Cisco Cisco TelePresence Management Suite (TMS) Version 15 Installation Guide
Getting started with Cisco TMS
Cisco TelePresence Management Suite Installation and Getting Started Guide (13.2)
Page 64 of 77
Creating a scheduled conference
When scheduling conferences with Cisco TMS, it is not necessary for the user to worry about network
protocols, MCUs, or gateways. Cisco TMS handles infrastructure choices and compatibility checking of all
these things automatically. Advanced users may still tune and tweak the selected methods for the
conference as needed.
protocols, MCUs, or gateways. Cisco TMS handles infrastructure choices and compatibility checking of all
these things automatically. Advanced users may still tune and tweak the selected methods for the
conference as needed.
Several interfaces for scheduling conferences are available depending on the need of the user:
n
Scheduler is an interface aimed at a general audience, with administrator-defined limits on the allowed
settings.
settings.
n
Free/Busy Overview
is best when you just need to know which systems are available for a quick meeting.
n
New Conference
is the most robust interface, as it offers all the possible control and settings available in
Cisco TMS. This page is used in the procedure described below.
To book a conference:
1. Go to
Booking > New Conference
.
New Conference
2. Enter a conference title. It will be displayed in all Cisco TMS interfaces, and in email notifications about
the conference
3. Set the start time and the duration or end time for the conference.
4. Click Recurrence Settings to create a series of meetings that are tied together, such as a weekly or daily
meeting.
5. In the
Advanced Settings
section, set configuration options for this conference. Most settings will take
their default values from the Conference Default values configured under
Administrative Tools
. Refer to
the help for an overview of all available settings. Note that if Secure is set to Yes, Cisco TMS will only
allow systems that support encryption to participate in the conference.
allow systems that support encryption to participate in the conference.
6. Optionally, add notes about the conference in
Conference Information
.