block-quote On this pagechevron-down
copy Copy chevron-down
SIP Trunking chevron-right SIP Trunk Interconnection Guide GDMS UC GDMS(Grandstream Device Management System) Unified Communication It’s a cloud-based management platform for provisioning, monitoring, and controlling Grandstream devices and Cloud PBX
GDMS is a centralized management and monitoring platform provided by Grandstream. It is designed to manage:
On‑prem Grandstream UCM PBXs
Grandstream endpoint devices (IP phones, ATAs, gateways)
GDMS functions as a management and provisioning layer. It does not process SIP signaling or RTP media for live calls.
GDMS provides the following capabilities:
Centralized management of multiple PBXs
Zero‑touch provisioning of Grandstream devices
Remote configuration of SIP accounts on devices
Firmware management, reboot, and factory reset
Monitoring registration and device status
High‑Level Architecture
PBX‑Based Architecture (Recommended)
In this model:
DIDforSale is configured as a SIP trunk on the PBX
Call routing, IVRs, ring groups, and policies are handled by the PBX
GDMS is used to manage and provision devices and PBXs
Learn more about Grandstream Cloud PBX integration with DIDForSale by clicking below.
Grandstream Cloud PBX chevron-right Direct Device Registration (Optional / Limited Devices)
In this model:
Devices register directly to DIDforSale
No PBX features such as IVR, internal dialing, or call queues are available
Suitable only for basic single‑device use cases
Benefits of using GDMS Unified Communication
1) Centralized Management
Provision, configure, monitor Grandstream phones, gateways, and devices from one dashboard.
Ideal for large deployments or multi-location businesses.
2) Unified Communications Integration
Works with Wave app for messaging, presence, audio/video conferencing.
Users get collaboration plus telephony features if integrated.
3) Scalability
Easily onboard new users/devices in bulk.
Remote configuration and firmware updates.
4) Visibility & Control
Real-time status and analytics for devices.
Troubleshooting without needing on-site access.
5) Policy Enforcement
Apply global settings, security policies, and profiles across devices.