hit counter script

Cisco TelePresence SX20 Codec Reference Manual page 59

Application programming interface (api)
Hide thumbs Also See for TelePresence SX20 Codec:
Table of Contents

Advertisement

Cisco TelePresence SX20 Codec
Contents
Introduction
RTP configuration
xConfiguration RTP Ports Range Start
Specify the first port in the range of RTP ports.
As default, the system is using the UDP ports in the range 2326 to 2487 for RTP and RTCP media
data. Each media channel is using two adjacent ports for RTP and RTCP. The default number of
ports required in the UDP port range is based on the number of simultaneous calls that the endpoint
is capable of.
NOTE: Restart the system for any change to this setting to take effect.
Requires user role: ADMIN
Value space: <1024..65438>
Range: Select a value between 1024 and 65438.
Example: xConfiguration RTP Ports Range Start: 2326
xConfiguration RTP Ports Range Stop
Specify the last RTP port in the range.
As default, the system is using the UDP ports in the range 2326 to 2487 for RTP and RTCP media
data. Each media channel is using two adjacent ports for RTP and RTCP. The default number of
ports required in the UDP port range is based on the number of simultaneous calls that the endpoint
is capable of.
NOTE: Restart the system for any change to this setting to take effect.
Requires user role: ADMIN
Value space: <1120..65535>
Range: Select a value between 1120 and 65535.
Example: xConfiguration RTP Ports Range Stop: 2486
SX20 Codec API Reference Guide TC7.3, OCTOBER 2015.
D14949.13
About the API
xConfiguration
xConfiguration
Security configuration
xConfiguration Security Audit Logging Mode
xConfiguration Security Audit OnError Action
59
xCommand
Determine where to record or transmit the audit logs. The audit logs are sent to a syslog server.
When using the External/ExternalSecure modes and setting the port assignment to manual in the
Security Audit Server PortAssignment setting, you must also enter the address and port number for
the audit server in the Security Audit Server Address and Security Audit Server Port settings.
Requires user role: AUDIT
Value space: <Off/Internal/External/ExternalSecure>
Off: No audit logging is performed.
Internal: The system records the audit logs to internal logs, and rotates logs when they are full.
External: The system sends the audit logs to an external syslog server. The syslog server must
support UDP.
ExternalSecure: The system sends encrypted audit logs to an external syslog server that is verified
by a certificate in the Audit CA list. The Audit CA list file must be uploaded to the codec using
the web interface. The common_name parameter of a certificate in the CA list must match the IP
address of the syslog server, and the secure TCP server must be set up to listen for secure (TLS)
TCP Syslog messages.
Example: xConfiguration Security Audit Logging Mode: Off
Determine what happens when the connection to the syslog server is lost. This setting is only
relevant when Security Audit Logging Mode is set to ExternalSecure.
Requires user role: AUDIT
Value space: <Halt/Ignore>
Halt: If a halt condition is detected the system codec is rebooted and only the auditor is allowed to
operate the unit until the halt condition has passed. When the halt condition has passed the audit
logs are re-spooled to the syslog server. Halt conditions are: A network breach (no physical link),
no syslog server running (or incorrect address or port to the syslog server), TLS authentication
failed (if in use), local backup (re-spooling) log full.
Ignore: The system will continue its normal operation, and rotate internal logs when full. When the
connection is restored it will again send its audit logs to the syslog server.
Example: xConfiguration Security Audit OnError Action: Ignore
API Reference Guide
xStatus
Appendices
Copyright © 2015 Cisco Systems, Inc. All rights reserved.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents