Cisco Cisco TelePresence MX700 Dépliant
Cisco TelePresence Endpoints and Cisco Unified Communications Manager
Quick Reference Guide
D14996.02 Administering TC6.1 Endpoints on CUCM 9.1.1, April 2013.
www.cisco.com — Copyright © 2013 Cisco Systems, Inc. All rights reserved.
23
Endpoint configuration in three steps
Setting the system password
We strongly recommend setting a password for the users to
We strongly recommend setting a password for the users to
restrict access to system configuration. If no password is set
there will be a notification on screen.
Go to:
Setting the call details
The auto answer settings provisioned in Cisco Unified CM are
The auto answer settings provisioned in Cisco Unified CM are
ignored by the endpoint and must be set on the endpoint.
The call rate will not be set by CUCM. Set the call rate to match
the camera capabilities to achieve the desired call quality.
Go to:
.
Provisioning the endpoint to CUCM
Provisioning allows the video conferencing network
Provisioning allows the video conferencing network
administrators to manage many video systems simultaneously.
Go to:
.
About endpoint configuration
This section gives an overview of the steps required for
registering a TelePresence endpoint to Cisco Unified CM.
You can use the
to configure the
endpoint. Your TelePresence system is shipped with either a
Touch panel or a remote control.
NOTE:
We recommend doing the CUCM configuration
before the endpoint configuration, as access through HTTP
(web interface) and SSH (command line) will be disabled by
default when registering to CUCM 9.1.1 (dev.pack 9.1.1).
Finding the IP address
If using the web interface or the command line interface you
will need the IP address of the endpoint.
Use the Touch controller or remote control to find the address.
• Using the Touch controller: Tap (Settings) > System
Information and see the General section.
• Using the remote control: Navigate to Home > Settings >
System Information and see the Network section.
Contents
Introduction
CUCM configuration
Endpoint configuration
About passwords
Appendices
Endpoint configuration