Redundancy with IP phone and Avaya Aura
®
......................................................................... 117
Detection of loss of connection............................................................................................. 117
Failover to a backup proxy.................................................................................................... 118
Restoring the phone to the primary proxy.............................................................................. 118
Proxy determination when the connection to the primary proxy is lost...................................... 119
Simultaneous registration..................................................................................................... 119
Limitations during failover or failback..................................................................................... 120
Preserved call..................................................................................................................... 120
Limitations of call preservation........................................................................................ 120
Supported non Avaya Aura
®
proxies for redundancy.............................................................. 121
Limitations after a successful failover.................................................................................... 121
Indications of redundancy.................................................................................................... 122
Parameters for redundancy provisioning............................................................................... 123
Redundancy in a non-Avaya proxy environment.................................................................... 127
Chapter 7: Backup and restore............................................................................................ 128
User profile backup on Personal Profile Manager (PPM)......................................................... 128
User profile parameters for backup....................................................................................... 128
Chapter 8: Phone upgrade................................................................................................... 130
Device upgrade process...................................................................................................... 130
Downloading and saving the software................................................................................... 131
Upgrading the device manually............................................................................................. 131
Downloading text language files........................................................................................... 132
Changing the signaling protocol............................................................................................ 133
The GROUP parameter....................................................................................................... 133
Chapter 9: Data Privacy Controls Addendum.................................................................... 134
Purpose.............................................................................................................................. 134
Data categories containing personal data (PD)...................................................................... 134
Personal data human access controls................................................................................... 135
Personal data programmatic or API access controls......................................................... 135
Personal data at rest encryption controls............................................................................... 136
Personal data in transit encryption controls............................................................................ 136
Personal data retention period controls................................................................................. 137
Personal data export controls and procedures....................................................................... 137
Personal data view, modify, delete controls and procedures.................................................... 138
Personal data pseudonymization operations statement.......................................................... 138
Data privacy and secure data processing ............................................................................. 139
Secure mode...................................................................................................................... 139
Configuring secure mode parameter............................................................................... 139
Data privacy........................................................................................................................ 140
Geographical restrictions on encryption................................................................................. 141
Chapter 10: Troubleshooting............................................................................................... 142
SLA Mon
™
agent................................................................................................................ 142
Error conditions................................................................................................................... 142
Contents
January 2020 Installing and Administering Avaya 9601/9608/9611G/9621G/9641G/9641GS IP
Deskphones SIP 9
Comments on this document? infodev@avaya.com