What are user identifiers

11

User identifiers include device IDs and user IDs.

A device ID is the ID of a device used by users. The devices can be a plain old telephone service (POTS) phone or a user agent device, such as IP phones and software.

A user ID is a unique number assigned to a user. A user ID is the owner of a device ID, and indicates a user's identity. A user ID and a Session Initiation Protocol (SIP) server domain constitute a URL. A device ID can belong to multiple user IDs.

Each user has a fixed user identifier, which is bound to a unique device ID. Usually, a user identifier is the global number or long code for the user. Users can dial long codes to call each other, which is the common dial-up mode. Internal numbers or private numbers are provided to users inside the same group, such as an enterprise, company, group organization, school, or hotel. Users in the same group can dial each other's short numbers or private numbers.

Other related questions:
What is the user identifier of the AR router
User identifiers include device IDs and user IDs. A device ID is the ID of a device. The device can be a plain old telephone service (POTS) phone or a user agent device, such as an IP phone or software. A user ID is the number of a user and owner of a device ID. It identifies a user. A user ID and a SIP server domain constitute a URL. A device ID can belong to multiple user IDs. Each user has a fixed user identifier that is bound to a unique device ID. Usually, a user identifier is the global number (seven or eight digits in China), that is long number of a user. Users can dial long numbers to call each other, which is common. Internal numbers or private numbers are provided for users in the same group, such as an enterprise, company, group organization, school, or hotel. Users can dial internal numbers easily.

How to identify and prevent attacks
You can detect common attacks as follows: 1. Clear statistics on the packets sent to the CPU. 2. Wait for one minute and check the number of packets sent to the CPU and discarded protocol packets, such as ICMP, TTL, Expired, SSH, and FTP. If there are a lot of packets sent to the CPU or discarded, an attack, such as ICMP attack, TTL Expired attack, SSH attack, or FTP attack, may occur. 3. Find out the attack source through IP source trail or attack source tracing. After locating the attack source, run the cpu-defend policy command to configure the blacklist to prevent the packets from this source entering the control plane. Alternatively, you can configure the penalty action in auto-defend to discard attack packets. Additionally, the device can restrict the rate of ICMP packets from the source, or use traffic policy to discard SSH and FTP attack packets.

FXO interface cannot identify on-hook of the remote PSTN user
The AR with the voice package cannot identify on-hook signals of other countries. By default, the AR with the voice package can only identify on-hook signals of China. The voice file needs to be customized at each site. Contact the service provider.

Why the FXO interface cannot identify onhook signals of the remote PSTN user
Currently, the AR with the voice package cannot identify onhook signals of other countries. By default, the AR can identify only onhook signals of China. The voice file needs to be customized at each site. Contact the service provider.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top