About device authentication 102
Configuring VCS authentication policy 103
Controlling system behavior for authenticated and non-authenticated devices 104
Authentication policy configuration options 105
SIP authentication trust 108
Configuring delegated credential checking (SIP only) 109
Device provisioning and authentication policy 112
Presence and authentication policy 114
Hierarchical dial plans and authentication policy 115
Practical configuration of authentication policy 116
Configuring VCS authentication methods 116
Configuring authentication to use the local database 119
Using an H.350 directory service lookup via LDAP 120
Using Active Directory database (direct) 123
Configuring the connection to Active Directory Service (ADS) 124
Authenticating with external systems 129
Zones and neighbors 130
About your video communications network 131
Structuring your dial plan 132
Flat dial plan 132
Structured dial plan 132
Hierarchical dial plan 132
About zones 134
Configuring media encryption policy 135
Configuring the B2BUA for media encryption 136
Configuring ICE messaging support 137
About the Local Zone and subzones 138
The Default Zone 139
Configuring the Default Zone 139
Configuring Default Zone access rules 140
Configuring zones 141
Configuring neighbor zones 141
Configuring traversal client zones 144
Configuring traversal server zones 146
Configuring ENUM zones 149
Configuring DNS zones 150
Zone configuration: advanced settings 151
Zone configuration: pre-configured profile settings 154
TLS certificate verification of neighbor systems 155
Configuring a zone for incoming calls only 156
Clustering and peers 157
About clusters 158
License usage within a cluster 160
Managing clusters and peers 162
Setting up a cluster 162
Maintaining a cluster 163
Specifying peer-specific items in clustered systems 164
Sharing registrations across peers 166
Sharing bandwidth across peers 166
Cluster upgrades, backup and restore 167
Cisco VCS Administrator Guide (X8.1.1) Page 4 of 507