19.08.2013 Views

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table of Contents<br />

MGC Manager Events that are not Supported by the <strong>RMX</strong> ......................................... C-40<br />

Appendix D - Ad Hoc Conferencing and External Database Authentication . . . . .D-1<br />

Ad Hoc Conferencing without Authentication ................................................................D-1<br />

Ad Hoc Conferencing with Authentication ......................................................................D-2<br />

Entry Queue Level - Conference Initiation Validation with an External Database<br />

Application .....................................................................................................................D-3<br />

Conference Access with External Database Authentication ...........................................D-4<br />

Conference Access Validation - All Participants (Always) .....................................D-5<br />

Conference Access Validation - Chairperson Only (Upon Request) .....................D-6<br />

System Settings for Ad Hoc Conferencing and External Database Authentication ....D-7<br />

Ad Hoc Settings .............................................................................................................D-7<br />

Authentication Settings ................................................................................................D-8<br />

MCU Configuration to Communicate with an External Database Application<br />

D-9<br />

Enabling External Database Validation for Starting New Ongoing Conferences<br />

D-10<br />

Enabling External Database Validation for Conferences Access ..................D-10<br />

Appendix E - Participant Properties Advanced Channel Information . . . . . . . . . . . E-1<br />

Appendix F - Secure Communication Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-1<br />

Switching to Secure Mode .....................................................................................................F-1<br />

Purchasing a Certificate .................................................................................................F-1<br />

Installing the Certificate ................................................................................................F-3<br />

Creating/Modifying System Flags ..............................................................................F-4<br />

Enabling Secure Communication Mode .....................................................................F-4<br />

Alternate Management Network .........................................................................F-5<br />

Ultra Secure Mode ..................................................................................................................F-6<br />

ULTRA_SECURE_MODE System Flag .......................................................................F-6<br />

Securing an External Database .............................................................................................F-7<br />

(PKI) Public Key Infrastructure ............................................................................................F-8<br />

Unique Certificates for all Networked Entities ..........................................................F-8<br />

Offline Certificate Validation ........................................................................................F-9<br />

Peer Certificates ......................................................................................................F-9<br />

Self Validation of Certificates ...............................................................................F-9<br />

Certificate Revocation List ....................................................................................F-9<br />

Installing and Using Certificates on the <strong>RMX</strong> ............................................................F-9<br />

Default Management Network ...................................................................................F-10<br />

Enabling Peer Certificate Requests ....................................................................F-10<br />

Default IP Network Service ........................................................................................F-11<br />

Managing Certificates in the Certification Repository ...........................................F-12<br />

Adding Trusted Certificates and CRLs to the Certification Repository .......F-13<br />

Trusted Certificates ......................................................................................................F-13<br />

Adding Trusted Certificates ................................................................................F-13<br />

Personal Certificates (Management and Signaling Certificates) ...........................F-16<br />

CRL (Certificate Revocation List) ...............................................................................F-16<br />

Adding a CRL .......................................................................................................F-17<br />

Removing a CRL ...................................................................................................F-18<br />

MS Active Directory Integration ........................................................................................F-19<br />

<strong>Polycom</strong>, Inc xv

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!