Tag Archives: call

Change of behaviour with TRAN (Transfer) key after upgrading Yealink T3X and Yealink T2X Firmware to V70

I have noticed a change of behaviour with TRAN (Transfer) key after upgrading Yealink T3X and Yealink T2X to the new V70 firmware along with upgrading 3CX Version 11 to Service Pack 3.

It appears that the default DSS Key Transfer Mode is changed from Attended Transfer to Blind Transfer.  An Attended Transfer was always performed when you used the BLF/DSS Keys to perform the Transfer in previous Yealink firmware versions.  For example A calls B wanting to speak with C, B presses TRAN button and then presses the BLF/DSS Key for C.  In this instance B should be able to speak with C (Attended Transfer) to see if they want to take the call rather than A just being passed straight to C (Blind Transfer).

yealink blind transfer

 

You need to login to the Yealink HTTP Interface and then navigate to Phone->Features->Transfer Settings and Change “Transfer Mode via DSSKey” to “Attended Transfer” by using the drop down menu.

yealink attended transfer

So by changing this simple setting you can restore the Attended Transfer function whilst still taking advantage of the V70 Firmware for your Yealink Phone.

3CX Version 11 – Service Pack 2 (Build 27588.780) Released

3CX Version 11 – Service Pack 2 (Build 27588.780) Released

Service Pack 2 introduces the following fixes and new features:

New Features

  • New: Added support for Windows 8 and Windows Server 2012. Previous releases of 3CX Phone System are unsupported on Windows 8 / Server 2012, and thus a new installation of SP2 is required on these OS.
  • New: Added support for Exchange Server 2013. For more information on configuring an Exchange Server 2013, review this blog post.
  • New: IP Whitelist for the Anti-Hacking module.
  • New: Blacklist is checked for WEB requests. When someone tries to connect to the web 3CX Management Console, 3CX MyPhone or provision a phone from a blacklisted IP, the request will be blocked, and the administrator is notified (if notifications are enabled).
  • New: Added support for the latest Cisco SPA 514G and 525G2 phones with the latest firmware. Please note, phones running firmware 7.4.9b need to be updated to version 7.5.2b before being upgraded to version 7.5.3. This applies to all Cisco phones.
  • New: SNOM can now be configured using Plug and Play. SNOM is now supported from the firmware version 8.7.3.15.

3CX MyPhone

  • Update: The Active Calls section in 3CX MyPhone has been redesigned. Users can only see their own calls by default. If allowed, they can see the calls to users in their group. The management group still sees everything.
  • Update: Conference calendar request (.ics) notifications are now sent even when the email server requires authentication.
  • Update: Dashes and () are stripped when an external conference number is added to the conference.
  • Fixed: A bug in 3CX MyPhone when adding callers which are on hold to a conference.
  • Fixed: The audio issues when creating conferences in 3CX MyPhone have been fixed.
  • Fixed: The bug which caused the Microsoft Outlook plugin to not create journal entries for incoming calls
  • Fixed: The organizer’s email address is now stored correctly when scheduling conference calls.
  • Fixed: The organizer of a conference is now informed when a user has accepted or declined the conference invitation and details are correctly retrieved from the calendar.
  • Fixed: When changing the language to Portuguese, 3CX MyPhone now loads in Portuguese.

3CX Phone System Server

  • Update: 3CX Phone System User Agent string now contains the version number.
  • Update: Added G729 Support for Patton Gateway Templates BRI devices which has fixed the audio issues.
  • Fixed: Caller ID is not retained when call is diverted (using 302 diversion header).
  • Fixed: Bug in 302 diversion header – Diversion header contents are now enclosed in <>
  • Fixed: Crash of 3CX Phone System caused by incorrectly configured Outbound Rules.
  • Fixed: Exception in Call History service when an email is sent to an invalid address.

IP Phone, PSTN Gateway and VoIP Provider Interoperability

  • New: Grandstream HT 701, 702, and 704 templates have been added to  main 3CX Phone System installer.
  • Update: Firmware auto-provisioning is removed in Grandstream templates.

3CX Web Reports

  • Update: Ring group reports have been moved to Advanced Call Reports.
  • Update: In the extension statistics, a limit of 10,000 call records has been hard coded which has sped up the report.
  • Fixed: Call Logs are properly generated on Italian language operating systems.
  • Fixed: Calls that breach SLA time are now shown correctly.
  • Fixed: Bug where the SLA breach time was not being observed and all calls where marked as breaching SLA.

3CX Management Console (Interface)

  • Update: Outbound rules page now shows the Extension Groups in the summary page.
  • Update: Added exception in the Windows Firewall for the 3CX Windows Management Console. This is required for the 3CX Firewall Checker.
  • Update: Moved configuration of the Billing Information from the top menu bar to the Advanced page.
  • Update: Server Activity Log now indicates when a packet is dropped because of a hacking attempt.
  • Update: Email notification sent to a 3CX Administrator or Operator extension when the 3CX Upgrade Insurance is about to expire.
  • Update: Improved general speed of Windows-based 3CX Management Console.
  • Update: Tagged license messages in the Server Activity Log.
  • Update: The size of the Abyss webserver log file has been minimalised as the file is now backed up and recreated.
  • Fixed: Service pack updating fails when Microsoft Management Console (MMC) is running on the computer.
  • Fixed: Provisioning of 3CXPhone for Windows, iPhone, and Android now sets the STUN server to the Public IP address of 3CX Phone System. (Note: Public IP Address needs to be configured).
  • Fixed: The 3CX VAD integration when text to speech project is deployed with characters containing an accent.
  • Fixed: IP blacklisted entries not completely removed causing a delay and high CPU usage on incoming calls.
  • Fixed: Crash in the Server Activity Log when logs are viewed in Google Chrome.
  • Fixed: There will no longer be any blank pages within the Server Activity Log.
  • Fixed: Log files were not being moved to backup folder and remained in the Logs folder. As a result this made the 3CX Management Console very slow and affected also the general performance of the computer.
  • Update: The 3CX Server Activity Log now shows INVITE and RE-INVITE SIP messages. These can be seen when Verbose is enabled.

3CX Log Viewer

  • Update: Gradual opening of logs to avoid high CPU usage.
  • Fixed: Various memory leaks.

3CX Backup and Restore

  • Fixed: The crash that occurs on Russian language Windows Operating Systems.
  • Fixed: Exception in 3CX Backup and Restore when a backup is made whilst a recording or a voicemail is in progress.
  • Fixed: 3CX Backup and Restore will now backup recordings when recordings path is not the default directory.
  • Fixed: The restore procedure will create recordings file structure in case it does not exist.

3CX Phone System – Caller ID Incorrect with Call Pickup and Call Transfer using Aastra Handset

When you use an Aastra Handset with 3CX you may find that the correct Caller ID is not shown on the handset when you use Call Pickup or the call is transferred to your phone.  This can be corrected by adding the following line in to your provisioning template for your Aastra handsets

sip update callerid: 1

This setting Enables or disables the updating of the Caller ID information during a call, by default the phone has a value of “0” assigned but by adding this line with the value “1” you force this setting to Enabled.

Kerberos.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

Kerberos.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

04-Apr-2015 – 6.1.7601.23017 – Kerberos.dll – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015

04-Apr-2015 – 6.1.7601.18812 – Kerberos.dll – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015

29-Jul-2014 – 6.1.7601.22755 – Kerberos.dll – x64 – http://support.microsoft.com/kb/2987849 – Logon fails after you restrict client RPC to DC traffic in Windows Server 2012 R2 or Windows Server 2008 R2

11-Jul-2014 – 6.1.7601.22741 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2982706 – You cannot access network shares after the computer restarts in Windows 8.1 or Windows 7

07-Jul-2014 – 6.1.7601.22736 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2982378 – Microsoft Security Advisory: Update to improve credentials protection and management for Windows 7 and Windows Server 2008 R2: September 9, 2014

07-Jul-2014 – 6.1.7601.18526 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2982378 – Microsoft Security Advisory: Update to improve credentials protection and management for Windows 7 and Windows Server 2008 R2: September 9, 2014

04-Mar-2014 – 6.1.7601.22616 – Kerberos.dll – x86/x64 – https://support.microsoft.com/kb/2871997 – Microsoft Security Advisory: Update to improve credentials protection and management: May 13, 2014

04-Mar-2014 – 6.1.7601.18409 – Kerberos.dll – x86/x64 – https://support.microsoft.com/kb/2871997 – Microsoft Security Advisory: Update to improve credentials protection and management: May 13, 2014

09-May-2013 – 6.1.7601.22320 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2845626 – Cached credentials are not updated when you change your password in Windows

11-Aug-2012 – 6.1.7601.22084 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2743555 – MS12-069: Vulnerability in Kerberos could allow denial of service: October 9, 2012

11-Aug-2012 – 6.1.7601.17926 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2743555  – MS12-069: Vulnerability in Kerberos could allow denial of service: October 9, 2012

10-Jul-2012 – 6.1.7601.22048 – Kerberos.dll – x64 – http://support.microsoft.com/kb/2732595 – Lsass.exe crashes and error code 255 is generated in Windows Server 2008 R2

05-Jul-2012 – 6.1.7601.22045 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2719712 – KDC cannot process an S4U2Self ticket request on a Windows Server 2008 R2-based computer

29-Feb-2012 – 6.1.7601.21932 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2678068 – Remote Assistance invitation fails in an Active Directory environment in Windows 7 or in Windows Server 2008 R2

02-Jul-2011 – 6.1.7601.21762 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2566059 – RC4 pre-authentication failure for the Network Service account in Windows Server 2008 R2 or in Windows 7

11-May-2011 – 6.1.7601.21725 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2526946 – An SSO solution that calls the LsaLogonUser function to pass a KERB_TICKET_LOGON structure for Kerberos authentication does not work in Windows 7 SP1 or in Windows Server 2008 R2 SP1

11-May-2011 – 6.1.7601.17614 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2526946 – An SSO solution that calls the LsaLogonUser function to pass a KERB_TICKET_LOGON structure for Kerberos authentication does not work in Windows 7 SP1 or in Windows Server 2008 R2 SP1

18-Dec-2010 – 6.1.7601.21624 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2425227 – MS11-013: Description of the security update for Kerberos in Windows 7 and in Windows Server 2008 R2: February 8, 2011

17-Dec-2010 – 6.1.7601.17527 – Kerberos.dll – x86/x64 – http://support.microsoft.com/kb/2425227 – MS11-013: Description of the security update for Kerberos in Windows 7 and in Windows Server 2008 R2: February 8, 2011