EasyManuals Logo
Home>Yealink>Conference System>VCM38

Yealink VCM38 Administrator's Guide

Yealink VCM38
281 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #236 background imageLoading...
Page #236 background image
| Configuring the Security Features | 236
2. Configure and save the following settings:
Parameter Description Configuration Method
Accessories Join
Collaboration Confirmation
Enable or disable the
authentication before the
wirelessly connected WPP20/
the touch panel receiving
collaboration data.
Note: the default value is On.
If you change this parameter, the
system will reboot to make the
change take effect.
Web user interface
Configuring the Auto Logout Time
The system will log out of the web user interface automatically after being inactive for a period of time. You
need to re-enter the login credentials to login. You can change the auto logo time.
Procedure
1. On your web user interface, go to Setting > General > Basic > ReLogOffTime(1-1000min).
2. Configure and save the following settings:
Parameter Description Configuration Method
ReLogOffTime (1-1000min)
Specify the inactive time
(minutes) before the system logs
out of the web user interface
automatically.
Default: 5 minute.
Web user interface
Transport Layer Security (TLS)
Transport Layer Protocol (TLS) is a commonly used protocol for ensuring communications privacy and
managing the security of the message transmission. When secured by the TLS protocol, the device can
transmit the data and communicate safely.
The TLS protocol includes two protocol groups: the TLS handshake protocol and the TLS record protocol.
The TLS handshake protocol allows the server and the client to authenticate with each other before
negotiating about the data, the encryption algorithms and the encrypted keys. The TLS Record Protocol
completes the actual data transmission and ensures the data integrity and confidentiality. The TLS protocol
uses an asymmetric encryption algorithm to exchange keys, a symmetric encryption algorithm to ensure
data confidentiality, and the MAC algorithms to ensure data integrity.
Supported Cipher Suites
TLS Transport Protocol
Managing the Trusted Certificates List
Managing the Server Certificates
Secure Real-Time Transport Protocol (SRTP)
H.235 Encryption
Defending against Attacks

Table of Contents

Other manuals for Yealink VCM38

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Yealink VCM38 and is the answer not in the manual?

Yealink VCM38 Specifications

General IconGeneral
TypeConference microphone
Noise reductionYes
Microphone frequency100 - 16000 Hz
Microphone sensitivity-45 dB
Microphone pick-up range6 m
Number of microphone arrays8
Maximum sound pressure level (1kHz)100 dB
Device interfaceRJ-45
Connectivity technologyWired
Maximum operating distance40 m
Mounting typeCeiling
Product colorSilver
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)5 - 90 %
Number of products included1 pc(s)
Harmonized System (HS) code85181000
Power sourceDC/PoE
Sustainability certificatesCE, Federal Communications Commission (FCC), REACH, RoHS
Weight and Dimensions IconWeight and Dimensions
Width127.3 mm
Height66.3 mm

Related product manuals