Cisco OL-10984-01 User Manual

User Guide for Cisco Unified Personal Communicator
for Macintosh, Release 1.1 9/14/2006
Corporate Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
Fax: 408 526-4100
Text Part Number: OL-10984-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Required Notices:
H.263
UB VIDEO INC. IS THE LICENSOR OF THE UB VIDEO H.263 PROFILE 3 CODEC (ANNEXES I, J, K AND T).
H.264
PORTIONS OF THE H.264 CODEC WERE PROVIDED BY VANGUARD SOFTWARE SOLUTIONS INC 1995-2005 ALL RIGHTS RESERVED
THIS PRODUCT IS LICENSED UNDER THE AVC PATENT PORTFOLIO LICENSE FOR THE PERSONAL AND NON-COMMERCIAL USE OF A CONSUMER TO (i) ENCODE VIDEO IN COMPLIANCE WITH THE AVC STANDARD ("AVC VIDEO") AND/OR (ii) DECODE AVC VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A PERSONAL AND NON-COMMERCIAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO PROVIDER LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE. ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG LA, L.L.C. SEE HTTP://WWW.MPEGLA.COM
resiprocate, dum - http://www.resiprocate.org
The Vovida Software License v. 1.0
Copyright (c) 2000 Vovida Networks, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. The names "VOCAL", "Vovida Open Communication Application Library", and "Vovida Open Communication Application Library (VOCAL)" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact vocal@vovida.org.
4. Products derived from this software may not be called "VOCAL", nor may "VOCAL" appear in their name, without prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NONINFRINGEMENT ARE DISCLAIMED. IN NO EVENT SHALL VOVIDA NETWORKS, INC. OR ITS CONTRIBUTORS BE LIABLE FOR ANY DAMAGES IN EXCESS OF $1,000, NOR FOR ANY INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
ares
Copyright 1998 by the Massachusetts Institute of Technology.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.
M.I.T. makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
Neon, G.711
neon is an HTTP and WebDAV client library, with a C language API.
Bindings for other languages may also be available, see the web site for more details.
neon is Copyright (C) 1999-2004 Joe Orton <joe@manyfish.co.uk>
Portions are:
Copyright (C) 1999-2000 Tommi Komulainen <Tommi.Komulainen@iki.fi>
Copyright (C) 1999-2000 Peter Boos <pedib@colorfullife.com>
Copyright (C) 1991, 1995, 1996, 1997 Free Software Foundation, Inc.
Copyright (C) 2004 Aleix Conchillo Flaque <aleix@member.fsf.org>
Copyright (C) 2004-2005, Vladimir Berezniker @ http://public.xdi.org/=vmpn
GNU Lesser General Public License (LGPL)
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details.
You should have received a copy of the GNU Library General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,MA 02111-1307, USA
iLBC
Full Copyright Statement
Copyright (C) The Internet Society (2004).
This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the IETF's procedures with respect to rights in IETF Documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf- ipr@ietf.org.
AES
Copyright (C) Mok-Kong Shen 2003. mok-kong.shen@t-online.de
Free license:
This work and all modified versions of it may be freely copied, modified, redistributed and used for all legal civilian purposes without formality albeit at licensee's own risk and responsibility, subject to the following conditions:
(1) A copy of this copyright notice with the release history list and the site modification history list must be included in any copy of this work or any modified version of it.
(2) If this work or any modified version of it forms part of a software in object code or binary code, a document for users should accompany the software stating this fact and include this copyright notice as well as an URL of the licensee where the source code of the package in the version actually being used in the software can be found.
(3) Any modification (except dropping of the Supplement) should be appropriately documented in the site modification history list below. The last date of site modification (at the beginning of the package) is to be updated.
(4) In case of non-trivial modifications, i.e. those stemming from efficiency or correctness considerations or from issues of interoperability with other AES implementations, a copy of the modified package is to be immediately sent to the copyright owner at the address above.
(5) Eventual negative or unfavourable consequences and losses or damages of any form to any persons in connection with the use of this work or its modified versions do not constitute any liabilities on the part of the copyright owner.
This free license is unlimited in time [1]. Any attempt of non-compliance with the above terms or any occurence of // their practical unsatisfiability due to whatever reasons, however, automatically terminates the license. Such termination does not affect other licensees who have previously obtained materials from the person with the terminated license but who continue to comply with the above terms.
Other licenses:
Any usages of the contents of the package that don't qualify for a free license as stated in the above require explicit // specific licenses from the copyright owner.
[1] Since copyright grants could be revoked after 35 years (see http://www.copyright.gov/title17/92chap2.html#203), it // could be argued that this license is not timeless for sure On the other hand, the lifespan of AES itself isn't likely to exceed that period. So the issue is not practically relevant in our context.
DES - (http://www.itl.nist.gov/fipspubs/fip46-2.htm)
Cryptographic devices implementing this standard may be covered by U.S. and foreign patents issued to the International Business Machines Corporation. However, IBM has granted nonexclusive, royalty-free licenses under the patents to make, use and sell apparatus which complies with the standard. The terms, conditions and scope of the licenses are set out in notices published in the May 13, 1975 and August 31, 1976 issues of the Official Gazette of the United States Patent and Trademark Office (934 O.G. 452 and 949 O.G. 1717).
MD5
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
SHA1
Copyright (C) The Internet Society (2001). All Rights Reserved.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
OpenSSL
LICENSE ISSUES
==============
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit.
See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
OpenSSL License
---------------
/* ====================================================================
* Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* openssl-core@openssl.org.
*
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*
* This product includes cryptographic software written by Eric Young
* (eay@cryptsoft.com). This product includes software written by Tim
* Hudson (tjh@cryptsoft.com).
*
*/
Original SSLeay License
-----------------------
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
* This package is an SSL implementation written
* by Eric Young (eay@cryptsoft.com).
* The implementation was written so as to conform with Netscapes SSL.
*
* This library is free for commercial and non-commercial use as long as
* the following conditions are aheared to. The following conditions
* apply to all code found in this distribution, be it the RC4, RSA,
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
* included with this distribution is covered by the same copyright terms
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
*
* Copyright remains Eric Young's, and as such any Copyright notices in
* the code are not to be removed.
* If this package is used in a product, Eric Young should be given attribution
* as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young (eay@cryptsoft.com)"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
Libxml2
Except where otherwise noted in the source code (e.g. the files hash.c, list.c and the trio files, which are covered by a similar licence but with different Copyright notices) all the files are:
Copyright (C) 1998-2003 Daniel Veillard. All Rights Reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE DANIEL VEILLARD BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of Daniel Veillard shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization from him.
NTP
This document and the NTPTime program and source code are all Copyright (c) Tom Horsley, 1997-2004. All rights reserved. The right to unlimited distribution and use of this program is granted to anyone who agrees to keep the copyright notice intact and not alter the program.
Translation: You want changes in the program, make 'em yourself, but don't go distributing the new version with my name on it (or with your name on it either, since you didn't write most of it :-). If there are changes you would like to see distributed, by all means send 'em in to me, and if I like 'em I'll incorporate them in the next version.
expat
The MIT License
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
_______________________________________________________
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0601R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
© 2006 Cisco Systems, Inc. All rights reserved.

CONTENTS

CHAPTER
1 Introducing
Cisco Unified Personal Communicator
About Cisco Unified Personal Communicator 1-1
About Available Features 1-2 Cisco Product Security Overview 1-2
Setting Up Cisco Unified Personal Communicator 1-3
System Requirements 1-3 Installing Cisco Unified Personal Communicator 1-3 Before You Use Cisco Unified Personal Communicator 1-4 Logging In for the First Time 1-5 Setting Essential Preferences 1-5
About Logging In 1-6
Launching and Logging In 1-6
About the Cisco Unified Personal Communicator Console 1-7
Overview of the Console 1-7 Changing the View of the Console and Its Panes 1-9 Working With Items Listed in Panes 1-10
Getting Documentation 1-11
1-1
CHAPTER
OL-10984-01
Uninstalling 1-12
2 Having Conversations 2-1
About Conversations 2-1
Starting Conversations 2-2
Starting Audio Conversations 2-2
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
xi
Contents
Responding to Incoming Calls 2-8
Working With Conversations In Progress 2-9
Entering Touch-Tone Responses 2-10 Transferring Calls 2-10 Showing or Hiding the Roster of Participants 2-11 Changing the Audio Volume and Video Transmission 2-11 Putting Conversations on Hold and Retrieving Them 2-12 Ending Conversations 2-13
CHAPTER
CHAPTER
3 Using Video 3-1
About Video Conversations 3-1
Before You Use Video 3-2
Previewing Your Video Image 3-2
Starting Video Conversations 3-3
Adding Video to Conversations 3-3
Responding to Requests to Add Video to Conversations 3-4
Working With Video Conversations In Progress 3-4
Removing Video from a Conversation 3-5
4 Using Web Conferencing 4-1
About Web Conferencing 4-1
Adding Web Conferencing to Conversations 4-2
Adding Participants to Web Conferencing Sessions 4-2
Working With Web Conferencing Sessions In Progress 4-3
Comparison with Cisco Unified MeetingPlace Express Web Meetings 4-4
CHAPTER
xii
5 Hosting Conference Calls 5-1
Creating Conference Calls 5-1
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
About Merging Calls 5-1
Merging Calls 5-2
Working With Conference Calls In Progress 5-3
Contents
CHAPTER
CHAPTER
CHAPTER
CHAPTER
6 Sending E-Mail Messages 6-1
7 Managing Contacts 7-1
About the Contact List 7-1
Working With Contacts 7-2
Searching for Contacts 7-3 Accessing Contact Details 7-4 Deleting Contacts from the Contact List 7-5
Working with Groups of Contacts 7-5
8 Working With Recent Communications 8-1
About Recent Communications 8-1
Working With the Recent Communications List and Its Entries 8-2
About Recent Communications Items 8-3
Accessing Voice Mail 8-4
9 About Your Preferences and Status 9-1
OL-10984-01
Viewing Your Current Status 9-1
Specifying Preferences 9-2
Setting Up Voice Mail and Web Conferencing 9-2 Setting Up Automatic Login and Password Entry 9-4 Choosing the Active Phone 9-5 Specifying Your Preferred Contact Method and Contact Information 9-7 Specifying Your Reachability Status 9-9
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
xiii
Contents
CHAPTER
G
LOSSARY
10 Troubleshooting 10-1
Installation Problems 10-2
Problems Logging In and Connecting to the Network 10-2
Configuration Problems 10-2
Problems with the Console 10-3
Problems with Reachability 10-3
Problems Making Calls 10-4
Problems With Incoming Calls 10-4
Problems During a Conversation 10-4
Problems with Video 10-6
Problems with Web Conferencing 10-7
Problems in the Recent Communications Pane 10-7
Problems with Search 10-8
Capturing Information About Problems 10-8
Enabling Detailed Logging 10-9
I
NDEX
xiv
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
CHA P T ER
Introducing Cisco Unified Personal Communicator
This introduction includes the following topics:
About Cisco Unified Personal Communicator, page 1-1
Setting Up Cisco Unified Personal Communicator, page 1-3
About Logging In, page 1-6
About the Cisco Unified Personal Communicator Console, page 1-7
Getting Documentation, page 1-11
Uninstalling, page 1-12
About Cisco Unified Personal Communicator
1
OL-10984-01
An integral part of the Cisco Unified Communications family of products, Cisco Unified Personal Communicator is a desktop computer application that helps enable more effective communications. By transparently integrating your most frequently used communications applications and services, Cisco Unified Personal Communicator streamlines the communication experience, helping you work smarter and faster. With Cisco Unified Personal Communicator, you can access voice, video, document sharing, and presence information—all from a single, rich-media interface.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
1-1
About Cisco Unified Personal Communicator
Key Features and Benefits
View real-time availability of other people who use
Cisco Unified Personal Communicator.
Click-to-call from the contact list or from a number in any application.
Use either the integrated soft phone (software that lets you use your computer
as a phone) or an associated Cisco Unified IP Phone.
Exchange ideas "face-to-face" with a video display on your computer screen.
Add communication methods during a session; for example, you can add
video or web conferencing.
Create audio conference calls simply by merging conversation sessions.
View, playback, sort, and delete voice-mail messages, all from the same client
application.
Related Topics
About Available Features, page 1-2
Cisco Product Security Overview, page 1-2
Chapter 1 Introducing Cisco Unified Personal Communicator

About Available Features

The features and functionality that are available to you depend on the components that your company has enabled. For example, you may or may not have access to soft-phone or web-conferencing features.
Also, the options you see at any time depend on the current situation and what you are doing. For example, if you have not selected a contact, the buttons to call a contact are dimmed.
Some features may available only via your desk phone or only via your soft phone, such as call transferring or video.

Cisco Product Security Overview

This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export,
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
1-2
OL-10984-01
Chapter 1 Introducing Cisco Unified Personal Communicator
Setting Up Cisco Unified Personal Communicator
distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html. If you require further assistance please contact us by sending e-mail to export@cisco.com.
Setting Up Cisco Unified Personal Communicator
Complete the following tasks in order:
System Requirements, page 1-3
Installing Cisco Unified Personal Communicator, page 1-3
Before You Use Cisco Unified Personal Communicator, page 1-4
Logging In for the First Time, page 1-5
Setting Essential Preferences, page 1-5
(Optional) Specifying Preferences, page 9-2

System Requirements

Your system administrator should ensure that your equipment meets the system requirements for using this product.
You must have Administrator privileges to install software on your computer.
Installing Cisco Unified Personal Communicator
If your system administrator has not installed Cisco Unified Personal Communicator on your computer, install it.
Procedure
Step 1 Make sure your Finder is set to display files as icons.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
1-3
Chapter 1 Introducing Cisco Unified Personal Communicator
Setting Up Cisco Unified Personal Communicator
Step 2 Obtain the disk image (CiscoUnifiedPersonalCommunicator-K9.dmg) from your
system administrator.
Step 3 If the disk image does not mount automatically, double-click it.
Step 4 Accept the license agreement.
Step 5 Follow the instructions.
Step 6 (Optional) Move the disk image to the trash.
Step 7 Continue with the instructions in the “Before You Use
Cisco Unified Personal Communicator” section on page 1-4.
Before You Use Cisco Unified Personal Communicator
Before you launch Cisco Unified Personal Communicator, prepare your equipment:
Setting Up Your Headset, page 1-4
Setting Up Your Camera, page 1-4
Setting Up Your Headset
If you will use a headset with your soft phone, follow the instructions that came with the headset.
After you plug in your headset, you may need to wait a few moments before you do anything else.
Setting Up Your Camera
The software for supported Apple cameras is included with the Macintosh operating system software.
Procedure
Step 1 Set up your camera following the instructions that came with it.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
1-4
OL-10984-01
Chapter 1 Introducing Cisco Unified Personal Communicator
Step 2 If necessary, set the camera as the default microphone: Choose System
Preferences > Sound, then click Input.
Step 3 Click your camera in the list and adjust volume settings as needed.
Step 4 Relaunch Cisco Unified Personal Communicator if it is running.

Logging In for the First Time

Before You Begin
Follow the procedures in the “Before You Use
Cisco Unified Personal Communicator” section on page 1-4.
Procedure
Step 1 Obtain the following information from your system administrator:
Your username and password for Cisco Unified Personal Communicator.
Setting Up Cisco Unified Personal Communicator
An IP address for the login server.
Step 2 Launch Cisco Unified Personal Communicator.
Step 3 Enter the information that you obtained in Step 1. Username and password are
case-sensitive.
Step 4 After you log in, perform the tasks in the “Setting Essential Preferences” section
on page 1-5.

Setting Essential Preferences

After you log in for the first time, you must perform the following tasks in order to use Cisco Unified Personal Communicator:
Choosing the Active Phone, page 9-5
Setting Up Voice Mail and Web Conferencing, page 9-2
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
1-5

About Logging In

Related Topics
Setting Up Cisco Unified Personal Communicator, page 1-3
About Logging In
You must log in in order to use Cisco Unified Personal Communicator.
You can log in to Cisco Unified Personal Communicator from any computer on your corporate network (if Cisco Unified Personal Communicator is installed and connected to the network). Your contact list will be available to you after you log in.
You should be logged in only once at any time.
Related Topics
Logging In for the First Time, page 1-5
Launching and Logging In, page 1-6
Setting Up Automatic Login and Password Entry, page 9-4
Chapter 1 Introducing Cisco Unified Personal Communicator

Launching and Logging In

To Do This Do This
Launch Cisco Unified Personal Communicator
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
1-6
First, perform the tasks in the “Before You Use
Cisco Unified Personal Communicator” section on page 1-4.
Then, follow standard procedures for launching applications.
OL-10984-01
Chapter 1 Introducing Cisco Unified Personal Communicator
To Do This Do This
Log in If you are logging in for the first time, see the “Logging In for
the First Time” section on page 1-5.
Otherwise, do the following:
Respond to the window that appears when you launch
Cisco Unified Personal Communicator.
Note In order to log in remotely, you must first connect to
Note Username and password are case-sensitive.
Set up automatic login
Related Topics
About Logging In, page 1-6
See the “Setting Up Automatic Login and Password Entry”
section on page 9-4.
About the Cisco Unified Personal Communicator Console
your corporate network, for example via virtual private network (VPN).
About the Cisco Unified Personal Communicator Console
The console is the main hub of the Cisco Unified Personal Communicator application. Information about the console includes:
Overview of the Console, page 1-7
Changing the View of the Console and Its Panes, page 1-9
Working With Items Listed in Panes, page 1-10

Overview of the Console

Unless otherwise noted, all descriptions and instructions in this documentation are based on the default configuration described in this section.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
1-7
About the Cisco Unified Personal Communicator Console
Chapter 1 Introducing Cisco Unified Personal Communicator
1-8
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
Chapter 1 Introducing Cisco Unified Personal Communicator
Item Description
1
2
3
Menu bar
Title bar with standard operating system buttons.
Pop-up menu to set your current reachability status.
See the “Specifying Your Reachability Status” section on page 9-9.
4
Pop-up menu to choose your preferred contact method.
See the “Specifying Your Preferred Contact Method and Contact
Information” section on page 9-7.
5
Pop-up menu to choose your active phone.
See the “Choosing the Active Phone” section on page 9-5.
6
7
Contacts pane. See Chapter 7, “Managing Contacts.”
Recent Communications pane. See Chapter 8, “Working With Recent
Communications.”
8
9
Search pane. See the “Searching for Contacts” section on page 7-3.
The current status of your connection.
About the Cisco Unified Personal Communicator Console
If needed, see Chapter 10, “Troubleshooting.”
10
Buttons to initiate communications.

Changing the View of the Console and Its Panes

To Do This Do This
Minimize the console Click the standard operating system control at the
top of the window.
Maximize the console Click the Cisco Unified Personal Communicator
icon in the dock.
Expand a pane in the console
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
Click the title bar of the pane.
Choose Window > Toggle [pane] View.
1-9
Chapter 1 Introducing Cisco Unified Personal Communicator
About the Cisco Unified Personal Communicator Console
To Do This Do This
Collapse a pane
Click the title bar of the pane.
Choose Window > Toggle [pane] View.
Resize a pane Position your mouse on the border between panes so
that you see the up-and-down arrows, then drag.
Resize the columns in a pane
Position your mouse between column headings and drag.
Resize the console Drag its bottom right corner.

Working With Items Listed in Panes

Panes list people or communications.
To Do This Do This
See more information about an item Hover your mouse pointer over the
See and choose options for an item
in any pane
Perform an action on an item
Select multiple names in the Recent Communications and Search panes
item.
Click the item to select it, then
choose an option from the menu bar.
Control-click the item and choose
an option from the menu that appears.
Shift-click each name to select.
To select all names in the list,
press Command-A.
1-10
Work with individual Contacts See the “Working With Contacts”
section on page 7-2.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
Chapter 1 Introducing Cisco Unified Personal Communicator
To Do This Do This
Work with Recent Communications See the “Working With the Recent
Work with Search results See the “Working With Search

Getting Documentation

The following documentation is available for this product:
Quick Start Guide
http://www.cisco.com/en/US/products/ps6844/products_user_guide_list.html
Online Help
From any menu bar in Cisco Unified Personal Communicator, choose Help > CiscoUPC Help. In the web conferencing window, click the Help menu.
Getting Documentation
Communications List and Its Entries” section on page 8-2.
Results” section on page 7-4.
OL-10984-01
Updated Documentation (PDF)
The most current version of this documentation is available as a PDF file at:
http://www.cisco.com/en/US/products/ps6844/products_user_guide_list.html
Other Useful Documentation
Documentation for Cisco Unified MeetingPlace Express:
http://www.cisco.com/application/pdf/en/us/guest/products/ps6533/c1626/ccmig ration_09186a00806c511e.pdf.
Documentation for your Cisco desk phone:
http://www.cisco.com/en/US/products/hw/phones/ps379/products_user_guide_li st.html
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
1-11

Uninstalling

Uninstalling
Procedure
Step 1 Quit Cisco Unified Personal Communicator.
Step 2 Move the following items to the trash:
This Item In this Folder
The Cisco Unified Personal Communicator-K9 application
CiscoUPC_Dialer.bundle <Your hard disk>/Library/Address Book
Cisco folder (If it exists)
Cisco folder (If it exists)
com.cisco.UnifiedClient.plist
file (If it exists)
Cisco folder (If it exists)
Cisco Unified Personal Communicator-K9.crash.log
file (If it exists)
Chapter 1 Introducing Cisco Unified Personal Communicator
<Your hard disk>/Applications/
Plug-Ins/
<Your hard disk>/Users/<your user name>/Library/Caches/
<Your hard disk>/Users/<your user name>/Library/Preferences/
<Your hard disk>/Users/<your user name>/Library/Preferences/
<Your hard disk>/Users/<your user name>/Library/Logs/
<Your hard disk>/Users/<your user name>/Library/Logs/CrashReporter/
1-12
Step 3 Empty the trash.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01

Having Conversations

This section includes the following topics:
About Conversations, page 2-1
Starting Conversations, page 2-2
Responding to Incoming Calls, page 2-8
Working With Conversations In Progress, page 2-9

About Conversations

You can have conversations using the following media:
CHA P T ER
2
OL-10984-01
Medium For More Information, See
Audio Starting Audio Conversations, page 2-2
Video Chapter 3, “Using Video”
Web conferencing Chapter 4, “Using Web Conferencing”
You can simultaneously have:
One active conversation.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
2-1

Starting Conversations

Multiple conversations on hold.
Multiple people in one conversation (a conference call.) See Chapter 5,
“Hosting Conference Calls.”
Starting Conversations
You can start audio and audio-and-video conversations.
Starting Audio Conversations, page 2-2
Starting Video Conversations, page 3-3
Redialing the Last Number You Called, page 2-7
Related Topics
Chapter 5, “Hosting Conference Calls”
Chapter 4, “Using Web Conferencing”
Chapter 2 Having Conversations

Starting Audio Conversations

Depending on your situation, choose a method:
Starting Conversations With People Listed in the Console, page 2-3
Starting Conversations With People Who Are Not on a List, page 2-6
Redialing the Last Number You Called, page 2-7
Dialing a Number in Other Applications, page 2-7
Note You can also always make calls using your desk phone.
Related Topics
Chapter 5, “Hosting Conference Calls”
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
2-2
OL-10984-01
Chapter 2 Having Conversations
Starting Conversations With People Listed in the Console
If the person to call appears on any list in your console, use one of the methods in this section.
If the person is not listed in your console, see the following topics:
Searching for Contacts, page 7-3
Starting Conversations With People Who Are Not on a List, page 2-6.
Dialing a Number in Other Applications, page 2-7
Dialing From Your Macintosh Address Book, page 2-8
To Call a Person in
To Dial This Number
For named entries in a list:
The preferred phone
number of a person, if the person has specified one.
Otherwise, the primary
phone number for the person, as listed in the source directory.
For phone number entries in Recent Communications:
The phone number of
the original communication.
This List Do This
Any list in the console
Double-click a name (except in the Recent
Communications list).
(This method initiates a phone call only if your preferred contact method is set to Phone or Video. See the “Specifying Your
Preferred Contact Method and Contact Information” section on page 9-7.)
Click a name or entry in the list, then click
the Place a Call button at the bottom of the console.
Control-click a name or entry and choose
Place Audio Call.
Click a name or entry in the list, then choose
Contacts > Place Audio Call.
Starting Conversations
OL-10984-01
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
2-3
Starting Conversations
To Dial This Number
An alternate number listed in the Contact Details for the person.
Related Topics
Determining Callee Reachability, page 2-4
Identifying Preferred Contact Methods, page 2-6
To Call a Person in This List Do This
Contacts or
Search panes
Recent
Communications, if the entry is a name (not a phone number).
1. Do one of the following:
2. If necessary: Click the arrow beside
Additional Details to view additional contact information for that person.
3. Click the button beside the number to dial.
Chapter 2 Having Conversations
Control-click a name and choose Get Info.
Click a name, then choose File > Get Info.
Determining Callee Reachability
You can view the reachability status of people in your Contacts list in order to determine the best time or method to reach them.
Note You can initiate communication with other people regardless of their reachability
status.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
2-4
OL-10984-01
Loading...
+ 74 hidden pages