Select the Default Network Domain for Outbound Calls........................................ 57
Enable Point-to-Point Call Escalation to a RealPresence DMA Conference Call............. 57
Wireless Devices...............................................................................................................58
Specify the Wireless Operating Channel for Miracast-Certified Devices............... 58
Enable Miracast Over Infrastructure.......................................................................59
Securing the System........................................................................................60
Managing System Access.................................................................................................60
Local Accounts....................................................................................................... 61
Enable External Authentication.............................................................................. 64
Configure System Access Settings........................................................................ 65
Command-Line API Access for G7500.................................................................. 66
Configure the System Web Interface Port Lock..................................................... 69
Disable USB Ports..................................................................................................70
Detecting Intrusions.......................................................................................................... 70
PKI Certificates................................................................................................................. 71
Create a Certificate Signing Request..................................................................... 72
Create a TC8 Certificate Signing Request............................................................. 73
Configure Certificate Validation Options.................................................................74
Install a Certificate..................................................................................................75
View a Certificate....................................................................................................75
View a TC8 Certificate............................................................................................76
Delete a Certificate.................................................................................................76
Certificate Revocation............................................................................................ 76
Disable the Polycom Content App Port.............................................................................77
Disable the Security Code.................................................................................................78
Enable or Disable Content Saving.................................................................................... 78
System Allow List.............................................................................................................. 78
Add IP Addresses to the Allow List........................................................................ 78
Delete IP Addresses from the Allow List................................................................ 79
IPv4 Address Formats............................................................................................79
IPv6 Address Formats............................................................................................79
Call Encryption.................................................................................................................. 79
Configure Call Encryption.......................................................................................80
H.460 Firewall/NAT Traversal........................................................................................... 80
Configure the System for H.460 Firewall/NAT Traversal........................................81
Set Up a Security Banner..................................................................................................83
Web Proxies......................................................................................................................83
Sample PAC File.................................................................................................... 86
View Connections to the System...................................................................................... 86
System Port Usage........................................................................................................... 87
Contents
3