Field
Description
Usage tips
TLS verify
mode
Controls whether the VCS performs X.509
certificate checking against the neighbor
system when communicating over TLS.
If the neighbor system is another VCS, both
systems can verify each other's certificate
(known as mutual authentication). See
TLS
certificate verification of neighbor systems
[p.155]
for more information.
Accept
proxied
registrations
Controls whether proxied SIP registrations
routed through this zone are accepted.
This setting only applies to registration
requests for a domain for which the VCS is
acting as a Registrar. For requests for other
domains the
SIP registration proxy mode
setting applies. See
Proxying registration
requests
for more information.
Media
encryption
mode
Controls the media encryption policy applied by
the VCS for SIP calls (including interworked
calls) to and from this zone.
See
Configuring media encryption policy
[p.135]
for more information.
ICE support
Controls whether ICE messages are supported
by the devices in this zone.
See
Configuring ICE messaging support
[p.137]
for more information.
Authentication
section:
Authentication
policy
Controls how the VCS authenticates incoming
messages from this zone and whether they are
subsequently treated as authenticated,
unauthenticated, or are rejected.
The behavior varies for H.323 messages, SIP
messages that originate from a local domain
and SIP messages that originate from non-
local domains. See
Authentication policy
configuration options [p.105]
for more
information.
SIP
authentication
trust mode
Controls whether authenticated SIP messages
(ones containing a P-Asserted-Identity header)
from this zone are trusted without further
challenge.
See
SIP authentication trust [p.108]
for more
information.
Location
section:
Location
Peer 1 to Peer
6 address
The IP address or FQDN of the neighbor
system.
Enter the addresses of additional peers if:
n
the neighbor is a VCS cluster, in which case
you must specify all of the peers in the
cluster
n
the neighbor is a resilient non-VCS system,
in which case you must enter the addresses
of all of the resilient elements in that system
Calls to a VCS cluster are routed to whichever
peer in that neighboring cluster has the
lowest resource usage. See
Neighboring the
local VCS to another VCS cluster [p.169]
for
more information.
For connections to non-VCS systems, the
VCS uses a round-robin selection process to
decide which peer to contact if no resource
usage information is available.
Advanced
section:
Cisco VCS Administrator Guide (X8.1.1)
Page 143 of 507
Zones and neighbors
Configuring zones