Ip Codec Set - Avaya G450 Configuration Manual

Hide thumbs Also See for G450:
Table of Contents

Advertisement

Units may be linked to a specific, identified Server or an Instance
of the Software.
• Database License (DL). End User may install and use each copy
or an Instance of the Software on one Server or on multiple
Servers provided that each of the Servers on which the Software
is installed communicates with no more than an Instance of the
same database.
• CPU License (CP). End User may install and use each copy or
Instance of the Software on a number of Servers up to the
number indicated in the order provided that the performance
capacity of the Server(s) does not exceed the performance
capacity specified for the Software. End User may not re-install
or operate the Software on Server(s) with a larger performance
capacity without Avaya's prior consent and payment of an
upgrade fee.
• Named User License (NU). You may: (i) install and use the
Software on a single Designated Processor or Server per
authorized Named User (defined below); or (ii) install and use
the Software on a Server so long as only authorized Named
Users access and use the Software. "Named User", means a
user or device that has been expressly authorized by Avaya to
access and use the Software. At Avaya's sole discretion, a
"Named User" may be, without limitation, designated by name,
corporate function (e.g., webmaster or helpdesk), an e-mail or
voice mail account in the name of a person or corporate function,
or a directory entry in the administrative database utilized by the
Software that permits one user to interface with the Software.
• Shrinkwrap License (SR). You may install and use the Software
in accordance with the terms and conditions of the applicable
license agreements, such as "shrinkwrap" or "clickthrough"
license accompanying or applicable to the Software
("Shrinkwrap License").
Heritage Nortel Software
"Heritage Nortel Software" means the software that was acquired by
Avaya as part of its purchase of the Nortel Enterprise Solutions
Business in December 2009. The Heritage Nortel Software currently
available for license from Avaya is the software contained within the list
of Heritage Nortel Products located at
LicenseInfo/
under the link "Heritage Nortel Products", or such
successor site as designated by Avaya. For Heritage Nortel Software,
Avaya grants Customer a license to use Heritage Nortel Software
provided hereunder solely to the extent of the authorized activation or
authorized usage level, solely for the purpose specified in the
Documentation, and solely as embedded in, for execution on, or (in the
event the applicable Documentation permits installation on non-Avaya
equipment) for communication with Avaya equipment. Charges for
Heritage Nortel Software may be based on extent of activation or use
authorized as specified in an order or invoice.
Copyright
Except where expressly stated otherwise, no use should be made of
materials on this site, the Documentation, Software, Hosted Service,
or hardware provided by Avaya. All content on this site, the
documentation, Hosted Service, and the Product provided by Avaya
including the selection, arrangement and design of the content is
owned either by Avaya or its licensors and is protected by copyright
and other intellectual property laws including the sui generis rights
relating to the protection of databases. You may not modify, copy,
reproduce, republish, upload, post, transmit or distribute in any way any
content, in whole or in part, including any code and software unless
expressly authorized by Avaya. Unauthorized reproduction,
transmission, dissemination, storage, and or use without the express
written consent of Avaya can be a criminal, as well as a civil offense
under the applicable law.
Virtualization
Each product has its own ordering code and license types. Note that
each Instance of a product must be separately licensed and ordered.
For example, if the end user customer or Avaya Channel Partner would
like to install two Instances of the same type of products, then two
products of that type must be ordered.
Configuring V.150.1 on Avaya G450 and G430 Branch Gateway
http://support.avaya.com/
How to Get Help
For additional support telephone numbers, go to the Avaya support
Website: http://www.avaya.com/support. If you are:
• Within the United States, click the Escalation Contacts link that
is located under the Support Tools heading. Then click the
appropriate link for the type of support that you need.
• Outside the United States, click the Escalation Contacts link that
is located under the Support Tools heading. Then click the
International Services link that includes telephone numbers for
the international Centers of Excellence.
Providing Telecommunications Security
Telecommunications security (of voice, data, and/or video
communications) is the prevention of any type of intrusion to (that is,
either unauthorized or malicious access to or use of) your company's
telecommunications equipment by some party.
Your company's "telecommunications equipment" includes both this
Avaya product and any other voice/data/video equipment that could be
accessed via this Avaya product (that is, "networked equipment").
An "outside party" is anyone who is not a corporate employee, agent,
subcontractor, or is not working on your company's behalf. Whereas,
a "malicious party" is anyone (including someone who may be
otherwise authorized) who accesses your telecommunications
equipment with either malicious or mischievous intent.
Such intrusions may be either to/through synchronous (time-
multiplexed and/or circuit-based), or asynchronous (character-,
message-, or packet-based) equipment, or interfaces for reasons of:
• Utilization (of capabilities special to the accessed equipment)
• Theft (such as, of intellectual property, financial assets, or toll
facility access)
• Eavesdropping (privacy invasions to humans)
• Mischief (troubling, but apparently innocuous, tampering)
• Harm (such as harmful tampering, data loss or alteration,
regardless of motive or intent)
Be aware that there may be a risk of unauthorized intrusions associated
with your system and/or its networked equipment. Also realize that, if
such an intrusion should occur, it could result in a variety of losses to
your company (including but not limited to, human/data privacy,
intellectual property, material assets, financial resources, labor costs,
and/or legal costs).
Responsibility for Your Company's Telecommunications Security
The final responsibility for securing both this system and its networked
equipment rests with you - Avaya's customer system administrator,
your telecommunications peers, and your managers. Base the
fulfillment of your responsibility on acquired knowledge and resources
from a variety of sources including but not limited to:
• Installation documents
• System administration documents
• Security documents
• Hardware-/software-based security tools
• Shared information between you and your peers
• Telecommunications security experts
May 2014
3

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

G430

Table of Contents