Rpad 4 2 Admin Us en
Rpad 4 2 Admin Us en
Trademarks Polycom®, the Polycom logo and the names and marks associated with Polycom products are
trademarks and/or service marks of Polycom, Inc. and are registered and/or common law marks in the United States
and various other countries.
All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any
form or by any means, for any purpose other than the recipient's personal use, without the express written permission
of Polycom.
Disclaimer While Polycom uses reasonable efforts to include accurate and up-to-date information in this document,
Polycom makes no warranties or representations as to its accuracy. Polycom assumes no liability or responsibility for
any typographical or other errors or omissions in the content of this document.
Limitation of Liability Polycom and/or its respective suppliers make no representations about the suitability of the
information contained in this document for any purpose. Information is provided "as is" without warranty of any kind and
is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall
Polycom and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive or other
damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of
business information), even if Polycom has been advised of the possibility of such damages.
End User License Agreement By installing, copying, or otherwise using this product, you acknowledge that you
have read, understand and agree to be bound by the terms and conditions of the End User License Agreement for this
product. The EULA for this product is available on the Polycom Support page for the product.
Patent Information The accompanying product may be protected by one or more U.S. and foreign patents and/or
pending patent applications held by Polycom, Inc.
Open Source Software Used in this Product This product may contain open source software. You may receive
the open source software from Polycom up to three (3) years after the distribution date of the applicable product or
software at a charge not greater than the cost to Polycom of shipping or distributing the software to you. To receive
software information, as well as the open source software code used in this product, contact Polycom by email at
[email protected].
Customer Feedback We are striving to improve our documentation quality and we appreciate your feedback. Email
your opinions and comments to [email protected].
Polycom Support Visit the Polycom Support Center for End User License Agreements, software downloads,
product documents, product licenses, troubleshooting tips, service requests, and more.
2
Contents
Polycom, Inc. 3
Access Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
System Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Configure Time Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Set the Time Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Edit the Time Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
System Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Appliance Edition Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Virtual Edition Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
High Availability Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Configure Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Network Settings Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Network Interface Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Configure Static Route Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Configure Two-System Tunnel Settings (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Configure Network and Tunnel Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Configure Access Proxy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Add a New Proxy Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Configure HTTPS Proxy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Configure LDAP Proxy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Configure XMPP Proxy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Configure a Passthrough Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Configure HTTP Tunnel Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Edit Proxy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Delete Proxy Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Configure Basic Access Control List Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
How Basic ACLs Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Configure Registration Policy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Configure Call Policy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Manage Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
How Certificates Are Used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Accepted Forms of Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Certificate Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
View Installed Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
View Certificate Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Use the Online Certificate Status Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Add a Certificate Authority’s Public Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Create a Certificate Signing Request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Review the Signed Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Add the Signed Certificate to the KEY_STORE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Polycom, Inc. 4
Refresh the Server SSL Self-Signed Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Add a Certificate from a Trusted Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Replace a Signed Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Delete a Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Provision the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Connect to the RealPresence Resource Manager System . . . . . . . . . . . . . . . . . . . . . . . . 73
Integrate with Microsoft Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Use Role Mapping Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Configure SIP Signaling Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Configure SIP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Add an External SIP Port Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Edit an External SIP Port Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Delete an External SIP Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Configure H.323 Signaling Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
TURN Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
How Allocations Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Configure TURN Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
TURN Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Add a TURN User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Configure Media Traversal Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Configure Federation Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Search for a Federation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Add a Federation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Edit a Federation Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Polycom, Inc. 5
Configure Notification Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Configure Notification Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Download MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Configure History Retention Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Define Advanced Access Control List Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Use the Default Access Control List Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Add an Access Control List Rule and Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Copy an Access Control List Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Edit or Delete an Access Control List Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Edit or Delete a Condition for an Access Control List Rule . . . . . . . . . . . . . . . . . . . . . . . 115
Example: Define an Access Control List Rule to Deny SIP Calls from Specific IP Addresses
115
Use Variables in Access Control List Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Add a Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Edit or Delete a Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Apply Rule Settings to Access Control List Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Add an Access Control List Setting and Rule Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Edit or Delete an Access Control List Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Edit or Delete a Rule Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Polycom, Inc. 6
Migrate Data from a Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Remote Client Login Failed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Licensed Call Number is 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
SIP Registration Failed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
SIP Call Failed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
H.323 Call Failed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
VMR Call Failed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
No Audio, Video, or Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Failed to Connect to RealPresence Resource Manager System . . . . . . . . . . . . . . . . . . . . . 151
Cannot Open RealPresence Access Director System User Interface . . . . . . . . . . . . . . . . . . 152
Polycom, Inc. 7
Conventions Used in Polycom Guides
This guide contains terms, graphical elements, and a few typographic conventions. Familiarizing yourself
with these terms, elements, and conventions will help you successfully perform tasks.
Information Elements
This guide may include any of the following icons to alert you to important information.
Caution The Caution icon highlights information you need to know to avoid a
hazard that could potentially impact device performance, application
functionality, or successful feature configuration.
Warning The Warning icon highlights an action you must perform (or avoid) to
prevent issues that may cause you to lose information or your
configuration setup, and/or affect phone, video, or network performance.
Web Info The Web Info icon highlights supplementary information available online
such as documents or downloads on support.polycom.com or other
locations.
User Tip The User Tip icon highlights techniques, shortcuts, or productivity
related tips.
Troubleshooting The Troubleshooting icon highlights information that may help you solve
a relevant problem or to refer you to other relevant troubleshooting
resources.
Polycom, Inc. 8
Typographic Conventions
A few typographic conventions, listed next, may be used in this guide to distinguish types of in-text
information.
Typographic Conventions
Convention Description
Bold Highlights interface items such as menus, menu selections, window and dialog names,
soft keys, file names, and directory names when they are involved in a procedure or user
action. Also used to highlight text to be entered or typed.
Italics Used to emphasize text, to show example values or inputs (in this form: <example>), and
to show titles of reference documents available from the Polycom Support Web site and
other reference sites.
Blue Text Used for cross references to other sections within this document and for hyperlinks to
external sites and documents.
Polycom, Inc. 9
Before You Begin
The Polycom® RealPresence® Access Director™ System Administrator Guide is for system administrators
who need to configure, monitor, maintain, and troubleshoot the Polycom RealPresence Access Director
system.
Related Documentation
Please read all available documentation before you install or operate the system. Documents are available
at Documents and Downloads at Polycom Support.
● Polycom RealPresence Access Director System Release Notes
● Polycom RealPresence Access Director Getting Started Guide
● Polycom Unified Communications in RealPresence Access Director System Environments
Polycom, Inc. 10
Get Help
For more information about installing, configuring, and administering Polycom products, refer to
Documents and Downloads at Polycom Support.
Polycom, Inc. 11
Overview of the Polycom® RealPresence®
Access Director™ System
This following topics provide an overview of the Polycom® RealPresence® Access Director™ system:
● About the Polycom RealPresence Access Director System
● Features and Capabilities
● Getting Started with the RealPresence Access Director System
Polycom, Inc. 12
● Polycom ContentConnect™ system – connects Lync desktop workers, conference room systems,
and audio-only meeting participants for video collaboration
● Polycom RealPresence Group Series 300/500 video collaboration solution – endpoints that support
large-scale video conferencing
● Polycom HDX group video system – endpoints that provide high-definition video and voice for video
conferencing
● Cisco codecs and desktop systems (some models)
Access Proxy
The access proxy feature provides reverse proxy functionality that enables external endpoints to access
services inside your enterprise network. Registered (remote) users can access the following services:
● Management and provisioning (HTTPS/TLS)
● Presence (XMPP/TLS)
● Directory (LDAP/TLS)
Additionally, an HTTP tunnel can be configured to enable RealPresence Web Suite SIP guest users to join
meetings inside the enterprise network (through the RealPresence Web Suite Services Portal).
Polycom, Inc. 13
Media Relay
The RealPresence Access Director system supports the media connection between external users and
enterprise users. This connection enables audio, video, and content relay over UDP media channels.
High Availability
Two RealPresence Access Director systems can be configured on the same network to provide High
Availability (HA) of services. Systems configured for High Availability support minimal interruption of
services and greater call reliability.
TURN Server
To support WebRTC-based video conferencing, the RealPresence Access Director system implements both
Session Traversal Utilities for NAT (STUN) and Traversal Using Relays around NAT (TURN) protocols.
When needed, the RealPresence Access Director system can act as a STUN and TURN server to enable
firewall and NAT traversal of UDP media traffic between WebRTC clients.
Security
To provide secure firewall traversal for video calls, the RealPresence Access Director system provides the
following security features:
● Deployment behind outside firewalls that use Network Address Translation (NAT)
● Secured communications (TLS and certificates)
● Secure management (Access Control Lists, Syslog, LDAP authentication, and role-based access
control)
● Server-side authentication
● Server-side session management
● Robust SIP TLS cipher
● OS hardening
Operating System
The system uses the hardened CentOS 6.6 operating system platform.
Polycom, Inc. 14
Endpoints (AVC and SVC)
The RealPresence Access Director system supports calls to and from the following endpoints:
● RealPresence Group Series 300/500
● RealPresence Mobile
● RealPresence Desktop
● Polycom HDX systems
● Cisco C20 and C40 Codecs, EX60 and EX90 Desktop Systems, and 1700 MXP Desktop System
(AVC only)
Polycom, Inc. 15
Password: Polycom12#$
The user ID admin and password Polycom12#$ are the default login credentials after the initial
installation of the system. If you have created other user accounts, the user logging in must use
their own credentials.
3 Click in the top-right corner of the page to log out of the system.
Polycom, Inc. 16
You can view and change the current status of usage data sending and collection on the Maintenance >
License page. Usage data is sent only if the Automatically send usage data field is checked. You can
enable or disable this feature at any time.
Polycom, Inc. 17
Used Disk
● Services Status. This pane shows whether the following services are running or stopped:
Access Proxy
SIP
H323
TURN server
Media Relay
Two-box Tunnel (the tunnel service status displays only if you deploy two RealPresence Access
Director systems in a tunnel configuration.)
Database
● License Status. This pane displays license server connection, call, and bandwidth information:
Last successful connection (Virtual Edition only)
Maximum Allowed Calls
Active SIP Calls
Active H.323 Calls
Active SIP Bandwidth
Active H.323 Bandwidth
● Peak Call Monitoring. This pane displays the percentage of active SIP and H.323 calls.
● TURN Status. This pane displays whether the TURN server is running, the number of allocations,
and the total bandwidth that the TURN server is using.
● High Availability Status. If you have two RealPresence Access Director systems configured to
provide High Availability, this pane displays the connection status of both systems and network
interface IP addresses, address types, and state information:
Polycom, Inc. 18
Monitor System Alerts
In addition to the dashboard panes, the System Alerts lists alerts about system certificates (Appliance
Edition and Virtual Edition) and licensing (Virtual Edition only). These alerts display when:
● Certificates are close to their expiration date or have expired.
● License information for the Virtual Edition changes, including the number of licensed calls, access to
features, and license status (that is, active or expired).
When alerts occur, the System Alerts button turns red and displays the current number of alerts. Each alert
has a corresponding severity level:
● Warn––The system currently functions correctly, but Polycom recommends that you resolve the
issue identified in the alert before it becomes severe.
● Severe–The system temporarily does not function correctly. The system may recover automatically
but Polycom recommends that you resolve the issue before it becomes critical.
● Critical–The system does not function correctly. Resolve the issue immediately.
Severity
Alert Level Reason for Alert Action to Resolve the Issue
Certificates
Expires within 30 Warn The key store certificate will expire • Go to Admin > Certificates.
days. Upon within 30 days. • Click Refresh next to the key store
expiration, certificate.
encrypted calls or Note: The key store certificate is
communication replaced with a new self-signed
with other servers certificate. You must submit a new
may be blocked. certificate signing request to your
trusted CA to obtain a new signed
certificate.
Expires within 30 Warn The trusted certificate will expire Install trusted certificates from the
days. Upon within 30 days. appropriate source, for example an
expiration, all internal or external CA, a TLS peer,
system access etc.
may be lost.
Polycom, Inc. 19
Severity
Alert Level Reason for Alert Action to Resolve the Issue
Expired. Critical The key store certificate expires while Restart the system and it
Encrypted calls or the RealPresence Access Director automatically generates a new
communication system is running. self-signed certificate.
with other servers Note: If the key store certificate
may be blocked. expires when the RealPresence
Access Director system is not
running, the system automatically
generates a new self-signed
certificate when the system is started
again. No alert displays.
Expired. Critical The trusted certificate has expired. Immediately submit a new CSR.
Encrypted calls or
communication
with other servers
may be blocked.
The license Warn The license server configuration is Go to Maintenance > License
server's incorrect or missing information. For Server Settings and check the
configuration is example, the license server IP license server IP address and port for
incorrect address has not been specified. incorrect or missing information.
Revise incorrect settings in the
RealPresence Platform Director user
interface.
The base license Severe The base license for the When the base license for the
for RealPresence RealPresence Access Director RealPresence Access Director
Access Director system has changed. For example: system changes from valid to invalid,
has changed. • The license was valid but has now the RealPresence Access Director
Restart the expired. system responds as follows:
system. • The license was not available from • If active calls are in progress, the
the license server but has now system automatically restarts after
been retrieved and validated. all active calls have ended.
• If no active calls are in progress,
the system automatically restarts.
When an invalid base license
becomes valid, the system
automatically restarts.
Note: In a two-system tunnel
configuration, if the tunnel client is
running, you must manually restart it.
Polycom, Inc. 20
Severity
Alert Level Reason for Alert Action to Resolve the Issue
Cannot acquire Critical The system cannot acquire the base In RealPresence Platform Director,
the base license license for the RealPresence Access ensure that the RealPresence Access
for the Director system from the license Director base license is correctly
RealPresence server. In such cases, all configured. The RealPresence
Access Director RealPresence Access Director Access Director system will connect
system. system functions are disabled. to the license server every one minute
to attempt to acquire the base license.
The maximum call Severe The maximum number of calls on the Ensure that the maximum number of
count on the Max Calls for RealPresence Access calls on the Max Calls for
license exceeds Director license exceeds system RealPresence Access Director
system capability. capabilities. If the licensed call license does not exceed system
number configured in the capabilities.
RealPresence Platform Director
system is higher than the maximum
number of calls the RealPresence
Access Director system supports, the
additional calls are not supported.
The number of Critical The licensed call number on the Max Manually restart the RealPresence
licensed calls has Calls for RealPresence Access Access Director system. Then go to
changed from Director license changes on the Admin > Port Range Settings and
<number X> to license server. view the new port ranges. Ensure that
<number Y>. the ports configured on the firewall
Restart the match the new port ranges.
system, then
confirm the new
port ranges.
Polycom, Inc. 21
Severity
Alert Level Reason for Alert Action to Resolve the Issue
The media Severe If two RealPresence Access Director When the Enable Strong Media
encryption license systems have been deployed in a Encryption license capability
has changed. tunnel configuration, encrypting the changes, the RealPresence Access
Restart the tunnel between the two systems is Director system responds as follows:
system. possible only with the Enable Strong Tunnel Server
Media Encryption license capability. If active calls are in progress, the
The alert displays if tunnel encryption tunnel server does not automatically
is enabled and the Enable Strong restart.
Media Encryption capability changes
If not calls are in progress, the tunnel
on the license server.
server responds as follows:
• If the tunnel is running in
encrypted mode, the tunnel server
automatically restarts in
unencrypted mode.
• If the tunnel is running in
unencrypted mode and the tunnel
settings have been configured as
unencrypted in the RealPresence
Access Director system’s user
interface, the tunnel server
continues to operate without
interruption.
• If the tunnel is running in
unencrypted mode and the tunnel
settings have been configured as
encrypted in the RealPresence
Access Director system’s user
interface, the tunnel server
automatically restarts in encrypted
mode.
Tunnel Client
If the tunnel client is running, it does
not restart. If it is not running, it will
automatically restart and reconnect to
the tunnel server.
Polycom, Inc. 22
Severity
Alert Level Reason for Alert Action to Resolve the Issue
Cannot connect to Critical The RealPresence Access Director If the RealPresence Access Director
the license server. system cannot connect to the license system cannot reach the license
server due to one of these reasons: server because the destination
• The destination cannot be cannot be reached, confirm the
reached: following:
Error code: SOCKET_ERROR • The license server is running.
Message: No route to host • The routing is correct between the
• A time difference exists between RealPresence Access Director
the RealPresence Access Director system and the license server.
system settings and the license • The license server IP address is
server: correct (go to Maintenance >
Error code: License Server Settings to view
RESPONSE_EXPIRED the license server IP address).
Message: The allowed time to If the RealPresence Access Director
process response has expired system cannot connect to the license
server because of a time difference,
do one of the following to adjust the
time setting in the system:
• Configure the same NTP server as
the one used by the license server.
• Set the time in the RealPresence
Access Director system to match
the time on the license server.
Menu Submenu
User
Users
Configuration
Polycom, Inc. 23
Menu Submenu
SIP Settings
H.323 Settings
TURN Settings
Federation Settings
Maintenance
License
Software Upgrade
Admin
Network Settings
Time Settings
Certificates
Security Settings
Log Settings
SNMP Settings
Diagnostics
Active Calls
Call History
Polycom, Inc. 24
Menu Submenu
Registration History
TURN Allocations
Traffic Capture
Ping
Traceroute
Help
About RPAD
Help Contents
Polycom, Inc. 25
System Configuration
After you have installed the Polycom® RealPresence® Access Director™ system and entered the initial
network settings, you will need to configure several key system settings, as discussed in the sections that
follow. Additionally, you can revise your system settings as needed after the initial configuration.
The following topics describe configuration details and indicate the recommended order for configuring
system settings:
● Configure Time Settings
● System Licensing
● Configure Network Settings
● Configure Two-System Tunnel Settings (Optional)
● Configure Access Proxy Settings
● Configure Basic Access Control List Settings
● Manage Certificates
● Provision the System
● Integrate with Microsoft Active Directory
● Configure SIP Signaling Settings
● Configure H.323 Signaling Settings
● TURN Services
● Configure Media Traversal Settings
● Configure Federation Settings
For information on installation and initial system configuration, see the Polycom RealPresence Access
Director, Appliance Edition or Virtual Edition, Getting Started Guide.
For system deployment information, see Polycom Unified Communications in RealPresence Access
Director System Environments. Both documents are available at support.polycom.com.
Polycom, Inc. 26
Consider the following information before changing the time settings:
● If you deploy an instance of the RealPresence Access Director system, Virtual Edition, the system
time synchronizes with the NTP servers you configured from the RealPresence Platform Director
system user interface
● Changing the time settings requires a system restart, which terminates active calls and logs all users
out of the system.
● Changing the time settings can affect the number of days available for a trial period license.
● If you plan to install an identity certificate provided by a certificate authority (CA), the date, time, and
time zone configured in your system must be correct for the certificate to function correctly. See
Manage Certificates for more information on certificates.
● If you plan to use your system to support calls between endpoints in your enterprise and endpoints
in a separate but federated or neighbored (trusted) division or enterprise that has its own
RealPresence Access Director system installed, both systems and the CA server should be in the
same time zone. If the time difference between the two RealPresence Access Director systems and
the CA server is too great, Transport Layer Security (TLS) connections may fail.
Polycom, Inc. 27
To edit the time settings:
1 Go to Admin > Time Settings.
2 Complete the following fields as needed:
Field Description
System time zone The time zone in which your RealPresence Access Director system is
located.
Note: After initial installation of the RealPresence Access Director system,
the default time zone is GMT (UTC). You must select the time zone of your
geographic location immediately after installing the system.
Auto adjust for Daylight Saving Automatically determined in accordance with the system time zone. If the
Time system time zone you select observes Daylight Saving Time, this setting is
enabled.
Note: The administrator cannot change this setting.
Manually set system time Polycom strongly recommends that you do not set the time and date
manually. Manually setting system time removes Network Time Protocol
(NTP) server information and sets the manually entered time for the
selected time zone instead of for the current system UTC offset.
3 Click Update.
If you change the System time zone or Manually set the system time, the Server Time (Refresh
every 10 seconds) value refreshes based on the new settings.
System Licensing
The RealPresence Access Director system is licensed by the number of concurrent calls. When the number
of SIP and H.323 concurrent calls equals the maximum number of calls allowed by the license, or concurrent
media bandwidth has reached the maximum bandwidth configured on the RealPresence Access Director
system, new calls are rejected.
The RealPresence Access Director system automatically calculates dynamic port ranges based on the
number of calls for which you are licensed. A port range for a specific function indicates the number of ports
for that function that must be available to accommodate the number of calls on your system license. If your
Polycom, Inc. 28
number of licensed calls changes, after your system restarts, you must reconfigure your dynamic port range
settings and make the corresponding changes on your firewall. See Configure Port Range Settings.
Field Description
Active Licenses
High Availability Indicates whether the license includes access to High Availability features.
Remaining trial period Displays if you are using a trial license and specifies the time remaining in the trial
period.
Commercial licenses have no trial period limitation.
Activation Keys
Serial number Serial number of the RealPresence Access Director system server
Polycom, Inc. 29
Field Description
Activation key The activation key that you obtain from the Polycom Support web site when you
provide your system’s license number and serial number.
Automatically send usage When enabled, usage data is sent automatically to Polycom. For additional
data information, see Automatically Send Usage Data.
Polycom, Inc. 30
To request an activation key code for a major or minor software upgrade:
1 Open a web browser and go to http://support.polycom.com.
2 In the Licensing & Product Registration section, select Activation/Upgrade.
3 Select All Other Polycom Products.
4 Log in or Register for An Account.
5 Click SITE & Single Activation/Upgrade.
6 Accept the EXPORT RESTRICTION agreement.
7 In Product Activation, enter the serial number of your RealPresence Access Director system
server and click Next.
8 Click the Upgrade tab to view the Upgrade Key Codes available for your serial number.
9 Record the Upgrade Key Code for the software upgrade and use it to activate your system after
installing the upgrade file. See Activate the System License.
To activate a license:
1 Log into the RealPresence Access Director, Appliance Edition user interface.
2 Go to Maintenance > License.
3 Enter the Activation key for the license and click Update.
The system restarts.
Caution: Restart the RealPresence Access Director instance if you change license allocations
If you change license allocations in the RealPresence Platform Director system for an instance of the
RealPresence Access Director system, you must restart the RealPresence Access Director instance
for the changes to take effect. See the Polycom RealPresence Platform Director System Administrator
Guide, available at support.polycom.com.
Polycom, Inc. 31
View License Information
You can view the license information for your system from the RealPresence Access Director system user
interface.
Field Description
License server address The IP address of the RealPresence Platform Director system license server that the
RealPresence Access Director system, Virtual Edition, communicates with for
license information and updates.
Polycom, Inc. 32
Description Licensing Option A Licensing Option B
Result After a failover, the remaining active After a failover, the remaining active
system can support a maximum of system can support a maximum of
50 calls. Any additional calls will fail. 100 calls.
In Licensing Option B, each system can accommodate 100 calls but you can balance the load between
systems based on your network requirements. Each system might handle 50 percent of its maximum
licensed calls, but if a failover occurs, the remaining active system can accommodate 100 percent of the
calls you need to support.
If you activate a license for HA in the RealPresence Access Director, Appliance Edition, your system will
reboot when you update the license page. After the system restarts and you log in, the High Availability
features are available to use.
For the RealPresence Access Director, Virtual Edition, you must restart the RealPresence Access Director
instances after you add the High Availability license capability in the RealPresence Platform Director
system.
For complete instructions on activating your licenses, see System Licensing in the Polycom RealPresence
Access Director System Administrator Guide. For the RealPresence Access Director, Virtual Edition, see
the Polycom RealPresence Platform Director System Administrator Guide.
Polycom, Inc. 33
Caution: Changing network settings may require a new CA certificate for your system
You must create a certificate signing request to apply for a new CA-signed identity certificate for the
RealPresence Access Director system if one or both of the following situations is true:
• You change the host name of the system
• You revise the signaling relay address and some registered or guest endpoints use an IP address
instead of an FQDN to establish a TLS connection to the RealPresence Access Director system.
The following table describes all network configuration settings for the RealPresence Access Director
system. Fields marked with an asterisk (*) are mandatory.
Setting Description
* Primary DNS IP address of the primary Domain Name Server (DNS) for the network to which
the system connects.
Secondary DNS IP address of the secondary DNS server for the network to which the system
connects.
Tertiary DNS IP address of the tertiary DNS server for the network to which the system
connects.
* IPv4 Subnet Mask IPv4 subnet mask of the RealPresence Access Director system’s IP address.
* IPv4 Default Gateway IP address of the gateway server used to route network traffic outside the subnet.
SIP/H.323 Settings
* External SIP/H.323 IP address of the network interface used for SIP and H.323 signaling traffic
Signaling IP between the RealPresence Access Director system and external networks.
* Internal SIP/H.323 Signaling IP address of the network interface used for internal SIP and H.323 signaling
IP traffic.
Polycom, Inc. 34
Setting Description
Media Relay
* External Relay IP IP address of the network interface used for media relay between the
RealPresence Access Director system and external networks.
* Internal Relay IP IP address of the network interface used for media relay between the
RealPresence Access Director system and the internal enterprise network.
Management IP Settings
* Management IP IP address of the network interface used for management traffic, including web
management of the user interface, SSH, DNS, NTP, remote syslog, and OCSP.
* External Access Proxy IP IP address of the network interface used for access proxy traffic between the
RealPresence Access Director system and external endpoints.
* Internal Access Proxy IP IP address of the network interface used for access proxy traffic between the
RealPresence Access Director system and internal network application servers.
NAT Settings
Deployed behind Outside When selected, enables NAT settings for the system.
Firewall with NAT If your system is deployed behind a firewall that translates network IP
addresses, you must select this option.
Disable the option if the system is deployed behind an outside firewall without
NAT.
* Signaling Relay Address Required if Deployed behind Outside Firewall with NAT is enabled.
The RealPresence Access Director system’s public IP address for signaling and
access proxy traffic. This IP address must be mapped on the outside firewall.
Note: If you change the signaling relay address, you must create and install a
new CA certificate on the RealPresence Access Director system if the external
endpoint uses IP addresses instead of FQDNs to establish TLS connections to
the system.
* Media Relay Address Required if Deployed behind Outside Firewall with NAT is enabled.
The RealPresence Access Director system’s public IP address for media traffic.
This IP address must be mapped on the outside firewall.
Available NICs Network interfaces selected in the Service network setting tab
Selected NICs NICs selected from the Available NICs list. Static routes can be configured for the
selected NICs.
Polycom, Inc. 35
Setting Description
* Gateway Gateway through which traffic can reach the network destination. The gateway
must be in the same subnet with the selected NIC.
Static route list Displays the following details for the static routes that have been configured:
• Interface Name
• Network destination
• Netmask
• Gateway
Using virtual environment tools to add network interfaces after initial installation
If you configure additional network interfaces after you initially install an instance of the RealPresence
Access Director system, Virtual Edition, Polycom recommends that you configure the network
interfaces from the RealPresence Access Director web user interface. However, if you use your virtual
environment tools to add network interfaces, you must reboot the instance to ensure the additional
network interfaces display in Admin > Network Settings.
Standard Configuration
In a standard configuration with 1–4 configured network interfaces, all network interface IP addresses must
be within the same subnet. External signaling and access proxy must be assigned to the same interface.
External signaling and access proxy, and external media must have at least one publicly-accessible IP
address on the external, WAN-side firewall (a NAT is recommended). All other network interfaces route
traffic to and from the enterprise LAN through the inside firewall without NAT.
The following table lists the recommended network interface settings for the different communication
services in a standard configuration, based on the number of network interfaces you use.
1 eth0 Management
Minimal implementation External SIP/H.323 signaling and access proxy
External media
Internal SIP/H.323 signaling and access proxy
Internal media
Polycom, Inc. 36
Recommended Configurations for Network Interfaces in a Standard Configuration
eth2 Management
eth3 Management
LAN-WAN Configuration
In a LAN-WAN configuration with 2–4 configured NICs, all network interface IP addresses must be assigned
to a WAN-side subnet or a LAN-side subnet. All network interfaces assigned to external, WAN-side services
must have IP addresses in the WAN-side subnet. All network interfaces assigned to route traffic to and from
the enterprise LAN must have IP addresses in the LAN-side subnet.
In the LAN-WAN configuration, external signaling and access proxy must be assigned to the WAN-side
subnet. Internal signaling and access proxy must be assigned to the LAN-side subnet.
The following table lists the recommended network interface settings for the different communication
services in a LAN-WAN configuration, based on the number of network interfaces you use.
2 eth0 Management
Minimal implementation Internal SIP/H.323 signaling and access proxy
Internal media
Polycom, Inc. 37
Recommended Configurations for Network Interfaces in a LAN-WAN Configuration
eth2 Management
Settings Field
Polycom, Inc. 38
Settings Field
Management IP • Management IP
NAT If your system is deployed behind a firewall that translates network IP addresses,
select Deployed behind Outside Firewall with NAT and complete these fields:
• Signaling relay address
• Media relay address
6 Click Done > Commit and Reboot Now to save the network settings.
Caution: Changing network settings may require a new CA certificate for your
system
You must create a certificate signing request to apply for a new CA-provided
identity certificate for the RealPresence Access Director system if one or both of the
following situations is true:
• You change the host name of the system
• You revise the signaling relay address and some registered or guest endpoints
use an IP address instead of an FQDN to establish a TLS connection to the
RealPresence Access Director system.
Polycom, Inc. 39
Gateway: The gateway through which traffic can reach the network destination. The gateway
must be in the same subnet with the selected NIC.
5 Click Add.
The new static route for the network interface displays in the Static Route list.
6 Click Update to save the settings.
In a tunnel configuration, port mapping on the firewall between the tunnel server and the tunnel client is not
required. Instead, when you enable the tunnel feature on the tunnel server, the tunnel port automatically
listens for communication from the tunnel client. When you enable the tunnel feature on the tunnel client,
the client then registers to the tunnel server through the listening tunnel port.
During the registration process, the tunnel server detects the IP address of the tunnel client. Additionally,
the tunnel client sends the internal signaling and media IP address to the tunnel server. The tunnel client
uses this IP address to communicate with the internal RealPresence DMA system. After the tunnel client
Polycom, Inc. 40
registration is complete, the tunnel server establishes a secure tunnel connection and stops listening on the
tunnel port.
In a two-system tunnel deployment, certain IP addresses are reserved for internal system use. The IP
address you define for each system must differ from the following IP addresses:
● Non-encrypted tunnel: 192.168.99.21
● Encrypted tunnel: 192.168.99.1–192.168.99.21
The tunnel connection between the two systems uses a self-signed certificate that is dedicated for tunnel
use.
Polycom, Inc. 41
4 In the Step 2 of 3: Advanced Network Settings window, click each of the network interfaces to
configure and complete the following fields as described in Network Settings Overview.
IPv4 Address
IPv4 Subnet Mask
IPv4 Default Gateway
5 Click Next.
6 In the Step 3 of 3: Service Network Settings window, select the IP address of the network
interface to assign for each type of traffic and for communication between the tunnel server and
tunnel client:
External Signaling IP–The IP address of the network interface used for SIP and H.323 signaling
traffic between the RealPresence Access Director system and external networks.
External Relay IP–The IP address of the network interface used for media relay between the
RealPresence Access Director system and external networks.
Management IP–The IP address of the network interface used for management traffic, including
web management of the user interface, SSH, DNS, NTP, remote syslog, and OCSP.
If you use three or four network interfaces on the tunnel server, you can assign different
network interfaces for tunnel communication traffic between the two systems and for
management traffic. In this case, select the network interface used for management traffic in
the Management IP field. Configure the interface for tunnel communication between the two
systems in the Two-box Tunnel Settings screen (see Configure Two-box Tunnel Settings on
the Tunnel Server).
External Access Proxy IP: If the appropriate IP address does not already display in this field,
select it from the Available IP address list, then click the right arrow to move the IP address to
the External Access Proxy IP list.
7 Select Deployed behind Outside Firewall with NAT and enter the following information:
Signaling relay address: The RealPresence Access Director system’s public IP address for
signaling traffic. This IP address must be mapped on the outside firewall.
Media relay address: The RealPresence Access Director system’s public IP address for media
traffic. This IP address must be mapped on the outside firewall.
Depending on your network interface configuration, the signaling relay address and the media
relay address may be the same IP address.
8 Click Done > Commit and Reboot Now to save the network settings.
Polycom, Inc. 42
4 In the Step 2 of 3: Advanced Network Settings window, click each of the network interfaces to
configure and complete the following fields as described in Network Settings Overview.
IPv4 Address
IPv4 Subnet Mask
IPv4 Default Gateway
5 Click Next.
6 In the Step 3 of 3: Service Network Settings window, select the network interface to assign as the
Management IP address.
The network interface that handles management traffic is based on the number of network interfaces
configured on the tunnel client. See Network Interface Configurations in Polycom Unified
Communications in RealPresence Access Director System Environments.
7 Click Done > Commit and Reboot Now to save the network settings.
If the tunnel client uses more than one network interface, go to Configure > Tunnel Settings to specify the
IP address of the network interface that the tunnel client uses for internal signaling and media
communication with the RealPresence DMA system. See the Internal signaling/media/access proxy IP
of tunnel client field in Configure Two-box Tunnel Settings on the Tunnel Client.
Field Description
Settings
Polycom, Inc. 43
Field Description
Encrypted tunnel When selected, communications between the tunnel server and tunnel
client are encrypted.
Note: This option displays only if you purchase a license that supports
encryption of the tunnel between two systems. Select this option to encrypt
the tunnel communications.
This setting must be the same on both the tunnel server and tunnel
client.
* Local tunnel server address The IP address and port number of the tunnel server.
Default port: 1194
Note: Polycom recommends that you use the default port number 1194, but
you can use any value from 1190–1199 or 65380–65389.
3 Click Update.
The system restarts.
Field Description
Enable Tunnel The tunnel feature is enabled if you have configured the tunnel server.
Settings
Server Select Client to enable the system to operate as the tunnel client.
Client
Polycom, Inc. 44
Field Description
Encrypted tunnel When selected, communications between the tunnel server and tunnel
client are encrypted.
Note: This option displays only if you purchase a license that supports
encryption of the tunnel between two systems. Select this option to encrypt
the tunnel communications.
This setting must be the same on both the tunnel server and tunnel
client.
* Local tunnel client address The IP address and port number of the tunnel client.
Default port: 1194
Note: Polycom recommends that you use the default port number 1194, but
you can use any value from 1190–1199 or 65380–65389.
* Remote tunnel server address The IP address and port number of the tunnel server.
Default port: 1194
* Internal signaling/media/access The IP address of the network interface that the tunnel client uses for
proxy IP of tunnel client internal signaling, internal media, and internal access proxy communication
with the RealPresence DMA system.
3 Click Update.
The system restarts.
The two-system tunnel connection status displays on the user interface Dashboard on both the tunnel
server and tunnel client.
Polycom, Inc. 45
● HTTPS_proxy–HTTPS servers that provide management services (RealPresence Resource
Manager system, Polycom® RealPresence® ContentConnect™ system), and web-based video
conferencing services (RealPresence Web Suite)
● LDAP_proxy–LDAP servers that provide directory services
● XMPP_proxy–XMPP servers that provide message, presence, or other XMPP services
In addition to the default proxies, the RealPresence Access Director system supports the following proxy
configurations:
● PassThrough_proxy–A passthrough reverse proxy configuration provides transparent relay of
communication requests through the RealPresence Access Director system to internal application
servers. PassThrough_proxy is used primarily for backward compatibility with the TCP reverse proxy
feature. Note that if you upgrade your system to a new version, PassThrough_proxy will not display
on the main Access Proxy Settings page if you did not configure a TCP reverse proxy in a previous
version of the RealPresence Access Director system.
● HTTP tunnel proxy–An HTTP tunnel proxy enables SIP guest users to attend web-based video
conferences hosted by an enterprise’s RealPresence Web Suite. Due to restrictive firewall rules, if a
SIP guest client cannot establish a native SIP/RTP connection to a Web Suite video conference, the
RealPresence Access Director system can act as a web proxy to tunnel the SIP call on port 443.
Once the SIP guest client is connected to a meeting, the RealPresence Access Director system
continues to tunnel TCP traffic, including SIP signaling, media, and Binary Floor Control Protocol
(BFCP) content.
The default proxies may be edited or you can add new proxies for various internal application servers. When
you configure the proxies, you must specify an external IP address and an external listening port for access
proxy. Based on the network settings you configured (see Network Interface Configurations), you may have
external access proxy services assigned to more than one network interface. You can reuse an external IP
address but the port, in most cases, must be unique for each proxy configuration that uses the same
external IP address. For example, if you create two proxy configurations for LDAP directory services, the
combined external IP address for access proxy and the external listening port cannot be the same for both
LDAP proxy configurations.
If you create an HTTP tunnel proxy, both the HTTP tunnel proxy and the default HTTPS_proxy can use port
443 on the same external access proxy IP address.
The following examples show some possible external IP address and port combinations.
Example 1
Name of Proxy External IP Address for Access Proxy External Listening Port
Polycom, Inc. 46
Example 2
Name of Proxy External IP Address for Access Proxy External Listening Port
From the main Access Proxy Settings page, you can add new proxy configurations, edit the default proxies,
and delete proxy configurations. When adding or editing proxy settings, the system validates the settings to
ensure that no conflicts exist with any other reverse proxy configurations. The system displays a warning
message if conflicts are found.
Polycom, Inc. 47
When you configure the HTTPS Proxy settings, you can add multiple HTTPS next hops. For each next hop,
you must apply a filter that’s based on the HTTPS request message header received from the endpoint. The
RealPresence Access Director system uses the filter and other settings to send the connection request to
the correct internal HTTPS application server. Two filters are available:
● Request-URI–The next hop is based on the Request-URI in the message header received from the
endpoint. Use the Request-URI filter only when adding a next hop to a Polycom RealPresence
Resource Manager system or a Polycom ContentConnect system.
● Host header–The next hop filter is based on the host information in the message header received
from the endpoint. Use a host header filter when creating the next hop for various HTTPS application
servers, including the RealPresence Web Suite Services Portal and Experience Portal.
Setting Description
External listening port The external port at which the RealPresence Access Director
system listens for HTTPS proxy traffic.
Default port: 443
Port range: 9980–9999
Note: The RealPresence Access Director system
automatically redirects inbound access proxy traffic on ports
443 and 389 to the internal ports 65100–65130 reserved on
the system's loopback interface private IP address. The
CentOS operating system does not allow processes without
root ownership to listen on ports <1024. Redirecting access
proxy traffic on ports <1024 to the internal ports 65100–65130
enables the access proxy process to function correctly.
Require client certificate from the remote When selected, access proxy requests and verifies the client
endpoint certificate from the remote endpoint.
Polycom, Inc. 48
Setting Description
Verify certificate from internal server When selected, access proxy verifies the certificate from the
internal HTTPS server (the RealPresence Resource Manager
system, the Polycom ContentConnect system, or the
RealPresence Web Suite).
5 Add the Next hops. See To add a next hop based on the Request-URI filter: and To add a next hop
based on the Host header filter:.
Setting Description
Type Request-URI
Setting Description
Polycom, Inc. 49
Setting Description
Polycom, Inc. 50
Setting Description
External listening port The external port at which the RealPresence Access Director
system listens for LDAP traffic.
Default port: 389
Port range: 9980–9999
Note: The RealPresence Access Director system
automatically redirects inbound access proxy traffic on ports
443 and 389 to the internal ports 65100–65130 reserved on
the system's loopback interface private IP address. The
CentOS operating system does not allow processes without
root ownership to listen on ports <1024. Redirecting access
proxy traffic on ports <1024 to the internal ports 65100–65130
enables the access proxy process to function correctly.
Next hop address The internal IP address of the target LDAP server. The
RealPresence Access Director system sends a new request to
the next hop IP address on behalf of the external user.
Next hop port The port at which the internal LDAP application server listens.
Default LDAP port: 389
Require client certificate from the remote When selected, access proxy requests and verifies the client
endpoint certificate from the remote endpoint.
Verify certificate from internal server When selected, access proxy verifies the certificate from the
internal LDAP server.
5 Click Done, and then click OK to confirm the configuration settings and restart access proxy.
Polycom, Inc. 51
Setting Description
External listening port The external port at which the RealPresence Access Director
system listens for XMPP traffic.
Default port: 5222
Port range: 9980–9999
Next hop address The internal IP address of the target XMPP server. The
RealPresence Access Director system sends a new request to
the next hop IP address on behalf of the external user.
Next hop port The port at which the internal XMPP application server listens.
Default XMPP port: 5222
Require client certificate from the remote When selected, access proxy requests and verifies the
endpoint certificate of the remote endpoint.
Note: Before enabling this setting, an administrator must
install a Server SSL certificate and trusted CA certificates on
the RealPresence Access Director system. Remote clients
must also install a client certificate and trusted CA certificates.
Verify certificate from internal server When selected, access proxy verifies the certificate from the
internal LDAP server.
Note: Before enabling this setting, an administrator must
install a Server SSL certificate and trusted CA certificates on
the RealPresence Access Director system and the
RealPresence Resource Manager system.
5 Click Done, and then click OK to confirm the configuration settings and restart access proxy.
Polycom, Inc. 52
Caution: Polycom does not recommend use of a passthrough proxy
For security purposes, Polycom does not recommend use of a passthrough reverse proxy. However, if
you choose to use this function, follow the configuration instructions.
Setting Description
External listening port The external port at which the RealPresence Access Director
system listens for passthrough traffic.
Port range: 8080, 443, 9980–9999
Next hop address The internal IP address of the target application server. The
RealPresence Access Director system sends a new request to
the next hop IP address on behalf of the external user.
Next hop port The port at which the internal application server listens.
5 Click Done, and then click OK to confirm the configuration settings and restart access proxy.
Polycom, Inc. 53
You can configure both the default HTTPS_proxy and an HTTP tunnel proxy to use the same external IP
address and standard port 443. If you configure a port other than 443 as the external listening port for HTTP
tunnel proxy calls, these calls may fail if the network from which the SIP guest client calls blocks outgoing
traffic to other ports.
The following conditions apply to the HTTP tunnel proxy:
● Only one HTTP tunnel proxy can be configured.
● The HTTP tunnel proxy does not support SVC video conferencing.
● The RealPresence Access Director system supports a maximum of 50 concurrent HTTP tunnel calls.
After a call ends, the system recycles the port allocation.
● Use of an HTTP tunnel proxy is not supported with two RealPresence Access Director systems
deployed in a tunnel configuration.
Before you configure an HTTP tunnel proxy, complete the steps in each of these sections:
● Assign external access proxy IP addresses in network settings
See Access Proxy Settings
● Configure the HTTPS proxy settings
See Configure HTTPS Proxy Settings
● Configure the Web Suite Services Portal (or Experience Portal) as a next hop in HTTPS proxy
settings
See To add a next hop based on the Host header filter:
Setting Description
External listening port The external port at which the RealPresence Access Director
system listens for HTTP tunnel requests.
Recommended HTTP tunnel port: 443
Range: 80, 9980–9999
5 Click Done, and then click OK to confirm the configuration settings and restart access proxy.
Polycom, Inc. 54
To edit proxy settings:
1 Go to Configuration > Access Proxy Settings.
2 Select the proxy to edit.
3 Under Actions, click Edit, then click Next to bypass the Step 1 of 2: Protocol Selection window.
4 In the Step 2 of 2: Detailed Settings window, revise the settings as needed.
5 Click Done.
6 Click OK to confirm the changes and restart access proxy.
Caution: You must configure access proxy settings to enable device registration and
provisioning
When you configure Basic ACL Settings, you must specify the login, registration, or call requests to
allow. If not specifically allowed, the system will deny requests. To ensure that the default settings
function as intended, be sure to configure your access proxy settings to enable endpoints to register
and be provisioned (see Configure HTTPS Proxy Settings).
Polycom, Inc. 55
How Basic ACLs Work
An ACL rule defines the specific conditions of registration requests or call signaling traffic. A setting is the
action that the RealPresence Access Director system will take when the conditions of the rule are matched
(allow or deny). Basic ACL settings require you to enter minimal information about the allowed registrations
and calls to your network. Based on your input, the RealPresence Access Director system then
automatically creates the necessary ACL rules and settings on the appropriate SIP and H.323 ports that
allow or deny access to your network. The basic ACL settings you configure are also applied to any new
external SIP ports you add to your system.
Due to their ease of use, Polycom recommends that you use basic ACL settings to control access to your
video conferencing network. However, you can configure Advanced ACL Settings to create specific
customized ACL rules, conditions, variables, and settings, for your network. See Define Advanced Access
Control List Rules for detailed instructions. Note that rules the RealPresence Access Director system
automatically creates based on your basic ACL settings are labeled Basic. The default system rules and
any custom rules that you configure are labeled Advanced.
You can view ACL log information in the sipService log and the h323Service log (Diagnostics > System
Log Files). Additionally, you can view denied registration attempts and denied calls (Diagnostics >
Registration History and Diagnostics > Call History).
Setting Description
Enable Registration Policy When this setting is enabled, you can configure how the RealPresence Access
Director system responds when it receives registration requests. Based on the
settings you configure, the system allows or denies registration requests to be
proxied to your call server.
Note: Both Enable Registration Policy and Allow registration from
provisioned devices are enabled by default in new installations of the
RealPresence Access Director system. With these two settings enabled, the
default action of the RealPresence Access Director system is to deny registration
requests except for those that come from provisioned devices.
Polycom, Inc. 56
Setting Description
Allow registration from When enabled, the RealPresence Access Director system will proxy registration
provisioned devices requests from devices that are dynamically provisioned by the RealPresence
Resource Manager system.
Note: Both Enable Registration Policy and Allow registration from
provisioned devices are enabled by default in new installations of the
RealPresence Access Director system. With these two settings enabled, the
default action of the RealPresence Access Director system is to deny registration
requests except for those that come from provisioned devices. To configure
access to a provisioning server, see Configure HTTPS Proxy Settings.
Allow registration from these When enabled, you can add specific IP addresses or IP address ranges for which
IP addresses the RealPresence Access Director system will proxy registration requests. This
may be necessary for some older-model Polycom endpoints that cannot be
dynamically managed, or for non-Polycom endpoints.
The IP Address field supports use of one wildcard value (*) per IP address. For
example, if you enter 120.*.102.*, the RealPresence Access Director system
recognizes only the first wildcard value and interprets the IP address as 120.*.
The system will proxy all registration requests from devices with IP addresses
that begin with 120.
Note: If you add IP addresses and later disable this setting, the registration rules
that the RealPresence Access Director system created are removed from all
ports. However, the IP addresses you entered remain in the IP Address list. If you
later select this setting again, you do not need to re-enter IP addresses.
To add an IP address or IP address range, see To allow registration from an IP
address:.
To delete an IP address or IP address range, see To delete an allowed IP
address:.
Allow registration with these When enabled, you can specify the allowed aliases from which the RealPresence
aliases Access Director system will proxy registration requests, regardless of the device
IP address.
You can add aliases using any of the following formats:
• SIP: URI
• H.323: H.323-ID, E.164 ID, H.323-URL, E-mail name
Note: The RealPresence Access Director system creates rules that apply to all
SIP and H.323 formats, regardless of the format you enter.
An alias can contain the following characters:
a–z
A–Z
0–9
-
_
#
.
@
Note: An alias can also contain one wildcard value.
To add an alias, see To allow registration from an alias:.
To delete an alias, see To delete an allowed alias:.
Polycom, Inc. 57
To allow registration from an IP address:
1 Go to Configuration > Basic ACL Settings.
2 Select Enable Registration Policy.
3 Select Allow registration from these IP addresses.
4 In the IP Address field, enter the IP address for which to allow registration, then click Add.
The IP address displays in the IP Address list.
5 Click Update.
Polycom, Inc. 58
Configure Call Policy Settings
You can configure specific call policy settings to specify which incoming calls to your network are allowed
and to which destinations. The RealPresence Access Director system then proxies the allowed calls to your
call server based on the settings you configure. The following table describes the call policy settings.
Setting Description
Enable Call Policy When this setting is enabled, you can configure how the RealPresence Access
Director system responds when it receives incoming calls to your video network.
Based on the settings you configure, the system allows or denies calls to be
proxied to your call server.
Note: Both Enable Call Policy and Allow call from registered devices are
enabled by default in new installations of the RealPresence Access Director
system. With these two settings enabled, the default action of the RealPresence
Access Director system is to deny calls except for those that come from
registered devices.
Allow call from registered When enabled, the RealPresence Access Director system will proxy calls from
devices registered devices.
By default, the RealPresence Access Director system will proxy all calls from
registered devices. However, these calls are subject to RealPresence DMA
system dial rules.
If this setting is disabled, registered users will be subject to the same ACL rules
that the RealPresence Access Director system applies to guest users.
Note: Both Enable Call Policy and Allow call from registered devices are
enabled by default in new installations of the RealPresence Access Director
system. With these two settings enabled, the default action of the RealPresence
Access Director system is to deny calls except for those that come from
registered devices.
Allow call to the following When enabled, the RealPresence Access Director system will proxy calls to
VMR prefixes or ranges destinations that can be reached from the Internet. The system will allow calls as
follows:
• To a call destination with a prefix that matches a prefix you configure here.
• To a call destination within a range that matches a range you configure here.
Note: You can configure both prefixes and ranges.
Prefix The RealPresence Access Director system will proxy calls to call destinations
with a prefix that matches a prefix you add to the prefix and range list. When you
add a prefix, the RealPresence Access Director system automatically includes
the wildcard character (*) after the prefix.
Note: Dial string prefixes must also be defined in the RealPresence DMA system.
Range The RealPresence Access Director system will proxy calls from the Internet to
destinations that are included within any ranges that you configure here.
Note: A VMR range can include the prefixes of the VMR numbers. The
RealPresence Access Director system will allow calls only to destinations that
exactly match a range that you specify.
Polycom, Inc. 59
Setting Description
Custom allow entries Custom entries consist of a caller (source) alias and a callee (destination) alias.
The RealPresence Access Director system will proxy calls from the caller aliases
to the callee aliases that you specify.
You can add aliases using any of the following formats:
• SIP: URI
• H.323: H.323-ID, E.164 ID, H.323-URL, E-mail name
Note: The RealPresence Access Director system creates rules that apply to all
SIP and H.323 formats, regardless of the format you enter.
An alias can contain the following characters:
a–z
A–Z
0–9
-
_
#
.
@
Note: An alias can also contain one wildcard value.
Caller A caller alias specifies the source alias of the device making the call.
Callee A callee alias specifies the destination alias of the device receiving the call.
Polycom, Inc. 60
2 Select Enable Call Policy, if not already enabled.
3 Select Custom allow entries.
4 In the Caller field, enter the alias of an allowed caller.
5 In the Callee field, enter the alias of an allowed callee, then click Add.
The caller and callee combination displays in the custom allow entries list.
Manage Certificates
X.509 certificates are a security technology that assists networked computers in determining whether to
trust each other. X.509 certificates enhance security based on the following:
● A single, centralized certificate authority (CA) is established. Typically, this is either an enterprise’s IT
department or a commercial certificate authority.
● Each computer on the network is configured to trust the central certificate authority.
● Each server on the network has a public certificate that identifies the server.
● The certificate authority signs the public certificates of those servers that clients should trust.
● When a client connects to the server, the server shows its signed public certificate to the client. Trust
is established because the certificate has been signed by the certificate authority, and the client has
been configured to trust the certificate authority.
See the following topics for detailed information on use of certificates in the RealPresence Access Director
system.
● How Certificates Are Used
● Accepted Forms of Certificates
● Certificate Procedures
● View Installed Certificates
● View Certificate Details
● Add a Certificate Authority’s Public Certificate
● Create a Certificate Signing Request
● Create a Certificate Signing Request
● Review the Signed Certificate
● Add the Signed Certificate to the KEY_STORE
● Refresh the Server SSL Self-Signed Certificate
● Replace a Signed Certificate
● Delete a Certificate
Polycom, Inc. 61
How Certificates Are Used
The RealPresence Access Director system uses X.509 certificates in different ways.
● When you log into the RealPresence Access Director system's user interface from your browser, the
RealPresence Access Director system offers an X.509 certificate to identify itself to your browser
client.
The RealPresence Access Director system’s certificate must have been signed by a certificate
authority.
The browser must be configured to trust that certificate authority (beyond the scope of this
documentation).
● When a client sets up an HTTPS, LDAP, or XMPP connection with access proxy, the RealPresence
Access Director system offers an X.509 certificate to identify itself.
● When a client sends SIP messages with TLS transport, the RealPresence Access Director system
offers an X.509 certificate to identify itself.
● When the RealPresence Access Director system connects to a RealPresence Resource Manager
system, the RealPresence Access Director system may present a certificate to the RealPresence
Resource Manager system to identify itself.
● When the RealPresence Access Director system connects to another RealPresence Access Director
system or other session border controller (SBC) for a SIP enterprise-to-enterprise call, the
RealPresence Access Director system presents its certificate to the other system to identify itself.
Protocol /
Encoding File Type Description and Installation Method
CER (single certificate) A signed certificate for the system, authenticating its
file public key
To install the certificate, upload the file or paste the
certificate text into the text box.
Polycom, Inc. 62
Protocol /
Encoding File Type Description and Installation Method
CER (single certificate) A signed certificate for the system, authenticating its
file public key
To install the certificate, upload the file.
Certificate Procedures
Certificate procedures include the following:
● Install your chosen CA’s public certificate so that the RealPresence Access Director system trusts
that CA.
● Create a certificate signing request for a public certificate that identifies the RealPresence Access
Director system and submit the request to the CA.
● When you receive the public certificate signed by your CA, install it on your RealPresence Access
Director system.
● When necessary, remove a signed certificate or a CA’s certificate.
Polycom, Inc. 63
Field Description
Cert Type KEY_STORE contains the self-signed or signed certificate that identifies the
RealPresence Access Director system.
TRUSTED_STORE contains trusted certificates, such as CA certificates.
Purpose The purpose of the certificate for the RealPresence Access Director system.
• Server SSL is the public certificate that identifies the RealPresence Access Director
system. By default, this is a self-signed certificate, not trusted by other devices. You
must create a certificate signing request to apply for a signed certificate from a
certificate authority to replace the self-signed certificate. The signed certificate
identifies the RealPresence Access Director system as a trusted entity.
Note: Only one Server SSL certificate can exist in the system at one time; adding
a new Server SSL certificate will replace the old one.
• CA is the root certificate of the certificate authority that the RealPresence Access
Director system trusts. The system will treat the trusted self-signed certificates from
peers as CA certificates.
Valid Period The time range during which the certificate is valid.
Refresh Certificate Clicking Refresh replaces the current self-signed or CA-signed certificate with a new
self-signed certificate and restarts the RealPresence Access Director system.
Polycom, Inc. 64
2 Select the certificate to view and click Display Details.
Certificate Details displays the following information:
Section Description
Certificate Info
Purpose The purpose of the certificate for the RealPresence Access Director
system.
• Server SSL is the public certificate that identifies the RealPresence
Access Director system. By default, this is a self-signed certificate, not
trusted by other devices. You must create a certificate signing request
to apply for a signed certificate from a certificate authority to replace the
self-signed certificate. The signed certificate identifies the
RealPresence Access Director system as a trusted entity.
Note: Only one Server SSL certificate can exist in the system at one
time; adding a new Server SSL certificate will replace the old one.
• CA is the root certificate of the certificate authority that the
RealPresence Access Director system trusts. The system will treat the
self-signed certificates from trusted peers as CA certificates.
Key usage Indicates the operations that can be performed using the public key
contained in the certificate.
Extended key usage Indicates the purpose of the public key contained in the certificate. It
contains a list of object identifiers (OIDs), each of which indicates an
allowed use.
Issued To
Common Name (CN) For a Server SSL certificate, the fully qualified domain name (FQDN) of
the system’s management interface, as defined in the Hostname and
Domain fields in Admin > Network Settings > General Network
Setting.
For a CA certificate, the common name of that certificate.
Organizational unit (OU) The subdivision of your organization, such as Human Resources or IT, that
creates and manages the certificate.
Lists the IP address and DNS name of each Subject Alternative Name
(SAN) included on the single certificate.
Note: If you configure access proxy settings for HTTPS proxies and
specify next hops using the Host header filter, you must add the host
FQDNs as Subject Alternative Names when you create a certificate
signing request for the RealPresence Access Director system.
Issued By
Common Name (CN) The common name of the entity that issued the certificate.
Polycom, Inc. 65
Section Description
Organization (O) The name of the entity that issued the certificate.
Organizational unit (OU) Subdivisions of the entity that issued the certificate
Validity
Fingerprints
SHA-1 fingerprint The secure hash algorithm used to confirm the certificate.
Polycom, Inc. 66
3 Go to Admin > Certificates > Add Certificates.
4 In the Add Certificates dialog, do one of the following:
If you have a file, click Upload certificate and browse to the file, or enter the path and file name.
If you have PEM-format text, copy the certificate text, click Paste certificate, and paste it into the
text box.
5 Click OK.
6 In the Confirm Action dialog, click OK to restart the system.
The installed CA certificate is added to the TRUSTED_STORE list. There can be multiple CA
certificates in the TRUSTED_STORE list.
Polycom, Inc. 67
2 In the Certificate Information dialog, enter the identifying information for your RealPresence
Access Director system, as described in the following table:
Field Description
* Common Name (CN) Defaults to the fully qualified domain name (FQDN) of the RealPresence
Access Director system’s management interface, as specified in Admin
> Network Settings.
SAN List (0<=size<=20) Optional Subject Alternative Names, which can be IPv4 addresses or
FQDNs. Specifying SANs in the CSR allows additional IP addresses
and/or FQDNs to be protected with just one certificate.
If you create HTTPS reverse proxy next hops using the Host header filter
(e.g., for the Polycom® RealPresence® CloudAXIS™ Suite Services
Portal or Experiences Portal), you must specify the host FQDNs as Up to
20 SANs can be specified in the certificate signing request.
SANs. See Configure HTTPS Proxy Settings.
• To add a SAN, click the + (plus) icon and enter the IPv4 address or
FQDN.
• To delete a SAN, select it and click the X (delete) icon.
Note: Each time you add or revise a SAN, you must submit a new CSR.
Organizational unit (OU) The subdivision of your organization, such as Human Resources or IT,
that creates and manages the certificate.
Note: You can enter up to 128 characters in this field but not all
characters may display after you
* Country (C) Two-character ISO code for the country in which your enterprise is
located.
3 Click OK.
4 From the Certificate Signing Request dialog, select and copy the entire contents of the Encoded
Request box. Be sure to include the text:
-----BEGIN NEW CERTIFICATE REQUEST-----
and
-----END NEW CERTIFICATE REQUEST-----
Polycom, Inc. 68
Caution: Specifying enhanced key usage and key usage
The RealPresence Access Director system may act as both a server and a client.
When you complete the certificate signing request, be sure to specify that the
Enhanced Key Usage of the certificate must indicate both Server Authentication
and Client Authentication. Both Server Authentication and Client Authentication are
mandatory to enable a mutual TLS connection between two session border
controllers.
Key Usage must include DigitalSignature and Key_Encipherment.
Valid from/Valid to Check the validity period of the certificate to ensure that it is not
expired and is currently valid.
Note: Ensure the certificate is valid for the selected time zone.
Polycom, Inc. 69
Certificate Field Required Information
If you attempt to install an invalid certificate, the system will display error messages that explain why the
certificate is invalid.
The following table describes the potential error messages.
Certificate has expired Current RPAD System time (example): 2019–10–10 00:00:39
CST
The certificate has expired. Please check valid date from and to
in your certificate.
Polycom, Inc. 70
Cause of Error Error Message
Key usage of the certificate is incorrect The key usage of the certificate should include at least
DigitalSignature and Key_Encipherment.
Enhanced/Extended key usage of the certificate The enhanced/extended key usage of the certificate should
is incorrect include at least Server Authentication (1.3.6.1.5.5.7.3.1) and
Client Authentication (1.3.6.1.5.5.7.3.2)
Polycom, Inc. 71
If you have PEM-format text, copy the certificate text, click Paste certificate, and paste it into the
text box below. You can paste multiple PEM certificates one after the other.
3 Click OK.
4 In the Confirm Action dialog, click OK to restart the system.
The certificate is added to the TRUSTED_STORE.
Delete a Certificate
In the RealPresence Access Director system, you can delete certain certificates.
To delete a certificate:
1 Go to Admin > Certificates.
2 Select the certificate to delete.
If the certificate is eligible for deletion, Delete Certificate displays under Actions.
3 Click Delete Certificate.
4 In the Information dialog, click OK.
5 In the Confirm Action dialog, click Yes to restart the system.
Polycom, Inc. 72
Provision the System
When the RealPresence Access Director system is integrated with a Polycom RealPresence Resource
Manager system, the RealPresence Resource Manager system can provision remote endpoints if the
endpoints are registered with the RealPresence Resource Manager system. Additionally, some of the
settings for the RealPresence Access Director system can be provisioned. See Connect to the
RealPresence Resource Manager System for instructions.
For specific details on provisioning, see Polycom Unified Communications in RealPresence Access Director
System Environments and the Polycom RealPresence Resource Manager System Operations Guide for
your version of the RealPresence Resource Manager system.
Provisioning of the RealPresence Access Director system is optional. If not provisioned, you can manually
configure all system settings.
Note: Provisioning not supported in the RealPresence Access Director, Virtual Edition
The RealPresence Access Director system, Virtual Edition cannot be provisioned by a RealPresence
Resource Manager system. You must manually configure all access proxy settings. Note that the
RealPresence Access Director system, Virtual Edition does enable endpoint provisioning by a
RealPresence Resource Manager system.
Field Description
Login Name The name of the RealPresence Access Director system user account.
Password The password of the RealPresence Access Director system user account.
Verify certificate from internal Enable if certificates need to be verified between the RealPresence Access
server Director system and the RealPresence Resource Manager system.
Note: Before enabling this setting, an administrator must install a Server SSL
certificate and trusted CA certificates on the RealPresence Access Director
system and the RealPresence Resource Manager system.
3 Click Connect.
The RealPresence Resource Manager system provisions the settings you configured for the
RealPresence Access Director system.
Polycom, Inc. 73
To disconnect from the RealPresence Resource Manager System:
1 Go to Admin > Polycom Management System.
2 Click Disconnect.
Field Description
Directory server address The IP address or FQDN of the Active Directory server.
Domain\User name The domain and user name that the RealPresence Access Director system
uses to log into Active Directory and retrieve domain and group information.
Password The password that the RealPresence Access Director system uses to log
into Active Directory.
Base DN Optional.
Base distinguished name (DN) is the top level of the LDAP directory.
Specify the base DN in the following form (case insensitive):
DC=Polycom,DC=com
The RealPresence Access Director system fetches Active Directory
domains from the specified base DN.
Polycom, Inc. 74
Field Description
Security level The security level for the connection and communication between the
RealPresence Access Director system and the Active Directory server.
Three options are available:
• Plain–Uses the LDAPv2 extension; all communication between the
RealPresence Access Director system and the Active Directory server is
in plain text (low security).
• LDAPS–Also known as LDAP over SSL; uses the LDAPv2 extension
(medium security). If you select this level of security, do not enable Verify
certificate from internal server.
• StartTLS–Uses the LDAPv3 extension to establish a TLS connection
over the existing LDAP connection with the Active Directory server (high
security).
Polycom recommends selecting StartTLS for the most secure LDAP
communication.
Verify certificate from internal server When selected, the RealPresence Access Director system validates the
Active Directory certificate when establishing a connection with Active
Directory.
4 Click Update.
Polycom, Inc. 75
5 Click OK.
6 Click Update.
Port Name Port Number Transport Type Certificate Dial String Policy
The system also has default internal SIP port settings used for communication to and from the
RealPresence DMA system, which acts as the SIP server. The following table lists the internal port settings.
Polycom, Inc. 76
To configure SIP settings:
1 Go to Configuration > SIP Settings.
2 Select Enable SIP signaling.
3 Use the information in the following table to configure the settings for your system. An asterisk (*)
indicates a required field.
Field Description
* Port number The external listening port the RealPresence Access Director system uses
to receive SIP signaling messages to be forwarded to a RealPresence DMA
system.
Note: Polycom recommends that you use the default port number 5060 for
UDP/TCP and 5061 for TLS, but you can use any value from 5060-5100 or
65400–65499 that is not already in use.
Require certificate from remote This option is available only for TLS transport. When enabled, the
endpoint RealPresence Access Director system requires a valid certificate from
remote endpoints.
Note: This option must be enabled if the port will be used for a SIP
federation.
Default contact port for SIP open The listening port the RealPresence Access Director system uses to
B2B receive SIP requests from endpoints that are not registered or are not
members of a federated enterprise or division.
The RealPresence Access Director system routes SIP open B2B calls only
if you specify a valid default contact port for each type of transport. The
default SIP ports are:
TCP, UDP: 5060
TLS over TCP: 5061
You can designate other unused ports as the default contact ports if
preferred. Only one default contact port can be configured for each type of
transport.
Dial string policy When enabled, the RealPresence Access Director system uses a dial string
prefix to route incoming SIP messages from the external port to a
RealPresence DMA system.
Prefix of Userinfo The dial string prefix that the RealPresence Access Director system adds to
the request line of the SIP INVITE message that is routed to the
RealPresence DMA system.
Note: This dial string prefix must also be defined in the RealPresence DMA
system.
Host Specifies the host IP address or FQDN to use in the dial string.
Caution: If you define a new host, or edit an existing host, you must also
define the host in the RealPresence DMA system. If its host is not defined,
the DMA system will reject calls from the new host.
Polycom, Inc. 77
Field Description
* Unencrypted port The transport protocol the RealPresence Access Director system uses for
unencrypted SIP calls and the internal listening port the system uses for
SIP signaling messages from the RealPresence DMA system.
Default UDP/TCP port: 5070
Note: Polycom recommends that you use the default port numbers, but you
can use any value from 5060–5100 or 65400–65499 that is not already in
use and is different from the TLS port.
* TLS port The internal listening port the RealPresence Access Director system uses
for TLS-encrypted SIP signaling messages from the RealPresence DMA
system.
Default TLS port: 5071
Note: Polycom recommends that you use the default port number, but you
can use any value from 5060–5100 or 65400–65499 that is not already in
use and is different from the UDP/TCP port.
If SIP signaling is enabled, TLS is automatically supported.
* SIP registrar (Next hop) address, The IP address or FQDN of the SIP registrar server, and the destination
Port, and Transport port number and transport protocol the system uses to communicate with
the SIP registrar server.
The port number of the SIP registrar server must be the same as the port
on which the SIP server in the RealPresence DMA system listens. The
transport protocol must be supported by the SIP registrar server.
Default TCP and UDP port: 5060
Default TLS port: 5061
Default transport protocol: TCP
Note: Polycom recommends that you use the default port number 5060 for
UDP and TCP, and port number 5061 for TLS; however, you can use any
value from 5060–5100 or 65400–65499 that is not already in use.
When AUTO is selected, the transport protocol depends on the DNS query
result for the SIP registrar address.
Only the TCP and TLS transport options are available if you select TCP in
the Unencrypted port field.
Polycom, Inc. 78
Field Description
* SIP proxy (Next hop) address, The IP address or FQDN of the internal SIP proxy server to which the
Port, and Transport RealPresence Access Director system routes SIP registration requests or
SIP call requests from endpoints. The RealPresence DMA system acts as
the SIP proxy server so this is the DMA system IP address.
The port number of the SIP proxy server must be the same as the port on
which the SIP server in the RealPresence DMA system listens. The
transport protocol must be supported by the SIP proxy server.
Default TCP and UDP port: 5060
Default TLS port: 5061
Default transport protocol: TCP
Note: Polycom recommends that you use the default port number (5060)
for UDP and TCP, and port number 5061 for TLS; however, you can use
any value from 65400–65499 that is not already in use.
When AUTO is selected for transport, the transport protocol depends on the
DNS query result for the SIP proxy address.
Only the TCP and TLS transport options are available if you select TCP in
the Unencrypted port field.
* Registration refresh interval Specifies how often registered SIP endpoints send keep-alive messages to
the SIP registrar server to refresh the existing registration. Endpoints that
fail to send keep-alive messages on time must send a new registration
request.
This value must be greater than or equal to the minimum SIP registration
interval that the SIP registrar server allows.
Default: 300 seconds
Range: 1–99999 seconds
* RFC5626 keep-alive interval The number of seconds (Flow-Timer value) after which the SIP registrar
considers a call dead if no keep-alive message is sent by an RFC5626
endpoint.
Default: 120 seconds
Range: 1–99999 seconds
Skip validating TLS certificate from When enabled, the RealPresence Access Director system accepts TLS
remote server certificates from remote servers or other devices and allows outgoing TLS
calls to proceed. However, the RealPresence Access Director system does
not validate the certificates of the remote devices.
Polycom, Inc. 79
3 Click Add next to the External Port Settings list.
4 Complete the external port settings as described in the table in Configure SIP Settings.
5 Click OK.
6 Click Update.
Polycom, Inc. 80
● Enables the keep-alive mechanism of H.460.19 for opening and maintaining Real-time Transport
Protocol (RTP) and Real-time Transport Control Protocol (RTCP) pinholes in the firewall for
communication between the remote endpoint and the gatekeeper.
Note: H.460 endpoints must use the same port to send and receive one media
stream
The RealPresence Access Director system supports symmetric media
communication. This means that remote H.460 endpoints must use the same port
to send and receive one media stream.
Field Description
Enable H.323 signaling Enables the system to operate as an H.323 server, transmitting H.323
requests and responses for H.323 endpoints.
Caution: Disabling H.323 terminates any existing H.323 calls.
* H.225 RAS port The internal listening port the RealPresence Access Director system uses
for receiving Registration, Admission, and Status (RAS) messages from the
RealPresence DMA system gatekeeper.
Default: 1719
Note: Polycom recommends that you use the default port number, but you
can use any value from 1700–1800 or 65400–65499 that is not already in
use.
* H.225 call signaling port The internal listening port the RealPresence Access Director system uses
for receiving Q.931 signaling messages from the RealPresence DMA
system gatekeeper.
Default: 1720
Note: Polycom recommends that you use the default port number, but you
can use any value from 1700–1800 or 65400–65499 that is not already in
use.
* H.225 RAS port The external listening port the RealPresence Access Director system uses
for receiving Location Request (LRQ) messages to be forwarded to the
RealPresence DMA system gatekeeper.
Default: 1719
Note: Polycom recommends that you use the default port number, but you
can use any value from 1700–1800 or 65400–65499 that is not already in
use.
Polycom, Inc. 81
Field Description
* H.225 call signaling port The external listening port the system uses for receiving Q.931 signaling
messages to be forwarded to the RealPresence DMA system gatekeeper.
Default: 1720
Note: Polycom recommends that you use the default port number, but you
can use any value from 1700–1800 or 65400–65499 that is not already in
use.
General settings
* Gatekeeper (Next hop) address The IP address or FQDN of the H.323 gatekeeper.
* RAS port The listening port of the RealPresence DMA system gatekeeper. The
RealPresence Access Director system forwards LRQ messages to this
port.
Note: Polycom recommends that you use the default port range 0–65535.
* H.225 call signaling port The listening port of the RealPresence DMA system gatekeeper. The
RealPresence Access Director system forwards Q.931 signaling messages
to this port.
Note: Polycom recommends that you use the default port range 0–65535
Allow any incoming LRQ When enabled, the RealPresence Access Director system forwards any
incoming gatekeeper neighboring Location ReQuest (LRQ) to your
enterprise’s gatekeeper (DMA system) without validating whether the
source IP address belongs to a neighbored division or enterprise.
Allow any outgoing LRQ When enabled, the RealPresence Access Director system forwards any
outgoing gatekeeper neighboring Location ReQuest (LRQ) from your
enterprise’s gatekeeper (DMA system) without validating whether the
destination address belongs to a neighbored division or enterprise.
Enable H.323 guest policy When enabled, the RealPresence Access Director system adds a prefix to
the dial string when forwarding H.323 guest calls from an external network
to the RealPresence DMA system.
Default: disabled
Note: If both Enable H.323 guest policy and Enable H.323 default policy
are enabled, the RealPresence Access Director system uses the default
destination alias you specify to forward H.323 guest calls to the
RealPresence DMA system.
Prefix to dial string If H.323 guest policy is enabled, the RealPresence Access Director system
adds the prefix you specify to the dial string when forwarding H.323 guest
calls from an external network to the RealPresence DMA system.
Polycom, Inc. 82
Field Description
Enable H.323 default policy Select to enable the RealPresence Access Director system to assign a
default destination alias to incoming H.323 guest calls that do not already
include a destination alias in the Q.931 call SETUP message. The
RealPresence Access Director system uses the default destination alias
you specify to route H.323 guest calls to the RealPresence DMA system.
The system uses two types of default aliases to associate a call from an
H.323 guest endpoint with a specific gatekeeper:
• E.164
• H.323_ID
E.164 A default destination alias string that consists of numbers, e.g., a meeting
room number or extension number.
H.460 settings
External registration refresh interval Specifies how often registered endpoints send keep-alive messages to the
RealPresence Access Director system to refresh the existing call
registration. Endpoints that fail to send keep-alive messages on time must
send a new registration request.
Default value: 60 seconds
Range: 15–150 seconds
Internal registration refresh interval Specifies how often the RealPresence Access Director system sends
keep-alive messages to the RealPresence DMA system to refresh the
existing call registration.
Default: 300 seconds
Range: 150–9999 seconds
Polycom, Inc. 83
TURN Services
Web Real-Time Communication (WebRTC) is a web-based communication technology that provides
high-quality video and audio communication capabilities in some web browsers, without requiring
installation of a custom plug-in. By using Google Chrome, users both inside and outside your enterprise
network can attend web-based Polycom® RealPresence® Web Suite Pro conferences, in which media is
exchanged directly between WebRTC clients (mesh conference) or between WebRTC clients and a
Polycom RealPresence Collaboration Server Multipoint Control Unit (MCU).
To support WebRTC-based video conferencing, the RealPresence Access Director system implements both
Session Traversal Utilities for NAT (STUN) and Traversal Using Relays around NAT (TURN) protocols.
When needed, the RealPresence Access Director system can act as a STUN and TURN server to enable
firewall and NAT traversal of UDP media traffic between WebRTC clients.
WebRTC clients use Interactive Connectivity Establishment (ICE) to establish traffic flows in environments
where NAT and firewall traversal may be an issue. Using ICE, the clients determine the most efficient path
to send media to each other. The possible paths include use of "host candidates” (where media can be sent
to the client's local IP address), "server reflexive candidates" (where media can be sent to the client's public
IP address hosted by an intervening firewall/NAT element) or a "relay candidate" (where media is sent to a
TURN server, which relays the media to the local client).
A WebRTC client behind a firewall/NAT (and thus with a private IP address) uses STUN to discover its own
public IP address and port on the firewall's external interface so it can communicate that address to a peer
as a possible way for the peer to send media to the WebRTC client.
TURN is necessary when a WebRTC client wants to communicate with a peer but cannot do so due to both,
client and peer, being behind respective NATs. STUN is not an option if one of the NATs is a symmetric NAT
(a type of NAT known to be non-STUN compatible). TURN is also needed when direct UDP media cannot
be exchanged for other reasons (for example, due to an organization's firewall policies). Using the TURN
protocol, a WebRTC client can allocate a media relay port on the TURN server that the far end can use to
indirectly send media to the WebRTC client.
When you enable and configure the TURN server and a TURN user, internal and external WebRTC clients
can request TURN media relay services.
Polycom, Inc. 84
allocation is required for each peer-to-peer connection. For example, if three users attend a conference,
each peer typically has two allocations, one for each other peer on the call.
When an MCU hosts a WebRTC call, the TURN server relays media for the allocation between each
WebRTC client and the bridge.
Once the TURN server creates allocations, you can view details about them by going to Diagnostics >
TURN Allocations (see View TURN Allocations). Note that the number of allocations on the TURN server
may not correspond with the number of calls in progress. Typically, each WebRTC client will create one
TURN allocation for each peer with which it needs to connect. The ICE candidate selection process then
determines the most efficient path available, so individual allocations may not be needed if the media can
be sent directly to a host or server-reflexive address or through an existing TURN relay allocated by a peer
client. Unused allocations will expire 10 minutes after media relay transfer begins. Typically, one allocation
will remain active per leg for the duration of the call.
The RealPresence Access Director system supports up to 1200 allocations.
Settings Field
TURN Settings
Listening IPs–Available IPs The list includes the IP addresses of all network interfaces configured on your
system.
Polycom, Inc. 85
Settings Field
* Listening IPs–Selected IPs The list displays the IP address of the network interface you assign to provide
TURN services. You should select the network interface assigned to external
signaling and map the externaI IP address (private) to the public IP address on
your firewall, specified in External IP Address of NAT.
• Select the IP address from the Available IPs list, then click the right arrow to
move the IP address to the Selected IPs list.
Assign TURN services to only one network interface.
* TURN port (UDP) The listening port the RealPresence Access Director system uses to receive
TURN allocation requests from internal or external clients.
Default UDP port: 3478
Allowable port range: 65370-65379
* Relay port range (UDP) The port range used to relay media directly between WebRTC clients in a mesh
call or between WebRTC clients and an MCU in a bridge call.
Default port range: 49152–65535
Allowable relay port range: 32768–65535
Polycom recommends that you use the default port range, but you can choose
any port range within the allowable range that is not already in use. Each
allocation requires one port, so if your port range is small, only a small number of
allocations can be supported at one time.
* Default authentication realm The realm is typically a domain name and is part of the required authentication
credentials for a TURN user. If a WebRTC client provides only a username and
password when requesting TURN services, the TURN server automatically
assigns the default authentication realm.
External IP address of NAT The public IP address for TURN, mapped on the external firewall.
This field is required if you selected Deployed behind Outside Firewall with
NAT when you configured your network settings. See Configure Network
Interfaces.
TURN Users
Realm A list of the realms for each TURN user you create.
TURN Users
The TURN server requires authentication of all relay allocation requests. When the TURN server receives
an unauthorized initial allocation request from a WebRTC or MCU client, the TURN server responds with its
realm, which identifies the TURN user credentials a WebRTC client or MCU (TURN user) must use to
Polycom, Inc. 86
authenticate further requests with the TURN server. The credentials include the username and password to
be used with the realm of the TURN server.
Polycom, Inc. 87
Field Description
Media Relay
External Relay IP Address The external IP address of the RealPresence Access Director system
network interface that receives media relay requests from remote users.
Internal Relay IP Address The internal IP address of the RealPresence Access Director system
network interface used to forward media relay requests to the
RealPresence DMA system and receive media relay responses from the
DMA system.
Band Width Limitation Specifies the total available media bandwidth. When the total bandwidth is
used by all active calls, the next call request will be rejected
The default value is 256 Mbps.
Enable QoS When enabled, you can select the Quality of Service (QoS) for the media
packets relayed by the system.
QoS Setting Specifies 20 classes of differentiated services (DiffServ) that enable you to
set the priority of media packets relayed by the system for video, audio,
and far-end camera control.
The default setting is disabled.
Note: Polycom recommends that you use the default value Real-Time
Interactive when QOS is enabled.
For detailed implications for each Diffserv type, refer to RFC4594.
Note: Obtain and install the certificate of the other system before configuring
a federation
Before you configure a SIP federation, you must obtain the CA certificate of the
trusted server or device with which you will create the federation and install it in
your RealPresence Access Director system’s TRUSTED_STORE. See Add a
Certificate from a Trusted Connection.
For additional information about federations, see Federation Between RealPresence Access Director
Systems and Federation Between RealPresence Access Director and Other Systems in Polycom Unified
Communications in RealPresence Access Director System Environments.
Polycom, Inc. 88
To view current enterprise federations:
1 Go to Configuration > Federation Settings.
The system displays details about currently federated companies or divisions, as shown in the
following table:
Field Description
Name The name of the company name with which you have a federated
connection
First Remote Listen Port SIP: The remote listening port of the trusted SIP peer
H.323: The H.225 RAS port of the trusted H.323 neighbor
Local Contact Port The port on the local RealPresence Access Director system used for
incoming SIP calls from the federated company.
Note: Local ports used for incoming calls from a SIP federation must
be configured for mutual TLS communication. This means that the
RealPresence Access Director system will accept the certificate of
the federated company during incoming calls. See External Port
Settings in Configure SIP Settings.
Add a Federation
To establish a trusted connection with an external enterprise or division, you can create a federation with
the other enterprise.
Note: Configure access control lists to allow incoming calls from federations
After you add a federation, you must configure the appropriate call policy settings in
Basic Access Control Lists to allow incoming calls from federations. See Configure
Call Policy Settings.
Polycom, Inc. 89
2 Under Actions, click Add.
3 In the Add Company window, complete the following fields for the new trust connection:
Field Description
Prefix The numeric prefix that the RealPresence Access Director system assigns to
the SIP server and gatekeeper of the federated enterprise. When prefixes are
assigned, callers from your enterprise can dial the prefix of the SIP server or
federated enterprise gatekeeper plus the alias of the destination.
You can reuse the same prefix for a single SIP federated connection and an
H.323 neighbor; however, the prefix for each SIP federated connection and
each H.323 neighbor must be unique.
Example:
Prefix 77 can be assigned to both SIP federation 1 and H.323 neighbor 1.
Prefix 77 cannot be assigned to SIP federation 2 or H.323 neighbor 2.
Strip Prefix When selected, the RealPresence Access Director system removes the prefix
from the dial string.
Local Contact Port The listening port on the local RealPresence Access Director system for the
SIP trunk or H.323 gatekeeper connection.
Note: The local port used for incoming calls from a SIP federated peer must be
configured for mutual TLS communication. This means that the RealPresence
Access Director system will validate the certificate of the federated company
during incoming calls. See External Port Settings in Configure SIP Settings
4 Click OK.
Polycom, Inc. 90
Edit a Federation Setting
You can revise federation settings if information about the other enterprise or division changes.
Polycom, Inc. 91
System Administration and Additional
Settings
After configuring the key settings for the Polycom® RealPresence® Access Director™ system (see System
Configuration), you can customize additional system settings based on your firewall and network
requirements. See these topics for detailed instructions:
● High Availability Settings
● Set Custom Security for Network Access
● Configure Port Range Settings
● Configure Log Settings
● SNMP Overview
● Configure SNMP Settings
● Configure History Retention Settings
● Define Advanced Access Control List Rules
● Use Variables in Access Control List Rules
● Apply Rule Settings to Access Control List Rules
Polycom, Inc. 92
Read Deploying RealPresence Access Director Systems with High
Availability in Polycom Unified Communications in RealPresence Access
Director System Environments
To use two systems to provide High Availability, you must configure specific network
settings before you configure the High Availability settings. For complete details on
setting up your two systems with High Availability, see Deploying RealPresence
Access Director Systems with High Availability in Polycom Unified Communications
in RealPresence Access Director System Environments.
Enter required information for all NICs before you submit your HA settings
When you configure High Availability settings, you need to enter the required information for each
active NIC before you submit your settings. If you try to submit partial settings, you may have errors
that result from missing information.
Setting Description
Interface Settings
Local Virtual IP Address The virtual IP address of the selected local network interface.
The Local Physical IP Address, Local Virtual IP Address, and Peer Virtual IP
Address must be on the same subnet for the selected interface.
Note that if the selected network interface has assigned services, the virtual IP
address will inherit the same service bindings.
Note: This field is required only on network interfaces with signaling and access
proxy traffic assigned that are not enabled as HA links.
Polycom, Inc. 93
Setting Description
Peer Virtual IP Address Virtual IP address of the same network interface on the peer system.
Note: This field is required only on network interfaces with signaling and access
proxy traffic assigned that are not enabled as HA links.
Peer Virtual Hostname Virtual hostname of the same network interface on the peer RealPresence
Access Director system.
Example: ha-rpad-2-0
Note: This field is required only on network interfaces with signaling and access
proxy traffic assigned that are not enabled as HA links.
HA Communication Settings
Use Direct Link Select this option if you have a direct, physical link (crossover or Ethernet cable)
between the same network interface on both systems.
Use Direct Link cannot be enabled on network interfaces that have assigned
services.
Peer Physical IP Address The physical IP address of the same network interface on the peer RealPresence
Access Director system.
Note: This field is required on network interfaces that you enable as HA links.
Configured Services
Each network interface Displays the services assigned to each network interface you select.
Polycom, Inc. 94
6 Click Configure Peer to apply the same settings to the peer system.
7 Complete the following fields. Note that all fields are required:
Peer IP: Enter the management IP address of the peer RealPresence Access Director system.
Peer Port: Port 8443 is the default port for the peer system.
Peer Admin Account: The username that the peer system administrator uses to log in to the
system’s web user interface.
Peer Admin Password: The peer system administrator’s login password.
Click OK.
Change HA Password
When you configure two RealPresence Access Director systems for High Availability, the two systems share
an internal account that supports authentication between the systems. The account does not require any
interaction. However, if your network policy requires you to change passwords at certain intervals, you can
use the Change HA Password option.
Polycom, Inc. 95
● Enable access proxy white list authentication for LDAP and XMPP access–When enabled, the
RealPresence Access Director system denies all LDAP and XMPP requests from endpoints that are
not provisioned by a RealPresence Resource Manager system.
● Enforce TLS for LDAP connection–When enabled, the RealPresence Access Director system
denies all LDAP connection requests sent from remote endpoints without TLS encryption.
Polycom, Inc. 96
● Access proxy dynamic source ports (This feature is not related to the number of calls on a license
and the full range of ports is available by default. You can specify both the beginning and end port
numbers to limit the range for access proxy.
● External media ports
● Internal media ports
Note: BFCP/TCP ports support content streaming through HTTP tunnel proxy
The RealPresence Access Director system allocates TCP ports for BFCP traffic.
The BFCP/TCP ports are used exclusively to support content streaming through the
HTTP tunnel proxy for RealPresence Web Suite users.
The following table summarizes general port information, the number of ports the RealPresence Access
Director system reserves for each type of port, and an example port range on a system licensed for 100
calls.
If you change the port range settings, the RealPresence Access Director system validates the new settings
to ensure that no overlap occurs among any of the port range settings. Additionally, the system checks the
port ranges to confirm the following:
● No end port number is greater than 60000.
● No beginning port number is less than 10000.
● No overlap occurs between the port ranges for TCP transport and no overlap occurs between the port
ranges for UDP transport if the ports are configured for the same IP address.
Polycom, Inc. 97
To configure the port range settings:
1 Go to Admin > Port Range Settings.
If you have not activated your license for an Appliance Edition system, the default settings for a
five-call trial license display.
2 Enter the beginning port number for the port range you want to change.
The system automatically updates the ending port number value.
3 Click Update and confirm the changes.
The system confirms that the update was successful.
The following table describes the log file settings and their default values.
Rolling frequency The frequency at which the system rolls active Every day
log files into archive files.
If rolling the logs daily (default setting)
produces logs that are too large to manage, or
if rolling log files are being overwritten, select a
shorter interval.
Retention period (days) The number of days that the system retains 7 days
archived log files before deleting them.
Range: 1–30 days
Polycom recommends downloading archived
log files before the end of the retention period.
Logging level The event severity level at which the system Info
will start creating logs. For example, if the
logging level is Error, the system will create
only Error-level and Fatal-level logs.
Polycom, Inc. 98
Field Description Default Value
Severity filter The event severity filter to apply to the remote Info
syslog server.
If you have more than one remote server, you
can specify different severity filters for each
server.
Debug Detailed information used to debug the system. Using this level captures more
information but consumes a higher level of system resources
If you set the logging level to Debug to capture details for debugging, set the logging
level back to the default Info when you finish debugging.
Info Normal operational messages that highlight the progress of the system and do not
require any action.
Info is the default logging level.
Warn Warning messages that indicate an error will occur if action is not taken.
Polycom, Inc. 99
Logging Level Description
Error Non-urgent error events that must be resolved within a given time. These events may
allow the system to continue running.
Fatal Severe error events that will cause the system to abort.
Log file size–Maximum size you specify for each log file, ranging from 1 to 50 MB.
Field Description
Transport The transport protocol the system uses to send log files to the remote
server.
Default value is UDP.
Remote address The IP address of the remote server where the log files will be stored.
Remote port The listening port for syslog-ng on the remote system.
Severity filter The event severity filter to apply to the remote syslog server.
Debug
Info (default)
Notice
Warning
Err
Crit
Alert
Emerg
4 In Source log files, select the Available source files for syslog-ng to store as local log files and
forward to the remote server:
ACCESSPROXY
ACTIVECALLAUDITOR
DBACCESS
H323SERVICE
LICENSE
SIPSERVICE
SNMP Overview
SNMP is an application-layer protocol that provides a message format for communication between SNMP
managers and agents. SNMP provides a standardized framework and a common language used for the
monitoring and management of resources in a network.
SNMP Framework
The SNMP framework has three parts:
● An SNMP manager
The SNMP manager is the system used to control and monitor the activities of network hosts using
SNMP. A variety of network management applications are available for use with SNMP. It is important
to note that you should understand how your SNMP management system is configured to properly
configure your Polycom system SNMP transport protocol requirements, SNMP version requirements,
SNMP authentication requirements, and SNMP privacy requirements. For information on using
SNMP management systems, see the appropriate documentation for your application.
● An SNMP agent
The SNMP agent is the software component within the Polycom system that maintains the data for
the system and reports these data, as needed, to managing systems. The agent and MIB reside on
the same system.
● A MIB
The MIB (Management Information Base) is a virtual information storage area for network
management information, which consists of collections of managed network objects. You can
configure the SNMP agent for a particular system MIB. The agent gathers data from the MIB, the
repository for information about system parameters and network data. Polycom systems include
Polycom-specific MIBs with every system as well as third-party MIBs. Polycom MIBs are
self-documenting, including information about the purpose of specific traps and inform notifications.
Third-party MIBs accessible through the Polycom system may include both hardware and software
system MIBs.
SNMP Versions
Polycom supports two versions of SNMP:
SNMP Notifications
A key feature of SNMP is the ability to generate notifications from an SNMP agent. Notifications are called
as such because they are sent, unsolicited and asynchronous to the SNMP manager from the Polycom
system. Notifications can indicate improper user authentication, restarts, the closing of a connection, loss
of connection to another system, or other significant events. They are generated as informs or trap requests.
Traps are messages alerting the SNMP manager to a system or network condition change. Inform requests
(informs) are traps that include a request for a confirmation receipt from the SNMP manager. Traps are less
reliable than informs because the SNMP manager does not send any acknowledgment when it receives a
trap. However, informs consume more system and network resources. Traps are discarded as soon as they
are sent. An inform request is held in memory until a response is received or the request times out. Traps
are sent only once while informs may be retried several times.The retries increase traffic and contribute to
a higher overhead on the network. Thus, traps and inform requests provide a trade-off between reliability
and network resources.
Setting Description
Transport Specifies the transport protocol for SNMP communications. SNMP can be
implemented over two transport protocols:
TCP—This protocol has error-recovery services, message delivery is
assured, and messages are delivered in the order they were sent. Some
SNMP managers only support SNMP over TCP.
UDP—This protocol does not provide error-recovery services, message
delivery is not assured, and messages are not necessarily delivered in the
order they were sent.
Because UDP doesn't have error recovery services, it requires fewer network
resources. It is well suited for repetitive, low-priority functions like alarm
monitoring.
Port Specifies the port that the RealPresence Access Director system uses for
general SNMP messages. By default, the RealPresence Access Director
system uses port 161.
Community For SNMPv2c, specifies the context for the information, which is the SNMP
group to which the devices and management stations running SNMP belong.
The RealPresence Access Director system has only one valid context—by
default, public—which is identified by this Community name. The
RealPresence Access Director system will not respond to requests from
management systems that do not belong to its community.
4 Click Update.
Field Description
Security user The user name of the security user authorized to actively retrieve SNMP data.
Authentication type The authentication protocol used to create unique fixed-sized message digests of a
variable length message.
The RealPresence Access Director system implements communication with
authentication and privacy (the authPriv security level, as defined in the USM
MIB).
Authentication type options:
• MD5–Creates a digest of 128 bits (16 bytes)
• SHA–Creates a digest of 160 bits (20 bytes)
Both methods include the authentication key with the SNMPv3 packet and then
generate a digest of the entire SNMPv3 packet.
Authentication password The authentication password that’s used, together with the local engine ID, to create
Confirm password the authentication key included in the MD5 or SHA message digest.
Encryption type The privacy protocol for the connection between the RealPresence Access Director
system and the SNMP agent.
Encryption type options:
• No encryption
• DES–Uses a 56-bit key with a 56-bit salt to encrypt the SNMPv3 packet
• AES–Uses a 128-bit key with a 128-bit salt to encrypt the SNMPv3 packet
Encryption password The password that’s used, together with the local engine ID, to create the encryption
Confirm password key used by the privacy protocol.
4 Click OK.
The user displays in the Notification Users list.
Field Description
Transport The transport protocol for SNMP communications to the host receiver (TCP or UDP).
Address The IP address of the host receiver (the SNMP manager to which this agent sends
notifications).
Port The port that the RealPresence Access Director system uses to send notifications.
Default port–162
Notification type The type of notification that this agent sends to the notification receiver:
• Inform–The agent sends an unsolicited message to a notification receiver and
expects or requires the receiver to respond with a confirmation message.
• Trap–The agent sends an unsolicited message to a notification receiver and does
not expect or require a confirmation message.
SNMP version The version of SNMP used for this agent (v2c or v3).
Security user For SNMP v3, the user name of the security user authorized to actively retrieve
SNMP data.
3 Click OK.
The agent appears in the Notification Agents list.
Name Description
Polycom recommends that you view MIB files with a MIB viewer application.
To download a MIB:
1 Go to Admin > SNMP Settings.
2 Under Actions, click Download MIBs.
3 Select the MIB and click Download.
displays.
4 In the Save As window, navigate to where you want to save the MIB file locally and click Save.
5 Click Close to close the File Download window, and then click OK.
Note: Purging call history or records also purges all associated data
When the system purges call history or registration history records, all of the
associated data is also purged, including call events, call properties, and
registration signaling events.
Some types of call signaling messages are not recorded in call history, including SIP OPTION and SIP
INFO.
Field Description
Enable recording of registration Enables the system to retain registration history records.
history Default: Enabled
Registration history records to The number of registration history records the system retains before purging
retain the oldest records.
Default: 250,000
Range: 50,000–500,000
Registration signaling message The number of system registration signaling message records the system
records to retain retains before purging the oldest records.
Default: 1,000,000
Range: 10,000–1,000,000
Enable recording of registration Enables the system to retain SIP registration refresh and H.323 lightweight
refresh Registration Request (RRQ) records.
Default: Disabled
Call history records to retain The number of call history records the system retains before purging the
oldest records.
Default: 250,000
Range: 50,000–500,000
History record purge interval How often the system checks the number of registration and call history
records to see if they exceed the maximums. When the maximum number of
records to retain is reached, the system purges the excess.
Default: Every 30 minutes
Range: 5–1,440 minutes
The retention of history records The number of days that the system keeps system registration and call history
according to time records before purging the records that are older than the maximum number
of days specified.
Default: Every 90 days
Range: 10–180 days
Field Description
General Info
Name When you select a Rule Name, the name of the rule displays under General
Info.
Condition Lists conditions for the rule you selected. A condition includes an attribute,
operator, and value.
If a rule has more than one condition, a relation defines how the conditions
are applied relative to each other:
• and–If a message meets all of the conditions in the rule, the action for the
rule is applied to the message.
• or–If a message meets any one of the conditions in the rule, the action for
the rule is applied to the message.
• and and or display as folders. Click the folder to display all attributes for the
relation.
Attribute When you select a condition, the attribute, operator, and value for the
condition display.
Attributes specify the fields in a SIP or H.323 request message.
Operator An operator compares the Attribute and Value fields of the condition. For any
attribute you choose, the operator you select determines the available values
for the condition.
Value The values that can be selected for a condition are dependent on the attribute
and operator.
The following topics describe the actions you can perform from the Access Control List Rules page.
● Use the Default Access Control List Rules
● Add an Access Control List Rule and Conditions
● Copy an Access Control List Rule
● Edit or Delete an Access Control List Rule
● Edit or Delete a Condition for an Access Control List Rule
H323_Register_Call When this rule is applied to an H.323 RAS port, all H.323
incoming H.323 call requests on the port from
registered H.323 endpoints are accepted or denied,
depending on the rule setting you apply.
Example: Use this rule to allow incoming H.323 call
requests from registered H.323 endpoints. For
instance, apply this rule on H.323 RAS port 1719 and
assign accept as the rule setting action.
H323_Registration When this rule is applied to an H.323 RAS port, all H.323
incoming H.323 registration requests on the port from
H.323 endpoints are accepted or denied, depending
on the rule setting you apply.
Example: Use this rule to allow incoming H.323
registration requests from H.323 endpoints. For
instance, apply this rule on H.323 RAS port 1719 and
assign accept as the rule setting action.
H323_Registration_Without_Polycom When this rule is applied to an H.323 RAS port, all H.323
_Endpoint incoming H.323 registration requests on the port from
non-Polycom H.323 endpoints are accepted or
denied, depending on the rule setting you apply. This
rule has conditions that distinguish a Polycom
endpoint's product ID from other vendors in the RRQ.
Example: Use this rule to allow incoming H.323
registration requests from non-Polycom endpoints.
The conditions for the rule specify that the vendor IDs
do not match Polycom RealPresence Desktop,
RealPresence Group, RealPresence Mobile, and
HDX endpoints. For instance, apply this rule on
H.323 RAS port 1719 and assign accept as the rule
setting action.
SIP_Friendly_Scanner When this rule is applied to a SIP port, all incoming SIP
SIP requests on that port that contain the user-agent
header value friendly-scanner are accepted or
denied, depending on the rule setting you apply.
Example: Use this rule to deny incoming SIP
requests that contain the user-agent header value
friendly-scanner. For example, apply this rule on
SIP port 5061 and assign deny as the rule setting
action.
SIP_Guest_Call When this rule is applied to a SIP call signaling port, SIP
all incoming SIP call requests on the port from
non-registered SIP guest endpoints are accepted or
denied, depending on the rule setting you apply.
Example: Use this rule to reject SIP guest calls from
the Internet to a SIP signaling port. For example,
apply this rule on SIP port 5061 and assign deny as
the rule setting action.
SIP_Guest_Call_Not_To_71xxxx_bridge When this rule is applied to a SIP call signaling port, SIP
all incoming SIP guest call requests on that port that
match the dial string in the rule are accepted or
denied, depending on the rule setting you apply.
Example: Use this rule to allow guest SIP calls from
the Internet to access only the 71xxx bridge. For
example, apply this rule on SIP port 5061 and assign
deny as the rule setting action.
SIP_Registration When this rule is applied to a SIP port, all incoming SIP
SIP registration requests on the port are accepted or
denied, depending on the rule setting you apply.
Example: Use this rule to allow incoming SIP
registration requests. For instance, apply this rule on
SIP port 5060 and assign accept as the rule setting
action.
Attribute Select the type of request for which the rule applies request.from
Operator Select the operator that indicates what the value memberOf
must be in relation to the attribute.
Value Select from the list of predefined values for specific var_Blacklist
attributes, or select a custom variable. See Add a (custom variable)
Variable.
Example: Define an Access Control List Rule to Deny SIP Calls from
Specific IP Addresses
Use this rule and settings to block SIP calls from a black list of IP addresses.
The RealPresence Access Director system maintains three system variables. You may select each variable
as the value for certain rule condition attributes, as described in the following table:
These variables cannot be edited and are automatically updated by the RealPresence Access Director
system.
Add a Variable
You can create variables to be used in conditions for Access Control List rules.
To enable administration and management of the system, the Polycom® RealPresence® Access Director™
system enables you to create and manage local user accounts and roles. See Manage Local User Accounts
and User Rolesfor instructions.
Role Description
Auditor Views active calls, call history, and registration history, manages system log files, and
uses traffic capture, ping, and traceroute to diagnose system issues.
From the Users page, you can perform the following tasks:
● Change Your System Password on page 121
● Search for a Local User Account on page 122
● Add a Local User Account and Assign User Roles on page 122
● Edit and Delete Local User Account Information on page 123
Field Description
4 Click Associated Roles and select one or more roles for the new user.
5 Click the right arrow to add the role to the Selected roles list.
6 Click OK.
7 If you add a new administrator account in the RealPresence Access Director, Virtual Edition, log out
of the web user interface and enter the new administrator user credentials in the RealPresence
Platform Director system.
The following topics describe maintenance functions for the Polycom® RealPresence® Access Director™
system:
● Upgrade the Software
● Shut Down and Restart the System
● Back Up and Restore the System
From the RealPresence Access Director system’s Backup and Restore page, you can complete the
following actions:
● Create a Backup File
● Download a Backup File
● Upload a Backup File
● Restore the System from a Backup File
● Remove a Backup File
● Migrate Data from a Backup File
Field Description
Creation Date The date and time when the backup file was created.
Name The name of the backup file. The system automatically generates the name when
you create a new backup file.
The file extensions for backup files is .image.
System Version The version of the RealPresence Access Director system in use when the backup
file was created.
The Polycom® RealPresence® Access Director™ system provides several network and system status
commands that help to ensure optimum performance of the system. Additionally, log files provide detailed
system information.
The following topics describe the commands and diagnostic tools you can use to assess system
performance:
● View Active Call Details
● Call History
● Audit Registration History
● View TURN Allocations
● Manage System Log Files
● Run Traffic Capture
● Ping a Device
● Run Traceroute
● View High Availability Status
● Use Polycom Utilities
Column Description
Originator The originating device’s display name, name, alias, or IP address (in that order of
preference), depending on what it provided in the call signaling.
3 Click Search.
The search results list the calls in the time range you specified. If there are more than 500, the first
page lists the first 500, and the arrow buttons below the list let you view other pages.
Start time The time the call began (first signaling event).
Column Description
3 Click Search.
The search results list the registration records for the time range you specified. If there are more than
500, the first page lists the first 500, and the arrow buttons below the list let you view other pages.
Column Description
Start Time The time and date that the device registered.
End Time The time and date that the device’s registration ended (blank if the device is still
registered).
H.323
Lists all aliases of a client terminal included in the
RRQ message.
Far end The IP address and port of the far end from which
the system received a signaling message
Summary SIP
Specifies the SIP request method or response
code.
H.323
Identifies the registration request, reject, or
confirm messages.
Item Description
User The username of the WebRTC client that requested the allocation
Relay Address The public IP address for TURN media relay, mapped on the firewall (the
External IP Address of NAT)
Server Address The public IP address of either the client that requested the allocation or the peer,
depending on the direction of media relay.
Age (seconds) The number of seconds that the allocation has been active
Expires (seconds) The number of seconds remaining until the allocation expires if it is not renewed
by the client
SIP Dispositions
Disposition Description
Disposition Description
Column Description
Time Date and time that the log file was created.
Ping a Device
Use Ping to verify that the RealPresence Access Director system can communicate with another device on
the network.
Run Traceroute
Use Traceroute to view these details:
● The route that the RealPresence Access Director system uses to reach the address you specify
● The latency (round trip) for each hop.
This section provide information to assist in ensuring optimum performance of the Polycom® RealPresence®
Access Director™ system.
Refer to the following topics for the recommended troubleshooting actions for specific issues:
● Remote Client Login Failed
● Licensed Call Number is 0
● SIP Registration Failed
● SIP Call Failed
● H.323 Call Failed
● VMR Call Failed
● No Audio, Video, or Content
● Failed to Connect to RealPresence Resource Manager System
● Cannot Open RealPresence Access Director System User Interface
For additional information on troubleshooting, see Polycom Unified Communications in RealPresence
Access Director System Environments, available at support.polycom.com.
No network connection on Polycom® Check the wireless connection on the mobile device.
RealPresence® Mobile
Sign-in server address error Confirm that the sign-in server address for the remote user, is the
public address of the RealPresence Access Director system.
Site configuration error In the RealPresence Resource Manager system, check whether
the signaling IP address of the RealPresence Access Director
system is included in the subnets.
User configuration error In the RealPresence Resource Manager system, check whether
the user that is signed in can be found in a search of the local user
list or in the LDAP user list.
License is invalid due to system time being If you have purchased a license, in the RealPresence Access
changed. Director system:
• Go to Maintenance > License > Activation Keys and re-enter
the license activation key.
• Click Update.
Site configuration error In the RealPresence Resource Manager system, check whether
the SIP registrar server address for remote users is the public
address of the RealPresence Access Director system.
Certificate installation error If the client uses SIP TLS, check whether the certificates on the
RealPresence Access Director system are correctly installed.
Note: The RealPresence Access Director system does not support
PKCS #12 certificates.
RealPresence DMA system configuration In the RealPresence DMA system, determine if the dial rule
error configurations are correct.
Bandwidth limitation Concurrent calls may reach the maximum bandwidth allowed by
the RealPresence Access Director system. When this happens,
complete the following steps:
• Go to Configuration > Media Traversal Settings.
• Increase bandwidth limitation values.
• Try the call again.
Callee registration error On the callee endpoint, check whether the endpoint is registered
with the gatekeeper.
Network issue between the RealPresence In the RealPresence DMA system, check whether the
Access Director system and the gatekeeper RealPresence Access Director system is reachable.
RealPresence DMA system configuration In the RealPresence DMA system, determine if the dial rule
error configurations are correct.
Bandwidth limitation Concurrent calls may reach the maximum bandwidth allowed by
the RealPresence Access Director system. When this happens,
complete the following steps:
• Go to Configuration > Media Traversal Settings.
• Increase bandwidth limitation values.
• Try the call again.
VMR configuration error In the RealPresence DMA system, determine if the VMR number is
correct.
RealPresence DMA system configuration In the RealPresence DMA system, determine if the dial rule
error configurations are correct.
BFCP over UDP for content The RealPresence Access Director system supports BFCP over
UDP. Make sure the endpoint or MCU supports BFCP over UDP as
well.
SIP or H.323 ALG • Check whether SIP or H.323 ALG is enabled on the firewall/NAT.
• Disable SIP or H.323 ALG and try the call again.
Network issue between the RealPresence In the RealPresence Resource Manager system, check whether
Access Director system and the the RealPresence Access Director system is accessible.
RealPresence Resource Manager system
Site configuration error • In the RealPresence Resource Manager system, ensure that the
subnet of the internal signaling IP address of the RealPresence
Access Director system is correct.
User configuration error In the RealPresence Resource Manager system, check whether
the login name of the user is in the user list.
Internet Explorer browser cache issue • Close and re-open the Internet Explorer browser.
• Access the RealPresence Access Director system user
interface. If you are still unable to open the interface, delete the
Internet Explorer cache files.
• Refer to Internet Explorer or Windows help if you do not have the
necessary account permissions to delete the cache files.