UCi2i Video Conference Endpoint Firewall Requirements
|
|
- Christiana Perkins
- 8 years ago
- Views:
Transcription
1 UCi2i Video Conference Endpoint Firewall Requirements Page 1
2 Confidentiality Statement and Copyright Notice This document is published as Public and may be freely distributed. Copyright subsists in all UCi2i (UK) Limited publications. No extract may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, photocopying, recording or otherwise to any third parties, without prior permission in writing from UCi2i (UK) Limited. Version Control Date Version Changes Authorised 28 th November Draft for review TK 3 rd March Released version TK 6 th August Brand updates TK 29 th January Addition of WebRTC/Brower-based calling TK 9 th February Additional IP s added TK 16 th December Changed V-Desk support number (UK) TK Page 2
3 Contents UCi2i VC Endpoint Firewall Requirements... 4 What this means to you... 4 What addresses and ports does video conferencing use?... 5 UCi2i address ranges... 5 Complete Firewall Port List... 5 Defined Services Firewall List... 6 SIP Proxies... 6 H323: Using Assent Firewall Traversal... 6 H323: Using H /19 Firewall Traversal (used by all Polycom/Lifesize devices)... 7 Browser-based Video Calling (a.k.a. WebRTC)... 7 Endpoint Management (optional)... 8 Page 3
4 UCi2i VC Endpoint Firewall Requirements Due to the implementation of our secure video network, there are a few firewall rules that may be required depending on your network configuration to allow communication with the UCi2i infrastructure. This is to provide our clients with the best technology on the market. What this means to you In order for you and your client to take full advantage of our service, we MAY require you to make some changes to your firewall to allow communication from your current hardware/software to our Firewall Traversal Servers. Please note that many firewalls work without any modification at all. If you wish to test your firewall before deploying our managed video service, then you can test SIP Video functionality by downloading the free video client from and once installed and logged in, call test@uci2i.com from the Jabber video client. You should see the following, and hear Hello, welcome to the conferencing system followed by a live self-view video of yourself. Please note the free Cisco Jabber video client has no customer support from Cisco or from UCi2i, however, feel free to let your friends/relatives know about it, and to use it to call them. Page 4
5 What addresses and ports does video conferencing use? Please see below firewall port requirements. In order to provide resiliency, we will require you to open ports to multiple addresses. UCi2i address ranges (for endpoint management only) (for endpoint management only) Complete Firewall Port List To enable the UCi2i service a complete list of the ports required is below. Should, you require information on the individual protocol requirements then please see the next section for a breakdown of services. HTTP 80 TCP Host ----> UCi2i HTTPS 443 TCP Host ----> UCi2i Gatekeeper RAS 1719 UDP Host ----> UCi2i H.225 Protocol 1720 TCP Host ----> UCi2i Signalling/Media (RTP) 2776 TCP+UDP Host ----> UCi2i RTCP + H TCP+UDP Host ----> UCi2i STUN/TURN Media 3478 UDP Host ----> UCi2i SIP Signalling(TCP) 5060 TCP+UDP Host ----> UCi2i SIP Signalling(TLS) 5061 TCP Host ----> UCi2i Q931/H TCP Host ----> UCi2i Page 5
6 Signalling Media + Lync TCP+UDP Host ----> UCi2i Media + Lync UDP Host ----> UCi2i Defined Services Firewall List SIP Proxies Please ensure that the correct ports are open depending on the video conferencing system you are using. There are different port requirements for SIP depending on what signalling method your system is using. The media requirements are the same regardless of the signalling method. Note these outbound exceptions are required to establish a UDP/TCP session. There are absolutely no inbound pinholes required. SIP Signalling(TLS) 5061 TCP Host ----> UCi2i SIP Signalling(TCP) 5060 TCP Host ----> UCi2i SIP Signalling(UDP) 5060 UDP Host ----> UCi2i Media (RTP) 2776 UDP Host ----> UCi2i Media (RTCP) 2777 UDP Host ----> UCi2i Media UDP Host ----> UCi2i H323: Using Assent Firewall Traversal If your video conference system supports Assent traversal, you MAY need to open the ports below in order to register to our firewall traversal server. Gatekeeper RAS 1719 UDP Host ----> UCi2i Call Signalling 2776 TCP Host ----> UCi2i Media (RTP) 2776 UDP Host ----> UCi2i Page 6
7 Media (RTCP) 2777 UDP Host ----> UCi2i Q931/H245 Signalling TCP Host ----> UCi2i Media UDP Host ----> UCi2i H323: Using H /19 Firewall Traversal (used by all Polycom/Lifesize devices) If your video conference system is not a Cisco Telepresence device and supports H /19 firewall traversal, you will need to open the ports below in order to register to our firewall traversal server. Gatekeeper RAS 1719 UDP Host ----> UCi2i H.225 Protocol 1720 TCP Host ----> UCi2i H.245 Protocol 2777 TCP Host ----> UCi2i Q931/H245 Signalling TCP Host ----> UCi2i Media (RTP) 2776 UDP Host ----> UCi2i Media (RTCP) 2777 UDP Host ----> UCi2i Media UDP Host ----> UCi2i Browser-based Video Calling (a.k.a. WebRTC) We offer browser-based video calling - all major browsers are supported. This is typically known as WebRTC but we offer more than that as WebRTC is limited to Google Chrome, Firefox and Opera. We also provide service to any browser that also supports Adobe Flash. To allow this feature to work, the following ports will need to be opened: STUN/TURN Media 3478 UDP Host ----> UCi2i Media TCP Host ----> UCi2i Page 7
8 Media UDP Host ----> UCi2i HTTP 80 TCP Host ----> UCi2i HTTPS 443 TCP Host ----> UCi2i Endpoint Management (optional) If you require your video endpoint to be managed by us, we will require an IP address which is accessible over the Internet. This should be a static NAT IP as we do not recommend placing an endpoint directly on the internet. Please lock down access to the IP s listed above. Please ensure you have the below ports opened on your firewall to allow for monitoring and management of your video endpoint from our network. You will need to ensure your video endpoint is using an NTP server in order for it to authenticate with our Gatekeeper and for encryption to be active. HTTP or 80 TCP Host <----> UCi2i HTTPS (preferred) 443 TCP Host <----> UCi2i SNMP 161 UDP Host <---- UCi2i SNMP Traps 162 UDP Host ----> UCi2i Telnet or 23 TCP UCi2i ----> Host SSH (preferred) 22 TCP UCi2i ----> Host NTP NTP NTP NTP Key Please see below explanations of the direction column (where applicable): Direction Host <----> UCi2i Host <---- UCi2i Host ----> UCi2i Explanation Ports needs to be opened inbound and outbound to/from your VC endpoint and UCi2i Ports need to be opened inbound to your VC endpoint from the UCi2i address ranges Ports need to be opened outbound from your VC endpoint to the UCi2i address ranges Page 8
9 UCi2i ----> Host Host ---> NTP Server Ports need to be opened inbound to your VC endpoint from the UCi2i address ranges Ports need to be opened outbound from your VC endpoint to the NTP Server Finally, If you have any problem, please feel free to call our UCi2i Helpdesk Number: (HK) or (UK). Page 9
10 APAC t: V-Desk: v/e: 21/F, Wyler Centre Phase II Tai Lin Pai Road Kwai Chung, N.T, Hong Kong EMEA t: v/e: 6 Mitre Passage Greenwich Peninsula London SE10 0ER Page 10
UCi2i Video Conference Endpoint Firewall Requirements. UCi2i Video Conference Endpoint Firewall Requirements
1 UCi2i Video Conference Endpoint Firewall Requirements 2 UCi2i VC Endpoint Firewall Requirements Dear customer, Due to the implementation of our secure video network, there are a few firewall rules that
More informationCisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal. Cisco VCS X8.5 December 2014
Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal Cisco VCS X8.5 December 2014 Contents: Cisco VCS IP port usage Which IP ports are used with Cisco VCS? Which
More informationCisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D15066.01 December 2013
Cisco Expressway IP Port Usage for Firewall Traversal Cisco Expressway X8.1 D15066.01 December 2013 Contents: Cisco Expressway IP port usage Which IP ports are used with Cisco Expressway? Which IP ports
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationPersonal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address
NAT Introduction: Vidyo Conferencing in Firewall and NAT Deployments Vidyo Technical Note Section 1 The VidyoConferencing platform utilizes reflexive addressing to assist in setup of Vidyo calls. Reflexive
More informationPorts utilisés. Ports utilisés par le XT1000/5000 :
Ports utilisés Ports utilisés par le XT1000/5000 : 80 HTTP (TCP) WEB server 123 SNTP (UDP) SNTP Client 161 SNMP (UDP) SNMP Configuration and Status 162 SNMP (UDP) SNMP Traps and events 1718 H.225/RAS (UDP)
More informationVidyoWay IT Guide Product Version 3.0 Document Version 3.0 A 5/9/2014
VidyoWay IT Guide Product Version 3.0 Document Version 3.0 A 5/9/2014 433 Hackensack Ave Hackensack, NJ 07601 USA 2014 Vidyo, Inc. all rights reserved. Vidyo s technology is covered by one or more issued
More informationMS Skype for Business and Lync. Integration Guide
MS Skype for Business and Lync Integration Guide June 03, 2016 Contents Introduction 4 How to use StarLeaf with Microsoft Skype for Business 2015 Server 5 Pre-requisites 5 Step One: Federate between the
More informationLifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
More informationCisco Expressway Basic Configuration
Cisco Expressway Basic Configuration Deployment Guide Cisco Expressway X8.1 D15060.03 August 2014 Contents Introduction 4 Example network deployment 5 Network elements 6 Internal network elements 6 DMZ
More informationCrossing firewalls. Liane Tarouco Leandro Bertholdo RNP POP/RS. Firewalls block H.323 ports
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS Firewalls block H.323 ports 1 H.323 ports Security issues For the H.323 protocol to cross a firewall, the specific static ports and all ports
More informationTMS Phone Books Troubleshoot Guide
TMS Phone Books Troubleshoot Guide Document ID: 118705 Contributed by Adam Wamsley and Magnus Ohm, Cisco TAC Engineers. Jan 05, 2015 Contents Introduction Prerequisites Requirements Components Used Related
More informationPolycom RealPresence Access Director System
RELEASE NOTES Version 4.2 June 25, 2015 3725-78700-001F1 Polycom RealPresence Access Director System Polycom, Inc. 1 Polycom RealPresence Access Director System Release Notes Version 4.2 Contents What
More informationHow to Make the Client IP Address Available to the Back-end Server
How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration
More informationAVer Video Conferencing Network Setup Guide
AVer Video Conferencing Network Setup Guide Note: Please pass this page to your Network Admin/IT Dept. Please refer to the users manual to set up Admin Password/System Name and Phonebook Bandwidth Requirements
More informationCisco Expressway Series
Data Sheet Cisco Expressway Series Advanced Collaboration Gateways for Simple and Secure Unified Communications Product Overview Cisco Expressway Series gateways for Cisco Unified Communications Manager
More informationStarLeaf Network Guide
Network Guide Contents Introduction------------------------------------------------------------------------------------------------------------------------- 3 Registration to the ------------------------------------------------------------------------------------------
More informationApplication Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0
Application Note Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0 1 FIREWALL REQUIREMENTS FOR ONSIGHT MOBILE VIDEO COLLABORATION SYSTEM AND HOSTED
More informationCisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)
Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway) Deployment Guide Cisco VCS X8.1 D14651.08 August 2014 Contents Introduction 4 Example network deployment 5 Network
More informationVideo Conferencing and Firewalls
Video Conferencing and Firewalls Out with the Old, in with the New Video Conferencing is leaving ISDN for a better transport medium, IP. It s been happening for a long time in Europe but now ISDN is well
More informationIP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
More informationCullen Jennings fluffy@cisco.com. July 2015
Cullen Jennings fluffy@cisco.com July 2015 v9 1 A B 1. Outbound STUN request to well known STUN port (3478) Firewall creates 3-tuple pinhole for incoming and outgoing STUN message with matching username
More informationDistrict of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
More informationPolicy on ARCS eresearch Services Firewall Configuration Requests
Policy on ARCS eresearch Services Firewall Configuration Requests (Endorsed by CAUDIT Executive 29 July 2009) Introduction ARCS and CAUDIT have together sought to arrive at an agreed set of firewall configurations
More informationClearswift SECURE Email Gateway V3.*
Clearswift SECURE Email Gateway V3.* Ports and Protocols Issue 3.12 July 2015 Copyright Version 1.1, July, 2015 Published by Clearswift Ltd. 1995 2015 Clearswift Ltd. All rights reserved. The materials
More informationQuick Installation Card
POWER TRIUMPH BOARD Video Conferencing System VC1 Package Contents POWER 1. 2. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 3. 1. Main System 8. Mini Din 8 pin MIC Cable 2. Camera 9. HDMI Cable 3. Microphone
More informationUnified Communications in RealPresence Access Director System Environments
[Type the document title] 3.0 October 2013 3725-78704-001B1 Deploying Polycom Unified Communications in RealPresence Access Director System Environments Polycom Document Title 1 Trademark Information Polycom
More informationApplication Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
More informationApplication Note. Onsight Connect Network Requirements V6.1
Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network
More informationSetting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer
Setting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer Mathias Johanson Alkit Communications AB Introduction The Alkit Reflex reflector/mixer system can be set-up to interconnect
More informationnexvortex Setup Guide
nexvortex Setup Guide CUDATEL COMMUNICATION SERVER September 2012 510 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex
More informationCustomer Guide. BT Business - BT SIP Trunks. BT SIP Trunks: Firewall and LAN Guide. Issued by: BT Business Date 14.02.2012. Issue: v1.
Customer Guide BT Business - BT SIP Trunks BT SIP Trunks: Firewall and LAN Guide Issue: v1.3 1 Contents 1 Overview 3 2 Firewalls 3 3 Recommendations 4 4 Ports 5 5 Warning & Disclaimer 5 Issue: v1.3 2 1
More informationWhite Paper. Traversing Firewalls with Video over IP: Issues and Solutions
Traversing Firewalls with Video over IP: Issues and Solutions V Table of Contents Introduction Role of a Firewall Deployment Issues Relating to IP Video and Firewall Traversal The VCON SecureConnect Solution
More informationVegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
More informationUnified Communications Mobile and Remote Access via Cisco VCS
Unified Communications Mobile and Remote Access via Cisco VCS Deployment Guide Cisco VCS X8.2 Cisco Unified CM 9.1(2)SU1 or later January 2015 Contents Mobile and remote access overview 4 Jabber client
More informationAbout UCi2i The future of visual communications
At a glance About UCi2i The future of visual communications UCi2i is a global Video Managed Services Provider helping transform businesses with an affordable and fully supported business-class video conferencing
More informationFRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or
More informationAdministrator Guide for Avaya Scopia Management for Aura Collaboration Suite
Administrator Guide for Avaya Scopia Management for Aura Collaboration Suite Version 8.3 For Solution 8.3 July 2014 2000-2014 Avaya Inc. All intellectual property rights in this publication are owned by
More informationApplication Note - Using Tenor behind a Firewall/NAT
Application Note - Using Tenor behind a Firewall/NAT Introduction This document has been created to assist Quintum Technology customers who wish to install equipment behind a firewall and NAT (Network
More informationUnified Communications Mobile and Remote Access via Cisco Expressway
Unified Communications Mobile and Remote Access via Cisco Expressway Deployment Guide Cisco Expressway X8.1.1 or later Cisco Unified CM 9.1(2)SU1 or later January 2015 Contents Mobile and remote access
More informationOnline course syllabus. MAB: Voice over IP
Illuminating Technology Course aim: Online course syllabus MAB: Voice over IP This course introduces the principles and operation of telephony services that operate over Internet Protocol (IP) networks
More informationHow To Protect Your Network From A Hacker Attack On Zcoo Ip Phx From A Pbx From An Ip Phone From A Cell Phone From An Uniden Ip Pho From A Sim Sims (For A Sims) From A
Contents 1. Introduction... 3 2. Embedded Security Solutions... 4 2.1 SSH Access... 4 2.2 Brutal SIP Flood... 4 2.3 SIP Register Limitation... 5 2.4 Guest calls... 5 3. Manually configure system to raise
More informationMultimedia Transport Protocols for WebRTC
Multimedia Transport Protocols for WebRTC Colin Perkins http://csperkins.org/ What is WebRTC? A framework for browser-based real-time conferencing Includes network, audio, and video components used in
More informationProxy & Firewall Target Server List to Permit Communication
Proxy & Firewall Target Server List to Permit Communication V-CUBE Meeting4 V-CUBE Document V-CUBE Sales & Support V-CUBE, Inc. Update Information Date Updates 2016/04/4 Address added to domain settings
More informationFRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
More informationLifeSize Video Communications Systems Administrator Guide
LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made
More informationVirtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
More informationImplementing Network Address Translation and Port Redirection in epipe
Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4
More informationMiaRec. Cisco Built-in-Bridge Recording Interface Configuration Guide. Revision 1.2 (2015-10-06)
Cisco Built-in-Bridge Recording Interface Configuration Guide Revision 1.2 (2015-10-06) Table of Contents 1 Overview... 3 1.1 Purpose... 3 2 Architecture... 4 3 Requirements... 5 4 Identify Phones that
More informationWhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition
WhatsUpGold v14.2 Getting Started with WhatsUp Gold MSP Edition Getting Started with MSP Edition In This Guide About WhatsUp Gold MSP Edition... 1 User interfaces... 2 About the MSP Edition reporting capabilities...
More informationQuick Installation Card
Power Display 2 (VGA) Display 2 (HDMI) Display 1 Speaker Audio In PC / Laptop PC / Laptop Rev.: By: yyyy/mm/dd Apprv d Part #: Mic Camera 01 Ivy Z 圖 面 繪 製 201/0/17 Calvin Description: Artwork, V2C1E AVer
More informationDeploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview.
Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2 Organizations can use the Barracuda Load Balancer to enhance the scalability and availability of their Microsoft Office Communications
More informationPolycom. RealPresence Ready Firewall Traversal Tips
Polycom RealPresence Ready Firewall Traversal Tips Firewall Traversal Summary In order for your system to communicate with end points in other sites or with your customers the network firewall in all you
More informationUnified Communications Mobile and Remote Access via Cisco VCS
Unified Communications Mobile and Remote Access via Cisco VCS Deployment Guide Cisco VCS X8.1.1 or later Cisco Unified CM 9.1(2)SU1 or later January 2015 Contents Mobile and remote access 4 Jabber client
More informationTelephony System Integrator s Guide for Bandwidth.com. Citrix EasyCall Gateway 2.2.1
Citrix EasyCall Gateway Telephony System Integrator s Guide for Bandwidth.com Citrix EasyCall Gateway 2.2.1 Copyright and Trademark Notice Use of the product documented in this guide is subject to your
More informationANS Monitoring as a Service. Customer requirements
ANS Monitoring as a Service Customer requirements Version History Version: 1.0 Date: 29/03/2015 Version Date Summary Of Changes Pages Changed Author 0.1 17/07/15 Initial document created ALL Dale Marshall
More informationGeneral Guidelines for SIP Trunking Installations
General Guidelines for SIP Trunking Installations 1) How do I setup my SIP trunk for inbound/outbound calling? We authenticate IP-PBX SIP Trunking traffic by: IP Authentication (IP address) or Digest Authentication
More informationCisco TelePresence Video Communication Server Expressway
Data Sheet Cisco TelePresence Video Communication Server Expressway Extending video communications securely beyond the enterprise Product Overview Figure 1. Cisco TelePresence Video Communication Server
More informationPexip Reverse Proxy and TURN Server Deployment Guide
Pexip Reverse Proxy and TURN Server Deployment Guide Introduction In Pexip Infinity deployments, all Pexip Infinity Connect clients use HTTPS for the call signaling connections towards Conferencing Nodes.
More informationSuccessful IP Video Conferencing White Paper
Successful IP Video Conferencing White Paper The success of an IP video conference is dependent on two things: connection to the remote system and consistent bandwidth during a call. Connection to a system
More informationScopia Desktop Server
Scopia Desktop Server Installation Guide Version 8.2.1 For Solution 8.2 8.2.1 2000-2013 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd and are protected
More informationTHINKTEL COMMUNICATIONS CUDATEL PHONE SYSTEM 270. High Availability and SIP-TRUNK Configuration
THINKTEL COMMUNICATIONS CUDATEL PHONE SYSTEM 270 High Availability and TABL E OF CO NTENTS 1.1 CONFIGURING TELEPHONE SERVICE PROVIDER (THINKTEL)... 3 1.2 OUTBOUND CALL ROUTING... 5 1.3 INBOUND CALL FROM
More informationLifeSize Passport TM User and Administrator Guide
LifeSize Passport TM User and Administrator Guide February 2011 LifeSize Passport User and Administrator Guide 2 LifeSize Passport This guide explains how to use and configure LifeSize Passport. For information
More informationAcano solution. Acano Server & VM Release R1.8. Single Combined Server Deployment Guide. March 2016 76-1054-02-K
Acano solution Acano Server & VM Release R1.8 Single Combined Server Deployment Guide March 2016 76-1054-02-K Contents 1 Introduction 6 1.1 How to Use this Guide 6 1.1.1 Commands 8 1.1.2 Management and
More informationRemote extensions and remote offices
Remote extensions and remote offices The remote extension feature gives PBX users the freedom to attend to office calls irrespective of their geographic location. It enables remote access to the enterprise's
More informationStarLeaf Connectivity Services. Deployment Guide
StarLeaf Connectivity Services Deployment Guide 31 July 2015 Contents Terminology 4 Why are Connectivity Services needed? 4 What are Connectivity Services? 4 Calling scenarios 5 Architecture 7 Security
More informationA host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
More informations@lm@n Cisco Exam 200-001 Implementing Cisco Video Network Devices (VIVND) Version: 7.1 [ Total Questions: 74 ]
s@lm@n Cisco Exam 200-001 Implementing Cisco Video Network Devices (VIVND) Version: 7.1 [ Total Questions: 74 ] Question No : 1 2 Refer to the Exhibits, in order to create a scheduled or ad-hoc multipoint
More informationVidyoConferencing Network Administrators Guide
VidyoConferencing Network Administrators Guide Windows 8, 7, XP, Vista and Apple Mac OS - updated 30/11/2012 Introduction The Attend Anywhere management platform is a cloud based management, facilitation
More informationFirewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
More informationQUICK START GUIDE MONDOPAD/WIN7 009-1488-01
QUICK START GUIDE MONDOPAD/WIN7 009-1488-01 CONTENTS Hardware Setup...3 Windows Setup and Registration Process...3 Microsoft Windows Setup...3 Mondopad Software Registration...4 Microsoft Office Activation...4
More informationF-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
More informationCisco Unified Videoconferencing Manager Version 5.5
Cisco Unified Videoconferencing Manager Version 5.5 A comprehensive management suite for Cisco Unified Videoconferencing solutions The Cisco Unified Videoconferencing product line an integral component
More informationvideo systems Getting started guide
Cisco TelePresence Video Systems Contents Introduction User interfaces Configuration Appendices Contacts video systems Getting started guide Codec C Series Software version TC6.0 FEBRUARY 2013 MX Series
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationWhat it can do. Further scaling and resilience provided by native clustering. Automatic failover with no single point of failure.
The Acano Solution Acano unites previously incompatible audio, video and web technologies in cospaces virtual meeting rooms, only radically better. With cospaces, people work wherever their ideas and creativity
More informationInternet and Intranet Calling with Polycom PVX 8.0.1
Internet and Intranet Calling with Polycom PVX 8.0.1 An Application Note Polycom PVX is an advanced conferencing software application that delivers Polycom's premium quality audio, video, and content sharing
More informationLifeSize UVC Manager TM Deployment Guide
LifeSize UVC Manager TM Deployment Guide May 2014 LifeSize UVC Manager Deployment Guide 2 LifeSize UVC Manager Network administrators who use UVC Manager to manage video and voice communications systems
More informationSSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
More informationAVer EVC. Quick Installation Guide. Package Contents. 8. Mini Din 8 pin MIC Cable. 1. Main System. 9. HDMI Cable. 2. Camera. 10.
AVer EVC Quick Installation Guide Package Contents 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 2013 AVer Information Inc. All Rights Reserved. 1. Main System 2. Camera 3. Microphone 4. Remote Control 5. Power
More informationManual. ABTO Software
Manual July, 2011 Flash SIP SDK Manual ABTO Software TABLE OF CONTENTS INTRODUCTION... 3 TECHNICAL BACKGROUND... 6 QUICK START GUIDE... 7 FEATURES OF FLASH SIP SDK... 10 2 INTRODUCTION Trends indicate
More informationAcano solution. Third Party Call Control Guide. March 2015 76-1055-01-E
Acano solution Third Party Call Control Guide March 2015 76-1055-01-E Contents Contents 1 Introduction... 3 1.1 How to Use this Guide... 3 1.1.1 Commands... 4 2 Example of Configuring a SIP Trunk to CUCM...
More informationAccessing Remote Devices via the LAN-Cell 2
Accessing Remote Devices via the LAN-Cell 2 Technote LCTN0017 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail: support@proxicast.com
More informationHow do I set up a branch office VPN tunnel with the Management Server?
Fireware How To VPN How do I set up a branch office VPN tunnel with the Management Server? Introduction Using the WatchGuard Management Server, you can make fully authenticated and encrypted IPSec tunnels
More informationPolycom RealPresence Access Director System
Release Notes 3.1 January 2014 3725-78700-001C Polycom RealPresence Access Director System Polycom announces the release of the Polycom RealPresence Access Director system, version 3.1. This document provides
More informationH3C SSL VPN RADIUS Authentication Configuration Example
H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by
More information3.2.2 Bandwidth Requirements
You also need to prioritize your voice traffic over your data traffic and configure the ShoreTel system s feature. 3.2.2 Requirements The amount of bandwidth for voice calls depends on these details: Number
More informationPreinstallation Requirements Guide
Preinstallation Requirements Guide Synergy 3.4.9 June 2015 Synergy 2015 TOC 1: Introduction 4 Synergy platform modules 4 Synergy install procedure - your responsibilities 4 Further information about Synergy
More informationINSTANT CONNECT SERVICE USER GUIDE
INSTANT CONNECT SERVICE USER GUIDE Contents Introduction... 3 Office Communicator 2007 R2 PC Desktop Client... 4 Manual configuration of Office Communicator... 4 Troubleshooting... 5 Microsoft Office Communicator
More informationAvaya Video Conferencing Manager Deployment Guide
Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya
More informationCisco TelePresence Video Communication Server Starter Pack Express Bundle
Data Sheet Cisco TelePresence Video Communication Server Starter Pack Express Product Overview Figure 1. Cisco TelePresence Video Communication Server Starter Pack Express Bundle The Cisco TelePresence
More informationPSTN Survivability - Sentinel in the LAN with PBX Registering to Sentinel. Dgw v2.0.30.549 Revision 01 April 30, 2015. www.media5corp.
PSTN Survivability - Sentinel in the LAN with PBX Registering to Sentinel Dgw v2.0.30.549 Revision 01 April 30, 2015 www.media5corp.com PSTN Survivability - Sentinel in the LAN with PBX Registering to
More informationSCOPIA iview Management Suite
SCOPIA iview Management Suite Installation Guide Version 7.7 2000-2011 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd and are protected by United States
More informationSource-Connect Network Configuration Last updated May 2009
Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network
More informationVersion 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
More informationMany network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.
RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional
More informationQuickstart guide to Configuring WebTitan
Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More information