Yealink Cloud Contacts................................................................................................................... 226
Enterprise Directory.........................................................................................................................226
LDAP................................................................................................................................................226
LDAP Attributes.................................................................................................................... 227
Configuring LDAP................................................................................................................. 227
Meeting Allowlist.............................................................................................................................. 230
Adding Meeting Allowlist.......................................................................................................230
Meeting Blocklist..............................................................................................................................231
Adding Meeting Blocklists.....................................................................................................231
Saving History Record.................................................................................................................... 232
Deleting Call Records..................................................................................................................... 232
Deleting a Call Record......................................................................................................... 233
Placing a Call........................................................................................... 234
Supported Cipher Suites...................................................................................................... 237
TLS Transport Protocol.........................................................................................................237
H.235 Encryption.................................................................................................................. 247
Defending against Attacks.................................................................................................... 248
CEC Monitor Controls............................................................................. 251
Using the CPN10 PSTN Box.......................................................................................................... 253
Controlling VCC22 Camera.................................................................................................. 253
| Contents | viii