Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Cisco 7945 Phones Ringing Tracking

Posted on 2014-09-07
4
Medium Priority
?
218 Views
Last Modified: 2014-09-08
I posted a very similar question recently. But on further investigation I need to ask again. I need to track when and for how long various Cisco phones ring. I thought I found this in the Call Detail Reporting.  BUT it turns out that this information is only available for calls that were picked up. The problem I am analyzing is trying to figure out why the phone is NOT being picked up. So I need ringing information to correlate with data from our call distribution system. I looked also at the call traces. But that only give me the SIP code for "ringing" and not more specific information as to when the phone started ringing and when it stopped. Any other thought about how I could track this? One thought I had was that for an individual I could add their line to my phone and I would be able to see whenever it rang. Kind of cumbersome but perhaps better than nothing. Any other thoughts??
0
Comment
Question by:amigan_99
  • 2
  • 2
4 Comments
 
LVL 20

Accepted Solution

by:
José Méndez earned 2000 total points
ID: 40310921
My friend, the time difference between the 180 Ringing message and the next message is the time period the phone was in ringing state.

For example, if you see the 180 in the inbound direction, and the next message is a CANCEL out to the phone 12 seconds later, that means the phone rang 3 times and then Callmanager canceled the connection to the phone to proceed with VM or whatever.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 40310960
Excellent.  Thank you again.
0
 
LVL 20

Expert Comment

by:José Méndez
ID: 40311238
Friend, sometimes I feel you close the thread without having asked everything you want to ask. Please do elaborate on your inquiries as much as needed so I can help you clear all doubts =D
0
 
LVL 1

Author Comment

by:amigan_99
ID: 40311281
Thanks again www.
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hey there Heard about jingle, the add on for XMPP that enables point to point audio between two XMPP clients. No server config necessary. Actually quite a cool feature. However, how good is it if you can not use those voice capabilities to do a P…
If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
Is your OST file inaccessible, Need to transfer OST file from one computer to another? Want to convert OST file to PST? If the answer to any of the above question is yes, then look no further. With the help of Stellar OST to PST Converter, you can e…
Suggested Courses

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question