Polycom RMX 1800 Manual De Usuario
![Polycom](https://files.manualsbrain.com/attachments/767eaf955c8cc2b9ce09b520a479458e9ecc719d/common/fit/150/50/d6cfa10805a345f10c5d76edb36fa9cec42388252dcc309ffa6582d04677/brand_logo.png)
Table of Contents
Polycom, Inc
iii
Mixing Encrypted and Non-encrypted Endpoints in one Conference ......... 4-28
Direct Connection to the Conference ................................................................. 4-29
Connection to the Entry Queue .......................................................................... 4-30
Moving from the Entry Queue to Conferences or Between Conferences .... 4-30
Recording Link Encryption ................................................................................. 4-31
Direct Connection to the Conference ................................................................. 4-29
Connection to the Entry Queue .......................................................................... 4-30
Moving from the Entry Queue to Conferences or Between Conferences .... 4-30
Recording Link Encryption ................................................................................. 4-31
Encryption Flag Settings .............................................................................................. 4-31
Enabling Encryption in the Profile ............................................................................. 4-32
Enabling Encryption at the Participant Level .......................................................... 4-33
Monitoring the Encryption Status .............................................................................. 4-34
Enabling Encryption in the Profile ............................................................................. 4-32
Enabling Encryption at the Participant Level .......................................................... 4-33
Monitoring the Encryption Status .............................................................................. 4-34
Lost Packet Recovery Guidelines ....................................................................... 4-35
Enabling Lost Packet Recovery .......................................................................... 4-36
Enabling Lost Packet Recovery .......................................................................... 4-36
Selecting the Conference Lecturer ...................................................................... 4-38
Enabling the Automatic Switching .................................................................... 4-40
Enabling the Automatic Switching .................................................................... 4-40
Lecture Mode Monitoring ........................................................................................... 4-40
Restricting Content Broadcast to Lecturer ................................................................ 4-42
Muting Participants Except the Lecturer ................................................................. 4-43
Restricting Content Broadcast to Lecturer ................................................................ 4-42
Muting Participants Except the Lecturer ................................................................. 4-43
Guidelines .............................................................................................................. 4-43
Enabling the Mute Participants Except Lecturer Option ................................ 4-44
Enabling the Mute Participants Except Lecturer Option ................................ 4-44
SIP Encryption ...................................................................................................... 4-45
Mono ....................................................................................................................... 4-45
Stereo ...................................................................................................................... 4-46
Mono ....................................................................................................................... 4-45
Stereo ...................................................................................................................... 4-46
Guidelines ................................................................................................................ 5-2
Flags Controlling Cascade Layouts ..................................................................... 5-2
DTMF Forwarding ................................................................................................. 5-3
Play Tone Upon Cascading Link Connection .................................................... 5-3
Flags Controlling Cascade Layouts ..................................................................... 5-2
DTMF Forwarding ................................................................................................. 5-3
Play Tone Upon Cascading Link Connection .................................................... 5-3