Having completed the basic configuration, the new configuration needs to be saved back to the system. This will very likely require the system to reboot.
After saving the configuration, reload it into IP Office Manager;
•If the IP address settings were changed, you may need to change your PC settings to reload the configuration.
To save configuration changes using IP Office Manager:
1.Click OK to save any changes to the current menu.
2.Click on the icon. The Save Configuration menu appears.
This method is automatically selected if none of the configuration changes made require a system reboot. If this method is used for a configuration that includes changes that do require a reboot, those changes are not applied until the system is manually rebooted.
This method saves the new configuration changes and then restarts the system. Any current calls and services in progress are ended. This method is automatically selected if any of the changes made so far require a reboot before they are applied to the system.
This method allows the Incoming Call Barring and Outgoing Call Barring options to be used. The system reboots when the criteria for the selected options are matched.
This method reboots the the system at the selected time. It can also be used with the call barring options to only reboot after the set time when the selected options are matched.
•Incoming Call Barring
This option can be used with the Free and Timed reboot methods. When selected, the system bars any further incoming calls. However, it allows existing calls to continue until they are ended.
•Outgoing Call Barring
This option can be used with the Free and Timed reboot methods. When selected, the system bars any further outgoing calls. However, it allows existing calls to continue until they are ended.
•! WARNING: This option also bars the making of emergency calls. Therefore, it should be used with caution.
4.Select the options required and click OK.
Basic Security Configuration
After completing the basic configuration, you should follow the processes in the System Security chapter.