Preview

white paper configuration file manageme

Powerful Essays
Open Document
Open Document
1526 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
white paper configuration file manageme
White Paper
Configuration File Management on Polycom® SoundPoint® IP,
SoundStation® IP, and VVX® Phones
This white paper provides a simple and effective way to manage configuration files and keep desired settings when configuration files are upgraded to new revisions. This information applies to SoundPoint IP phones running BootROM version
3.1.0 or later and SIP software version 1.6 or later.
This information applies to SoundStation IP phones running BootROM version 4.1.3 or later and SIP software version 2.0 or later.
This information applies to VVX 1500 phones running BootROM version 4.1.4 or later and SIP software 3.2.2 or later.
Updates due to changes in BootROM 4.0 or later and SIP 2.2 or later are noted. in August 2007.
This white paper applies to SoundPoint IP, SoundStation IP, and VVX 1500 phones running BootROM version 4.1.4 or earlier and SIP software 3.2.5 or earlier. For later software versions (those starting at BootROM 4.3.0 and
Polycom® UC Software 3.3.0), see the Polycom UC Software Provisioning Best
Practices available on the Polycom Support Web site at http://www.polycom.com/global/forms/verify.html?retURL=http://ww w.polycom.com/global/documents/whitepapers/uc-software-provisioningbest-practices-whitepaper.pdf .

Introduction
If customers modify the configuration files delivered with the SIP firmware for their organization’s needs, those changes are lost or are difficult to recreate when it comes time to update the SIP firmware. The configuration files, supplied with each SIP release, must be used with that release or the software will behave unpredictably.

Distributed Configuration Files
The phone uses configuration files listed in the CONFIG_FILES field of the master configuration file, for example 000000000000.cfg or <Ethernet address>.cfg. Note

August 2011
3725-17461-001/D

As of BootROM 4.0 and SIP 2.2, the use of <Ethernet address>.cfg files is not recommended. The use of substitutions in 000000000000.cfg has been introduced.
Refer to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    iLab Week4

    • 563 Words
    • 2 Pages

    As we can see from the above graph, the ethernet delay is increased at startup which would be…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This section only evaluates your entry of config commands that relate to actual device configuration.…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 3151 Words
    • 13 Pages

    (1) When you boot your system, Linux isn't running yet and cannot save you from…

    • 3151 Words
    • 13 Pages
    Good Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    11. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option? Workstation settings…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Mgmt Project Wk 4

    • 1866 Words
    • 8 Pages

    2. Unauthorized appropriation is a privacy tort – using someone's name, likeness, or voice for commercial advantage without his or her permission. The Midler case specifically used the California law of appropriation to decide the case.…

    • 1866 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Security – This new update will feature some security changes and will keep you safe from any viruses.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Take a screen shot of the Group Policy Management console displaying all of the policy settings you configured in this exercise by pressing Alt+Prt Scr, and then paste the resulting image into the Lab10_worksheet file in the page provided by pressing Ctrl+V.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. In this paper, the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file will be use. The question to be answered is of how to specify this protection scheme in UNIX. It is very important to set up a protection scheme that will allow control access and viewing privileges of specific files to a number of different users. It is also a necessary task to ensure the integrity of…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    WGU MSN paper

    • 1186 Words
    • 5 Pages

    BEC1 Study guide – Updated (please discard any other study guide currently in your possession and replace it with this one) – only 33 pages. Yah!!…

    • 1186 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Stanley International Bank (SIB) processes a payroll administration for approximately 2500 employees located across the globe. There are ten payroll entities that are processed on a monthly basis. When processing pay various manual activities and methods are required to ensure employees are paid within the compliance regulatory guidelines and their contract of employment.…

    • 3045 Words
    • 11 Pages
    Best Essays
  • Good Essays

    11. What should you do if you get the POST error “CMOS checksum bad”? flash BIOS…

    • 696 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Implementing Change Paper

    • 1237 Words
    • 5 Pages

    When applying adjustment, managers have to perform as modify mediator. By meaning, change manager are the contributor that makes certain the adaption development drift from one stage to the other until the modification becomes stable. Transform managers have the skills to inspire each other, display solid individuality, adjustability, self-assurance, and a skill to obtain thoughts from uncertain foundation of effort. Managerial manager must search for these uniqueness when transfer liability for administrating the adjust procedure. Supervisor, however, regularly not the cast of modification, are responsible to the company for…

    • 1237 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The critical success factors for retail e-Business startups are: Selection and Value, Performance and Service, Look and Feel, Advertising and Incentives, Personal Attention, Community Relationships, Security and Reliability, Great Customer Communication.…

    • 1663 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cmi Level 5 Management File

    • 9795 Words
    • 40 Pages

    Note: Word process your responses in the right hand column of each Unit which is headed Learner Knowledge, Understanding and Currency.…

    • 9795 Words
    • 40 Pages
    Good Essays
  • Better Essays

    Implementing Change Paper

    • 1193 Words
    • 4 Pages

    Implementing change in any area of an organization can be challenging. Change can be good and bad. Change is not always easy to adapt too. According to Charles Darwin, "it is not the strongest of the species that survives, or the most intelligent, but the one most responsive to change". It is important that the manager has a plan of action before trying to implement any change. This paper will discuss the manager's role and responsibility in implementing change in the department. How should a manager successfully handle staff resistance to change and the paper will define each step of the change process.…

    • 1193 Words
    • 4 Pages
    Better Essays

Related Topics