Polycom RealPresence Group Series Administrator's Manual page 6

Hide thumbs Also See for RealPresence Group Series:
Table of Contents

Advertisement

Limitations.............................................................................................................. 76
Configure Network Quality Settings.................................................................................. 77
Lost Packet Recovery and Dynamic Bandwidth Settings.......................................79
Simplified ISDN Dialing..................................................................................................... 80
Configure Gateway Call Type Settings...................................................................80
Securing the System........................................................................................81
Configure Security Profiles................................................................................................81
Managing System Access.................................................................................................83
Enable External Authentication.............................................................................. 83
Configure Local Access..........................................................................................84
Configure Remote Access......................................................................................85
Local Accounts....................................................................................................... 87
Detecting Intrusions.......................................................................................................... 91
View Connections to Your System in a Sessions List....................................................... 92
Secure API Access........................................................................................................... 92
Enable Secure API Access.................................................................................... 92
Disable Secure API Access....................................................................................93
Access the API with SSH....................................................................................... 93
Port Lockout...................................................................................................................... 93
Configure Port Lockout Settings.............................................................................94
Whitelisting........................................................................................................................95
Enable a Whitelist...................................................................................................95
Add IP Addresses to a Whitelist............................................................................. 96
IPv4 Address Formats............................................................................................96
IPv6 Address Formats............................................................................................96
Encryption......................................................................................................................... 97
Configure Encryption..............................................................................................97
Configuring Encryption Settings for SVC Calls...................................................... 98
Set the Transport Protocol for SVC Calls............................................................... 98
Set Up AES Encryption for SVC Calls....................................................................99
Verify H.323 Media Encryption............................................................................... 99
802.1x Authentication......................................................................................................100
Supported 802.1x Configurations.........................................................................100
Configure 802.1x Authentication.......................................................................... 100
Firewall/NAT Traversal.................................................................................................... 101
Basic Firewall/NAT Traversal............................................................................... 102
Configure the H.460 Firewall/NAT Traversal........................................................ 102
Security Certificates........................................................................................................ 104
How Certificates are Used....................................................................................105
Polycom, Inc.
Contents
4

Advertisement

Table of Contents
loading

Table of Contents