Wireless Devices...............................................................................................................56
Specify the Wireless Operating Channel for Miracast-Certified Devices............... 56
Enable Miracast Over Infrastructure.......................................................................56
Securing the System........................................................................................58
Managing System Access.................................................................................................58
Local Accounts....................................................................................................... 59
Enable External Authentication.............................................................................. 62
Configure System Access Settings........................................................................ 63
Command-Line API Access for G7500.................................................................. 64
Configure the System Web Interface Port Lock..................................................... 67
Disable USB Ports..................................................................................................68
Detecting Intrusions.......................................................................................................... 68
PKI Certificates................................................................................................................. 69
Create a Certificate Signing Request..................................................................... 70
Create a TC8 Certificate Signing Request............................................................. 71
Configure Certificate Validation Options.................................................................72
Install a Certificate..................................................................................................73
View a Certificate....................................................................................................73
View a TC8 Certificate............................................................................................74
Delete a Certificate.................................................................................................74
Certificate Revocation............................................................................................ 74
Disable the Polycom Content App Port.............................................................................75
Disable the Security Code.................................................................................................76
Enable or Disable Content Saving.................................................................................... 76
System Allow List.............................................................................................................. 76
Add IP Addresses to the Allow List........................................................................ 76
Delete IP Addresses from the Allow List................................................................ 77
IPv4 Address Formats............................................................................................77
IPv6 Address Formats............................................................................................77
Call Encryption.................................................................................................................. 77
Configure Call Encryption.......................................................................................78
H.460 Firewall/NAT Traversal........................................................................................... 78
Configure the System for H.460 Firewall/NAT Traversal........................................79
Set Up a Security Banner..................................................................................................81
Web Proxies......................................................................................................................81
Sample PAC File.................................................................................................... 84
View Connections to the System...................................................................................... 84
System Port Usage........................................................................................................... 85
Wireless Port Usage with Miracast-Certified Devices....................................................... 88
Contents
3