LG Conference Phone AVS2400 User Manual

Page of 76
Installation
31
3
Ins
talla
tion
 - Select Answer and press OK to accept the call.
 - Select Ignore and press OK to reject the call.
•  Auto Answer Mute: If it is set to Enabled (the default), and the Auto Answer preference is set to Enabled, the system is 
muted when a call connects.
•  Auto Answer Multiway Call: If it is set to Enabled, the system automatically answers after the first call is connected. The 
Multiway call function is allowed only for audio call.
Admission Control
You can configure your system to automatically reject incoming calls by setting preferences in Administrator Preferences : 
Calls menu. If it is set to Enabled, the system automatically rejects the incoming calls if it is under a heavy load. 
Configuring Security Preferences
You can set preferences in Administrator Preferences : Security to manage the administrator and user passwords and control 
remote access to the system through the web, telnet, SNMP and ssh. You can also enable H.235 AES security for calls.
Controlling Remote Administration
By default, remote access to LG video conference system through the web (http), SNMP, and ssh is enabled; remote access 
through a telnet session is disabled. To enable or disable remote access through any of these mechanisms, configure 
preferences in Administrator Preferences : Security : General
Enabling H.235 AES Security
This unit supports H.235 128-bit AES security using the Diffie Hellman key exchange protocol in H.323 and H.460 calls. AES 
interoperability is supported with the third party devices identified in the Release Notes on the Support page of www.lifesize.
com.
To enable AES security, you must set the Administrator Preferences : Security : General : H.235 AES Security preference 
to either Enabled or Strict. When set to Enabled, calls connect, but are encrypted only if the far end supports AES encryption. 
When set to Strict, calls do not connect if the far end does not support AES security. Encrypted calls are indicated by 
encryption icons in the caller ID, Call Manager list, and Call Statistics list. Refer to “Caller ID” on page 59 for a description of the 
icons.