About device authentication
102
Configuring VCS authentication policy
103
Controlling system behavior for authenticated and non-authenticated devices
104
Authentication policy configuration options
105
SIP authentication trust
108
Configuring delegated credential checking (SIP only)
109
Device provisioning and authentication policy
112
Presence and authentication policy
114
Hierarchical dial plans and authentication policy
115
Practical configuration of authentication policy
116
Configuring VCS authentication methods
116
Configuring authentication to use the local database
119
Using an H.350 directory service lookup via LDAP
120
Using Active Directory database (direct)
123
Configuring the connection to Active Directory Service (ADS)
124
Authenticating with external systems
129
Zones and neighbors
130
About your video communications network
131
Structuring your dial plan
132
Flat dial plan
132
Structured dial plan
132
Hierarchical dial plan
132
About zones
134
Configuring media encryption policy
135
Configuring the B2BUA for media encryption
136
Configuring ICE messaging support
137
About the Local Zone and subzones
138
The Default Zone
139
Configuring the Default Zone
139
Configuring Default Zone access rules
140
Configuring zones
141
Configuring neighbor zones
141
Configuring traversal client zones
144
Configuring traversal server zones
146
Configuring ENUM zones
149
Configuring DNS zones
150
Zone configuration: advanced settings
151
Zone configuration: pre-configured profile settings
154
TLS certificate verification of neighbor systems
155
Configuring a zone for incoming calls only
156
Clustering and peers
157
About clusters
158
License usage within a cluster
160
Managing clusters and peers
162
Setting up a cluster
162
Maintaining a cluster
163
Specifying peer-specific items in clustered systems
164
Sharing registrations across peers
166
Sharing bandwidth across peers
166
Cluster upgrades, backup and restore
167
Cisco VCS Administrator Guide (X8.1.1)
Page 4 of 507