Before Softphone Mobile is activated, the basic function (device selection and AnyDevice calls) of the mobile app should ideally be available in V9.
If a message regarding missing devices appears in the Mobile Client, please check the points from the following article: https://www.c4b.com/en/knowledgebase/mobile-app/no-devices-mobile-app.php
All relevant ports for using Softphone Mobile can be found here: https://help.c4b.com/xphone-connect-9/doc/de/admin/start/sys-req/infrstrctr.html#ports
Enabling the feature for sites and configuration groups
By default, the use of the Softphone Mobile feature is deactivated. The item can be enabled per configuration group or location. For example, open a location, navigate to Settings > Telephony and set the following check mark:
Setting up the STUN server
In order to use Softphone Mobile, it is mandatory to configure a STUN server. We recommend the Sipgate STUN server, but any other STUN can also be used. Proceed as follows:
- Navigate to Telephony & Meetings > Network
- Click on "Add..." for the STUN server.
- Set the name, FQDN/IP and port e.g.:
4. click Apply, and then click Save on the Network page.
5. open the SIP gateway under Telephony & Meetings > Telephony > SIP
6. check the box "Use STUN Server" and save the setting (Attention: triggers a SIP gateway reboot)
If required: Configuration of the ACL's (white and black list).
If you or your customer should work e.g. via VPN or if there should be other special features in the network, the ACL's must be adapted. We distinguish two areas here:
Private IP address ranges (whitelist)
It is mandatory to enter the private address range (trusted network) configured in the company here. This configuration is used to detect which communication subscribers are located in the internal network (LAN, VPN). This ensures that for softphone calls of all types, the audio-media connection remains within the company network.
What must be entered?
- Local client IP address ranges of the company network
- Loopback address 127.0.0.1 (if the XCC is not outsourced)
- VPN address (if no payload separation is planned)
Access control via IP address ranges (blacklist)
The networks listed here are not used for media communication. IP addresses from these ranges are not considered when negotiating the possible RTP connection candidates. List networks here that are not or should not be VoIP-capable.
Note: The whitelist entries prick the blacklist entries.
When all the above steps have been performed, the Mobile Client can be restarted and the function tested.
Article is closed for comments.