Cisco TRC5 CTS-RMT-TRC5= Manual De Usuario
Los códigos de productos
CTS-RMT-TRC5=
31
Deployment Details
August 2012 Series
31
Step 22:
From the Home screen, navigate to
Settings > System
Information.
Confirm the system information is correct and the endpoint is
registered with the VCS.
Step 23:
If the endpoint does not register with the SIP proxy, return to Step
21 and do the following:
• Remove the Proxy 1 > Address of the VCS server and save it blank.
• Re-enter the IP address and save it.
• Confirm the endpoint is registered with the SIP proxy by following Step
• Re-enter the IP address and save it.
• Confirm the endpoint is registered with the SIP proxy by following Step
23.
Step 24:
Press the
Home
button on the remote.
Step 25:
Repeat Step 1 through Step 24 of this procedure for all your SIP
endpoints.
After the endpoints have been configured, it is time to test the point-to-point
calling.
calling.
Procedure 3
Test point-to-point video calling
Step 1:
If there is no menu on the screen, press the
Home
button on the
remote.
Step 2:
Navigate to
Call
, and enter the URI of another SIP endpoint regis-
tered to VCS. (Example:
85234730@cisco.local
)
Step 3:
On the remote control, press the green
Call
button.
The call is connected.
Step 4:
After the call is connected, press the red
end-call button on the
remote, and then select
Disconnect 85234730
.
The point-to-point calling is complete.
Procedure 4
Block video traffic on backup links
(Optional)
In some cases, you may want to prevent video endpoints from operating
when a failover to a backup WAN link occurs. Implementing this blocking
avoids transmitting video over a lossy link and lowers the cost of a WAN
failure by reducing costly bandwidth usage while maintaining the data con-
nectivity that end users expect.
In some cases, you may want to prevent video endpoints from operating
when a failover to a backup WAN link occurs. Implementing this blocking
avoids transmitting video over a lossy link and lowers the cost of a WAN
failure by reducing costly bandwidth usage while maintaining the data con-
nectivity that end users expect.
This configuration will block H.323 and SIP video traffic from passing over
the specified interface of a router. It can be applied to the backup router of a
dual router design or to the secondary link of a single router design.
the specified interface of a router. It can be applied to the backup router of a
dual router design or to the secondary link of a single router design.
Step 1:
Login to the router with a username that has the ability to make
configuration changes, and enter enable mode.
Step 2:
Configure the access list that will block SIP: 5060 (TCP/UDP),
Secure SIP: 5061 (TCP/UDP), H.323 Gatekeeper RAS: 1719 (TCP/UDP) H323
Q.931: 1720 (TCP/UDP), standard RTP ports: 16384-32767 (UDP), and allow
all other traffic.
Q.931: 1720 (TCP/UDP), standard RTP ports: 16384-32767 (UDP), and allow
all other traffic.
ip access-list extended ACL-Video-CONTROL
deny tcp any any eq 5060
deny udp any any eq 5060
deny tcp any any eq 5061
deny udp any any eq 5061
deny tcp any any eq 1719
deny udp any any eq 1719
deny tcp any any eq 1720
deny udp any any eq 1720
deny udp any any range 16384 32767
permit ip any any
Step 3:
Apply the ACL to the WAN interface you wish to block video traffic.
interface Tunnel10
ip access-group ACL-Video-CONTROL in