Cisco Cisco TelePresence Video Communication Server Expressway 관리 매뉴얼
Zone Configuration: Pre-Configured Profile Settings
The table below shows the advanced zone configuration option settings that are automatically applied for each of the
pre-configured profiles.
pre-configured profiles.
Setting
Cisco Unified
Communications
Manager
Communications
Manager
Cisco Unified
Communications
Manager (8.6.1
or later)
Communications
Manager (8.6.1
or later)
Nortel
Communication
Server 1000
Communication
Server 1000
Infrastructure
device
device
Default
Monitor peer status
Yes
Yes
Yes
No
Yes
Call signaling routed mode
Always
Always
Auto
Always
Auto
Automatically respond to
H.323 searches
H.323 searches
Off
Off
Off
On
Off
Automatically respond to SIP
searches
searches
Off
Off
Off
On
Off
Send empty INVITE for
interworked calls
interworked calls
On
On
On
On
On
SIP poison mode
Off
Off
Off
Off
Off
SIP encryption mode
Auto
Auto
Auto
Auto
Auto
SIP REFER mode
Forward
Forward
Forward
Forward
Forward
SIP multipart MIME strip mode
Off
Off
Off
Off
Off
SIP UPDATE strip mode
Off
Off
On
Off
Off
Interworking SIP search
strategy
strategy
Options
Options
Options
Options
Options
SIP UDP/BFCP filter mode
On
Off
Off
Off
Off
SIP UDP/IX filter mode
On
On
On
On
Off
SIP record route address type
IP
IP
IP
IP
IP
SIP Proxy-Require header strip
list
list
<blank>
<blank>
"com.nortelnetw
orks.firewall"
orks.firewall"
<blank>
<blank>
TLS Certificate Verification of Neighbor Systems
When a SIP TLS connection is established between a VCS and a neighbor system, the VCS can be configured to
check the X.509 certificate of the neighbor system to verify its identity. You do this by configuring the zone’s TLS
verify mode setting.
check the X.509 certificate of the neighbor system to verify its identity. You do this by configuring the zone’s TLS
verify mode setting.
If TLS verify mode is enabled, the neighbor system's FQDN or IP address, as specified in the Peer address field of
the zone’s configuration, is used to verify against the certificate holder’s name contained within the X.509 certificate
presented by that system. (The name has to be contained in either the Subject Common Name or the Subject
Alternative Name attributes of the certificate.) The certificate itself must also be valid and signed by a trusted
certificate authority.
the zone’s configuration, is used to verify against the certificate holder’s name contained within the X.509 certificate
presented by that system. (The name has to be contained in either the Subject Common Name or the Subject
Alternative Name attributes of the certificate.) The certificate itself must also be valid and signed by a trusted
certificate authority.
Note that for traversal server and DNS zones, the FQDN or IP address of the connecting traversal client is not
configured, so the required certificate holder’s name is specified separately.
configured, so the required certificate holder’s name is specified separately.
157
Cisco TelePresence Video Communication Server Administrator Guide