Auto-Answer Configuration for Polycom HDX Systems Like most modern videoconferencing devices, Polycom HDX models have the ability to automatically accept incoming video calls from other video endpoints. This feature is called Auto-answer and can be enabled separately for either Point-To-Point calls (video calls with just one more caller) or Multi-Point calls (video calls with multiple participants). Many organizations find this feature convenient for enabling remote installations and simplifying daily use, while others prefer to disable auto-answer for numerous reasons, including reduced risk of interruption in important meetings ( do not disturb ) or heightened security (no one enters without password or inmeeting acceptance). The following discussion describes how to review, adjust and protect the auto-answer settings of your Polycom HDX systems. HDX configuration can be changed by an administrator in one of three ways: centrally via the Polycom CMA management platform, remotely via the HDX web GUI, or manually via direct command entry on the HDX keypad. Obviously, direct keypad entry requires physical access to the HDX device. Setting Auto-Answer configuration of multiple HDX systems centrally via CMA Polycom s Unified Communication management platform is the Converged Management Application (CMA), that IT administrators can use to manage large numbers of video network devices. CMA can configure HDX systems and can be used to lock out HDX settings, including Auto-Answer via admin password protection. From the CMA console, navigate to the System Settings 1 menu as shown below. The Auto Answer settings for both Point To Point and Multi Point can be set as desired here. It is also possible to lock the settings such that a user in the field cannot change them via the Allow Access to User Setup option. Note: checking this box WILL allow changes in the field. If the admin desires no changes in the field, this box should remain un-checked as shown in the image below.
Utilizing CMA, an administrator can centrally manage policies such disabling in-room or Web GUI endpoint configuration as well as standardizing on configurations for individual endpoints and groups of endpoints. 1. Setting Auto-Answer configuration remotely via the HDX Web GUI 2. In your browser, type the IP address for the HDX in the address bar 3. When prompted, enter the HDX admin password 4. Select General Settings 5. Select System Settings 6. Set Auto Answer Point To Point to No 7. Set Auto Answer Multi Point to No
Setting Auto-Answer configuration directly via the HDX Keypad Administrators with physical access to the HDX can use the HDX keypad to navigate the configuration menus to review and configure Auto-Answer. 1. Press the Home key on the keypad. Note that your screen many not have Calendaring options enabled. 2. Use the arrows on your remote to scroll to and select System. 3. Select Admin Settings. Enter System ID and Admin Password.
4. Select General Settings 5. Select System Settings 6. Select Call Settings and set Auto Answer Point To Point to No and Auto Answer Multi Point to No At this point, Auto-Answer is disabled Locking the HDX Auto-Answer Configuration Similarly, HDX systems can be configured to prevent users from modifying configuration settings. Organizations that desire to do this should assign an Administrator password (on the Security Settings screen shown below) and NOT enable the Allow access to user settings option from the Security page on the HDX local GUI.
This may be done remotely via the HDX web GUI as well under Security Settings as shown below: CMA can also lock this configuration option on the same System Settings 1 menu where Auto Answer configuration is set as shown below: Videoconferencing should leverage IT Security Best Practice as implemented in the organization. As with other computing devices, video conferencing systems should have default passwords, passwords should be changed periodically, and IT password management guidelines should be applied to video conferencing systems just like to corporate computers. Video conferencing infrastructure deployed in DMZ environments should have firewalls that restrict access to only required ports, just as with any DMZ deployed server. IT security should perform regular vulnerability scanning and configuration audit of video conferencing systems just like they do with other computing assets.