Polycom V2IU 4350 user manual

Page 116

V2IU 4350 Converged Network Appliance User Manual

or distribution medium does not bring the other work under the scope of this License.

3.You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and

2above provided that you also do one of the following:

a)Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

b)Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

c)Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only

for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)

The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface defi- nition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operat- ing system on which the executable runs, unless that component itself accom- panies the executable.

If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

4.You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, mod- ify, sublicense or distribute the Program is void, and will automatically termi- nate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses ter- minated so long as such parties remain in full compliance.

5.You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Pro- gram or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

6.Each time you redistribute the Program (or any work based on the Pro- gram), the recipient automatically receives a license from the original licensor

8

Image 116
Contents V2IU 4350 Converged Network Appliance Trademark Information Contents Page Contents Upgrading the V2IU 4350 System DiagnosticsSaving and Restoring the V2IU 4350 Configuration Contents Page T1 Wide Area Network WAN Access Router V2IU 4350 Converged Network ApplianceFeature Summary Front Panel LEDs LED Label Activity DescriptionBack Panel Back panel of the 4350E contains the following connectionsPhysical Installation Required Tools and MaterialsDesktop Installation Wall-Mount InstallationRack-Mount Installation Administration Connecting the Power and CablesGetting Started Page Configuring the V2IU Configuration Guide For IP Centrex Applications Configuration Outline Task Subtask Application?Configuration Guide For Station Side IP PBX Applications Configure For Station Configuration Guide For Trunk Side IP PBX Applications Configure For Trunk Side IP Configuration Guide For Hosted Video Applications HotspotConfigure For Hosted Configuration Guide For Enterprise Video Applications Configure For Hosted System Configuration Configure the LAN InterfacePress Submit Page Modify an Existing Vlan Configuration Configure the WAN Interface Configuring the V2IU Frame Relay Mode and Dlci Configure the Dhcp Server Mask Delete a Dhcp IP Address Configure Hostname, Snmp and Remote Logging Disable Snmp Change the Administration Password Read-only User Enabling a Read-only UserHow Subinterfaces Works Click SubmitConfiguring Subinterfaces How the ToS Byte Setting Works Viewing or Changing the ToS Byte SettingConfiguring the V2IU Configuration Configuring the V2IU Settings in the Embedded gatekeeper mode settings This is an advanced configuration option and should H.323 Settings page includes the following two buttons Activity Alias ManipulationItem Description Neighboring H.323 Neighboring page includes the following buttons Regular Expressions Symbol Description Regular ExpressionsForwarding Rules How Forwarding Rules WorksConfiguring Forwarding Rules Page Peering Proxy How Peering Proxy WorksPage Outbound from Site C to Site a Inbound from Site a to Site C Configuring Peering Proxy Outbound from Site C to Public IP EndpointAdding an H.323 Prefix Entry Clients List Lock To configure clients list lock, use the following steps Enabling the Clients List LockActivity Monitor Type of Events Callee admission request received Call Termination Viewing the H.323 Activity Monitor Received invalid dataVoIP Configuration Configure the VoIP ALG Programmed in your IP phone Configure VoIP Subnet Routing Enter a VoIP Subnet Route Configure IP Phones, IADs or Softphones Data Networking Configuration NAT for Data TrafficProtocolPublicIPAddress/netmask-portPrivateIPAddress-port Static IP routing Firewall Configuration Enable or disable the firewall Action Description Input format Traffic Management Configuration Enable Traffic Shaping Optionally enable priority IP addresses Enable CACCloser Look at Traffic Management Classifying Upstream Traffic ManagementDownstream Traffic Management Page System Diagnostics Viewing the ALG registration code Viewing Networking InformationRouting Information Viewing Advanced System Information Accessing Troubleshooting Tools Passive Voice Call MonitoringVerify Registered Voice and Video Devices Performing a Ping Test Restarting Networking Processes Saving and Restoring the V2IU 4350 Configuration Ewn CommandCreate a Backup File and Save in Local Flash Copy a Backup File to a Remote Tftp ServerDownload a Backup File from a Remote Tftp Server List the Available Backup FilesDelete a Backup File Page Upgrade Procedure for Software Revision 1.3.11 or Later Upgrading the V2IUPage Troubleshooting Tips AppendixSpecifications Regulatory Notices Other Rights and Limitations Regulatory Notices Warranty and Warranty Exclusions Regulatory Notices Page Regulatory Notices Page Regulatory Notices FCC Part 68 Notice to Users of Digital Service Industry Canada IC Notice Warranty and Repair Service Center