| Contents | viii
Supported Cipher Suites.....................................................................................................................................202
TLS Transport Protocol........................................................................................................................................ 203
Managing the Trusted Certificates List.........................................................................................................204
Managing the Server Certificates....................................................................................................................206
Secure Real-Time Transport Protocol (SRTP)............................................................................................. 207
H.235............................................................................................................................................................................209
Defending against Attacks................................................................................................................................. 210
System Integrated with Control Systems...................................................................................................................211
Connection Methods of Control Systems....................................................................................................212
Connection Settings for Control Systems....................................................................................................212
CEC Monitor Controls................................................................................ 214
Configuring CEC Monitor Controls.............................................................................................................................. 214
Accessories with Your System.................................................................. 215
Using the VCC22 Video Conferencing Cameras.....................................................................................................215
Controlling VCC22 Camera................................................................................................................................ 215
Configuring Multi-Camera Default Layout.................................................................................................. 215
Adjusting the Camera Layout During a Call...............................................................................................216
Using the CPW90-BT Bluetooth Wireless Microphones with VCS...................................................................217
Registering CPW90-BT with VCS.....................................................................................................................217
Deregistering CPW90 from VCS...................................................................................................................... 217
Viewing the Information of Bluetooth Wireless Microphones............................................................ 218
Finding the Registered CPW90-BT................................................................................................................. 218
Using CTP20........................................................................................................................................................................... 218
Wired Connection to CTP20..............................................................................................................................218
Wireless Connection to CTP20.........................................................................................................................218
Using Multiple CTP20s for Collaboration.................................................................................................... 219
Importing an Existing Whiteboard during a Call......................................................................................219
Saving or Sharing Whiteboard Source Files............................................................................................... 219
Using VCM34......................................................................................................................................................................... 220
System Maintenance.................................................................................. 220
Exporting or Importing Configuration Files..............................................................................................................220
Exporting BIN Files from the System.............................................................................................................220
Importing BIN Files to the System................................................................................................................. 221
Rebooting the System....................................................................................................................................................... 221
Resetting the SD Card of VC200/VP59...................................................................................................................... 221
Resetting the System......................................................................................................................................................... 221
Resetting the System via Configuration Methods................................................................................... 222
Resetting the System by using Reset Button.............................................................................................222
Resetting VP59 by REDIAL key........................................................................................................................ 222
Exporting Log Files..............................................................................................................................................................222
Setting the Severity Level of the Local log.................................................................................................223
Setting Severity Level of the Module log....................................................................................................223
Exporting the Log Files to a Local PC...........................................................................................................224
Exporting the Log Files to a USB Flash Drive............................................................................................ 225
Exporting the Log Files to a Syslog Server.................................................................................................225
Capturing Packets................................................................................................................................................................ 226
Capturing the Packets via Web User Interface..........................................................................................226
Capturing the Packets via Remote Control.................................................................................................229
Capturing the Packets via Ethernet Software.............................................................................................229
System Firmware.................................................................................................................................................................. 229