Polycom DMA 7000 System Deployment Guide for Maximum Security Environments
|
|
|
- Amie Harper
- 9 years ago
- Views:
Transcription
1 Military Unique Deployment Guide v January B1 Polycom DMA 7000 System Deployment Guide for Maximum Security Environments
2 Trademark Information POLYCOM and the names and marks associated with Polycom's products are trademarks and/or service marks of Polycom, Inc., and are registered and/or common law marks in the United States and various other countries. All other trademarks are the property of their respective owners. Java is a registered trademark of Oracle America, Inc., and/or its affiliates. Patent Information The accompanying product may be protected by one or more U.S. and foreign patents and/or pending patent applications held by Polycom, Inc. Support Information For support on your Polycom systems, contact Polycom Global Services at or go to the Polycom Support Contact page ( Documentation Feedback Polycom appreciates your help as we work to improve its product documentation. Send your comments to [email protected] Polycom, Inc. All rights reserved. Polycom, Inc America Center Drive San Jose CA USA No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Polycom, Inc. Under the law, reproducing includes translating into another language or format. As between the parties, Polycom, Inc., retains title to and ownership of all proprietary rights with respect to the software contained within its products. The software is protected by United States copyright laws and international treaty provision. Therefore, you must treat the software like any other copyrighted material (e.g., a book or sound recording). Every effort has been made to ensure that the information in this manual is accurate. Polycom, Inc., is not responsible for printing or clerical errors. Information in this document is subject to change without notice. ii
3 Contents 1 Before You Begin End User License Agreement Assumptions Documentation Resources Document Change History The Consequences of Enabling Maximum Security Mode Intrusion Detection Systems Polycom DMA System Initial Server Setup Conditions of Fielding Complete the First-Time Setup Worksheet Collect the Necessary Materials Unpack and Install the Hardware Components Configure the Polycom DMA System Server(s) Secure the Polycom DMA System Servers Polycom DMA System Maximum Security Deployment Add DNS Records for the Polycom DMA System Create Local System Administrator Account License the System Configure Signaling Install Security Certificates and Enable OCSP Configure Secure SIP or AS-SIP Connections Integrate the DMA System With a Local Session Controller (LSC).. 29 Configure Default AS-SIP Resource Priority Values for Dial-Out Conferencing Configure Encryption for Conference Templates Enable Secure Inbound SIP or AS-SIP VMR Connections Configure VMRs for Users Set Security Configuration to Maximum Security Review and Modify (If Necessary) Security-Related Settings Integrate with Active Directory Polycom, Inc. iii
4 DMA Deployment Guide for Maximum Security Environments Add Polycom MCUs to the System Verify System Functionality Enable User Certificate Validation iv Polycom, Inc.
5 1 Before You Begin The Polycom Distributed Media Application (DMA ) 7000 system provides the special features and functionality required to deploy the system into a maximum security environment. This deployment guide describes the recommended procedure for doing so. This software, when configured per the guidance provided in this guide, is designed to meet the latest U.S. Department of Defense (DoD) security requirements for listing on the Unified Capabilities (UC) Approved Products List (APL) as maintained by the Defense Information Systems Agency (DISA) Unified Capabilities Connection Office (UCCO). For more information about the UC APL process, please visit the UCCO website. This chapter provides important information that you should review before proceeding. In particular, be sure you fully understand the information in The Consequences of Enabling Maximum Security Mode on page 3. It s important to note that this version of the Polycom DMA system is not a maximum-security-only release. During initial setup, it can be configured for a lower security level (the High security or out-of-the-box default Custom security settings). You can switch the system to Maximum security at any time after initial installation. This flexibility allows you to, for instance, install certificates and then switch to High security in order to test drive their operation before you make the irreversible switch to Maximum security. This guide assumes that you intend to enable Maximum security as part of the system deployment process. But this step is one of several in configuring the system for a maximum security environment, and it s most conveniently done after several other steps have been completed. Polycom, Inc. 1
6 DMA Deployment Guide for Maximum Security Environments End User License Agreement Use of this software constitutes acceptance of the terms and conditions of the Polycom DMA 7000 system end-user license agreement (EULA). The EULA is included in the release notes document for your version, which is available on the Polycom Support page for the Polycom DMA 7000 system at support.polycom.com. Assumptions This document is written for a technical audience. You must know the following: Basic computer and network system administration skills Physical installation and cabling of servers Network configuration, including IP addressing, subnets, gateways, domains, DNS, time servers, and possibly network routing The deployment plan for the Polycom DMA system being installed and the video conferencing/collaboration network of which it will be a part If necessary, obtain the assistance of the appropriate IT or network administration personnel before proceeding. Documentation Resources In addition to this guide, the available documentation that describes the Polycom DMA system includes: Polycom DMA 7000 System Quick Start Guide Polycom DMA 7000 System Release Notes Polycom DMA 7000 System Operations Guide Online help. In the management interface, select Help > Help Contents to access the entire help system, or click on any page or the Help button in any dialog box to see the specific help topic for that location. For more information about partner product interoperability, refer to the partner deployment guides. For information about specific certifications, refer to: certification_accreditation.html 2 Polycom, Inc.
7 Before You Begin Document Change History This information is required for listing on the US Department of Defense (DoD) Unified Capabilities (UC) Approved Products List (APL): Doc Version Release Date Description 1.0 August 2011 Initial approved release 2.0 January 2014 Second release To request information or submit comments about this document, please contact Polycom Global Services. The Consequences of Enabling Maximum Security Mode Enabling the Maximum security setting is irreversible and has the following significant consequences: All unencrypted protocols and unsecured access methods are disabled. The boot order is changed so that the servers can t be booted from the optical drive or a USB device. A BIOS password is set. The port 443 redirect is removed, and the system can only be accessed by the full URL ( where <IP> is one of the system s management IP addresses or a host name that resolves to one of those IP addresses). For all server-to-server connections, the system requires the remote party to present a valid X.509 certificate. Either the Common Name (CN) or Subject Alternate Name (SAN) field of that certificate must contain the address or host name specified for the server in the Polycom DMA system. Polycom RealPresence Collaboration Server and RMX MCUs don t include their management IP address in the SAN field of the CSR (Certificate Signing Request), so their certificates identify them only by the CN. Therefore, in the Polycom DMA system, a Polycom MCU s management interface must be identified by the FQDN specified in the CN field, not by IP address. Similarly, an Active Directory server certificate often specifies only the FQDN. Therefore, in the Polycom DMA system, the enterprise directory must be identified by FQDN, not by IP address. Superclustering is not supported. Juniper SRC integration is not supported. Polycom, Inc. 3
8 DMA Deployment Guide for Maximum Security Environments Calendaring service can t be enabled, and the Polycom DMA system doesn t support virtual meeting rooms (VMRs) created by the Polycom Conferencing Add-in for Microsoft Outlook. Integration to a Polycom RealPresence Resource Manager or CMA system is not supported. A Polycom RealPresence Resource Manager system can be integrated to the DMA system, providing it with access to the DMA API and the ability to use the DMA system s pool of MCUs for scheduling and Anytime conferences. But the reverse connection, integrating the DMA system to the RealPresence Resource Manager or CMA system for the purpose of obtaining site topology and user-to-device association data, is not supported. On the Banner page, Enable login banner is selected and can t be disabled. On the Login Sessions page, the Terminate Session action is not available. On the Troubleshooting Utilities menu, Top is removed. In the Add User and Edit User dialog boxes, conference and chairperson passwords are obscured. After Maximum security is enabled, users must change their passwords. If the system is integrated with an enterprise directory, only one local user can have the Administrator role, and no local users can have the Provisioner or Auditor role. If there are multiple local administrators when you enable Maximum security, the system prompts you to choose one local user to retain the Administrator role. All other local users, if any, become conferencing users only and can t log into the management interface. If the system is not integrated with an enterprise directory, each local user can have only one assigned role (Administrator, Provisioner, or Auditor). If some local users have multiple roles when you enable Maximum security, they retain only the highest-ranking role (Administrator > Auditor > Provisioner). Local user passwords have stricter limits and constraints (each is set to the noted default if below that level when you enable Maximum security): Minimum length is characters (default is 15). Must contain 1 or 2 (default is 2) of each character type: uppercase alpha, lowercase alpha, numeric, and non-alphanumeric (special). Maximum number of consecutive repeated characters is 1-4 (default is 2). Number of previous passwords that a user may not re-use is 8-16 (default is 10). 4 Polycom, Inc.
9 Before You Begin Minimum number of characters that must be changed from the previous password is 1-4 (default is 4). Password may not contain the user name or its reverse. Maximum password age is days (default is 60). Minimum password age is 1-30 days (default is 1). Other configuration settings have stricter limits and constraints (each is set to the noted default if below that level when you enable Maximum security): Session configuration limits:» Sessions per system is 8-80 (default is 40).» Sessions per user is 1-10 (default is 5).» Session timeout is 5-60 minutes (default is 10). Local account configuration limits:» Local user account is locked after 2-10 failed logins (default is 3) due to invalid password within 1-24 hours (default is 1).» Locked account remains locked either until unlocked by an administrator (the default) or for a duration of minutes. Software build information is not displayed anywhere in the interface. You can t restore a backup made before Maximum security was enabled. File uploads may fail when using the Mozilla Firefox browser unless the proper steps have been taken. See below. Enabling File Uploads in Maximum Security with Mozilla Firefox The Mozilla Firefox browser uses its own certificate database instead of the certificate database of the OS. If you use only that browser to access the Polycom DMA system, the certificate(s) needed to securely connect to the system may be only in the Firefox certificate database and not in the Windows certificate store. This causes a problem for file uploads. File upload via the Polycom DMA system s Flash-based interface bypasses the browser and creates the TLS/SSL connection itself. Because of that, it uses the Windows certificate store, not the Firefox certificate database. If the certificate(s) establishing trust aren t there, the file upload silently fails. To avoid this problem, after the Polycom DMA system s certificates are installed, you must import the needed certificates into Internet Explorer (and thus into the Windows certificate store). And, when accessing the system with Firefox, you must use its fully qualified host name. First, start Internet Explorer and point it to the Polycom DMA system. If you don t receive a security warning, the needed certificates are already in the Windows certificate store. Polycom, Inc. 5
10 DMA Deployment Guide for Maximum Security Environments If you receive a warning, import the needed certificates. The details for doing so depend on the version of Internet Explorer and on your enterprise s implementation of certificates. In Internet Explorer 7, elect to continue to the site. Then click Certificate Error to the right of the address bar and click View Certificates to open the Certificate dialog box. From there, you can access the Certificate Import Wizard. The entire trust chain must be imported (the system s signed certificate, intermediate certificates, if any, and the root CA s certificate). When importing a certificate, let Internet Explorer automatically select a certificate store. Intrusion Detection Systems The Polycom DMA system has both HIDS (Host Intrusion Detection System) and NIDS (Network Intrusion Detection System) enabled at all times, regardless of security settings. HIDS The Polycom DMA system uses the Linux kernel s inotify file/directory change notification system to monitor the enire file system for change events, with the exclusion of a short list of files and directories that are expected to change (logs, temporary files, etc.). Any change to one of the monitored files or directories (including attribute change, write, delete, move, and create) is recorded in /var/logs/nids.log. NIDS The Polycom DMA system uses iptables for access control. For each different kind of packet processing, there is a table containing chained rules for the treatment of packets. Every network packet arriving at or leaving from the computer must pass the rules applicable to it. Depending on the nature of the suspect packets, the rules may reject, drop, or limit their arrival rate (dropping the rest).. The system adds a hosts.deny file when Linux console access is disallowed (as is the case when Maximum security is enabled). Details of each blocked access attempt are recorded in /var/logs/nids.log. 6 Polycom, Inc.
11 2 Polycom DMA System Initial Server Setup This chapter describes the steps required to perform the installation and initial setup of a Polycom Distributed Media Application (DMA ) 7000 video collaboration infrastructure server or two-server cluster. If your enterprise ordered two Polycom DMA servers, it s imperative that you know whether the intent is to set up a single co-located two-server DMA cluster or to set up two separate single-server DMA systems. Once you ve configured two DMA servers as a two-server cluster, reconfiguring the servers as separate single-server DMA systems requires re-imaging the servers. Before you start, we strongly suggest that you read Introduction to the Polycom DMA System in Chapter 1 and all of Chapter 2 of the Polycom DMA 7000 System Operations Guide, available for download from support.polycom.com. The servers in a two-server cluster must be co-located, preferably in the same rack. If possible, use one of the Ethernet cables included in the server shipment to connect them to each other. If you have a Polycom CMA system, be aware that a two-server DMA cluster is not functionally the same as a CMA system with a redundancy server, and the proper procedure for installation is not the same. We strongly recommend installing and configuring both servers of a two-server cluster as a single system, as described in this document. If you have an existing fully configured and operational single-server system that you want to expand into a two-server cluster, use the procedure described in the Adding a Second Server section of the online help or Polycom DMA 7000 System Operations Guide, not this document. At the end of this chapter, you will have successfully logged into the Polycom DMA system, completed the network and time server configuration, and be ready to finish configuring the system, including configuring it for a maximum security environment. Polycom, Inc. 7
12 DMA Deployment Guide for Maximum Security Environments Conditions of Fielding When the system is deployed into an operational environment, the following security measures (at a minimum) must be implemented to ensure an acceptable level of risk for the sites Designated Approving Authority: a b The system must be incorporated in the site s PKI. If PKI is not incorporated, the following findings will be included in the site s architecture:» APP3280 for DMA 7000 Rel J» APP3290 for DMA 7000 Rel J» APP3300 for DMA 7000 Rel J» APP3305 for DMA 7000 Rel J» NET0445 for DMA 7000 Rel J The system must be integrated into the site s AD environment for authentication and authorization requirements. c The site must be a STIG-compliant, PK-enabled workstation for management of the solution. d The configuration must be in compliance with the Polycom DMA 7000 Rel J military-unique features deployment guide. e The site must register the system in the Systems Networks Approval Process Database ( as directed by the DSAWG and Program Management Office. Complete the First-Time Setup Worksheet Before you begin system setup, fill out the My System Values column of this worksheet. 8 Polycom, Inc.
13 Polycom DMA System Initial Server Setup First-Time Setup Worksheet System Configuration Information My System Values Description System IP type System server configuration System split network setting Caution: Choose split networking only if you need to restrict access to the management interface and SNMP to users on an isolated non-public network. In most network environments, users accessing the management interface are on the same network as endpoints and other devices communicating with the DMA system, and they use the same physical and virtual IP addresses and the same network interface. To split the network configuration, you must use different gateways and subnets for management and signaling, and separate physical connections for the management and signaling networks (eth0 for management, eth2 for signaling). In a split network configuration, routing rules are necessary for proper routing of network traffic. If management and signaling traffic are combined on the same network (subnet), both use the same physical and virtual IP addresses and the same network interface. If you aren t sure whether split networking is appropriate, possible, or necessary for this installation, consult the appropriate IT staff or network administrator for your organization. Specify whether the system should support IPv4, IPv6, or both. If both, complete all the IP address information below. If only IPv4 or IPv6, complete only the corresponding fields below. Specify whether you re installing a single-server system or a two-server system. For a single-server system, the Server 2 section below is not used. If you received two servers, be sure you ve read and understood the cautions on page 7 and know whether you re setting up a co-located two-server DMA cluster or two separate single-server DMA systems. Specify whether to combine or split the management and signaling interfaces. If the same network will be used for both management (administrative access) and signaling, the signaling IP addresses and Shared Signaling Network Settings section below are not used. Polycom, Inc. 9
14 DMA Deployment Guide for Maximum Security Environments System Configuration Information My System Values Description Server 1 Management host name Management IPv4 Management IPv6 Signaling IPv4 Signaling IPv6 Local host name of the first (or only) Polycom DMA server s management (or combined) interface. Host names may contain only letters, numbers, and internal dashes (hyphens), and may not include a domain. The reserved values appserv* and dmamgk-* may not be used for host names. Static, physical IP address(es) for the first (or only) server s management (or combined) interface. Static, physical IP address(es) for the first (or only) server s signaling interface (if networking is split). Server 2 Management host name Management IPv4 Management IPv6 Signaling IPv4 Signaling IPv6 Local host name of the second server s management (or combined) interface. Host names may contain only letters, numbers, and internal dashes (hyphens), and may not include a domain. The reserved values appserv* and dmamgk-* may not be used for host names. Static, physical IP address(es) for the second server s management (or combined) interface. Static, physical IP address(es) for the second server s signaling interface (if networking is split). 10 Polycom, Inc.
15 Polycom DMA System Initial Server Setup System Configuration Information My System Values Description Shared Management Network Settings Virtual host name Virtual IPv4 Virtual IPv6 Subnet mask IPv6 prefix length IPv4 gateway Auto-negotiation In the combined network configuration (most network environments), users accessing the management interface are on the same network as endpoints and other devices communicating with the DMA system, and these settings are used for both management and signaling. Virtual host name and IP address(es) for the system s management (or combined) network interface. For a one-server configuration, these fields are disabled. (Exception: If only IPv6 is enabled, the system must have two addresses, so a single-server system must still have a virtual host name and IP address.) Host names may contain only letters, numbers, and internal dashes (hyphens), and may not include a domain. The reserved values appserv* and dmamgk-* may not be used for host names. IPv4 network mask that defines the subnetwork of the system s management or combined interface. IPv6 CIDR (Classless Inter-Domain Routing) prefix size value (the number of leading 1 bits in the routing prefix mask) that defines the subnetwork of the system s management or combined interface. IP address of the gateway server used to route network traffic outside the subnet. Yes or no. If no, indicate speed and full or half duplex. Note: Auto-negotiation is required if your network is 1000Base-T. LAN Security Settings Caution: In a network that requires 802.1x authentication for servers (this is rarely the case), iincorrect settings in this section and, if applicable, lack of the proper certificate(s) can make the system unreachable. Recovering from this situation requires connecting a laptop to the system using a crossover cable in order to access it. Enable 802.1x Enables the system to authenticate this network interface to the LAN. Depending on the authentication method, the access credentials required may be either a user name and password (specified below) or a security certificate. Polycom, Inc. 11
16 DMA Deployment Guide for Maximum Security Environments System Configuration Information My System Values Description User name Password EAP method Protocol Shared Signaling Network Settings Virtual signaling host name Virtual signaling IPv4 Virtual signaling IPv6 Subnet mask IPv6 prefix length IPv4 gateway Auto-negotiation The user name with which the system authenticates this interface. The password for the user name entered above. The Extensible Authentication Protocol method used to establish trust with the authentication server (this is also known as the outer authentication protocol). When a TLS tunnel is established with the authentication server, the protocol used within the tunnel (this is also known as the inner authentication protocol). Needed only if signaling network is separate (this is rarely the case; see the description for System split network setting on page 9). In that case, required even for single-server installation. Virtual host name and IP address(es) for the system s signaling network interface. For a one-server configuration, these fields are disabled. (Exception: If only IPv6 is enabled, the system must have two addresses, so a single-server system must still have a virtual host name and IP address.) Host names may contain only letters, numbers, and internal dashes (hyphens), and may not include a domain. The reserved values appserv* and dmamgk-* may not be used for host names. IPv4 network mask that defines the subnetwork of the system s signaling interface. IPv6 CIDR (Classless Inter-Domain Routing) prefix size value (the number of leading 1 bits in the routing prefix mask) that defines the subnetwork of the system s signaling interface. IP address of the gateway server used to route network traffic outside the subnet. Yes or no. If no, indicate speed and full or half duplex. Note: Auto-negotiation is required if your network is 1000Base-T. 12 Polycom, Inc.
17 Polycom DMA System Initial Server Setup System Configuration Information My System Values Description LAN Security Settings Caution: In a network that requires 802.1x authentication for servers (this is rarely the case), incorrect settings in this section and, if applicable, lack of the proper certificate(s) can make the system unreachable. Recovering from this situation requires connecting a laptop to the system using a crossover cable in order to access it. Enable 802.1x User name Password EAP method Protocol Enables the system to authenticate this network interface to the LAN. Depending on the authentication method, the access credentials required may be either a user name and password (specified below) or a security certificate. The user name with which the system authenticates this interface. The password for the user name entered above. The Extensible Authentication Protocol method used to establish trust with the authentication server (this is also known as the outer authentication protocol). When a TLS tunnel is established with the authentication server, the protocol used within the tunnel (this is also known as the inner authentication protocol). General System Network Settings DNS search domains DNS 1 DNS 2 DNS 3 Domain Space- or comma-separated list of fully qualified domain names to query on the DNS servers to resolve host names (optional). The system domain is added automatically; you don t need to enter it. IP addresses of up to three domain name servers. At least one DNS server is required. Your Polycom DMA system must be accessible by its host name(s), not just its IP address(es), so you (or your DNS administrator) must create A (address) resource records (RRs) for IPv4 and/or AAAA records for IPv6 on your DNS server(s). A/AAAA records that map each physical host name to the corresponding physical IP address and each virtual host name to the corresponding virtual IP address are mandatory. Fully qualified domain name of the site to which the system belongs. Polycom, Inc. 13
18 DMA Deployment Guide for Maximum Security Environments System Configuration Information My System Values Description Signaling DSCP Management DSCP Default IPv6 gateway Default IPv4 gateway Caution: When initially configuring the servers, set this to Management to ensure that you can log into the management interface after the system reboots. You can change the setting to Signaling later. The Differentiated Services Code Point value (0-63) to put in the DS field of IP packet headers on outbound packets associated with signaling traffic. The DSCP value is used to classify packets for quality of service (QoS) purposes. If you re not sure what value to use, leave the default of 0. The Differentiated Services Code Point value (0-63) to put in the DS field of IP packet headers on outbound packets associated with management traffic. The DSCP value is used to classify packets for quality of service (QoS) purposes. If you re not sure what value to use, leave the default of 0. The IPv6 gateway s address and the interface used to access it, generally eth0, specified as: <IPv6_address>%eth0 If management and signaling traffic are on separate networks, select which of the two networks gateway servers is the default. Your choice depends on your network configuration and routing. Typically, unless all the endpoints, MCUs, and other devices that communicate with the system are on the same subnet, you d select the signaling network and use the appropriate routing rules to enable access to the management interface. 14 Polycom, Inc.
19 Polycom DMA System Initial Server Setup System Configuration Information My System Values Description System Time Time zone NTP server #1 NTP server #2 NTP server #3 Routing Configuration Caution: In split network configuration, the management network and signaling network must use different gateways and subnets. Destination host/network Time zone in which the system is located. We strongly recommend selecting the time zone of a specific geographic location (such as America/Denver), not one of the generic GMT offsets (such as GMT+7). If you really want to use a generic GMT offset (for instance, to prevent automatic daylight saving time adjustments), note that they use the Linux/Posix convention of specifying how many hours ahead of or behind local time GMT is. Thus, the generic equivalent of America/Denver (UTC-07:00) is GMT+07, not GMT-07. IP address of the primary NTP time server. Use of time servers is strongly recommended. All the devices in your video conferencing deployment should use the same time servers to avoid potential problems caused by time differences among devices. IP address of a second NTP time server (optional, but strongly recommended). IP address of a third NTP time server (optional, but strongly recommended). In a combined network configuration (the most common setup), where users accessing the management interface are on the same network as endpoints and other devices communicating with the DMA system, the operating system s underlying routing configuration is likely sufficient and special routing rules usually aren t needed. In a split network configuration, routing rules are necessary for proper routing of network traffic. If you know you need to set up a network routing rule or rules, specify the information below for each rule. If you aren t sure, consult the appropriate IT staff or network administrator for your organization. The IP address of the destination network host or segment. Polycom, Inc. 15
20 DMA Deployment Guide for Maximum Security Environments System Configuration Information My System Values Description Prefix length Interface Via The CIDR (Classless Inter-Domain Routing) value that, together with the destination host/network address, defines the subnet for this route. For IPv4, a prefix length of 24 is equivalent to specifying a subnet mask of A prefix length of 16 is equivalent to specifying a subnet mask of In split network configuration, specify the interface for this route. IP address of router for this route. Optional, and only needed for non-default routers. Collect the Necessary Materials Before you install a Polycom DMA system, collect these materials: Polycom DMA 7000 System Release Notes Polycom DMA system server shipment Completed First-Time Setup Worksheet (see page 8) PC running Microsoft Windows (XP Pro, Vista, or Windows 7) with: 1280x1024 (SXGA) minimum display resolution; 1680x1050 (WSXGA+) or greater recommended USB and Ethernet ports Java 1.6 or newer Microsoft Internet Explorer 7 or newer, Mozilla Firefox 3 or newer, or Google Chrome 11 or newer Adobe Flash Player or newer The Polycom DMA system s Flex-based management interface requires Adobe Flash Player. For stability and security reasons, we recommend always using the latest version of Flash Player. Even so, be aware that your browser s Flash plugin may hang or crash from time to time. Your browser should alert you when this happens and enable you to reload the plugin. In some cases, you may need to close and restart your browser. In the Google Chrome browser, use the Adobe Flash plugin, not the built-in Flash support. 16 Polycom, Inc.
21 Polycom DMA System Initial Server Setup Unpack and Install the Hardware Components The Polycom DMA system uses either one or two Polycom-branded Dell servers. Unpack and install the servers as described in the Polycom DMA System Quick Start Guide included in the shipment, but don t connect the Polycom DMA servers to the network (step 8) if you re installing in a secure environment. If the Quick Start Guide isn t readily available, follow the procedure below. To unpack and install the hardware 1 If you purchased Polycom RealPresence Collaboration Server or RMX conference platforms (MCUs) with your Polycom DMA system servers, unpack, install, and securely deploy them as described in the documentation for the model you purchased. 2 Examine the shipping containers for damage. If you find damage, file a claim with the delivery carrier. Polycom is not responsible for damage sustained during shipment of this product. 3 Open and review the container packing slips. 4 Open the containers and examine the contents. A single-server Polycom DMA system shipment includes: 1 Polycom DMA system server 1 copy of the Polycom DMA 7000 System Quick Start Guide (which contains this procedure) 2 power cords 1 rack-mount kit 1 bezel assembly and key 1 server documentation set 1 Polycom DMA system recovery disk (included for recovery purposes; the software on the disk is already installed on the server) If the system recovery disk is inserted into a PC that can boot from the optical drive and that PC is rebooted, the PC boots from the DMA system recovery disk, which performs a full disk wipe and a clean installation of the DMA system OS and software, destroying all existing data on the PC. 1 blank USB memory stick that, in an environment where it s permitted, can be used for the Polycom DMA USB Configuration Utility (available in the /usb-gui directory of the system recovery disk and at support.polycom.com) 1 USB memory stick with server diagnostic utilities (to be used only under the direction of Polycom Global Services) Polycom, Inc. 17
22 DMA Deployment Guide for Maximum Security Environments 1 server Product Information Guide 2 Ethernet cables, short and long (not used for a single-server system) If you ordered the optional 2-post rack mounting kit, it s in a separate box. A two-server system shipment contains a second set of the above items. 5 Examine the contents for damage. Again, if you find damage, file a claim with the delivery carrier. 6 Unpack your system and identify each item. Keep all shipping materials in case you need them later. 7 Assemble the rails and install the server(s) in the rack. To rack-mount a server, see the Rack Installation Guide (available at 8 Connect the power cable(s) to the server(s). 9 (Optional) Attach the power cord retention bracket on the right bend of the power supply handle. Bend the power cable into a loop and attach to the bracket s cable clasp. Repeat for the second power supply. 10 Plug the other end of the cable into a grounded electrical outlet or separate power source such as an uninterrupted power supply (UPS) or a power distribution unit (PDU). 18 Polycom, Inc.
23 Polycom DMA System Initial Server Setup Do not connect the servers to the enterprise network or turn them on at this time. 11 Remove the bezel(s) from the server(s). Configure the Polycom DMA System Server(s) The normal configuration procedure (documented in the Polycom DMA 7000 System Getting Started Guide) uses the Polycom DMA USB Configuration Utility on the USB memory stick shipped with the system. In an environment where USB storage devices aren t permitted, the following procedure enables you to complete the initial setup using only a laptop PC and an Ethernet cable. This is possible because Polycom DMA system servers are shipped with default network settings that you can use to connect to the system. The settings are: IP address: Subnet mask: Default gateway: The Polycom DMA system software is already installed on the server(s), so the system recovery disk isn t needed to set up a new system. Using it overwrites the same software already on the server and needlessly lengthens the setup process. Put the disk away in a safe place in case it s ever needed to restore the system. Exception: Your server shipment box contains two disks. One contains the software installed on the server and the other contains the official UC APL version, which was added before shipment but not installed on the server. If you are in a high-security environment that requires the UC APL version, use the UC APL software DVD to install that version of the software (on both servers of a two-server system). To configure the Polycom DMA system server(s) using a laptop PC 1 Follow the unpack and install procedure (page 17) and the procedure for manually securing the servers (page 23). Do not connect the servers to the enterprise network. 2 Configure the network settings on your laptop to put it on the same network segment as the Polycom DMA system servers (see the server s default settings above). For instance, you can use the following settings: IP address: Subnet mask: Polycom, Inc. 19
24 DMA Deployment Guide for Maximum Security Environments Default gateway: Connect an Ethernet cable between your laptop and the GB 1 interface of the first server. You can use the cable that will later connect the server to the switch (enterprise network). Be sure you connect to the server s GB 1 interface, not the GB 2 or GB 3 interface. 4 If you re replacing the system software on the server(s) with the official UC APL version (see the note on page 19), do the following: a Turn on the first (or only) server and insert the UC APL system recovery disk. b Reboot the first (or only) server. Leave the second server off. The server boots from the DVD, and the installation commences. About minutes later, the DVD ejects and the server reboots. When it s finished, the front panel LCD displays DMA Installed. This indicates that the system software is installed, but its network and time settings aren t configured. If the LCD displays anything else or nothing, stop. Contact Polycom Global Services for assistance. c Go to step 6. 5 If you re not replacing the system software, start the first (or only) server. The server boots, which takes several minutes. When it s finished, the front panel LCD displays DMA Installed. This indicates that the system software is installed, but its network and time settings aren t configured. If the LCD displays anything else or nothing, stop. Contact Polycom Global Services for assistance. 6 On the laptop, point your browser to (if a security certificate warning appears, ignore it) and log in with user ID admin and password admin. The Polycom DMA system s management interface appears, displaying the Dashboard. 7 Go to Admin > Local Cluster > Network Settings and select the System IP type, System server configuration, and System split network setting that you specified on the First-Time Setup Worksheet. Be sure you ve read and understood the cautions on pages 7 and Polycom, Inc.
25 Polycom DMA System Initial Server Setup The settings you make for these three items determine which of the remaining network value fields are enabled. For instance, if you specify a single-server configuration, the Server 2 fields are disabled (grayed out). 8 Enter the network values from the First-Time Setup Worksheet. If the network into which you re installing the system requires 802.1x authentication for servers (this is rarely the case), incorrect settings in the LAN Security Settings section can make the system unreachable. Recovering from this situation requires disconnecting the system from the network and connecting a laptop directly to the system in order to access it. Make certain these settings are correct if needed. 9 If you need to set up a special network routing rule or rules, click Routing Configuration, create the rule(s), and click OK. In a split network configuration, routing rules are necessary for proper routing of network traffic. In the much more common combined network configuration, this is rarely the case. If you aren t sure what rule or rules you need, consult the appropriate IT staff or network administrator for your organization. Depending on your organization s policies, you may also need to configure your network infrastructure so that access to the system s management interface is limited to authorized IP addresses. Typically, this is handled via Access Control Lists (ACLs) in network routers. 10 Click Update. When asked to confirm restarting the system, click Yes. The system begins to reboot. 11 While the server is rebooting, do the following: a Disconnect the Ethernet cable from the laptop and connect the server s GB 1 Ethernet port to the enterprise network to be used for management or combined traffic. This is the eth0 network interface, which must be used for this purpose. b For a split network configuration, connect the GB 3 Ethernet port to the network to be used for signaling traffic. This is the eth2 network interface, which must be used for this purpose. The reboot process takes several minutes. When it s finished, the front panel LCD displays DMA Ready. If the LCD displays anything else or nothing, stop. Contact Polycom Global Services for assistance. Polycom, Inc. 21
26 DMA Deployment Guide for Maximum Security Environments 12 From a PC with network access to the Polycom DMA system, point your browser to the system s virtual host name or IP address (if installing a two-server system) or physical host name or IP address (if installing a single-server system) and log in with user ID admin and password admin. 13 Go to Admin > Local Cluster > Time Settings and do the following: a Select the correct System time zone for your location. We strongly recommend selecting the best location-specific setting, not one of the generic GMT offset settings. If you really want to use a generic GMT offset, note that they use the Linux/Posix convention of specifying how many hours ahead of or behind local time GMT is. Thus, the generic equivalent of America/Denver (UTC-07:00) is GMT+07, not GMT-07. b Under NTP servers, enter the IP addresses or domain names for the time servers from the First-Time Setup Worksheet. We strongly recommend specifying at least one and preferably three time servers. Use NTP stratum 3 quality time servers if possible. c Click Update. When asked to confirm restarting the system, click Yes. The system reboots, which takes several minutes. When it s finished, the front panel LCD displays DMA Ready. d If you re installing a single-server system, skip to step If you re installing a two-server cluster, do the following: If you re not sure whether you re installing a two-server cluster, please re-read page 7. Both servers in the cluster must be running the same version of the software, so if you installed a different version on the first server, you must do so on the second. a If you replaced the system software on the first server with the official UC APL version, turn on the second server, insert the system recovery disk for the UC APL version, and reboot it. The server boots from the DVD, and the installation commences. About minutes later, the DVD ejects and the server reboots. When it s finished, the front panel LCD displays DMA Installed. This indicates that the system software is installed, but its network and time settings aren t configured. If the LCD displays anything else or nothing, stop. Contact Polycom Global Services for assistance. b Connect the GB 1 Ethernet port of the second server to the enterprise network to be used for management (or combined) traffic. For a split 22 Polycom, Inc.
27 Polycom DMA System Initial Server Setup c d network configuration, connect the GB 3 port to the network to be used for signaling traffic. Connect one of the Ethernet cables included in the server shipment between the GB 2 ports of the two servers. Verify that the first server is running and its front panel LCD displays DMA Ready. Then turn on (or reboot) the second server. After the second server boots, it detects the first server, gets its configuration settings from it, and joins the cluster. When done, both servers LCDs display DMA Clustered. If the LCDs aren t displaying DMA Clustered, stop. Contact Polycom Global Services for assistance. 15 Optionally (but strongly recommended), manually secure the system servers as described in the next section. 16 Log back into the system and complete your system setup and security configuration as described in the following chapter. Don t turn off a Polycom DMA system server by simply unplugging it or otherwise removing power, especially if it s going to remain off for some time. If a server loses power without being properly shut down, the RAID controller fails to shut down, eventually depleting its battery. If that happens, the server can t be restarted without user input, requiring a keyboard and monitor. Secure the Polycom DMA System Servers When you switch to maximum security mode (page 32), the servers BIOS settings are changed to prevent them from being booted from the DVD drive or a USB device. In addition, a BIOS password is set (if not already present) to prevent unauthorized persons from reversing these BIOS changes. But occasionally, a BIOS change fails to be implemented on reboot. To make absolutely certain that the servers are secure, we strongly recommend manually securing them by performing the procedure below on each server. To secure a Polycom DMA system server 1 Attach a USB keyboard and monitor to the server and start it. 2 During the boot sequence, press F2 to enter the System Setup menu. The system displays an Entering Setup message. Polycom, Inc. 23
28 DMA Deployment Guide for Maximum Security Environments To view the System Setup help file, press <F1>. For most of the options, the changes that you make are recorded but don t take effect until you restart the system. 3 Use the arrow keys to navigate to the Boot Settings sub-menu and press ENTER to select it. Then navigate to Boot Sequence and press ENTER. 4 Disable the SATA Optical Drive and Embedded NIC 1. 5 Return to the main System Setup menu, select Integrated Devices, and make the following changes: Set User Accessible USB Ports to All Ports Off. Set Internal USB Port to Off. 6 Return to the main System Setup menu, select System Security, and make the following changes: Set System Password to Not Enabled. Select Setup Password and enter and confirm a system setup password that meets your site password requirements. Set Password Status to Locked. 7 Return to the main System Setup menu, select Serial Communication, and set Serial Communication to Off. 8 Exit and save the changes. The server reboots. 9 Turn the server off. 24 Polycom, Inc.
29 Polycom DMA System Maximum Security Deployment 3 This chapter describes the tasks required to complete the deployment of a Polycom DMA system in a maximum security environment. It assumes you ve completed the physical installation and initial setup tasks in the preceding chapter. The task descriptions refer you to the following information resources that provide more detailed descriptions and procedures: Once you re logged into the system, the online help provides access to all the additional information you need. Click on any page or the Help button in any dialog box to see the specific help topic for that location. Alternatively, the Polycom DMA 7000 System Operations Guide (PDF) contains the same information as the online help in a printable format. Completing the system configuration, including properly securing the system, involves the following tasks: Add DNS records for the system to your DNS servers. (This can be done at any time prior to or during system installation and configuration.) Create a proper local user account with the system administrator user role, log in as that user, and then delete the default admin user. License the system. Configure signaling. Install security certificates. Set the system s Security Configuration to Maximum security. Change the single local administrator s password. Review and modify, if necessary, various security-related settings. Integrate with Active Directory, log into the system using the AD service account, and assign system roles to the appropriate AD users. Add Polycom RealPresence Collaboration Server or RMX MCUs to the system. Polycom, Inc. 25
30 DMA Deployment Guide for Maximum Security Environments Verify system functionality. Enable, if necessary, certificate validation for user login sessions. Add DNS Records for the Polycom DMA System In order to access your Polycom DMA system by its host names instead of by IP addresses, you must create A (alias) records (for IPv4) and/or AAAA records (for IPv6) on your DNS server. A/AAAA records that map each physical host name to the corresponding physical IP address and each virtual host name to the corresponding virtual IP address are mandatory. A two-server system has three host names and IP addresses (one virtual and two physical) for the management or combined interface, and in a split network configuration, three more for the signaling interface. See Add Required DNS Records for the Polycom DMA System in the online help or Polycom DMA 7000 Operations Guide. Create Local System Administrator Account In maximum security mode, if the Polycom DMA system is integrated with Active Directory, only one local user is permitted, and that user must have the Administrator role. If you re configuring the system in this manner, presumably this local administrator login will serve only as a safety mechanism, and you have procedures for securing the credentials for that user. Whether that s the case or not, perform the procedure below as soon as possible after installing your system to eliminate a serious security risk. To remove the default admin account and create a more secure local account with administrative privileges 1 Log in as admin and go to User > Users. The Users page appears. 2 Create a local user account with the Administrator role. See Users Procedures in the online help or Polycom DMA 7000 Operations Guide. 3 Log out and log back in using the new local account. 4 Go to User > Users and delete the default admin account. See Users Procedures in the online help or Polycom DMA 7000 Operations Guide. 26 Polycom, Inc.
31 Polycom DMA System Maximum Security Deployment License the System To license the system 1 Go to Admin > Local Cluster > Licenses. The Licenses page appears. 2 Follow the procedures for requesting software activation key codes and entering them, described in Add Licenses in the online help or Polycom DMA 7000 Operations Guide. Configure Signaling To configure signaling 1 Go to Admin > Local Cluster > Signaling Settings. The Signaling Settings page appears. 2 Enable H.323 and/or SIP signaling, following the procedure described in Configure Signaling in the online help or Polycom DMA 7000 Operations Guide. Optionally, do any of the following: Configure H.323 device authentication, SIP digest authentication, or both. If SIP signaling is enabled, turn on ANAT support if AS-SIP is in use, require certificate validation for TLS, and/or configure untrusted call handling. If H.323 is enabled, we strongly recommend putting the DMA system into routed mode (especially if the DMA system is being neighbored with another H.323 gatekeeper) so that it proxies all H.323 signaling messages. Go to Admin > Call Server > Call Server Settings and under H.323 Settings, change Gatekeeper call mode to Routed call mode. Install Security Certificates and Enable OCSP The steps for installing the necessary security certificate(s) depend on the certificate procedures used at your organization. For instance, if your certificate authority (CA) doesn t provide a full certificate chain in response to a certificate signing request (CSR), you need to install the CA s certificate(s) into the Polycom DMA system prior to adding the system s signed certificate. Polycom, Inc. 27
32 DMA Deployment Guide for Maximum Security Environments If you re installing the Polycom DMA system into a highly secure environment, presumably you re knowledgeable about X.509 certificates and their use (or have access to someone who is). Nevertheless, we suggest that you review Management and Security Overview in the online help or Polycom DMA Operations Guide to familiarize yourself with the forms of certificates that can be installed in the Polycom DMA system and how the system uses certificates. See Certificate Procedures in the online help or Polycom DMA 7000 Operations Guide for step-by-step instructions for the following tasks: Install your CA s public certificate (and any intermediate certificates). Create a CSR to submit to the CA. Install the public certificate signed by the CA that identifies the Polycom DMA system. The CSR generated by the system automatically includes all the host names and IP addresses (virtual and physical) by which the system can be accessed, using the Subject Alternate Name (SAN) field. If your organization s procedure for creating a certificate doesn t use the system-generated CSR, be sure to specify the SAN entries so that the certificate is valid regardless of which address is used to access the system. See Certificate Management in the online help or Polycom DMA 7000 Operations Guide for information about enabling the Online Certificate Status Protocol (OCSP). Typically, you only need to select Enable OCSP (on the Certificate Management page) and click Store OCSP configuration. If your organization uses a specific OCSP responder instead of the responder in the certificate s AuthorityInfoAccess (AIA) field, specify that responder in the OCSP responder URL field. OCSP certificate lets you select a certificate to be used to authenticate the response messages. With OCSP enabled, the Polycom DMA system attempts to verify the status of all certificates presented to it. If it s unable to connect to the OCSP responder or doesn t receive a response indicating that the certificate is good, the system rejects the certificate and refuses the connection. Configure Secure SIP or AS-SIP Connections If you are deploying the DMA system in a secure SIP or AS-SIP environment, you can configure the system to take advantage of encrypted SIP or AS-SIP communication paths as described in this topic. 28 Polycom, Inc.
33 Polycom DMA System Maximum Security Deployment Integrate the DMA System With a Local Session Controller (LSC) If necessary in your environment, enable secure outbound connections to a Local Session Controller from DMA system VMRs. For more information and instructions for individual steps below, refer to the online help or the Polycom DMA 7000 Operations Guide. To integrate the DMA system with the LSC 1 Go to Network > External SIP Peer. 2 Click Add. 3 Enter the following information: Name for the LSC Description for the LSC IP address of the LSC as the Next hop address Port of If the LSC requires the DMA system to provide SIP digest authentication, add the credentials in the Authentication tab. 5 Ensure that the Transport type field is set to TLS. The DMA system must trust the LSC security certificate. If necessary, import the LSC certificate into the DMA system s certificate repository, or ensure that the DMA system s certificate and the LSC certificate are signed by the same Certificate Authority. See the Certificate Procedures topic in the online help or Polycom DMA 7000 Operations Guide for more information about working with certificates. 6 Go to Admin > Call Server > Dial Rules. 7 Click Add to create a new dial rule for authorized calls that will route calls to the newly defined SIP peer. 8 Enter a Description for the rule. 9 Choose an Action of Resolve to external SIP peer. 10 In the list of Available SIP peers, select the SIP peer you defined earlier and use the right arrow button to move it to the list of Selected SIP peers. 11 When finished, click OK. 12 Select the new rule in the list and use Move Up and Move Down to order the rule after any rules that route calls to local resources, such as VMRs, Virtual Entry Queues (VEQs), direct dial VEQs, and registered H.323 endpoints. Ensure that the rule is ordered after any rules that route to external devices (such as neighbored H.323 gatekeepers or H.323 -> ISDN gateways) that should be applied before routing a call to the external SIP call server. Polycom, Inc. 29
34 DMA Deployment Guide for Maximum Security Environments 13 If H.323 is enabled on the DMA system, add the following preliminary script to each H.323-only dial rule. The preliminary script will ensure that the dial rule is skipped if the dial string begins with sip or sips : if (DIAL_STRING.match(/^sip/i)) { return NEXT_RULE; } Configure Default AS-SIP Resource Priority Values for Dial-Out Conferencing If you are deploying the DMA system on an AS-SIP network and will be using VMR dial-out functionality, you need to configure the default resource priority values to use when placing these calls. If you won t be using the VMR dial-out feature, it s not necessary to configure these settings. To configure default AS-SIP resource priority values for dial-out conferencing 1 Go to Admin > Conference Manager > Conference Settings. 2 Set the Resource priority namespace and Resource priority value fields to appropriate values for your environment. See the online help or the Polycom DMA 7000 Operations Guide for more information about these settings. 3 Click Update. Configure Encryption for Conference Templates To configure encryption for conference templates 1 Go to Admin > Conference Manager > Conference Templates. 2 Click Add to add a new conference template, or select an existing conference template from the list and click Edit. 3 Select the RMX General Settings tab. 4 Under Advanced Settings, ensure the Encryption field is set to Encrypt all. To ensure a secure connection with endpoints, the MCU conference profile you use must have AES encryption enabled, as must any endpoints joining calls on this system. 5 If you are deploying the DMA system in an AS-SIP environment: a Select the RMX Video Quality tab. 30 Polycom, Inc.
35 Polycom DMA System Maximum Security Deployment b Ensure that the AS SIP content check box is selected. 6 Click OK. Enable Secure Inbound SIP or AS-SIP VMR Connections To enable secure inbound SIP or AS-SIP connections to a VMR 1 Go to Admin > Call Server > Device Authentication. 2 Click the Shared Outbound Authentication tab. 3 Click Add. If the external call server requires the DMA system to provide authentication credentials when connecting, you need to configure the credentials that the DMA system will provide. 4 Add any required authentication credentials for authenticating the DMA system with the external call server as described in the Device Authentication topic of the online help or the Polycom DMA 7000 Operations Guide. 5 Add an MCU to the DMA system if none have been added, or ensure the existing MCUs have a secure connection to the DMA system. 6 Add the MCU to a pool, and the pool to a pool order. See Add Polycom MCUs to the System on page 36 for more information. 7 If necessary, create a secure SIP trunk or routing rule on the external call server to route inbound VMR calls to the DMA system. Refer to the external call server s documentation for more information. Configure VMRs for Users Once you ve configured the system to use secure connections for SIP and AS-SIP calls, you can configure virtual meeting rooms (VMRs) to take advantage of this configuration. To configure VMRs for users 1 Go to User > Users. 2 Select a user from the list. 3 Click Manage Conf Rooms. 4 Click Add to create a DMA VMR for the selected user. Polycom, Inc. 31
36 DMA Deployment Guide for Maximum Security Environments 5 Configure the VMR to use the conference template you created or modified in Configure Encryption for Conference Templates on page 30 and the MCU pool order that you configured in Enable Secure Inbound SIP or AS-SIP VMR Connections on page 31. See the online help or the Polycom DMA 7000 Operations Guide for more information on creating VMRs and working with MCU pools and pool orders. 6 If necessary, change the resource priority values for this VMR. When you deploy the DMAsystem in an AS-SIP environment, you can configure each VMR to use specific, non-default resource priority values for outbound calls. For example, some users may require all outbound calls to be placed with a higher priority than the system-wide default. When creating VMRs for users, configure the resource priority values for those VMRs if required in your environment. Refer to the online help or Polycom DMA 7000 Operations Guide for more information. 7 Click OK. 8 Repeat steps 4 through 7 to add more VMRs. Set Security Configuration to Maximum Security Once certificates are in place (and assuming that all devices with which the Polycom DMA system communicates also have valid certificates signed by a CA that the Polycom DMA system trusts), you re ready to switch the system into maximum security mode. Enabling Maximum security is irreversible and has significant consequences (see The Consequences of Enabling Maximum Security Mode on page 3). Don t choose this setting unless you re certain that you re ready to proceed. You may wish to test drive secure communications first by switching to High security, which is reversible. In that mode, you can confirm that all server connections work and that there are no certificate or communications protocol problems before performing the irreversible procedure below. To switch to maximum security mode 1 Go to Admin> Local Cluster > Security Settings. 2 Click Maximum security. We recommend leaving Skip certificate validation for user login sessions enabled for now. If your environment requires user certificates, this setting can be turned off later, after verifying the functionality of the system. 32 Polycom, Inc.
37 Polycom DMA System Maximum Security Deployment 3 Click Update. A dialog box informs you that only one local administrator is permitted in maximum security mode and prompts you to confirm. Another dialog box informs you that the change is irreversible, lists some of the consequences, and prompts you to confirm again. 4 Confirm at both prompts. The system reboots, which takes several minutes. When you log back in, you re prompted to change your password. 5 Change your login password. If you performed the recommended procedure to manually secure the servers (page 23), a BIOS password already exists, and it remains unchanged. Occasionally, a BIOS change fails to be implemented on reboot. That s why, to make absolutely certain that the servers are secure, we recommend manually securing them by performing the procedure on page 23 on each server. Otherwise when the system enters maximum security mode, it attempts to set a default BIOS password (B105pa55w0rd). In that case, follow the procecure below to change the default BIOS password to something more secure. To manually change the BIOS password on a Polycom DMA server 1 Attach a USB keyboard and monitor to the server and restart it. 2 During the boot sequence, press F2 to enter the System Setup menu. 3 If prompted to Enter Setup Password, enter your current BIOS password (if you don t remember it, contact Polycom Global Services for instructions on how to access the System Setup menu). 4 Use the arrow keys to navigate to the System Security sub-menu and press ENTER. Then navigate to Setup Password and press ENTER. 5 Enter the same value in the Enter Password and Confirm Password fields (to remove the BIOS password, press ENTER without typing a new password value for both fields). 6 Save your changes and exit BIOS setup. The system reboots. Review and Modify (If Necessary) Security-Related Settings Review the settings on the following pages and make any necessary changes (see the online help or Polycom DMA 7000 Operations Guide topic for each page for details about the settings): Polycom, Inc. 33
38 DMA Deployment Guide for Maximum Security Environments Admin > Login Policy Settings > Local Password Admin > Login Policy Settings > Local User Account Admin > Login Policy Settings > Session Admin > Login Policy Settings > Banner Admin > Login Policy Settings > Access Policy Settings The Access Policy Settings page lets you restrict management access to a whitelist of authorized IP addresses or address ranges. If you choose to do so, make sure that you ve correctly added the IP address of the workstation from which you logged into the system and all other IP addresses or address ranges authorized for management access. The settings after switching to maximum security mode are the defaults for that mode, unless you previously chose a more stringent setting. Integrate with Active Directory Review the information in the Connect to an Enterprise Directory topic of the online help or Polycom DMA 7000 Operations Guide, and then integrate the system with your Active Directory as described in Active Directory Integration Procedure. In step 4a, you can only use an IP address if your AD server s certificate has the IP address entries in the SAN field. Otherwise, you must specify the host name or FQDN in the CN field, or use the Auto-discover from FQDN option. We strongly recommend using the auto-discover option. At the end of the integration procedure, you should have completed the following: Successfully connected the system to your Active Directory and retrieved directory data. Successfully generated conference room IDs (virtual meeting rooms, or VMRs) for the enterprise users, if you elected to do so. Given Administrator privileges to your named enterprise account. Secured the service account. Verified that the results of the integration are satisfactory. At this time, you can give access to the Polycom DMA system s management and operations interface (via the Administrator, Auditor, or Provisioner role) to the appropriate enterprise accounts. See Users and its subtopics in the online help or Polycom DMA 7000 Operations Guide. 34 Polycom, Inc.
39 Polycom DMA System Maximum Security Deployment You may wish to use enterprise groups to manage these role assignments. For instance, you can create a Polycom DMA Administrators group in Active Directory, which automatically confers the Administrator role on its members. See Groups and its subtopics in the online help or Polycom DMA 7000 Operations Guide. In maximum security mode, a user may only have one of the three roles. Thus, a group you create for this purpose can only have one role. If an enterprise user is a member of more than one group conferring a role, only the lowest-ranking role (Administrator > Auditor > Provisioner) applies. Polycom, Inc. 35
40 DMA Deployment Guide for Maximum Security Environments Add Polycom MCUs to the System If you haven t already done so, deploy your Polycom RealPresence Collaboration Server or RMX MCUs as described in the documentation for the model you purchased. Then, add the MCUs to the Polycom DMA system. See MCUs and its subtopics in the online help or Polycom DMA 7000 Operations Guide. A Polycom MCU doesn t include its management IP address in the SAN field of its CSR, so the Polycom DMA system can only connect to it using the FQDN specified in the CN field of the MCU s certificate. For a maximum security environment, the administrative user ID with which the Polycom DMA system can log into the MCU must be a machine account created on the MCU. When the connection between the DMA system and the MCU is encrypted, the Connected securely lock icon will appear next to the MCU name in the list of MCUs. Note that Polycom MCUs use case-sensitive machine names (and thus FQDNs) when creating machine accounts. Verify System Functionality See Test the System in the online help or Polycom DMA 7000 Operations Guide for suggestions on verifying that the system is correctly configured and functioning properly. In particular, check that: All communications to and from the system are working and there are no certificate problems or other security issues either on the Polycom DMA system or on the systems to which it connects. Calls can reach the Polycom DMA system s physical signaling interface address(es). You can log into the management interface using any of the management interface addresses physical or virtual, IPs or FQDNs. If you receive a security warning from your browser, you need to install into your OS and/or browser certificate database the public certificate of the CA that signed the Polycom DMA system s certificate. If you use only the Mozilla Firefox browser, be sure to read Enabling File Uploads in Maximum Security with Mozilla Firefox on page Polycom, Inc.
41 Polycom DMA System Maximum Security Deployment Enable User Certificate Validation If your environment requires user certificates for accessing the management interface, enable certificate validation for user login sessions. To enable user certificate validation 1 Go to Admin> Local Cluster > Security Settings. 2 Clear the Skip certificate validation for user login sessions check box and click Update. A dialog box notifies you that if you don t log back in within five minutes, the setting will be automatically turned back on. 3 Click Yes. The system logs you out and restarts, which takes a minute or so. 4 Log back into the system with a valid user certificate signed by a CA that the system trusts. If you can t log back in, there is a problem with the certificate your browser is presenting. After five minutes, the system turns Skip certificate validation for user login sessions back on. Resolve the problem and repeat this procedure. Polycom, Inc. 37
42 DMA Deployment Guide for Maximum Security Environments 38 Polycom, Inc.
Polycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1.2 October 2014 3725-76312-001B Polycom RealPresence DMA 7000 System, Virtual Edition The Polycom RealPresence DMA 7000 System is also known and certified as the DMA System.
Polycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1 June 2014 3725-76312-001A Polycom RealPresence DMA 7000 System, Virtual Edition Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
Polycom DMA 7000 System Deployment Guide for Maximum Security Environments
Polycom DMA 7000 System Deployment Guide for Maximum Security Environments v. 2.1.1J February 2012 3725-76304-001A4 Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated
Polycom RealPresence Resource Manager System Getting Started Guide
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 7.1.0 December 2012 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and
Polycom RealPresence Resource Manager System Getting Started Guide
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
Polycom CMA System Getting Started Guide
Polycom CMA System Getting Started Guide 6.0.0 October 2011 3725-77612-001E Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks
Polycom RealPresence Resource Manager System, Virtual Edition
[Type the document title] Getting Started Guide 8.1.0 December 2013 3725-72102-001H Polycom RealPresence Resource Manager System, Virtual Edition Polycom Document Title 1 Trademark Information POLYCOM
RealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
Polycom CMA System to RealPresence Resource Manager System
Migration Guide December 2013 3725-72107-001A1 Polycom CMA System to RealPresence Resource Manager System Trademark Information POLYCOM and the names and marks associated with Polycom's products are trademarks
Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5
Polycom HDX Systems, Version 3.0.5 A warning about operating in a maximum security environment The maximum security profile is designed to lock down communications to the most stringent requirements of
Getting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition
Getting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition 8.2.0 July 2014 3725-72102-001G Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be
Polycom RealPresence Group Series Deployment Guide for Maximum Security Environments
Military Unique Deployment Guide 4.1.0_J January 2014 3725-03137-002/A Polycom RealPresence Group Series Deployment Guide for Maximum Security Environments Trademark Information POLYCOM and the names and
Unified Communications in RealPresence Access Director System Environments
[Type the document title] 3.0 October 2013 3725-78704-001B1 Deploying Polycom Unified Communications in RealPresence Access Director System Environments Polycom Document Title 1 Trademark Information Polycom
Polycom RealPresence Resource Manager System Administrator s Guide
Polycom RealPresence Resource Manager System Administrator s Guide 7.0.0 August 2012 3725-72110-001A Trademark Information Polycom and the names and marks associated with Polycom's products are trademarks
Polycom RealPresence Access Director System Administrator s Guide
[Type the document title] 2.0 November 2012 3725-78703-001A Polycom RealPresence Access Director System Administrator s Guide Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
Polycom CMA System Upgrade Guide
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
Polycom Scheduling Guide for Microsoft Outlook
Polycom Scheduling Guide for Microsoft Outlook 6.0.0 September 2011 3725-18004-001I Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Polycom RealPresence Access Director System
Release Notes 3.1 January 2014 3725-78700-001C Polycom RealPresence Access Director System Polycom announces the release of the Polycom RealPresence Access Director system, version 3.1. This document provides
Installing Software and Options for the Polycom RealPresence Group Series and Accessories
for the Polycom RealPresence Group Series and Accessories Overview By upgrading your Polycom software or by purchasing additional system options, your organization continues to benefit from the latest
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Polycom Scheduling Guide for Microsoft Outlook
Polycom Scheduling Guide for Microsoft Outlook 5.0 April 2010 3725-18004-001G Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks
Backup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Overview of WebMux Load Balancer and Live Communications Server 2005
AVANU Load Balancing for Microsoft Office Live Communications Server 2005 WebMux Delivers Improved Reliability, Availability and Scalability Overview of WebMux Load Balancer and Live Communications Server
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall
Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition
Polycom Unified Communications Deployment Guide for Microsoft Environments
Polycom Unified Communications Deployment Guide for Microsoft Environments Wave 4 February 2011 3725-00000-003C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated
Polycom HDX Systems Deployment Guide for Maximum Security Environments
[Type the document title] Military Unique Deployment Guide 2.7.3.1_J February 2014 3725-12748-007/A Polycom HDX Systems Deployment Guide for Maximum Security Environments Polycom Document Title 1 Trademark
Polycom RealPresence Capture Server - Virtual Edition Getting Started Guide
Getting Started Guide 1.6.1 April 2014 3725-69809-002/A Polycom RealPresence Capture Server - Virtual Edition Getting Started Guide Trademark Information POLYCOM and the names and marks associated with
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Polycom RealPresence Access Director System
RELEASE NOTES Version 4.2 June 25, 2015 3725-78700-001F1 Polycom RealPresence Access Director System Polycom, Inc. 1 Polycom RealPresence Access Director System Release Notes Version 4.2 Contents What
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
SuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
Chapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Open Source and License Source Information
BlackArmor NAS 220 BlackArmor NAS 220 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks of Seagate
V.I.P. Kit. Video Insight Pilot Kit. (Video Insight Pilot Kit).
V.I.P. Kit (Video Insight Pilot Kit). Video Insight Pilot Kit Please follow these instructions and everything should go very smoothly. Before you begin, you will need to establish (or obtain from your
BlackArmor NAS 110 User Guide
BlackArmor NAS 110 User Guide BlackArmor NAS 110 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks
Manual Wireless Extender Setup Instructions. Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key
1 Manual Wireless Extender Setup Instructions Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key Setting up LAN Static IP on PC We need to set up a Static
CounterACT 7.0 Single CounterACT Appliance
CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment
AutoDownload: SQL Server and Network Trouble Shooting
AutoDownload: SQL Server and Network Trouble Shooting AutoDownload uses Microsoft s SQL Server database software. Since 2005 when AutoDownload was first released Microsoft have also released new versions
LifeSize Networker Installation Guide
LifeSize Networker Installation Guide November 2008 Copyright Notice 2006-2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide
English CHAPTER 1 Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide Cisco One-Year Limited Hardware Warranty Terms Easy Installation: Try These Steps First! (CRWS Users) Overview
Polycom RealPresence Desktop for Windows
3.1 January 2014 3725-69930-002A Polycom RealPresence Desktop for Windows Trademark Information POLYCOM and the names and marks associated with Polycom's products are trademarks and/or service marks of
800s, Virtual Edition Getting Started Guide
[Type the document title] Version 8.1 June 2013 3725-74602-100 Polycom RealPresence Collaboration Server 800s, Virtual Edition Getting Started Guide Polycom Document Title 1 Trademark Information POLYCOM
QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance
1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation
Quick Start Guide. RV 120W Wireless-N VPN Firewall. Cisco Small Business
Quick Start Guide Cisco Small Business RV 120W Wireless-N VPN Firewall Package Contents Wireless-N VPN Firewall Ethernet Cable Power Adapter Quick Start Guide Documentation and Software on CD-ROM Welcome
Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0
Sendio Email System Protection Appliance Quick Start Guide Sendio 0 Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +949.274375 www.sendio.com QUICK START GUIDE SENDIO This Quick Start
McAfee Firewall Enterprise
Hardware Guide Revision C McAfee Firewall Enterprise S1104, S2008, S3008 The McAfee Firewall Enterprise Hardware Product Guide describes the features and capabilities of appliance models S1104, S2008,
7 6.2 Windows Vista / Windows 7. 10 8.2 IP Address Syntax. 12 9.2 Mobile Port. 13 10.2 Windows Vista / Windows 7. 17 13.2 Apply Rules To Your Device
TABLE OF CONTENTS ADDRESS CHECKLIST 3 INTRODUCTION 4 WHAT IS PORT FORWARDING? 4 PROCEDURE OVERVIEW 5 PHYSICAL CONNECTION 6 FIND YOUR ROUTER S LOCAL NETWORK IP ADDRESS 7 6.1 Windows XP 7 6.2 Windows Vista
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6
INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.
eprism Email Security Suite
Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered
Installing Software and Options for Polycom HDX Systems and Accessories. Overview. Polycom HDX System and Options. Polycom Touch Control
Installing Software and Options for Polycom HDX Systems and Accessories By upgrading your Polycom software or by purchasing additional system options, your organization continues to benefit from the latest
RealPresence Resource Manager System
RELEASE NOTES 8.3.2 March 2015 3725-72100-001 Rev L2 RealPresence Resource Manager System Polycom, Inc. 1 Contents What s New in Release 8.3.2... 3 Release History... 3 Products Tested with this Release...
Networking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
Infinity C Reference Guide
1 2! Infinity C Reference Guide Table of Contents Components... 1 Hardware Setup... 5 SmartDrive Configuration... 12 Startup... 15 Login... 16 System Configuration... 19 DICOM Setup... 20 Monitoring Status...
Deployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Polycom RSS 4000 System User Guide
Polycom RSS 4000 System User Guide Polycom Moscow [email protected] T +7-495-924-25-25 www.polycom-moscow.ru 8.0 2012 July 3725-82809-001/A Trademark Information Polycom, the Polycom Triangles logo,
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
CTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
Maintaining the Content Server
CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down
Clearswift SECURE Exchange Gateway Installation & Setup Guide. Version 1.0
Clearswift SECURE Exchange Gateway Installation & Setup Guide Version 1.0 Copyright Revision 1.0, December, 2013 Published by Clearswift Ltd. 1995 2013 Clearswift Ltd. All rights reserved. The materials
Mobility System Software Quick Start Guide
Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]
Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted
LifeSize Bridge 2200 Deployment Guide
LifeSize Bridge 2200 Deployment Guide August 2013 LifeSize Bridge 2200 Deployment Guide 2 LifeSize Bridge 2200 LifeSize Bridge 2200 is a fixed capacity multipoint control unit (MCU) optimized for HD conferences
RSA Authentication Manager 8.1 Virtual Appliance Getting Started
RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides
LifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
Windows Server 2008 R2 Initial Configuration Tasks
Windows Server 2008 R2 Initial Configuration Tasks I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support for the
Out-of-Band Management Reference
www.novell.com/documentation Out-of-Band Management Reference ZENworks 11 Support Pack 3 Beta February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents
3.5 EXTERNAL NETWORK HDD. User s Manual
3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE
HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE Level 1, 61 Davey St Hobart, TAS 7000 T (03) 6165 1555 www.getbusi.com Table of Contents ABOUT THIS MANUAL! 1 SYSTEM REQUIREMENTS! 2 Hardware
InventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
Ethernet Radio Configuration Guide
Ethernet Radio Configuration Guide for Gateway, Endpoint, and Repeater Radio Units April 20, 2015 Customer Service 1-866-294-5847 Baseline Inc. www.baselinesystems.com Phone 208-323-1634 FAX 208-323-1834
Microsoft OCS with IPC-R: SIP (M)TLS Trunking. directpacket Product Supplement
Microsoft OCS with IPC-R: SIP (M)TLS Trunking directpacket Product Supplement directpacket Research www.directpacket.com 2 Contents Prepare DNS... 6 Prepare Certificate Template for MTLS... 6 1 Create
Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
External Storage 200 Series. User s Manual
External Storage 200 Series User s Manual Version 1.2 00P3DS200ZSEA2 Table of Contents User s Manual 1. Overview...3 2. Key Features...3 3. Rear Connectors...4 4. Setup the External Storage 200...4 5.
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
QUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
WatchGuard Mobile User VPN Guide
WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).
User Manual Version 4.0.0.5. User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000
User Manual Version 4.0.0.5 User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000 I Endpoint Protector Appliance User Manual Table of Contents 1. Endpoint Protector Appliance Setup... 1 1.1.
