Solved

FreePBX How to ring outside lines in a Ringall strategy

Posted on 2013-12-09
5
1,194 Views
Last Modified: 2013-12-10
We have 4 IP phone extensions and 4 other staff who have cell phones. How do a make a ring group and trunks that ring them all at the same time, when a call comes in?

 I have tried just adding #[phone number] to the extensions list and I have tried creating custom extensions with the dial field as "Local/[phone number]@outbound-allroutes", and adding those to the ring group extensions list.

The ring group only rings the internal extensions as it is, even though the others are in the list.
0
Comment
Question by:Jeff swicegood
  • 3
  • 2
5 Comments
 
LVL 15

Accepted Solution

by:
Phonebuff earned 500 total points
ID: 39707489
Assuming you have a ring strategy of ring all --

The Custom extension I think is the right answer.  Have to look at one of my systems, but I can't get into it till latter.  Do to IT doing maintenance to the VPN gateway server tonight.

What does the log say for the call   /var/log/asterisk/full -- When a call comes in ?

=============================================
0
 
LVL 1

Author Comment

by:Jeff swicegood
ID: 39707543
Ok, the custom extension worked this time, but the calls did not "spill over" from one trunk to the next. So it was restricted to 2 outbound calls. The other 2 showed up in the log as "busy."
0
 
LVL 15

Expert Comment

by:Phonebuff
ID: 39707555
That will do it :-)  
 
Check the outbound route and make sure all your trunks are listed in the right order that you are willing to allow calls to be made  in this case.  

-------------------------
0
 
LVL 1

Author Comment

by:Jeff swicegood
ID: 39707576
Everything seems fine there. I did have two outbound routes that were identical except the trunks (I have only two trunks) were in reversed order. I deleted one. But I cannot test it anymore tonight because it's late and I can't think of an way to test it without ringing people's cell phones.
0
 
LVL 15

Expert Comment

by:Phonebuff
ID: 39707579
Okay,

    Well if you need something else just update here -- I am in the field tomorrow, but will check back at some point..
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
If your app took Google’s lash recently, here are the 5 most likely reasons.
This video demonstrates basic masking and how to edit the mask to reveal the desired image.
The viewer will learn how to create multiple layers to apply various filters and how to delete areas from each layer’s filter.

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now