Configuration items reset by DefaultValuesSet level 390
Configuration items reset by DefaultValuesSet level 291
Policy services93
Policy service request parameters93
Policy service responses94
Cisco VCS Command Reference (X6)Page 2 of 95
Page 3
Introduction
Introduction
This Command Reference document provides supplementary information regarding the administration of
the Cisco TelePresence Video Communication Server (Cisco VCS). It includes:
n details of the commands available through the Cisco VCS's command line interface (CLI)
n a description of the parameters included in requests from the Cisco VCS to external policy services
Using the command line interface (CLI)
The Cisco VCS can be configured through a web interface or via a command line interface (CLI).
The CLI is available by default over SSH and through the serial port. Access using Telnet can also be
enabled.
To use the CLI:
1. Start an SSH or Telnet session.
2. Enter the IP address or FQDN of the Cisco VCS.
3. Log in with a username of admin and your system password.
4. You can now start using the CLI by typing the appropriate commands.
CLI command types
CLI commands are divided into the following groups:
n xStatus: these commands return information about the current status of the system. Information
such as current calls and registrations is available through this command group. See xStatus
command reference for a full list of xStatus commands.
n xConfiguration: these commands allow you to add and edit single items of data such as IP
address and zones. See xConfiguration command reference for a full list of xConfiguration
commands.
n xCommand: these commands allow you to add and configure items and obtain information. See
xCommand command reference for a full list of xCommand commands.
n xHistory: these commands provide historical information about calls and registrations.
n xFeedback: these commands provide information about events as they happen, such as calls and
registrations.
Note that:
n Typing an xConfiguration path into the CLI returns a list of values currently configured for that
element (and sub-elements where applicable).
n Typing an xConfiguration path into the CLI followed by a ? returns information about the usage for
that element and sub-elements.
n Typing an xCommand command into the CLI with or without a ? returns information about the usage of
that command.
Cisco VCS Command Reference (X6)Page 3 of 95
Page 4
xConfiguration command reference
xConfiguration command reference
The xConfiguration group of commands are used to set and change individual items of
configuration. Each command is made up of a main element followed by one or more sub-elements.
The following section lists all the currently available xConfiguration commands.
To set a particular item of configuration, type the command as shown. The valid values for each
command are indicated in the angle brackets following each command, using the following notation:
FormatMeaning
<0..63>Indicates an integer value is required. The numbers indicate the minimum and
maximum value.
In this example the value must be in the range 0 to 63.
<S: 7,15>An S indicates a string value, to be enclosed in quotation marks, is required. The
numbers indicate the minimum and maximum number of characters for the string.
In this example the string must be between 7 and 15 characters long.
<Off/Direct/Indirect> Lists the set of valid values for the command. Do not enclose the value in quotation
marks
[1..50]Square brackets indicate that you can configure more than one of this particular item.
Each item is assigned an index within the range shown.
For example IP Route [1..50] Address <S: 0,39> means that up to 50 IP routes
can be specified with each route requiring an address of up to 39 characters in length.
To obtain information about existing configuration, type:
n xConfiguration to return all current configuration settings
n xConfiguration <element> to return all current configuration for that particular element and all its
sub-elements
n xConfiguration <element> <subelement>to return all current configuration for that group of
sub-elements
To obtain information about using each of the xConfiguration commands, type:
n xConfiguration ? to return a list of all elements available under the xConfigurationcommand
n xConfiguration ?? to return a list of all elements available under the
xConfigurationcommand, along with the valuespace, description and default values for each
element
n xConfiguration <element> ? to return all available sub-elements and their valuespace,
description and default values
n xConfiguration <element> <sub-element> ? to return all available sub-elements and their
valuespace, description and default values
xConfiguration commands
All of the available xConfiguration commands are listed in the table below:
Cisco VCS Command Reference (X6)Page 4 of 95
Page 5
xConfiguration command reference
Administration HTTP Mode: <On/Off>
Determines whether HTTP calls will be redirected to the HTTPS port.
On: calls will be redirected to HTTPS.
Off: no HTTP access will be available.
Note: you must restart the system for any changes to take effect.
Default: On
Example: xConfiguration Administration HTTP Mode: On
Administration HTTPS Mode: <On/Off>
Determines whether the VCS can be accessed via the web interface. This must be On to enable both web
interface and TMS access.
Note: you must restart the system for any changes to take effect.
Default: On
Example: xConfiguration Administration HTTPS Mode: On
Determines whether the VCS requires a valid client certificate from your web browser before setting up an
HTTPS session. Note: this does not affect client verification of the VCS's server certificate.
Default: Off
Example: xConfiguration Administration HTTPS RequireClientCertificate: On
Administration LCDPanel Mode: <On/Off>
Controls whether the LCD panel on the front of the VCS identifies the system.
On: the system name and first active IP address are shown.
Off: the LCD panel reveals no identifying information about the system.
Default: On
Example: xConfiguration Administration LCDPanel Mode: On
Administration SSH Mode: <On/Off>
Determines whether the VCS can be accessed via SSH and SCP.
Note: you must restart the system for any changes to take effect.
Default: On
Example: xConfiguration Administration SSH Mode: On
Administration Telnet Mode: <On/Off>
Determines whether the VCS can be accessed via Telnet.
Note: you must restart the system for any changes to take effect.
Default: Off
Example: xConfiguration Administration Telnet Mode: Off
Administration TimeOut: <0..10000>
Sets the number of minutes that an administration session (HTTPS, Telnet or SSH) may be inactive before
the session is timed out. A value of 0 turns session time outs off.
Default: 0
Example: xConfiguration Administration TimeOut: 0
Cisco VCS Command Reference (X6)Page 5 of 95
Page 6
xConfiguration command reference
Alternates Cluster Name: <S: 0,128>
The fully qualified domain name used in SRV records that address this VCS cluster, for example
"cluster1.example.com". The name can only contain letters, digits, hyphens and underscores.
Warning: if you change the cluster name after any user accounts have been configured on this VCS, you
may need to reconfigure your user accounts to use the new cluster name. Refer to the Clustering and peers
section of the VCSAdministrator Guide for more information.
Specifies which peer in this cluster is the master, from which configuration will be replicated to all other
peers. A cluster consists of up to 6 peers, including the local VCS.
The alias that will be dialed by the endpoints when the Multiway feature is activated. This must be preconfigured on all endpoints that may be used to initiate the Multiway feature.
Applications External Status [1..10] Filename: <S:0,255>
XML file containing status that is to be attached for an external application.
Example: xConfiguration Applications External Status 1 Filename: "foo.xml"
Cisco VCS Command Reference (X6)Page 6 of 95
Page 7
xConfiguration command reference
Applications External Status [1..10] Name: <S:0,64>
Descriptive name for the external application whose status is being referenced.
Example: xConfiguration Applications External Status 1 Name: "foo"
Applications OCS Relay Mode: <On/Off>
Enables or disables OCS relay support.
Default: Off
Example: xConfiguration Applications OCS Relay Mode: Off
Applications OCS Relay OCS Domain: <S:0,128>
The SIP domain in use on the Microsoft Office Communications Server. This must be selected from one of
the SIP domains already configured on the VCS, and must be the same domain used by all FindMe names.
Prefix applied to requests routed through the VCS proxy, from the OCS Relay. This is then used to route the
requests onto to the appropriate Microsoft Office Communications Server (via Neighbor zone matches).
Enables and disables the SIMPLE Presence Server. Note: SIP mode must also be enabled for the Presence
Server to function.
Default: Off
Example: xConfiguration Applications Presence Server Mode: On
Applications Presence Server Publication ExpireDelta: <30..7200>
Specifies the maximum time (in seconds) within which a publisher must refresh its publication.
Default: 1800
Example: xConfiguration Applications Presence Server Publication ExpireDelta: 1800
Applications Presence Server Subscription ExpireDelta: <30..7200>
Specifies the maximum time (in seconds) within which a subscriber must refresh its subscription.
Default: 3600
Example: xConfiguration Applications Presence Server Subscription ExpireDelta: 3600
Applications Presence User Agent ExpireDelta: <1..65534>
Specifies the lifetime value (in seconds) the Presence User Agent will advertise in the PUBLISH messages it
sends to the Presence Server. The Presence User Agent will refresh its PUBLISH messages at 75% of this
value (to keep them active). The Presence Server may reduce this value in its responses.
Default: 3600
Example: xConfiguration Applications Presence User Agent ExpireDelta: 3600
Applications Presence User Agent Mode: <On/Off>
Enables and disables the SIMPLE Presence User Agent (PUA). The PUA provides presence information on
behalf of registered endpoints. SIP mode must also be enabled for the PUA to function.
Default: Off
Example: xConfiguration Applications Presence User Agent Mode: Off
Cisco VCS Command Reference (X6)Page 7 of 95
Page 8
xConfiguration command reference
Applications Presence User Agent RetryDelta: <1..65534>
Specifies the time (in seconds) after which the Presence User Agent will attempt to resend a PUBLISH to the
Presence Server. This will occur if the original attempt failed due to resource issues or other transitory errors.
Default: 1800
Example: xConfiguration Applications Presence User Agent RetryDelta: 1800
Authentication ADS ADDomain: <S: 0,255>
The Kerberos realm used when the VCS joins the AD domain. Note: this field is case sensitive.
The address of a domain controller that can be used when the VCS joins the AD domain. Not specifying a
specific AD will result the use of DNS SRV queries to find an AD.
Example: xConfiguration Authentication ADS DC 1 Address: "192.168.0.0"
Authentication ADS Encryption: <Off/TLS>
Sets the encryption to use for the connection to the ADS server.
The address of a Kerberos Distribution Center (KDC) to be used when connected to the AD domain. Not
specifying a specific KDC will result in the use of DNS SRV queries to find a KDC.
Indicates if the VCS should attempt to form a relationship with the AD.
Default: Off
Example: xConfiguration Authentication ADS Mode: On
Cisco VCS Command Reference (X6)Page 8 of 95
Page 9
xConfiguration command reference
Authentication ADS SPNEGO: <Enabled/Disabled>
Indicates if SPNEGO (Simple and Protected GSSAPI Negotiation Mechanism) is used when the client (the
VCS) authenticates with the server (the AD domain controller).
Defines the password for this entry in the local authentication database. The maximum plaintext length is
128 characters, which will then be encrypted.
The password used by the VCS when authenticating with another system. The maximum plaintext length is
128 characters, which is then encrypted. Note: this does not apply to traversal client zones.
Determines the way in which the VCS will attempt to call systems which are not registered with it or one of its
neighbors.
Direct: allows an endpoint to make a call to an unknown IP address without the VCS querying any
neighbors. The call setup would occur just as it would if the far end were registered directly to the local
system.
Indirect: upon receiving a call to an unknown IP address, the VCS will query its neighbors for the remote
address and if permitted will route the call through the neighbor.
Off: endpoints registered directly to the VCS may only call an IP address of a system also registered directly
to that VCS.
Specifies the alias to which incoming calls are placed for calls where the IP address or domain name of the
VCS has been given but no callee alias has been specified.
Specifies the IPv4 address of the specified LAN port. Note: you must restart the system for any changes to
take effect.
Example: xConfiguration Ethernet 1 IP V4 Address: "192.168.10.10"
Cisco VCS Command Reference (X6)Page 12 of 95
Page 13
xConfiguration command reference
Ethernet [1..2] IP V4 StaticNAT Address: <S:7,15>
If the VCS is operating in static NAT mode, this specifies the external public IPv4 address of that static NAT.
Note: you must restart the system for any changes to take effect.
Example: xConfiguration Ethernet 1 IP V4 StaticNAT Address: "64.22.64.85"
Ethernet [1..2] IP V4 StaticNAT Mode: <On/Off>
Specifies whether the VCS is located behind a static NAT. Note: You must restart the system for any changes
to take effect.
Default: Off
Example: xConfiguration Ethernet 1 IP V4 StaticNAT Mode: On
Ethernet [1..2] IP V4 SubnetMask: <S: 7,15>
Specifies the IPv4 subnet mask of the specified LAN port. Note: you must restart the system for any changes
to take effect.
Example: xConfiguration Ethernet 1 IP V4 SubnetMask: "255.255.255.0"
Ethernet [1..2] IP V6 Address: <S: 0, 39>
Specifies the IPv6 address of the specified LAN port. Note: you must restart the system for any changes to
take effect.
Example: xConfiguration Ethernet 1 IP V6 Address: "2001:db8::1428:57ab"
Sets the speed of the Ethernet link from the specified LAN port. Use Auto to automatically configure the
speed. Note: you must restart the system for any changes to take effect.
Default: Auto
Example: xConfiguration Ethernet 1 Speed: Auto
ExternalManager Address: <S: 0, 128>
Sets the IP address or Fully Qualified Domain Name (FQDN) of the external manager.
Specifies whether the prefix of the ISDN gateway is inserted into the caller's E.164 number presented on the
destination endpoint. Including the prefix allows the recipient to directly return the call.
IncludePrefix: inserts the ISDN gateway's prefix into the source E.164 number.
ExcludePrefix: only displays the source E.164 number.
The name to be appended to an unqualified host name before querying the DNS server.
Used only when attempting to resolve unqualified domain names for NTP, LDAP, external manager and
remote syslog servers.
Example: xConfiguration IP DNS Domain Name: "example.com"
Cisco VCS Command Reference (X6)Page 15 of 95
Page 16
xConfiguration command reference
IP DNS Hostname : <S: 0, 63>
Defines the DNS host name that this system is known by. Note that this is not the fully-qualified domain
name, just the host label portion.
The name can only contain letters, digits, hyphens and underscores. The first character must be a letter and
the last character must be a letter or a digit.
Example: xConfiguration IP DNS Hostname: "localvcs"
IP DNS Server [1..5] Address: <S: 0, 39>
Sets the IP address of up to 5 DNS servers to be used when resolving domain names.
Example: xConfiguration IP DNS Server 1 Address: "192.168.12.0"
IP Ephemeral PortRange End: <1024..65534>
Specifies the highest port in the range to be used for ephemeral outbound connections not otherwise
constrained by VCS call processing.
Default: 49999
Example: xConfiguration IP Ephemeral PortRange End: 49999
IP Ephemeral PortRange Start: <1024..65534>
Specifies the lowest port in the range to be used for ephemeral outbound connections not otherwise
constrained by VCS call processing.
Default: 40000
Example: xConfiguration IP Ephemeral PortRange Start: 40000
IP External Interface: <LAN1/LAN2>
Defines which LAN interface is externally facing.
Default: LAN1
Example: xConfiguration IP External Interface: LAN1
IP Gateway: <S: 7,15>
Specifies the IPv4 gateway of the VCS. Note: you must restart the system for any changes to take effect.
Default: 127.0.0.1
Example: xConfiguration IP Gateway: "192.168.127.0"
IP QoS Mode: <None/DiffServ>
Specifies the type of QoS (Quality of Service) tags to apply to all signaling and media packets.
None: no specific QoS tagging is applied.
DiffServ: puts the specified Tag value in the TOS (Type Of Service) field of the IPv4 header or TC (Traffic
Class) field of the IPv6 header.
Note: you must restart the system for any changes to take effect.
Default: None
Example: xConfiguration IP QoS Mode: DiffServ
IP QoS Value: <0..63>
The value to be stamped onto all signaling and media traffic routed through the VCS. Note: you must restart
the system for any changes to take effect.
Example: xConfiguration IP QoS Value: 16
Cisco VCS Command Reference (X6)Page 16 of 95
Page 17
xConfiguration command reference
IP Route [1..50] Address: <S: 0, 39>
Specifies an IP address used in conjunction with the Prefix Length to determine the network to which this
route applies.
Example: xConfiguration IP Route 1 Address: "128.168.0.0"
IP Route [1..50] Gateway: <S: 0, 39>
Specifies the IP address of the Gateway for this route.
Example: xConfiguration IP Route 1 Gateway: "192.168.0.0"
IP Route [1..50] Interface: <Auto/LAN1/LAN2>
Specifies the LAN interface to use for this route. Auto: The VCS will select the most appropriate interface to
use.
Default: Auto
Example: xConfiguration IP Route 1 Interface: Auto
IP Route [1..50] PrefixLength: <0..128>
Specifies the number of bits of the IP address which must match when determining the network to which this
route applies.
Default: 32
Example: xConfiguration IP Route 1 PrefixLength: 16
IP V6 Gateway: <S: 0, 39>
Specifies the IPv6 gateway of the VCS. Note: you must restart the system for any changes to take effect.
Example: xConfiguration IP V6 Gateway: "3dda:80bb:6::9:144"
IPProtocol: <Both/IPv4/IPv6>
Selects whether the VCS is operating in IPv4, IPv6 or dual stack mode. Note: you must restart the system for
any changes to take effect.
Default: IPv4
Example: xConfiguration IPProtocol: IPv4
LDAP Encryption: <Off/TLS>
Sets the encryption to use for the connection to the LDAP server.
Off: no encryption is used.
TLS: TLS encryption is used.
Default: Off
Example: xConfiguration LDAP Encryption: Off
LDAP Password: <S: 0, 122>
Sets the password to use when binding to the LDAP server. The maximum plaintext length is 60 characters,
which is then encrypted.
Sets the IP address or Fully Qualified Domain Name (FQDN) of the LDAP server to use when making LDAP
queries.
Example: xConfiguration LDAP Server Address: "ldap.server.example.com"
Cisco VCS Command Reference (X6)Page 17 of 95
Page 18
xConfiguration command reference
LDAP Server Port: <1..65534>
Sets the IP port of the LDAP server to use when making LDAP queries. Typically, non-secure connections
use 389 and secure connections use 636.
Default: 389
Example: xConfiguration LDAP Server Port: 389
LDAP UserDN: <S: 0, 255>
Sets the user distinguished name to use when binding to the LDAP server.
Example: xConfiguration LDAP UserDN: "user123"
Log Level: <1..4>
Controls the granularity of Event Logging. 1 is the least verbose, 4 the most.
Note: this setting is not retrospective; it will determine which events are written to the Event Log from now
onwards.
Default: 1
Example: xConfiguration Log Level: 1
Log Server Address: <S: 0, 128>
A comma-separated list of IP addresses or Fully Qualified Domain Names (FQDNs) of the remote syslog
servers to where the Event Log is written. These servers must support the BSD syslog protocol. They cannot
be another VCS.
Example: xConfiguration Log Server Address: "syslog.server.example.com"
Login Administrator Groups Group [1..30] Access: <None/ReadOnly/ReadWrite/Auditor>
Defines the access level for members of the specified administrator group.
None: no access allowed.
ReadOnly: configuration can only be viewed.
ReadWrite: configuration can be viewed and changed.
Auditor: allows access to the Event Log, Configuration Log and the Overview page only.
Default: ReadWrite
Example: xConfiguration Login Administrator Groups Group 1 Access: ReadWrite
Login Administrator Groups Group [1..30] Name: <S: 0,128>
Defines the name of an administrator group that determines which access rights members of the group have
after they have been successfully authenticated to use the VCS.
Example: xConfiguration Login Administrator Groups Group 1 Name: "VCS_Admin"
Login Administrator Source: <Local/Remote>
Defines where administrator login credentials are authenticated before access is allowed to the VCS.
Remote: credentials are verified against an external credentials directory, for example Windows Active
Directory.
Local: credentials are verified against a local database stored on the VCS.
Default: Local
Example: xConfiguration Login Administrator Source: Local
Cisco VCS Command Reference (X6)Page 18 of 95
Page 19
xConfiguration command reference
Login Remote LDAP BaseDN Accounts: <S: 0,255>
Sets the Distinguished Name to use as the base when searching for administrator and user accounts.
Specifies whether certificate revocation lists (CRLs) are checked when forming a TLS connection with the
LDAP server. CRL data is uploaded to the VCS via the trusted CA certificate PEM file.
None: no CRL checking is performed.
Peer: only the CRL associated with the CA that issued the LDAP server's certificate is checked.
All: all CRLs in the trusted certificate chain of the CA that issued the LDAP server's certificate are checked.
Login User Groups Group [1..15] Access: <None/ReadWrite>
Defines the access level for members of the specified user group.
None: no access allowed.
ReadWrite: configuration can be viewed and changed.
Default: ReadWrite
Example: xConfiguration Login User Groups Group 1 Access: ReadWrite
Login User Groups Group [1..15] Name: <S: 0,128>
Defines the name of a user group that determines which access rights members of the group have after they
have been successfully authenticated to use the VCS.
Example: xConfiguration Login User Groups Group 1 Name: "FindMeAccounts"
Cisco VCS Command Reference (X6)Page 20 of 95
Page 21
xConfiguration command reference
Login User Source: <Local/Remote>
Defines where user login credentials are authenticated before access is allowed to the VCS.
Remote: credentials are verified against an external credentials directory, for example Windows Active
Directory.
Local: credentials are verified against a local database stored on the VCS.
Default: Local
Example: xConfiguration Login User Source: Local
NTP Address: <S: 0, 128>
Sets the IP address or Fully Qualified Domain Name (FQDN) of the NTP server to be used when
synchronizing system time.
Specifies the option key of your software option. These are added to the VCS in order to add extra
functionality, such as increasing the VCS’s capacity. Contact your TANDBERG representative for further
information.
Example: xConfiguration Policy AdministratorPolicy Service DefaultCPL: "<reject
status='403' reason='Service Unavailable'/>"
Policy AdministratorPolicy Service Password: <S: 0,82>
Specifies the password used by the VCS to log in and query the remote service. The maximum plaintext
length is 30 characters, which will then be encrypted.
Example: xConfiguration Policy AdministratorPolicy Service Password: "password123"
Policy AdministratorPolicy Service Path: <S: 0,255>
Specifies the URL of the remote service.
Example: xConfiguration Policy AdministratorPolicy Service Path: "service"
Policy AdministratorPolicy Service Protocol: <HTTP/HTTPS>
Specifies the protocol used to connect to the remote service.
Default: HTTP
Example: xConfiguration Policy AdministratorPolicy Service Protocol: HTTP
Cisco VCS Command Reference (X6)Page 21 of 95
Page 22
xConfiguration command reference
Policy AdministratorPolicy Service Server [1..3] Address: <S: 0,128>
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the remote service.
Example: xConfiguration Policy AdministratorPolicy Service Server 1 Address:
"service.server.example.com"
Policy AdministratorPolicy Service TLS CRLCheck Mode: <On/Off>
Controls certificate revocation list checking of the certificate supplied by the policy service. When enabled,
the server's X.509 certificate will be checked against the revocation list of the certificate authority of the
certificate.
Default: Off
Example: xConfiguration Policy AdministratorPolicy Service TLS CRLCheck Mode: Off
Policy AdministratorPolicy Service TLS Verify Mode: <On/Off>
Controls X.509 certificate checking and mutual authentication between this VCS and the policy service.
When enabled, the server's FQDN or IP address, as specified in the address field, must be contained within
the server's X.509 certificate (in either the Subject Common Name or the Subject Alternative Name
attributes).
Default: On
Example: xConfiguration Policy AdministratorPolicy Service TLS Verify Mode: On
Policy AdministratorPolicy Service UserName: <S: 0,30>
Specifies the user name used by the VCS to log in and query the remote policy service.
Example: xConfiguration Policy AdministratorPolicy Service UserName: "user123"
Policy FindMe CallerID: <FindMeID/IncomingID>
Determines how the source of an incoming call is presented to the callee.
IncomingID: displays the address of the endpoint from which the call was placed.
FindMeID: displays the FindMe ID associated with the originating endpoint's address.
ThirdPartyManager: uses an off-box, third-party FindMe manager.
Default: Off
Example: xConfiguration Policy FindMe Mode: On
Policy FindMe Server Address: <S: 0, 128>
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the remote FindMe Manager.
Example: xConfiguration Policy FindMe Server Address: "userpolicy.server.example.com"
Policy FindMe Server Password: <S: 0, 82>
Specifies the password used by the VCS to log in and query the remote FindMe Manager. The maximum
plaintext length is 30 characters, which will then be encrypted.
Example: xConfiguration Policy FindMe Server Password: "password123"
Cisco VCS Command Reference (X6)Page 22 of 95
Page 23
xConfiguration command reference
Policy FindMe Server Path: <S: 0, 255>
Specifies the URL of the remote FindMe Manager.
Example: xConfiguration Policy FindMe Server Path: "service"
Policy FindMe Server Protocol: <HTTP/HTTPS>
Specifies the protocol used to connect to the remote FindMe Manager.
Default: HTTP
Example: xConfiguration Policy FindMe Server Protocol: HTTP
Policy FindMe Server UserName: <S: 0, 30>
Specifies the user name used by the VCS to log in and query the remote FindMe Manager.
Example: xConfiguration Policy FindMe Server UserName: "user123"
Policy FindMe UserDeviceRestriction: <Off/On>
Controls if users are restricted from adding, deleting or modifying their own devices.
Default: Off
Example: xConfiguration Policy FindMe UserDeviceRestriction: Off
Policy Services Service [1..5] DefaultCPL: <S: 0,255>
The CPL used by the VCS when the remote service is unavailable.
Default:
Example: xConfiguration Policy Services Service 1 DefaultCPL: "<reject status='403'
reason='Service Unavailable'/>"
Policy Services Service [1..5] Description: <S: 0,64>
A free-form description of the Policy Service.
Example: xConfiguration Policy Services Service 1 Description: "Conference management
service"
Policy Services Service [1..5] Name: <S: 0,50>
Assigns a name to this Policy Service.
Example: xConfiguration Policy Services Service 1 Name: "Conference handler"
Policy Services Service [1..5] Password: <S: 0,82>
Specifies the password used by the VCS to log in and query the remote service. The maximum plaintext
length is 30 characters, which will then be encrypted.
Example: xConfiguration Policy Services Service 1 Password: "password123"
Policy Services Service [1..5] Path: <S: 0,255>
Specifies the URL of the remote service.
Example: xConfiguration Policy Services Service 1 Path: "service"
Policy Services Service [1..5] Protocol: <HTTP/HTTPS>
Specifies the protocol used to connect to the remote service.
Default: HTTP
Example: xConfiguration Policy Services Service 1 Protocol: HTTP
Cisco VCS Command Reference (X6)Page 23 of 95
Page 24
xConfiguration command reference
Policy Services Service [1..5] Server [1..3] Address: <S: 0,128>
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the remote service.
Example: xConfiguration Policy Services Service 1 Server 1 Address: "192.168.0.0"
Policy Services Service [1..5] TLS CRLCheck Mode: <On/Off>
Controls certificate revocation list checking of the certificate supplied by the policy service. When enabled,
the server's X.509 certificate will be checked against the revocation list of the certificate authority of the
certificate.
Default: Off
Example: xConfiguration Policy Services Service 1 TLS CRLCheck Mode: Off
Policy Services Service [1..5] TLS Verify Mode: <On/Off>
Controls X.509 certificate checking and mutual authentication between this VCS and the policy service.
When enabled, the server's FQDN or IP address, as specified in the address field, must be contained within
the server's X.509 certificate (in either the Subject Common Name or the Subject Alternative Name
attributes).
Default: On
Example: xConfiguration Policy Services Service [1..5] TLS Verify Mode: On
Policy Services Service [1..5] UserName: <S: 0,30>
Specifies the user name used by the VCS to log in and query the remote service.
Example: xConfiguration Policy Services Service 1 UserName: "user123"
Specifies an entry to be added to the Allow List. If one of an endpoint’s aliases matches one of the patterns in
the Allow List, the registration will be permitted.
Specifies an entry to be added to the Deny List. If one of an endpoint’s aliases matches one of the patterns in
the Deny List, the registration will not be permitted.
Registration RestrictionPolicy Service DefaultCPL: <S: 0,255>
The CPL used by the VCS when the remote service is unavailable.
Default:
Example: xConfiguration Registration RestrictionPolicy Service DefaultCPL: "<reject
status='403' reason='Service Unavailable'/>"
Registration RestrictionPolicy Service Password: <S: 0,82>
Specifies the password used by the VCS to log in and query the remote service. The maximum plaintext
length is 30 characters, which will then be encrypted.
Example: xConfiguration Registration RestrictionPolicy Service Password:
"password123"
Registration RestrictionPolicy Service Path: <S: 0,255>
Specifies the URL of the remote service.
Example: xConfiguration Registration RestrictionPolicy Service Path: "service"
Registration RestrictionPolicy Service Protocol: <HTTP/HTTPS>
Specifies the protocol used to connect to the remote service.
Default: HTTP
Example: xConfiguration Registration RestrictionPolicy Service Protocol: HTTP
Cisco VCS Command Reference (X6)Page 25 of 95
Page 26
xConfiguration command reference
Registration RestrictionPolicy Service Server [1..3] Address: <S: 0,128>
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the remote service.
Example: xConfiguration Registration RestrictionPolicy Service Server 1 Address:
"192.168.0.0"
Registration RestrictionPolicy Service TLS CRLCheck Mode: <On/Off>
Controls certificate revocation list checking of the certificate supplied by the policy service. When enabled,
the server's X.509 certificate will be checked against the revocation list of the certificate authority of the
certificate.
Default: Off
Example: xConfiguration Registration RestrictionPolicy Service TLS CRLCheck Mode: Off
Registration RestrictionPolicy Service TLS Verify Mode: <On/Off>
Controls X.509 certificate checking and mutual authentication between this VCS and the policy service.
When enabled, the server's FQDN or IP address, as specified in the address field, must be contained within
the server's X.509 certificate (in either the Subject Common Name or the Subject Alternative Name
attributes).
Default: On
Example: xConfiguration Registration RestrictionPolicy Service TLS Verify Mode: On
Registration RestrictionPolicy Service UserName: <S: 0,30>
Specifies the user name used by the VCS to log in and query the remote service.
Example: xConfiguration Registration RestrictionPolicy Service UserName: "user123"
ResourceUsage Warning Activation Level: <0..100>
Controls if and when the VCS will warn that it is approaching its maximum licensed capacity for calls or
registrations. The number represents the percentage of the maximum that, when reached, will trigger a
warning. 0: Warnings will never appear.
Determines the order in which the rules are applied. The rules with the highest priority (1, then 2, then 3 and
so on) are applied first. If multiple rules have the same priority they are applied in configuration order.
Services AdvancedMediaGateway Zone Name: <S: 0,50>
The zone used by the VCS to connect to one or more Advanced Media Gateways.
Example: xConfiguration Services AdvancedMediaGateway Zone Name: "AM gateway zone"
SIP Domains Domain [1..20] Name: <S: 0,128>
Specifies a domain for which this VCS is authoritative. The VCS will act as a SIP registrar and Presence
Server for this domain, and will accept registration requests for any SIP endpoints attempting to register with
an alias that includes this domain. The domain name can comprise multiple levels. Each level's name can
only contain letters, digits and hyphens, with each level separated by a period (dot). A level name cannot
start or end with a hyphen, and the final level name must start with a letter. An example valid domain name is
"100.example-name.com".
Determines whether or not the VCS will provide SIP registrar and SIP proxy functionality. This mode must be
enabled in order to use either the Presence Server or the Presence User Agent.
Default: On
Example: xConfiguration SIP Mode: On
SIP Registration Call Remove: <Yes/No>
Specifies whether associated calls are dropped when a SIP registration expires or is removed.
Default: No
Example: xConfiguration SIP Registration Call Remove: No
Cisco VCS Command Reference (X6)Page 28 of 95
Page 29
xConfiguration command reference
SIP Registration ExpireDelta: <30..7200>
Specifies the period (in seconds) within which a SIP endpoint must re-register with the VCS to prevent its
registration expiring.
The minimum value the VCS will negotiate for the session refresh interval for SIP calls. For further
information refer to the definition of Min-SE header in RFC 4028.
The maximum time allowed between session refresh requests for SIP calls. For further information refer to
the definition of Session-Expires in RFC 4028.
Defines the password of an administrator user who can login to the VCS web interface. The maximum
plaintext length is 16 characters, which will then be encrypted.
Sets the VCS into maintenance mode. New calls and registrations are disallowed and existing registrations
are allowed to expire.
Default: Off
Example: xConfiguration SystemUnit Maintenance Mode: Off
SystemUnit Name: <S:, 0, 50>
Defines the name of the VCS. Choose a name that uniquely identifies the system.
Example: xConfiguration SystemUnit Name: "VCS HQ"
SystemUnit Password: <S: 0, 65>
Defines the password for the default 'admin' account. This account is used to log in to the VCS via Telnet,
HTTP(S), SSH, SCP, and on the serial port. The maximum plaintext length is 16 characters, which will then
be encrypted.
Assigns a priority to the specified transform. Transforms are compared with incoming aliases in order of
priority, and the priority must be unique for each transform.
Default: 1
Example: xConfiguration Transform 1 Priority: 10
Transform [1..100] State: <Enabled/Disabled>
Indicates if the transform is enabled or disabled. Disabled transforms are ignored.
For traversal calls (i.e. where the VCS is taking the media as well as the signaling), specifies the upper port
in the range to be used for the media. Ports are allocated from this range in pairs, the first of each being
even. Therefore the range must end with an odd number.
Default: 52399
Example: xConfiguration Traversal Media Port End: 52399
Traversal Media Port Start: <1024..65532>
For traversal calls (i.e. where the VCS is taking the media as well as the signaling), specifies the lower port in
the range to be used for the media. Ports are allocated from this range in pairs, the first of each being even.
Therefore the range must start with an even number.
Default: 50000
Example: xConfiguration Traversal Media Port Start: 50000
Traversal Server H323 Assent CallSignaling Port: <1024..65534>
Specifies the port on the VCS to be used for Assent signaling.
Default: 2776
Example: xConfiguration Traversal Server H323 Assent CallSignaling Port: 2777
Traversal Server H323 H46018 CallSignaling Port: <1024..65534>
Specifies the port on the VCS to be used for H460.18 signaling.
Default: 2777
Example: xConfiguration Traversal Server H323 H46018 CallSignaling Port: 2777
Traversal Server Media Demultiplexing RTCP Port: <1024..65534>
Specifies the port on the VCS to be used for demultiplexing RTCP media. Note: You must restart the system
for any changes to take effect.
Default: 2777
Example: xConfiguration Traversal Server Media Demultiplexing RTCP Port: 2777
Traversal Server Media Demultiplexing RTP Port: <1024..65534>
Specifies the port on the VCS to be used for demultiplexing RTP media. Note: You must restart the system for
any changes to take effect.
Default: 2776
Example: xConfiguration Traversal Server Media Demultiplexing RTP Port: 2776
Cisco VCS Command Reference (X6)Page 35 of 95
Page 36
xConfiguration command reference
Traversal Server TURN Authentication Realm: <S: 1,128>
The realm sent by the server in its authentication challenges.
Default: TANDBERG
Example: xConfiguration Traversal Server TURN Authentication Realm: "TANDBERG"
Traversal Server TURN Media Port End: <1024..65534>
The upper port in the range used for TURN relays.
Default: 61399
Example: xConfiguration Traversal Server TURN Media Port End: 61399
Traversal Server TURN Media Port Start: <1024..65534>
The lower port in the range used for TURN relays.
Default: 60000
Example: xConfiguration Traversal Server TURN Media Port Start: 60000
Traversal Server TURN Mode: <On/Off>
Determines whether the VCS offers TURN services to traversal clients.
Default: Off
Example: xConfiguration Traversal Server TURN Mode: Off
Traversal Server TURN Port: <1024..65534>
The listening port for TURN requests.
Default: 3478
Example: xConfiguration Traversal Server TURN Port: 3478
Zones DefaultZone Authentication Mode:
<DoNotCheckCredentials/TreatAsAuthenticated/CheckCredentials>
Controls how the VCS authenticates incoming messages from this zone and whether they are subsequently
treated as authenticated, unauthenticated, or are rejected. The behavior varies for H.323 messages, SIP
messages that originate from a local domain and SIP messages that originate from non-local domains. See
the Administrator Guide for full details about each of the Authentication Policy options.
Default: DoNotCheckCredentials
Example: xConfiguration Zones DefaultZone Authentication Mode: DoNotCheckCredentials
Zones LocalZone DefaultSubZone Authentication Mode:
<DoNotCheckCredentials/TreatAsAuthenticated/CheckCredentials>
Controls how the VCS authenticates incoming messages from this subzone and whether they are
subsequently treated as authenticated, unauthenticated or are rejected. The behavior varies for H.323
messages, SIP messages that originate from a local domain and SIP messages that originate from non-local
domains. See the Administrator Guide for further information.
Default: DoNotCheckCredentials
Example: xConfiguration Zones LocalZone DefaultSubZone Authentication Mode:
DoNotCheckCredentials
Cisco VCS Command Reference (X6)Page 36 of 95
Page 37
xConfiguration command reference
Zones LocalZone DefaultSubZone Bandwidth PerCall Inter Limit: <1..100000000>
Specifies the bandwidth limit (in kbps) for any one call to or from an endpoint in the Default Subzone (applies
only if the mode is set to Limited).
Default: 1920
Example: xConfiguration Zones LocalZone DefaultSubZone Bandwidth PerCall Inter Limit:
1920
Zones LocalZone DefaultSubZone Bandwidth PerCall Inter Mode: <Limited/Unlimited/NoBandwidth>
Determines whether there is a limit on the bandwidth for any one call to or from an endpoint in the Default
Subzone.
NoBandwidth: no bandwidth available. No calls can be made to or from the Default Subzone.
Default: Unlimited
Example: xConfiguration Zones LocalZone DefaultSubZone Bandwidth PerCall Inter Mode:
Limited
Zones LocalZone DefaultSubZone Bandwidth PerCall Intra Limit: <1..100000000>
Specifies the bandwidth limit (in kbps) for any one call between two endpoints within the Default Subzone
(applies only if the mode is set to Limited).
Default: 1920
Example: xConfiguration Zones LocalZone DefaultSubZone Bandwidth PerCall Intra Limit:
1920
Zones LocalZone DefaultSubZone Bandwidth PerCall Intra Mode: <Limited/Unlimited/NoBandwidth>
Determines whether there is a limit on the bandwidth for any one call between two endpoints within the
Default Subzone.
NoBandwidth: no bandwidth available. No calls can be made within the Default Subzone.
Default: Unlimited
Example: xConfiguration Zones LocalZone DefaultSubZone Bandwidth PerCall Intra Mode:
Limited
Zones LocalZone DefaultSubZone Bandwidth Total Limit: <1..100000000>
Sets the total bandwidth limit (in kbps) of the Default Subzone (applies only if Mode is set to Limited).
Default: 500000
Example: xConfiguration Zones LocalZone DefaultSubZone Bandwidth Total Limit: 500000
Zones LocalZone DefaultSubZone Bandwidth Total Mode: <Limited/Unlimited/NoBandwidth>
Determines whether the Default Subzone has a limit on the total bandwidth being used by its endpoints at
any one time.
NoBandwidth: no bandwidth available. No calls can be made to, from, or within the Default Subzone.
Default: Unlimited
Example: xConfiguration Zones LocalZone DefaultSubZone Bandwidth Total Mode: Limited
Zones LocalZone DefaultSubZone Registrations: <Allow/Deny>
Controls whether registrations assigned to the Default Subzone are accepted.
Default: Allow
Example: xConfiguration Zones LocalZone DefaultSubZone Registrations: Allow
Cisco VCS Command Reference (X6)Page 37 of 95
Page 38
xConfiguration command reference
Zones LocalZone SubZones MembershipRules Rule [1..3000] Description: <S: 0,64>
A free-form description of the membership rule.
Example: xConfiguration Zones LocalZone SubZones MembershipRules Rule 1 Description:
"Office-based staff"
Zones LocalZone SubZones MembershipRules Rule [1..3000] Name: <S: 0,50>
Assigns a name to this membership rule.
Example: xConfiguration Zones LocalZone SubZones MembershipRules Rule 1 Name: "Office
Workers"
Zones LocalZone SubZones MembershipRules Rule [1..3000] Pattern String: <S: 0,60>
Specifies the pattern against which the alias is compared.
Example: xConfiguration Zones LocalZone SubZones MembershipRules Rule 1 Pattern
String: "@example.com"
Zones LocalZone SubZones MembershipRules Rule [1..3000] Pattern Type:
<Exact/Prefix/Suffix/Regex>
The way in which the pattern must match the alias.
Example: xConfiguration Zones LocalZone SubZones MembershipRules Rule 1 Pattern Type:
Suffix
Zones LocalZone SubZones MembershipRules Rule [1..3000] Priority: <1..65534>
Determines the order in which the rules are applied (and thus to which subzone the endpoint is assigned) if
an endpoint's address satisfies multiple rules. The rules with the highest priority (1, then 2, then 3 and so on)
are applied first. If multiple Subnet rules have the same priority the rule with the largest prefix length is
applied first. Alias Pattern Match rules at the same priority are searched in configuration order.
Default: 100
Example: xConfiguration Zones LocalZone SubZones MembershipRules Rule 1 Priority: 100
Zones LocalZone SubZones MembershipRules Rule [1..3000] State: <Enabled/Disabled>
Indicates if the membership rule is enabled or disabled. Disabled membership rules are ignored.
Default: Enabled
Example: xConfiguration Zones LocalZone SubZones MembershipRules Rule 1 State:
Enabled
Zones LocalZone SubZones MembershipRules Rule [1..3000] SubZoneName: <S: 0,50>
The subzone to which an endpoint is assigned if its address satisfies this rule.
Example: xConfiguration Zones LocalZone SubZones MembershipRules Rule 1 SubZoneName:
"Branch Office"
Zones LocalZone SubZones MembershipRules Rule [1..3000] Subnet Address: <S: 0,39>
Specifies an IP address used (in conjunction with the prefix length) to identify this subnet.
Example: xConfiguration Zones LocalZone SubZones MembershipRules Rule 1 Subnet
Address: "192.168.0.0"
Cisco VCS Command Reference (X6)Page 38 of 95
Page 39
xConfiguration command reference
Zones LocalZone SubZones MembershipRules Rule [1..3000] Subnet PrefixLength: <1..128>
The number of bits of the subnet address which must match for an IP address to belong in this subnet.
Default: 32
Example: xConfiguration Zones LocalZone SubZones MembershipRules Rule 1 Subnet
PrefixLength: 32
Zones LocalZone SubZones MembershipRules Rule [1..3000] Type: <Subnet/AliasPatternMatch>
The type of address that applies to this rule.
Subnet: assigns the device if its IP address falls within the configured IP address subnet.
AliasPatternMatch: assigns the device if its alias matches the configured pattern.
Example: xConfiguration Zones LocalZone SubZones MembershipRules Rule 1 Type: Subnet
Zones LocalZone SubZones SubZone [1..1000] Authentication Mode:
<DoNotCheckCredentials/TreatAsAuthenticated/CheckCredentials>
Controls how the VCS authenticates incoming messages from this subzone and whether they are
subsequently treated as authenticated, unauthenticated or are rejected. The behavior varies for H.323
messages, SIP messages that originate from a local domain and SIP messages that originate from non-local
domains. See the Administrator Guide for further information.
Default: DoNotCheckCredentials
Example: xConfiguration Zones LocalZone SubZones SubZone 1 Authentication Mode:
DoNotCheckCredentials
Zones LocalZone SubZones SubZone [1..1000] Bandwidth PerCall Inter Limit: <1..100000000>
Specifies the bandwidth limit (in kbps) on any one call to or from an endpoint in this subzone (applies only if
Mode is set to Limited).
Default: 1920
Example: xConfiguration Zones LocalZone SubZones SubZone 1 Bandwidth PerCall Inter
Limit: 1920
Zones LocalZone SubZones SubZone [1..1000] Bandwidth PerCall Inter Mode:
<Limited/Unlimited/NoBandwidth>
Determines whether there is a limit on the bandwidth for any one call to or from an endpoint in this subzone.
NoBandwidth: no bandwidth available. No calls can be made to or from this subzone.
Default: Unlimited
Example: xConfiguration Zones LocalZone SubZones SubZone 1 Bandwidth PerCall Inter
Mode: Limited
Zones LocalZone SubZones SubZone [1..1000] Bandwidth PerCall Intra Limit: <1..100000000>
Specifies the bandwidth limit (in kbps) for any one call between two endpoints within this subzone (applies
only if the mode is set to Limited).
Default: 1920
Example: Zones LocalZone SubZones SubZone 1 Bandwidth PerCall Intra Limit: 1920
Cisco VCS Command Reference (X6)Page 39 of 95
Page 40
xConfiguration command reference
Zones LocalZone SubZones SubZone [1..1000] Bandwidth PerCall Intra Mode:
<Limited/Unlimited/NoBandwidth>
Determines whether there is a limit on the bandwidth for any one call between two endpoints within this
subzone.
NoBandwidth: no bandwidth available. No calls can be made within this subzone.
Default: Unlimited
Example: xConfiguration Zones LocalZone SubZones SubZone 1 Bandwidth PerCall Intra
Mode: Limited
Zones LocalZone SubZones SubZone [1..1000] Bandwidth Total Limit: <1..100000000>
Sets the total bandwidth limit (in kbps) of this subzone (applies only if the mode is set to Limited).
Default: 500000
Example: xConfiguration Zones LocalZone SubZones SubZone 1 Bandwidth Total Limit:
500000
Zones LocalZone SubZones SubZone [1..1000] Bandwidth Total Mode:
<Limited/Unlimited/NoBandwidth>
Determines whether this subzone has a limit on the total bandwidth of calls being used by its endpoints at
any one time.
NoBandwidth: no bandwidth available. No calls can be made to, from, or within this subzone.
Default: Unlimited
Example: xConfiguration Zones LocalZone SubZones SubZone 1 Bandwidth Total Mode:
Limited
Zones LocalZone SubZones SubZone [1..1000] Name: <S: 0, 50>
Assigns a name to this subzone.
Example: xConfiguration Zones LocalZone SubZones SubZone 1 Name: "BranchOffice"
Zones LocalZone SubZones SubZone [1..1000] Registrations: <Allow/Deny>
Controls whether registrations assigned to this subzone are accepted.
Default: Allow
Example: xConfiguration Zones LocalZone SubZones SubZone 1 Registrations: Allow
Zones LocalZone Traversal H323 Assent Mode: <On/Off>
Determines whether or not H.323 calls using Assent mode for firewall traversal will be allowed. Applies to
traversal-enabled endpoints registered directly with the VCS.
Default: On
Example: xConfiguration Zones LocalZone Traversal H323 Assent Mode: On
Zones LocalZone Traversal H323 H46018 Mode: <On/Off>
Determines whether or not H.323 calls using H460.18 mode for firewall traversal will be allowed. Applies to
traversal-enabled endpoints registered directly with the VCS.
Default: On
Example: xConfiguration Zones LocalZone Traversal H323 H46018 Mode: On
Cisco VCS Command Reference (X6)Page 40 of 95
Page 41
xConfiguration command reference
Zones LocalZone Traversal H323 H46019 Demultiplexing Mode: <On/Off>
Determines whether the VCS will operate in Demultiplexing mode for calls from traversal-enabled endpoints
registered directly with it.
On: allows use of the same two ports for all calls.
Off: each call will use a separate pair of ports for media.
Default: Off
Example: xConfiguration Zones LocalZone Traversal H323 H46019 Demultiplexing Mode:
Off
Zones LocalZone Traversal H323 Preference: <Assent/H46018>
If an endpoint that is registered directly with the VCS supports both Assent and H460.18 protocols, this
setting determines which the VCS uses.
Default: Assent
Example: xConfiguration Zones LocalZone Traversal H323 Preference: Assent
Zones LocalZone Traversal H323 TCPProbe KeepAliveInterval: <1..65534>
Sets the interval (in seconds) with which a traversal-enabled endpoint registered directly with the VCS will
send a TCP probe to the VCS once a call is established, in order to keep the firewall’s NAT bindings open.
Default: 20
Example: xConfiguration Zones LocalZone Traversal H323 TCPProbe KeepAliveInterval: 20
Zones LocalZone Traversal H323 TCPProbe RetryCount: <1..65534>
Sets the number of times traversal-enabled endpoints registered directly with the VCS will attempt to send a
TCP probe to the VCS.
Default: 5
Example: xConfiguration Zones LocalZone Traversal H323 TCPProbe RetryCount: 5
Zones LocalZone Traversal H323 TCPProbe RetryInterval: <1..65534>
Sets the frequency (in seconds) with which traversal-enabled endpoints registered directly with the VCS will
send a TCP probe to the VCS.
Default: 2
Example: xConfiguration Zones LocalZone Traversal H323 TCPProbe RetryInterval: 2
Zones LocalZone Traversal H323 UDPProbe KeepAliveInterval: <1..65534>
Sets the interval (in seconds) with which a traversal-enabled endpoint registered directly with the VCS will
send a UDP probe to the VCS once a call is established, in order to keep the firewall’s NAT bindings open.
Default: 20
Example: xConfiguration Zones LocalZone Traversal H323 UDPProbe KeepAliveInterval: 20
Zones LocalZone Traversal H323 UDPProbe RetryCount: <1..65534>
Sets the number of times traversal-enabled endpoints registered directly with the VCS will attempt to send a
UDP probe to the VCS.
Default: 5
Example: xConfiguration Zones LocalZone Traversal H323 UDPProbe RetryCount: 5
Cisco VCS Command Reference (X6)Page 41 of 95
Page 42
xConfiguration command reference
Zones LocalZone Traversal H323 UDPProbe RetryInterval: <1..65534>
Sets the frequency (in seconds) with which traversal-enabled endpoints registered directly with the VCS will
send a UDP probe to the VCS.
Default: 2
Example: xConfiguration Zones LocalZone Traversal H323 UDPProbe RetryInterval: 2
Zones LocalZone TraversalSubZone Bandwidth PerCall Limit: <1..100000000>
Specifies the bandwidth limit (in kbps) applied to any one traversal call being handled by the VCS (applies
only if the mode is set to Limited).
Default: 1920
Example: xConfiguration Zones LocalZone TraversalSubZone Bandwidth PerCall Limit:
1920
Zones LocalZone TraversalSubZone Bandwidth PerCall Mode: <Limited/Unlimited/NoBandwidth>
Determines whether there is a limit on the bandwidth of any one traversal call being handled by the VCS.
NoBandwidth: no bandwidth available. No traversal calls can be made.
Default: Unlimited
Example: xConfiguration Zones LocalZone TraversalSubZone Bandwidth PerCall Mode:
Limited
Zones LocalZone TraversalSubZone Bandwidth Total Limit: <1..100000000>
Specifies the total bandwidth (in kbps) allowed for all traversal calls being handled by the VCS (applies only
if the mode is set to Limited).
Default: 500000
Example: xConfiguration Zones LocalZone TraversalSubZone Bandwidth Total Limit:
500000
Zones LocalZone TraversalSubZone Bandwidth Total Mode: <Limited/Unlimited/NoBandwidth>
Determines whether or not there is a limit to the total bandwidth of all traversal calls being handled by the
VCS.
NoBandwidth: no bandwidth available. No traversal calls can be made.
Default: Unlimited
Example: xConfiguration Zones LocalZone TraversalSubZone Bandwidth Total Mode:
Limited
Zones Policy Mode: <SearchRules/Directory>
The mode used when attempting to locate a destination.
SearchRules: use the configured search rules to determine which zones are queried and in what order.
Directory: use the facilities of a directory service to direct the request to the correct zones.
Default: SearchRules
Example: xConfiguration Zones Policy Mode: SearchRules
Zones Policy SearchRules Rule [1..2000] Authentication: <Yes/No>
Specifies whether this search rule applies only to authenticated search requests.
Default: No
Example: xConfiguration Zones Policy SearchRules Rule 1 Authentication: No
Cisco VCS Command Reference (X6)Page 42 of 95
Page 43
xConfiguration command reference
Zones Policy SearchRules Rule [1..2000] Description: <S: 0,64>
A free-form description of the search rule.
Example: xConfiguration Zones Policy SearchRules Rule 1 Description: "Send query to
the DNS zone"
Zones Policy SearchRules Rule [1..2000] Mode: <AliasPatternMatch/AnyAlias/AnyIPAddress>
Determines whether a query is sent to the target zone.
AliasPatternMatch: queries the zone only if the alias matches the corresponding pattern type and string.
AnyAlias: queries the zone for any alias (but not IP address).
AnyIPAddress: queries the zone for any given IP address (but not alias).
Default: AnyAlias
Example: xConfiguration Zones Policy SearchRules Rule 1 Mode: AnyAlias
Zones Policy SearchRules Rule [1..2000] Name: <S: 0,50>
Descriptive name for the search rule.
Example: xConfiguration Zones Policy SearchRules Rule 1 Name: "DNS lookup"
Zones Policy SearchRules Rule [1..2000] Pattern Behavior: <Strip/Leave/Replace>
Determines whether the matched part of the alias is modified before being sent to the target zone. (Applies to
Alias Pattern Match mode only.)
Leave: the alias is not modified.
Strip: the matching prefix or suffix is removed from the alias.
Replace: the matching part of the alias is substituted with the text in the replace string.
Default: Strip
Example: xConfiguration Zones Policy SearchRules Rule 1 Pattern Behavior: Strip
Zones Policy SearchRules Rule [1..2000] Pattern Replace: <S: 0,60>
The string to substitute for the part of the alias that matches the pattern. (Applies to Replace pattern behavior
only.)
Example: xConfiguration Zones Policy SearchRules Rule 1 Pattern Replace:
"@example.net"
Zones Policy SearchRules Rule [1..2000] Pattern String: <S: 0,60>
The pattern against which the alias is compared. (Applies to Alias Pattern Match mode only.)
Example: xConfiguration Zones Policy SearchRules Rule 1 Pattern String:
"@example.com"
Zones Policy SearchRules Rule [1..2000] Pattern Type: <Exact/Prefix/Suffix/Regex>
How the pattern string must match the alias for the rule to be applied. (Applies to Alias Pattern Match mode
only.)
Exact: the entire string must exactly match the alias character for character.
Prefix: the string must appear at the beginning of the alias.
Suffix: the string must appear at the end of the alias.
Regex: the string is treated as a regular expression.
Default: Prefix
Example: xConfiguration Zones Policy SearchRules Rule 1 Pattern Type: Suffix
Cisco VCS Command Reference (X6)Page 43 of 95
Page 44
xConfiguration command reference
Zones Policy SearchRules Rule [1..2000] Priority: <1..65534>
The order in the search process that this rule is applied, when compared to the priority of the other search
rules. All Priority 1 search rules are applied first, followed by all Priority 2 search rules, and so on.
Default: 100
Example: xConfiguration Zones Policy SearchRules Rule 1 Priority: 100
Zones Policy SearchRules Rule [1..2000] Progress: <Continue/Stop>
Specifies the ongoing search behavior if the alias matches this search rule. If 'stop' is selected, any rules with
the same priority level as this rule are still applied.
Continue: continue applying the remaining search rules (in priority order) until the endpoint identified by the
alias is found.
Stop: do not apply any more search rules, even if the endpoint identified by the alias is not found in the target
zone.
Default: Continue
Example: xConfiguration Zones Policy SearchRules Rule 1 Progress: Continue
Zones Policy SearchRules Rule [1..2000] Source: <Any/AllZones/LocalZone>
The sources of the requests for which this rule applies.
Any: locally registered devices, neighbor or traversal zones, and any non-registered devices.
AllZones: locally registered devices plus neighbor or traversal zones.
LocalZone: locally registered devices only.
Default: Any
Example: xConfiguration Zones Policy SearchRules Rule 1 Source: Any
Zones Policy SearchRules Rule [1..2000] State: <Enabled/Disabled>
Indicates if the search rule is enabled or disabled. Disabled search rules are ignored.
Default: Enabled
Example: xConfiguration Zones Policy SearchRules Rule 1 State: Enabled
Zones Policy SearchRules Rule [1..2000] Target Name: <S: 0,50>
The zone or policy service to query if the alias matches the search rule.
Zones Policy SearchRules Rule [1..2000] Target Type: <Zone/PolicyService>
The type of target this search rule applies to.
Example: xConfiguration Zones Policy SearchRules Rule [1..2000] Target Type: Zone
Zones Zone [1..1000] DNS IncludeAddressRecord: <On/Off>
Determines whether, if no NAPTR (SIP) or SRV (SIP and H.323) records have been found for the dialed alias
via this zone, the VCS will then query for A and AAAA DNS Records.
Default: Off
Example: xConfiguration Zones Zone 1 DNS IncludeAddressRecord: Off
Cisco VCS Command Reference (X6)Page 44 of 95
Page 45
xConfiguration command reference
Zones Zone [1..1000] DNS Interworking SIP Audio DefaultCodec: <G711u/G711a/G722_48/G722_56/
G722_64/G722_1_16/G722_1_24/G722_1_32/G722_1_48/G723_1/G728/G729/AALCD_48/AALCD_56/
AALCD_64/AMR>
Specifies which audio codec to use when empty INVITEs are not allowed.
Default: G711u
Example: xConfiguration Zones Zone 1 DNS Interworking SIP Audio DefaultCodec: G711u
Zones Zone [1..1000] DNS Interworking SIP EmptyInviteAllowed: <On/Off>
Determines whether the VCS will generate a SIP INVITE message with no SDP to send to this zone. INVITEs
with no SDP mean that the destination device is asked to initiate the codec selection, and are used when the
call has been interworked locally from H.323.
On: SIP INVITEs with no SDP will be generated and sent to this neighbor.
Off: SIP INVITEs will be generated and a pre-configured SDP will be inserted before the INVITEs are sent to
this neighbor.
Default: On
Example: xConfiguration Zones Zone 1 DNS Interworking SIP EmptyInviteAllowed: On
Zones Zone [1..1000] DNS Interworking SIP Video DefaultBitrate: <64..65535>
Specifies which video bitrate to use when empty INVITEs are not allowed.
Default: 384
Example: xConfiguration Zones Zone 1 DNS Interworking SIP Video DefaultBitrate: 384
Zones Zone [1..1000] DNS Interworking SIP Video DefaultCodec:
<None/H261/H263/H263p/H263pp/H264>
Specifies which video codec to use when empty INVITEs are not allowed.
Default: H263
Example: xConfiguration Zones Zone 1 DNS Interworking SIP Video DefaultCodec: H263
Zones Zone [1..1000] DNS Interworking SIP Video DefaultResolution:
<None/QCIF/CIF/4CIF/SIF/4SIF/VGA/SVGA/XGA>
Specifies which video resolution to use when empty INVITEs are not allowed.
Default: CIF
Example: xConfiguration Zones Zone 1 DNS Interworking SIP Video DefaultResolution:
CIF
Zones Zone [1..1000] DNS SIP Duo Video Filter Mode: <On/Off>
Determines whether INVITE requests sent to this zone filter out Duo Video. This option may be required to
enable interoperability with SIP devices that do not support Duo Video.
On: the second video line in any outgoing INVITE request is removed.
Off: INVITE requests are not modified.
Default: Off
Example: xConfiguration Zones Zone 1 DNS SIP Duo Video Filter Mode: Off
Cisco VCS Command Reference (X6)Page 45 of 95
Page 46
xConfiguration command reference
Zones Zone [1..1000] DNS SIP Poison Mode: <On/Off>
Determines whether SIP requests sent out to this zone will be "poisoned" such that if they are received by the
local VCS again they will be rejected.
On: SIP requests sent out via this zone that are received again by this VCS will be rejected.
Off: SIP requests sent out via this zone that are received by this VCS again will be processed as normal.
Default: Off
Example: xConfiguration Zones Zone 1 DNS SIP Poison Mode: Off
Zones Zone [1..1000] DNS SIP Record Route Address Type: <IP/Hostname>
Controls whether the VCS uses its IP address or host name in the record-route or path headers of outgoing
SIP requests to this zone.
Note: setting this value to Hostname also requires a valid DNS local host name to be configured on the VCS.
Default: IP
Example: xConfiguration Zones Zone [1..1000] DNS SIP Record Route Address Type: IP
Zones Zone [1..1000] DNS SIP SDP Attribute Line Limit Length: <80..65535>
If SIP SDP attribute line limit mode is set to On, sets the maximum line length of a=fmtp SDP lines.
Default: 130
Example: xConfiguration Zones Zone 1 DNS SIP SDP Attribute Line Limit Length: 130
Zones Zone [1..1000] DNS SIP SDP Attribute Line Limit Mode: <On/Off>
Determines whether requests containing SDP sent out to this zone will have the length of a=fmtp lines
restricted.
On: the length will be truncated to the maximum length specified by the SIP SDP attribute line limit length
setting.
Off: the length will not be truncated.
Example: xConfiguration Zones Zone 1 DNS SIP SDP Attribute Line Limit Mode: Off
Zones Zone [1..1000] DNS SIP SearchAutoResponse: <On/Off>
Determines what happens when the VCS receives a SIP search that originated as an H.323 search,
destined for this zone.
Off: a SIP OPTION message will be sent to the zone.
On: searches will be responded to automatically, without being forwarded to the zone.
Default: Off
Example: xConfiguration Zones Zone 1 DNS SIP SearchAutoResponse: Off
Zones Zone [1..1000] DNS SIP TLS Verify Mode: <On/Off>
Controls X.509 certificate checking between this VCS and the destination system server returned by the DNS
lookup. When enabled, the domain name submitted to the DNS lookup must be contained within the server's
X.509 certificate (in either the Subject Common Name or the Subject Alternative Name attributes).
Default: Off
Example: xConfiguration Zones Zone 1 DNS SIP TLS Verify Mode: On
Cisco VCS Command Reference (X6)Page 46 of 95
Page 47
xConfiguration command reference
Zones Zone [1..1000] DNS SIP UDP BFCP Filter Mode: <On/Off>
Determines whether INVITE requests sent to this zone filter out UDP/BFCP. This option may be required to
enable interoperability with SIP devices that do not support the UDP/BFCP protocol.
On: any media line referring to the UDP/BFCP protocol is replaced with TCP/BFCP and disabled.
Off: INVITE requests are not modified.
Default: Off
Example: xConfiguration Zones Zone 1 DNS SIP UDP BFCP Filter Mode: Off
Zones Zone [1..1000] DNS ZoneProfile: <Default/Custom/MicrosoftOCS2007/
CiscoUnifiedCommunicationsManager/NortelCS1000/AdvancedMediaGateway/NonRegisteringDevice>
Determines the way in which the advanced settings for this zone are configured.
Default: uses the factory defaults for these settings.
Custom: allows you to configure each setting individually.
Preconfigured profiles: alternatively, choose one of the preconfigured profiles to automatically use the
appropriate settings required for connections to that type of system.
Default: Default
Example: xConfiguration Zones Zone 1 DNS ZoneProfile: Default
Zones Zone [1..1000] ENUM DNSSuffix: <S: 0, 128>
Specifies the DNS zone to be appended to the transformed E.164 number to create an ENUM host name
which this zone is then queried for.
Example: xConfiguration Zones Zone 2 ENUM DNSSuffix: "e164.arpa"
Zones Zone [1..1000] H323 Mode: <On/Off>
Determines whether H.323 calls will be allowed to and from this zone.
Default: On
Example: xConfiguration Zones Zone 2 H323 Mode: On
Zones Zone [1..1000] HopCount: <1..255>
Specifies the hop count to be used when sending an alias search request to this zone. Note: if the search
request was received from another zone and already has a hop count assigned, the lower of the two values
will be used.
Default: 15
Example: xConfiguration Zones Zone 2 HopCount: 15
Zones Zone [1..1000] Name: <S: 1, 50>
Assigns a name to this zone.
Example: xConfiguration Zones Zone 3 Name: "UK Sales Office"
Zones Zone [1..1000] Neighbor AdvancedMediaGateway Mode: <On/Off>
Controls whether calls to or from this zone will use an Advanced Media Gateway.
Default: Off
Example: xConfiguration Zones Zone 3 Neighbor AdvancedMediaGateway Mode: On
Cisco VCS Command Reference (X6)Page 47 of 95
Page 48
xConfiguration command reference
Zones Zone [1..1000] Neighbor Authentication Mode:
<DoNotCheckCredentials/TreatAsAuthenticated/CheckCredentials>
Controls how the VCS authenticates incoming messages from this zone and whether they are subsequently
treated as authenticated, unauthenticated, or are rejected. The behavior varies for H.323 messages, SIP
messages that originate from a local domain and SIP messages that originate from non-local domains. See
the Administrator Guide for full details about each of the Authentication Policy options.
Default: DoNotCheckCredentials
Example: xConfiguration Zones Zone 1 Neighbor Authentication Mode:
DoNotCheckCredentials
Zones Zone [1..1000] Neighbor H323 Port: <1024..65534>
Specifies the port on the neighbor to be used for H.323 calls to and from this VCS.
Default: 1719
Example: xConfiguration Zones Zone 3 Neighbor H323 Port: 1719
Zones Zone [1..1000] Neighbor H323 SearchAutoResponse: <On/Off>
Determines what happens when the VCS receives a H323 search, destined for this zone.
Off: an LRQ message will be sent to the zone.
On: searches will be responded to automatically, without being forwarded to the zone.
Default: Off
Example: xConfiguration Zones Zone 1 Neighbor H323 SearchAutoResponse: Off
Zones Zone [1..1000] Neighbor Interworking SIP Audio DefaultCodec: <G711u/G711a/G722_48/
G722_56/G722_64/G722_1_16/G722_1_24/G722_1_32/G722_1_48/G723_1/G728/G729/AALCD_48/
AALCD_56/AALCD_64/AMR>
Specifies which audio codec to use when empty INVITEs are not allowed.
Default: G711u
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP Audio DefaultCodec:
G711u
Zones Zone [1..1000] Neighbor Interworking SIP EmptyInviteAllowed: <On/Off>
Determines whether the VCS will generate a SIP INVITE message with no SDP to send to this zone. INVITEs
with no SDP mean that the destination device is asked to initiate the codec selection, and are used when the
call has been interworked locally from H.323.
On: SIP INVITEs with no SDP will be generated and sent to this neighbor.
Off: SIP INVITEs will be generated and a pre-configured SDP will be inserted before the INVITEs are sent to
this neighbor.
Default: On
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP EmptyInviteAllowed: On
Zones Zone [1..1000] Neighbor Interworking SIP Search Strategy: <Options/Info>
Determines how the VCS will search for SIP endpoints when interworking an H.323 call.
Options: the VCS will send an OPTIONS request.
Info: the VCS will send an INFO request.
Default: Options
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP Search Strategy:
Options
Cisco VCS Command Reference (X6)Page 48 of 95
Page 49
xConfiguration command reference
Zones Zone [1..1000] Neighbor Interworking SIP Video DefaultBitrate: <64..65535>
Specifies which video bitrate to use when empty INVITEs are not allowed.
Default: 384
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP Video DefaultBitrate:
384
Zones Zone [1..1000] Neighbor Interworking SIP Video DefaultCodec:
<None/H261/H263/H263p/H263pp/H264>
Specifies which video codec to use when empty INVITEs are not allowed.
Default: H263
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP Video DefaultCodec:
H263
Zones Zone [1..1000] Neighbor Interworking SIP Video DefaultResolution:
<None/QCIF/CIF/4CIF/SIF/4SIF/VGA/SVGA/XGA>
Specifies which video resolution to use when empty INVITEs are not allowed.
Default: CIF
Example: xConfiguration Zones Zone 3 Neighbor Interworking SIP Video
DefaultResolution: CIF
Zones Zone [1..1000] Neighbor Monitor: <Yes/No>
Specifies whether the zone monitors the aliveness of its neighbor peers. H323 LRQs and/or SIP OPTIONS
will be periodically sent to the peers. If any peer fails to respond, that peer will be marked as inactive. If no
peer manages to respond the zone will be marked as inactive.
Default: Yes
Example: xConfiguration Zones Zone 1 Neighbor Monitor: Yes
Zones Zone [1..1000] Neighbor Peer [1..6] Address: <S:0,128>
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the neighbor. If the neighbor zone is a
VCS cluster, this will be one of the peers in that cluster.
Example: xConfiguration Zones Zone 3 Neighbor Peer 1 Address: "192.44.0.18"
Zones Zone [1..1000] Neighbor Registrations: <Allow/Deny>
Controls whether proxied SIP registrations routed through this zone are accepted.
Default: Allow
Example: xConfiguration Zones Zone 3 Neighbor Registrations: Allow
Zones Zone [1..1000] Neighbor SIP Authentication Trust Mode: <On/Off>
Controls whether authenticated SIP messages (ones containing a P-Asserted-Identity header) from this zone
are trusted.
On: messages are trusted without further challenge.
Off: messages are challenged for authentication.
Default: Off
Example: xConfiguration Zones Zone 3 Neighbor SIP Authentication Trust Mode: On
Cisco VCS Command Reference (X6)Page 49 of 95
Page 50
xConfiguration command reference
Zones Zone [1..1000] Neighbor SIP Duo Video Filter Mode: <On/Off>
Determines whether INVITE requests sent to this zone filter out Duo Video. This option may be required to
enable interoperability with SIP devices that do not support Duo Video.
On: the second video line in any outgoing INVITE request is removed.
Off: INVITE requests are not modified.
Default: Off
Example: xConfiguration Zones Zone 1 Neighbor SIP Duo Video Filter Mode: Off
Zones Zone [1..1000] Neighbor SIP Encryption Mode: <Auto/Microsoft/Off>
Determines how the VCS handles encrypted SIP calls on this zone.
Auto: SIP calls are encrypted if a secure SIP transport (TLS) is used.
Microsoft: SIP calls are encrypted using MS-SRTP.
Off: SIP calls are never encrypted.
Default: Auto
Example: xConfiguration Zones Zone 3 Neighbor SIP Encryption Mode: Auto
Zones Zone [1..1000] Neighbor SIP MIME Strip Mode: <On/Off>
Controls whether multipart MIME stripping is performed on requests from this zone. This must be set to On for
connections to a Microsoft Office Communications Server 2007.
Default: Off
Example: xConfiguration Zones Zone 3 Neighbor SIP MIME Strip Mode: Off
Zones Zone [1..1000] Neighbor SIP MediaRouting Mode: <Auto/Signaled/Latching>
Specifies how the VCS handles the media for calls to and from this neighbor, and where it will forward the
media destined for this neighbor.
Signaled: the media is always taken for calls to and from this neighbor. It will be forwarded as signaled in the
SDP received from this neighbor.
Latching: the media is always taken for calls to and from this neighbor. It will be forwarded to the IP address
and port from which media from this neighbor is received.
Auto: media is only taken if the call is a traversal call. If this neighbor is behind a NAT the VCS will forward
the media to the IP address and port from which media from this zone is received (latching). Otherwise it will
forward the media to the IP address and port signaled in the SDP (signaled).
Default: Auto.
Example: xConfiguration Zones Zone 3 Neighbor SIP MediaRouting Mode: Auto
Zones Zone [1..1000] Neighbor SIP Poison Mode: <On/Off>
Determines whether SIP requests sent out to this zone will be "poisoned" such that if they are received by the
local VCS again they will be rejected.
On: SIP requests sent out via this zone that are received again by this VCS will be rejected.
Off: SIP requests sent out via this zone that are received by this VCS again will be processed as normal.
Default: Off
Example: xConfiguration Zones Zone 3 Neighbor SIP Poison Mode: Off
Cisco VCS Command Reference (X6)Page 50 of 95
Page 51
xConfiguration command reference
Zones Zone [1..1000] Neighbor SIP Port: <1024..65534>
Specifies the port on the neighbor to be used for SIP calls to and from this VCS.
Default: 5061
Example: xConfiguration Zones Zone 3 Neighbor SIP Port: 5061
Zones Zone [1..1000] Neighbor SIP ProxyRequire Strip List: <S: 0,255>
A comma separated list of option tags to search for and remove from Proxy-Require headers in SIP requests
received from this zone. By default, no option tags are specified.
Example: xConfiguration Zones Zone 3 Neighbor SIP ProxyRequire Strip List:
"com.example.something,com.example.somethingelse"
Zones Zone [1..1000] Neighbor SIP Record Route Address Type: <IP/Hostname>
Controls whether the VCS uses its IP address or host name in the record-route or path headers of outgoing
SIP requests to this zone.
Note: setting this value to Hostname also requires a valid DNS local host name to be configured on the VCS.
Default: IP
Example: xConfiguration Zones Zone [1..1000] Neighbor SIP Record Route Address Type:
IP
Zones Zone [1..1000] Neighbor SIP SDP Attribute Line Limit Length: <80..65535>
If SIP SDP attribute line limit mode is set to On, sets the maximum line length of a=fmtp SDP lines.
Default: 130
Example: xConfiguration Zones Zone 3 Neighbor SIP SDP Attribute Line Limit Length:
130
Zones Zone [1..1000] Neighbor SIP SDP Attribute Line Limit Mode: <On/Off>
Determines whether requests containing SDP sent out to this zone will have the length of a=fmtp lines
restricted.
On: the length will be truncated to the maximum length specified by the SIP SDP attribute line limit length
setting.
Off: the length will not be truncated.
Default: Off
Example: xConfiguration Zones Zone 3 Neighbor SIP SDP Attribute Line Limit Mode: Off
Zones Zone [1..1000] Neighbor SIP SearchAutoResponse: <On/Off>
Determines what happens when the VCS receives a SIP search that originated as an H.323 search,
destined for this zone.
Off: a SIP OPTION message will be sent to the zone.
On: searches will be responded to automatically, without being forwarded to the zone.
Default: Off
Example: xConfiguration Zones Zone 3 Neighbor SIP SearchAutoResponse: Off
Cisco VCS Command Reference (X6)Page 51 of 95
Page 52
xConfiguration command reference
Zones Zone [1..1000] Neighbor SIP TLS Verify Mode: <On/Off>
Controls X.509 certificate checking and mutual authentication for inbound and outbound connections
between this VCS and the neighbor system. When enabled, the neighbor system's FQDN or IP address, as
specified in the Peer address field, must be contained within the neighbor's X.509 certificate (in either the
Subject Common Name or the Subject Alternative Name attributes).
Default: Off
Example: xConfiguration Zones Zone 3 Neighbor SIP TLS Verify Mode: On
Zones Zone [1..1000] Neighbor SIP Transport: <UDP/TCP/TLS>
Determines which transport type will be used for SIP calls to and from this neighbor.
Default: TLS
Example: xConfiguration Zones Zone 3 Neighbor SIP Transport: TLS
Zones Zone [1..1000] Neighbor SIP UDP BFCP Filter Mode: <On/Off>
Determines whether INVITE requests sent to this zone filter out UDP/BFCP. This option may be required to
enable interoperability with SIP devices that do not support the UDP/BFCP protocol.
On: any media line referring to the UDP/BFCP protocol is replaced with TCP/BFCP and disabled.
Off: INVITE requests are not modified.
Default: Off
Example: xConfiguration Zones Zone 1 Neighbor SIP UDP BFCP Filter Mode: Off
Zones Zone [1..1000] Neighbor SIP UPDATE Strip Mode: <On/Off>
Determines whether or not the VCS will strip the UPDATE method from the Allow header of all requests and
responses going to and from this zone.
Default: Off
Example: xConfiguration Zones Zone 3 Neighbor SIP UPDATE Strip Mode: Off
Zones Zone [1..1000] Neighbor ZoneProfile: <Default/Custom/MicrosoftOCS2007/
CiscoUnifiedCommunicationsManager/NortelCS1000/AdvancedMediaGateway/NonRegisteringDevice>
Determines the way in which the advanced settings for this zone are configured.
Default: uses the factory defaults for thesesettings.
Custom: allows you to configure each setting individually.
Preconfigured profiles: alternatively, choose one of the preconfigured profiles to automatically use the
appropriate settings required for connections to that type of system.
Default: Default
Example: Zones Zone 3 Neighbor ZoneProfile: Default
Zones Zone [1..1000] SIP Mode: <On/Off>
Determines whether SIP calls will be allowed to and from this zone.
Default: On
Example: xConfiguration Zones Zone 3 SIP Mode: On
Cisco VCS Command Reference (X6)Page 52 of 95
Page 53
xConfiguration command reference
Zones Zone [1..1000] TraversalClient Authentication Mode:
<DoNotCheckCredentials/TreatAsAuthenticated/CheckCredentials>
Controls how the VCS authenticates incoming messages from this zone and whether they are subsequently
treated as authenticated, unauthenticated, or are rejected. The behavior varies for H.323 messages, SIP
messages that originate from a local domain and SIP messages that originate from non-local domains. See
the Administrator Guide for full details about each of the Authentication Policy options.
Default: DoNotCheckCredentials
Example: xConfiguration Zones Zone [1..1000] TraversalClient Authentication Mode:
DoNotCheckCredentials
Zones Zone [1..1000] TraversalClient Authentication Password: <S: 0,215>
The password used by the VCS when connecting to the traversal server. The maximum plaintext length is
128 characters, which is then encrypted.
Example: xConfiguration Zones Zone 1 TraversalClient Authentication Password:
"password123"
Zones Zone [1..1000] TraversalClient Authentication UserName: <S: 0,128>
The user name used by the VCS when connecting to the traversal server.
Example: xConfiguration Zones Zone 1 TraversalClient Authentication UserName:
"clientname"
Zones Zone [1..1000] TraversalClient H323 Port: <1024..65534>
Specifies the port on the traversal server to be used for H.323 firewall traversal calls from this VCS. If the
traversal server is a VCS Expressway, this must be the port number that has been configured on the VCS
Expressway's traversal server zone associated with this VCS.
Example: xConfiguration Zones Zone 4 TraversalClient H323 Port: 2777
Zones Zone [1..1000] TraversalClient H323 Protocol: <Assent/H46018>
Determines which of the two firewall traversal protocols will be used for calls to and from the traversal server.
Note: the same protocol must be set on the server for calls to and from this traversal client.
Default: Assent
Example: xConfiguration Zones Zone 4 TraversalClient H323 Protocol: Assent
Zones Zone [1..1000] TraversalClient Peer [1..6] Address: <S:0,128>
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the traversal server. If the traversal
server is a VCS Expressway cluster, this will be one of the peers in that cluster.
Example: xConfiguration Zones Zone 4 TraversalClient Peer 1 Address: "10.192.168.1"
Zones Zone [1..1000] TraversalClient Registrations: <Allow/Deny>
Controls whether proxied SIP registrations routed through this zone are accepted.
Default: Allow
Example: xConfiguration Zones Zone 4 TraversalClient Registrations: Allow
Zones Zone [1..1000] TraversalClient RetryInterval: <1..65534>
Specifies the interval (in seconds) with which a failed attempt to establish a connection to the traversal server
should be retried.
Default: 120
Example: xConfiguration Zones Zone 4 TraversalClient RetryInterval: 120
Cisco VCS Command Reference (X6)Page 53 of 95
Page 54
xConfiguration command reference
Zones Zone [1..1000] TraversalClient SIP Poison Mode: <On/Off>
Determines whether SIP requests sent out to this zone will be "poisoned" such that if they are received by the
local VCS again they will be rejected.
On: SIP requests sent out via this zone that are received again by this VCS will be rejected.
Off: SIP requests sent out via this zone that are received by this VCS again will be processed as normal.
Default: Off
Example: xConfiguration Zones Zone 4 TraversalClient SIP Poison Mode: Off
Zones Zone [1..1000] TraversalClient SIP Port: <1024..65534>
Specifies the port on the traversal server to be used for SIP calls from this VCS. If your traversal server is a
VCS Expressway, this must be the port number that has been configured in the traversal server zone for this
VCS.
Example: xConfiguration Zones Zone 4 TraversalClient SIP Port: 5061
Zones Zone [1..1000] TraversalClient SIP Protocol: <Assent/TURN/ICE>
Determines which firewall traversal protocol will be used for SIP calls to and from the traversal server. Note:
the same protocol must be set on the server for calls to and from this traversal client.
Default: Assent
Example: xConfiguration Zones Zone 1 TraversalClient SIP Protocol: Assent
Zones Zone [1..1000] TraversalClient SIP TLS Verify Mode: <On/Off>
Controls X.509 certificate checking and mutual authentication between this VCS and the traversal server.
When enabled, the server's FQDN or IP address, as specified in the Peer address field, must be contained
within the server's X.509 certificate (in either the Subject Common Name or the Subject Alternative Name
attributes).
Default: Off
Example: xConfiguration Zones Zone 4 TraversalClient SIP TLS Verify Mode: On
Zones Zone [1..1000] TraversalClient SIP Transport: <TCP/TLS>
Determines which transport type will be used for SIP calls to and from the traversal server.
Default: TLS
Example: xConfiguration Zones Zone 4 TraversalClient SIP Transport: TLS
Zones Zone [1..1000] TraversalServer Authentication Mode:
<DoNotCheckCredentials/TreatAsAuthenticated/CheckCredentials>
Controls how the VCS authenticates incoming messages from this zone and whether they are subsequently
treated as authenticated, unauthenticated, or are rejected. The behavior varies for H.323 messages, SIP
messages that originate from a local domain and SIP messages that originate from non-local domains. See
the online help for full details about each of the Authentication Policy options.
Default: DoNotCheckCredentials
Example: xConfiguration Zones Zone 1 TraversalServer Authentication Mode:
DoNotCheckCredentials
Cisco VCS Command Reference (X6)Page 54 of 95
Page 55
xConfiguration command reference
Zones Zone [1..1000] TraversalServer Authentication UserName: <S: 0,128>
The name used by the traversal client when authenticating with the traversal server. If the traversal client is a
VCS, this must be the VCS’s authentication user name. If the traversal client is a gatekeeper, this must be the
gatekeeper’s System Name. For other types of traversal clients, refer to the VCS Admin Guide for further
information.
Example: xConfiguration Zones Zone 5 TraversalServer Authentication UserName:
"User123"
Zones Zone [1..1000] TraversalServer H323 H46019 Demultiplexing Mode: <On/Off>
Determines whether the VCS will operate in demultiplexing mode for calls from the traversal client.
On: allows use of the same two ports for all calls.
Off: each call will use a separate pair of ports for media.
Default: Off
Example: xConfiguration Zones Zone 5 TraversalServer H323 H46019 Demultiplexing Mode:
Off
Zones Zone [1..1000] TraversalServer H323 Port: <1024..65534>
Specifies the port on the VCS being used for H.323 firewall traversal from this traversal client.
Default: 6001, incrementing by 1 for each new zone.
Example: xConfiguration Zones Zone 5 TraversalServer H323 Port: 2777
Zones Zone [1..1000] TraversalServer H323 Protocol: <Assent/H46018>
Determines which of the two firewall traversal protocols will be used for calls to and from the traversal client.
Note: the same protocol must be set on the client for calls to and from this traversal server.
Default: Assent
Example: xConfiguration Zones Zone 5 TraversalServer H323 Protocol: Assent
Zones Zone [1..1000] TraversalServer Registrations: <Allow/Deny>
Controls whether proxied SIP registrations routed through this zone are accepted.
Default: Allow
Example: xConfiguration Zones Zone 5 TraversalServer Registrations: Allow
Zones Zone [1..1000] TraversalServer SIP Poison Mode: <On/Off>
Determines whether SIP requests sent out to this zone will be "poisoned" such that if they are received by the
local VCS again they will be rejected.
On: SIP requests sent out via this zone that are received again by this VCS will be rejected.
Off: SIP requests sent out via this zone that are received by this VCS again will be processed as normal.
Default: Off
Example: xConfiguration Zones Zone 5 TraversalServer SIP Poison Mode: Off
Zones Zone [1..1000] TraversalServer SIP Port: <1024..65534>
Specifies the port on the VCS being used for SIP firewall traversal from this traversal client.
Default: 7001, incrementing by 1 for each new zone.
Example: xConfiguration Zones Zone 5 TraversalServer SIP Port: 5061
Cisco VCS Command Reference (X6)Page 55 of 95
Page 56
xConfiguration command reference
Zones Zone [1..1000] TraversalServer SIP Protocol: <Assent/TURN/ICE>
Determines which firewall traversal protocol will be used for SIP calls to and from the traversal client. Note:
the same protocol must be set on the client for calls to and from this traversal server.
Default: Assent
Example: xConfiguration Zones Zone 1 TraversalServer SIP Protocol: Assent
Zones Zone [1..1000] TraversalServer SIP TLS Verify Mode: <On/Off>
Controls X.509 certificate checking and mutual authentication between this VCS and the traversal client. If
enabled, a TLS verify subject name must be specified.
Default: Off
Example: xConfiguration Zones Zone 5 TraversalServer SIP TLS Verify Mode: On
Zones Zone [1..1000] TraversalServer SIP TLS Verify Subject Name: <S: 0,128>
The certificate holder's name to look for in the traversal client's X.509 certificate (must be in either the Subject
Common Name or the Subject Alternative Name attributes).
Example: xConfiguration Zones Zone 5 TraversalServer SIP TLS Verify Subject Name:
"myclientname"
Zones Zone [1..1000] TraversalServer SIP Transport: <TCP/TLS>
Determines which of the two transport types will be used for SIP calls between the traversal client and VCS.
Default: TLS
Example: xConfiguration Zones Zone 5 TraversalServer SIP Transport: TLS
Zones Zone [1..1000] TraversalServer TCPProbe KeepAliveInterval: <1..65534>
Sets the interval (in seconds) with which the traversal client will send a TCP probe to the VCS once a call is
established, in order to keep the firewall’s NAT bindings open.
Default: 20
Example: xConfiguration Zones Zone 5 TraversalServer TCPProbe KeepAliveInterval: 20
Zones Zone [1..1000] TraversalServer TCPProbe RetryCount: <1..65534>
Sets the number of times the traversal client will attempt to send a TCP probe to the VCS.
Default: 5
Example: xConfiguration Zones Zone 5 TraversalServer TCPProbe RetryCount: 5
Zones Zone [1..1000] TraversalServer TCPProbe RetryInterval: <1..65534>
Sets the frequency (in seconds ) with which the traversal client will send a TCP probe to the VCS.
Default: 2
Example: xConfiguration Zones Zone 5 TraversalServer TCPProbe RetryInterval: 2
Zones Zone [1..1000] TraversalServer UDPProbe KeepAliveInterval: <1..65534>
Sets the interval (in seconds) with which the traversal client will send a UDP probe to the VCS once a call is
established, in order to keep the firewall’s NAT bindings open.
Default: 20
Example: xConfiguration Zones Zone 5 TraversalServer UDPProbe KeepAliveInterval: 20
Cisco VCS Command Reference (X6)Page 56 of 95
Page 57
xConfiguration command reference
Zones Zone [1..1000] TraversalServer UDPProbe RetryCount: <1..65534>
Sets the number of times the traversal client will attempt to send a UDP probe to the VCS.
Default: 5
Example: xConfiguration Zones Zone 5 TraversalServer UDPProbe RetryCount: 5
Zones Zone [1..1000] TraversalServer UDPProbe RetryInterval: <1..65534>
Sets the frequency (in seconds) with which the traversal client will send a UDP probe to the VCS.
Default: 2
Example: xConfiguration Zones Zone 5 TraversalServer UDPProbe RetryInterval: 2
Zones Zone [1..1000] Type: <Neighbor/TraversalClient/TraversalServer/ENUM/DNS>
Determines the nature of the specified zone, in relation to the local VCS.
Neighbor: the new zone will be a neighbor of the local VCS.
TraversalClient: there is a firewall between the zones, and the local VCS is a traversal client of the new zone.
TraversalServer: there is a firewall between the zones and the local VCS is a traversal server for the new
zone.
ENUM: the new zone contains endpoints discoverable by ENUM lookup.
DNS: the new zone contains endpoints discoverable by DNS lookup.
Example: xConfiguration Zones Zone 3 Type: Neighbor
Cisco VCS Command Reference (X6)Page 57 of 95
Page 58
xCommand command reference
xCommand command reference
The xCommand group of commands are used to add and delete items and issue system commands.
The following section lists all the currently available xCommand commands.
To issue a command, type the command as shown, followed by one or more of the given parameters and
values. The valid values for each parameter are indicated in the angle brackets following each parameter,
using the following notation:
FormatMeaning
<0..63>Indicates an integer value is required. The numbers indicate the minimum and
maximum value.
In this example the value must be in the range 0 to 63.
<S: 7,15>An S indicates a string value, to be enclosed in quotation marks, is required. The
numbers indicate the minimum and maximum number of characters for the string.
In this example the string must be between 7 and 15 characters long.
<Off/Direct/Indirect> Lists the set of valid values for the command. Do not enclose the value in quotation
marks
(r)(r) indicates that this is a required parameter. Note that the (r) is not part of the command
itself.
To obtain information about using each of the xCommand commands from within the CLI, type:
n xCommand or xCommand ? to return a list of all available xCommandcommands.
n xCommand ?? to return all current xCommandcommands, along with a description of each command,
a list of its parameters, and for each parameter its valuespaces and description.
n xCommand <command> ? to return a description of the command, a list of its parameters, and for
each parameter its valuespaces and description.
xCommand commands
All of the available xCommand commands are listed in the table below:
AMGWPolicyRuleAdd
Adds and configures a new Advanced Media Gateway policy rule.
Name(r): <S: 1,50>
Assigns a name to this Advanced Media Gateway policy rule.
Description: <S: 0,64>
A free-form description of the membership rule.
Example: xCommand AMGWPolicyRuleAdd Name: "Deny branch calls" Description: "Deny all
calls to branch office"
Cisco VCS Command Reference (X6)Page 58 of 95
Page 59
xCommand command reference
AMGWPolicyRuleDelete
Deletes an Advanced Media Gateway policy rule.
AMGWPolicyRuleId(r): <1..200>
The index of the Advanced Media Gateway policy rule to be deleted.
Defines the name of an administrator user who can login to the VCS web interface.
Password(r): <S:0,65>
Defines the password of an administrator user who can login to the VCS web interface. The maximum
plaintext length is 16 characters, which will then be encrypted.
Defines the access level of an administrator user who can login to the VCS web interface.
AccountDisabled: no access allowed. ReadOnly: configuration can only be viewed. ReadWrite:
configuration can be viewed and changed. Auditor: allows access to the Event Log, Configuration Log
and the Overview page only.
Default: ReadWrite
Defines the name of an administrator group that determines which access rights members of the group
have after they have been successfully authenticated to use the VCS.
Access(r): <None/ReadOnly/ReadWrite/Auditor>
Defines the access level for members of the specified administrator group. None: no access allowed.
ReadOnly: configuration can only be viewed. ReadWrite: configuration can be viewed and changed.
Auditor: allows access to the Event Log, Configuration Log and the Overview page only.
The address of a domain controller that can be used when the VCS joins the AD domain. Not specifying a
specific AD will result the use of DNS SRV queries to find an AD.
The address of a Kerberos Distribution Center (KDC) to be used when connected to the AD domain. Not
specifying a specific KDC will result in the use of DNS SRV queries to find a KDC.
KerberosKDCPort: <1..65534>
Specifies the port of a KDC that can be used when the VCS joins the AD domain. Default: 88
Specifies an entry to be added to the Allow List. If one of an endpoint's aliases matches one of the
patterns in the Allow List, the registration will be permitted.
PatternType: <Exact/Prefix/Suffix/Regex>
Specifies whether the entry in the Allow List is a prefix, suffix, regular expression, or must be matched
exactly. Exact: the string must match the alias character for character. Prefix: the string must appear at the
beginning of the alias. Suffix: the string must appear at the end of the alias. Regex: the string will be
treated as a regular expression.
Default: Exact.
A diagnostic tool that returns the status and route (as a list of nodes and links) that a call of the specified type
and bandwidth would take between two nodes. Note that this command does not change any existing
system configuration.
Node1(r): <S: 1, 50>
The subzone or zone from which the call originates.
Node2(r): <S: 1, 50>
The subzone or zone at which the call terminates.
Bandwidth(r): <1..100000000>
The requested bandwidth of the call (in kbps).
CallType(r): <Traversal/NonTraversal>
Whether the call type is Traversal or Non-traversal.
A diagnostic tool that allows you to check the result of an alias transform (local or zone) before you configure
it on the system. Note that this command does not change any existing system configuration.
Target(r): <S: 1, 60>
The alias you want to use to test the pattern match or transform.
Pattern(r): <S: 1, 60>
The pattern against which the alias is compared.
Type(r): <Exact/Prefix/Suffix/Regex>
How the pattern string must match the alias for the pattern behavior to be applied.
Restores links between the Default Subzone, Traversal Subzone and the Default Zone.
This command has no parameters.
Example: xCommand DefaultLinksAdd
DefaultValuesSet
Resets system parameters to default values.
Level(r): <1..3>
The level of system parameters to be reset.
Level 1: resets most configuration items to their default value, with the exception of the Level 2 and Level
3 items.
Level 2: resets configuration items related to remote authentication, plus Level 1 items to their default
value.
Level 3: resets all critical configuration items, plus Level 1 and Level 2 items to their default value. See
the Restoring default configuration section for full details.
Example: xCommand DefaultValuesSet Level: 1
DenyListAdd
Adds an entry to the Deny List.
PatternString(r): <S: 1, 60>
Specifies an entry to be added to the Deny List. If one of an endpoint's aliases matches one of the patterns
in the Deny List, the registration will not be permitted.
PatternType: <Exact/Prefix/Suffix/Regex>
Specifies whether the entry in the Deny List is a prefix, suffix, regular expression, or must be matched
exactly. Exact: the string must match the alias character for character. Prefix: the string must appear at the
beginning of the alias. Suffix: the string must appear at the end of the alias. Regex: the string will be
treated as a regular expression.
Default: Exact.
Adds a SIP domain for which this VCS is authoritative.
DomainName(r): <S: 1, 128>
Specifies a domain for which this VCS is authoritative. The VCS will act as a SIP registrar and Presence
Server for this domain, and will accept registration requests for any SIP endpoints attempting to register
with an alias that includes this domain. The domain name can comprise multiple levels. Each level's
name can only contain letters, digits and hyphens, with each level separated by a period (dot). A level
name cannot start or end with a hyphen, and the final level name must start with a letter.
Note: this command is intended for developer use only.
Name(r): <S:1, 64>
Descriptive name for the external application whose status is being referenced.
Example: xCommand ExtAppStatusDelete Name: foo
FeedbackDeregister
Deactivates a particular feedback request.
ID: <1..3>
The index of the feedback request to be deactivated.
Example: xCommand FeedbackDeregister ID: 1
FeedbackRegister
Activates notifications on the event or status changes described by the expressions. Notifications are sent in
XML format to the specified URL. Up to 15 expressions may be registered for each of 3 feedback IDs.
ID: <1..3>
The ID of this particular feedback request.
URL(r): <S: 1, 256>
The URL to which notifications are to be sent.
Expression.1..15: <S: 1, 256>
The events or status change to be notified. Valid Expressions are:
Returns information about the registration associated with the specified alias. The alias must be registered
on the VCS on which the command is issued.
Performs an xCommand DefaultValuesSet Level: 2 on the specified peer, and then forces the relevant
configuration on the peer to be updated to match that of the cluster master.
PeerId: <1..6>
The index of the cluster peer to be updated.
Example: xCommand ForceConfigUpdate PeerId: 1
Cisco VCS Command Reference (X6)Page 64 of 95
Page 65
xCommand command reference
LinkAdd
Adds and configures a new link.
LinkName(r): <S: 1, 50>
Assigns a name to this link.
Node1: <S: 1, 50>
Specifies the first zone or subzone to which this link will be applied.
Node2: <S: 1, 50>
Specifies the second zone or subzone to which this link will be applied.
Pipe1: <S: 1, 50>
Specifies the first pipe to be associated with this link.
Pipe2: <S: 1, 50>
Specifies the second pipe to be associated with this link.
Runs the VCS's location algorithm to locate the endpoint identified by the given alias, searching locally, on
neighbors, and on systems discovered through the DNS system, within the specified number of 'hops'.
Results are reported back through the xFeedback mechanism, which must therefore be activated before
issuing this command (e.g. xFeedback register event/locate).
Alias(r): <S: 1, 60>
The alias associated with the endpoint you wish to locate.
HopCount(r): <0..255>
The hop count to be used in the search.
Protocol(r): <H323/SIP>
The protocol used to initiate the search.
SourceZone: <S: 1, 50>
The zone from which to simulate the search request. Choose from the Default Zone (an unknown remote
system), the Local Zone (a locally registered endpoint) or any other configured neighbor, traversal client
or traversal server zone.
Authenticated: <Yes/No>
Whether the search request should be treated as authenticated or not.
SourceAlias: <S: 0, 60>
The source alias to be used for the search request. Default: xcom-locate
Saves the current log levels so that they will persist over a restart.
This command has no parameters.
Example: xCommand LogPersist
OptionKeyAdd
Adds a new option key to the VCS. These are added to the VCS in order to add extra functionality, such as
increasing the VCS's capacity. Contact your Cisco representative for further information.
Specifies the ID of the software option to be deleted.
Example: xCommand OptionKeyDelete OptionKeyId: 2
PipeAdd
Adds and configures a new pipe.
PipeName(r): <S: 1, 50>
Assigns a name to this pipe.
TotalMode: <Unlimited/Limited/NoBandwidth>
Determines whether or not this pipe is enforcing total bandwidth restrictions. NoBandwidth: no bandwidth
available; no calls can be made using this pipe. Default: Unlimited.
Total: <1..100000000>
If this pipe has limited bandwidth, sets the maximum bandwidth (in kbps) available at any one time on the
pipe. Default: 500000.
PerCallMode: <Unlimited/Limited/NoBandwidth>
Determines whether or not this pipe is limiting the bandwidth of individual calls. NoBandwidth: no
bandwidth available; no calls can be made using this pipe. Default: Unlimited.
PerCall: <1..100000000> If this pipe has limited per-call bandwidth, sets the maximum amount of
bandwidth (in kbps) available for any one call. Default: 1920.
Specifies the protocol used to connect to the remote service. Default: HTTP
Verify: <On/Off>
Controls X.509 certificate checking and mutual authentication between this VCS and the policy service.
When enabled, the server's FQDN or IP address, as specified in the address field, must be contained
within the server's X.509 certificate (in either the Subject Common Name or the Subject Alternative Name
attributes). Default: On
CRLCheck: <On/Off>
Controls certificate revocation list checking of the certificate supplied by the policy service. When enabled,
the server's X.509 certificate will be checked against the revocation list of the certificate authority of the
certificate. Default: Off
Address: <S: 0, 128>
Specifies the IP address or Fully Qualified Domain Name (FQDN) of the remote service.
Path: <S: 0, 255>
Specifies the URL of the remote service.
UserName: <S: 0, 30>
Specifies the user name used by the VCS to log in and query the remote service.
Password: <S: 0, 82>
Specifies the password used by the VCS to log in and query the remote service. The maximum plaintext
length is 30 characters, which will then be encrypted.
DefaultCPL: <S: 0, 255>
The CPL used by the VCS when the remote service is unavailable. Default: <reject status='403'
reason='Service Unavailable'/>
Turns secure mode off - removes all audit information that contains sensitive information, such as log files
and call, status and login history records.
This command has no parameters.
Example: xCommand SecureModeOff
SecureModeOn
Turns secure mode on - certain features and login accounts will be unavailable.
This command has no parameters.
Example: xCommand SecureModeOn
Cisco VCS Command Reference (X6)Page 70 of 95
Page 71
xCommand command reference
SIPRouteAdd
Adds a route that will cause SIP messages matching the given criteria to be forwarded to the specified IP
address and port.
Note: this command is intended for developer use only.
Method(r): <S:0, 64>
SIP method to match to select this route (e.g. INVITE, SUBSCRIBE).
RequestLinePattern(r): <S:0, 128>
Regular expression to match against the SIP request line.
HeaderName(r): <S:0, 64>
Name of SIP header field to match (e.g. Event).
HeaderPattern(r): <S:0, 128>
Regular expression to match against the specified SIP header field.
Authenticated(r): <On/Off>
Whether to forward authenticated requests. On: only forward requests along route if incoming message
has been authenticated. Off: always forward messages that match this route. Default: Off
Address(r): <S:0, 39>
Specifies the IP address of the next hop for this route, where matching SIP requests will be forwarded.
Port(r): <1..65534>
Specifies the port on the next hop for this route to which matching SIP requests will be routed. Default:
5060
Transport(r): <UDP/TCP/TLS>
Determines which transport type will be used for SIP messages forwarded along this route.
Tag(r): <S:0, 64>
Tag value specified by external applications to identify routes that they create.
Determines whether this subzone has a limit on the total bandwidth of calls being used by its endpoints at
any one time. NoBandwidth: no bandwidth available. No calls can be made to, from, or within this
subzone. Default: Unlimited.
Total: <1..100000000>
Sets the total bandwidth limit (in kbps) of this subzone (applies only if the mode is set to Limited). Default:
500000.
PerCallInterMode: <Unlimited/Limited/NoBandwidth>
Sets bandwidth limits for any one call to or from an endpoint in this subzone. NoBandwidth: no bandwidth
available. No calls can be made to or from this subzone. Default: Unlimited.
PerCallInter: <1..100000000>
Specifies the bandwidth limit (in kbps) on any one call to or from an endpoint in this subzone (applies only
if the mode is set to Limited). Default: 1920.
PerCallIntraMode: <Unlimited/Limited/NoBandwidth>
Sets bandwidth limits for any one call between two endpoints within this subzone. NoBandwidth: no
bandwidth available. No calls can be made within this subzone. Default: Unlimited.
PerCallIntra: <1..100000000>
Specifies the bandwidth limit (in kbps) for any one call between two endpoints within this subzone
(applies only if the mode is set to Limited). Default: 1920.
The type of address that applies to this rule. Subnet: assigns the device if its IP address falls within the
configured IP address subnet. Alias Pattern Match: assigns the device if its alias matches the configured
pattern.
SubZoneName(r): <S: 1, 50>
The subzone to which an endpoint is assigned if its address satisfies this rule.
Specifies the pattern against which the alias is compared.
Type: <Exact/Prefix/Suffix/Regex>
How the pattern string must match the alias for the transform to be applied. Exact: the entire string must
exactly match the alias character for character. Prefix: the string must appear at the beginning of the alias.
Suffix: the string must appear at the end of the alias. Regex: the string is treated as a regular expression.
Default: Prefix
Behavior: <Strip/Replace/AddPrefix/AddSuffix>
How the alias is modified. Strip: removes the matching prefix or suffix from the alias. Replace: substitutes
the matching part of the alias with the text in the replace string. AddPrefix: prepends the replace string to
the alias. AddSuffix: appends the replace string to the alias. Default: Strip
Replace: <S: 0, 60>
The text string to use in conjunction with the selected Pattern behavior.
Priority: <1..65534>
Assigns a priority to the specified transform. Transforms are compared with incoming aliases in order of
priority, and the priority must be unique for each transform. Default: 1
Description: <S: 0, 64>
A free-form description of the transform.
State: <Enabled/Disabled>
Indicates if the transform is enabled or disabled. Disabled transforms are ignored. Default: Enabled
Defines the name of a user group that determines which access rights members of the group have after
they have been successfully authenticated to use the VCS.
Access(r): <None/ReadWrite>
Defines the access level for members of the specified user group. None: no access allowed. ReadWrite:
configuration can be viewed and changed. Default: ReadWrite
Determines the nature of the specified zone, in relation to the local VCS. Neighbor: the new zone will be a
neighbor of the local VCS. TraversalClient: there is a firewall between the zones, and the local VCS is a
traversal client of the new zone. TraversalServer: there is a firewall between the zones and the local VCS
is a traversal server for the new zone. ENUM: the new zone contains endpoints discoverable by ENUM
lookup. DNS: the new zone contains endpoints discoverable by DNS lookup.
A diagnostic tool that returns the list of zones (grouped by priority) that would be queried, and any transforms
that would be applied, in a search for a given alias.
Note that this command does not change any existing system configuration.
The xStatus group of commands are used to return information about the current status of the system.
Each xStatus element returns information about one or more sub-elements.
The following section lists all the currently available xStatus commands, and the information that is
returned by each command.
To obtain information about the existing status, type:
n xStatus to return the current status of all status elements
n xStatus <element> to return the current status for that particular element and all its sub-elements
n xStatus <element> <sub-element> to return the current status of that group of sub-elements
To obtain information about the xStatus commands, type:
n xStatus ? to return a list of all elements available under the xStatus command
xStatus elements
The current xStatus elements are:
n Alternates
n Applications
n Calls
n Ethernet
n ExternalManager
n Feedback
n FindMeManager
n H323
n IP
n LDAP
n Links
n Loggers
n NTP
n Options
n Pipes
n Policy
n Registrations
n ResourceUsage
n SIP
n SystemUnit
n TURN
n Warnings
n Zones
Each element has the sub-elements as described below:
Alternates
Alternates:
Peer [1..6]: {Hidden for Peer [n] when Peer [n] is self}
Status: <Active/Failed/Unknown>
Cause: {visible if status is Failed} <No response from gatekeeper/DNS
resolution failed/Invalid IP address>
Cisco VCS Command Reference (X6)Page 77 of 95
Page 78
xStatus command reference
Address: <IPv4Addr/IPv6Addr>
Port: <1..65534>
LastStatusChange: <Seconds since boot/Date Time>
Cause: {visible if status is Failed} <Failed to connect to external manager / No
response from external manager / Failed to register to external manager / DNS
resolution failed >
Address: <IPv4Addr/IPv6Addr >
Protocol: HTTP
URL: <S: 0, 255>
Feedback
Feedback [1..3]:
Status: <On/Off>
URL: <S: 1,255>
Expression: <S: 1,127> {0..15 entries}
Cisco VCS Command Reference (X6)Page 80 of 95
Page 81
FindMeManager
FindMeManager:
Mode: <Off/Local/Remote>
Status: <Active/Inactive/Unknown> {visible if Remote}
Address: <1..1024> {Visible if Remote}
H323
H323:
Registration:
Status: <Active/Inactive/Failed>
IPv4: {Visible if Status=Active}
Address: <IPv4Addr> {1..2 entries}
IPv6: {Visible if Status=Active}
Address: <IPv6Addr> {1..2 entries}
OutOfResources: <True/False>
CallSignaling:
Status: <Active/Inactive/Failed>
IPv4: {Visible if Status=Active}
Address: <IPv4Addr> {1..2 entries}
IPv6: {Visible if Status=Active}
Address: <IPv6Addr> {1..2 entries}
Assent:
CallSignaling:
Status: <Active/Inactive/Failed>
IPv4: {Visible if Status=Active}
Address: <IPv4Addr> {1..2 entries}
IPv6: {Visible if Status=Active}
Address: <IPv6Addr> {1..2 entries}
H46018:
CallSignaling:
Status: <Active/Inactive/Failed>
IPv4: {Visible if Status=Active}
Address: <IPv4Addr> {1..2 entries}
IPv6: {Visible if Status=Active}
Address: <IPv6Addr> {1..2 entries}
xStatus command reference
IP
IP:
Protocol: <IPv4/IPv6/Both>
IPv4:
Gateway: <IPv4Addr>
IPv6:
Gateway: <IPv6Addr>
DNS:
Server [1-5]:
Address: <IPv4Addr/IPv6Addr>
Domain: <S: 0, 128>
LDAP
Cisco VCS Command Reference (X6)Page 81 of 95
Page 82
xStatus command reference
LDAP:
Status: <Inactive/Initializing/Active/Failed>
Cause: {visible if status is Failed} <Failed to connect to LDAP server / The LDAP
server does not support TLS. / Failed to establish a TLS connection to the LDAP
server. Please check that the LDAP server certificate is signed by a CA, and that CA
is included on the CA certificate installed on the VCS. / Failed to authenticate with
LDAP server / A valid CA certificate for the LDAP database has not been uploaded;
this is required for connections via TLS / No server address configured>
Product: TANDBERG VCS
Uptime: <Time in seconds>
SystemTime: <Time not set/date-time>
TimeZone: <GMT or one of 300 other timezones>
LocalTime: <local-date-time>
Software:
Cause: {Visible if status is Failed or Warning} <System unreachable/ Systems
unreachable>
Type: <Neighbor/TraversalClient/TraversalServer/ENUM/DNS>
Neighbor: {Visible if Type is Neighbor}
Peer [1..6]:
H323: {visible if H323 Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {visible if Status is Failed} <No response from gatekeeper/DNS
resolution failed/Invalid IP address>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS
lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
SIP: {visible if SIP Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {visible if Status is Failed} <No response from gatekeeper/DNS
resolution failed/Invalid IP address>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS
lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
TraversalClient: {Visible if Type is TraversalClient}
Peer [1..6]:
H323: {visible if H323 Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {visible if Status is Failed} <No response from gatekeeper/DNS
resolution failed/Invalid alias/Authentication Failed/Invalid IP address>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS
lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
SIP: {Visible if SIP Mode=On for Zone}
Status: <Unknown/Active/Failed>
Cause: {visible if Status is Failed} <No response from neighbor/ DNS
resolution failed>
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS
lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
TraversalServer: {visible if Type is TraversalServer}
SIP:
Port: <Active/Inactive>
H323:
Port: <Active/Inactive>
Peer [1..6]:
H323: {visible if H323 Mode=On for Zone}
Status: Active
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS
lookup}
Port: <1..65534>
LastStatusChange: <Time not set/Date Time>
SIP: {visible if SIP Mode=On for Zone}
Status: Active
Address: <IPv4Addr/IPv6Addr> {One Address line per address from DNS
lookup}
Port: <1..65534>
Cisco VCS Command Reference (X6)Page 88 of 95
Page 89
LastStatusChange: <Time not set/Date Time>
Calls: {0..900 entries}
Call [0..900]:
CallID: <S: 1,255>
xStatus command reference
Cisco VCS Command Reference (X6)Page 89 of 95
Page 90
Restoring default configuration
Restoring default configuration
It is possible to restore the Cisco VCS to its default configuration. This is done through the CLI using
xCommand DefaultValuesSet. This command is not available through the web interface.
The DefaultValuesSet command allows you to specify the level of configuration to restore, from 1 to 3 as
follows:
n Level 1: resets most configuration items to their default value, with the exception of the Level 2 and
Level 3 items shown in the tables below.
n Level 2: resets configuration items mostly related to remote authentication (listed in Configuration
items reset by DefaultValuesSet level 2), plus Level 1 items to their default values.
n Level 3: resets all critical configuration items (listed in Configuration items reset by DefaultValuesSet
level 3 below) plus Level 1 and Level 2 items to their default values.
xConfiguration command reference for a full list of all configuration items and where applicable their
default values.
Note:xCommand DefaultValuesSet Level: 3 must be used with caution, as it resets the
system’s IPv4 and IPv6 addresses, meaning you will no longer be able to access the system over IP. It
also deletes all option keys including pre-installed options such as Expressway and the number of calls.
It also deletes all links configured on the Cisco VCS, including the automatically configured default links
between the Default Subzone, Traversal Subzone and Default Zone. Without these links, calls will not
be able to be placed. To restore these links, you should run the command xCommandDefaultLinksAdd after xCommand DefaultValuesSet Level: 3. These links can also be
restored manually using the web interface.
Configuration items reset by DefaultValuesSet level 3
The following table lists the configuration items that are reset by xCommand DefaultValuesSet
Level: 3 and their reset values.
Configuration itemReset value
Administration HTTP ModeOn
Administration HTTPS ModeOn
Administration SSH ModeOn
Administration Telnet ModeOff
Ethernet [1..2] IP V4 Address192.168.0.100
Ethernet [1..2] IP V4 StaticNAT Address<blank>
Ethernet [1..2] IP V4 StaticNAT ModeOff
Ethernet [1..2] IP V4 SubnetMask255.255.255.0
Ethernet [1..2] IP V6 Address<blank>
Ethernet [1..2] SpeedAuto
IPProtocolIPv4
IP DNS Domain Name<blank>
Cisco VCS Command Reference (X6)Page 90 of 95
Page 91
Configuration itemReset value
IP DNS Hostname<blank>
IP DNS Server [1..5] Address<blank>
IP Gateway127.0.0.1
IP Route [1..50] Address<blank>
IP Route [1..50] Gateway<blank>
IP Route [1..50] InterfaceAuto
IP Route [1..50] PrefixLength32
IP V6 Gateway<blank>
NTP Address<blank>
Option [1..64] Key<all option keys are deleted>
SystemUnit AdminAccount [1..15] AccessReadWrite
SystemUnit AdminAccount [1..15] Name<blank>
SystemUnit AdminAccount [1..15] Password <blank>
Restoring default configuration
SystemUnit Maintenance ModeOff
SystemUnit Name<blank>
SystemUnit PasswordTANDBERG
SystemUnit StrictPassword EnforceOff
Configuration items reset by DefaultValuesSet level 2
The following table lists the configuration items that are reset by xCommand DefaultValuesSet
Level: 2 and their reset values.
Configuration itemReset value
Alternates Cluster Name<blank>
Authentication ADS ADDomain<blank>
Authentication ADS Clockskew300
Authentication ADS DC Address<blank>
Authentication ADS EncryptionTLS
Authentication ADS KDC Address<blank>
Authentication ADS KDC Port88
Authentication ADS ModeOff
Authentication ADS SecureChannelAuto
Authentication ADS SPNEGOEnabled
Authentication ADS Workgroup<blank>
Cisco VCS Command Reference (X6)Page 91 of 95
Page 92
Configuration itemReset value
Login Administrator Groups Group [1..30] Access ReadWrite
Login Administrator Groups Group [1..30] Name<blank>
Login Administrator SourceLocal
Login Remote LDAP BaseDN Accounts<blank>
Login Remote LDAP BaseDN Groups<blank>
Login Remote LDAP DirectoryTypeActiveDirectory
Login Remote LDAP EncryptionOff
Login Remote LDAP SASLDIGEST-MD5
Login Remote LDAP Server Address<blank>
Login Remote LDAP Server Port389
Login Remote LDAP VCS BindDN<blank>
Login Remote LDAP VCS BindPassword<blank>
Login Remote LDAP VCS BindUsername<blank>
Restoring default configuration
Login Remote ProtocolLDAP
Login User Groups Group [1..15] AccessReadWrite
Login User Groups Group [1..15] Name<blank>
Login User SourceLocal
Cisco VCS Command Reference (X6)Page 92 of 95
Page 93
Policy services
Policy services
Policy services are typically used in large-scale deployments where policy decisions can be managed
through an external, centralized service rather than by configuring policy rules on the Cisco VCS itself.
You can configure the Cisco VCS to use policy services in the following areas:
n Registration Policy
n Search rules (dial plan)
n Call Policy
Policy service request parameters
The Cisco VCS sends HTTP(S) GET requests to the specified policy service. The parameters and their
values within each request depend upon the type of request. For example a Registration Policy request
will contain a different set of parameters than a Call Policy request.
The following table lists the possible parameters contained within a request and indicates with an X in
which request types that parameter is included.
The Cisco VCS expects the response from the policy service to include an item of CPL which will then
be validated and processed by the Cisco VCS.
Cisco VCS Command Reference (X6)Page 94 of 95
Page 95
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL
ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND
RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE
PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST
TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT
ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND
ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE
FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND
SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND
THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL,
CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST
PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE
THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and
other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third
party trademarks mentioned are the property of their respective owners. The use of the word partner does
not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology
diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of
actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.