User Guide for Cisco Unified
Personal Communicator
for Macintosh, Release 1.1
9/14/2006
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: OL-10984-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT
ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Required Notices:
H.263
UB VIDEO INC. IS THE LICENSOR OF THE UB VIDEO H.263 PROFILE 3 CODEC (ANNEXES I, J, K AND T).
H.264
PORTIONS OF THE H.264 CODEC WERE PROVIDED BY VANGUARD SOFTWARE SOLUTIONS INC 1995-2005 ALL RIGHTS RESERVED
THIS PRODUCT IS LICENSED UNDER THE AVC PATENT PORTFOLIO LICENSE FOR THE PERSONAL AND NON-COMMERCIAL USE
OF A CONSUMER TO (i) ENCODE VIDEO IN COMPLIANCE WITH THE AVC STANDARD ("AVC VIDEO") AND/OR (ii) DECODE AVC
VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A PERSONAL AND NON-COMMERCIAL ACTIVITY AND/OR WAS
OBTAINED FROM A VIDEO PROVIDER LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS GRANTED OR SHALL BE IMPLIED FOR
ANY OTHER USE. ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG LA, L.L.C. SEE HTTP://WWW.MPEGLA.COM
resiprocate, dum - http://www.resiprocate.org
The Vovida Software License v. 1.0
Copyright (c) 2000 Vovida Networks, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
3. The names "VOCAL", "Vovida Open Communication Application Library", and "Vovida Open Communication Application Library (VOCAL)"
must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact
vocal@vovida.org.
4. Products derived from this software may not be called "VOCAL", nor may "VOCAL" appear in their name, without prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NONINFRINGEMENT ARE
DISCLAIMED. IN NO EVENT SHALL VOVIDA NETWORKS, INC. OR ITS CONTRIBUTORS BE LIABLE FOR ANY DAMAGES IN EXCESS
OF $1,000, NOR FOR ANY INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
ares
Copyright 1998 by the Massachusetts Institute of Technology.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that
the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation,
and that the name of M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.
M.I.T. makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
Neon, G.711
neon is an HTTP and WebDAV client library, with a C language API.
Bindings for other languages may also be available, see the web site for more details.
neon is Copyright (C) 1999-2004 Joe Orton <joe@manyfish.co.uk>
Portions are:
Copyright (C) 1999-2000 Tommi Komulainen <Tommi.Komulainen@iki.fi>
Copyright (C) 1999-2000 Peter Boos <pedib@colorfullife.com>
Copyright (C) 1991, 1995, 1996, 1997 Free Software Foundation, Inc.
Copyright (C) 2004-2005, Vladimir Berezniker @ http://public.xdi.org/=vmpn
GNU Lesser General Public License (LGPL)
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public License as published by
the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details.
You should have received a copy of the GNU Library General Public License along with this library; if not, write to the Free Software Foundation,
Inc., 59 Temple Place - Suite 330, Boston,MA 02111-1307, USA
iLBC
Full Copyright Statement
Copyright (C) The Internet Society (2004).
This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE
DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the
implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be
available; nor does it represent that it has made any independent effort to identify any such rights. Information on the IETF's procedures with respect
to rights in IETF Documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain
a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF
on-line IPR repository at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover
technology that may be required to implement this standard. Please address the information to the IETF at ietf- ipr@ietf.org.
This work and all modified versions of it may be freely copied, modified, redistributed and used for all legal civilian purposes without formality albeit
at licensee's own risk and responsibility, subject to the following conditions:
(1) A copy of this copyright notice with the release history list and the site modification history list must be included in any copy of this work or any
modified version of it.
(2) If this work or any modified version of it forms part of a software in object code or binary code, a document for users should accompany the
software stating this fact and include this copyright notice as well as an URL of the licensee where the source code of the package in the version
actually being used in the software can be found.
(3) Any modification (except dropping of the Supplement) should be appropriately documented in the site modification history list below. The last
date of site modification (at the beginning of the package) is to be updated.
(4) In case of non-trivial modifications, i.e. those stemming from efficiency or correctness considerations or from issues of interoperability with other
AES implementations, a copy of the modified package is to be immediately sent to the copyright owner at the address above.
(5) Eventual negative or unfavourable consequences and losses or damages of any form to any persons in connection with the use of this work or its
modified versions do not constitute any liabilities on the part of the copyright owner.
This free license is unlimited in time [1]. Any attempt of non-compliance with the above terms or any occurence of // their practical unsatisfiability
due to whatever reasons, however, automatically terminates the license. Such termination does not affect other licensees who have previously
obtained materials from the person with the terminated license but who continue to comply with the above terms.
Other licenses:
Any usages of the contents of the package that don't qualify for a free license as stated in the above require explicit // specific licenses from the
copyright owner.
[1] Since copyright grants could be revoked after 35 years (see http://www.copyright.gov/title17/92chap2.html#203), it // could be argued that this
license is not timeless for sure On the other hand, the lifespan of AES itself isn't likely to exceed that period. So the issue is not practically relevant
in our context.
DES - (http://www.itl.nist.gov/fipspubs/fip46-2.htm)
Cryptographic devices implementing this standard may be covered by U.S. and foreign patents issued to the International Business Machines
Corporation. However, IBM has granted nonexclusive, royalty-free licenses under the patents to make, use and sell apparatus which complies with
the standard. The terms, conditions and scope of the licenses are set out in notices published in the May 13, 1975 and August 31, 1976 issues of the
Official Gazette of the United States Patent and Trademark Office (934 O.G. 452 and 949 O.G. 1717).
MD5
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all
material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5
Message-Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any
particular purpose. It is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
SHA1
Copyright (C) The Internet Society (2001). All Rights Reserved.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist
in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above
copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any
way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose
of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required
to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and
the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK
FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE
OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
OpenSSL
LICENSE ISSUES
==============
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit.
See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL
please contact openssl-core@openssl.org.
* This product includes cryptographic software written by Eric Young
* (eay@cryptsoft.com). This product includes software written by Tim
* Hudson (tjh@cryptsoft.com).
*
*/
Original SSLeay License
-----------------------
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
* This package is an SSL implementation written
* by Eric Young (eay@cryptsoft.com).
* The implementation was written so as to conform with Netscapes SSL.
*
* This library is free for commercial and non-commercial use as long as
* the following conditions are aheared to. The following conditions
* apply to all code found in this distribution, be it the RC4, RSA,
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
* included with this distribution is covered by the same copyright terms
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
*
* Copyright remains Eric Young's, and as such any Copyright notices in
* the code are not to be removed.
* If this package is used in a product, Eric Young should be given attribution
* as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young (eay@cryptsoft.com)"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
Libxml2
Except where otherwise noted in the source code (e.g. the files hash.c, list.c and the trio files, which are covered by a similar licence but with different
Copyright notices) all the files are:
Copyright (C) 1998-2003 Daniel Veillard. All Rights Reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to
deal in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
SHALL THE DANIEL VEILLARD BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of Daniel Veillard shall not be used in advertising or otherwise to promote the sale, use or other dealings
in this Software without prior written authorization from him.
NTP
This document and the NTPTime program and source code are all Copyright (c) Tom Horsley, 1997-2004. All rights reserved. The right to unlimited
distribution and use of this program is granted to anyone who agrees to keep the copyright notice intact and not alter the program.
Translation: You want changes in the program, make 'em yourself, but don't go distributing the new version with my name on it (or with your name
on it either, since you didn't write most of it :-). If there are changes you would like to see distributed, by all means send 'em in to me, and if I like
'em I'll incorporate them in the next version.
expat
The MIT License
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to
deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE
OR OTHER DEALINGS IN THE SOFTWARE.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We
Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA,
CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems
Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive,
GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace,
MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX,
ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems,
Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0601R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
About Available Features 1-2
Cisco Product Security Overview 1-2
Setting Up Cisco Unified Personal Communicator 1-3
System Requirements 1-3
Installing Cisco Unified Personal Communicator 1-3
Before You Use Cisco Unified Personal Communicator 1-4
Logging In for the First Time 1-5
Setting Essential Preferences 1-5
About Logging In 1-6
Launching and Logging In 1-6
About the Cisco Unified Personal Communicator Console 1-7
Overview of the Console 1-7
Changing the View of the Console and Its Panes 1-9
Working With Items Listed in Panes 1-10
Getting Documentation 1-11
1-1
CHAPTER
OL-10984-01
Uninstalling 1-12
2Having Conversations 2-1
About Conversations 2-1
Starting Conversations 2-2
Starting Audio Conversations 2-2
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
xi
Contents
Responding to Incoming Calls 2-8
Working With Conversations In Progress 2-9
Entering Touch-Tone Responses 2-10
Transferring Calls 2-10
Showing or Hiding the Roster of Participants 2-11
Changing the Audio Volume and Video Transmission 2-11
Putting Conversations on Hold and Retrieving Them 2-12
Ending Conversations 2-13
CHAPTER
CHAPTER
3Using Video 3-1
About Video Conversations 3-1
Before You Use Video 3-2
Previewing Your Video Image 3-2
Starting Video Conversations 3-3
Adding Video to Conversations 3-3
Responding to Requests to Add Video to Conversations 3-4
Working With Video Conversations In Progress 3-4
Removing Video from a Conversation 3-5
4Using Web Conferencing 4-1
About Web Conferencing 4-1
Adding Web Conferencing to Conversations 4-2
Adding Participants to Web Conferencing Sessions 4-2
Working With Web Conferencing Sessions In Progress 4-3
Comparison with Cisco Unified MeetingPlace Express Web Meetings 4-4
CHAPTER
xii
5Hosting Conference Calls 5-1
Creating Conference Calls 5-1
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
About Merging Calls 5-1
Merging Calls 5-2
Working With Conference Calls In Progress 5-3
Contents
CHAPTER
CHAPTER
CHAPTER
CHAPTER
6Sending E-Mail Messages 6-1
7Managing Contacts 7-1
About the Contact List 7-1
Working With Contacts 7-2
Searching for Contacts 7-3
Accessing Contact Details 7-4
Deleting Contacts from the Contact List 7-5
Working with Groups of Contacts 7-5
8Working With Recent Communications 8-1
About Recent Communications 8-1
Working With the Recent Communications List and Its Entries 8-2
About Recent Communications Items 8-3
Accessing Voice Mail 8-4
9About Your Preferences and Status 9-1
OL-10984-01
Viewing Your Current Status 9-1
Specifying Preferences 9-2
Setting Up Voice Mail and Web Conferencing 9-2
Setting Up Automatic Login and Password Entry 9-4
Choosing the Active Phone 9-5
Specifying Your Preferred Contact Method and Contact Information 9-7
Specifying Your Reachability Status 9-9
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
xiii
Contents
CHAPTER
G
LOSSARY
10Troubleshooting 10-1
Installation Problems 10-2
Problems Logging In and Connecting to the Network 10-2
Configuration Problems 10-2
Problems with the Console 10-3
Problems with Reachability 10-3
Problems Making Calls 10-4
Problems With Incoming Calls 10-4
Problems During a Conversation 10-4
Problems with Video 10-6
Problems with Web Conferencing 10-7
Problems in the Recent Communications Pane 10-7
Problems with Search 10-8
Capturing Information About Problems 10-8
Enabling Detailed Logging 10-9
I
NDEX
xiv
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
CHA P T ER
Introducing
Cisco Unified Personal Communicator
This introduction includes the following topics:
• About Cisco Unified Personal Communicator, page 1-1
• Setting Up Cisco Unified Personal Communicator, page 1-3
• About Logging In, page 1-6
• About the Cisco Unified Personal Communicator Console, page 1-7
• Getting Documentation, page 1-11
• Uninstalling, page 1-12
About Cisco Unified Personal Communicator
1
OL-10984-01
An integral part of the Cisco Unified Communications family of products,
Cisco Unified Personal Communicator is a desktop computer application that
helps enable more effective communications. By transparently integrating your
most frequently used communications applications and services,
Cisco Unified Personal Communicator streamlines the communication
experience, helping you work smarter and faster. With
Cisco Unified Personal Communicator, you can access voice, video, document
sharing, and presence information—all from a single, rich-media interface.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
1-1
About Cisco Unified Personal Communicator
Key Features and Benefits
• View real-time availability of other people who use
Cisco Unified Personal Communicator.
• Click-to-call from the contact list or from a number in any application.
• Use either the integrated soft phone (software that lets you use your computer
as a phone) or an associated Cisco Unified IP Phone.
• Exchange ideas "face-to-face" with a video display on your computer screen.
• Add communication methods during a session; for example, you can add
video or web conferencing.
• Create audio conference calls simply by merging conversation sessions.
• View, playback, sort, and delete voice-mail messages, all from the same client
application.
Related Topics
• About Available Features, page 1-2
• Cisco Product Security Overview, page 1-2
Chapter 1 Introducing Cisco Unified Personal Communicator
About Available Features
The features and functionality that are available to you depend on the components
that your company has enabled. For example, you may or may not have access to
soft-phone or web-conferencing features.
Also, the options you see at any time depend on the current situation and what you
are doing. For example, if you have not selected a contact, the buttons to call a
contact are dimmed.
Some features may available only via your desk phone or only via your soft
phone, such as call transferring or video.
Cisco Product Security Overview
This product contains cryptographic features and is subject to United States and
local country laws governing import, export, transfer and use. Delivery of Cisco
cryptographic products does not imply third-party authority to import, export,
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
1-2
OL-10984-01
Chapter 1 Introducing Cisco Unified Personal Communicator
Setting Up Cisco Unified Personal Communicator
distribute or use encryption. Importers, exporters, distributors and users are
responsible for compliance with U.S. and local country laws. By using this
product you agree to comply with applicable laws and regulations. If you are
unable to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found
at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html. If you require
further assistance please contact us by sending e-mail to export@cisco.com.
Setting Up Cisco Unified Personal Communicator
Complete the following tasks in order:
• System Requirements, page 1-3
• Installing Cisco Unified Personal Communicator, page 1-3
• Before You Use Cisco Unified Personal Communicator, page 1-4
• Logging In for the First Time, page 1-5
• Setting Essential Preferences, page 1-5
• (Optional) Specifying Preferences, page 9-2
System Requirements
Your system administrator should ensure that your equipment meets the system
requirements for using this product.
You must have Administrator privileges to install software on your computer.
Installing Cisco Unified Personal Communicator
If your system administrator has not installed
Cisco Unified Personal Communicator on your computer, install it.
Procedure
Step 1Make sure your Finder is set to display files as icons.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
1-3
Chapter 1 Introducing Cisco Unified Personal Communicator
Setting Up Cisco Unified Personal Communicator
Step 2Obtain the disk image (CiscoUnifiedPersonalCommunicator-K9.dmg) from your
system administrator.
Step 3If the disk image does not mount automatically, double-click it.
Step 4Accept the license agreement.
Step 5Follow the instructions.
Step 6(Optional) Move the disk image to the trash.
Step 7Continue with the instructions in the “Before You Use
Cisco Unified Personal Communicator” section on page 1-4.
Before You Use Cisco Unified Personal Communicator
Before you launch Cisco Unified Personal Communicator, prepare your
equipment:
• Setting Up Your Headset, page 1-4
• Setting Up Your Camera, page 1-4
Setting Up Your Headset
If you will use a headset with your soft phone, follow the instructions that came
with the headset.
After you plug in your headset, you may need to wait a few moments before you
do anything else.
Setting Up Your Camera
The software for supported Apple cameras is included with the Macintosh
operating system software.
Procedure
Step 1Set up your camera following the instructions that came with it.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
1-4
OL-10984-01
Chapter 1 Introducing Cisco Unified Personal Communicator
Step 2If necessary, set the camera as the default microphone: Choose System
Preferences > Sound, then click Input.
Step 3Click your camera in the list and adjust volume settings as needed.
Step 4Relaunch Cisco Unified Personal Communicator if it is running.
Logging In for the First Time
Before You Begin
• Follow the procedures in the “Before You Use
Cisco Unified Personal Communicator” section on page 1-4.
Procedure
Step 1Obtain the following information from your system administrator:
• Your username and password for Cisco Unified Personal Communicator.
Setting Up Cisco Unified Personal Communicator
• An IP address for the login server.
Step 2Launch Cisco Unified Personal Communicator.
Step 3Enter the information that you obtained in Step 1. Username and password are
case-sensitive.
Step 4After you log in, perform the tasks in the “Setting Essential Preferences” section
on page 1-5.
Setting Essential Preferences
After you log in for the first time, you must perform the following tasks in order
to use Cisco Unified Personal Communicator:
• Choosing the Active Phone, page 9-5
• Setting Up Voice Mail and Web Conferencing, page 9-2
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
1-5
About Logging In
Related Topics
• Setting Up Cisco Unified Personal Communicator, page 1-3
About Logging In
You must log in in order to use Cisco Unified Personal Communicator.
You can log in to Cisco Unified Personal Communicator from any computer on
your corporate network (if Cisco Unified Personal Communicator is installed and
connected to the network). Your contact list will be available to you after you log
in.
You should be logged in only once at any time.
Related Topics
• Logging In for the First Time, page 1-5
• Launching and Logging In, page 1-6
• Setting Up Automatic Login and Password Entry, page 9-4
Chapter 1 Introducing Cisco Unified Personal Communicator
Launching and Logging In
To Do This Do This
Launch Cisco
Unified Personal
Communicator
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
1-6
First, perform the tasks in the “Before You Use
Cisco Unified Personal Communicator” section on page 1-4.
Then, follow standard procedures for launching applications.
OL-10984-01
Chapter 1 Introducing Cisco Unified Personal Communicator
To Do This Do This
Log in If you are logging in for the first time, see the “Logging In for
the First Time” section on page 1-5.
Otherwise, do the following:
• Respond to the window that appears when you launch
Cisco Unified Personal Communicator.
NoteIn order to log in remotely, you must first connect to
NoteUsername and password are case-sensitive.
Set up automatic
login
Related Topics
• About Logging In, page 1-6
See the “Setting Up Automatic Login and Password Entry”
section on page 9-4.
About the Cisco Unified Personal Communicator Console
your corporate network, for example via virtual
private network (VPN).
About the Cisco Unified Personal Communicator
Console
The console is the main hub of the Cisco Unified Personal Communicator
application. Information about the console includes:
• Overview of the Console, page 1-7
• Changing the View of the Console and Its Panes, page 1-9
• Working With Items Listed in Panes, page 1-10
Overview of the Console
Unless otherwise noted, all descriptions and instructions in this documentation
are based on the default configuration described in this section.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
1-7
About the Cisco Unified Personal Communicator Console
Chapter 1 Introducing Cisco Unified Personal Communicator
1-8
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
Chapter 1 Introducing Cisco Unified Personal Communicator
Item Description
1
2
3
Menu bar
Title bar with standard operating system buttons.
Pop-up menu to set your current reachability status.
See the “Specifying Your Reachability Status” section on page 9-9.
4
Pop-up menu to choose your preferred contact method.
See the “Specifying Your Preferred Contact Method and Contact
Information” section on page 9-7.
5
Pop-up menu to choose your active phone.
See the “Choosing the Active Phone” section on page 9-5.
6
7
Contacts pane. See Chapter 7, “Managing Contacts.”
Recent Communications pane. See Chapter 8, “Working With Recent
Communications.”
8
9
Search pane. See the “Searching for Contacts” section on page 7-3.
The current status of your connection.
About the Cisco Unified Personal Communicator Console
If needed, see Chapter 10, “Troubleshooting.”
10
Buttons to initiate communications.
Changing the View of the Console and Its Panes
To Do This Do This
Minimize the console Click the standard operating system control at the
top of the window.
Maximize the console Click the Cisco Unified Personal Communicator
icon in the dock.
Expand a pane in the
console
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
• Click the title bar of the pane.
• Choose Window > Toggle [pane] View.
1-9
Chapter 1 Introducing Cisco Unified Personal Communicator
About the Cisco Unified Personal Communicator Console
To Do This Do This
Collapse a pane
• Click the title bar of the pane.
• Choose Window > Toggle [pane] View.
Resize a pane Position your mouse on the border between panes so
that you see the up-and-down arrows, then drag.
Resize the columns in a
pane
Position your mouse between column headings and
drag.
Resize the console Drag its bottom right corner.
Working With Items Listed in Panes
Panes list people or communications.
To Do This Do This
See more information about an item Hover your mouse pointer over the
• See and choose options for an item
in any pane
• Perform an action on an item
Select multiple names in the Recent
Communications and Search panes
item.
• Click the item to select it, then
choose an option from the menu
bar.
• Control-click the item and choose
an option from the menu that
appears.
• Shift-click each name to select.
• To select all names in the list,
press Command-A.
1-10
Work with individual Contacts See the “Working With Contacts”
section on page 7-2.
User Guide for Cisco Unified Personal Communicator for Macintosh, Release 1.1
OL-10984-01
Chapter 1 Introducing Cisco Unified Personal Communicator
To Do This Do This
Work with Recent Communications See the “Working With the Recent
Work with Search results See the “Working With Search
Getting Documentation
The following documentation is available for this product: