers for menu ...&lt;br /&gt;
 Processing triggers for initramfs-tools ...&lt;br /&gt;
 update-initramfs: Generating /boot/initrd.img-3.2.0-4-amd64&lt;br /&gt;
 W: mdadm: /etc/mdadm/mdadm.conf defines no arrays.&lt;br /&gt;
 /usr/share/initramfs-tools/hooks/mdadm: line 156: 30635 Terminated              /usr/share/mdadm/mkconf &amp;gt; $tmpfile&lt;br /&gt;
 W: mdadm: failed to auto-generate temporary mdadm.conf file.&lt;br /&gt;
 W: mdadm: no configuration file available.&lt;br /&gt;
 &lt;br /&gt;
 ipbrick:~#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Restart the server&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1</id>
		<title>How to buy and configure a SSL certificate at IPBrick 6.1</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1"/>
				<updated>2015-10-08T10:48:00Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The site www.ssls.com is a good option to buy cheap SSL certificates. Its possible to have a certificate for a FQDN for less than $7 a year.&lt;br /&gt;
&lt;br /&gt;
Here are presented the steps to buy a Wildcard certificate and to configure it at IPBrick 6.1. So its a certificate type that can be used for all names and services from a DNS domain. &lt;br /&gt;
&lt;br /&gt;
Let suppose first the following info:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Country: Portugal&lt;br /&gt;
City: Porto&lt;br /&gt;
Company Name: Domain&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
Wildcard certificate: *.domain.com&lt;br /&gt;
Approver email: administrator@domain.com&lt;br /&gt;
Email to receive the certificate: jsmith@xpto.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
so in that case, the certificate is valid for all names under the domain &amp;quot;domain.com&amp;quot;. Eg: domain.com, groupware.domain.com, www.domain.com, cafe.domain.com, iportaldoc.domain.com.&lt;br /&gt;
&lt;br /&gt;
=CSR generation=&lt;br /&gt;
&lt;br /&gt;
* Go to Advanced Configurations - IPBrick - Certificates and Insert a certificate. Eg: wildcard-domain-2015&lt;br /&gt;
* Click at Certificate and generate the Private Key. After that generate the CSR with the following definitions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Country code: PT&lt;br /&gt;
State or province: Porto&lt;br /&gt;
City: Porto&lt;br /&gt;
Company: Domain  &lt;br /&gt;
Department:   &lt;br /&gt;
Common Name (CN): *.domain.com&lt;br /&gt;
Email: jsmith@xpto.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: If you are buying not a wildcard certificate but a certificate for a specific name/FQDN like groupware.domain.com, the CN must be: groupware.domain.com&lt;br /&gt;
&lt;br /&gt;
* Download the CSR&lt;br /&gt;
&lt;br /&gt;
=Buy a certificate from www.ssls.com=&lt;br /&gt;
&lt;br /&gt;
* Go to www.ssls.com and register with a new account&lt;br /&gt;
* Sign in and choose the cheapest CA to buy a Wildcard certificate and the number of years. Eg: PositiveSSL, 1 year&lt;br /&gt;
* Activate the certificate&lt;br /&gt;
&lt;br /&gt;
# When activating enter the file .CSR (generated at IPBrick)&lt;br /&gt;
# Choose the email approval - administrator@domain.com&lt;br /&gt;
# Go to administrator@domain.com email account and aprove it.&lt;br /&gt;
# Enter the company information and the email address that will receive the certificate (jsmith@xpto.com)&lt;br /&gt;
&lt;br /&gt;
=Install the certificate at IPBrick=&lt;br /&gt;
&lt;br /&gt;
* Go to jsmith@xpto.com email account and download and decompress the .zip file attached. The content is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
COMODORSADomainValidationSecureServerCA.crt -&amp;gt; Intermediate 2 CA certificate&lt;br /&gt;
COMODORSAAddTrustCA.crt -&amp;gt; Intermediate 1 CA certificate&lt;br /&gt;
AddTrustExternalCARoot.crt -&amp;gt; Root CA certificate&lt;br /&gt;
STAR_domain_com.crt -&amp;gt; Your Wildcard certificate&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Open the following files at Notepad:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
COMODORSADomainValidationSecureServerCA.crt&lt;br /&gt;
COMODORSAAddTrustCA.crt&lt;br /&gt;
AddTrustExternalCARoot.crt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
# Create a new file called ca_bundle.crt and concatenate all the three files content in that order&lt;br /&gt;
# Go back to IPBrick at Configurations - IPBrick - Certificates, click at wildcard-domain-2015 and at &amp;quot;Certificate&amp;quot; insert the file STAR_domain_com.crt&lt;br /&gt;
# Choose &amp;quot;Certificate Authority (CA)&amp;quot; and insert the file ca_bundle.crt&lt;br /&gt;
# Hit &amp;quot;Back&amp;quot; and at &amp;quot;Services with certificate&amp;quot; option, choose the certificate wildcard-domain-2015 for all the services.&lt;br /&gt;
# Apply Configurations&lt;br /&gt;
# Now all the client applications running SSL will accept the certificate (browsers, email clients etc.)&lt;br /&gt;
&lt;br /&gt;
NOTE: If the current IPBrick have a valid SSL certificate manually installed by the IPBrick Support Team, please send an email to support@ipbrick.com in order to check the configurations&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0</id>
		<title>Update to IPBrick version 6.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0"/>
				<updated>2015-09-28T18:33:45Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Converting ext3 filesystem to ext4 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;F.A.Q. - Update to IPBrick version 6.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Does my hardware support IPBRICK v6.0? =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPBRICK version 6 is a 64 bits Operating System. It needs a CPU that supports 64 bits. Please check your hardware CPU type before upgrading to version 6.&lt;br /&gt;
&lt;br /&gt;
On IPBRICK, access the command line interface and enter the following command:&lt;br /&gt;
''grep flags /proc/cpuinfo''&lt;br /&gt;
&lt;br /&gt;
Look for lm in the command output. If lm is found in the output, then the CPU is 64-bit. If you don't see lm or see i386, i486, i586, or i686 in the output, then the CPU is 32-bit. Below is an example output of the above line with lm in the information.&lt;br /&gt;
&lt;br /&gt;
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx '''lm''' constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Is it possible to update my IPBRICK v5.x to v6.0 using updates? =&lt;br /&gt;
&lt;br /&gt;
 It isn't possible to upgrade an IPBRICK 4.x or v5.x to an IPBrick 6.0 using updates.&lt;br /&gt;
 You can only upgrade your system via an Upgrade/Reinstall with our new ISO via DVD or image installation.&lt;br /&gt;
&lt;br /&gt;
 The IPBRICK installation DVD detects a previous installation and ensures the backup of all data.&lt;br /&gt;
 However, and regardless of this, it is advisable to have a full backup of your server!&lt;br /&gt;
&lt;br /&gt;
= I have an IPBrick version 6 release candidate (RC) in a production environment. Can I update this server to the final version 6? =&lt;br /&gt;
&lt;br /&gt;
 Yes, it is possible to update from any version 6 release candidate to the final release. &lt;br /&gt;
 This update can be done simply by installing the necessary update packages through the IPBrick web interface.&lt;br /&gt;
&lt;br /&gt;
To upgrade from a RC version to another it's necessary to install the respective migration package (in some cases there are also some additional packages). The upgrade process needs to be done step by step, it means, from one RC version to another till the final version of IPBrick 6.0. The migration packages must be inserted in Advanced Configurations-&amp;gt;IPBrick-&amp;gt;Update and the installation order is the following:&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC1 to 6.0-RC2&lt;br /&gt;
&lt;br /&gt;
            - pkg1_update_01-v6.0-rc1.deb    (md5sum: 3460f302047ffd0f43abe52d9e7c1958)&lt;br /&gt;
            - pkg2_update_01-v6.0-rc1.deb    (md5sum: 943c1c121d31f16ad74a54ce4081aeb6)&lt;br /&gt;
            - migration-v60-rc1-to-v60-rc2.deb    (md5sum: c25caea099030f5cb518893bbda83460)&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC2 to 6.0-RC3&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc2-to-v60-rc3.deb (md5sum: f491481e56d793f44d6200dcc8434737)&lt;br /&gt;
            - pkg1_update_01-v6.0-rc2.deb    (md5sum: be2b9408eb634c94430c73a1c574ecdc )&lt;br /&gt;
           &lt;br /&gt;
             Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC3 to 6.0-RC4&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc3-to-v60-rc4.deb    (md5sum: 72b83d74d8c6709c45fa494ecdc5abb1 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC4 to 6.0-RC5&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc4-to-v60-rc5.deb    (md5sum: fb0a540aff8919fcedbb645aaed6c5bb)&lt;br /&gt;
       &lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC5 to 6.0 Final version&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc5-to-v60.deb    (md5sum: e960dc8fb80638fe8de786ae47f50263 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations&lt;br /&gt;
&lt;br /&gt;
= How may I backup my server's configurations?= &lt;br /&gt;
&lt;br /&gt;
 Backup the last IPBRICK configuration at: '''Advanced Configurations &amp;gt; Disaster Recovery &amp;gt; Configurations &amp;gt; Download&lt;br /&gt;
&lt;br /&gt;
= May I use the configuration file straight away?= &lt;br /&gt;
&lt;br /&gt;
 No. Send the last IPBRICK configuration to support.install@ipbrick.com and request migration to IPBrick v6.0;&lt;br /&gt;
&lt;br /&gt;
= Is this a direct conversion procedure?= &lt;br /&gt;
&lt;br /&gt;
 No. This isn't an automatic procedure. You will receive, as soon as possible, the respective configuration file.&lt;br /&gt;
&lt;br /&gt;
=  What about migrating really old versions of IPBRICK?=&lt;br /&gt;
&lt;br /&gt;
 It’s possible that, for older IPBRICK versions, the migration may not be possible to be executed directly.&lt;br /&gt;
 You may need to update first to an intermediate version and only then to IPBRICK 6.0.&lt;br /&gt;
 In these situations, we will inform you about any restrictions and how to proceed.&lt;br /&gt;
&lt;br /&gt;
= What about the applications installed in the server?= &lt;br /&gt;
&lt;br /&gt;
 If in doubt, please contact support.install@ipbrick.com we will make sure to check if your installed applications,&lt;br /&gt;
 such as Hotspot, LIVE, etc. are compatible with IPBrick v6.0.&lt;br /&gt;
&lt;br /&gt;
= Converting ext3 filesystem to ext4 =&lt;br /&gt;
&lt;br /&gt;
After performing an update from a previous version of IPBrick into version 6.x, the home partitions remain with ext3 type. It is possible to convert them to ext4 by following the procedure below.&lt;br /&gt;
&lt;br /&gt;
'''Note''':  It should be done using the server console, not remotely.&lt;br /&gt;
&lt;br /&gt;
* As root, enter &amp;quot;init 1&amp;quot; so the server will run in level 1 (all services will stop)&lt;br /&gt;
* Umount partitions /home1 and /home2 with the commands &amp;quot;umount /home1&amp;quot; and &amp;quot;/umount /home2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then enter:&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda7 (assuming that device /dev/sda7 was the one that was mounted in /home1)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda7&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda8 (assuming that device /dev/sda8 was the one that was mounted in /home2)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda8&lt;br /&gt;
&lt;br /&gt;
Edit the /etc/fstab file by entering the command &amp;quot;vi /etc/fstab&amp;quot;&lt;br /&gt;
&lt;br /&gt;
And exchange in the lines that refer to mount point home1 and home2 where it is written &amp;quot;ext3&amp;quot; to &amp;quot;ext4&amp;quot;&lt;br /&gt;
&lt;br /&gt;
UUID=xxx                /home1  '''ext4'''    defaults,usrquota,grpquota,user_xattr,acl       0       2&amp;lt;br&amp;gt;&lt;br /&gt;
UUID=xxx                /home2  '''ext4'''    defaults,usrquota,grpquota,user_xattr,acl       0       2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the end, enter the command: &amp;quot;reboot&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The server will boot and mount home1 and home2 with ext4. &lt;br /&gt;
&lt;br /&gt;
You can confirm it by entering, as root, the command &amp;quot;mount&amp;quot;&lt;br /&gt;
&lt;br /&gt;
/dev/sda7  on /home1 type '''ext4''' (rw,relatime,user_xattr,barrier=1,data=ordered,usrquota,grpquota) &amp;lt;br&amp;gt;&lt;br /&gt;
/dev/sda8  on /home2 type '''ext4''' (rw,relatime,user_xattr,barrier=1,data=ordered,usrquota,grpquota) &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0</id>
		<title>Update to IPBrick version 6.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0"/>
				<updated>2015-09-28T18:33:18Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Converting ext3 filesystem to ext4 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;F.A.Q. - Update to IPBrick version 6.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Does my hardware support IPBRICK v6.0? =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPBRICK version 6 is a 64 bits Operating System. It needs a CPU that supports 64 bits. Please check your hardware CPU type before upgrading to version 6.&lt;br /&gt;
&lt;br /&gt;
On IPBRICK, access the command line interface and enter the following command:&lt;br /&gt;
''grep flags /proc/cpuinfo''&lt;br /&gt;
&lt;br /&gt;
Look for lm in the command output. If lm is found in the output, then the CPU is 64-bit. If you don't see lm or see i386, i486, i586, or i686 in the output, then the CPU is 32-bit. Below is an example output of the above line with lm in the information.&lt;br /&gt;
&lt;br /&gt;
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx '''lm''' constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Is it possible to update my IPBRICK v5.x to v6.0 using updates? =&lt;br /&gt;
&lt;br /&gt;
 It isn't possible to upgrade an IPBRICK 4.x or v5.x to an IPBrick 6.0 using updates.&lt;br /&gt;
 You can only upgrade your system via an Upgrade/Reinstall with our new ISO via DVD or image installation.&lt;br /&gt;
&lt;br /&gt;
 The IPBRICK installation DVD detects a previous installation and ensures the backup of all data.&lt;br /&gt;
 However, and regardless of this, it is advisable to have a full backup of your server!&lt;br /&gt;
&lt;br /&gt;
= I have an IPBrick version 6 release candidate (RC) in a production environment. Can I update this server to the final version 6? =&lt;br /&gt;
&lt;br /&gt;
 Yes, it is possible to update from any version 6 release candidate to the final release. &lt;br /&gt;
 This update can be done simply by installing the necessary update packages through the IPBrick web interface.&lt;br /&gt;
&lt;br /&gt;
To upgrade from a RC version to another it's necessary to install the respective migration package (in some cases there are also some additional packages). The upgrade process needs to be done step by step, it means, from one RC version to another till the final version of IPBrick 6.0. The migration packages must be inserted in Advanced Configurations-&amp;gt;IPBrick-&amp;gt;Update and the installation order is the following:&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC1 to 6.0-RC2&lt;br /&gt;
&lt;br /&gt;
            - pkg1_update_01-v6.0-rc1.deb    (md5sum: 3460f302047ffd0f43abe52d9e7c1958)&lt;br /&gt;
            - pkg2_update_01-v6.0-rc1.deb    (md5sum: 943c1c121d31f16ad74a54ce4081aeb6)&lt;br /&gt;
            - migration-v60-rc1-to-v60-rc2.deb    (md5sum: c25caea099030f5cb518893bbda83460)&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC2 to 6.0-RC3&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc2-to-v60-rc3.deb (md5sum: f491481e56d793f44d6200dcc8434737)&lt;br /&gt;
            - pkg1_update_01-v6.0-rc2.deb    (md5sum: be2b9408eb634c94430c73a1c574ecdc )&lt;br /&gt;
           &lt;br /&gt;
             Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC3 to 6.0-RC4&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc3-to-v60-rc4.deb    (md5sum: 72b83d74d8c6709c45fa494ecdc5abb1 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC4 to 6.0-RC5&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc4-to-v60-rc5.deb    (md5sum: fb0a540aff8919fcedbb645aaed6c5bb)&lt;br /&gt;
       &lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC5 to 6.0 Final version&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc5-to-v60.deb    (md5sum: e960dc8fb80638fe8de786ae47f50263 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations&lt;br /&gt;
&lt;br /&gt;
= How may I backup my server's configurations?= &lt;br /&gt;
&lt;br /&gt;
 Backup the last IPBRICK configuration at: '''Advanced Configurations &amp;gt; Disaster Recovery &amp;gt; Configurations &amp;gt; Download&lt;br /&gt;
&lt;br /&gt;
= May I use the configuration file straight away?= &lt;br /&gt;
&lt;br /&gt;
 No. Send the last IPBRICK configuration to support.install@ipbrick.com and request migration to IPBrick v6.0;&lt;br /&gt;
&lt;br /&gt;
= Is this a direct conversion procedure?= &lt;br /&gt;
&lt;br /&gt;
 No. This isn't an automatic procedure. You will receive, as soon as possible, the respective configuration file.&lt;br /&gt;
&lt;br /&gt;
=  What about migrating really old versions of IPBRICK?=&lt;br /&gt;
&lt;br /&gt;
 It’s possible that, for older IPBRICK versions, the migration may not be possible to be executed directly.&lt;br /&gt;
 You may need to update first to an intermediate version and only then to IPBRICK 6.0.&lt;br /&gt;
 In these situations, we will inform you about any restrictions and how to proceed.&lt;br /&gt;
&lt;br /&gt;
= What about the applications installed in the server?= &lt;br /&gt;
&lt;br /&gt;
 If in doubt, please contact support.install@ipbrick.com we will make sure to check if your installed applications,&lt;br /&gt;
 such as Hotspot, LIVE, etc. are compatible with IPBrick v6.0.&lt;br /&gt;
&lt;br /&gt;
= Converting ext3 filesystem to ext4 =&lt;br /&gt;
&lt;br /&gt;
''' ***CONSTRUCTION IN PROGRESS*** '''&lt;br /&gt;
&lt;br /&gt;
After performing an update from a previous version of IPBrick into version 6.x, the home partitions remain with ext3 type. It is possible to convert them to ext4 by following the procedure below.&lt;br /&gt;
&lt;br /&gt;
'''Note''':  It should be done using the server console, not remotely.&lt;br /&gt;
&lt;br /&gt;
* As root, enter &amp;quot;init 1&amp;quot; so the server will run in level 1 (all services will stop)&lt;br /&gt;
* Umount partitions /home1 and /home2 with the commands &amp;quot;umount /home1&amp;quot; and &amp;quot;/umount /home2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then enter:&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda7 (assuming that device /dev/sda7 was the one that was mounted in /home1)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda7&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda8 (assuming that device /dev/sda8 was the one that was mounted in /home2)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda8&lt;br /&gt;
&lt;br /&gt;
Edit the /etc/fstab file by entering the command &amp;quot;vi /etc/fstab&amp;quot;&lt;br /&gt;
&lt;br /&gt;
And exchange in the lines that refer to mount point home1 and home2 where it is written &amp;quot;ext3&amp;quot; to &amp;quot;ext4&amp;quot;&lt;br /&gt;
&lt;br /&gt;
UUID=xxx                /home1  '''ext4'''    defaults,usrquota,grpquota,user_xattr,acl       0       2&amp;lt;br&amp;gt;&lt;br /&gt;
UUID=xxx                /home2  '''ext4'''    defaults,usrquota,grpquota,user_xattr,acl       0       2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the end, enter the command: &amp;quot;reboot&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The server will boot and mount home1 and home2 with ext4. &lt;br /&gt;
&lt;br /&gt;
You can confirm it by entering, as root, the command &amp;quot;mount&amp;quot;&lt;br /&gt;
&lt;br /&gt;
/dev/sda7  on /home1 type '''ext4''' (rw,relatime,user_xattr,barrier=1,data=ordered,usrquota,grpquota) &amp;lt;br&amp;gt;&lt;br /&gt;
/dev/sda8  on /home2 type '''ext4''' (rw,relatime,user_xattr,barrier=1,data=ordered,usrquota,grpquota) &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0</id>
		<title>Update to IPBrick version 6.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0"/>
				<updated>2015-09-28T18:33:03Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Converting ext3 filesystem to ext4 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;F.A.Q. - Update to IPBrick version 6.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Does my hardware support IPBRICK v6.0? =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPBRICK version 6 is a 64 bits Operating System. It needs a CPU that supports 64 bits. Please check your hardware CPU type before upgrading to version 6.&lt;br /&gt;
&lt;br /&gt;
On IPBRICK, access the command line interface and enter the following command:&lt;br /&gt;
''grep flags /proc/cpuinfo''&lt;br /&gt;
&lt;br /&gt;
Look for lm in the command output. If lm is found in the output, then the CPU is 64-bit. If you don't see lm or see i386, i486, i586, or i686 in the output, then the CPU is 32-bit. Below is an example output of the above line with lm in the information.&lt;br /&gt;
&lt;br /&gt;
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx '''lm''' constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Is it possible to update my IPBRICK v5.x to v6.0 using updates? =&lt;br /&gt;
&lt;br /&gt;
 It isn't possible to upgrade an IPBRICK 4.x or v5.x to an IPBrick 6.0 using updates.&lt;br /&gt;
 You can only upgrade your system via an Upgrade/Reinstall with our new ISO via DVD or image installation.&lt;br /&gt;
&lt;br /&gt;
 The IPBRICK installation DVD detects a previous installation and ensures the backup of all data.&lt;br /&gt;
 However, and regardless of this, it is advisable to have a full backup of your server!&lt;br /&gt;
&lt;br /&gt;
= I have an IPBrick version 6 release candidate (RC) in a production environment. Can I update this server to the final version 6? =&lt;br /&gt;
&lt;br /&gt;
 Yes, it is possible to update from any version 6 release candidate to the final release. &lt;br /&gt;
 This update can be done simply by installing the necessary update packages through the IPBrick web interface.&lt;br /&gt;
&lt;br /&gt;
To upgrade from a RC version to another it's necessary to install the respective migration package (in some cases there are also some additional packages). The upgrade process needs to be done step by step, it means, from one RC version to another till the final version of IPBrick 6.0. The migration packages must be inserted in Advanced Configurations-&amp;gt;IPBrick-&amp;gt;Update and the installation order is the following:&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC1 to 6.0-RC2&lt;br /&gt;
&lt;br /&gt;
            - pkg1_update_01-v6.0-rc1.deb    (md5sum: 3460f302047ffd0f43abe52d9e7c1958)&lt;br /&gt;
            - pkg2_update_01-v6.0-rc1.deb    (md5sum: 943c1c121d31f16ad74a54ce4081aeb6)&lt;br /&gt;
            - migration-v60-rc1-to-v60-rc2.deb    (md5sum: c25caea099030f5cb518893bbda83460)&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC2 to 6.0-RC3&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc2-to-v60-rc3.deb (md5sum: f491481e56d793f44d6200dcc8434737)&lt;br /&gt;
            - pkg1_update_01-v6.0-rc2.deb    (md5sum: be2b9408eb634c94430c73a1c574ecdc )&lt;br /&gt;
           &lt;br /&gt;
             Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC3 to 6.0-RC4&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc3-to-v60-rc4.deb    (md5sum: 72b83d74d8c6709c45fa494ecdc5abb1 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC4 to 6.0-RC5&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc4-to-v60-rc5.deb    (md5sum: fb0a540aff8919fcedbb645aaed6c5bb)&lt;br /&gt;
       &lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC5 to 6.0 Final version&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc5-to-v60.deb    (md5sum: e960dc8fb80638fe8de786ae47f50263 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations&lt;br /&gt;
&lt;br /&gt;
= How may I backup my server's configurations?= &lt;br /&gt;
&lt;br /&gt;
 Backup the last IPBRICK configuration at: '''Advanced Configurations &amp;gt; Disaster Recovery &amp;gt; Configurations &amp;gt; Download&lt;br /&gt;
&lt;br /&gt;
= May I use the configuration file straight away?= &lt;br /&gt;
&lt;br /&gt;
 No. Send the last IPBRICK configuration to support.install@ipbrick.com and request migration to IPBrick v6.0;&lt;br /&gt;
&lt;br /&gt;
= Is this a direct conversion procedure?= &lt;br /&gt;
&lt;br /&gt;
 No. This isn't an automatic procedure. You will receive, as soon as possible, the respective configuration file.&lt;br /&gt;
&lt;br /&gt;
=  What about migrating really old versions of IPBRICK?=&lt;br /&gt;
&lt;br /&gt;
 It’s possible that, for older IPBRICK versions, the migration may not be possible to be executed directly.&lt;br /&gt;
 You may need to update first to an intermediate version and only then to IPBRICK 6.0.&lt;br /&gt;
 In these situations, we will inform you about any restrictions and how to proceed.&lt;br /&gt;
&lt;br /&gt;
= What about the applications installed in the server?= &lt;br /&gt;
&lt;br /&gt;
 If in doubt, please contact support.install@ipbrick.com we will make sure to check if your installed applications,&lt;br /&gt;
 such as Hotspot, LIVE, etc. are compatible with IPBrick v6.0.&lt;br /&gt;
&lt;br /&gt;
= Converting ext3 filesystem to ext4 =&lt;br /&gt;
&lt;br /&gt;
''' ***CONSTRUCTION IN PROGRESS*** '''&lt;br /&gt;
&lt;br /&gt;
After performing an update from a previous version of IPBrick into version 6.x, the home partitions remain with ext3 type. It is possible to convert them to ext4 by following the procedure below.&lt;br /&gt;
&lt;br /&gt;
'''Note''':  It should be done using the server console, not remotely.&lt;br /&gt;
&lt;br /&gt;
* As root, enter &amp;quot;init 1&amp;quot; so the server will run in level 1 (all services will stop)&lt;br /&gt;
* Umount partitions /home1 and /home2 with the commands &amp;quot;umount /home1&amp;quot; and &amp;quot;/umount /home2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then enter:&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda7 (assuming that device /dev/sda7 was the one that was mounted in /home1)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda7&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda8 (assuming that device /dev/sda8 was the one that was mounted in /home2)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda8&lt;br /&gt;
&lt;br /&gt;
Edit the /etc/fstab file by entering the command &amp;quot;vi /etc/fstab&amp;quot;&lt;br /&gt;
&lt;br /&gt;
And exchange in the lines that refer to mount point home1 and home2 where it is written &amp;quot;ext3&amp;quot; to &amp;quot;ext4&amp;quot;&lt;br /&gt;
&lt;br /&gt;
UUID=xxx                /home1  '''ext4'''    defaults,usrquota,grpquota,user_xattr,acl       0       2&amp;lt;br&amp;gt;&lt;br /&gt;
UUID=xxx                /home2  '''ext4'''    defaults,usrquota,grpquota,user_xattr,acl       0       2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the end, enter the command: &amp;quot;reboot&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The server will boot and mount home1 and home2 with ext4. You can confirm it by entering, as root, the command &amp;quot;mount&amp;quot;&lt;br /&gt;
&lt;br /&gt;
/dev/sda7  on /home1 type '''ext4''' (rw,relatime,user_xattr,barrier=1,data=ordered,usrquota,grpquota) &amp;lt;br&amp;gt;&lt;br /&gt;
/dev/sda8  on /home2 type '''ext4''' (rw,relatime,user_xattr,barrier=1,data=ordered,usrquota,grpquota) &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0</id>
		<title>Update to IPBrick version 6.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0"/>
				<updated>2015-09-28T18:32:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Converting ext3 filesystem to ext4 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;F.A.Q. - Update to IPBrick version 6.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Does my hardware support IPBRICK v6.0? =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPBRICK version 6 is a 64 bits Operating System. It needs a CPU that supports 64 bits. Please check your hardware CPU type before upgrading to version 6.&lt;br /&gt;
&lt;br /&gt;
On IPBRICK, access the command line interface and enter the following command:&lt;br /&gt;
''grep flags /proc/cpuinfo''&lt;br /&gt;
&lt;br /&gt;
Look for lm in the command output. If lm is found in the output, then the CPU is 64-bit. If you don't see lm or see i386, i486, i586, or i686 in the output, then the CPU is 32-bit. Below is an example output of the above line with lm in the information.&lt;br /&gt;
&lt;br /&gt;
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx '''lm''' constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Is it possible to update my IPBRICK v5.x to v6.0 using updates? =&lt;br /&gt;
&lt;br /&gt;
 It isn't possible to upgrade an IPBRICK 4.x or v5.x to an IPBrick 6.0 using updates.&lt;br /&gt;
 You can only upgrade your system via an Upgrade/Reinstall with our new ISO via DVD or image installation.&lt;br /&gt;
&lt;br /&gt;
 The IPBRICK installation DVD detects a previous installation and ensures the backup of all data.&lt;br /&gt;
 However, and regardless of this, it is advisable to have a full backup of your server!&lt;br /&gt;
&lt;br /&gt;
= I have an IPBrick version 6 release candidate (RC) in a production environment. Can I update this server to the final version 6? =&lt;br /&gt;
&lt;br /&gt;
 Yes, it is possible to update from any version 6 release candidate to the final release. &lt;br /&gt;
 This update can be done simply by installing the necessary update packages through the IPBrick web interface.&lt;br /&gt;
&lt;br /&gt;
To upgrade from a RC version to another it's necessary to install the respective migration package (in some cases there are also some additional packages). The upgrade process needs to be done step by step, it means, from one RC version to another till the final version of IPBrick 6.0. The migration packages must be inserted in Advanced Configurations-&amp;gt;IPBrick-&amp;gt;Update and the installation order is the following:&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC1 to 6.0-RC2&lt;br /&gt;
&lt;br /&gt;
            - pkg1_update_01-v6.0-rc1.deb    (md5sum: 3460f302047ffd0f43abe52d9e7c1958)&lt;br /&gt;
            - pkg2_update_01-v6.0-rc1.deb    (md5sum: 943c1c121d31f16ad74a54ce4081aeb6)&lt;br /&gt;
            - migration-v60-rc1-to-v60-rc2.deb    (md5sum: c25caea099030f5cb518893bbda83460)&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC2 to 6.0-RC3&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc2-to-v60-rc3.deb (md5sum: f491481e56d793f44d6200dcc8434737)&lt;br /&gt;
            - pkg1_update_01-v6.0-rc2.deb    (md5sum: be2b9408eb634c94430c73a1c574ecdc )&lt;br /&gt;
           &lt;br /&gt;
             Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC3 to 6.0-RC4&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc3-to-v60-rc4.deb    (md5sum: 72b83d74d8c6709c45fa494ecdc5abb1 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC4 to 6.0-RC5&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc4-to-v60-rc5.deb    (md5sum: fb0a540aff8919fcedbb645aaed6c5bb)&lt;br /&gt;
       &lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC5 to 6.0 Final version&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc5-to-v60.deb    (md5sum: e960dc8fb80638fe8de786ae47f50263 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations&lt;br /&gt;
&lt;br /&gt;
= How may I backup my server's configurations?= &lt;br /&gt;
&lt;br /&gt;
 Backup the last IPBRICK configuration at: '''Advanced Configurations &amp;gt; Disaster Recovery &amp;gt; Configurations &amp;gt; Download&lt;br /&gt;
&lt;br /&gt;
= May I use the configuration file straight away?= &lt;br /&gt;
&lt;br /&gt;
 No. Send the last IPBRICK configuration to support.install@ipbrick.com and request migration to IPBrick v6.0;&lt;br /&gt;
&lt;br /&gt;
= Is this a direct conversion procedure?= &lt;br /&gt;
&lt;br /&gt;
 No. This isn't an automatic procedure. You will receive, as soon as possible, the respective configuration file.&lt;br /&gt;
&lt;br /&gt;
=  What about migrating really old versions of IPBRICK?=&lt;br /&gt;
&lt;br /&gt;
 It’s possible that, for older IPBRICK versions, the migration may not be possible to be executed directly.&lt;br /&gt;
 You may need to update first to an intermediate version and only then to IPBRICK 6.0.&lt;br /&gt;
 In these situations, we will inform you about any restrictions and how to proceed.&lt;br /&gt;
&lt;br /&gt;
= What about the applications installed in the server?= &lt;br /&gt;
&lt;br /&gt;
 If in doubt, please contact support.install@ipbrick.com we will make sure to check if your installed applications,&lt;br /&gt;
 such as Hotspot, LIVE, etc. are compatible with IPBrick v6.0.&lt;br /&gt;
&lt;br /&gt;
= Converting ext3 filesystem to ext4 =&lt;br /&gt;
&lt;br /&gt;
''' ***CONSTRUCTION IN PROGRESS*** '''&lt;br /&gt;
&lt;br /&gt;
After performing an update from a previous version of IPBrick into version 6.x, the home partitions remain with ext3 type. It is possible to convert them to ext4 by following the procedure below.&lt;br /&gt;
&lt;br /&gt;
'''Note''':  It should be done using the server console, not remotely.&lt;br /&gt;
&lt;br /&gt;
* As root, enter &amp;quot;init 1&amp;quot; so the server will run in level 1 (all services will stop)&lt;br /&gt;
* Umount partitions /home1 and /home2 with the commands &amp;quot;umount /home1&amp;quot; and &amp;quot;/umount /home2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then enter:&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda7 (assuming that device /dev/sda7 was the one that was mounted in /home1)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda7&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda8 (assuming that device /dev/sda8 was the one that was mounted in /home2)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda8&lt;br /&gt;
&lt;br /&gt;
Edit the /etc/fstab file by entering the command &amp;quot;vi /etc/fstab&amp;quot;&lt;br /&gt;
&lt;br /&gt;
And exchange in the lines that refer to mount point home1 and home2 where it is written &amp;quot;ext3&amp;quot; to &amp;quot;ext4&amp;quot;&lt;br /&gt;
&lt;br /&gt;
UUID=xxx                /home1  '''ext4'''    defaults,usrquota,grpquota,user_xattr,acl       0       2&amp;lt;br&amp;gt;&lt;br /&gt;
UUID=xxx                /home2  '''ext4'''    defaults,usrquota,grpquota,user_xattr,acl       0       2&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the end, enter:&lt;br /&gt;
reboot&lt;br /&gt;
&lt;br /&gt;
The server will boot and mount home1 and home2 with ext4. You can confirm it by entering, as root, the command &amp;quot;mount&amp;quot;&lt;br /&gt;
&lt;br /&gt;
/dev/sda7  on /home1 type '''ext4''' (rw,relatime,user_xattr,barrier=1,data=ordered,usrquota,grpquota) &amp;lt;br&amp;gt;&lt;br /&gt;
/dev/sda8  on /home2 type '''ext4''' (rw,relatime,user_xattr,barrier=1,data=ordered,usrquota,grpquota) &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0</id>
		<title>Update to IPBrick version 6.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0"/>
				<updated>2015-09-28T18:32:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Converting ext3 filesystem to ext4 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;F.A.Q. - Update to IPBrick version 6.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Does my hardware support IPBRICK v6.0? =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPBRICK version 6 is a 64 bits Operating System. It needs a CPU that supports 64 bits. Please check your hardware CPU type before upgrading to version 6.&lt;br /&gt;
&lt;br /&gt;
On IPBRICK, access the command line interface and enter the following command:&lt;br /&gt;
''grep flags /proc/cpuinfo''&lt;br /&gt;
&lt;br /&gt;
Look for lm in the command output. If lm is found in the output, then the CPU is 64-bit. If you don't see lm or see i386, i486, i586, or i686 in the output, then the CPU is 32-bit. Below is an example output of the above line with lm in the information.&lt;br /&gt;
&lt;br /&gt;
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx '''lm''' constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Is it possible to update my IPBRICK v5.x to v6.0 using updates? =&lt;br /&gt;
&lt;br /&gt;
 It isn't possible to upgrade an IPBRICK 4.x or v5.x to an IPBrick 6.0 using updates.&lt;br /&gt;
 You can only upgrade your system via an Upgrade/Reinstall with our new ISO via DVD or image installation.&lt;br /&gt;
&lt;br /&gt;
 The IPBRICK installation DVD detects a previous installation and ensures the backup of all data.&lt;br /&gt;
 However, and regardless of this, it is advisable to have a full backup of your server!&lt;br /&gt;
&lt;br /&gt;
= I have an IPBrick version 6 release candidate (RC) in a production environment. Can I update this server to the final version 6? =&lt;br /&gt;
&lt;br /&gt;
 Yes, it is possible to update from any version 6 release candidate to the final release. &lt;br /&gt;
 This update can be done simply by installing the necessary update packages through the IPBrick web interface.&lt;br /&gt;
&lt;br /&gt;
To upgrade from a RC version to another it's necessary to install the respective migration package (in some cases there are also some additional packages). The upgrade process needs to be done step by step, it means, from one RC version to another till the final version of IPBrick 6.0. The migration packages must be inserted in Advanced Configurations-&amp;gt;IPBrick-&amp;gt;Update and the installation order is the following:&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC1 to 6.0-RC2&lt;br /&gt;
&lt;br /&gt;
            - pkg1_update_01-v6.0-rc1.deb    (md5sum: 3460f302047ffd0f43abe52d9e7c1958)&lt;br /&gt;
            - pkg2_update_01-v6.0-rc1.deb    (md5sum: 943c1c121d31f16ad74a54ce4081aeb6)&lt;br /&gt;
            - migration-v60-rc1-to-v60-rc2.deb    (md5sum: c25caea099030f5cb518893bbda83460)&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC2 to 6.0-RC3&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc2-to-v60-rc3.deb (md5sum: f491481e56d793f44d6200dcc8434737)&lt;br /&gt;
            - pkg1_update_01-v6.0-rc2.deb    (md5sum: be2b9408eb634c94430c73a1c574ecdc )&lt;br /&gt;
           &lt;br /&gt;
             Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC3 to 6.0-RC4&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc3-to-v60-rc4.deb    (md5sum: 72b83d74d8c6709c45fa494ecdc5abb1 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC4 to 6.0-RC5&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc4-to-v60-rc5.deb    (md5sum: fb0a540aff8919fcedbb645aaed6c5bb)&lt;br /&gt;
       &lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC5 to 6.0 Final version&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc5-to-v60.deb    (md5sum: e960dc8fb80638fe8de786ae47f50263 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations&lt;br /&gt;
&lt;br /&gt;
= How may I backup my server's configurations?= &lt;br /&gt;
&lt;br /&gt;
 Backup the last IPBRICK configuration at: '''Advanced Configurations &amp;gt; Disaster Recovery &amp;gt; Configurations &amp;gt; Download&lt;br /&gt;
&lt;br /&gt;
= May I use the configuration file straight away?= &lt;br /&gt;
&lt;br /&gt;
 No. Send the last IPBRICK configuration to support.install@ipbrick.com and request migration to IPBrick v6.0;&lt;br /&gt;
&lt;br /&gt;
= Is this a direct conversion procedure?= &lt;br /&gt;
&lt;br /&gt;
 No. This isn't an automatic procedure. You will receive, as soon as possible, the respective configuration file.&lt;br /&gt;
&lt;br /&gt;
=  What about migrating really old versions of IPBRICK?=&lt;br /&gt;
&lt;br /&gt;
 It’s possible that, for older IPBRICK versions, the migration may not be possible to be executed directly.&lt;br /&gt;
 You may need to update first to an intermediate version and only then to IPBRICK 6.0.&lt;br /&gt;
 In these situations, we will inform you about any restrictions and how to proceed.&lt;br /&gt;
&lt;br /&gt;
= What about the applications installed in the server?= &lt;br /&gt;
&lt;br /&gt;
 If in doubt, please contact support.install@ipbrick.com we will make sure to check if your installed applications,&lt;br /&gt;
 such as Hotspot, LIVE, etc. are compatible with IPBrick v6.0.&lt;br /&gt;
&lt;br /&gt;
= Converting ext3 filesystem to ext4 =&lt;br /&gt;
&lt;br /&gt;
''' ***CONSTRUCTION IN PROGRESS*** '''&lt;br /&gt;
&lt;br /&gt;
After performing an update from a previous version of IPBrick into version 6.x, the home partitions remain with ext3 type. It is possible to convert them to ext4 by following the procedure below.&lt;br /&gt;
&lt;br /&gt;
'''Note''':  It should be done using the server console, not remotely.&lt;br /&gt;
&lt;br /&gt;
* As root, enter &amp;quot;init 1&amp;quot; so the server will run in level 1 (all services will stop)&lt;br /&gt;
* Umount partitions /home1 and /home2 with the commands &amp;quot;umount /home1&amp;quot; and &amp;quot;/umount /home2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then enter:&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda7 (assuming that device /dev/sda7 was the one that was mounted in /home1)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda7&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda8 (assuming that device /dev/sda8 was the one that was mounted in /home2)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda8&lt;br /&gt;
&lt;br /&gt;
Edit the /etc/fstab file by entering the command &amp;quot;vi /etc/fstab&amp;quot;&lt;br /&gt;
&lt;br /&gt;
And exchange in the lines that refer to mount point home1 and home2 where it is written &amp;quot;ext3&amp;quot; to &amp;quot;ext4&amp;quot;&lt;br /&gt;
&lt;br /&gt;
UUID=xxx                /home1  '''ext4'''    defaults,usrquota,grpquota,user_xattr,acl       0       2&lt;br /&gt;
UUID=xxx                /home2  '''ext4'''    defaults,usrquota,grpquota,user_xattr,acl       0       2&lt;br /&gt;
&lt;br /&gt;
In the end, enter:&lt;br /&gt;
reboot&lt;br /&gt;
&lt;br /&gt;
The server will boot and mount home1 and home2 with ext4. You can confirm it by entering, as root, the command &amp;quot;mount&amp;quot;&lt;br /&gt;
&lt;br /&gt;
/dev/sda7  on /home1 type '''ext4''' (rw,relatime,user_xattr,barrier=1,data=ordered,usrquota,grpquota)&lt;br /&gt;
/dev/sda8  on /home2 type '''ext4''' (rw,relatime,user_xattr,barrier=1,data=ordered,usrquota,grpquota)&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0</id>
		<title>Update to IPBrick version 6.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0"/>
				<updated>2015-09-28T18:26:20Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Converting ext3 filesystem to ext4 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;F.A.Q. - Update to IPBrick version 6.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Does my hardware support IPBRICK v6.0? =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPBRICK version 6 is a 64 bits Operating System. It needs a CPU that supports 64 bits. Please check your hardware CPU type before upgrading to version 6.&lt;br /&gt;
&lt;br /&gt;
On IPBRICK, access the command line interface and enter the following command:&lt;br /&gt;
''grep flags /proc/cpuinfo''&lt;br /&gt;
&lt;br /&gt;
Look for lm in the command output. If lm is found in the output, then the CPU is 64-bit. If you don't see lm or see i386, i486, i586, or i686 in the output, then the CPU is 32-bit. Below is an example output of the above line with lm in the information.&lt;br /&gt;
&lt;br /&gt;
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx '''lm''' constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Is it possible to update my IPBRICK v5.x to v6.0 using updates? =&lt;br /&gt;
&lt;br /&gt;
 It isn't possible to upgrade an IPBRICK 4.x or v5.x to an IPBrick 6.0 using updates.&lt;br /&gt;
 You can only upgrade your system via an Upgrade/Reinstall with our new ISO via DVD or image installation.&lt;br /&gt;
&lt;br /&gt;
 The IPBRICK installation DVD detects a previous installation and ensures the backup of all data.&lt;br /&gt;
 However, and regardless of this, it is advisable to have a full backup of your server!&lt;br /&gt;
&lt;br /&gt;
= I have an IPBrick version 6 release candidate (RC) in a production environment. Can I update this server to the final version 6? =&lt;br /&gt;
&lt;br /&gt;
 Yes, it is possible to update from any version 6 release candidate to the final release. &lt;br /&gt;
 This update can be done simply by installing the necessary update packages through the IPBrick web interface.&lt;br /&gt;
&lt;br /&gt;
To upgrade from a RC version to another it's necessary to install the respective migration package (in some cases there are also some additional packages). The upgrade process needs to be done step by step, it means, from one RC version to another till the final version of IPBrick 6.0. The migration packages must be inserted in Advanced Configurations-&amp;gt;IPBrick-&amp;gt;Update and the installation order is the following:&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC1 to 6.0-RC2&lt;br /&gt;
&lt;br /&gt;
            - pkg1_update_01-v6.0-rc1.deb    (md5sum: 3460f302047ffd0f43abe52d9e7c1958)&lt;br /&gt;
            - pkg2_update_01-v6.0-rc1.deb    (md5sum: 943c1c121d31f16ad74a54ce4081aeb6)&lt;br /&gt;
            - migration-v60-rc1-to-v60-rc2.deb    (md5sum: c25caea099030f5cb518893bbda83460)&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC2 to 6.0-RC3&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc2-to-v60-rc3.deb (md5sum: f491481e56d793f44d6200dcc8434737)&lt;br /&gt;
            - pkg1_update_01-v6.0-rc2.deb    (md5sum: be2b9408eb634c94430c73a1c574ecdc )&lt;br /&gt;
           &lt;br /&gt;
             Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC3 to 6.0-RC4&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc3-to-v60-rc4.deb    (md5sum: 72b83d74d8c6709c45fa494ecdc5abb1 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC4 to 6.0-RC5&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc4-to-v60-rc5.deb    (md5sum: fb0a540aff8919fcedbb645aaed6c5bb)&lt;br /&gt;
       &lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC5 to 6.0 Final version&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc5-to-v60.deb    (md5sum: e960dc8fb80638fe8de786ae47f50263 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations&lt;br /&gt;
&lt;br /&gt;
= How may I backup my server's configurations?= &lt;br /&gt;
&lt;br /&gt;
 Backup the last IPBRICK configuration at: '''Advanced Configurations &amp;gt; Disaster Recovery &amp;gt; Configurations &amp;gt; Download&lt;br /&gt;
&lt;br /&gt;
= May I use the configuration file straight away?= &lt;br /&gt;
&lt;br /&gt;
 No. Send the last IPBRICK configuration to support.install@ipbrick.com and request migration to IPBrick v6.0;&lt;br /&gt;
&lt;br /&gt;
= Is this a direct conversion procedure?= &lt;br /&gt;
&lt;br /&gt;
 No. This isn't an automatic procedure. You will receive, as soon as possible, the respective configuration file.&lt;br /&gt;
&lt;br /&gt;
=  What about migrating really old versions of IPBRICK?=&lt;br /&gt;
&lt;br /&gt;
 It’s possible that, for older IPBRICK versions, the migration may not be possible to be executed directly.&lt;br /&gt;
 You may need to update first to an intermediate version and only then to IPBRICK 6.0.&lt;br /&gt;
 In these situations, we will inform you about any restrictions and how to proceed.&lt;br /&gt;
&lt;br /&gt;
= What about the applications installed in the server?= &lt;br /&gt;
&lt;br /&gt;
 If in doubt, please contact support.install@ipbrick.com we will make sure to check if your installed applications,&lt;br /&gt;
 such as Hotspot, LIVE, etc. are compatible with IPBrick v6.0.&lt;br /&gt;
&lt;br /&gt;
= Converting ext3 filesystem to ext4 =&lt;br /&gt;
&lt;br /&gt;
''' ***CONSTRUCTION IN PROGRESS*** '''&lt;br /&gt;
&lt;br /&gt;
After performing an update from a previous version of IPBrick into version 6.x, the home partitions remain with ext3 type. It is possible to convert them to ext4 by following the procedure below.&lt;br /&gt;
&lt;br /&gt;
'''Note''':  It should be done using the server console, not remotely.&lt;br /&gt;
&lt;br /&gt;
* As root, enter &amp;quot;init 1&amp;quot; so the server will run in level 1 (all services will stop)&lt;br /&gt;
* Umount partitions /home1 and /home2 with the commands &amp;quot;umount /home1&amp;quot; and &amp;quot;/umount /home2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then enter:&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda7 (assuming that device /dev/sda7 was the one that was mounted in /home1)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda7&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda8 (assuming that device /dev/sda8 was the one that was mounted in /home2)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda8&lt;br /&gt;
&lt;br /&gt;
Edit the /etc/fstab file by entering the command &amp;quot;vi /etc/fstab&amp;quot;&lt;br /&gt;
&lt;br /&gt;
And exchange in the lines that refer to mount point home1 and home2 where it is written &amp;quot;ext3&amp;quot; to &amp;quot;ext4&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In the end, enter:&lt;br /&gt;
reboot&lt;br /&gt;
&lt;br /&gt;
The server will boot and mount home1 and home2 with ext4. You can confirm it by entering, as root, the command &amp;quot;mount&amp;quot;&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0</id>
		<title>Update to IPBrick version 6.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0"/>
				<updated>2015-09-28T18:23:43Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Converting ext3 filesystem to ext4 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;F.A.Q. - Update to IPBrick version 6.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Does my hardware support IPBRICK v6.0? =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPBRICK version 6 is a 64 bits Operating System. It needs a CPU that supports 64 bits. Please check your hardware CPU type before upgrading to version 6.&lt;br /&gt;
&lt;br /&gt;
On IPBRICK, access the command line interface and enter the following command:&lt;br /&gt;
''grep flags /proc/cpuinfo''&lt;br /&gt;
&lt;br /&gt;
Look for lm in the command output. If lm is found in the output, then the CPU is 64-bit. If you don't see lm or see i386, i486, i586, or i686 in the output, then the CPU is 32-bit. Below is an example output of the above line with lm in the information.&lt;br /&gt;
&lt;br /&gt;
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx '''lm''' constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Is it possible to update my IPBRICK v5.x to v6.0 using updates? =&lt;br /&gt;
&lt;br /&gt;
 It isn't possible to upgrade an IPBRICK 4.x or v5.x to an IPBrick 6.0 using updates.&lt;br /&gt;
 You can only upgrade your system via an Upgrade/Reinstall with our new ISO via DVD or image installation.&lt;br /&gt;
&lt;br /&gt;
 The IPBRICK installation DVD detects a previous installation and ensures the backup of all data.&lt;br /&gt;
 However, and regardless of this, it is advisable to have a full backup of your server!&lt;br /&gt;
&lt;br /&gt;
= I have an IPBrick version 6 release candidate (RC) in a production environment. Can I update this server to the final version 6? =&lt;br /&gt;
&lt;br /&gt;
 Yes, it is possible to update from any version 6 release candidate to the final release. &lt;br /&gt;
 This update can be done simply by installing the necessary update packages through the IPBrick web interface.&lt;br /&gt;
&lt;br /&gt;
To upgrade from a RC version to another it's necessary to install the respective migration package (in some cases there are also some additional packages). The upgrade process needs to be done step by step, it means, from one RC version to another till the final version of IPBrick 6.0. The migration packages must be inserted in Advanced Configurations-&amp;gt;IPBrick-&amp;gt;Update and the installation order is the following:&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC1 to 6.0-RC2&lt;br /&gt;
&lt;br /&gt;
            - pkg1_update_01-v6.0-rc1.deb    (md5sum: 3460f302047ffd0f43abe52d9e7c1958)&lt;br /&gt;
            - pkg2_update_01-v6.0-rc1.deb    (md5sum: 943c1c121d31f16ad74a54ce4081aeb6)&lt;br /&gt;
            - migration-v60-rc1-to-v60-rc2.deb    (md5sum: c25caea099030f5cb518893bbda83460)&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC2 to 6.0-RC3&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc2-to-v60-rc3.deb (md5sum: f491481e56d793f44d6200dcc8434737)&lt;br /&gt;
            - pkg1_update_01-v6.0-rc2.deb    (md5sum: be2b9408eb634c94430c73a1c574ecdc )&lt;br /&gt;
           &lt;br /&gt;
             Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC3 to 6.0-RC4&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc3-to-v60-rc4.deb    (md5sum: 72b83d74d8c6709c45fa494ecdc5abb1 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC4 to 6.0-RC5&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc4-to-v60-rc5.deb    (md5sum: fb0a540aff8919fcedbb645aaed6c5bb)&lt;br /&gt;
       &lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC5 to 6.0 Final version&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc5-to-v60.deb    (md5sum: e960dc8fb80638fe8de786ae47f50263 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations&lt;br /&gt;
&lt;br /&gt;
= How may I backup my server's configurations?= &lt;br /&gt;
&lt;br /&gt;
 Backup the last IPBRICK configuration at: '''Advanced Configurations &amp;gt; Disaster Recovery &amp;gt; Configurations &amp;gt; Download&lt;br /&gt;
&lt;br /&gt;
= May I use the configuration file straight away?= &lt;br /&gt;
&lt;br /&gt;
 No. Send the last IPBRICK configuration to support.install@ipbrick.com and request migration to IPBrick v6.0;&lt;br /&gt;
&lt;br /&gt;
= Is this a direct conversion procedure?= &lt;br /&gt;
&lt;br /&gt;
 No. This isn't an automatic procedure. You will receive, as soon as possible, the respective configuration file.&lt;br /&gt;
&lt;br /&gt;
=  What about migrating really old versions of IPBRICK?=&lt;br /&gt;
&lt;br /&gt;
 It’s possible that, for older IPBRICK versions, the migration may not be possible to be executed directly.&lt;br /&gt;
 You may need to update first to an intermediate version and only then to IPBRICK 6.0.&lt;br /&gt;
 In these situations, we will inform you about any restrictions and how to proceed.&lt;br /&gt;
&lt;br /&gt;
= What about the applications installed in the server?= &lt;br /&gt;
&lt;br /&gt;
 If in doubt, please contact support.install@ipbrick.com we will make sure to check if your installed applications,&lt;br /&gt;
 such as Hotspot, LIVE, etc. are compatible with IPBrick v6.0.&lt;br /&gt;
&lt;br /&gt;
= Converting ext3 filesystem to ext4 =&lt;br /&gt;
&lt;br /&gt;
''' ***CONSTRUCTION IN PROGRESS*** '''&lt;br /&gt;
&lt;br /&gt;
After performing an update from a previous version of IPBrick into version 6.x, the home partitions remain with ext3 type. It is possible to convert them to ext4 by following the procedure below.&lt;br /&gt;
&lt;br /&gt;
'''Note''':  It should be done using the server console, not remotely.&lt;br /&gt;
&lt;br /&gt;
* As root, enter &amp;quot;init 1&amp;quot; so the server will run in level 1 (all services will stop)&lt;br /&gt;
* Umount partitions /home1 and /home2 with the commands &amp;quot;umount /home1&amp;quot; and &amp;quot;/umount /home2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then enter:&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda7 (assuming that device /dev/sda7 was the one that was mounted in /home1)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda7&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda8 (assuming that device /dev/sda8 was the one that was mounted in /home2)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda8&lt;br /&gt;
&lt;br /&gt;
vi /etc/fstab&lt;br /&gt;
... exchange lines from home1 and home2 of &amp;quot;ext3&amp;quot; to &amp;quot;ext4&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In the end, enter:&lt;br /&gt;
reboot&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0</id>
		<title>Update to IPBrick version 6.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0"/>
				<updated>2015-09-28T18:23:34Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Converting ext3 filesystem to ext4 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;F.A.Q. - Update to IPBrick version 6.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Does my hardware support IPBRICK v6.0? =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPBRICK version 6 is a 64 bits Operating System. It needs a CPU that supports 64 bits. Please check your hardware CPU type before upgrading to version 6.&lt;br /&gt;
&lt;br /&gt;
On IPBRICK, access the command line interface and enter the following command:&lt;br /&gt;
''grep flags /proc/cpuinfo''&lt;br /&gt;
&lt;br /&gt;
Look for lm in the command output. If lm is found in the output, then the CPU is 64-bit. If you don't see lm or see i386, i486, i586, or i686 in the output, then the CPU is 32-bit. Below is an example output of the above line with lm in the information.&lt;br /&gt;
&lt;br /&gt;
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx '''lm''' constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Is it possible to update my IPBRICK v5.x to v6.0 using updates? =&lt;br /&gt;
&lt;br /&gt;
 It isn't possible to upgrade an IPBRICK 4.x or v5.x to an IPBrick 6.0 using updates.&lt;br /&gt;
 You can only upgrade your system via an Upgrade/Reinstall with our new ISO via DVD or image installation.&lt;br /&gt;
&lt;br /&gt;
 The IPBRICK installation DVD detects a previous installation and ensures the backup of all data.&lt;br /&gt;
 However, and regardless of this, it is advisable to have a full backup of your server!&lt;br /&gt;
&lt;br /&gt;
= I have an IPBrick version 6 release candidate (RC) in a production environment. Can I update this server to the final version 6? =&lt;br /&gt;
&lt;br /&gt;
 Yes, it is possible to update from any version 6 release candidate to the final release. &lt;br /&gt;
 This update can be done simply by installing the necessary update packages through the IPBrick web interface.&lt;br /&gt;
&lt;br /&gt;
To upgrade from a RC version to another it's necessary to install the respective migration package (in some cases there are also some additional packages). The upgrade process needs to be done step by step, it means, from one RC version to another till the final version of IPBrick 6.0. The migration packages must be inserted in Advanced Configurations-&amp;gt;IPBrick-&amp;gt;Update and the installation order is the following:&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC1 to 6.0-RC2&lt;br /&gt;
&lt;br /&gt;
            - pkg1_update_01-v6.0-rc1.deb    (md5sum: 3460f302047ffd0f43abe52d9e7c1958)&lt;br /&gt;
            - pkg2_update_01-v6.0-rc1.deb    (md5sum: 943c1c121d31f16ad74a54ce4081aeb6)&lt;br /&gt;
            - migration-v60-rc1-to-v60-rc2.deb    (md5sum: c25caea099030f5cb518893bbda83460)&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC2 to 6.0-RC3&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc2-to-v60-rc3.deb (md5sum: f491481e56d793f44d6200dcc8434737)&lt;br /&gt;
            - pkg1_update_01-v6.0-rc2.deb    (md5sum: be2b9408eb634c94430c73a1c574ecdc )&lt;br /&gt;
           &lt;br /&gt;
             Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC3 to 6.0-RC4&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc3-to-v60-rc4.deb    (md5sum: 72b83d74d8c6709c45fa494ecdc5abb1 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC4 to 6.0-RC5&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc4-to-v60-rc5.deb    (md5sum: fb0a540aff8919fcedbb645aaed6c5bb)&lt;br /&gt;
       &lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC5 to 6.0 Final version&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc5-to-v60.deb    (md5sum: e960dc8fb80638fe8de786ae47f50263 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations&lt;br /&gt;
&lt;br /&gt;
= How may I backup my server's configurations?= &lt;br /&gt;
&lt;br /&gt;
 Backup the last IPBRICK configuration at: '''Advanced Configurations &amp;gt; Disaster Recovery &amp;gt; Configurations &amp;gt; Download&lt;br /&gt;
&lt;br /&gt;
= May I use the configuration file straight away?= &lt;br /&gt;
&lt;br /&gt;
 No. Send the last IPBRICK configuration to support.install@ipbrick.com and request migration to IPBrick v6.0;&lt;br /&gt;
&lt;br /&gt;
= Is this a direct conversion procedure?= &lt;br /&gt;
&lt;br /&gt;
 No. This isn't an automatic procedure. You will receive, as soon as possible, the respective configuration file.&lt;br /&gt;
&lt;br /&gt;
=  What about migrating really old versions of IPBRICK?=&lt;br /&gt;
&lt;br /&gt;
 It’s possible that, for older IPBRICK versions, the migration may not be possible to be executed directly.&lt;br /&gt;
 You may need to update first to an intermediate version and only then to IPBRICK 6.0.&lt;br /&gt;
 In these situations, we will inform you about any restrictions and how to proceed.&lt;br /&gt;
&lt;br /&gt;
= What about the applications installed in the server?= &lt;br /&gt;
&lt;br /&gt;
 If in doubt, please contact support.install@ipbrick.com we will make sure to check if your installed applications,&lt;br /&gt;
 such as Hotspot, LIVE, etc. are compatible with IPBrick v6.0.&lt;br /&gt;
&lt;br /&gt;
= Converting ext3 filesystem to ext4 =&lt;br /&gt;
&lt;br /&gt;
''' ***CONSTRUCTION IN PROGRESS*** '''&lt;br /&gt;
&lt;br /&gt;
After performing an update from a previous version of IPBrick into version 6.x, the home partitions remain with ext3 type. It is possible to convert them to ext4 by following the procedure below.&lt;br /&gt;
&lt;br /&gt;
Note:  It should be done using the server console, not remotely.&lt;br /&gt;
&lt;br /&gt;
* As root, enter &amp;quot;init 1&amp;quot; so the server will run in level 1 (all services will stop)&lt;br /&gt;
* Umount partitions /home1 and /home2 with the commands &amp;quot;umount /home1&amp;quot; and &amp;quot;/umount /home2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then enter:&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda7 (assuming that device /dev/sda7 was the one that was mounted in /home1)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda7&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda8 (assuming that device /dev/sda8 was the one that was mounted in /home2)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda8&lt;br /&gt;
&lt;br /&gt;
vi /etc/fstab&lt;br /&gt;
... exchange lines from home1 and home2 of &amp;quot;ext3&amp;quot; to &amp;quot;ext4&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In the end, enter:&lt;br /&gt;
reboot&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0</id>
		<title>Update to IPBrick version 6.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Update_to_IPBrick_version_6.0"/>
				<updated>2015-09-28T18:23:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Converting ext3 filesystem to ext4 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;F.A.Q. - Update to IPBrick version 6.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Does my hardware support IPBRICK v6.0? =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPBRICK version 6 is a 64 bits Operating System. It needs a CPU that supports 64 bits. Please check your hardware CPU type before upgrading to version 6.&lt;br /&gt;
&lt;br /&gt;
On IPBRICK, access the command line interface and enter the following command:&lt;br /&gt;
''grep flags /proc/cpuinfo''&lt;br /&gt;
&lt;br /&gt;
Look for lm in the command output. If lm is found in the output, then the CPU is 64-bit. If you don't see lm or see i386, i486, i586, or i686 in the output, then the CPU is 32-bit. Below is an example output of the above line with lm in the information.&lt;br /&gt;
&lt;br /&gt;
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx '''lm''' constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Is it possible to update my IPBRICK v5.x to v6.0 using updates? =&lt;br /&gt;
&lt;br /&gt;
 It isn't possible to upgrade an IPBRICK 4.x or v5.x to an IPBrick 6.0 using updates.&lt;br /&gt;
 You can only upgrade your system via an Upgrade/Reinstall with our new ISO via DVD or image installation.&lt;br /&gt;
&lt;br /&gt;
 The IPBRICK installation DVD detects a previous installation and ensures the backup of all data.&lt;br /&gt;
 However, and regardless of this, it is advisable to have a full backup of your server!&lt;br /&gt;
&lt;br /&gt;
= I have an IPBrick version 6 release candidate (RC) in a production environment. Can I update this server to the final version 6? =&lt;br /&gt;
&lt;br /&gt;
 Yes, it is possible to update from any version 6 release candidate to the final release. &lt;br /&gt;
 This update can be done simply by installing the necessary update packages through the IPBrick web interface.&lt;br /&gt;
&lt;br /&gt;
To upgrade from a RC version to another it's necessary to install the respective migration package (in some cases there are also some additional packages). The upgrade process needs to be done step by step, it means, from one RC version to another till the final version of IPBrick 6.0. The migration packages must be inserted in Advanced Configurations-&amp;gt;IPBrick-&amp;gt;Update and the installation order is the following:&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC1 to 6.0-RC2&lt;br /&gt;
&lt;br /&gt;
            - pkg1_update_01-v6.0-rc1.deb    (md5sum: 3460f302047ffd0f43abe52d9e7c1958)&lt;br /&gt;
            - pkg2_update_01-v6.0-rc1.deb    (md5sum: 943c1c121d31f16ad74a54ce4081aeb6)&lt;br /&gt;
            - migration-v60-rc1-to-v60-rc2.deb    (md5sum: c25caea099030f5cb518893bbda83460)&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC2 to 6.0-RC3&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc2-to-v60-rc3.deb (md5sum: f491481e56d793f44d6200dcc8434737)&lt;br /&gt;
            - pkg1_update_01-v6.0-rc2.deb    (md5sum: be2b9408eb634c94430c73a1c574ecdc )&lt;br /&gt;
           &lt;br /&gt;
             Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC3 to 6.0-RC4&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc3-to-v60-rc4.deb    (md5sum: 72b83d74d8c6709c45fa494ecdc5abb1 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC4 to 6.0-RC5&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc4-to-v60-rc5.deb    (md5sum: fb0a540aff8919fcedbb645aaed6c5bb)&lt;br /&gt;
       &lt;br /&gt;
            Apply Configurations (Applying configurations will reboot IPBrick!)&lt;br /&gt;
&lt;br /&gt;
    Upgrade from 6.0-RC5 to 6.0 Final version&lt;br /&gt;
&lt;br /&gt;
            - migration-v60-rc5-to-v60.deb    (md5sum: e960dc8fb80638fe8de786ae47f50263 )&lt;br /&gt;
&lt;br /&gt;
            Apply Configurations&lt;br /&gt;
&lt;br /&gt;
= How may I backup my server's configurations?= &lt;br /&gt;
&lt;br /&gt;
 Backup the last IPBRICK configuration at: '''Advanced Configurations &amp;gt; Disaster Recovery &amp;gt; Configurations &amp;gt; Download&lt;br /&gt;
&lt;br /&gt;
= May I use the configuration file straight away?= &lt;br /&gt;
&lt;br /&gt;
 No. Send the last IPBRICK configuration to support.install@ipbrick.com and request migration to IPBrick v6.0;&lt;br /&gt;
&lt;br /&gt;
= Is this a direct conversion procedure?= &lt;br /&gt;
&lt;br /&gt;
 No. This isn't an automatic procedure. You will receive, as soon as possible, the respective configuration file.&lt;br /&gt;
&lt;br /&gt;
=  What about migrating really old versions of IPBRICK?=&lt;br /&gt;
&lt;br /&gt;
 It’s possible that, for older IPBRICK versions, the migration may not be possible to be executed directly.&lt;br /&gt;
 You may need to update first to an intermediate version and only then to IPBRICK 6.0.&lt;br /&gt;
 In these situations, we will inform you about any restrictions and how to proceed.&lt;br /&gt;
&lt;br /&gt;
= What about the applications installed in the server?= &lt;br /&gt;
&lt;br /&gt;
 If in doubt, please contact support.install@ipbrick.com we will make sure to check if your installed applications,&lt;br /&gt;
 such as Hotspot, LIVE, etc. are compatible with IPBrick v6.0.&lt;br /&gt;
&lt;br /&gt;
= Converting ext3 filesystem to ext4 =&lt;br /&gt;
&lt;br /&gt;
''' ***CONSTRUCTION IN PROGRESS*** '''&lt;br /&gt;
&lt;br /&gt;
After performing an update from a previous version of IPBrick into version 6.x, the home partitions remain with ext3 type. It is possible to convert them to ext4 by following the procedure below. It should be done using the server console, not remotely.&lt;br /&gt;
&lt;br /&gt;
* As root, enter &amp;quot;init 1&amp;quot; so the server will run in level 1 (all services will stop)&lt;br /&gt;
* Umount partitions /home1 and /home2 with the commands &amp;quot;umount /home1&amp;quot; and &amp;quot;/umount /home2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Then enter:&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda7 (assuming that device /dev/sda7 was the one that was mounted in /home1)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda7&lt;br /&gt;
&lt;br /&gt;
* tune2fs -O extents,uninit_bg,dir_index /dev/sda8 (assuming that device /dev/sda8 was the one that was mounted in /home2)&lt;br /&gt;
* e2fsck -fDC0 /dev/sda8&lt;br /&gt;
&lt;br /&gt;
vi /etc/fstab&lt;br /&gt;
... exchange lines from home1 and home2 of &amp;quot;ext3&amp;quot; to &amp;quot;ext4&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In the end, enter:&lt;br /&gt;
reboot&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/VoIP_FAQS</id>
		<title>VoIP FAQS</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/VoIP_FAQS"/>
				<updated>2015-09-25T16:22:50Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[VoIP_FAQS_Fallback|Fallback]]&lt;br /&gt;
* [[VoIP_FAQS_RemotePhone|Register a remote phone]]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1</id>
		<title>How to buy and configure a SSL certificate at IPBrick 6.1</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/How_to_buy_and_configure_a_SSL_certificate_at_IPBrick_6.1"/>
				<updated>2015-08-03T17:10:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The site www.ssls.com is a good option to buy cheap SSL certificates. Its possible to have a certificate for a FQDN for less than $7 a year.&lt;br /&gt;
&lt;br /&gt;
Here are presented the steps to buy a Wildcard certificate and to configure it at IPBrick 6.1. So its a certificate type that can be used for all names and services from a DNS domain. &lt;br /&gt;
&lt;br /&gt;
Let suppose first the following info:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Country: Portugal&lt;br /&gt;
City: Porto&lt;br /&gt;
Company Name: Domain&lt;br /&gt;
DNS domain: domain.com&lt;br /&gt;
Wildcard certificate: *.domain.com&lt;br /&gt;
Approver email: administrator@domain.com&lt;br /&gt;
Email to receive the certificate: jsmith@xpto.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
so in that case, the certificate is valid for all names under the domain &amp;quot;domain.com&amp;quot;. Eg: domain.com, groupware.domain.com, www.domain.com, cafe.domain.com, iportaldoc.domain.com.&lt;br /&gt;
&lt;br /&gt;
=CSR generation=&lt;br /&gt;
&lt;br /&gt;
* Go to Advanced Configurations - IPBrick - Certificates and Insert a certificate. Eg: wildcard-domain-2015&lt;br /&gt;
* Click at Certificate and generate the Private Key. After that generate the CSR with the following definitions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Country code: PT&lt;br /&gt;
State or province: Porto&lt;br /&gt;
City: Porto&lt;br /&gt;
Company: Domain  &lt;br /&gt;
Department:   &lt;br /&gt;
Common Name (CN): *.domain.com&lt;br /&gt;
Email: jsmith@xpto.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NOTE: If you are buying not a wildcard certificate but a certificate for a specific name/FQDN like groupware.domain.com, the CN must be: groupware.domain.com&lt;br /&gt;
&lt;br /&gt;
* Download the CSR&lt;br /&gt;
&lt;br /&gt;
=Buy a certificate from www.ssls.com=&lt;br /&gt;
&lt;br /&gt;
* Go to www.ssls.com and register with a new account&lt;br /&gt;
* Sign in and choose the cheapest CA to buy a Wildcard certificate and the number of years. Eg: PositiveSSL, 1 year&lt;br /&gt;
* Activate the certificate&lt;br /&gt;
&lt;br /&gt;
# When activating enter the file .CSR (generated at IPBrick)&lt;br /&gt;
# Choose the email approval - administrator@domain.com&lt;br /&gt;
# Go to administrator@domain.com email account and aprove it.&lt;br /&gt;
# Enter the company information and the email address that will receive the certificate (jsmith@xpto.com)&lt;br /&gt;
&lt;br /&gt;
=Install the certificate at IPBrick=&lt;br /&gt;
&lt;br /&gt;
* Go to jsmith@xpto.com email account and download and decompress the .zip file attached. The content is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
COMODORSADomainValidationSecureServerCA.crt -&amp;gt; Intermediate 2 CA certificate&lt;br /&gt;
COMODORSAAddTrustCA.crt -&amp;gt; Intermediate 1 CA certificate&lt;br /&gt;
AddTrustExternalCARoot.crt -&amp;gt; Root CA certificate&lt;br /&gt;
STAR_domain_com.crt -&amp;gt; Your Wildcard certificate&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Open the following files at Notepad:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
COMODORSADomainValidationSecureServerCA.crt&lt;br /&gt;
COMODORSAAddTrustCA.crt&lt;br /&gt;
AddTrustExternalCARoot.crt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Create a new file called ca_bundle.crt and concatenate all the three files content in that order&lt;br /&gt;
* Go back to IPBrick at Configurations - IPBrick - Certificates, click at wildcard-domain-2015 and at &amp;quot;Certificate&amp;quot; insert the file STAR_domain_com.crt&lt;br /&gt;
* Choose &amp;quot;Certificate Authority (CA)&amp;quot; and insert the file ca_bundle.crt&lt;br /&gt;
* Hit &amp;quot;Back&amp;quot; and at &amp;quot;Services with certificate&amp;quot; option, choose the certificate wildcard-domain-2015 for all the services.&lt;br /&gt;
* Apply Configurations&lt;br /&gt;
* Now all the client applications running SSL will accept the certificate (browsers, email clients etc.)&lt;br /&gt;
&lt;br /&gt;
NOTE: If the current IPBrick have a valid SSL certificate manually installed by the IPBrick Support Team, please send an email to support@ipbrick.com in order to check the configurations&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/VMWare_tools_for_IPBrick_6.X</id>
		<title>VMWare tools for IPBrick 6.X</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/VMWare_tools_for_IPBrick_6.X"/>
				<updated>2015-07-23T11:54:46Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Installation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Installation =&lt;br /&gt;
&lt;br /&gt;
 ipbrick:~# apt-get update&lt;br /&gt;
&lt;br /&gt;
 ipbrick:~# apt-get install open-vm-tools&lt;br /&gt;
 Reading package lists... Done&lt;br /&gt;
 Building dependency tree       &lt;br /&gt;
 Reading state information... Done&lt;br /&gt;
 The following extra packages will be installed:&lt;br /&gt;
   dkms menu open-vm-dkms zerofree&lt;br /&gt;
 Suggested packages:&lt;br /&gt;
   menu-l10n open-vm-toolbox&lt;br /&gt;
 The following NEW packages will be installed:&lt;br /&gt;
   dkms menu open-vm-dkms open-vm-tools zerofree&lt;br /&gt;
 0 upgraded, 5 newly installed, 0 to remove and 253 not upgraded.&lt;br /&gt;
 Need to get 2645 kB of archives.&lt;br /&gt;
 After this operation, 10.6 MB of additional disk space will be used.&lt;br /&gt;
 Do you want to continue [Y/n]? y&lt;br /&gt;
 Get:1 http://ftp.pt.debian.org/debian/ stable/main dkms all 2.2.0.3-1.2 [77.4 kB]&lt;br /&gt;
 Get:2 http://ftp.pt.debian.org/debian/ stable/main menu amd64 2.1.46 [480 kB]&lt;br /&gt;
 Get:3 http://ftp.pt.debian.org/debian/ stable/main open-vm-dkms all 2:8.8.0+2012.05.21-724730-1+nmu2 [1221 kB]&lt;br /&gt;
 Get:4 http://ftp.pt.debian.org/debian/ stable/main open-vm-tools amd64 2:8.8.0+2012.05.21-724730-1+nmu2 [858 kB]&lt;br /&gt;
 Get:5 http://ftp.pt.debian.org/debian/ stable/main zerofree amd64 1.0.2-1 [8398 B]&lt;br /&gt;
 Fetched 2645 kB in 5s (469 kB/s)&lt;br /&gt;
 Selecting previously unselected package dkms.&lt;br /&gt;
 (Reading database ... 95%&lt;br /&gt;
 (Reading database ... 183125 files and directories currently installed.)&lt;br /&gt;
 Unpacking dkms (from .../dkms_2.2.0.3-1.2_all.deb) ...&lt;br /&gt;
 Selecting previously unselected package menu.&lt;br /&gt;
 Unpacking menu (from .../archives/menu_2.1.46_amd64.deb) ...&lt;br /&gt;
 Selecting previously unselected package open-vm-dkms.&lt;br /&gt;
 Unpacking open-vm-dkms (from .../open-vm-dkms_2%3a8.8.0+2012.05.21-724730-1+nmu2_all.deb) ...&lt;br /&gt;
 Selecting previously unselected package open-vm-tools.&lt;br /&gt;
 Unpacking open-vm-tools (from .../open-vm-tools_2%3a8.8.0+2012.05.21-724730-1+nmu2_amd64.deb) ...&lt;br /&gt;
 Selecting previously unselected package zerofree.&lt;br /&gt;
 Unpacking zerofree (from .../zerofree_1.0.2-1_amd64.deb) ...&lt;br /&gt;
 Processing triggers for man-db ...&lt;br /&gt;
 Processing triggers for install-info ...&lt;br /&gt;
 Processing triggers for initramfs-tools ...&lt;br /&gt;
 update-initramfs: Generating /boot/initrd.img-3.2.0-4-amd64&lt;br /&gt;
 W: mdadm: /etc/mdadm/mdadm.conf defines no arrays.&lt;br /&gt;
  /usr/share/initramfs-tools/hooks/mdadm: line 156: 17329 Terminated              /usr/share/mdadm/mkconf &amp;gt; $tmpfile&lt;br /&gt;
 W: mdadm: failed to auto-generate temporary mdadm.conf file.&lt;br /&gt;
 W: mdadm: no configuration file available.&lt;br /&gt;
 Setting up dkms (2.2.0.3-1.2) ...&lt;br /&gt;
 Setting up menu (2.1.46) ...&lt;br /&gt;
 Setting up open-vm-dkms (2:8.8.0+2012.05.21-724730-1+nmu2) ...&lt;br /&gt;
 Loading new open-vm-tools-2012.05.21 DKMS files...&lt;br /&gt;
 First Installation: checking all kernels...&lt;br /&gt;
 Building only for 3.2.0-4-amd64&lt;br /&gt;
 Building initial module for 3.2.0-4-amd64&lt;br /&gt;
 Done.&lt;br /&gt;
 &lt;br /&gt;
 vmblock:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/&lt;br /&gt;
 &lt;br /&gt;
 vmci.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/ &lt;br /&gt;
 &lt;br /&gt;
 vmhgfs.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/  &lt;br /&gt;
 &lt;br /&gt;
 vmsync.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/&lt;br /&gt;
 &lt;br /&gt;
 vmxnet.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/  &lt;br /&gt;
 &lt;br /&gt;
 vsock.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/&lt;br /&gt;
 &lt;br /&gt;
 depmod.......................................&lt;br /&gt;
 &lt;br /&gt;
 DKMS: install completed.&lt;br /&gt;
 Setting up open-vm-tools (2:8.8.0+2012.05.21-724730-1+nmu2) ...&lt;br /&gt;
 . ok &lt;br /&gt;
 update-initramfs: deferring update (trigger activated)&lt;br /&gt;
 . ok &lt;br /&gt;
 Setting up zerofree (1.0.2-1) ...&lt;br /&gt;
 Processing triggers for menu ...&lt;br /&gt;
 Processing triggers for initramfs-tools ...&lt;br /&gt;
 update-initramfs: Generating /boot/initrd.img-3.2.0-4-amd64&lt;br /&gt;
 W: mdadm: /etc/mdadm/mdadm.conf defines no arrays.&lt;br /&gt;
 /usr/share/initramfs-tools/hooks/mdadm: line 156: 30635 Terminated              /usr/share/mdadm/mkconf &amp;gt; $tmpfile&lt;br /&gt;
 W: mdadm: failed to auto-generate temporary mdadm.conf file.&lt;br /&gt;
 W: mdadm: no configuration file available.&lt;br /&gt;
 &lt;br /&gt;
 ipbrick:~#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Restart the server&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/VMWare_tools_for_IPBrick_6.X</id>
		<title>VMWare tools for IPBrick 6.X</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/VMWare_tools_for_IPBrick_6.X"/>
				<updated>2015-07-23T11:54:22Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: Created page with &amp;quot;= Installation =   ipbrick:~# apt-get install open-vm-tools  Reading package lists... Done  Building dependency tree         Reading state information... Done  The following e...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Installation =&lt;br /&gt;
&lt;br /&gt;
 ipbrick:~# apt-get install open-vm-tools&lt;br /&gt;
 Reading package lists... Done&lt;br /&gt;
 Building dependency tree       &lt;br /&gt;
 Reading state information... Done&lt;br /&gt;
 The following extra packages will be installed:&lt;br /&gt;
   dkms menu open-vm-dkms zerofree&lt;br /&gt;
 Suggested packages:&lt;br /&gt;
   menu-l10n open-vm-toolbox&lt;br /&gt;
 The following NEW packages will be installed:&lt;br /&gt;
   dkms menu open-vm-dkms open-vm-tools zerofree&lt;br /&gt;
 0 upgraded, 5 newly installed, 0 to remove and 253 not upgraded.&lt;br /&gt;
 Need to get 2645 kB of archives.&lt;br /&gt;
 After this operation, 10.6 MB of additional disk space will be used.&lt;br /&gt;
 Do you want to continue [Y/n]? y&lt;br /&gt;
 Get:1 http://ftp.pt.debian.org/debian/ stable/main dkms all 2.2.0.3-1.2 [77.4 kB]&lt;br /&gt;
 Get:2 http://ftp.pt.debian.org/debian/ stable/main menu amd64 2.1.46 [480 kB]&lt;br /&gt;
 Get:3 http://ftp.pt.debian.org/debian/ stable/main open-vm-dkms all 2:8.8.0+2012.05.21-724730-1+nmu2 [1221 kB]&lt;br /&gt;
 Get:4 http://ftp.pt.debian.org/debian/ stable/main open-vm-tools amd64 2:8.8.0+2012.05.21-724730-1+nmu2 [858 kB]&lt;br /&gt;
 Get:5 http://ftp.pt.debian.org/debian/ stable/main zerofree amd64 1.0.2-1 [8398 B]&lt;br /&gt;
 Fetched 2645 kB in 5s (469 kB/s)&lt;br /&gt;
 Selecting previously unselected package dkms.&lt;br /&gt;
 (Reading database ... 95%&lt;br /&gt;
 (Reading database ... 183125 files and directories currently installed.)&lt;br /&gt;
 Unpacking dkms (from .../dkms_2.2.0.3-1.2_all.deb) ...&lt;br /&gt;
 Selecting previously unselected package menu.&lt;br /&gt;
 Unpacking menu (from .../archives/menu_2.1.46_amd64.deb) ...&lt;br /&gt;
 Selecting previously unselected package open-vm-dkms.&lt;br /&gt;
 Unpacking open-vm-dkms (from .../open-vm-dkms_2%3a8.8.0+2012.05.21-724730-1+nmu2_all.deb) ...&lt;br /&gt;
 Selecting previously unselected package open-vm-tools.&lt;br /&gt;
 Unpacking open-vm-tools (from .../open-vm-tools_2%3a8.8.0+2012.05.21-724730-1+nmu2_amd64.deb) ...&lt;br /&gt;
 Selecting previously unselected package zerofree.&lt;br /&gt;
 Unpacking zerofree (from .../zerofree_1.0.2-1_amd64.deb) ...&lt;br /&gt;
 Processing triggers for man-db ...&lt;br /&gt;
 Processing triggers for install-info ...&lt;br /&gt;
 Processing triggers for initramfs-tools ...&lt;br /&gt;
 update-initramfs: Generating /boot/initrd.img-3.2.0-4-amd64&lt;br /&gt;
 W: mdadm: /etc/mdadm/mdadm.conf defines no arrays.&lt;br /&gt;
  /usr/share/initramfs-tools/hooks/mdadm: line 156: 17329 Terminated              /usr/share/mdadm/mkconf &amp;gt; $tmpfile&lt;br /&gt;
 W: mdadm: failed to auto-generate temporary mdadm.conf file.&lt;br /&gt;
 W: mdadm: no configuration file available.&lt;br /&gt;
 Setting up dkms (2.2.0.3-1.2) ...&lt;br /&gt;
 Setting up menu (2.1.46) ...&lt;br /&gt;
 Setting up open-vm-dkms (2:8.8.0+2012.05.21-724730-1+nmu2) ...&lt;br /&gt;
 Loading new open-vm-tools-2012.05.21 DKMS files...&lt;br /&gt;
 First Installation: checking all kernels...&lt;br /&gt;
 Building only for 3.2.0-4-amd64&lt;br /&gt;
 Building initial module for 3.2.0-4-amd64&lt;br /&gt;
 Done.&lt;br /&gt;
 &lt;br /&gt;
 vmblock:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/&lt;br /&gt;
 &lt;br /&gt;
 vmci.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/ &lt;br /&gt;
 &lt;br /&gt;
 vmhgfs.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/  &lt;br /&gt;
 &lt;br /&gt;
 vmsync.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/&lt;br /&gt;
 &lt;br /&gt;
 vmxnet.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/  &lt;br /&gt;
 &lt;br /&gt;
 vsock.ko:&lt;br /&gt;
 Running module version sanity check.&lt;br /&gt;
  - Original module&lt;br /&gt;
    - No original module exists within this kernel&lt;br /&gt;
  - Installation&lt;br /&gt;
    - Installing to /lib/modules/3.2.0-4-amd64/updates/dkms/&lt;br /&gt;
 &lt;br /&gt;
 depmod.......................................&lt;br /&gt;
 &lt;br /&gt;
 DKMS: install completed.&lt;br /&gt;
 Setting up open-vm-tools (2:8.8.0+2012.05.21-724730-1+nmu2) ...&lt;br /&gt;
 . ok &lt;br /&gt;
 update-initramfs: deferring update (trigger activated)&lt;br /&gt;
 . ok &lt;br /&gt;
 Setting up zerofree (1.0.2-1) ...&lt;br /&gt;
 Processing triggers for menu ...&lt;br /&gt;
 Processing triggers for initramfs-tools ...&lt;br /&gt;
 update-initramfs: Generating /boot/initrd.img-3.2.0-4-amd64&lt;br /&gt;
 W: mdadm: /etc/mdadm/mdadm.conf defines no arrays.&lt;br /&gt;
 /usr/share/initramfs-tools/hooks/mdadm: line 156: 30635 Terminated              /usr/share/mdadm/mkconf &amp;gt; $tmpfile&lt;br /&gt;
 W: mdadm: failed to auto-generate temporary mdadm.conf file.&lt;br /&gt;
 W: mdadm: no configuration file available.&lt;br /&gt;
 &lt;br /&gt;
 ipbrick:~#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Restart the server&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/Operating_System</id>
		<title>Operating System</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/Operating_System"/>
				<updated>2015-07-23T11:52:26Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: /* Configuration Hints */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to IPBrick.IC support ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[What is new at IPBrick.IC version 6.0]]&lt;br /&gt;
* [[Update to IPBrick version 6.0]]&lt;br /&gt;
* [[Licensing IPBrick]]&lt;br /&gt;
* [[How to update IPBrick]]&lt;br /&gt;
&lt;br /&gt;
== Information per service ==&lt;br /&gt;
&lt;br /&gt;
* IPBrick.I&lt;br /&gt;
** [[Domain Server]]&lt;br /&gt;
** [[File Server]]&lt;br /&gt;
** [[Email Server]]&lt;br /&gt;
** [[Backup]]&lt;br /&gt;
&lt;br /&gt;
* IPBrick.C&lt;br /&gt;
** [[Email Server]]&lt;br /&gt;
** [[FTP Server]]&lt;br /&gt;
** [[VPN PPTP]]&lt;br /&gt;
** [[VoIP]]&lt;br /&gt;
&lt;br /&gt;
== Information per Apps ==&lt;br /&gt;
&lt;br /&gt;
* [[Archipel]]&lt;br /&gt;
* [[CAFE]]&lt;br /&gt;
* [[Contacts]]&lt;br /&gt;
* [[Groupware]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Configuration Hints ==&lt;br /&gt;
&lt;br /&gt;
* [[Registering Phones with Open-VPN]]&lt;br /&gt;
* [[UCoIP DNS/firewall configuration]]&lt;br /&gt;
* [[How to buy and configure a SSL certificate at IPBrick 6.1]]&lt;br /&gt;
* [[IPBrick Disk migration]]&lt;br /&gt;
* [[VMWare tools for IPBrick 6.X]]&lt;br /&gt;
&lt;br /&gt;
== Known Issues ==&lt;br /&gt;
* IPBrick v6.0&lt;br /&gt;
** [[NIC device detection/management]]&lt;br /&gt;
** [[Network Configuration / DHCP General Options Network Mask]]&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	<entry>
		<id>https://wiki.ipbrick.com/index.php/IPBrick_Disk_migration</id>
		<title>IPBrick Disk migration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ipbrick.com/index.php/IPBrick_Disk_migration"/>
				<updated>2015-07-07T10:19:01Z</updated>
		
		<summary type="html">&lt;p&gt;Ipbwikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=&amp;lt;big&amp;gt;'''IPBrick Disk migration'''&amp;lt;/big&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
Apply configuration and save the configurations file to your Desktop.&lt;br /&gt;
&lt;br /&gt;
Just stop the the services you use.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/init.d/asterisk stop&lt;br /&gt;
/etc/init.d/apache2 stop&lt;br /&gt;
/etc/init.d/ejabberd stop&lt;br /&gt;
/etc/init.d/qmail stop&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Execute this command to backup all the data bases.&lt;br /&gt;
&amp;lt;pre&amp;gt;php5 /opt/system/backupSYS/backup_DBs.php &amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Install the IPBrick on the new machine or on the new disk.&lt;br /&gt;
&lt;br /&gt;
Make the rsync command to copy all the data to the new disk,&lt;br /&gt;
Some examples of rsync &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==='''rsync using local machine only, (device attached by usb)'''===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
See the disks on machine&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
fdisk -l&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You must have 2 disk sda and sdb&lt;br /&gt;
&lt;br /&gt;
And see the partition table off the two devices. &lt;br /&gt;
&lt;br /&gt;
Then create 2 folders&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mkdir /old_home1&lt;br /&gt;
mkdir /old_home2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then we need to mount the partitions we need to copy.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mount /dev/sdb7 /old_home1&lt;br /&gt;
mount /dev/sdb8 /old_home2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now lets start the rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rsync -aAuv /old_home1 /home1 &amp;gt; rsync_home1.log 2&amp;gt; rsync_home1.err &amp;amp;&lt;br /&gt;
rsync -aAuv /old_home2 /home2 &amp;gt; rsync_home2.log 2&amp;gt; rsync_home2.err &amp;amp;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see the logs in this file -&amp;gt; rsync_home1.log&lt;br /&gt;
Or the errors in this file -&amp;gt; rsync_home1.err&lt;br /&gt;
&lt;br /&gt;
Wen the rsync is finish access to web interface and then insert and replace the configuration that you save on your desktop.&lt;br /&gt;
&lt;br /&gt;
After replacing, go to Advanced configuration -&amp;gt; disaster recovery -&amp;gt; aplication -&amp;gt; data bases -&amp;gt; and replace the last one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wen this Finnish test the services you have on IPBrick.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==='''rsync using 2 IPBrick'''===&lt;br /&gt;
----&lt;br /&gt;
EX: IPBrick1 New (192.168.69.199) and IPBrick2 OLD (192.168.69.200)&lt;br /&gt;
&lt;br /&gt;
On machine IPBrick2 open ssh to root&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cat /etc/ssh/sshusers-allowed&lt;br /&gt;
operator&lt;br /&gt;
root&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
insert the line root on the file.&lt;br /&gt;
&lt;br /&gt;
Now lets start the rsync on IPBrick1&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rsync -avz --rsh=&amp;quot;ssh -l root&amp;quot; 192.168.69.200:/home1 /home1 &amp;gt; rsync_home1.log 2&amp;gt; rsync_home1.err&lt;br /&gt;
rsync -avz --rsh=&amp;quot;ssh -l root&amp;quot; 192.168.69.200:/home2 /home2 &amp;gt; rsync_home2.log 2&amp;gt; rsync_home2.err&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* the route password will be prompt to insert.  &lt;br /&gt;
&lt;br /&gt;
You can see the logs in this file -&amp;gt; rsync_home1.log&lt;br /&gt;
Or the errors in this file -&amp;gt; rsync_home1.err&lt;br /&gt;
&lt;br /&gt;
Wen the rsync is finish access to web interface and then insert and replace the configuration that you save on your desktop.&lt;br /&gt;
&lt;br /&gt;
After replacing, go to Advanced configuration -&amp;gt; disaster recovery -&amp;gt; aplication -&amp;gt; data bases -&amp;gt; and replace the last one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wen this Finnish test the services you have on IPBrick.&lt;/div&gt;</summary>
		<author><name>Ipbwikiadmin</name></author>	</entry>

	</feed>