Welcome!

CMS Authors: Mehdi Daoudi, Rishi Bhargava, Harry Trott, Xenia von Wedel, Carmen Gonzalez

Related Topics: Microsoft Cloud, Microservices Expo, Silverlight, Agile Computing, Release Management , CMS

Microsoft Cloud: Blog Post

Series: Exchange 2013 and Lync 2013 Integration with AsteriskNOW PBX Pt. 1

This will be a 3-part blog series on integrating AsteriskNOW PBX with Lync and Exchange 2013.

Recently I have been involved in a couple of projects which required both Lync EV and Exchange UM. In order to do some testing I needed to get some kind of PBX into my lab environment. After searching the internet I found a ton of information but not a single source that showed all the "correct" implementation steps. This is what I hope to provide in this series. I decided that it would probably be too much for a single blog so I am going to break it up into 3. This series will contain the following articles:

  1. Exchange 2013 and Lync 2013 Integration with AsteriskNOW PBX Pt. 1 - this will describe how to get AsteriskNOW configured with local PBX extensions. This will allow us to utilize softphones to call between PBX users.
  2. Exchange 2013 and Lync 2013 Integration with AsteriskNOW PBX Pt. 2 - next we need to tie our new PBX into the Lync 2013 infrastructure. This will include creating PSTN GWs\Trunks, EV Enabled Users, Auto Attendant, EVA, etc...
  3. Exchange 2013 and Lync 2013 Integration with AsteriskNOW PBX Pt. 3 - lastly we will finish up integration from Lync 2013 to Exchange 2013 for Unified Messaging.

Let's get started with installing our AsteriskNOW PBX. First lets download both AsteriskNOW 3.0.0 (http://www.asterisk.org/downloads/asterisknow) and your favorite softphone, for which I chose X-Lite (http://www.counterpath.com/x-lite-for-windows-download.html). I am utilizing HyperV and VMs for my lab but you can adjust to any environment you are using.

1. Creating AsteriskNOW Virtual Server

If using HyperV Manager than right click the HyperV Host server and select new virtual machine. Give this server a name, 1GB of memory, 20GB of Storage, and for networking make sure this is "not connected", and click finish to create the virtual machine. Now before starting the server we need to setup networking. The reason we left this blank during the VM creation wizard is because we have to use the "older" legacy network adapter. In the console right click the newly crated vm, choose settings, and then "Add Hardware". On the right hand side select Legacy Network Adapter and click Add. Make sure you set this legacy adapter to connect to the virtual switch that your other VMs are connected. Now attach the .ISO we downloaded above to the CD\DVD Image so that we can boot into the AsteriskNOW setup wizard.

2. AsteriskNOW Setup

After booting the VM you will be presented with the screen below. Select option 1 to install Asterisk 11 and Free PBX. Next select Reinitialize All, Choose your Time zone, set the root password, and allow Linux to setup the partitioning. The setup should take anywhere from 10-15 minutes.

Now we need to set the AsteriskNow server to use a static IP. Login as the root account you created during setup and type system-config-network. This will bring up a select action window. Select Device Configuration, hit enter on your NIC, and type in your information (see below). For the DNS server put your AD DNS server that Lync and Exchange have configured. After typing this information click OK, Save, and then select DNS configuration. Type in your AD DNS information similar to below. I put 4.2.2.2 as an additional DNS server on the internet but this isn't needed if your AD DNS can send DNS requests to an Internet DNS server. Now click OK, Save&Quit, and then type shutdown -r now at the command prompt to reboot the server.

3. Create PBX Extensions

With AsteriskNow and FreePBX you can do most of the configuration from the FreePBX Admin Webpage. Go to http://asteriskserverip, click FreePBX Administration, and then type admin for both the username and password. You will see the Administration console below. Click on Applications, Extensions, select Generic SIP Device and click Submit. Fill in the information below and create a couple of users (screenshot below).

Extenstion - I am using 3XXX for Asterisk

DisplayName - Unique User Identifier

Secret - similar to password (keep track of this because we will need it)

Context - from-internal

Make sure after adding the users you click "Apply Config" at the top of the screen or these changes won't get submitted.

4. Setup X-Lite Softphone Users

Now we need to setup the X-Lite client on two computers. Technically these computers don't have to contain audio devices but you will want this for the future if possible. I am not going to walk through the X-Lite installation because this is a basic next, next, finish. Let's configure the X-Lite client on both machines with the 2 users we created in Step 3. Once opening the X-Lite client, click Softphone, Account Settings and fill in the information we used in Step 3 (see below). The Password is what we put into the Secret field  (1User1) during the creation of the user. Click ok and you should get logged into the Asterisk box.

5. Call testing between X-Lite Users

Once X-Lite is installed and configured on both workstations lets dial one of the users extensions from the other pc. Connected!!

Now we successfully setup calling between two users on our AsteriskNow PBX. In the next article of this series we will dive into how to connect AsteriskNow Users with Lync 2013 Enterprise Voice enabled users.

Richard Schwendiman - http://blogs.technet.com/b/rischwen/

More Stories By Richard Schwendiman

My name is Richard Schwendiman and I am currently working for Microsoft as a (PFE) Premier Field Engineer specializing in both Exchange and Lync. I have been working as an IT Consultant for 13+ years focusing on a wide array of Infrastructure technologies. These technologies include Messaging, UC, Networking, Platforms, Active Directory, Virtualization, etc... I am currently certified as an MCSE (Microsoft Certified Systems Engineer), MCSE Messaging 2013, MCSE Communications 2013, MCSA 2012, MCITP Enterprise Messaging, MCTS-Lync, CCNA (Cisco Certified Network Associate), Commvault, CCNP (Cisco Certified Network Professional), and JNCIA-ER (Juniper Enterprise Routing). I am hoping that through this blog I can bring knowledge from the field and keep everyone informed about our ever changing Industry. Please feel free to email me any questions, comments, or concerns pertaining to this blog or any technology related things. Thanks and look forward to providing some good content. http://blogs.technet.com/b/rischwen/

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...