Index
A
- AAR
- about / Introduction, Enabling Automated Alternate Routing
- enabling / How to do it...
- working / How it works..., How it works...
- implementing / Implementing Automated Alternate Routing, Getting ready, How to do it...
- partitions / Partitions
- search spaces, calling / Calling search spaces
- route patterns / Route patterns
- AAR Destination Mask
- about / AAR Destination Mask
- AAR Groups
- about / AAR Groups
- AAR Destination Mask / AAR Destination Mask
- AAR partitions
- about / Partitions
- access lists, BAT
- bulk provisioning / Bulk provisioning access lists, How to do it...
- alarm event level / How it works...
- emergency / How it works...
- alert / How it works...
- critical / How it works...
- error / How it works...
- warning / How it works...
- notice / How it works...
- informational / How it works...
- debug / How it works...
- alarms
- configuring / Configuring alarms, How to do it...
- working / How it works..., See also
- application user, RTMT
- creating / There's more…
- application users, for secure communication
- authorization levels, FAC
B
- backup
- restoring, from / Restoring from backup, How to do it...
- backup and restore process, UCM
- alarms, configuring / Configuring alarms, How to do it...
- traces, configuring / Configuring traces, How to do it...
- SNMP (Versions 1 and 2), configuring / Configuring SNMP versions 1 and 2, How to do it...
- SNMP Version 3, configuring / Configuring SNMP Version 3, How to do it...
- patches and upgrades, applying / Applying patches and upgrades, How to do it...
- backup device, configuring / Configuring a backup device, How to do it...
- backup schedule, configuring / Configuring a backup schedule
- manual backup, performing / Performing a manual backup
- restoring, from backup / Restoring from backup, How to do it...
- backup device
- configuring / Configuring a backup device, How to do it...
- working / How it works...
- backup schedule
- configuring / Configuring a backup schedule, How to do it...
- working / How it works...
- bandwidth requirements
- barge, for devices and users
- configuring / Configuring barge for devices and users, How to do it...
- working / How it works...
- types / There's more...
- standard barge / There's more...
- conference barge / There's more...
- barge tones
- configuring / Configuring barge tones
- Bulk Administration Tool
- about / Introduction, Introducing the Bulk Administration Tool
- bat template file, creating / Introducing the Bulk Administration Tool
- using / Getting ready, How to do it...
- working / How it works...
- Bulk Provisioning Service, enabling / Enabling the Bulk Provisioning Service
- custom file, creating / Creating and using a custom file
- phones / Bulk provisioning phones, How to do it...
- bulk provisioning users / Bulk provisioning users, How it works...
- user device profiles, bulk provisioning / Bulk provisioning user device profiles
- gateways, bulk provisioning / Bulk provisioning gateways
- Forced Authorization Codes, bulk provisioning / Bulk provisioning Forced Authorization Codes, How to do it...
- Client Matter Codes, bulk provisioning / Bulk provisioning Client Matter Codes
- call pickup groups, bulk provisioning / Bulk provisioning call pickup groups
- access lists, bulk provisioning / Bulk provisioning access lists
- remote destination profiles, bulk provisioning / Bulk provisioning remote destination profiles
- remote destinations, bulk provisioning / Bulk provisioning remote destinations
- mobility profiles, bulk provisioning / Bulk provisioning mobility profiles
- data, exporting / Exporting data, How to do it...
- Bulk Provisioning Service
- enabling / Enabling the Bulk Provisioning Service, How to do it...
- working / How it works...
- bulk provisioning users
- about / Bulk provisioning users, How it works...
C
- CAC
- about / Introduction
- call admission control technologies
- about / Introduction
- location-based call admission control / Implementing location-based call admission control
- regions / Implementing regions for call admission control
- RSVP / Implementing the Resource Reservation Protocol
- Automated Alternate Routing, enabling / Enabling Automated Alternate Routing
- Automated Alternate Routing, implementing / Implementing Automated Alternate Routing
- called party transformation patterns
- about / How it works...
- calling party transformation patterns
- about / How it works...
- calling restrictions
- implementing, partitions and calling search spaces used / Implementing calling restrictions with line blocking partitions and calling search spaces, Getting ready, How to do it...
- working / How it works...
- classes, determining / Determining classes of restriction
- patterns / Patterns required for call restrictions
- fraud, mitigating / Mitigating fraud
- calling search spaces, Client Matter Codes
- about / Calling search spaces
- calling search spaces, FAC
- about / Calling search spaces for Forced Authorization Codes
- device calling search space / Device calling search space
- line calling search space / Line calling search space
- call park
- about / Implementing call park
- implementing / Getting ready, How to do it...
- configuring / How to do it...
- working / How it works...
- call pickup groups, BAT
- bulk provisioning / Bulk provisioning call pickup groups, How to do it...
- about / Bulk provisioning call pickup groups
- call routing
- working with, short dial numbers / How it works...
- call routing considerations, FAC
- traditional call routing / Traditional call routing
- E.164 call routing / E.164 call routing
- CAPF
- about / Configuring Certificate Authority Proxy Function
- configuring / Getting ready, How to do it...
- working / How it works...
- CCMUser web interface / How it works...
- centralized call processing
- about / Centralized vs. Decentralized
- certificates, Cross Cluster Extension Mobility
- Cisco Extension Mobility / How it works...
- Cisco Extension Mobility application / How it works...
- Cisco IP Manager Assistant / How it works...
- Cisco IP Voice Media Streaming App Service parameters
- Cisco TAC / How it works...
- Cisco Web Dialer Web / How it works...
- Client Matter Codes
- about / Implementing Client Matter Codes
- implementing / Getting ready, How to do it...
- working / How it works...
- design considerations / Design considerations for Client Matter Codes
- partitions / Partitions
- route patterns / Route patterns
- calling search spaces / Calling search spaces
- Client Matter Codes, BAT
- bulk provisioning / Bulk provisioning Client Matter Codes
- CM Services / How to do it...
- Codec selection
- about / Codec selection
- conference barge
- about / There's more...
- configuring / Conference barge
- credential policies
- configuring / Configuring credential policies, How to do it...
- working / How it works..., How it works...
- assigning / Assigning credential policies
- Cross Cluster Extension Mobility
- users, configuring / Configure users for Cross Cluster Extension Mobility
- certificates, preparing / Preparing certificates for Cross Cluster Extension Mobility, How to do it...
- template, creating / Creating a template for Cross Cluster Extension Mobility devices, How to do it...
- parameters, configuring / Configuring Cross Cluster Extension Mobility parameters, How it works...
- intercluster trunks, configuring / Configuring intercluster trunks for Cross Cluster Extension Mobility, How it works...
- intercluster service profile, configuring / Configuring the intercluster service profile for Cross Cluster Extension Mobility, How to do it...
- Cross Cluster Extension Mobility phone service
- Cross Cluster Extension Mobility services
- CTI route point / How it works...
- CUCM
- about / How it works...
- custom alert actions, RTMT
- configuring / Configuring custom alert actions, How to do it…, How it works…
- custom alerts, RTMT
- creating / Creating custom alerts in the Real-Time Monitoring Tool, How to do it…
- working / How it works…
- custom background image
- custom file, Bulk Administration Tool
- creating / Creating and using a custom file, How to do it...
- using / How to do it...
- working / How it works...
- custom LDAP filters
- configuring / Configuring custom LDAP filters
- working / How it works...
- custom media files
- adding, for Music On Hold / Adding custom media files for Music On Hold
- custom ringtone
- adding / Adding a custom ringtone, How to do it...
- working / How it works...
D
- data export, Bulk Administration Tool
- about / Exporting data, How to do it...
- working / How it works...
- DEBUG level alarms / How it works...
- decentralized call processing
- about / Centralized vs. Decentralized
- default credential policies
- configuring / Configuring default credential policies, How to do it...
- working / How it works...
- design considerations, FAC
- dest addr / How it works...
- device and unified mobility
- configuring / Introduction
- physical locations, configuring / Configuring physical locations
- device mobility groups, configuring / Configuring device mobility groups
- device pools, configuring for device mobility / Configure device pools for device mobility, How to do it...
- device mobility info, configuring / Configuring device mobility info, How to do it..., How it works...
- device mobility, enabling / Enabling device mobility, How it works...
- mid-call feature access codes, configuring / Configuring mid-call feature access codes, How it works...
- Session Handoff, configuring / Configuring Session Handoff, How it works...
- Intelligent Session Control, enabling / Enabling Intelligent Session Control, How it works...
- mobility access lists, implementing / Implementing mobility access lists, How to do it...
- remote destination profiles, configuring / Configuring remote destination profiles, How to do it...
- remote destinations, configuring / Configuring remote destinations, How to do it...
- Mobile Voice Access, implementing / Implementing Mobile Voice Access, How to do it...
- Enterprise Feature Access, enabling / Enabling Enterprise Feature Access, How it works...
- Mobility softkey, adding / Adding the Mobility softkey, How to do it...
- device mobility
- enabling / Enabling device mobility
- working / How it works...
- device mobility groups
- configuring / Configuring device mobility groups
- working / How it works...
- device mobility info
- configuring / Configuring device mobility info, How to do it...
- device pools, for device mobility
- configuring / Configure device pools for device mobility, How to do it...
- working / How it works...
- device profiles, for Extension Mobility
- configuring / Configuring device profiles for Extension Mobility, How to do it...
- working / How it works...
- devices, for secure tone
- configuring / Configuring devices for secure tone, Getting ready, How to do it...
- working / How it works...
- Dialed Number Analyzer
- Dial Plan
- analyzing, with Dialed Number Analyzer / Analyzing the Dial Plan with the dialed number analyzer, How to do it..., How it works...
- dial plan considerations and partitions
- about / Dial plan considerations and partitions
- common system partitions / Common system partitions
- partitioning, at national level / Partitioning at a national level
- partitioning, at local level / Partitioning at a local level
- dial plan considerations and route patterns
- about / Dial plan considerations and route patterns
- seven digit dialing / Seven digit dialing
- teven digit dialing / Ten digit dialing
- digest authentication
- about / Configuring digest authentication
- configuring / Configuring digest authentication
- working / How it works...
- directed call park
- about / Implementing directed call park
- configuring / How to do it...
- working / How it works...
- direct transfer to voice mail
- implementing / Implementing direct transfer to voice mail, Getting ready, How to do it...
- working / How it works...
- disaster recovery system
- URL / How to do it...
- dual mode configuration, for iPhone
- about / Configuring dual mode for iPhone, How to do it...
- working / How it works...
E
- e-mail server, RTMT
- E.164 called and calling party transformations
- implementing / Implementing E.164 called and calling party transformations, How to do it...
- working / How it works...
- partitions and calling search spaces / Partitions and calling search spaces for called and calling transformation patterns
- E.164 route partitions
- E.164 route patterns
- endpoint hardening
- implementing / Implementing endpoint hardening
- about / Implementing endpoint hardening
- working / How it works...
- Enterprise Feature Access
- enabling / Enabling Enterprise Feature Access, How to do it...
- about / Enabling Enterprise Feature Access
- working / How it works...
- Extension Mobility
- device profiles, configuring / Configuring device profiles for Extension Mobility, How to do it...
- Extension Mobility phone service
- configuring / Configuring the Extension Mobility phone service, How it works...
- Extension Mobility service
- enabling / Enabling the Extension Mobility service
- about / Enabling the Extension Mobility service
- working / How it works...
- phone devices, configuring / Configuring phone devices for Extension Mobility, Getting ready, How to do it...
- parameters, configuring / Configuring Extension Mobility service parameters
- Extension Mobility service parameters
- configuring / How to do it...
F
- FAC
- about / Implementing Forced Authorization Codes
- implementing / Getting ready
- working / How it works...
- design considerations / Design considerations for Forced Authorization Codes
- partitions / Partitions for Forced Authorization Codes
- calling search spaces / Calling search spaces for Forced Authorization Codes
- call routing considerations / Call routing considerations with Forced Authorization Codes
- authorization levels / Authorization levels with Forced Authorization Codes
- Forced Authorization Codes, BAT
- bulk provisioning / Bulk provisioning Forced Authorization Codes, How to do it...
G
- gateways, BAT
- bulk provisioning / How to do it..., How it works...
- geolocations and filters
- configuring / Configuring geolocations and filters, How to do it..., How it works...
H
- host protocol addr / How it works...
- hotline device
- configuring / Configuring a hotline device, How to do it...
- working / How it works...
- hotline service parameters
- configuring / Configuring hotline service parameters
- working / How it works...
I
- Intelligent Session Control
- about / Enabling Intelligent Session Control
- enabling / How to do it...
- working / How it works...
- intercluster service profile, Cross Cluster Extension Mobility
- intercluster trunks, Cross Cluster Extension Mobility
- Intercom feature
- about / Configuring the Intercom feature
- configuring / Getting ready, How to do it...
- working / How it works...
- IOS conference bridges
- configuring / Configuring IOS conference bridges
- working / How it works...
L
- LCR
- about / Implementing least cost call routing using Tail End Hop Off
- implementing / Getting ready, How to do it...
- working / How it works...
- LDAP authentication
- enabling / Enabling LDAP authentication, How to do it...
- working / How it works...
- LDAP Directory
- configuring / Configuring an LDAP Directory, How to do it...
- working / How it works...
- LDAP synchronization
- enabling / Enabling LDAP synchronization, How to do it...
- working / How it works...
- local route groups
- implementing, with device pools / Implementing local route groups with device pools for E.164 call routing, How to do it...
- working / How it works...
- location-based call admission control
- implementing / Implementing location-based call admission control, How to do it...
- working / How it works...
- bandwidth requirements, calculating / How Unified Communications Manager calculates bandwidth requirements
- single cluster / Single Cluster
- centralized vs. decentralized / Centralized vs. Decentralized
- quality of service / There's more...
- strategies, implementing / Importance of Quality of service
- synchronization issues / Per device
- logical partitioning
- about / Implementing logical partitioning
- implementing / Implementing logical partitioning, How to do it...
- working / How it works...
M
- Malicious Call Identification
- configuring / Configuring Malicious Call Identification, How to do it...
- about / Configuring Malicious Call Identification
- enabling / How to do it...
- working / How it works...
- manual backup
- performing / Performing a manual backup
- working / How it works...
- media resource group lists
- configuring / Configuring media resource group lists, How to do it...
- working / How it works...
- applying, to devices / Applying media resource group lists to devices
- media resource groups
- configuring / Configuring media resource groups
- working / How it works...
- meet-me conferencing
- about / Implementing Meet-Me conferencing
- implementing / Implementing Meet-Me conferencing, How to do it...
- configuring / How to do it...
- working / How it works...
- MeetMe softkey
- about / How to do it...
- mid-call feature access codes
- configuring / Configuring mid-call feature access codes
- working / How it works...
- Mobile Voice Access
- about / Implementing Mobile Voice Access
- implementing / Getting ready, How to do it...
- working / How it works...
- mobility access lists
- implementing / Implementing mobility access lists, How to do it..., How it works...
- mobility profiles, BAT
- bulk provisioning / Bulk provisioning mobility profiles, How it works...
- Mobility softkey
- adding / Adding the Mobility softkey, How to do it...
- working / How it works...
- monitoring
- configuring / Configuring monitoring and recording, How to do it..., How it works...
- MTPs
- about / Configuring media termination points
- configuring / Configuring media termination points, Getting ready
- working / How it works...
- multicast Music On Hold
- configuring / Configuring multicast Music On Hold, How to do it...
- working / How it works...
- Music On Hold audio sources
- User Hold MOH Audio Source / How it works...
- Network Hold MOH Audio Source / How it works...
- Music On Hold audio source selection process
- about / How it works...
N
- Network Hold MOH Audio Source
- about / How it works...
O
- OS admin page
- URL / How to do it...
P
- packet capture logs
- collecting / There's more...
- packet capture mechanism
- about / Capturing packets
- working / How it works...
- packets, RTMT
- capturing / How to do it..., How it works...
- parameters, Cross Cluster Extension Mobility
- parameters, Extension Mobility service
- configuring / Configuring Extension Mobility service parameters, How to do it...
- Park softkey
- about / How to do it...
- partitions, calling restrictions
- about / Partitions used in call restrictions
- national / National
- international / International
- premium / Premium
- partitions, Client Matter Codes
- about / Partitions
- partitions, FAC
- partitions and calling search spaces
- CSS-SFO-Outbound-ANI / Partitions and calling search spaces for called and calling transformation patterns
- CSS-SFO-Outbound-DNIS / Partitions and calling search spaces for called and calling transformation patterns
- CSS-SFO-Inbound-ANI / Partitions and calling search spaces for called and calling transformation patterns
- CSS-US-Inbound-ANI / Partitions and calling search spaces for called and calling transformation patterns
- patches and upgrades
- applying / Applying patches and upgrades, How to do it...
- patterns, calling restrictions
- about / Patterns required for call restrictions
- design considerations, for preventing call restriction bypass / Design considerations for preventing call restriction bypass
- blocking, in traditional environments / Blocking in traditional environments
- blocking, in E.164 environments / Blocking in E.164 environments
- phone devices, BAT
- about / Bulk provisioning phones, How to do it...
- phone devices, for Extension Mobility
- configuring / Configuring phone devices for Extension Mobility, Getting ready, How to do it...
- working / How it works...
- phone security profiles
- configuring / Configuring phone security profiles, How to do it..., How it works...
- physical locations, device mobility
- configuring / Configuring physical locations
- Portable Network Graphics (PNG) / Getting ready
- port num / How it works...
- privacy, for devices and users
- configuring / Configuring privacy for devices and users, How to do it...
Q
- quality of service
- about / There's more...
- Query Wizard
- used, for collecting traces / Collecting traces using the Query Wizard
R
- recording
- configuring / Configuring monitoring and recording, How to do it..., How it works...
- regions, for call admission control
- implementing / Implementing regions for call admission control
- configuring / How to do it...
- working / How it works...
- remote destination profiles
- configuring / Configuring remote destination profiles, How to do it...
- creating / How to do it...
- working / How it works...
- remote destination profiles, BAT
- bulk provisioning / Bulk provisioning remote destination profiles, How it works...
- remote destinations
- configuring / Configuring remote destinations, How to do it...
- working / How it works...
- remote destinations, BAT
- bulk provisioning / Bulk provisioning remote destinations, How to do it...
- restore wizard
- working / How it works...
- route patterns, AAR
- calling / Route patterns
- route patterns, Client Matter Codes
- about / Route patterns
- routing, on holidays
- about / Routing on holidays
- RSVP
- about / Introduction, Implementing the Resource Reservation Protocol
- implementing / Implementing the Resource Reservation Protocol, How to do it...
- working / How it works...
- settings / RSVP Settings
- carrier support / Carrier support for RSVP
- RSVP settings
- about / RSVP Settings
- No reservations / RSVP Settings
- RTMT
- user permissions, configuring / Configuring user permissions for the Real-Time Monitoring Tool, How to do it…
- about / Configuring user permissions for the Real-Time Monitoring Tool
- traces, collecting using Query Wizard / Collecting traces using the Query Wizard, How to do it…
- e-mail server, configuring / Configuring the e-mail server for the Real-Time Monitoring Tool, How it works…
- custom alerts, creating / Creating custom alerts in the Real-Time Monitoring Tool, How to do it…
- custom alert actions, configuring / Configuring custom alert actions, How to do it…
- packets, capturing / Capturing packets, How to do it...
- Dial Plan, analyzing with dialed number analyzer / Analyzing the Dial Plan with the dialed number analyzer, Getting ready...
S
- search spaces, AAR
- calling / Calling search spaces
- secure conference bridge
- implementing / Implementing a secure conference bridge
- about / Implementing a secure conference bridge
- working / How it works...
- secure Meet-Me conferences
- about / Implementing secure Meet-Me conferences
- implementing / Implementing secure Meet-Me conferences
- configuring / How to do it...
- working / How it works...
- Separate Music On Hold servers
- about / Separate Music On Hold servers
- Session Handoff
- about / Configuring Session Handoff
- configuring / Configuring Session Handoff
- working / How it works...
- seven digit dialing
- implementing / Seven digit dialing
- short dial numbers
- implementing / Implementing short dial numbers, How to do it...
- working / How it works...
- call routing, working with / How it works...
- single cluster
- about / Single Cluster
- Single Music On Hold server
- about / Single Music On Hold server
- Skinny Client Control Protocol (SCCP) / How it works...
- SNMP Version 3
- configuring / Configuring SNMP Version 3, How to do it...
- SNMP Versions 1 and 2
- configuring / Configuring SNMP versions 1 and 2, How to do it...
- software conference bridges
- configuring / Configuring software conference bridges, How to do it...
- working / How it works..., There's more...
- Cisco IP Voice Media Streaming App Service parameters / Cisco IP Voice Media Streaming App Service parameters
- design considerations / Design considerations for software conference bridges
- Solution Reference Network Design guide
- reference link / See also
- src addr / How it works...
- standard barge
- about / There's more...
- Standard RealtimeAndTraceCollection / Custom user group for the Real-Time Monitoring Tool
- Standard SERVICEABILITY / Custom user group for the Real-Time Monitoring Tool
- Standard SERVICEABILITY Administration / Custom user group for the Real-Time Monitoring Tool
- Standard SERVICEABILITY Read Only / Custom user group for the Real-Time Monitoring Tool
- strategies, location-based call admission control
- implementing / Importance of Quality of service
- device pools, using / Using device pools
- per device, configuring / Per device
- synchronization issues, location-based call admission control
- about / Per device
T
- template, Cross Cluster Extension Mobility
- ten digit dialing
- implementing / Ten digit dialing
- third party application
- about / Configuring application users for secure communication
- working / How it works...
- time-of-day routing
- about / Implementing time-of-day call routing
- implementing / Getting ready, How to do it...
- working / How it works...
- considerations / Considerations for advanced time-of-day routing
- routing, on holidays / Holidays
- holidays, implementing / Holidays
- traces
- configuring / Configuring traces
- enabling / How to do it...
- working / How it works...
- traces, RTMT
- collecting, Query Wizard used / Collecting traces using the Query Wizard, How to do it…, How it works…
- transcoders
- configuring / Configuring transcoders, How to do it...
- working / How it works...
- Transfer softkey
- about / How it works...
U
- UCM
- about / Introduction
- local route groups, implementing with device pools / Implementing local route groups with device pools for E.164 call routing, How to do it...
- E.164 route patterns, implementing / Implementing E.164 route patterns and partitions, How to do it..., How it works...
- E.164 route partitions, implementing / Implementing E.164 route patterns and partitions, How to do it..., How it works...
- E.164 called and calling party transformations, implementing / Implementing E.164 called and calling party transformations, How to do it...
- LCR, implementing / Implementing least cost call routing using Tail End Hop Off, How to do it...
- calling restrictions, implementing / Implementing calling restrictions with line blocking partitions and calling search spaces, Getting ready, How to do it...
- short dial numbers, implementing / Implementing short dial numbers, How to do it...
- Time-of-Day routing, implementing / Implementing time-of-day call routing, How to do it...
- FAC, implementing / Implementing Forced Authorization Codes, Getting ready
- Client Matter Codes, implementing / Implementing Client Matter Codes, How to do it...
- software conference bridges, configuring / Configuring software conference bridges, How to do it...
- IOS conference bridges, configuring / Configuring IOS conference bridges
- transcoders, configuring / Configuring transcoders, How to do it...
- MTPs, configuring / Configuring media termination points, Getting ready
- media resource groups, configuring / Configuring media resource groups, How it works...
- media resource group lists, configuring / Configuring media resource group lists, How to do it..., How it works...
- unicast Music On Hold, implementing / Implementing unicast Music On Hold, How to do it...
- multicast Music On Hold, configuring / Configuring multicast Music On Hold, How to do it...
- custom media files, adding for Music On Hold / Adding custom media files for Music On Hold
- user management / Introduction
- user features / Introduction
- securing / Introduction
- phone security profiles, configuring / Configuring phone security profiles, How to do it..., How it works...
- devices for secure tone, configuring / Configuring devices for secure tone, Getting ready, How to do it...
- CAPF, configuring / Configuring Certificate Authority Proxy Function, How to do it..., How it works...
- digest authentication, configuring / Configuring digest authentication
- endpoint hardening, implementing / Implementing endpoint hardening, How it works...
- secure conference bridge, implementing / Implementing a secure conference bridge
- secure Meet-Me conferences, implementing / Implementing secure Meet-Me conferences
- VPN, configuring for Cisco IP phones / Configuring VPN for Cisco IP phones, How to do it...
- application users, configuring for secure communication / Configuring application users for secure communication, How to do it...
- unicast and multicast Music On Hold
- unicast Music On Hold
- about / Implementing unicast Music On Hold
- implementing / Implementing unicast Music On Hold, How to do it...
- working / How it works...
- Unified Serviceability page
- URL / How to do it...
- user device, BAT
- bulk provisioning / How to do it..., How it works...
- user features
- direct transfer to voice mail, implementing / Implementing direct transfer to voice mail, Getting ready, How to do it...
- meet-me conferencing, implementing / Implementing Meet-Me conferencing, How to do it...
- call park, implementing / Implementing call park, How to do it...
- directed call park, implementing / Implementing directed call park
- Intercom feature, configuring / Configuring the Intercom feature, How to do it...
- Malicious Call Identification, configuring / Configuring Malicious Call Identification, How to do it...
- custom ringtone, adding / Adding a custom ringtone, How to do it...
- custom background image, adding / Adding a custom background image, How to do it...
- dual mode configuration, for iPhone / Configuring dual mode for iPhone, How to do it...
- user groups
- configuring / Configuring user groups, How to do it...
- working / How it works...
- assigning, to end users / Assigning user groups to end users, How to do it...
- User Hold MOH Audio Source
- about / How it works...
- user management
- LDAP synchronization, enabling / Enabling LDAP synchronization, How to do it...
- LDAP Directory, configuring / Configuring an LDAP Directory, How to do it...
- LDAP authentication, enabling / Enabling LDAP authentication, How to do it...
- custom LDAP filters, configuring / Configuring custom LDAP filters
- credential policies, configuring / Configuring credential policies, How to do it...
- default credential policies, configuring / Configuring default credential policies, How to do it..., How it works...
- credential policies, assigning / Assigning credential policies, How it works...
- user roles, configuring / Configuring user roles
- user groups, configuring / Configuring user groups, How to do it...
- user groups, assigning to end users / Assigning user groups to end users, How to do it...
- user permissions, RTMT
- configuring / Configuring user permissions for the Real-Time Monitoring Tool, How to do it…
- working / How it works...
- custom user group / Custom user group for the Real-Time Monitoring Tool
- user roles
- configuring / Configuring user roles
- working / How it works...
- users, Cross Cluster Extension Mobility
- configuring / Configure users for Cross Cluster Extension Mobility
V
- VPN client for IP phones
- about / Configuring VPN for Cisco IP phones
- configuring / How to do it...
- working / How it works...