User manual POLYCOM VBP V9.1.5.3 CONFIGURATION GUIDE

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual POLYCOM VBP. We hope that this POLYCOM VBP user guide will be useful to you.


POLYCOM VBP V9.1.5.3 CONFIGURATION GUIDE: Download the complete user guide (6546 Ko)

Manual abstract: user guide POLYCOM VBPV9.1.5.3 CONFIGURATION GUIDE

Detailed instructions for use are in the User's Guide.

[. . . ] Polycom® VBPTM System Configuration Guide 9. 1. 5. 3 | January 2011 | 3725-78301-001B VBP Series Configuration Guide Trademark Information Polycom ®, the Polycom logo design, [and others that appear in your document] are registered trademarks of Polycom, Inc. TM are trademarks of Polycom, Inc. 4750 Willow Road Pleasanton, CA 94588-2708 USA No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Polycom, Inc. Under the law, reproducing includes translating into another language or format. retains title to, and ownership of, all proprietary rights with respect to the software contained within its products. [. . . ] At the end of this period the endpoint will send another registration request. This option is typically not set, the TTL is being assigned by the gatekeeper and works for most installation, if this field is modified, it is typically a shorter period than what the gatekeeper is using, if the value is longer than the gatekeepers, the endpoint may become un-registered by the gatekeeper before the endpoints next registration interval. You can also optionally complete the following fields: Stale time (m) Specify the length of the interval in minutes. Caution should be used when setting this, if this value is set below the gatekeepers TTL value, the VBP-E will remove the client, this causes the VBP-ST to remove the client, and then the gatekeeper will remove the client, which leave the endpoint un-reachable, until its TTL value expires and reregisters Listen to multicast messages (typically not set in this mode) Select this checkbox to enable listening to multicast messages. 77 VBP Series Configuration Guide Max Aliases Enter the maximum number of allowed aliases. This option can be set to control how many aliases are allow to register through to the gatekeeper, while this is typically a gatekeeper related task the VBP can control how many aliases can be proxied. When setting this value keep in mind that each endpoint typically has 2 aliases i. e. E. 164 and H323ID, if you want to restrict 10 endpoints, you would enter a value of 20 in this field Access Proxy Summary and Configuration Access Proxy is a feature added to the VBP-ST that allows authorized outside endpoints access to the CMA server for Dynamic mode services; this feature is the next step in Unified Communications. Access Proxy provides connectivity to the Enterprise directory server and provides the external clients with IM style point and click to initiate text chat, and launch video calls from a centralized directory of all users on the system. Access Proxy provides secure TLS (transport layer security) encrypted sessions for authentication, directory searches and real time buddy status, also known as Dynamic mode services. Access proxy is a secure reverse proxy for Dynamic mode services, these services use the following protocols. · · · · HTTPS ­ for authentication and configuration management XMPP ­ "Jabber" or presence information to/from the remote clients LDAP - Directory searching for users that you want to add as buddies H. 323/H. 460 ­ For video and audio traversal All protocols except H. 323/H. 460 use TLS to encapsulate the data in secure encrypted packets ­ H. 323/H. 460 does not use TLS encapsulation. Access Proxy uses SSL based certificates to encrypt the session; Each SSL Certificate consists of a public key and a private key. The public key is used to encrypt information and the private key is used to decipher it. When a CMA desktop clients points to the Access Proxy, a Secure Sockets Layer handshake authenticates the server (Access Proxy) and the client (CMAD). An encryption method is established with a unique session key and secure transmission can begin. Theory - Imagine sending mail through the postal system in a clear envelope. An SSL Certificate establishes a private communication channel enabling encryption of the data during transmission. Encryption scrambles the data, essentially creating an envelope for message privacy. The VBP is pre-installed with self signed certificates to configure the Access Proxy. These certificates can be changed with Signed certificates, from a CA (certificate authority) if you choose to. Access Proxy can have different certificates for each protocol making the SSL encryption different for each service 78 VBP Series Configuration Guide Access Proxy Diagram This diagram shows the supported network methods for deploying remote dynamic mode based clients. [. . . ] It is the responsibility of users requiring service to report the need for service to our Company or to one of our authorized agents. INDUSTRY CANADA (IC) NOTICE This equipment meets the applicable Industry Canada Terminal Equipment Technical Specifications. The abbreviation, IC, before the registration number signifies that registration was performed based on a Declaration of Conformity indicating that Industry Canada technical specifications were met. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE POLYCOM VBP




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual POLYCOM VBP will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.