Polycom®, the Polycom “Triangles” logo, and the names and marks associated with Polycom’s products are
trademarks and/or service marks of Polycom, Inc., and are registered and/or common-law marks in the United
States and various other countries.
All other trademarks are the property of their respective owners.
Java is a registered trademark of Oracle America, Inc., and/or its affiliates.
Patent Information
The accompanying product may be protected by one or more U.S. and foreign patents and/or pending patent
applications held by Polycom, Inc.
End User License Agreement
Use of this software constitutes acceptance of the terms and conditions of the Polycom DMA 7000 system end-user
license agreement (EULA).
The EULA is included in the release notes document for your version, which is available on the Polycom Support
page for the Polycom DMA 7000 system.
Polycom, Inc.
6001 America Center Drive
San Jose CA 95002
USA
No part of this document may be reproduced or transmitted in any form or by any means, electronic or
mechanical, for any purpose, without the express written permission of Polycom, Inc. Under the law, reproducing
includes translating into another language or format.
As between the parties, Polycom, Inc., retains title to and ownership of all proprietary rights with respect to the
software contained within its products. The software is protected by United States copyright laws and international
treaty provision. Therefore, you must treat the software like any other copyrighted material (e.g., a book or sound
recording).
Every effort has been made to ensure that the information in this manual is accurate. Polycom, Inc., is not
responsible for printing or clerical errors. Information in this document is subject to change without notice.
This chapter provides an overview of the Polycom® Distributed Media
Application™ (DMA™) 7000 system. It includes these topics:
•Introduction to the Polycom DMA System
•Polycom Solution Support
•Working in the Polycom DMA System
•Third-Party Software
™
7000 System
Introduction to the Polycom DMA System
The Polycom DMA system is a highly reliable and scalable video collaboration
infrastructure solution based on the Polycom
The following topics introduce you to the system:
•The Polycom DMA System’s Primary Functions
•The Polycom DMA System’s Three Configurations
•System Capabilities and Constraints
•System Port Usage
Polycom, Inc. 1
®
Proxias™ application server.
Page 14
DMA Operations Guide Introduction to the Polycom DMA System
The Polycom DMA System’s Primary Functions
Conference Manager
The Polycom DMA system’s Conference Manager uses advanced routing
policies to distribute voice and video calls among multiple media servers
(Multipoint Control Units, or MCUs), creating a single virtual resource pool.
This greatly simplifies video conferencing resource management and uses
MCU resources more efficiently.
The Polycom DMA system integrates with your Microsoft® Active
Directory®, automating the task of provisioning users with virtual meeting
rooms (VMRs) for video conferencing. Combined with its advanced resource
management, this makes reservationless video conferencing on a large scale
feasible and efficient, reducing or eliminating the need for conference
scheduling.
The Polycom DMA system’s ability to handle multiple MCUs as a single
resource pool makes multipoint conferencing services highly scalable. You can
add MCUs on the fly without impacting end users and without requiring reprovisioning.
The Conference Manager continually monitors the resources used and
available on each MCU and intelligently distributes conferences among them.
If an MCU fails, loses its connection to the system, or is taken out of service,
the Polycom DMA system distributes new conferences to the remaining
MCUs. The consequences for existing calls and conferences depend on
whether they’re H.323 or SIP:
•H.323 calls and conferences on the failed MCU are terminated. But callers
simply need to redial the same number they used for their initial dial-in.
Conference Manager relocates their new conference to the best available
MCU (provided there is still sufficient MCU capacity).
•SIP calls on the failed MCU are automatically moved to another MCU or
MCUs (if available), up to the capacity available.
Call Server
The Polycom DMA system’s Call Server provides the following functionality:
•H.323 gatekeeper
•SIP registrar and proxy server
•XMPP server (client-to-client connectivity, including chat and presence
information, for clients logged into the server)
•H.323 <—> SIP transition gateway
•Dial plan and prefix services
•Device authentication
2Polycom, Inc.
Page 15
Introduction to the Polycom DMA System Polycom® DMA™7000 System Overview
•Bandwidth management
The Call Server can also be integrated with a Juniper Networks Service
Resource Controller (SRC) to provide bandwidth and QoS assurance services.
RealPresence Platform API
This version of the Polycom DMA system optionally allows an API client
application, developed by you or a third party, to access the RealPresence
Platform Application Programming Interface (API). This API access is licensed
separately. It provides programmatic access to the Polycom DMA system for
the following:
•Provisioning
•Conference control and monitoring
•Call control and dial-out
•Billing and usage data retrieval
•Resource availability queries
The API uses XML encoding over HTTPS transport and adheres to a
Representational State Transfer (REST) architecture.
No separate license is needed in order for a Polycom RealPresence Resource
Manager system to integrate with the DMA system via the API. This
integration provides the full programmatic access to the DMA system
described above, and enables users of the RealPresence Resource Manager
scheduling interface to:
•Schedule conferences using the DMA system’s MCU resources.
•Set up Anytime conferences. Anytime conferences are referred to as preset
dial-out conferences in the DMA system (see “Edit Conference Room
Dialog Box” on page 329)
Note
Integrating the Polycom RealPresence Resource Manager system with the DMA
system via the API is separate and distinct from integrating the DMA system with a
Polycom CMA or RealPresence Resource Manager system.
•The former enables RealPresence Resource Manager users to obtain
information from and use functionality of the DMA system that would otherwise
be accessible only in the DMA system’s management interface.
•The latter enables the DMA system to retrieve site topology and user-to-device
associations from the CMA or RealPresence Resource Manager system.
For convenience, however, when you perform the former operation, the latter
integration is automatically performed for you so that the DMA system will have the
site topology and user-to-device information that the RealPresence Resource
Manager system expects it to have.
Polycom, Inc. 3
Page 16
DMA Operations Guide Introduction to the Polycom DMA System
SVC Conferencing Support
This version of the Polycom DMA system supports the Annex G extension of
the H.264 standard, known as H.264 Scalable Video Coding (SVC), for both
point-to-point and multipoint (VMR) calls.
SVC is sometimes referred to as layered media because the video streams
consist of a base layer that encodes the lowest available quality representation
plus one or more enhancement layers that each provide an additional quality
improvement. SVC supports three dimensions of scalability: temporal (frames
per second), spatial (resolution and aspect ratio), and quality (signal-to-noise
ratio).
The video stream to a device can be tailored to fit the bandwidth available and
device capabilities by adjusting the number of enhancement layers sent to the
device.
For multipoint conferencing, the MCU doesn't have to do processing-intensive
mixing and transcoding to optimize the experience for each device. Instead, it
simply passes through to each device the enhancement layers that provide the
best quality the device can support.
Polycom’s SVC solution focuses on the temporal and spatial dimensions. It
offers a number of advantages over standard AVC conferencing, including:
•Improved video quality at lower bandwidths
•Improved audio and video error resiliency (good audio quality with more
than 50% packet loss, good video quality with more than 25% packet loss)
•Lower end-to-end latency (typically less than half that of AVC)
•More efficient use of bandwidth
•Lower infrastructure cost and operational expenses
•Easier to provision, control, and monitor
•Better security (end-to-end encryption)
Polycom’s SVC solution is supported by the Polycom RealPresence Platform
and Environments, including the latest generation of Polycom MCUs and
RealPresence room, personal, desktop, and mobile endpoints. Existing RMX
MCUs with MPMx cards can be made SVC-capable with a software upgrade,
and doing so triples their HD multipoint conferencing capacity.
See also:
“Introduction to the Polycom DMA System” on page 1
4Polycom, Inc.
Page 17
Introduction to the Polycom DMA System Polycom® DMA™7000 System Overview
The Polycom DMA System’s Three Configurations
Two-server Cluster Configuration
The Polycom DMA system is designed to be deployed as a pair of co-located
redundant servers that share the same virtual IP address(es). The two-server
cluster configuration of the Polycom DMA system has no single point of
failure within the system that could cause the service to become unavailable.
The two servers communicate over the private network connecting them. To
determine which one should host the public virtual IP address, each server
uses three criteria:
•Ability to ping its own public physical address
•Ability to ping the other server’s public physical address
•Ability to ping the default gateway
In the event of a tie, the server already hosting the public virtual address wins.
Failover to the backup server takes about five seconds in the event of a graceful
shutdown and about twenty seconds in the event of a power loss or other
failure. In the event of a single server (node) failure, two things happen:
•All calls that are being routed through the failed server are terminated
(including SIP calls, VMR calls, and routed mode H.323 calls). These users
simply need to redial the same number, and they’re placed back into
conference or reconnected to the point-to-point call they were in. The
standby server takes over the virtual signaling address, so existing
registrations and new calls are unaffected.
•Direct mode H.323 point-to-point calls are not dropped, but the
bandwidth management system loses track of them. This could result in
overuse of the available network bandwidth.
•If the failed server is the active web host for the system management
interface, the active user interface sessions end, the web host address
automatically migrates to the remaining server, and it becomes the active
web host. Administrative users can then log back into the system at the
same URL. The system can always be administered via the same address,
regardless of which server is the web host.
The internal databases within each Polycom DMA system server are fully
replicated to the other server in the cluster. If a catastrophic failure of one of
the database engines occurs, the system automatically switches itself over to
use the database on the other server.
Polycom, Inc. 5
Page 18
DMA Operations Guide Introduction to the Polycom DMA System
Single-server Configuration
The Polycom DMA system is also available in a single-server configuration.
This configuration offers all the advantages of the Polycom DMA system
except the redundancy and fault tolerance at a lower price. It can be upgraded
to a two-server cluster at any time.
This manual generally assumes a redundant two-server cluster. Where there
are significant differences between the two configurations, those are spelled
out.
Superclustering
To provide geographic redundancy and better network traffic management,
up to five geographically distributed Polycom DMA system clusters (twoserver or single-server) can be integrated into a supercluster. All five clusters
can be Call Servers (function as gatekeeper, SIP proxy, SIP registrar, and
gateway). Up to three can be designated as Conference Managers (manage an
MCU resource pool to host conference rooms).
The superclustered Polycom DMA systems can be centrally administered and
share a common data store. Each cluster maintains a local copy of the data
store, and changes are replicated to all the clusters. Most system configuration
is supercluster-wide. The exceptions are cluster-specific or server-specific
items like network settings and time settings.
Note
Technically, a standalone Polycom DMA system (two-server or single-server) is a
supercluster that contains one cluster. All the system configuration and other data
that’s shared across a supercluster is kept in the same data store. At any time,
another Polycom DMA system can be integrated with it to create a two-cluster
supercluster that shares its data store.
It’s important to understand the difference between two co-located servers forming
a single DMA system (cluster) and two geographically distributed DMA clusters
(single-server or two-server) joined into a supercluster.
A single two-server DMA system (cluster) has the following characteristics:
•A single shared virtual IP address and FQDN, which switches from one server
to the other when necessary to provide local redundancy and fault tolerance.
•A single management interface and set of local settings.
•Ability to manage a single territory, with no territory management backup.
•A single set of Call Server and Conference Manager responsibilities.
A supercluster consisting of two DMA clusters (single-server or two-server) has the
following characteristics:
•Separate IP addresses and FQDNs for each cluster.
•Separate management interfaces and sets of local settings for each cluster.
•Ability for each cluster to manage its own territory, with another cluster able to
serve as backup for that territory.
•Different Call Server and Conference Manager responsibilities for each territory
and thus each cluster.
6Polycom, Inc.
Page 19
Introduction to the Polycom DMA System Polycom® DMA™7000 System Overview
System Capabilities and Constraints
The following capabilities and constraints apply to the entire supercluster:
•Number of sites: 500
•Number of clusters in a supercluster: 5 (not counting an integrated
Polycom RealPresence Resource Manager or CMA system)
•Number of MCUs enabled for conference rooms: 64
•Number of territories enabled for conference rooms (Conference Manager
enabled): 3
•Number of concurrent VMR calls: 1200 per territory (Conference
Manager), up to 3600 total
•Size of Active Directory supported: 1,000,000 users and 1,000,000 groups
(up to 10,000 groups may be imported)
The following capabilities and constraints apply to each cluster in the
supercluster:
•Number of registrations: 15000
System Port Usage
•Number of concurrent H.323 calls: 5000
•Number of concurrent SIP calls: 5000
•Total number of concurrent calls: 5000
•Number of network usage data points retained: 8,000,000
•Number of IRQ messages sent per second: 100
The table below lists the inbound ports that may be open on the Polycom DMA
system, depending on signaling and security settings, integrations, and
system configuration.
Table 1-1Inbound port usage
Port Protocol Description
22 TCP SSH. Only available if Linux console
access is enabled (see “Security Settings”
on page 48).
80 TCP HTTP. Redirects to 443 (HTTP access is
not allowed). Disabled in maximum
security mode.
443 TCP HTTPS. Redirects to 8443.
1718 UDP H.323 RAS. Default port; can be changed
(see “Signaling Settings” on page 71).
Polycom, Inc. 7
Page 20
DMA Operations Guide Introduction to the Polycom DMA System
Table 1-1Inbound port usage (continued)
Port Protocol Description
1719 UDP H.323 RAS. Default port; can be changed
(see “Signaling Settings” on page 71).
1720 TCP H.323 H.225 signaling. Default port; can
be changed (see “Signaling Settings” on
page 71).
1935 TCP/UDP XMPP. Traditional RTMP, Flash
communication server.
1936 TCP/UDP XMPP. Flash communication server.
4449 TCP LDAP. OpenDJ replication
(superclustering).
5060 TCP/UDP Unencrypted SIP. Default port; can be
changed or disabled (see “Signaling
Settings” on page 71).
5061 TCP SIP TLS. Default port; can be changed
(see “Signaling Settings” on page 71).
5080 TCP/UDP XMPP. Tomcat or jetty servlet container.
5222 TCP Unencrypted XMPP. Default port; can be
changed or disabled (see “Signaling
Settings” on page 71).
5223 TCP XMPP TLS. Default port; can be changed
(see “Signaling Settings” on page 71).
5269 TCP/UDP XMPP. Server to server communications
for federation.
7070 TCP XMPP HTTP connections.
8088 TCP XMPP. Traditional RTMP tunneled over
(superclustering).
9090 TCP HTTPS. Upgrade status monitoring (only
while upgrade process is running).
XMPP server administration console.
36000-61000 TCP H.323 H.245 port range.
8Polycom, Inc.
Page 21
Introduction to the Polycom DMA System Polycom® DMA™7000 System Overview
The table below lists the remote ports to which the Polycom DMA system may
connect, depending on signaling and security settings, integrations, and
system configuration.
Table 1-2Outbound port usage
Port Protocol Description
80 TCP HTTP. MCUs, Exchange Web Services
(calendaring). Only available if
unencrypted connections are enabled
(see “Security Settings” on page 48).
389 TCP LDAP. Active Directory integration.
443 TCP HTTPS. MCUs, Exchange Web Services
(calendaring).
389 TCP LDAP. Active Directory integration.
1718 UDP H.323 RAS. Default port; can be changed
(see “Signaling Settings” on page 71).
1719 UDP H.323 RAS. Default port; can be changed
(see “Signaling Settings” on page 71).
1720 TCP H.323 H.225 signaling. Default port; can
be changed (see “Signaling Settings” on
page 71).
3268 TCP Global Catalog. Active Directory
integration.
3269 TCP Secure Global Catalog. Active Directory
integration.
4449 TCP OpenDJ replication (superclustering).
5060 TCP/UDP Unencrypted SIP. Default port; can be
changed or disabled (see “Signaling
Settings” on page 71).
5061 TCP SIP TLS. Default port; can be changed
(see “Signaling Settings” on page 71).
8443 TCP HTTPS. Management interface access.
8444 TCP Supercluster communication.
8989 TCP OpenDJ replication (superclustering).
36000-61000 TCP H.323 H.245 port range.
32768-61000 TCP/UDP XMPP. Ephemeral port range.
Polycom, Inc. 9
Page 22
DMA Operations Guide Polycom Solution Support
Polycom Solution Support
Polycom Implementation and Maintenance services provide support for
Polycom solution components only. Additional services for supported thirdparty Unified Communications (UC) environments integrated with Polycom
solutions are available from Polycom Global Services and its certified Partners.
These additional services will help customers successfully design, deploy,
optimize, and manage Polycom visual communications within their UC
environments.
Professional Services for Microsoft Integration is mandatory for Polycom
Conferencing for Microsoft Outlook and Microsoft Office Communications
Server or Lync Server 2010 integrations. For more information, please visit
www.polycom.com/services/professional_services/ or contact your local
Polycom representative.
Working in the Polycom DMA System
This section includes some general information you should know when
working in the Polycom DMA system.
Accessing the Polycom DMA System
The Polycom DMA system’s management interface is accessed by pointing a
compatible browser equipped with Adobe® Flash® Player to the system’s
host name or IP address (a two-server cluster or an IPv6-only single-server
cluster has a virtual host name and IP address, and we strongly recommend
always using the virtual address). Minimum requirements:
•Microsoft Internet Explorer® 7 or newer, or Mozilla Firefox® 3 or newer,
or Google Chrome 11 or newer
•Adobe Flash Player 9.0.124 or newer
•1280x1024 minimum display resolution (1680x1050 or greater
recommended)
Note
The Polycom DMA system’s Flex-based management interface requires Adobe
Flash Player. For stability and security reasons, we recommend always using the
latest version of Flash Player.
Even so, be aware that your browser’s Flash plugin may hang or crash from time to
time. Yo ur browser should alert you when this happens and enable you to reload
the plugin. In some cases, you may need to close and restart your browser.
In the Google Chrome browser, use the Adobe Flash plugin, not the built-in Flash
support.
10Polycom, Inc.
Page 23
Working in the Polycom DMA System Polycom® DMA™7000 System Overview
Field Input Requirements
While every effort was made to internationalize the Polycom DMA system, not
all system fields accept Unicode entries. If you work in a language other than
English, be aware that some fields accept only ASCII characters.
Settings Dialog Box
The Settings dialog box shows your user name and information about the
server you’re logged into. Click the button to the right of the menus to
display it.
In addition, you can change the text size used in the system interface and the
maximum number of columns in the Dashboard. Note that larger text sizes
will affect how much you can see in a given window or screen size and may
require frequent scrolling.
Polycom DMA System User Roles and Their Access Privileges
The Polycom DMA system has three system user roles (see “User Roles
Overview” on page 312) that provide access to the management and
operations interface and, if available, the separately licensed RealPresence
Platform Application Programming Interface (API). The functions you can
perform and parts of the interface or API resources you can access depend on
your user role or roles, as shown in the tables below.
Table 1-3Management interface access privileges
Menu/Icon Admin ProvisionerAuditor
Home. Returns to the Dashboard.
Network >
Active Calls
Endpoints
1
DMAs
••
• • •
• •
• •
Polycom, Inc. 11
Page 24
DMA Operations Guide Working in the Polycom DMA System
Table 1-3Management interface access privileges
Menu/Icon Admin ProvisionerAuditor
MCU > MCUs
MCU > MCU Pools
MCU > MCU Pool Orders
Site Statistics
Site Link Statistics
Site Topology > Sites
Site Topology > Site Links
Site Topology > Site-to-Site Exclusions
Site Topology > Network Clouds
Site Topology > Territories
External Gatekeeper
External SIP Peer
External SBC
1
••
1
••
1
••
1
1
••
1
••
1
••
1
••
1
••
1
••
1
••
1
••
1
••
• •
User >
2
Users
••
Groups
1
Login Sessions
••
Change Password
Reports >
Call History
Conference History
Registration History
Network Usage
Microsoft Active Directory Integration
Enterprise Passcode Errors
Orphaned Groups and Users
Conference Room Errors
3
•
3
•
3
•
•
• • •
• • •
• • •
• • •
• •
• •
12Polycom, Inc.
Page 25
Working in the Polycom DMA System Polycom® DMA™7000 System Overview
Table 1-3Management interface access privileges
Menu/Icon Admin ProvisionerAuditor
Maintenance
System Log Files
4
••
Troubleshooting Utilities > Ping,
Traceroute, Top, I/O Stats, SAR
Shutdown and Restart
Software Upgrade
Backup and Restore
Admin > Conference Manager >
Conference Settings
Conference Templates
Shared Number Dialing
Admin > Call Server >
Call Server Settings •
Domains
Dial Rules
Hunt Groups
Device Authentication
Registration Policy
1
Prefix Service
••
•
•
•
•
•
•
•
•
•
• •
•
•
Embedded DNS
History Retention Settings
Admin > Integrations >
Microsoft Active Directory •
Microsoft Exchange Server
Polycom RealPresence Resource
Manager or CMA System
Juniper Networks SRC
Polycom, Inc. 13
•
• •
•
•
•
Page 26
DMA Operations Guide Working in the Polycom DMA System
Help. Opens the online help topic for the
page you’re viewing.
1. Provisioners have view-only access.
2. Must be an enterprise user to see enterprise users. Provisioners can’t add or remove roles
or endpoints, and can’t edit user accounts with explicitly assigned roles (Administrator,
Provisioner, or Auditor), but can manage their conference rooms.
3. Must be an enterprise user to view this report.
4. Administrators can’t delete log archives.
14Polycom, Inc.
• • •
• • •
Page 27
Working in the Polycom DMA System Polycom® DMA™7000 System Overview
Table 1-4API resource access privileges
Conference
Room
API Resource Admin ProvisionerAuditor
1 2
user
conference-room
conference-template
1 2
3
• • •
• • •
• •
Owner
billing
conference
participant
conference-observer
participant-observer
mcu
mcu-pool
mcu-pool-order
territory
call-server-configuration
device
device-observer
group
status
subscription
user-role
1
•••
1
•••
1
•••
1
••
1
•••
• • •
• •
• •
• •
• •
• •
• •
• •
• •
• • •
• •
1. Conference Room Owners can only access resources that they own and can’t use PUT,
POST, or DELETE methods on their user account or conference rooms.
2. Provisioners can’t add or remove roles or associated endpoints, and can’t edit user
accounts with explicitly assigned roles (Administrator, Provisioner, or Auditor), but can
manage their conference rooms.
3. Provisioners can GET a list of conference templates, but can’t GET a specific conference
template.
Polycom, Inc. 15
Page 28
DMA Operations Guide Third-Party Software
Third-Party Software
Open Source Software
The Polycom DMA system uses several open source software packages,
including the CentOS operating system. CentOS is an enterprise-class Linux
distribution that contains hundreds of open-source components. For more
information about CentOS, visit http://www.centos.org/.
The packages containing the source code and the licenses for all the opensource software, including CentOS and its components, are included on the
Polycom DMA system software DVD, mostly in the
Modifying Open Source Code
The LGPL v2.1 license allows you to modify the LGPL code we use, recompile
the modified code, and re-link it with our proprietary code. Note that although
you’re free to modify the LGPL modules used in the Polycom DMA system in
any way you wish, we cannot be responsible if the changes you make impair
the system.
/SRPMS
directory.
To replace an LGPL library with your modified version
1On the DMA DVD, find the source code for the module you want to
modify.
2Modify the source code and compile it.
3Go to Admin > Local Cluster > Security Settings, select Allow Linux
console access, and click Update.
4Contact Polycom Global Services for the root password for the Polycom
DMA server.
5Use ssh to log into the server as root.
6Upload the modified software via wget or scp.
7Find the module you’re replacing and install the new version to that
location.
8Reboot the system.
License Information
The following table contains license information for the open source software
packages used in the Polycom DMA system. Note that the source code and the
licenses for all the open-source software, including CentOS and its
components, are included on the Polycom DMA system software DVD. This
list is provided as a convenient reference.
16Polycom, Inc.
Page 29
Third-Party Software Polycom® DMA™7000 System Overview
http://www.mozilla.org/MPL/MPL-1.1.html AND
https://developer.mozilla.org/en/Rhino_License
Page 32
DMA Operations Guide Third-Party Software
Software Version License Link
Web App
Solution, Inc.
Flex 3
dashboard
xmlschemacore
The Open Source packages below are included in the Polycom DMA system as a consequence of being embedded
in the Java Platform, Standard Edition Embedded, version 6.0. License text is available at
http://downloads.polycom.com/Oracle/THIRDPARTYLICENSEREADME.TXT
Zlib(general permissive)
Mozilla RhinoNetscape Public
Apache DerbyApache 2.0
7-ZipSee file. Some files are
v. 1.2Apache 1.1
MIT License
Version 1.1 of Project
Licence (BSD-like)
the Info-ZIP copyright
and license
License Version 1.1
LGPLv2.1; some have
unRAR restriction;
some are licensed
under AES code
license.
ftp://ftp.info-zip.org/pub/infozip/license.html
UPXGPL
LZMA
Software
Development
Kit
22Polycom, Inc.
Common Public
License (CPL)
Page 35
Polycom® DMA™ System Initial
Configuration Summary
2
This chapter describes the configuration tasks required to complete your
implementation of a new Polycom
(DMA™) 7000 system once installation and initial network configuration are
complete.
This chapter assumes you’ve completed the server configuration procedure in
the Getting Started Guide (available at support.polycom.com), logged into the
Polycom DMA system’s management interface, and verified that the
Supercluster Status pane of the Dashboard shows (for a two-server
configuration) two servers in the cluster, with healthy enterprise and private
network status for both.
Initial configuration includes the following topics:
System configuration
•Add Required DNS Records for the Polycom DMA System
•License the Polycom DMA System
•Set Up Signaling
•Configure the Call Server and Optionally Create a Supercluster
•Set Up Security
•Set Up MCUs
•Connect to Microsoft Active Directory
®
Distributed Media Application™
•Set Up Conference Templates
Confirming configuration
•Test the System
Each topic describes the task, provides background and overview information
for it, and where appropriate, links to specific step-by-step procedures to
follow in order to complete the task.
Polycom, Inc. 23
Page 36
DMA Operations Guide Add Required DNS Records for the Polycom DMA System
Note
These topics outline the configuration tasks that are generally required. You may
wish to complete other optional configuration tasks, including:
•Enable cascading of conferences (see “About Cascading” on page 198).
•Configure calendaring service (“Microsoft Exchange Server Integration” on
page 180).
Add Required DNS Records for the Polycom DMA System
Note
If you’re not familiar with DNS administration, the creation of various kinds of DNS
resource records (A/AAAA,NAPTR, NS, and SRV), your enterprise’s DNS
implementation, and tuning for load balancing (if needed), please consult with
someone who is.
In order to access your Polycom DMA system by its host name instead of by
IP address, you (or your DNS administrator) must first create an A (address)
resource record (RR) for IPv4 and/or AAAA record for IPv6 on your DNS
server(s).
For a two-server cluster configuration, at a minimum, create a record for the
virtual host name and IP address. This address is shared between the servers
in a two-server cluster configuration. For administrative convenience, we
recommend that you also create alias records for the physical host name(s) and
IP address(es). For a superclustered system, A/AAAA records for each
physical host name, physical IP address, virtual host name, and virtual IP
address are mandatory.
Note
Depending on local DNS configuration, the host name could be the Polycom DMA
system’s fully qualified domain name (FQDN) or a shorter name that DNS can
resolve. For some features, such as Microsoft Exchange Server integration, it’s
imperative that the virtual host’s FQDN can be resolved in DNS, especially by the
Exchange server.
If you’re using split network interfaces, we recommend creating alias records for
both the management and signaling host names and addresses.
The DNS server(s) should also have entries for your Microsoft® Active
Directory® server (if different from the DNS server) and any external
gatekeepers or SIP peers.
You may need to create additional DNS records as described below.
24Polycom, Inc.
Page 37
Add Required DNS Records for the Polycom DMA System Polycom® DMA™ System Initial Configuration Summary
Additional DNS Records for SIP Proxy
To support the use of your Polycom DMA system as a SIP proxy server and
ease future network administrative burdens, create the following DNS records
(for each cluster in a supercluster, if applicable):
•Optionally, NAPTR records that describe the transport protocols
supported by the SIP proxies at a domain and identify the preferred
protocol. Configure these statically to match the system’s SIP transport
protocol configuration.
•SRV records for each transport protocol that identify the host names of the
SIP proxies that service a particular domain. Configure these statically to
point to the host names of the Call Servers in the domain. Here are
example records for two clusters:
_sips._tcp.example.com. 86400 IN SRV 10 1001 5061 dma-asia.example.com.
_sips._tcp.example.com. 86400 IN SRV 10 1002 5061 dma-europe.example.com.
_sip._tcp.example.com. 86400 IN SRV 20 1001 5060 dma-asia.example.com.
_sip._tcp.example.com. 86400 IN SRV 20 1002 5060 dma-europe.example.com.
_sip._udp.example.com. 86400 IN SRV 30 1001 5060 dma-asia.example.com.
_sip._udp.example.com. 86400 IN SRV 30 1002 5060 dma-europe.example.com.
To enable access from the public internet, create corresponding SRV records,
visible from outside the firewall, for the public address of each SIP session
border controller (SBC).
For more information about the use of DNS in SIP, refer to RFCs 3263 and 2782.
Additional DNS Records for H.323 Gatekeeper
To support the use of your Polycom DMA system as an H.323 gatekeeper and
ease future network administrative burdens, create SRV records that identify
the host names of the gatekeepers that service a particular domain. These
records are necessary in order to enable the optional inbound URL dialing
feature. Configure them statically to point to the host names of the Call Servers
in the domain. Here are example records for two clusters:
_h323ls._udp.example.com. 86400 IN SRV 0 1 1719 dma-asia.example.com.
_h323ls._udp.example.com. 86400 IN SRV 0 1 1719 dma-europe.example.com.
_h323cs._tcp.example.com. 86400 IN SRV 0 1 1720 dma-asia.example.com.
_h323cs._tcp.example.com. 86400 IN SRV 0 1 1720 dma-europe.example.com.
To enable access from the public internet, create corresponding SRV records,
visible from outside the firewall, for the public address of each H.323 session
border controller (SBC).
For more information about the use of DNS in H.323, refer to the H.323
specification, Annex O, and the H.225.0 specification, Appendix IV.
Polycom, Inc. 25
Page 38
DMA Operations Guide License the Polycom DMA System
Additional DNS Records for the Optional Embedded DNS Feature
To support DNS publishing by your Polycom DMA system’s embedded DNS
servers (see “Embedded DNS” on page 279), a DNS NS record is needed for
each cluster in the supercluster. These records identify the Polycom DMA
system’s embedded DNS servers as authoritative for the specified logical host
name. Here are example records for two clusters:
callservers.example.com. 86400 IN NS dma-asia.example.com.
callservers.example.com. 86400 IN NS dma-europe.example.com.
Your enterprise DNS must also have the zone callservers.example.com
defined and be configured to forward requests for names in that zone to any
of the clusters in the supercluster. The way you do this depends on the DNS
server software being used.
Queries to the enterprise DNS for callservers.example.com are referred to the
specified DMA clusters. Their embedded DNS servers create and manage A
records for each site in the site topology. When responsibility for a site moves
from one cluster to another, the A records are updated so that the site’s domain
name is mapped to the new cluster.
Verify That DNS Is Working for All Addresses
To confirm that DNS can resolve all the host names and/or FQDNs, ping each
of them, either from a command prompt on the PC you’re using to access the
system or from one of the clusters you’re setting up (go to Troubleshooting Utilities > Ping).
If you have access to a Linux PC and are familiar with the dig command, you
can use it to query the enterprise DNS server to verify that all the records
(A/AAAA, NS, and SRV) are present and look correct.
License the Polycom DMA System
A Polycom DMA system is licensed at the cluster level (single-server or
two-server). A cluster’s license specifies:
•The maximum number of concurrent calls that can touch the cluster. In a
supercluster configuration, note that:
— A single call may touch more than one cluster. It consumes a license
on each cluster it touches.
— Each cluster may be licensed for a different number of calls.
— If your superclustering strategy (see “About Superclustering” on
page 227) calls for a cluster to be primary for one territory and backup
for another, it must be licensed for the call volume expected when it
has to take over the territory for which it’s the backup.
26Polycom, Inc.
Page 39
Set Up Signaling Polycom® DMA™ System Initial Configuration Summary
•Whether the RealPresence Platform Application Programming Interface
(API) is enabled. The API provides an API client application with
programmatic access to the Polycom DMA system (see “RealPresence
Platform API” on page 3). In a supercluster, all clusters must have the
same API licensing status.
Note
An API license isn’t required in order for a Polycom RealPresence
Resource Manager system to access the API. It’s only needed for a client
application you or a third party develop.
You should have received either one or two license numbers for each cluster,
depending on whether you ordered a single-server or two-server cluster.
You must obtain an activation key code for each server from the Polycom
Resource Center (PRC). You enter the server’s serial number and the license
number that you were given for that server, and the PRC generates an
activation key for that server. For a cluster, you repeat the process using the
other server’s serial number and its license number. Installing the activation
keys activates the licenses for your system.
Set Up Signaling
Caution
An activation key is linked to a specific server’s serial number. For a two-server
cluster, you must generate the activation key for each server using that server’s
serial number.
Licensing will fail if you generate both activation keys from the same server serial
number.
To activate the system license, follow the procedure in “Licenses” on page 70.
Signaling setup includes enabling H.323, SIP, or both, and optionally setting
the prefix for dialing into the system.
Note
The addition of the Call Server and superclustering features to the Polycom DMA
system required significant changes to the signaling internals. One consequence of
these changes is that the Polycom DMA system can no longer register to an
external gatekeeper as an MCU. Instead, it can neighbor to an external gatekeeper
as another gatekeeper. As a result, if you’re upgrading from a version that didn’t
include the Call Server functionality or that operated in what was known as “legacy
signaling mode,” you need to reconfigure your external gatekeeper.
Polycom, Inc. 27
Page 40
DMA Operations Guide Configure the Call Server and Optionally Create a Supercluster
To configure signaling, follow the procedure in “Configure Signaling” on
page 83.
Configure the Call Server and Optionally Create a
Supercluster
Configuring the Polycom DMA system’s Call Server function consists of the
following high-level tasks:
1Integrate with a Polycom RealPresence Resource Manager or CMA
system (see “Resource Management System Integration” on page 185) or
enter site topology information (see “Site Topology” on page 283).
2If deploying a supercluster of multiple geographically distributed
Polycom DMA clusters:
aSet the Security Configuration page security options before
superclustering (see “Security Settings” on page 48). But wait until
after superclustering to do the rest of the security setup tasks.
Set Up Security
bDepending on security settings, you may need to install certificates
before superclustering (see “Certificate Procedures” on page 42).
cCreate a supercluster (see “About Superclustering” on page 227) and
configure supercluster options.
3Create territories and assign sites to them (if you integrated with a
Polycom RealPresence Resource Manager or CMA system, this must be
done on that system). Assign the primary and backup cluster responsible
for each territory, and designate which territories can host conference
rooms (see “Territories” on page 302).
4Add any external devices, such as a neighbor gatekeeper or SIP peer (see
“Call Server Configuration” on page 237).
5Configure the dial plan (see “Dial Rules” on page 243).
The first step in securing your Polycom DMA system is to locate it in a secure
data center with controlled access, but that topic is beyond the scope of this
document.
Secure setup of the Polycom DMA system consists of the following high-level
tasks (some of which assume you’re integrating with Active Directory and
some of which overlap with other initial setup topics):
28Polycom, Inc.
Page 41
Set Up MCUs Polycom® DMA™ System Initial Configuration Summary
1As the default local administrative user (admin), create a local user
account for yourself with the Administrator role, log in using that
account, and delete the admin user account. See “Adding Users
Overview” on page 313 and “Users Procedures” on page 333.
2Create the Active Directory service account (read-only user account) that
the Polycom DMA system will use to read and integrate with Active
Directory. See “Active Directory Integration Procedure” on page 169.
3Assign the Administrator role to your named enterprise account, and
remove the Polycom DMA system’s user roles (see “User Roles
Overview” on page 312) from the service account used to integrate with
Active Directory. See “Connect to Microsoft Active Directory” on page 32
and “Microsoft Active Directory Integration” on page 163.
4Log out and log back in using your enterprise user ID and password.
5Verify that the expected enterprise users are available in the Polycom
DMA system and that conference room IDs were successfully created for
them. If necessary, adjust integration settings and correct errors. See
“Microsoft Active Directory Integration” on page 163, “Users
Procedures” on page 333, and “Conference Room Errors Report” on
page 422.
Set Up MCUs
6Obtain and install a security certificate from a trusted certificate
authority. See “Security Certificates Overview” on page 35 and
“Certificate Procedures” on page 42.
7Document your current configuration for comparison in the future. We
recommend saving screen captures of all the configuration pages.
8Manually create a backup, download it, and store it in a safe place. See
“Backing Up and Restoring” on page 381.
Note
The Polycom DMA system can interact with MCUs, or media servers, in either or
both of the following two ways:
•MCUs may be made available to system’s Conference Manager to manage for
multi-point conferencing (hosting virtual meeting rooms, or VMRs).
•MCUs may be registered with the system’s Call Server as standalone MCUs
and/or gateways.
This configuration summary assumes you want to do both.
Make sure your RMX MCUs are configured to accept encrypted (HTTPS)
management connections (required for maximum security mode).
Polycom, Inc. 29
Page 42
DMA Operations Guide Set Up MCUs
Make sure that each MCU is in a site belonging to a territory for which the
Polycom DMA system is responsible. If you’re deploying a supercluster (see
“Configure the Call Server and Optionally Create a Supercluster” on page 28
and “About Superclustering” on page 227), make sure that each territory has
a primary and backup cluster assigned to it. If the primary cluster becomes
unavailable, the MCUs registered to it can re-register to the backup.
If you’re deploying a supercluster, verify that you’ve enabled the hosting of
conference rooms in the right territories and assigned clusters to those
territories. See “Configure the Call Server and Optionally Create a
Supercluster” on page 28.
Standalone MCUs can register themselves to the Polycom DMA system’s Call
Server. To make an MCU available as a conferencing resource, either add it to
the appropriate Polycom DMA cluster’s Conference Manager manually or, if
it’s already registered with the Call Server, edit its entry to enable it for
conference rooms and provide the additional configuration information
required. See “MCU Management” on page 131.
You must organize MCUs configured as conferencing resources into one or
more MCU pools (logical groupings of media servers). Then, you can define
one or more MCU pool orders that specify the order of preference in which
MCU pools are used.
Note
If you have a Polycom RealPresence Resource Manager system that’s going to use
the DMA system API to schedule conferences on the DMA system’s conferencing
resources (MCU pools), you must create MCU pools and pool orders specifically for
the use of the RealPresence Resource Manager system. The pool orders should be
named in such a way that:
•They appear at the top of the pool order list presented in the RealPresence
Resource Manager system.
•Users of that system will understand that they should choose one of those pool
orders.
If the RealPresence Resource Manager system is also going to be used to directly
schedule conferences on MCUs, those MCUs should not be part of the
conferencing resources (MCU pools) available to the DMA system.
Every conference room (VMR) is associated with an MCU pool order. The
pool(s) to which an MCU belongs, and the pool order(s) to which a pool
belongs, are used to determine which MCU is used to host a conference. See
“MCU Pools” on page 152 and “MCU Pool Orders” on page 156 for
information about how to use pools and pool orders, as well as the rules that
the system uses to choose an MCU for a user.
The Polycom DMA system uses conference templates to define the
conferencing experience associated with a conference room or enterprise
group. You can create standalone templates (recommended), setting the
conferencing parameters directly in the Polycom DMA system, or link
templates to RMX conference profiles (see “Conference Templates” on
page 195).
30Polycom, Inc.
Page 43
Set Up MCUs Polycom® DMA™ System Initial Configuration Summary
Both methods allow you to specify most conference parameters:
•General information such as line rate, encryption, auto termination, and
H.239 settings
•Video settings such as mode (presentation or lecture) and layout
•IVR settings
•Conference recording settings
If you want to create DMA system templates linked to conference profiles on
the RMX MCUs, make sure the profiles used by the Polycom DMA system
exist on all the RMX MCUs and are defined the same on all of them.
Polycom, Inc. 31
Page 44
DMA Operations Guide Connect to Microsoft Active Directory
Connect to Microsoft Active Directory
Connecting to Microsoft® Active Directory® simplifies the task of deploying
conferencing to a large organization. All Polycom DMA system access to the
Active Directory server is read-only and minimally impacts the directory
performance. See “Microsoft Active Directory Integration” on page 163.
Note
If you’re not knowledgeable about enterprise directories in general and your specific
implementation in particular, please consult with someone who is. Active Directory
integration is a non-trivial matter.
Before integrating with Active Directory, be sure that one or more DNS servers
are specified (this should have been done during installation and initial setup).
See “Network Settings” on page 64.
If you’re deploying a supercluster of multiple geographically distributed
Polycom DMA clusters, verify that you’ve assigned clusters to the territories
in your site topology (see “Configure the Call Server and Optionally Create a
Supercluster” on page 28) and decide which cluster is to be responsible for
Active Directory integration.
Active Directory integration automatically makes the enterprise users
(directory members) into Conferencing Users in the Polycom DMA system,
and can assign each of them a conference room (virtual meeting room, or
VMR). The conference room IDs are typically generated from the enterprise
users’ phone numbers.
Note
Creating conference rooms for enterprise users is optional. If you want to integrate
with Active Directory to load user and group information into the Polycom DMA
system, but don’t want to give all users the ability to host conferences, you can do
so. You can manually add conference rooms for selected users at any time. See
“Conference Rooms Procedures” on page 335.
Once the Polycom DMA system is integrated with Active Directory, it reads
the directory information nightly, so that user and group information is
updated automatically as people join and leave the organization. The system
caches certain data from Active Directory. In a superclustered system, one
cluster is responsible for updating the cache, which is shared with all the
clusters.
Between updates, clusters access the directory only to authenticate passwords
(for instance, for management interface login); all other user information (such
as user search results) comes from the cache. You can manually update the
cache at any time.
32Polycom, Inc.
Page 45
Set Up Conference Templates Polycom® DMA™ System Initial Configuration Summary
Enterprise groups can have their own conference templates that provide a
custom conferencing experience (see “Conference Templates” on page 195).
They can also have their own MCU pool order, which preferentially routes
conferences to certain MCUs (see “MCU Pool Orders” on page 156).
You can assign Polycom DMA system roles to an enterprise group, applying
the roles to all members of the group and enabling them to log into the
Polycom DMA system’s management interface with their standard network
user names and passwords.
See “User Roles Overview” on page 312, “Groups” on page 338, and
“Enterprise Groups Procedures” on page 342.
There are security concerns that need to be addressed regarding user accounts,
whether local or enterprise. See the high-level process described in “Set Up
Security” on page 28.
Set Up Conference Templates
Test the System
The Polycom DMA system uses conference templates and global conference
settings to manage system and conference behavior, and it has a default
conference template and default global conference settings.
After you’ve added MCUs to the system, you may want to change the global
conference settings or create additional templates that specify different
conference properties.
If you integrate with Active Directory, you can use templates to provide
customized conferencing experiences for various enterprise groups.
When you add a custom conference room to a user (either local or enterprise),
you can choose which template that conference room uses.
To add conference templates, see “Conference Templates Procedures” on
page 220. To change conference settings, see “Conference Settings” on
page 193. To customize the conferencing experience for an enterprise group,
see “Enterprise Groups Procedures” on page 342.
On the Signaling Settings page (see “Signaling Settings” on page 71), verify
that:
•If you enabled H.323, the H.323 Signaling Status section indicates that the
signaling status is Active and the port assignments are correct.
•If you enabled SIP, the SIP Signaling Status section shows that the correct
protocols and listening ports are enabled.
Polycom, Inc. 33
Page 46
DMA Operations Guide Test the System
Have some endpoints register with the Polycom DMA Call Server and make
point-to-point calls to each other.
On the Dashboard (see “Dashboard” on page 352), verify that:
•The information in the Cluster Info pane looks correct, including the time,
network settings, and system resource information.
•The Supercluster Status pane shows the correct number of servers and
clusters, and the network interfaces that should be working (depending on
your IP ty pe and spl it net work set tings ) ar e up ( green up a rrow ) and in fu ll
duplex mode, with the speed correct for your enterprise network.
•The Call Server Registrations pane shows that the endpoints that
attempted to register did so successfully.
•The Call Server Active Calls pane shows that the endpoints that made
calls did so successfully, and the call limits per cluster and total are correct
for your licenses.
•The Conference Manager MCUs pane shows that the MCUs you added
are connected and in service.
•The information on the Active Directory Integration pane looks correct,
including the status, cache refresh data, and enterprise conference room
count.
Set up some multipoint conferences by having endpoints dial into enterprise
users’ conference rooms (preferably including a custom conference room).
Verify that conferencing works satisfactorily, that the system status is good,
and that the Conference Manager Usage pane accurately presents the status.
When you’re satisfied that the Polycom DMA system is configured and
working properly, manually create a backup, download it, and store it in a safe
place. See “Backing Up and Restoring” on page 381.
34Polycom, Inc.
Page 47
System Security
This chapter describes the following Polycom® Distributed Media
Application™ (DMA™) 7000 system security topics:
•Security Certificates Overview
•Certificate Settings
•Certificate Procedures
3
•Security Settings
•The Consequences of Enabling Maximum Security Mode
•Login Policy Settings
•Reset System Passwords
Security Certificates Overview
How Certificates Work
X.509 certificates are a security technology that assists networked computers
in determining whether to trust each other.
•A single, centralized certificate authority (CA) is established. Typically,
this is either an enterprise’s IT department or a commercial certificate
authority.
•Each computer on the network is configured to trust the central certificate
authority.
•Each server on the network has a public certificate that identifies it.
•The certificate authority signs the public certificates of those servers that
•When a client connects to a server, the server shows its signed public
certificate to the client. Trust is established because the certificate has been
signed by the certificate authority, and the client has been configured to
trust the certificate authority.
Forms of Certificates Accepted by the Polycom DMA System
X.509 certificates come in several forms (encoding and protocol). The
following table shows the forms that can be installed in the Polycom DMA
system.
Protocol /
Encoding
File Type
Description and Installation Method
PEM
(Base64-encoded
ASCII text)
DER
(binary format
using ASN.1
Distinguished
Encoding Rules)
PKCS #7
protocol
P7B file
CER (single
certificate) file
Certificate text Encoded certificate text copied from
PKCS #12
protocol
PFX file
PKCS #7
protocol
P7B file
Certificate chain containing:
•A signed certificate for the system,
authenticating its public key.
•The CA’s public certificate.
•Sometimes intermediate
certificates.
Upload file or paste into text box.
Signed certificate for the system,
authenticating its public key.
Upload file or paste into text box.
CA’s email or secure web page.
Paste into text box.
Certificate chain containing:
•A signed certificate for the system,
authenticating its public key.
•A private key for the system.
•The CA’s public certificate.
Upload file.
Certificate chain containing:
•A signed certificate for the system,
authenticating its public key.
•The CA’s public certificate.
•Sometimes intermediate
certificates.
Upload file.
CER (single
certificate) file
36Polycom, Inc.
Signed certificate for the system,
authenticating its public key.
Upload file.
Page 49
Security Certificates Overview System Security
How Certificates Are Used by the Polycom DMA System
The Polycom DMA system uses X.509 certificates in the following ways:
1When a user logs into the Polycom DMA system’s browser-based
management interface, the Polycom DMA system (server) offers an X.509
certificate to identify itself to the browser (client).
The Polycom DMA system’s certificate must have been signed by a
certificate authority (see “Certificate Procedures” on page 42).
The browser must be configured to trust that certificate authority (beyond
the scope of this documentation).
If trust can’t be established, most browsers allow connection anyway, but
display a ‘nag’ dialog to the user, requesting permission.
2When the Polycom DMA system connects to a Microsoft Active Directory
server, it may present a certificate to the server to identify itself.
If Active Directory is configured to require a client certificate (this is not
the default), the Polycom DMA system offers the same SSL server
certificate that it offers to browsers connecting to the system management
interface. Active Directory must be configured to trust the certificate
authority, or it rejects the certificate and the connection fails.
3When the Polycom DMA system connects to a Microsoft Exchange server
(if the calendaring service is enabled; see
Integration”
identify itself.
Unless the Allow unencrypted calendar notifications from Exchange server security option is enabled (see “Security Settings” on page 48), the
Polycom DMA system offers the same SSL server certificate that it offers
to browsers connecting to the system management interface. The
Microsoft Exchange server must be configured to trust the certificate
authority. Otherwise, the Microsoft Exchange Server integration status
(see “Dashboard” on page 352) remains Subscription pending
indefinitely, the Polycom DMA system does not receive calendar
notifications, and incoming meeting request messages are only processed
approximately every 4 minutes.
4When the Polycom DMA system connects to an RMX MCU configured
for secure communications (this is not the default), a certificate may be
used to identify the RMX MCU (server) to the Polycom DMA system
(client).
5When performing call signaling requiring TLS, the Polycom DMA system
presents its certificate to the connecting client (one-way TLS). Unless the
Skip certificate validation for encrypted signaling security option is
enabled (see “Security Settings” on page 48), the system uses the installed
CA certificates to authenticate the connecting client’s certificate as well
(mTLS or two-way TLS).
on page 180), it may present a certificate to the server to
“Microsoft Exchange Server
Polycom, Inc. 37
Page 50
DMA Operations Guide Certificate Settings
Frequently Asked Questions
Q. Is it secure to send my certificate request through email?
A. Yes. The certificate request, signed certificate, intermediate certificates,
and authority certificates that are sent through email don’t contain any
secret information. There is no security risk in letting untrusted third
parties see their contents.
As a precaution, you can verify the certificate fingerprints (which can be
found in the Certificate Details popup) with the certificate authority via
telephone. This ensures that a malicious third party didn’t substitute a
fake email message with fake certificates.
Q. Why doesn’t the information on the Certificate Details popup match
the information that I filled out in the signing request form?
A. Commercial certificate authorities routinely replace the organizational
information in the certificate with their own slightly different description
of your organization.
Q. I re-installed the Polycom DMA system software. Why can’t I re-install
my signed public certificate?
See also:
Certificate Settings
A. X.509 certificates use public/private key pair technology. The public
key is contained in your public certificate and is provided to any web
browser that asks for it. The private key never leaves the Polycom DMA
system.
As part of software installation, the Polycom DMA system generates a
new public/private key pair. The public key from your old key pair can’t
be used with the new private key.
To re-use your signed public certificate, try restoring from backup. Both
the public and private keys are saved as part of a backup file.
Alternatively, if the certificate you want to reinstall is a PKCS#12
certificate, it contains a private key and will replace both the public key
and the private key generated at installation time.
“System Security” on page 35
“Certificate Settings” on page 38
“Certificate Procedures” on page 42
The following table describes the fields on the Certificate Settings page.
38Polycom, Inc.
Page 51
Certificate Settings System Security
Table 3-1Fields on the Certificate Settings page
Column Description
Enable OCSP Enables the use of Online Certificate Status Protocol as
a means of obtaining the revocation status of a
certificate presented to the system.
If OCSP responder URL is not specified, the system
checks the certificate’s AuthorityInfoAccess (AIA)
extension fields for the location of an OCSP responder:
•If there is none, the certificate fails validation.
•Otherwise, the system sends the OCSP request to
the responder identified in the certificate.
If OCSP responder URL is specified, the system sends
the OCSP request to that responder.
The responder returns a message indicating whether
the certificate is good, revoked, or unknown.
If OCSP certificate is specified, the response message
must be signed by the specifi ed cert ificat e’ s p rivate k ey.
OCSP responder URL Identifies the responder to be used for all OCSP
requests, overriding the AIA field values.
If OCSP certificate is specified, the response message
must be signed by the specifi ed cert ificat e’ s p rivate k ey.
OCSP certificate Select a certificate to require OCSP response
messages to be signed by the specified certificate’s
private key.
Store OCSP
Configuration
Identifier Common name of the certificate.
Purpose Kind of certificate:
Saves the OCSP configuration.
•Server SSL is the DMA system’s public certificate,
which it presents to identify itself. By default, this is
a self-signed certificate, not trusted by other
devices.
•Trusted Root CA is the root certificate of a certificate
authority that the DMA system trusts.
•Intermediate CA is a CA certificate that trusted root
CAs issue themselves to sign certificate signing
requests (reducing the likelihood of their root
certificate being compromised). If the DMA system
trusts the root CA, then the chain consisting of it, its
intermediate CA certificates, and the server
certificate will all be trusted.
Expiration Expiration date of certificate.
Polycom, Inc. 39
Page 52
DMA Operations Guide Certificate Settings
See also:
“Security Certificates Overview” on page 35
“Certificate Information Dialog Box” on page 40
“Certificate Signing Request Dialog Box” on page 40
“Add Certificates Dialog Box” on page 41
“Certificate Details Dialog Box” on page 41
“Certificate Procedures” on page 42
Certificate Information Dialog Box
The Certificate Information dialog box appears when you click Create
Certificate Signing Request in the Actions list (if a signing request has
already been issued, you’re first asked whether to use the existing one or create
a new one). The following table describes the fields in the dialog box.
Table 3-2Fields in the Certificate Information dialog box
Field Description
Common name (CN) Defaults to the FQDN of the system’s management
Organizational unit
(OU)
Organization (O) Optional.
City or locality (L) Optional.
State (ST) Optional.
Country (C) Two-character country code.
See also:
“Security Certificates Overview” on page 35
“Certificate Settings” on page 38
“Certificate Procedures” on page 42
Certificate Signing Request Dialog Box
interface, as defined by the virtual host name and
domain specified on the Network page. Editable.
Subdivision of organization. Specify up to three OUs.
Optional.
The Certificate Signing Request dialog box appears when you create a
request in the Certificate Information dialog box.
The Summary section at the top displays the information the Certificate Information dialog box.
40Polycom, Inc.
Page 53
Certificate Settings System Security
The Encoded Request box below displays the encoded certificate request text,
which you can select and copy.
See also:
“Security Certificates Overview” on page 35
“Certificate Settings” on page 38
“Certificate Procedures” on page 42
Add Certificates Dialog Box
The Add Certificates dialog box appears when you click Add Certificates in
the Actions list. It lets you install signed certificates or certificate chains. You
can do so in two ways:
•Upload a PFX, PEM, or P7B certificate file.
•Paste PEM-format certificate text into the dialog box.
The following table describes the fields in the dialog box.
Table 3-3Fields in the Add Certificates dialog box
Field Description
Upload certificate If checked, the Password field and Upload file button
Password Enter the password, if any , assigned to the certificate file
Upload file Click the button to browse to the file you want to upload.
Paste certificate If checked, the text field below enables you to paste in
See also:
“Security Certificates Overview” on page 35
“Certificate Settings” on page 38
“Certificate Procedures” on page 42
Certificate Details Dialog Box
The Certificate Details dialog box appears when you click Display Details in
the Actions list. It displays information about the certificate selected in the list,
as outlined in the following table.
enable you to upload a PFX, PEM, or P7B certificate
file.
when it was created.
the text of PEM certificate files.
Polycom, Inc. 41
Page 54
DMA Operations Guide Certificate Procedures
Table 3-4Sections in the Certificate Details dialog box
Section Description
Certificate InfoPurpose and alias of the certificate.
Issued To Information about the entity to which the certificate was
issued and the certificate serial number.
Issued By Information about the issuer.
Validity Issue and expiration date s.
Fingerprints SHA1 and MD5 fingerprints (checksums) for confirming
certificate.
Subject Alternative
Names
Extended Key Usage Indicates the purposes for which the certificate can be
See also:
“Security Certificates Overview” on page 35
“Certificate Settings” on page 38
“Certificate Procedures” on page 42
Certificate Procedures
Certificate procedures include the following:
Additional identities bound to the subject of the
certificate.
For the Polycom DMA system, this should include the
virtual and physical FQDNs, short host names, and IP
addresses of the system.
used.
The Polycom DMA system’s certificate is used for both
server and client connections, so this should always
contain at least serverAuth and clientAuth.
•Install your chosen certificate authority’s public certificate, if necessary, so
that the Polycom DMA system trusts that certificate authority.
•Create a certificate signing request to submit to the certificate authority.
•Install a public certificate signed by your certificate authority that
identifies the Polycom DMA system.
•Remove a signed certificate or a certificate authority’s certificate.
42Polycom, Inc.
Page 55
Certificate Procedures System Security
Note
If you’re configuring the Polycom DMA system to support Polycom’s solution for the
Microsoft OCS or Lync environment, you can use Microsoft’s Certificate Wizard to
request and obtain a PFX file (a password-protected PKCS12 file containing a
private key and public key for the system, and the CA’s certificate).
Once you have the PFX file, you’re ready to install it.
See Polycom’s solution deployment guide for information about using the
Certificate Wizard and other steps needed to implement the solution.
Install a Certificate Authority’s Certificate
This procedure is not necessary if you obtain a certificate chain that includes a
signed certificate for the Polycom DMA system, your certificate authority’s
public certificate, and any intermediate certificates.
Use this procedure to add a trusted certificate authority, either an in-house or
commercial CA.
Caution
Installing or removing certificates requires a system restart and terminates all active
conferences.
When you install or remove a certificate, the change is made to the certificate store
immediately, but the system can’t implement the change until it restarts and reads
the changed certificate store.
For your convenience, you’re not required to restart and apply a change
immediately. This permits you to perform multiple installs or removals before
restarting and applying the changes. But when you’re finished making changes, you
must select Restart to Apply Saved Changes to restart the system and finish your
update. Before you begin, make sure there are no active conferences and you’re
prepared to restart the system when you’re finished.
To install a certificate for a trusted root CA
1Go to Admin > Local Cluster > Certificates.
The installed certificates are listed. The Trusted Root CA entries, if any,
represent the certificate authorities whose public certificates are already
installed on the DMA system and are thus trusted.
2If you’re using a certificate authority that isn’t listed, obtain a copy of
your certificate authority’s public certificate.
The certificate must be either a single X.509 certificate or a PKCS#7
certificate chain. If it’s ASCII text, it’s in PEM format, and starts with the
text
-----BEGIN CERTIFICATE-----
. If it’s a file, it can be either PEM or
DER encoded.
3In the Actions list, select Add Certificates.
Polycom, Inc. 43
Page 56
DMA Operations Guide Certificate Procedures
4In the Add Certificates dialog box, do one of the following:
— If you have a file, click Upload certificate, enter the password (if any)
for the file, and browse to the file or enter the path and file name.
— If you have PEM-format text, copy the certificate text, click Paste
certificate, and paste it into the text box below.
5Click OK.
6Verify that the certificate appears in the list as a Trusted Root CA.
7Click Restart to Apply Saved Changes, and when asked to confirm that
you want to restart the system so that certificate changes can take effect,
click OK.
See also:
“Security Certificates Overview” on page 35
“Certificate Settings” on page 38
“Certificate Procedures” on page 42
Create a Certificate Signing Request in the DMA System
The procedure below creates a certificate signing request (CSR) that you can
submit to your chosen certificate authority. This method uses the private key
generated at software installation time.
To create a certificate signing request
1Go to Admin > Local Cluster > Certificates.
By default, the system is configured to use a self-signed certificate.
2To see details of the public certificate currently being used to identify the
system to other computers:
aIn the list, select the Server SSL certificate.
bIn the Actions list, select Display Details.
The Certificate Details dialog box appears. If this is the default
self-signed certificate, Organizational Unit is Self Signed Certificate.
cTo close the dialog box, click OK.
3In the Actions list, select Create Certificate Signing Request.
If you’ve created a signing request before, you’re asked if you want to use
your existing certificate request or generate a new one. Elect to generate a
new one.
44Polycom, Inc.
Page 57
Certificate Procedures System Security
4In the Certificate Information dialog box, enter the identifying
information for your Polycom DMA system (see “Certificate Information
Dialog Box” on page 40) and click OK.
The Certificate Signing Request dialog box displays the encoded request
(see “Certificate Signing Request Dialog Box” on page 40).
5Copy the entire contents of the Encoded Request box (including the text
-----BEGIN NEW CERTIFICATE REQUEST----CERTIFICATE REQUEST-----
) and submit it to your certificate authority.
Depending on the certificate authority, your CSR may be submitted via
email or by pasting into a web page.
6Click OK to close the dialog box.
When your certificate authority has processed your request, it sends you
a signed public certificate for your Polycom DMA system. Some certificate
authorities also send intermediate certificates and/or root certificates.
Depending on the certificate authority, these certificates may arrive as
email text, email attachments, or be available on a secure web page.
The Polycom DMA system accepts PKCS#7 or PKCS#12 certificate chains
or single certificates.
and
-----END NEW
Caution
When you submit the CSR to your CA, make sure that the CA doesn’t modify any of
the predefined SAN fields or the X.509v3 Key Usage or Extended Key Usage fields.
Changes to these fields may make your system unusable. Contact Polycom
technical support if you have any questions about this.
See also:
“Security Certificates Overview” on page 35
“Certificate Settings” on page 38
“Certificate Procedures” on page 42
Install a Certificate in the DMA System
The procedure below installs the certificate or certificate chain provided by the
certificate authority. It assumes that you’ve received the certificate or
certificate chain in one of the following forms:
•A PFX, P7B, or single certificate file that you’ve saved on your computer.
Polycom, Inc. 45
Page 58
DMA Operations Guide Certificate Procedures
•PEM-format encoded text that you received in an email or on a secure web
page.
Caution
Installing or removing certificates requires a system restart and terminates all active
conferences.
When you install or remove a certificate, the change is made to the certificate store
immediately, but the system can’t implement the change until it restarts and reads
the changed certificate store.
For your convenience, you’re not required to restart and apply a change
immediately. This permits you to perform multiple installs or removals before
restarting and applying the changes. But when you’re finished making changes, you
must select Restart to Apply Saved Changes to restart the system and finish your
update. Before you begin, make sure there are no active conferences and you’re
prepared to restart the system when you’re finished.
To install a signed certificate that identifies the Polycom DMA system
1When you receive your certificate(s), return to Admin > Local Cluster >
Certificates.
2In the Actions list, select Add Certificates.
3In the Add Certificates dialog box, do one of the following:
— If you have a PFX, P7B, or single certificate file, click Upload
certificate, enter the password (if any) for the file, and browse to the
file or enter the path and file name.
— If you have PEM-format text, copy the certificate text, click Paste
certificate, and paste it into the text box below. You can paste multiple
PEM certificates one after the other.
4Click OK.
5To verify that the new signed certificate has replaced the default
self-signed certificate:
aIn the list of certificates, once again select the Server SSL certificate.
bIn the Actions list, select Display Details.
The Certificate Details dialog box appears.
cConfirm from the information under Issued To and Issued By that the
self-signed default certificate has been replaced by your signed public
certificate from the certificate authority.
dClick OK to close the dialog box.
6Click Restart to Apply Saved Changes, and when asked to confirm that
you want to restart the system so that certificate changes can take effect,
click OK.
46Polycom, Inc.
Page 59
Certificate Procedures System Security
See also:
“Security Certificates Overview” on page 35
“Certificate Settings” on page 38
“Certificate Procedures” on page 42
Remove a Certificate from the DMA System
There are two kinds of certificate removal:
•Removing the certificate of a Trusted Root CA so that the system no longer
trusts certificates signed by that certificate authority.
•Removing the signed certificate currently in use as the Server SSL
certificate so that the system reverts to using the default self-signed Server
SSL certificate.
Removing a signed certificate also removes the certificate of the Trusted
Root CA that signed it, along with any intermediate certificates provided
by that certificate authority.
Both procedures are described below.
Caution
Installing or removing certificates requires a system restart and terminates all active
conferences.
When you install or remove a certificate, the change is made to the certificate store
immediately, but the system can’t implement the change until it restarts and reads
the changed certificate store.
For your convenience, you’re not required to restart and apply a change
immediately. This permits you to perform multiple installs or removals before
restarting and applying the changes. But when you’re finished making changes, you
must select Restart to Apply Saved Changes to restart the system and finish your
update. Before you begin, make sure there are no active conferences and you’re
prepared to restart the system when you’re finished.
To remove a Trusted Root CA’s certificate
1Go to Admin > Local Cluster > Certificates.
2In the certificates list, select the certificate you want to delete.
3In the Actions list, select Display Details and confirm that you’ve
selected the correct certificate. Then click OK.
4In the Actions list, select Delete Certificate.
5When asked to confirm, click Yes.
A dialog box informs you that the certificate has been deleted.
6Click OK.
Polycom, Inc. 47
Page 60
DMA Operations Guide Security Settings
7Click Restart to Apply Saved Changes, and when asked to confirm that
you want to restart the system so that certificate changes can take effect,
click OK.
To remove a signed certificate and revert to the default self-signed certificate
1Go to Certificates.
2In the Actions list, select Revert to Default Certificate.
3When asked to confirm, click Yes.
A dialog box informs you that the system has reverted to a self-signed
certificate.
4Click OK.
5Click Restart to Apply Saved Changes, and when asked to confirm that
you want to restart the system so that certificate changes can take effect,
click OK.
6After the system restarts, log back in, return to Admin > Local Cluster >
Certificates, and verify that the system has reverted to the default
self-signed certificate:
Security Settings
aIn the list of certificates, select the Server SSL certificate.
bIn the Actions list, select Display Details.
The Certificate Details dialog box appears.
cConfirm from the information under Issued To and Issued By that the
default self-signed certificate has replaced the CA-signed certificate.
dClick OK to close the dialog box.
See also:
“Security Certificates Overview” on page 35
“Certificate Settings” on page 38
“Certificate Procedures” on page 42
The Security Settings page lets you switch between high security mode and a
custom security mode in which one or more insecure capabilities are allowed.
It also lets you switch to, but not from, a maximum security mode.
48Polycom, Inc.
Page 61
Security Settings System Security
Caution
We recommend always using the High security setting unless you have a specific
and compelling need to allow one of the insecure capabilities.
We recommend the new Maximum security setting only for those environments
where the most stringent security protocols must be adhered to.
Enabling Maximum security is irreversible and has significant consequ ences
(see “The Consequences of Enabling Maximum Security Mode” on page 54). Don’t
choose this setting unless you know what you’re doing and are prepared for the
consequences.
Note
All clusters in a supercluster must have the same security settings. Before
attempting to join a supercluster, make sure the cluster’s security settings match
those of the other members of the supercluster. You can’t change a cluster’s
security settings while it’s part of a supercluster.
The following table describes the options in the Security Settings page.
Table 3-5Fields on the Security Settings page
Field Description
Maximum security An extremely high security mode suitable for use where
very strict security requirements apply.
Once this mode is enabled, it’s no longer possible to
reduce the security level. See caution above.
High security Recommended setting for normal operation.
Custom security Lets you enable one or more of the unsecured methods
of network access listed below it.
Allow Linux console
access
Enables the Linux user root to log into the system using
SSH. This direct Linux access isn’t needed for normal
operation, routine maintenance, or even
troubleshooting, all of which can be done through the
administrative GUI.
In extreme circumstances, this option might enable
expert Polycom Global Services personnel to more fully
understand the state of a troubled system or correct
problems. Enable this option only when asked to do so
by Polycom Global Services.
Polycom, Inc. 49
Page 62
DMA Operations Guide Security Settings
Table 3-5Fields on the Security Settings page (continued)
Field Description
Allow unencrypted
connections to the
Active Directory
Allow unencrypted
connections to MCUs
Normally, the Polycom DMA system connects to Active
Directory using SSL or TLS encryption. But if the Active
Directory server or servers (including domain controllers
if you import global groups) aren’t configured to support
encryption, the Polycom DMA system can only connect
using an unencrypted protocol. This option allows such
connections if an encrypted connection can’t be
established.
This configuration causes an extreme security flaw: the
unencrypted passwords of enterprise users are
transmitted over the network, where they can easily be
intercepted.
Use this option only for diagnostic purposes. By toggling
it, you can determine whether encryption is the cause of
a failure to connect to Active Directory or to load group
data. If so, the solution is to correctly configure the
relevant servers, not to allow ongoing use of
unencrypted connections.
Normally, the Polycom DMA system uses only HTTPS
for the conference control connection to RMX MCUs,
and therefore can’t control an RMX MCU that accepts
only HTTP (the default). This option enables the system
to fall back to HTTP for RMX MCUs not configured for
HTTPS.
We recommend configuring your MCUs to accept
encrypted connections rather than enabling this option.
When unencrypted connections are used, the RMX
login name and password are sent unencrypted over
the network.
Allow unencrypted
calendar notifications
from Exchange server
50Polycom, Inc.
Normally, if calendaring is enabled, the Polycom DMA
system gives the Microsoft Exchange server an HTTPS
URL to which the Exchange server can deliver calendar
notifications. In that case, the Polycom DMA system
must have a certificate that the Exchange server
accepts in order for the HTTPS connection to work.
If this option is selected, the Polycom DMA system does
not require HTTPS for calendar notifications.
We recommend installing a certificate trusted by the
Exchange server and using an HTTPS URL for
notifications rather than enabling this option.
Page 63
Security Settings System Security
Table 3-5Fields on the Security Settings page (continued)
Field Description
Allow basic
authentication to
Exchange server
Skip certificate
validation for server
connecting
Normally, if calendaring is enabled, the Polycom DMA
system authenticates itself with the Exchange server
using NTLM authentication.
If this option is selected, the Polycom DMA system still
attempts to use NTLM first. But if that fails or isn’t
enabled on the Exchange server, then the DMA system
falls back to HTTP Basic authentication (user name and
password).
We recommend using NTLM authentication rather than
enabling this option.
In order for either NTLM or HTTP Basic authentication
to work, they must be enabled on the Exchange server.
Normally, when the Polycom DMA system connects to a
server, it validates that server’s certificate.
This option configures the system to accept any
certificate presented to it without validating it.
We recommend using valid certificates for all servers
that the system may need to contact rather than
enabling this option. Depending on system
configuration, this may include:
MCUs
Active Directory
Exchange
RealPresence Resource Manager or CMA system
Other DMA systems
Skip certificate
validation for encrypted
signaling
Polycom, Inc. 51
Normally, during encrypted call signaling (SIP over
TLS), the Polycom DMA system requires the remote
party (endpoint or MCU) to present a valid certificate.
This is known as mTLS or two-way TLS.
This option configures the system to accept any
certificate (or none).
We recommend installing valid certificates on your
endpoints and MCUs rather than enabling this option.
Page 64
DMA Operations Guide Security Settings
Table 3-5Fields on the Security Settings page (continued)
Field Description
Skip certificate
validation for user login
sessions
Allow forwarding of IPv6
ICMP destination
unreachable messages
Allow IPv6 ICMP echo
reply messages to
multicast addresses
This option may be configured in any security mode.
If this option is turned off, you can only connect to the
Polycom DMA system if your browser presents a client
certificate issued by a CA that the system trusts (this is
known as mTLS for administrative connections).
Turn this option off only if:
•You’ve implemented a complete public key
infrastructure (PKI) system, including a CA server,
client software (and optionally hardware, tokens, or
smartcards), and the appropriate operational
procedures.
•The CA’ s public certificate is installed in the Polycom
DMA system so that it trusts the CA.
•All authorized users, including yourself, have a
client certificate signed by the CA that authenticates
them to the Polycom DMA system.
If this option is off, the Polycom DMA system has an
internal firewall rule that blocks outbound destination
unreachable messages.
If this option is on, that firewall rule is disabled.
Note: The Polycom DMA system currently doesn’t send
such messages, regardless of this setting.
If this option is off, the Polycom DMA system doesn't
reply to echo request messages sent to multicast
addresses (multicast pings).
If this option is on, the system responds to multicast
pings.
52Polycom, Inc.
Page 65
Security Settings System Security
Table 3-5Fields on the Security Settings page (continued)
Field Description
Disable enhanced
support
Enhanced support allows Polycom Global Services
personnel to securely access the system when normal
access methods aren’t possible. For example,
enhanced support could allow support of a DMA system
when console access is disabled and system errors
prevent access to the management interface.
Using the enhanced support feature, expert Polycom
Global Services personnel can enable console access
when necessary using Single Packet Authorization
(SPA) technology. This is a more secure method than
console access, so the default is to not disable it.
We strongly recommend leaving this setting off so that
the enhanced support feature remains available. If
neither enhanced support nor console access is
available, recovering from a serious problem may
require re-imaging the system, resulting in a loss of
data.
This setting is automatically turned on if Maximum security is enabled.
To change the security settings
1Go to Admin > Local Cluster > Security Settings.
2To switch from a custom setting back to the recommended security mode,
click High security.
3To switch from the recommended security mode to a custom setting:
aClick Custom security.
bCheck the unsecured network access method(s) that you want to
enable.
4Click Update.
A dialog box informs you that the configuration has been updated.
Note
If you turn off Skip certificate validation for user login sessions, the system
notifies you that if you don’t log back in within 5 minutes, the setting will be
automatically turned back on. This is a safety precaution to ensure that at least one
user is still able to access the system.
5Click OK.
Polycom, Inc. 53
Page 66
DMA Operations Guide The Consequences of Enabling Maximum Security Mode
See also:
“System Security” on page 35
“Certificate Settings” on page 38
“The Consequences of Enabling Maximum Security Mode” on page 54
“Login Policy Settings” on page 57
“Reset System Passwords” on page 61
The Consequences of Enabling Maximum Security Mode
Enabling the Maximum security setting is irreversible and has the following
significant consequences:
•All unencrypted protocols and unsecured access methods are disabled,
and the enhanced support feature is disabled.
•The boot order is changed so that the server(s) can’t be booted from the
optical drive or a USB device.
•A BIOS password is set.
•The port 443 redirect is removed, and the system can only be accessed by
the full URL (https://<IP>:8443/dma7000, where <IP> is one of the
system's management IP addresses or a host name that resolves to one of
those IP addresses).
•For all server-to-server connections, the system requires the remote party
to present a valid X.509 certificate. Either the Common Name (CN) or
Subject Alternate Name (SAN) field of that certificate must contain the
address or host name specified for the server in the Polycom DMA system.
Polycom RMX MCUs don’t include their management IP address in the
SAN field of the CSR (Certificate Signing Request), so their certificates
identify them only by the CN. Therefore, in the Polycom DMA system, an
RMX MCU's management interface must be identified by the host name
or FQDN specified in the CN field, not by IP address.
Similarly, an Active Directory server certificate often specifies only the
FQDN. Therefore, in the Polycom DMA system, the Active Directory must
be identified by FQDN, not by IP address.
•SIP signaling is not supported.
•Superclustering is not supported.
•The Polycom DMA system can’t be integrated with Microsoft Exchange
Server and doesn’t support virtual meeting rooms (VMRs) created by the
Polycom Conferencing Add-in for Microsoft Outlook.
•Integration with a Polycom RealPresence Resource Manager or CMA
system is not supported.
54Polycom, Inc.
Page 67
The Consequences of Enabling Maximum Security Mode System Security
•On the Banner page, Enable login banner is selected and can’t be
disabled.
•On the Login Sessions page, the Terminate Session action is not
available.
•On the Troubleshooting Utilities menu, Top is removed.
•In the Add User and Edit User dialog boxes, conference and chairperson
passwords are obscured.
•After Maximum security is enabled, users must change their passwords.
•If the system is not integrated with Active Directory, each local user can
have only one assigned role (Administrator, Provisioner, or Auditor).
If some local users have multiple roles when you enable Maximum security, they retain only the highest-ranking role (Administrator >
Auditor > Provisioner).
•If the system is integrated with Microsoft Active Directory, only one local
user can have the Administrator role, and no local users can have the
Provisioner or Auditor role.
If there are multiple local administrators when you enable Maximum security, the system prompts you to choose one local user to retain the
Administrator role. All other local users, if any, become conferencing
users only and can’t log into the management interface.
Each enterprise user can have only one assigned role (Administrator,
Provisioner, or Auditor). If some enterprise users have multiple roles (or
inherit multiple roles from their group memberships), they retain only the
lowest-ranking role (Administrator > Auditor > Provisioner).
•Local user passwords have stricter limits and constraints (each is set to the
noted default if below that level when you enable Maximum security):
— Minimum length is 15-30 characters (default is 15).
— Must contain 1 or 2 (default is 2) of each character type: uppercase
alpha, lowercase alpha, numeric, and non-alphanumeric (special).
— Maximum number of consecutive repeated characters is 1-4 (default is
2).
— Number of previous passwords that a user may not re-use is 8-16
(default is 10).
— Minimum number of characters that must be changed from the
previous password is 1-4 (default is 4).
— Password may not contain the user name or its reverse.
— Maximum password age is 30-180 days (default is 60).
— Minimum password age is 1-30 days (default is 1).
Polycom, Inc. 55
Page 68
DMA Operations Guide The Consequences of Enabling Maximum Security Mode
•Other configuration settings ha ve stri cter limi ts and constraints (each is set
to the noted default if below that level when you enable Maximum
security):
— Session configuration limits:
»Sessions per system is 4-80 (default is 40).
»Sessions per user is 1-10 (default is 5).
»Session timeout is 5-60 minutes (default is 10).
— Local account configuration limits:
»Local user account is locked after 2-10 failed logins (default is 3)
due to invalid password within 1-24 hours (default is 1).
»Locked account remains locked either until unlocked by an
administrator (the default) or for a duration of 1-480 minutes.
•Software build information is not displayed anywhere in the interface.
•You can’t restore a backup made before Maximum security was enabled.
•File uploads may fail when using the Mozilla Firefox browser unless the
proper steps have been taken. See below.
Enabling File Uploads in Maximum Security with Mozilla Firefox
The Mozilla Firefox browser uses its own certificate database instead of the
certificate database of the OS. If you use only that browser to access the
Polycom DMA system, the certificate(s) needed to securely connect to the
system may be only in the Firefox certificate database and not in the Windows
certificate store. This causes a problem for file uploads.
File upload via the Polycom DMA system’s Flash-based interface bypasses the
browser and creates the TLS/SSL connection itself. Because of that, it uses the
Windows certificate store, not the Firefox certificate database. If the
certificate(s) establishing trust aren’t there, the file upload silently fails.
To avoid this problem, you must import the needed certificates into Internet
Explorer (and thus into the Windows certificate store). And, when accessing
the system with Firefox, you must use its fully qualified host name.
First, start Internet Explorer and point it to the Polycom DMA system. If you
don’t receive a security warning, the needed certificates are already in the
Windows certificate store.
If you receive a warning, import the needed certificates. The details for doing
so depend on the version of Internet Explorer and on your enterprise’s
implementation of certificates.
In Internet Explorer 7, elect to continue to the site. Then click Certificate Error
to the right of the address bar and click View Certificates to open the Certificate dialog box. From there, you can access the Certificate Import
Wizard.
56Polycom, Inc.
Page 69
Login Policy Settings System Security
The entire trust chain must be imported (the system’s signed certificate,
intermediate certificates, if any, and the root CA’s certificate). When importing
a certificate, let Internet Explorer automatically select a certificate store.
See also:
“System Security” on page 35
“Security Certificates Overview” on page 35
“Certificate Settings” on page 38
“Security Settings” on page 48
“Login Policy Settings” on page 57
“Reset System Passwords” on page 61
Login Policy Settings
The following pages, under Admin > Login Policy Settings, let you configure
various aspects of user access to the system:
Local Password
•Local Password
•Session
•Local User Account
•Banner
See also:
“System Security” on page 35
“Certificate Settings” on page 38
“Security Settings” on page 48
The Local Password page lets you increase system security by specifying age,
length, and complexity requirements for the passwords of local administrator,
auditor, and provisioner users. These rules don’t apply to conferencing users’
conference and chairperson passcodes, or to Active Directory users.
The following table describes the fields on the Local Password page.
Polycom, Inc. 57
Page 70
DMA Operations Guide Login Policy Settings
Table 3-6Fields on the Local Password Settings page
Field Description
Password Management
Maximum password
age (days)
Minimum password age
(days)
Minimum length Specify the number of characters a password must
Minimum changed
characters
Reject previous
passwords
Password Complexity
Allow user name or its
reverse form
Lowercase letters Specify the number of lowercase letters (a-z) that a
Uppercase letters Specify the number of uppercase letters (A-Z) that a
Numbers Specify the number of digit characters (0-9) that a
Specify at what age a password expires (30-180 days).
Specify how frequently a password can be changed
(1-30 days).
contain (8-30).
Specify the number of characters that must be different
from the previous password (1-4).
Specify how many of the user’s previous passwords the
system remembers and won’t permit to be reused
(8-30).
Turns off the protection against a password containing
the user’s login name or its reverse.
password must contain.
password must contain.
password must contain.
Special characters Specify the number of non-alphanumeric keyboard
characters that a password must contain.
Maximum consecutive
repeated characters
Specify how many sequential characters may be the
same.
See also:
“System Security” on page 35
“Login Policy Settings” on page 57
Session
The Session page lets you increase system security by limiting the number and
length of login sessions.
You can see the current login sessions and terminate sessions by going to
User > Login Sessions. See “Login Sessions” on page 344.
The following table describes the fields on the Session page.
58Polycom, Inc.
Page 71
Login Policy Settings System Security
Table 3-7Fields on the Session Settings page
Field Description
Active system sessions Specify the number of simultaneous login sessions by
all users or select Unlimited.
Note: If this limit is reached, but none of the logged-in
users is an Administrator, the first Administrator user to
arrive is granted access, and the system terminates the
non-Administrator session that’s been idle the longest.
Local User Account
Active sessions per
user
Session timeout
(minutes)
Specify the number of simultaneous login sessions per
user ID or select Unlimited.
Specify the length of time after which the system
terminates a session for inactivity or select Unlimited.
See also:
“System Security” on page 35
“Login Policy Settings” on page 57
The Local User Account page lets you increase system security by:
•Locking out users who have exceeded the specified number and frequency
of login failures. The system locks the account either indefinitely or for the
length of time you specify.
•Disabling accounts that have been inactive a specified number of days.
The following table describes the fields on the Local User Account page.
Table 3-8Fields on the Local User Account page
Field Description
Account Lockout
Enable account lockout Turns on lockout feature and enables lockout
configuration fields below.
Failed login threshold Specify how many consecutive login failures cause the
system to lock an account.
Failed login window
(hours)
Polycom, Inc. 59
Specify the time span within which the consecutive
failures must occur in order to lock the account.
Page 72
DMA Operations Guide Login Policy Settings
Table 3-8Fields on the Local User Account page (continued)
Field Description
Banner
Customize user account
lockout duration
(minutes)
Account Inactivity
Customize account
inactivity threshold
(days)
If selected, specify how long the user’s account remains
locked.
If not selected, the lockout is indefinite, and a user with
a locked account must contact an Administrator to
unlock it.
Turns on disabling of inactive accounts and lets you
specify the inactivity threshold that triggers disabling.
See also:
“System Security” on page 35
“Login Policy Settings” on page 57
A login banner is a message that appears when users attempt to access the
system. They must acknowledge the message before they can log in.
The Banner page lets you enable the banner and select or create the message it
displays. The message may contain up to 1500 characters. If the system is in
Maximum Security mode, the login banner is enabled and can’t be disabled.
The following table describes the fields on the Banner page.
Table 3-9Fields on the Banner page
Field Description
Enable login banner Enables the display of a login banner.
If this box is unchecked, the Message field is disabled.
The existing contents, if any, remain unchanged, but
aren’t displayed to users.
Message Select one of the messages from the list, or select
Custom and type or paste your own message into the
field below.
If you select one of the built-in samples, it’s copied into
the Message field, and you can then edit the copy.
When you do so, the system resets the list to Custom.
Y our edits don’t af fect the stored sample. You can revert
to the original version of the sample by re-selecting it
from the list.
60Polycom, Inc.
Page 73
Reset System Passwords System Security
See also:
“System Security” on page 35
“Login Policy Settings” on page 57
Reset System Passwords
In an extremely high-security environment, security compliance policies may
require that all passwords be changed at certain intervals, including operating
system passwords.
The Reset System Passwords page is available only if the system is in
maximum security mode. It lets you change these operating system passwords
(such as the password for grub) to new, randomly-generated values. These are
passwords for logins that aren’t possible on a secure system. Resetting these
operating system passwords has no effect on authorized users of the
maintenance interface (Administrators, Auditors, and Provisioners) or
conferencing users.
To reset system passwords
1Make sure there are no calls or conferences on the system.
2Go to Admin > Local Cluster > Reset System Passwords.
3Click Reset Passwords.
The system warns you that active calls and conferences will be terminated
and the system will restart, and asks you to confirm.
4Click Yes.
The system informs you that the passwords have been reset and that
you’re being logged out. Then it restarts. This takes several minutes.
5Wait a few minutes to log back in.
See also:
“System Security” on page 35
“Security Settings” on page 48
“The Consequences of Enabling Maximum Security Mode” on page 54
“Login Policy Settings” on page 57
Polycom, Inc. 61
Page 74
DMA Operations Guide Reset System Passwords
62Polycom, Inc.
Page 75
Local Cluster Configuration
This chapter describes the following Polycom® Distributed Media
Application™ (DMA™) 7000 system configuration topics:
•Network Settings
•Time Settings
•Licenses
4
•Signaling Settings
•Logging Settings
•Local Cluster Configuration Procedures
These are cluster-specific settings that are not part of the data store shared
across superclustered systems. See “Introduction to the Polycom DMA
System” on page 1.
If you’re performing the initial configuration of your Polycom DMA system,
study “Polycom
before you continue.
®
DMA™ System Initial Configuration Summary” on page 23
Polycom, Inc. 63
Page 76
DMA Operations Guide Network Settings
Network Settings
The following table describes the fields on the Network Settings page. These
values are normally set in the USB Configuration Utility during system
installation and rarely need to be changed. See the Getting Started Guide.
Caution
Changing some network settings (host names, IP addresses, or domains) requires
a system restart and terminates all active conferences.
If the system is using a CA-provided identity certificate, changing some network
settings (host names or IP addresses) also requires you to update the certificate. (If
the system is using a self-signed certificate, an updated one is automatically
created.)
You can’t change these network settings while the system is part of a supercluster
or integrated with a Polycom RealPresence Resource Manager or CMA system.
You must first leave the supercluster or terminate the integration. If the cluster is
responsible for any territories (as primary or backup), reassign those territories.
After the change, rejoin the supercluster or Polycom RealPresence Resource
Manager or CMA system. See “Superclustering” on page 227 or “Resource
Management System Integration” on page 185.
Incorrect network information may make the system unuseable and the
management interface unreachable.
Note
This version of the Polycom DMA system eliminates the need for virtual host
name(s) and IP addresses in a single-server system or cluster. When a version 5.0
or earlier single-server DMA system is upgraded to version 5.1 or later, the previous
version's virtual host name(s) and IP addresses become the upgraded version's
physical host name(s) and IP addresses, so accessing the system doesn't change.
(Exception: If only IPv6 is enabled, the system must have two addresses, so a
single-server system must still have a virtual host name and IP address.)
64Polycom, Inc.
Page 77
Network Settings Local Cluster Configuration
Table 4-1Fields on the Network Settings page
Field Description
System IP type IP addressing supported (IPv4, IPv6, or both).
System server
configuration
System split network
setting
Server 1Status, host name, and IP address(es) of the primary
Number of servers (1 or 2) in this cluster.
Caution: Once this is set to 2 server configuration, it
can’t be changed back to 1 server configuration. To
reconfigure a two-server system as two separate
single-server systems, you must use the USB
Configuration Utility. See the Getting S tarted Guide.
Specifies whether management and signaling traffic are
combined on one network interface or split onto
separate interfaces.
Caution: Split networking is for network configurations
in which signaling and management traffic are not on
the same network. To split the network configuration,
you must use different gateways and subnets for
management and signaling, and separate physical
connections for the management and signaling
networks (eth0 for management, eth2 for signaling).
If management and signaling traffic are combined on
the same network (subnet), both use the same physical
and virtual IP addresses and the same network
interface.
server. The IP type and network setting determine which
of the IP fields in this section are enabled.
Host names may contain only letters, numbers, and
internal dashes (hyphens), and may not include a
domain. The reserved values appserv* and dmamgk-*
may not be used for host names.
Server 2Status, host name and IP address(es) of the secondary
server. The fields in this section duplicate those in the
Server 1 section and are enabled only in two-server
configuration.
Polycom, Inc. 65
Page 78
DMA Operations Guide Network Settings
Table 4-1Fields on the Network Settings page (continued)
Field Description
Shared Management
Network Settings
Virtual host name Virtual host name and IP address(es) for the system’s
IPv4
IPv6
Subnet mask IPv4 network mask that defines the subnetwork of the
IPv6 prefix length IPv6 CIDR (Classless Inter-Domain Routing) value that
IPv4 gateway IPv4 address of gateway server for the subnetwork.
Name The name of the management network interface (eth0)
Enable
The settings in this section apply to the entire system
(both servers in two-server configuration), whether
management and signaling are combined or separate.
management (or combined) network interface.
For a one-server configuration, these fields are
disabled. (Exception: If only IPv6 is enabled, the system
must have two addresses, so a single-server system
must still have a virtual host name and IP address.)
Host names may contain only letters, numbers, and
internal dashes (hyphens), and may not include a
domain. The reserved values appserv* and dmamgk-*
may not be used for host names.
system’s management interface.
defines the subnetwork of the system’s management
interface.
is not editable, and it can’t be disabled.
The eth0 interface corresponds with the GB1 jack on
the server.
Auto-negotiation Turn on Auto-negotiation or set Speed and Duplex
Speed
Duplex
Show Link Details Click to see details about link settings and information.
66Polycom, Inc.
manually.
This information may be useful to Polycom Global
Services when troubleshooting a network issue.
Page 79
Network Settings Local Cluster Configuration
Table 4-1Fields on the Network Settings page (continued)
Field Description
Shared Signaling
Network Settings
General System
Network Settings
DNS search domains One or more fully qualified domain names, separated by
The settings in this section are enabled only if
management and signaling traffic are on separate
networks. If so, they apply to the entire system (both
servers in two-server configuration).
For a one-server configuration, the virtual host name
and IP fields are disabled. (Exception: If only IPv6 is
enabled, the system must have two addresses, so a
single-server system must still have a virtual host name
and IP address.)
The settings are the same as those in Shared
Management Network Settings, except that under
Signaling Link, the signaling network interface (eth2)
can be disabled. This capability exists for debugging
purposes.
The eth2 interface corresponds with the GB3 jack on
the server.
(The eth1 interface, which corresponds with the GB2
jack, is reserved for the private network connection
between the two servers in a two-server cluster.)
The settings in this section apply to the entire system
and aren’t specific to management or signaling.
commas or spaces. The system domain you enter
below is added automatically, so you need not enter it.
DNS 1 IP addresses of up to three domain name servers. We
DNS 2
DNS 3
Domain Fully qualified domain name for the system.
Polycom, Inc. 67
strongly recommend specifying at least one DNS
server. A DNS server must be specified in order to
connect to the Active Directory. See “Microsoft Active
Directory Integration” on page 163.
Page 80
DMA Operations Guide Network Settings
Table 4-1Fields on the Network Settings page (continued)
Field Description
Signaling DSCPThe Differentiated Services Code Point value (0 - 63) to
put in the DS field of IP packet headers.
The DSCP value is used to classify packets for quality
of service (QoS) purposes.
Default IPv6 gateway The interface to use for accessing the IPv6 gateway,
generally eth0. Optionally, the gateway’s address and
the interface, specified as:
<IPv6_address>%eth0
Default IPv4 gateway If management and signaling traffic are on separate
networks, select which of the two networks’ gateway
servers is the default.
Y our choice depends on your network configuration and
routing. Typically, unless all the endpoints, MCUs, and
other devices that communicate with the system are on
the same subnet, you’d select the signaling network.
See also:
“Local Cluster Configuration” on page 63
“Local Cluster Configuration Procedures” on page 82
Routing Configuration Dialog Box
In the Network page’s action list, the Routing Configuration command opens
the Routing Configuration dialog box, where you can add or delete network
routing rules (IPv4, IPv6, or both, depending on the System IP type setting on
the Network page). The Show raw routing configuration button lets you view
the operating system’s underlying routing configuration.
In a split network configuration, routing rules are necessary for proper routing
of network traffic. In a combined network configuration, the operating
system’s underlying routing configuration is likely sufficient unless you need
a special rule or rules for your particular network. If you aren’t sure, consult
the appropriate IT staff or network administrator for your organization.
The following table describes the fields in the Routing Configuration dialog
box. If System IP type is set to IPv4 + IPv6, the dialog box contains two
essentially identical sections, one for each IP type. Each section contains the
input fields listed below, a table showing the defined routing rules, and
buttons for adding and deleting routes.
68Polycom, Inc.
Page 81
Time Settings Local Cluster Configuration
Table 4-2Routing Configuration dialog box
Field Description
Host/Network The IP address of the destination network host or
segment.
Prefix length The prefix length that, together with the Host/Network
address, defines the subnet for this route.
For IPv4, a prefix length of 24 is equivalent to specifying
a subnet mask of 255.255.255.0. A prefix length of 16 is
equivalent to specifying a subnet mask of 255.255.0.0.
Interface In split network configuration, select the interface for
this route.
Via IP address of router for this route. Optional, and only
needed for non-default routers.
When you add a routing rule, it appears in the table below the input fields.
Select a rule and click Delete selected route to delete it. Click Show raw routing configuration to display the operating system’s underlying routing
configuration.
Time Settings
See also:
“Network Settings” on page 64
The following table describes the fields on the Time Settings page. These
values are normally set in the USB Configuration Utility during system
installation and rarely need to be changed. See the Getting Started Guide.
Caution
Changing time settings requires a system restart and terminates all active
conferences.
You can’t change the system’s time settings while it’s integrated with a Polycom
RealPresence Resource Manager or CMA system or part of a supercluster. The
integration must first be terminated or the cluster removed from the supercluster.
See “Resource Management System Integration” on page 185 or “Superclustering”
on page 227 .
We strongly recommend specifying NTP servers.
Polycom, Inc. 69
Page 82
DMA Operations Guide Licenses
Table 4-3Fields on the Time Settings page
Field Description
System time zone Time zone in which the system is located. We strongly
recommend selecting the time zone of a specific
geographic location (such as America/Denver), not one
of the generic GMT offsets (such as GMT+07 POSIX).
If you really want to use a generic GMT offset (for
instance, to prevent automatic daylight saving time
adjustments), note that they use the Linux/Posix
convention of specifying how many hours ahead of or
behind local time GMT is. Thus, the generic equivalent
of America/Denver (UTC-07:00) is GMT+07, not
GMT-07.
Licenses
Manually set system
time
NTP Servers Specify up to three time servers for maintaining system
We don’t recommend setting time and date manually.
time (we recommend three). Enter IP addresses or fully
qualified domain names.
See also:
“Local Cluster Configuration” on page 63
“Local Cluster Configuration Procedures” on page 82
The Polycom DMA system is licensed for the number of concurrent calls it can
handle and optionally for API access. See “License the Polycom DMA System”
on page 26 for more information about licensing.
The following table describes the fields on the Licenses page.
Table 4-4Fields on the Licenses page
Field Description
Active License
Licensed calls The maximum number of concurrent calls that the
license enables.
Licensed capabilities Currently, the only separately licensed capability is
access to the RealPresence Platform API.
Note: An API license isn't required in order for a
Polycom RealPresence Resource Manager system to
access the API. It's only needed for a client application
you or a third party develop.
70Polycom, Inc.
Page 83
Signaling Settings Local Cluster Configuration
Table 4-4Fields on the Licenses page (continued)
Field Description
Activation Keys
A two-server cluster has two sets of the fields below, one for each server in the
cluster.
System serial number Th e serial number of the specified server.
Activation key The activation key you received from Polycom for this
server. The key for each server must be the correct one
for that server’s serial number.
See also:
“Local Cluster Configuration” on page 63
“Local Cluster Configuration Procedures” on page 82
Signaling Settings
On the Signaling Settings page, you can configure H.323, SIP, and XMPP
signaling.
H.323 and SIP Signaling
If H.323 signaling is enabled, the Polycom DMA system’s Call Server operates
as a gatekeeper, receiving registration requests and calls from H.323 devices.
If SIP signaling is enabled, Call Server operates as a SIP registrar and proxy
server, receiving registration requests and calls from SIP devices. If both are
enabled, the system automatically serves as a SIP <–> H.323 gateway.
Either H.323, SIP, or both must be enabled in order for the DMA system’s
Conference Manager to receive calls for multipoint conferences (virtual
meeting rooms, or VMRs) and distribute them among its pool of MCUs.
On this page, you can also:
•Turn on H.235 authentication for H.323 devices.
•Turn on SIP digest authentication for SIP devices.
•Click a Device authentication settings link to go to the Device
Authentication page, where you can configure SIP device authentication
and maintain the inbound device authentication list for both H.323 and
SIP devices (see “Device Authentication” on page 264).
Polycom, Inc. 71
Page 84
DMA Operations Guide Signaling Settings
Note
Y ou can turn authentication off and on for specific devices (assuming that it’ s tu rned
on here for that device type). See “Edit Device Dialog Box” on page 98.
•Configure specific ports or prefixes for “unauthorized” or “guest” SIP
calls that can only access specific resources (VMRs, VEQs, or a SIP peer).
H.323 Device Authentication
In an environment where H.235 authentication is used, H.323 devices include
their credentials (name and password) in registration and signaling (RAS)
requests. The Polycom DMA system authenticates requests as follows:
•If it’s a signaling request (ARQ, BRQ, DRQ) from an unregistered
endpoint, the Call Server doesn’t authenticate the credentials.
•If it’s a signaling request from a registered endpoint, or if the request is
from an MCU or neighbor gatekeeper, the Call Server attempts to
authenticate using its device authentication list (see “Device
Authentication” on page 264).
If the credentials can’t be authenticated, the Call Server rejects the registration
or signaling request. For call signaling requests, it also rejects the request if the
credentials differ from those with which the device registered.
SIP Device Authentication
The SIP digest authentication mechanism is described in RFC 3261, starting in
section 22, and in RFC 2617, section 3). When a SIP endpoint registers with or
calls the Polycom DMA system, if the request includes authentication
information, that information is checked against the Call Server’s local device
authentication list (see “Device Authentication” on page 264).
SIP authentication can be enabled at the port/transport level or (for
“unauthorized” access prefixes) the prefix level. If SIP authentication is
enabled and an endpoint’s request doesn’t include authentication information,
the Call Server responds with an authentication challenge containing the
required fields (see the RFCs). If the endpoint responds with valid
authentication information, the system accepts the registration or call.
Note
If inbound SIP authentication is turned on for a port or prefix, the Polycom DMA
system challenges any SIP message coming to the system via that port or with that
prefix. Any SIP peer and other device that interacts with the system by those means
must be configured to authenticate itself, or you must turn off Device authentication for that specific device. See “Edit Device Dialog Box” on page 98.
72Polycom, Inc.
Page 85
Signaling Settings Local Cluster Configuration
Untrusted SIP Call Handling Configuration
You can configure special handling for SIP calls from devices outside the
corporate firewall that aren’t registered with the Polycom DMA system and
aren’t from a federated division or enterprise. These calls ome to the DMA
system via session border controllers (SBCs) such as a Polycom RealPresence
Access Director or Acme Packet Session Border Controller device.
For security purposes, you can route such “unauthorized” or “guest” calls to
one or more specific VMRs (virtual meeting rooms) or VEQs (virtual entry
queues), or to a specific SIP peer. You do so by creating a separate set of
“guest” dial rules used only for these untrusted calls. See “Dial Rules” on
page 243.
Depending on the SBC and how it’s configured, such calls can be
distinguished in one of two ways:
•By port: The SBC routes untrusted calls to a specific port.
•By prefix: The SBC adds a specific prefix in the Request-URI of the first
INVITE message for the call.
The RealPresence Access Director SBC supports only the prefix method. The
Acme Packet Session Border Controller SBC can be configured for either.
In the SIP Settings section of the page, you can add one or more ports,
prefixes, or both for untrusted calls. For each entry, you can specify whether
authentication is required. Calls to an untrusted call prefix follow the
authentication setting for that prefix, not for the port on which they’re
received. For port entries, you can also specify the transport, and if TLS,
whether certificate validation is required (mTLS).
Note
If Skip certificate validation for encrypted signaling is turned off on the Security
Settings page, then Require certificate validation for TLS is turned on for both
authorized and unauthorized ports, and it can’t be turned off. See “Security
Settings” on page 48.
XMPP Signaling
If XMPP signaling is enabled, the Polycom DMA system’s Call Server operates
as an XMPP server, providing chat and presence services to the XMPP clients
that log into it.
Logins are accepted from any DMA user, local or Active Directory. Clients log
in by sending an XMPP login message to the virtual signaling address (IP or
FQDN) and XMPP port number of the DMA system, such as:
dma1.polycom.com:5223
Logged-in clients have presence and chat capability amongst themselves and
with clients logged into any federated XMPP service. Federation is automatic
and depends simply on DNS resolution of domains.
Polycom, Inc. 73
Page 86
DMA Operations Guide Signaling Settings
See xmpp.org for more information.
Signaling Settings Fields
The following table describes the fields on the Signaling Settings page.
Table 4-5Fields on the Signaling Settings page
Field Description
H.323 Settings
Enable H.323 signaling Enables the system to receive H.323 calls.
Caution: Disabling H.323 terminates any existing H.323
calls. When you click Update, the system prompts you
to confirm.
Status Indicates whether the system’s H.323 gatekeeper
functions are active.
H.225 port Specifies the port number the system’s gatekeeper uses
for call signaling.
We recommend using the default port number (1720),
but you can use any value from 1024 to 65535 that’s not
already in use and is different from the RAS port.
RAS port Specifies the port number the system’s gatekeeper uses
for RAS (Registration, Admission and Status).
We recommend using the default port number (1719),
but you can use any value from 1024 to 65535 that’s not
already in use and is different from the H.225 port.
H.245 open firewall
ports
H.323 multicast Enables the system to support gatekeeper discovery
Enable H.323 device
authentication
SIP Settings
Enable SIP signaling Enables the system to receive Session Initiation
Shows the port range used for H.245 so you can
configure your firewall accordingly. This is display only.
(GRQ messages from endpoints) as described in the
H.323 and H.225.0 specifications.
Check the box to turn on H.323 device authentication.
Click Device authentication settings to go to the
Device Authentication page and add authentication
credentials (see “Device Authentication” on page 264).
Protocol (SIP) calls.
Caution: Disabling SIP terminates any existing SIP
calls. When you click Update, the system prompts you
to confirm.
74Polycom, Inc.
Page 87
Signaling Settings Local Cluster Configuration
Table 4-5Fields on the Signaling Settings page (continued)
Field Description
Authorized ports
Unencrypted SIP
port
Enable
authentication
TLS port Specifies the port number the system uses for TLS.
To permit unencrypted SIP connections, select either
TCP or UDP/TCP from the list. Select None to disallow
unencrypted SIP connections.
We recommend using the default port number (5060),
but you can use any value from 1024 to 65535 that’s not
already in use and is different from the TLS port and
from any “unauthorized” or “guest” ports that your
SBC(s) may be configured to use for calls to the system.
Check the box to turn on SIP device authentication for
unencrypted SIP.
Click the Device authentication settings link to go to
the Device Authentication page to configure SIP
device authentication and add device authentication
credentials (see “Device Authentication” on page 264).
The settings on that page determine the realm used for
authentication and whether the Call Server responds to
unauthenticated requests with 401 (Unauthorized) or
407 (Proxy Authentication Required).
We recommend using the default port number (5061),
but you can use any value from 1024 to 65535 that’s not
already in use and is different from the UDP/TCP port
and from any “unauthorized” or “guest” ports that your
SBC(s) may be configured to use for calls to the system.
If SIP signaling is enabled, TLS is automatically
supported. Unless unencrypted SIP connections are
specifically permitted, TLS must be used.
Enable
authentication
Require certificate
validation for TLS
Polycom, Inc. 75
Check the box to turn on SIP device authentication for
encrypted SIP.
Click the Device authentication settings link to go to
the Device Authentication page to configure SIP
device authentication and add device authentication
credentials (see “Device Authentication” on page 264).
The settings on that page determine the realm used for
authentication and whether the Call Server responds to
unauthenticated requests with 401 (Unauthorized) or
407 (Proxy Authentication Required).
Check the box to enable mutual TLS (mTLS), requiring
each caller to present a valid certificate.
Page 88
DMA Operations Guide Signaling Settings
Table 4-5Fields on the Signaling Settings page (continued)
Field Description
Unauthorized ports Lists the ports used by your SBC(s) for untrusted calls,
showing the transport type for each and, for TLS,
whether a certificate is required. The Authentication
column indicates whether calls to that port are passed
without challenge, challenged for authentication
credentials, or blocked.
Click Add to add a port to the list (see “Add Guest Port
Dialog Box” on page 77). Click Edit to edit the selected
entry (see “Edit Guest Port Dialog Box” on page 78) or
Delete to delete it.
Unauthorized prefixes Lists the prefixes used by your SBC(s) for untrusted
calls. The Strip Pref ix column indicates whether the
DMA system should immediately strip the prefix. The
Authentication column indicates whether calls to that
port are passed without challenge, challenged for
authentication credentials, or blocked.
Click Add to add a prefix to the list (see “Add Guest
Prefix Dialog Box” on page 79). Click Edit to edit the
selected entry (see “Edit Guest Prefix Dialog Box” on
page 80) or Delete to delete it.
XMPP Settings
Enable XMPP signaling Enables the system to act as an Extensible Messaging
and Presence Protocol (XMPP) server for chat and
presence services.
Caution: Disabling XMPP terminates any existing
XMPP logins. When you click Update, the system
prompts you to confirm.
Unencrypted XMPP
port
TLS port Specifies the port number the system uses for TLS.
If security settings permit unencrypted XMPP
connections (see “Security Settings” on page 48), you
can turn it on here.
We recommend using the default port number (5222),
but you can use any value from 1024 to 65535 that’s not
already in use and is different from the TLS port.
We recommend using the default port number (5223),
but you can use any value from 1024 to 65535 that’s not
already in use and is different from the UDP/TCP port.
If XMPP signaling is enabled, TLS is automatically
supported. Unless unencrypted XMPP connections are
specifically permitted, TLS must be used. See “Security
Settings” on page 48.
76Polycom, Inc.
Page 89
Signaling Settings Local Cluster Configuration
See also:
“Local Cluster Configuration” on page 63
“Local Cluster Configuration Procedures” on page 82
Add Guest Port Dialog Box
The Add Guest Port dialog box appears when you click the Add button next
to the Unauthorized ports list in the SIP Settings section of the Signaling Settings page. It let s you add a port to the li st of p orts us ed for “ unauthori zed”
or “guest” calls.
The following table describes the fields in the Add Guest Port dialog box.
Table 4-6Add Guest Port dialog box
Field Description
Port The SIP signaling port number for this entry.
This is the port number that an SBC is configured to use
for untrusted calls to the DMA system via the transport
specified below.
Transport The transport supported on this port.
Require certificate
validation for TLS
Authentication Select one of the following:
For TLS transport, check this box to enable mutual TLS
(mTLS), requiring callers to present a valid certificate.
Note: If Skip certificate validation for encrypted
signaling is turned off on the Security Settings page,
then Require certificate validation for TLS is turned
on for both authorized and unauthorized ports, and it
can’t be turned off. See “Security Settings” on page 48 .
•None — The system doesn’t issue authentication
challenges or check authentication credentials for
calls to this port.
•Authenticate — The system issues authentication
challenges and checks authentication credentials
for calls to this port.
The settings on the Device Authentication page
(see “Device Authentication” on page 264)
determine the realm used for authentication and
whether the Call Server responds to
unauthenticated requests with 401 (Unauthorized)
or 407 (Proxy Authentication Required).
•Block — The system blocks calls to this port.
Polycom, Inc. 77
Page 90
DMA Operations Guide Signaling Settings
See also:
“Signaling Settings” on page 71
“Local Cluster Configuration Procedures” on page 82
Edit Guest Port Dialog Box
The Edit Guest Port dialog box lets you edit an Unauthorized ports list entry
in the SIP Settings section of the Signaling Settings page.
The following table describes the fields in the Edit Guest Port dialog box.
Table 4-7Edit Guest Port dialog box
Field Description
Port The SIP signaling port number for this entry.
This is the port number that an SBC is configured to use
for untrusted calls to the DMA system via the transport
specified below.
Transport The transport supported on this port.
Require certificate
validation for TLS
Authentication Select one of the following:
For TLS transport, check this box to enable mutual TLS
(mTLS), requiring callers to present a valid certificate.
Note: If Skip certificate validation for encrypted
signaling is turned off on the Security Settings page,
then Require certificate validation for TLS is turned
on for both authorized and unauthorized ports, and it
can’t be turned off. See “Security Settings” on page 48 .
•None — The system doesn’t issue authentication
challenges or check authentication credentials for
calls to this port.
•Authenticate — The system issues authentication
challenges and checks authentication credentials
for calls to this port.
The settings on the Device Authentication page
(see “Device Authentication” on page 264)
determine the realm used for authentication and
whether the Call Server responds to
unauthenticated requests with 401 (Unauthorized)
or 407 (Proxy Authentication Required).
•Block — The system blocks calls to this port.
See also:
“Signaling Settings” on page 71
“Local Cluster Configuration Procedures” on page 82
78Polycom, Inc.
Page 91
Signaling Settings Local Cluster Configuration
Add Guest Prefix Dialog Box
The Add Guest Prefix dialog box appears when you click the Add button next
to the Unauthorized prefixes list in the SIP Settings section of the Signaling Settings page. It lets you add a prefix to the list of prefixes used for
“unauthorized” or “guest” calls.
The following table describes the fields in the Add Guest Prefix dialog box.
Table 4-8Add Guest Prefix dialog box
Field Description
Prefix The prefix number for this entry.
This is the number that an SBC is configured to add to
the Request-URI of the first INVITE message for
untrusted calls to the DMA system.
Strip prefix Check this box to have the system immediately strip this
prefix from the INVITE message.
Authentication Select one of the following:
•None — The system doesn’t issue authentication
challenges or check authentication credentials for
calls with this prefix.
•Authenticate — The system issues authentication
challenges and checks authentication credentials
for calls with this prefix.
The settings on the Device Authentication page
(see “Device Authentication” on page 264)
determine the realm used for authentication and
whether the Call Server responds to
unauthenticated requests with 401 (Unauthorized)
or 407 (Proxy Authentication Required).
•Block — The system blocks calls with this prefix.
See also:
“Signaling Settings” on page 71
“Local Cluster Configuration Procedures” on page 82
Polycom, Inc. 79
Page 92
DMA Operations Guide Signaling Settings
Edit Guest Prefix Dialog Box
The Edit Guest Prefix dialog box lets you edit an Unauthorized prefixes list
entry in the SIP Settings section of the Signaling Settings page.
The following table describes the fields in the Edit Guest Prefix dialog box.
Table 4-9Edit Guest Prefix dialog box
Field Description
Prefix The prefix number for this entry.
This is the number that an SBC is configured to add to
the Request-URI of the first INVITE message for
untrusted calls to the DMA system.
Strip prefix Check this box to have the system immediately strip this
prefix from the INVITE message.
Authentication Select one of the following:
•None — The system doesn’t issue authentication
challenges or check authentication credentials for
calls with this prefix.
•Authenticate — The system issues authentication
challenges and checks authentication credentials
for calls with this prefix.
The settings on the Device Authentication page
(see “Device Authentication” on page 264)
determine the realm used for authentication and
whether the Call Server responds to
unauthenticated requests with 401 (Unauthorized)
or 407 (Proxy Authentication Required).
•Block — The system blocks calls with this prefix.
See also:
“Signaling Settings” on page 71
“Local Cluster Configuration Procedures” on page 82
80Polycom, Inc.
Page 93
Logging Settings Local Cluster Configuration
Logging Settings
The following table describes the fields on the Logging Settings page.
Table 4-10Fields on the Logging Settings page
Field Description
Logging level Leave the default, Production, unless advised to
change it by Polycom support. Debug is useful for
troubleshooting. Verbose debug is not recommended
for production systems.
Rolling frequency If rolling the logs daily (the default) produces logs that
are too large, shorten the interval.
Retention period The number of days to keep log archives. For most
systems, we recommend setting this to 7.
Alert when logs exceed The percentage of the 1 GB log file capacity in use at
which the system displays a warning on the dashboard.
Local log forwarding Enables you to forward selected log entries to a central
log management server (such as Graylog2).
Specify:
•The address of the destination server. It must be
running some version of syslog.
•The socket type (transport) for which the destination
server’s version of syslog is configured. Most
versions of syslog support only UDP , the default, but
syslog-ng also supports TCP.
•The facility value. Default is Local0.
•The log or logs to forward.
Note: The DMA system’s server .log entries are mapped
to syslog-compliant severities (a “warn” message from
server.log arrives at the destination server. with
syslog-compliant “warn” level). All other logs being
forwarded are assigned the syslog-compliant “notice”
severity.
Each log message is forwarded with its server-side
timestamp intact. The receiving syslog adds its own
timestamp, but preserving the DMA-applied timestamp
makes it easier to accurately troubleshoot time-sensitive
events.
See also:
“Local Cluster Configuration” on page 63
“Local Cluster Configuration Procedures” on page 82
Polycom, Inc. 81
Page 94
DMA Operations Guide Local Cluster Configuration Procedures
Local Cluster Configuration Procedures
This section describes the following Polycom DMA 7000 system configuration
procedures:
•Add Licenses
•Configure Signaling
•Configure Logging
Add Licenses
If you’re performing the initial configuration of your Polycom DMA system,
study “Polycom
before you continue. Other tasks are required that are described elsewhere.
Adding licenses to your Polycom DMA system is a two-step process:
•Request a software activation key code for each server.
•Enter the activation key codes into the system.
The procedures below describe the process.
To request a software activation key code for each server
1Log into the Polycom DMA system as an administrator and go to Admin
> Local Cluster > Licenses.
2Record the serial number for each Polycom DMA server:
Server A: ____________________________
Server B: ____________________________ (none for single-server system)
3Go to http://www.polycom.com/activation.
®
DMA™ System Initial Configuration Summary” on page 23
4If you don’t already have one, register for an account. Then log in.
5Select Product Activation.
6In the License Number field, enter the software license number listed on
the first (or only) server’s License Certificate (shipped with the product).
7In the Serial Number field, enter the first (or only) server’s serial number
(which you recorded in step 2).
8Click Generate.
9When the activation key for the first (or only) server appears, record it:
Server A: __________-__________-_________-___________
10 If you have a single-server Polycom DMA system, you’re finished with
this procedure. Continue to the next procedure.
82Polycom, Inc.
Page 95
Local Cluster Configuration Procedures Local Cluster Configuration
11 If you have a two-server cluster, repeat steps 6–8, this time entering the
second license number you received and the second server’s serial
number (also recorded in step 2).
Caution
An activation key is linked to a specific server’s serial number. For a two-server
cluster, you must generate the activation key for each server using that server’s
serial number. Licensing will fail if you generate both activation keys from the same
server serial number.
12 When the activation key for the second server appears, record it:
Server B: __________-__________-_________-___________
To enter license activation key codes
1Go to Admin > Local Cluster > Licenses.
2In the Activation key field for the first (or only) server, enter the
activation key code that was generated for that server’s serial number.
Configure Signaling
Caution
An activation key is linked to a specific server’s serial number. Each Activation
Key field is labeled with a serial number. For a two-server cluster, make sure that
the activation key code you enter for each server is the correct one for that server’s
serial number.
3If you have a two-server cluster, in the Activation key field for the second
server, enter the activation key code that was generated for that server’s
serial number.
4Click Update.
A dialog box informs you that the licenses have been updated.
5Click OK.
See also:
“Licenses” on page 70
To configure signaling
1Go to Admin > Local Cluster > Signaling Settings.
2To make the system accessible via H.323 calls:
aSelect Enable H.323 signaling.
Polycom, Inc. 83
Page 96
DMA Operations Guide Local Cluster Configuration Procedures
bLeave the default port numbers (1720 for H.225, 1719 for RAS) unless
you have a good reason for changing them.
cSelect H.323 multicast to support gatekeeper discovery messages
from endpoints.
dTo turn on H.235 authentication, select Enable H.323 device
authentication.
Device authentication credentials must be added on the Inbound
Authentication tab of the Device Authentication page. Click the
Device authentication settings link to go directly there.
3To make the system accessible via SIP calls:
aSelect Enable SIP signaling.
bIf the system’s security settings permit unencrypted SIP connections,
optionally set Unencrypted SIP port to TCP or UDP/TCP.
You must have the Administrator role to change security settings. See
“Security Settings” on page 48.
Note
The system only answers UDP calls if that transport is enabled. But for
communications back to the endpoint, it uses the transport protocol that the
endpoint requested (provided that the transport is enabled, and for TCP, that
unencrypted connections are permitted).
For more information about this and other aspects of SIP, see RFC 3261.
cLeave the default port numbers (5060 for TCP/UDP, 5061 for TLS)
unless you have a good reason for changing them.
dTo turn on SIP digest authentication for either the unencrypted or TLS
port, select the corresponding Enable authentication check box.
Device authentication credentials must be added on the Inbound
Authentication tab of the Device Authentication page. Click the
Device authentication settings link to go directly there.
eTo enable mutual TLS (mTLS), select Require certificate validation
for TLS.
4To enable the system to receive untrusted calls (see “Untrusted SIP Call
Handling Configuration” on page 73) from SIP session border controllers
(SBCs) configured to route such calls to special ports, do the following:
aUnder Unauthorized ports, click Add.
The Add Guest Port dialog box opens.
bSpecify the port number, the transport, whether authentication is
required, and for TLS, whether certificate validation is required
(mTLS). Click OK.
The new entry is added to the Unauthorized ports list.
84Polycom, Inc.
Page 97
Local Cluster Configuration Procedures Local Cluster Configuration
cRepeat for each additional port on which to receive “unauthorized” or
“guest” calls.
5To enable the system to receive untrusted calls (see “Untrusted SIP Call
Handling Configuration” on page 73) from SIP session border controllers
(SBCs) configured to add a specific prefix in the Request-URI of the
INVITE message for such calls, do the following:
aUnder Unauthorized prefixes, click Add.
The Add Guest Prefix dialog box opens.
bSpecify the prefix number, whether it should be stripped, and whether
authentication is required. Click OK.
The new entry is added to the Unauthorized prefixes list.
cRepeat for each additional prefix used for “unauthorized” or “guest”
calls.
6To enable the system’s XMPP server:
aSelect Enable XMPP signaling.
bIf the system’s security settings permit unencrypted XMPP
connections, turn on Unencrypted XMPP port.
You must have the Administrator role to change security settings. See
“Security Settings” on page 48.
cLeave the default port numbers (5222 for unencrypted XMPP, 5223 for
TLS) unless you have a good reason for changing them.
7Click Update.
A dialog box informs you that the configuration has been updated.
8Click OK.
The system processes the configuration. The Status field shows the
current H.323 signaling state.
9If you enabled the system to receive “unauthorized” or “guest” calls, do
the following:
aGo to Admin > Call Server > Dial Rules and click in the Dial rules for
unauthorized calls list to give it focus.
bAdd one or more dial rules to be used for routing “unauthorized” or
“guest” calls. See “Dial Rules” on page 243.
An unauthorized call rule can route calls to a conference room ID
(virtual meeting room, or VMR), a virtual entry queue (VEQ), or a SIP
peer.
See also:
“Signaling Settings” on page 71
Polycom, Inc. 85
Page 98
DMA Operations Guide Local Cluster Configuration Procedures
Configure Logging
To configure logging
1Go to Admin > Local Cluster > Logging Settings.
2Change Rolling frequency and Retention period as desired.
3If requested to do so by Polycom support, change Logging level.
4Click Update.
A dialog box informs you that the configuration has been updated.
5Click OK.
See also:
“Logging Settings” on page 81
86Polycom, Inc.
Page 99
Device Management
This chapter describes the following Polycom® Distributed Media
Application™ (DMA™) 7000 system’s network device management pages:
•Active Calls
•Endpoints
•Site Statistics
5
Active Calls
•Site Link Statistics
•External Gatekeeper
•External SIP Peer
•External SBC
Other Network menu topics are addressed in the following chapters:
•“Superclustering” on page 227 (DMAs)
•“MCU Management” on page 131
•“Site Topology” on page 283
The Active Calls page lets you monitor the calls in progress (managed by the
Call Server) and disconnect an active call.
The search pane above the two lists lets you find calls matching the criteria you
specify. Click the down arrow to expand the search pane. You can search for
an originator or destination device by its name, alias, or IP address.
The system matches any string you enter against the beginning of the values
for which you entered it. If you enter “10.33.17” in the Originator field, it
displays calls from devices whose IP addresses are in that subnet. To search for
a string not at the beginning of the field, you can use an asterisk (*) as a
wildcard.
Leave a field empty (or select the blank entry from a list) to match all values.
Polycom, Inc. 87
Page 100
DMA Operations Guide Active Calls
Note
Specifying a filter that includes too many active calls can be a drain on system
resources.
The calls that match your search criteria (up to 500) appear in the lower list.
You can pin a call that you want to study. This moves it to the upper list, and
it remains there, even after the call ends, until you unpin it.
Details about the selected call are available in the Call Info, Originator,
Destination, and Bandwidth tabs of the pane on the right. This information
(and more) is also available in the Call Details dialog box, which appears
when you click Show Call Details (in the Actions list). See “Call Details
Dialog Box” on page 89 for descriptions of the data.
The following table describes the parts of the Active Calls list.
Table 5-1Information in the Active Calls list
Column Description
(Pin State) Click to pin a call, moving it to the top list and keeping its
information available even if the call ends. Click again to
unpin it.
Start Time Time the call began (first signaling event).
Originator Source of the call (the device’s display name, if
available; otherwise, its name, alias, or IP address, in
that order of preference).
Dial String Dial string sent by originator, when available.
Destination Destination of the call (the device’s display name, if
available; otherwise, its name, alias, or IP address, in
that order of preference).
Bit Rate Bit rate (kbps) of the call. A down arrow indicates that
the call was downspeeded. Hover over it to see details.
Class of Service Class of service (Gold, Silver, or Bronze) of the call.
See also:
“Device Management” on page 87
“Call Details Dialog Box” on page 89
“Endpoints” on page 91
88Polycom, Inc.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.