When you browse to 127.0.0.1/certsrv, you are prompted for a login/password. I believe the login is Administrator but no one has the password. That password is setup when installing the CA and I don't think it is in AD.
Thanks.
If anyone can help, here is the situation:
The person who set up our CA has left the company with the password to access 127.0.0.1/certsrv. I cannot find anything about password recovery for that.
Does anyone know of a way to reset that password or a backdoor to get in?
Thanks in advance.
I was wondering if anyone has ever gone from a standalone Avaya SIP deployment to a duplex. I have an existing SES 3.1.2 and it is a Combo Home/Edge. I need to add a redundant server and make this a duplex environment.
I've looked through all of the docs but don't see anything specific to...
Hi,
I'm setting up an AES 4.1 to integrate with CM and Microsoft Office Communication Server 2007. I have followed the Avaya and Microsoft documentation to the letter. The problem is, after every time I complete the certificate (trusted and server), I can't get back into the AES.
Docs state...
When you run 'stat logins', how many active logins show up? There may be active logins that are no longer valid due to users disconnecting without logging off.
Is the new 4621 in a different port network from the 2 that are working? If so, do you have MedPro's in both PN's.
Is the new phone in the same IP-Network-Region as the 2 working phones? If so, do you have IP-Codec-Sets configured so that the different regions can communicate with each other?
Try telnetting to the MGP IP address on the G700 and running "show faults" and "show voip". When looking at show voip, make sure that the DSP resources are not busied out for some reason.
It appears that an IP phone is losing it's signalling connection to the clan that it's currently registered to. What were the symptoms of this problem?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.