EasyManuals Logo
Home>Polycom>Conference System>RealPresence Group

Polycom RealPresence Group User Manual

Polycom RealPresence Group
120 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #66 background imageLoading...
Page #66 background image
Unmute the Microphone
You can resume your microphone audio after muting it in order to be heard in a call.
Procedure
1. Tap to open the Quick Access menu.
2. Tap Unmute to resume audio.
Encryption and Security
When a call is encrypted, a locked padlock displays on the monitor. If a call is not encrypted, an open
padlock displays on the screen. The padlock icon also displays in the following situations:
If you are in a point-to-point call or a conference call hosted by another system, the padlock icon
displays the state of your individual connection.
If you are hosting a conference call, the padlock icon displays the combined state of all
connections: encrypted if all connections in the call are encrypted, unencrypted if one or more
connections in the call are not encrypted.
In one call, some connections might be encrypted while others are not. However, the padlock icon might
not accurately indicate whether the call is encrypted if the call is cascaded or includes an audio-only
endpoint. If encryption is required on your system, the far-end must support encryption or the call will not
be completed.
Note: To avoid security risks, Polycom recommends that all participants communicate the state
of their padlock icons verbally at the beginning of a call.
Verify Encryption Check Code
To provide extra security for encrypted H.323 calls, the system provides an encryption check code.
Participants in a call can use this check code to verify that the call is not being intercepted by a third
party. Polycom recommends verifying check codes at each site to protect against third-party
eavesdropping on H.323 point-to-point calls. The check code is calculated so that the check code is the
same at both sites in the call. The numbers are identical if, and only if, the calculation uses data
exclusively from the two sites in the call, with no data being intercepted and modified by a third party.
Note that in externally-hosted multipoint calls, check code numbers do not match any other numbers in
the call.
Procedure
1. Place an encrypted H.323 point-to-point call.
2. Tap to open the Quick Access menu, then tap Settings > System Information > Call
Statistics.
3. On the Call Statistics screen, tap Call Statistics.
4. For Call Encryption, locate the check code, as shown in the following example: AES-128/TLS/
SDED
5. Verbally verify that the check code is the same at both sites.
6. Do one of the following:
If the codes match, the call is secure. Proceed with the call.
If the codes do not match, the call might be compromised. Hang up the call and contact your
system administrator.
Using the Touch User Interface
Polycom, Inc. 64

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Polycom RealPresence Group and is the answer not in the manual?

Polycom RealPresence Group Specifications

General IconGeneral
BrandPolycom
ModelRealPresence Group
CategoryConference System
LanguageEnglish

Related product manuals